1 / 26

Network Implementation

Network Implementation. Installing the Network. Configure your network You have to decide how to lay out your physical location. You have to choose between several different network topologies , and some work better than others depending on the situation.

nelia
Download Presentation

Network Implementation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Implementation

  2. Installing the Network • Configure your network • You have to decide how to lay out your physical location. • You have to choose between several different network topologies , and some work better than others depending on the situation

  3. Administrative duties that need to be performed for your network to operate • Setting up administrative and test accounts • Passwords • IP addresses • IP configurations • Connectivity requirements • Necessary software

  4. Network administrator • Make sure that the clients on your network can communicate with one another at all times • People who are using the network won’t be interrupted during working hours • Responsible for the security of the data, the efficiency of the network, and other aspects such as printing, sharing of files, and e-mail.

  5. Protocols • Communication on a computer network is accomplished by the use of protocols • One of the most widely adopted standards in the computer industry is the TCP/IP protocol • An easy way to think of protocols is to consider them as a language

  6. Standard Operating Procedures (SOPs) • The practices that you follow to enable your network to run smoothly and efficiently. • These typically consist of backing up the data on the network • Making sure everyone can communicate • Fixing any problem that may arise at a moment’s notice.

  7. Administrative and Test Accounts • The network administrator holds the keys to the network castle • The person who holds the Administrator account has complete, unrestricted access to all of the files, folders, and shares on the network. • He has complete power over the security of the network.

  8. Administrator account • Limit access to the Administrator account to those who have a justifiable need for the account • Rename the Administrator account to something other than “Administrator.” • Use a password that is difficult to break

  9. Test account • A test account is an account with normal rights within the network. • If you used an administrative account to make the change, then you should use a test account to test your changes • This practice is especially important when making changes to file and directory permissions

  10. Passwords • Passwords are another form of computer security to ensure that those who aren’t supposed to access certain files on the network don’t. • Passwords aren’t a fail-safe method of securing your network, but if they are implemented and enforced correctly, they can impose a level of security that you should feel comfortable with. • A strong password is a password that is difficult to “crack” or break in to.

  11. TCP/IP • TCP/IP (Transmission Control Protocol/Internet Protocol) is an industry-standard suite of protocols designed for local and wide area networking. • TCP/IP was developed in 1969, in a Defense Advanced Research Projects Agency (DARPA) research project on network interconnection. • Formerly a military network, this global area network has exploded and is now referred to as the Internet.

  12. Advantages of the TCP/IP • It is the backbone of the Internet. If you need to connect to the Internet, you will need TCP/IP. • It is routable. This means that you can talk to other networks through routers. • It is very popular. Think of all of the computers on the Internet. • Some applications need TCP/IP to run. • It provides connectivity across operating systems and hardware platforms. Windows NT can use an FTP client to access a UNIX workstation or server.

  13. Advantages of the TCP/IP • It provides Simple Network Management Protocol (SNMP) support, which is used to troubleshoot problems on the network. • It provides Dynamic Host Configuration Protocol (DHCP) support, which is used for Dynamic IP addressing. • It provides Windows Internet Naming Service (WINS) support, which resolves Windows NetBios names on the network.

  14. IP Configurations • IP address • An IP address is a 32-bit network address that identifies a computer on a network. An IP address is made up of a network ID and a host ID. • An IP address is a four-octet address. Example. 204.22.120.3

  15. Subnet mask • A subnet mask separates the network ID from the host ID. This can break down an individual IP address into different and separate logical networks or subnets. • Default gateway • A default gateway is actually a router that is used to send packets to remote networks. The default gateway that is configured will receive a packet from your computer and route the packet to its correct destination. Without a default gateway configured, your computer cannot communicate with any remote networks.

  16. Domain Name System • A DNS Service is used to map IP addresses to fully qualified domain names (FQDNs). This form of name resolution is commonly used on the Internet to map IP addresses to popular web sites.

  17. Windows Internet Naming Service • A WINS Service also provides name resolution for computers, but does so only for Windows computers and is normally “Microsoft centric.” A WINS Service maps IP addresses to NetBIOS names.

  18. MAC address • A MAC address is the physical network address of a computer’s network interface card. • A MAC address is a 12-letter hexadecimal address that is broken up into two segments. • The first six hex letters identify the vendor of the network card; the last six hex letters are the serial number that identifies the computer.

  19. Dynamic Host Configuration Protocol • DHCP is used to automatically allocate TCP/IP address information to a computer that is “DHCP enabled.” This practice reduces the amount of administration necessary for large networks

  20. Host name • A host name or computer name uniquely identifies the computer on the network. • A host name or Fully Qualified Domain Name will uniquely identify a computer on the network or Internet, but a NetBIOS name is the computer name that is specified by the network administrator. • These two names can be different, but unless changed, the Host name defaults to the NetBIOS computer name.

  21. Name Resolution • Computers communicate with each other by using network addresses, but people tend to want to communicate by using computer names • It is much easier to remember a computer name than a set of four different numbers.

  22. Name Resolution • The two main options associated with name resolution on computer networks are Domain Name System (DNS) and Windows Internet Naming Service (WINS). • For name resolution on Windows networks, WINS resolves NetBIOS names to TCP/IP addresses. • For computers that use host names, DNS resolves fully qualified domain names (FQDNs) to TCP/IP addresses.

  23. WINS • Resolve NetBIOS names to IP addresses. • The Windows Internet Naming Service (WINS) was designed to eliminate the need for broadcasts to resolve NetBIOS names to IP addresses and to provide a dynamic database that maintains NetBIOS names to IP address mappings

  24. DNS • DNS (Domain Name System) maps TCP/IP addresses to computer names

  25. Cables • 10BaseT- Flexible, uses RJ-45 connector,100 meters/328 feet • 10Base2 - Less flexible than 10BaseT, uses a BNC connector to hook computers together, Must be terminated on one end.185 meters/607 feet

  26. 10Base5 - Rigid, does not bend well around corners, Not used too often; AUI connector,1640 feet • Fiber optic - Does not do well in tight changes of redirection, Carries data extreme distances, Easily broken, fragile, 2 kilometers

More Related