Chapter 7 - Networks CPTE 433 John Beckett. OSI Model 7 Application – SNMP, HTTP, FTP, etc. 6 Presentation – Data formats, encoding, encryption 5 Session.

Slides:



Advertisements
Similar presentations
Chapter 7: Intranet LAN Design
Advertisements

Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
CIT 470: Advanced Network and System Administration
VLANs Virtual LANs CIS 278.
Cisco 3 - Switches Perrine - Brierley Page 15/10/2015 Module 5 Switches LAN Design LAN Switches.
LAN DESIGN. Functionality - the network must work with reasonable speed and reliability.
Ethernet and switches selected topics 1. Agenda Scaling ethernet infrastructure VLANs 2.
Instructor & Todd Lammle
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
1 Fall 2005 Internetworking: Concepts, Architecture and TCP/IP Layering Qutaibah Malluhi CSE Department Qatar University.
Ch.6 - Switches CCNA 3 version 3.0.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Chapter 1 Read (again) chapter 1.
1 Chapter 8 Local Area Networks - Internetworking.
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
1 CCNA 3 v3.1 Module 5. 2 CCNA 3 Module 5 Switches/LAN Design.
Business Data Communications Chapter Six Backbone and Metropolitan Area Network Fundamentals.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Connecting LANs, Backbone Networks, and Virtual LANs
Network Topologies.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
1 © 2012 InfoComm International Essentials of AV Technology Networking for Data and AV.
Data Communications and Networks
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 1 Overview Review Overview of demonstration network
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
1 Next Few Classes Networking basics Protection & Security.
Internet and Intranet RMUTT, Course Outline 1 st half –Internet overview –TCP/IP protocol –Applications in TCP/IP network 2 nd half –JSP programming.
Introduction to Network Basic 1. Agenda – - Internetworking Basic – - OSI Layer – - TCP/IP Model – - IP Addressing – - Subnetting & VLSM – - The Internal.
Chapter 2 Network Topology
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 3, v Chapter.
Chapter 21 Topologies Chapter 2. 2 Chapter Objectives Explain the different topologies Explain the structure of various topologies Compare different topologies.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
LAN DESIGN – first step 5 ISB – school year 2006/07.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
Chapter2 Networking Fundamentals
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
Cisco 3 - Switches Perrine - Brierley Page 112/1/2015 Module 5 Switches.
LAN Design Semester 3, Chapter 3. Home End Table of Contents Go There! Go There! Go There! Go There! Go There! Go There! Go There! Go There! Go There!
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Data Communications and Networks Chapter 1 - Classification of network topologies Data Communications and Network.
Protocol Layering Chapter 11.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
Networking Protocols John R. Durrett ISQS 6343 #1.
Computer Network Architecture Lecture 3: Network Connectivity Devices.
11 ROUTING IP Chapter 3. Chapter 3: ROUTING IP2 CHAPTER INTRODUCTION  Understand the function of a router.  Understand the structure of a routing table.
NETWORK DEVICES Department of CE/IT.
Welcome Back Cisco Semester 1 & 2 Review. Why are Networks Complex Environments?? They involve: They involve: –Interconnections to networks outside an.
Instructor & Todd Lammle
Instructor Materials Chapter 1: LAN Design
Local Area Networks Honolulu Community College
Connecting Network Components
Lecture 6: TCP/IP Networking By: Adal Alashban
IS3120 Network Communications Infrastructure
Module 5 - Switches CCNA 3 version 3.0.
Ethernet LAN 1 1.
Computing Over Distance
Unit 11- Computer Networks
Presentation transcript:

Chapter 7 - Networks CPTE 433 John Beckett

OSI Model 7 Application – SNMP, HTTP, FTP, etc. 6 Presentation – Data formats, encoding, encryption 5 Session – Start.. Communicate.. Finish 4 Transport – Connecting between networks 3 Network – Logical addr (IP etc.), routing 2 Data Link – MAC, Low-level errors 1 Physical – copper, fiber A message from each layer goes through all lower levels, then to the other side, then back up to its layer.

Why a Clean Architecture? The more complex your architecture, the more… Likely that something will go wrong Likely that someone will find a way through your security system Likely you’ll have performance problems you simply can’t diagnose Difficult to debug if something goes wrong Defense: Good diagnostic hw/sw and CSA Skills

Three Topologies Star (original) Bus Ring Reality: Most networks use a combination, such as: –Star to connect regions to main office –Ring to connect offices in a region –Bus to connect workstations within an office Switch localizes traffic (somewhat)

Star Issues Easiest to trouble-shoot –..if you don’t have and understand good tools Lowest performance/$ of the options Central node is critical If you wish to create backup for central node, you’re doubling the cost

Ring Issues Gives much of the redundancy of star with less cost Puts more responsibility for routing on individual nodes A broken ring can create performance problems, so you must monitor all links for that critical 50% saturation point.

Bus Issues Traffic, especially on “chatty” protocols, can be a major overhead issue Hubs allow people to see each others’ traffic –Switches provide some protection from this Some protocols such as Ethernet perform miserably when near saturation level –Does not scale well

Centralize or Decentralize? Follow the money! Is it “better” to: Trouble-shoot separate networks Or Have everything come to the home office The answer depends on your goals and need for control. Trend: Use higher available bandwidth to centralize, reducing support cost

Network C/D Business Drivers Centralize Need for central control Low inter-site bandwidth costs Complex App inter- relationships Decentralize Need Local Support High inter-site bandwidth costs Simple app inter- relationships

MDF & IDF MDF Main Distribution Frame Server room Connections to IDFs IDF Intermediate Distribution Frame Also known as “wiring closet” Switches, hubs, perhaps routers Connections to workstations & MDF

Distribution Frames Wires coming into the room should go to the “frame”. Wires should go from the frame to each device in the room. Thus: All connections from the outside to devices can be readjusted at the frame rather than re-routing wires above or below. Question: Punch-down versus network jacks. –Network jacks are winning. –Leave slack for re-termination if necessary. –Jacks accommodate both fiber and copper. –Wire all eight conductors of copper for powered links.

Other Frame Issues Security: Only people in the networking group should be able to get into an IDF. Documentation: –It is critical that all jacks be clearly documented. –It is important that inter-connections be clearly documented. Expensive to wire everything to jacks? –Not as expensive as coping with failure to do it right the first time! Link Testing: All cables should be certified at installation time. Once it’s done, it’s done! Don’t forget cooling for IDFs

Installing Process

Demarcation Points Point at which a line passes from one control entity to another Networking department Telephone company or carrier Ability to disconnect and test Clear identification of lines Need relationships between people across demarc

Documentation Physical versus logical Show distance between frames (intra- and inter- building) Standardize naming scheme –The better your standardization, the less documentation needed Ideally, documentation is connected to your management system because duplicate books are never correct May be used for billing – another reason for integrating

Hardware vs Software Hardware routing can go faster than software for a given CPU speed and I/O device architecture. Software routing can run on machines which catch the Moore’s law curve and go faster as your needs increase. Mihaescu’s take: Use hardware because it’s engineered for the purpose. –Also tends to be more robust –Supports newer features Beckett’s take: Consider software because it’s going to be software-driven anyhow. In either case, standardize on a given architecture.

Objections to Software Routing Other services can clog up the machine. –So, don’t run them! UNIX and Windows are not optimized for it. –Get a faster CPU. Get better NICs. Being simpler, hardware devices are less prone to attack. –The issue is not simplicity, but vulnerability. UNIX and Windows get more attention from their creators to close vulnerability holes.

Bottom Line on Routing Reliability: It’s just like my old 386sx33 host doing UNIX: It isn’t what’s there, it’s how you take care of it. Take care of UNIX, Windows, and proprietary routers and they’ll take care of you.

Standards Which standard (IETF RFC or IEEE document) is used? Which other brands do they state on paper that they inter-operate with? Beware of “you can do that” statements

Monitoring Real-time Automatically-generated trouble tickets? –Perhaps for selected events Collect and display data –Collect as text –Display as graphs

Network Management Domain Should reflect the administrative structure of the firm. Interfaces used to adapt to significant data flows. An architecture that bridges administrative structures should be run as a separate task, managed by a joint task-force.

Multiple Administrative Domains Establish clear demarc points for routing and bandwidth. –Demarcs within the company? YES! Design for independent operation – one section unaffected by another’s failure. –Software Technology Center example Keep communicating. –Note what the other guys are doing. –Be more interested in what is happening than in saying how you think they’re doing it wrong. –Never fall into the “those idiots” trap. Essential to agree on protocols to be used!

VLANs Use router software to set up the way your subnets work Wire each host once Save walks to closets System is self-documenting!

How Many Vendors? Only one: –May not have everything you need, or sized wrong Separate vendor for each device –Nightmare debugging the mess Compromise: –Choose a vendor for each type of device –Related types might have the same vendor