26
Network Network Implementation Implementation

Network Implementation. Installing the Network Configure your network You have to decide how to lay out your physical location. You have to choose

Embed Size (px)

Citation preview

Page 1: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Network ImplementationNetwork Implementation

Page 2: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Installing the NetworkInstalling the Network

Configure your network Configure your network You have to decide how to lay out your You have to decide how to lay out your

physical location. physical location. You have to choose between several different You have to choose between several different

network topologies , and some work better network topologies , and some work better than others depending on the situationthan others depending on the situation

Page 3: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Administrative duties that need to be Administrative duties that need to be performed for your network to operate performed for your network to operate Setting up administrative and test accountsSetting up administrative and test accounts PasswordsPasswords IP addressesIP addresses IP configurationsIP configurations Connectivity requirementsConnectivity requirements Necessary software Necessary software

Page 4: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Network administrator Network administrator

Make sure that the clients on your network Make sure that the clients on your network can communicate with one another at all can communicate with one another at all times times

People who are using the network won’t People who are using the network won’t be interrupted during working hours be interrupted during working hours

Responsible for the security of the data, Responsible for the security of the data, the efficiency of the network, and other the efficiency of the network, and other aspects such as printing, sharing of files, aspects such as printing, sharing of files, and e-mail. and e-mail.

Page 5: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Protocols Protocols

Communication on a computer network is Communication on a computer network is accomplished by the use of protocols accomplished by the use of protocols

One of the most widely adopted standards One of the most widely adopted standards in the computer industry is the TCP/IP in the computer industry is the TCP/IP protocol protocol

An easy way to think of protocols is to An easy way to think of protocols is to consider them as a language consider them as a language

Page 6: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Standard Operating Procedures Standard Operating Procedures (SOPs) (SOPs)

The practices that you follow to enable The practices that you follow to enable your network to run smoothly and your network to run smoothly and efficiently.efficiently.

These typically consist of backing up the These typically consist of backing up the data on the networkdata on the network

Making sure everyone can communicateMaking sure everyone can communicate Fixing any problem that may arise at a Fixing any problem that may arise at a

moment’s notice. moment’s notice.

Page 7: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Administrative and Test Administrative and Test AccountsAccounts

The network administrator holds the keys The network administrator holds the keys to the network castle to the network castle

The person who holds the Administrator The person who holds the Administrator account has complete, unrestricted access account has complete, unrestricted access to all of the files, folders, and shares on to all of the files, folders, and shares on the network. the network.

He has complete power over the security He has complete power over the security of the network.of the network.

Page 8: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Administrator account Administrator account

Limit access to the Administrator account Limit access to the Administrator account to those who have a justifiable need for to those who have a justifiable need for the account the account

Rename the Administrator account to Rename the Administrator account to something other than “Administrator.” something other than “Administrator.”

Use a password that is difficult to break Use a password that is difficult to break

Page 9: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Test account Test account

A test account is an account with normal A test account is an account with normal rights within the network. rights within the network.

If you used an administrative account to If you used an administrative account to make the change, then you should use a make the change, then you should use a test account to test your changes test account to test your changes

This practice is especially important when This practice is especially important when making changes to file and directory making changes to file and directory permissions permissions

Page 10: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

PasswordsPasswords

Passwords are another form of computer Passwords are another form of computer security to ensure that those who aren’t security to ensure that those who aren’t supposed to access certain files on the network supposed to access certain files on the network don’t. don’t.

Passwords aren’t a fail-safe method of securing Passwords aren’t a fail-safe method of securing your network, but if they are implemented and your network, but if they are implemented and enforced correctly, they can impose a level of enforced correctly, they can impose a level of security that you should feel comfortable with.security that you should feel comfortable with.

A A strong passwordstrong password is a password that is difficult is a password that is difficult to “crack” or break in to. to “crack” or break in to.

Page 11: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

TCP/IPTCP/IP

TCP/IP (Transmission Control Protocol/Internet TCP/IP (Transmission Control Protocol/Internet Protocol)Protocol) is an industry-standard suite of is an industry-standard suite of protocols designed for local and wide area protocols designed for local and wide area networking. networking.

TCP/IP was developed in 1969, in a Defense TCP/IP was developed in 1969, in a Defense Advanced Research Projects Agency (DARPA) Advanced Research Projects Agency (DARPA) research project on network interconnection.research project on network interconnection.

Formerly a military network, this global area Formerly a military network, this global area network has exploded and is now referred to as network has exploded and is now referred to as the Internet.the Internet.

Page 12: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Advantages of the TCP/IP Advantages of the TCP/IP

It is the backbone of the Internet. If you need to It is the backbone of the Internet. If you need to connect to the Internet, you will need TCP/IP.connect to the Internet, you will need TCP/IP.

It is routable. This means that you can talk to It is routable. This means that you can talk to other networks through routers.other networks through routers.

It is very popular. Think of all of the computers It is very popular. Think of all of the computers on the Internet.on the Internet.

Some applications need TCP/IP to run.Some applications need TCP/IP to run. It provides connectivity across operating It provides connectivity across operating

systems and hardware platforms. Windows NT systems and hardware platforms. Windows NT can use an FTP client to access a UNIX can use an FTP client to access a UNIX workstation or server.workstation or server.

Page 13: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Advantages of the TCP/IPAdvantages of the TCP/IP

It provides Simple Network Management It provides Simple Network Management Protocol (SNMP) support, which is used to Protocol (SNMP) support, which is used to troubleshoot problems on the network.troubleshoot problems on the network.

It provides Dynamic Host Configuration It provides Dynamic Host Configuration Protocol (DHCP) support, which is used Protocol (DHCP) support, which is used for Dynamic IP addressing.for Dynamic IP addressing.

It provides Windows Internet Naming It provides Windows Internet Naming Service (WINS) support, which resolves Service (WINS) support, which resolves Windows NetBios names on the network.Windows NetBios names on the network.

Page 14: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

IP ConfigurationsIP Configurations

IP address IP address An IP address is a 32-bit network address that An IP address is a 32-bit network address that

identifies a computer on a network. An IP identifies a computer on a network. An IP address is made up of a network ID and a address is made up of a network ID and a host ID.host ID.

An IP address is a four-octet address. An IP address is a four-octet address. Example. 204.22.120.3 Example. 204.22.120.3

Page 15: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Subnet mask Subnet mask A subnet mask separates the network ID from the A subnet mask separates the network ID from the

host ID. This can break down an individual IP address host ID. This can break down an individual IP address into different and separate logical networks or into different and separate logical networks or subnets. subnets.

Default gateway Default gateway A default gateway is actually a router that is used to A default gateway is actually a router that is used to

send packets to remote networks. The default send packets to remote networks. The default gateway that is configured will receive a packet from gateway that is configured will receive a packet from your computer and route the packet to its correct your computer and route the packet to its correct destination. Without a default gateway configured, destination. Without a default gateway configured, your computer cannot communicate with any remote your computer cannot communicate with any remote networks. networks.

Page 16: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Domain Name System Domain Name System

A DNS Service is used to map IP A DNS Service is used to map IP addresses to fully qualified domain names addresses to fully qualified domain names (FQDNs). This form of name resolution is (FQDNs). This form of name resolution is commonly used on the Internet to map IP commonly used on the Internet to map IP addresses to popular web sites. addresses to popular web sites.

Page 17: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Windows Internet Naming Service Windows Internet Naming Service

A WINS Service also provides name A WINS Service also provides name resolution for computers, but does so only resolution for computers, but does so only for Windows computers and is normally for Windows computers and is normally “Microsoft centric.” A WINS Service maps “Microsoft centric.” A WINS Service maps IP addresses to NetBIOS names. IP addresses to NetBIOS names.

Page 18: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

MAC address MAC address

A MAC address is the physical network address A MAC address is the physical network address of a computer’s network interface card. of a computer’s network interface card.

A MAC address is a 12-letter hexadecimal A MAC address is a 12-letter hexadecimal address that is broken up into two segments. address that is broken up into two segments.

The first six hex letters identify the vendor of the The first six hex letters identify the vendor of the network card; the last six hex letters are the network card; the last six hex letters are the serial number that identifies the computer. serial number that identifies the computer.

Page 19: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Dynamic Host Configuration Dynamic Host Configuration Protocol Protocol

DHCP is used to automatically allocate DHCP is used to automatically allocate TCP/IP address information to a computer TCP/IP address information to a computer that is “DHCP enabled.” This practice that is “DHCP enabled.” This practice reduces the amount of administration reduces the amount of administration necessary for large networks necessary for large networks

Page 20: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Host name Host name

A host name or computer name uniquely A host name or computer name uniquely identifies the computer on the network. identifies the computer on the network.

A host name or Fully Qualified Domain A host name or Fully Qualified Domain Name will uniquely identify a computer on Name will uniquely identify a computer on the network or Internet, but a NetBIOS the network or Internet, but a NetBIOS name is the computer name that is name is the computer name that is specified by the network administrator. specified by the network administrator.

These two names can be different, but These two names can be different, but unless changed, the Host name defaults to unless changed, the Host name defaults to the NetBIOS computer name.the NetBIOS computer name.

Page 21: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Name ResolutionName Resolution

Computers communicate with each other Computers communicate with each other by using network addresses, but people by using network addresses, but people tend to want to communicate by using tend to want to communicate by using computer names computer names

It is much easier to remember a computer It is much easier to remember a computer name than a set of four different numbers. name than a set of four different numbers.

Page 22: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

Name ResolutionName Resolution

The two main options associated with name The two main options associated with name resolution on computer networks are Domain resolution on computer networks are Domain Name System (DNS) and Windows Internet Name System (DNS) and Windows Internet Naming Service (WINS).Naming Service (WINS).

For name resolution on Windows networks, For name resolution on Windows networks, WINS resolves NetBIOS names to TCP/IP WINS resolves NetBIOS names to TCP/IP addresses. addresses.

For computers that use host names, DNS For computers that use host names, DNS resolves fully qualified domain names (FQDNs) resolves fully qualified domain names (FQDNs) to TCP/IP addresses. to TCP/IP addresses.

Page 23: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

WINSWINS

Resolve NetBIOS names to IP addresses. Resolve NetBIOS names to IP addresses. The The Windows Internet Naming Service Windows Internet Naming Service

(WINS)(WINS) was designed to eliminate the was designed to eliminate the need for broadcasts to resolve NetBIOS need for broadcasts to resolve NetBIOS names to IP addresses and to provide a names to IP addresses and to provide a dynamic database that maintains NetBIOS dynamic database that maintains NetBIOS names to IP address mappings names to IP address mappings

Page 24: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

DNSDNS

DNS (Domain Name System)DNS (Domain Name System) maps maps TCP/IP addresses to computer names TCP/IP addresses to computer names

Page 25: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

CablesCables

10BaseT- Flexible, uses RJ-45 10BaseT- Flexible, uses RJ-45 connector,100 meters/328 feetconnector,100 meters/328 feet

10Base2 - Less flexible than 10BaseT, 10Base2 - Less flexible than 10BaseT, uses a BNC connector to hook computers uses a BNC connector to hook computers together, Must be terminated on one together, Must be terminated on one end.185 meters/607 feetend.185 meters/607 feet

Page 26: Network Implementation. Installing the Network  Configure your network  You have to decide how to lay out your physical location.  You have to choose

10Base5 - Rigid, does not bend well 10Base5 - Rigid, does not bend well around corners, Not used too often; AUI around corners, Not used too often; AUI connector,1640 feetconnector,1640 feet

Fiber optic - Does not do well in tight Fiber optic - Does not do well in tight changes of redirection, Carries data changes of redirection, Carries data extreme distances, Easily broken, fragile, extreme distances, Easily broken, fragile, 2 kilometers2 kilometers