0% found this document useful (0 votes)
44 views134 pages

Understanding Computer Networks Basics

Uploaded by

gkygdmp2wg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views134 pages

Understanding Computer Networks Basics

Uploaded by

gkygdmp2wg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Overview & Benefits of Computer Networks Section

What is a Computer Network?

[Link]
What is a Network?

• In its simplest form, a network is nothing more than “two connected


computers sharing resources with one another.”

• It is composed of two main aspects:


o Physical Connection (wires, cables, wireless media)
o Logical Connection (data transporting across the physical media)

[Link]
Overview & Benefits of Computer Networks Section

Some Basic Networking Rules

[Link]
Some Basic Networking Rules
• The computers in a network must use the same procedures for sending and
receiving data. We call these communication protocols.

• Data must be delivered uncorrupted. If it is corrupted, it’s useless. (There are


Exceptions)

• Computers in a network must be capable of determining the origin and


destination of a piece of information, i.e., its IP and Mac Address.

[Link]
Overview & Benefits of Computer Networks Section

Type of Computer Networks


(by size)

[Link]
Types of Computer Networks (by Size)
• Personal Area Network (PAN)
• Local Area Network (LAN)
• Wireless Local Area Network (WLAN)
• Campus Area Network (CAN)
• Metropolitan Area Network (MAN)
• Wide Area Network (WAN)

[Link]
Personal Area Network (PAN)
• Ultra-small networks used for personal use to share
data from one device to another.
• Can be wired (PAN) or wireless (WPAN):
o USB
o Bluetooth
o NFC
o ANT+

• Examples:
o Smart Phone to Laptop
o Smart Watch to Smart Phone
o Smart Phone Hands-Free Car Calling
o Heart Rate Monitor to Smart Phone

[Link]
Local Area Network (LAN)
• A computer network within a small geographical
area, such as a single room, building or group of
buildings.
• Considered to be self-contained:
o All devices are directly connected via cables and/or
short-range wireless technology.
o Doesn’t require a leased telecommunications line
from an Internet Service Provider (ISP).

• Examples:
o Home Network
o Small Business or Office Network

[Link]
Wireless Local Area Network (WLAN)
• A LAN that’s dependent on wireless connectivity
or one that extends a traditional wired LAN to a
wireless LAN.
• Most home networks are WLANs.

[Link]
Campus Area Network (CAN)
• A computer network of multiple
interconnected LANs in a limited geographical
area, such as a corporate business park,
government agency, or university campus.
• Typically owned or used by a single entity.

[Link]
Metropolitan Area Network (MAN)
• A computer network that interconnects
users with computer resources in a city.
• Larger than a campus area network, but
smaller than a wide area network.

[Link]
Wide Area Network (WAN)
• A computer network that extends over a
large geographical distance, typically
multiple cities and countries.
• WANs connect geographically distant LANs.
• Typically use leased telecommunications
lines from ISPs.
• Examples:
o The Internet
o Corporate Offices in Different States

[Link]
Overview & Benefits of Computer Networks Section

Network Architecture
Peer-to-Peer vs. Client-Server

[Link]
Network Architecture
Peer-to-Peer Client-Server
• All computers on the network are • The network is composed of client and
peers servers
• No dedicated servers • Servers provide resources
• There’s no centralized control over • Clients receive resources
shared resources • Servers provide centralized control over
• Any device can share its resources as network resources (files, printers, etc.)
it pleases • Centralizes user accounts, security, and
• All computers can act as either a access controls to simplify network
client or a server administration
• Easy to set-up, and common in homes • More difficult to setup and requires an IT
and small businesses administrator

[Link]
Overview & Benefits of Computer Networks Section

Why Build a Computer Network?

[Link]
Why Build a Computer Network?
• Before computer networks, people sent and received information by hand,
using the postal service. This is slow and can be unreliable.

• Computer networks enable faster, more efficient modes of communication,


i.e., email, video conferencing, etc.

• Computer networks and the sharing of electronic data encourage the use of
standard policies and procedures.

• Computer networks provide backup and recovery support for our data, i.e.,
redundancy.

• Computer networks lead to cost savings.

[Link]
Course Primer: How Computer Networks Work Section

Introduction to Computer
Networking Protocols

[Link]
Computer Networking Protocols

• Computers communicate with each other with network protocols.


• Protocols are rules governing how machines exchange data and
enable effective communication.

• Some Everyday Examples


• When you call somebody, you pick up the phone, ensure there is a dial
tone, and if there is, you dial the number.
• When you drive your car, you obey the rules of the road.
[Link]
Protocols Continued
• Physical Protocols: describe the medium (wiring), the connections
(RJ-45 port), and the signal (voltage level on a wire).

• Logical Protocols: software controlling how and when data is sent


and received to computers, supporting physical protocols.

• Computer networks depend on many different types of protocols in


order to work properly.

• Example Common TCP/IP Suite of Protocols:


o Web Communication: HTTP
o E-mail: POP3, SMTP, IMAP
o File Transfers: FTP

[Link]
Course Primer: How Computer Networks Work Section

Introduction to the OSI Model

[Link]
The OSI Model
What is it?
The Open Systems Interconnection (OSI) Reference Model
• A conceptual framework showing us how data moves
throughout a network.
• Developed by the International Organization for Standardization
(ISO) in 1977.

It’s Purpose
• Gives us a guide to understanding how networks operate.

It’s only a reference model, so don’t get wrapped up in the details.


• Wasn’t implemented in the real world, TCP/IP is.

[Link]
The OSI Model Stack
The OSI Model breaks down the complex task of computer-to-computer
network communications into seven layers.

Upper Layers (Host Layers)


• Handled by the host computer and performs application-specific functions,
such as data formatting, encryption, and connection management.

Lower Layers (Media Layers)


• Provide network-specific functions, such as routing, addressing, and flow
control.

[Link]
The OSI Model Visualized

[Link]
OSI Communication

[Link]
Course Primer: How Computer Networks Work Section

Introduction to the TCP/IP Model

[Link]
The TCP/IP Model
• The TCP/IP suite is the most commonly used
protocol suite in the networking world.
• It’s essentially the protocol suite in which
the Internet was built.
• It’s the standard for computer networking.
• It is based on a 4-layer model that is similar
to the OSI model.
• History of TCP/IP:
o Developed by the United States Department
of Defense (DoD) in the early 1970s.
o In 1982, the DOD declared TCP/IP as the
standard for all military computer networking.
o In 1984, broad adoption of TCP/IP began (IBM,
AT&T, etc.).

[Link]
TCP/IP & OSI Models Side-by-Side

[Link]
Course Primer: How Computer Networks Work Section

Introduction to the MAC


Addresses

[Link]
MAC Addresses
Media Access Control (MAC)
• Physical address of the network adapter card
• OSI Layer 2 (Data Link) Layer Address
• TCP/IP Layer 1 (Network Interface) Layer Address

Six bytes (48 bits), Usually Represented Hexadecimal


• First three bytes (24 bits) are assigned by the IEEE to the manufacturer
o Organizationally Unique Identifier (OUI) assigned by IEEE (ex: Dell or
HP)
• Last three bytes (24 bits) are usually assigned sequentially:
o Unique Numbers

[Link] 00-21-70-6F-06-F2

224 = ~16.7 Million Unique Addresses

[Link]
Course Primer: How Computer Networks Work Section

Introduction to IP Addresses

[Link]
IP Addresses
• An IP Address is a logical address used in order to uniquely identify
a device on an IP network.
• It’s a Network Layer address associated with routing.
o OSI Layer 3: Network Layer
o TCP/IP Layer 2: Internet Layer
• There are two versions:
o IP version 4 (IPv4)
▪ Example: [Link]
o IP version 6 (IPv6)
▪ Example: [Link]
• We’ll be discussing both versions in this course.

[Link]
Course Primer: How Computer Networks Work Section

IP versus MAC Addresses

[Link]
Comparing IP and MAC Addresses
IP Addresses MAC Addresses

• Network (OSI Layer 3) Addresses • Data Link (OSI Layer 2) Addresses

• Logical Addresses • Physical Addresses

• Assigned in Operating System • Physically burned on NIC

• Allows network-to-network • Allows internetwork communication via


communication via routers hubs, switches, and routers

• WAN communication • Local LAN communication

[Link]
Course Primer: How Computer Networks Work Section

Duplex Communication

[Link]
Half vs. Full Duplex Communication

• Network communication will occur in either full or half duplex mode:


o Half Duplex: Can send and receive data, but not at the same time.
o Full Duplex: Can send and receive data simultaneously.

[Link]
Course Primer: How Computer Networks Work Section

Network Transmission Types

[Link]
Network Transmission Types
• Unicast
• Multicast
• Broadcast

[Link]
Unicast (One-to-One)

[Link]
Multicast (One-to-Many)

[Link]
Broadcast (One-to-All)

[Link]
Course Primer: How Computer Networks Work Section

Introduction to Ethernet

[Link]
Introduction to Ethernet
• The most popular networking technology in the world!
• Refers to a family of standards that define the physical and logical
aspects of the world's most popular type of LAN.
• The standard communications protocol for building a local area
network (LAN).

• Physical
o Cabling, Connectors, Equipment, etc.
• Logical
o Network Access Method, i.e., Carrier Sense Multiple Access (CSMA)

[Link]
Network Topologies Section

Physical vs. Logical Topologies

[Link]
Physical vs. Logical Topologies
Physical topologies describe the placement of network devices and
how they are physically connected.

Logical topologies describe how data flows throughout a network.

[Link]
Network Topologies Section

Wired Network Topologies

[Link]
Wired Network Topologies
• Four Specific Topologies:
o Bus
o Ring
o Star
o Mesh

[Link]
Bus Topology
• All devices are connected to a single coaxial network cable.
o Devices are connected via a vampire tap or T-Connector.
o Terminators are required at both ends of the cable to prevent signal bounce.
o Antiquated technology.
• Only one end device can be active on the network at a time.
o Data signals travel in both directions and are received by all devices on the network.
• A single break in the cable can take down the entire network.

[Link]
Ring Topology
• All devices are connected in a circular fashion.
• Each computer is connected to two other
computers.
• Data travels from node-to-node with each
computer handling data, either unidirectional
or bidirectional.
• Each device (node) in the ring regenerates the
signal, acting as a repeater.
• Failure of a single node can take down the
entire network.
• Fiber Distributed Data Interface (FDDI) uses
two counter-rotating ring topologies for
redundancy.

[Link]
Star Topology
• All devices are connected to a central
connecting device, which is usually a switch.
• Devices send data to the switch, which
forwards it to the appropriate destination
device.
• Popular topology in today’s networks.
• Used in most large and small networks.
• Central device is a single point of failure.

[Link]
Mesh Topology
• Each device is connected to every other
device by separate cabling.
• Highly redundant and fault-tolerance.
• Expensive to install.
• Commonly used in Enterprise Networks &
WANs.
• Two Types:
o Partial Mesh
o Full Mesh

[Link]
Network Topologies Section

Wireless Network Topologies

[Link]
Wireless Network Topologies
• Wireless networks utilize radio frequencies (RF) to communicate.

• Three Specific Topologies:


o Ad hoc
o Infrastructure
o Mesh

[Link]
Ad hoc
• Peer-to-peer (P2P) wireless
network where no wireless
access point (WAP)
infrastructure exits.
• The devices communicate
directly with one another.
• Personal area networks
(PANs) are a common
example of Ad hoc wireless
networks.

[Link]
Infrastructure
• Wireless network that uses a
wireless access point (WAP)
as its central connecting
device.
• Infrastructure wireless
networks (WLANs) are
commonly used in homes and
small offices.

[Link]
Mesh
• Just like a wired mesh design,
wireless mesh networks utilize
several wireless access points
(nodes) to create a robust
wireless network that is:
o Scalable
o Self-Healing
o Reliable (redundancy)
• Common in larger homes and
businesses.

[Link]
Networking Devices Section

Network Interface Cards (NICs)

[Link]
Network Interface Card (NIC)
• The network adapter installed on
your network device.
• Provides the physical and
electrical, light or radio frequency
connections to the network
media.
• It can either be an expansion card,
USB devices or built directly into
the motherboard.

[Link]
Networking Devices Section

Hubs

[Link]
Hubs
• Used to Connect Devices Together Within a
Network
• Used in Early Networks; Replaced by Switches
• “Multi-Port Repeater”
o Traffic goes in one port and is repeated
(broadcasted) out every other port
o OSI Layer 1 Device
o Dumb Network Device
o Causes increased network collision errors
• Much Less Efficient than a Switch
• Legacy Equipment No Longer Used

[Link]
Networking Devices Section

Switches

[Link]
Switches

• Connects Devices Together Just Like a Hub


• Intelligent Network Device (OSI Layer 2)
• Memorizes the MAC Address of Each Device Connected to
It via a MAC Address Table, sometimes called a Content
Addressable Memory (CAM) Table
• Pays attention to Source and Destination MAC addresses
during Communication Process
• Use Application-Specific Integrated Circuitry (ASIC), which
makes them Extremely Fast
• Breaks up Collision Domains
Traffic Goes in One Port and Is Repeated out to Only
Destination Port
Designed for High Bandwidth
Standard in Today’s Network Infrastructure [Link]
Networking Devices Section

Wireless Access Points

[Link]
Wireless Access Point (WAP)
• A wireless access point (WAP) is a bridge that extends the wired network to
the wireless network.
• Just like a switch, it’s a Data Link Layer 2 device.
• Note: A WAP is not a router.

[Link]
Networking Devices Section

Wireless Range Extenders

[Link]
Wireless Ranger Extender
• Extends the range of a wireless network by acting as a wireless repeater.
• Rebroadcasts radio frequencies from the wireless network it is associated
with

[Link]
Networking Devices Section

Routers

[Link]
Routers
• Used to Connect Different
Networks Together
• Routes Traffic Between
Networks using IP Addresses
• Uses Intelligent Decisions
(Routing Protocols) to Find
the Best Way to Get a Packet
of Information from One
Network to Another.
• Break Up Broadcast Domains
• OSI Layer 3 Device
Layer 3 = Router
Layer 2 = Switch
[Link]
Layer 1 = Hub
Networking Devices Section

Modems

[Link]
Modems (Modulators/Demodulators)
• Modems modulate one signal to another, such as analog to digital.
• For example, modulating a telephone analog signal into a digital signal that
a router can understand.

[Link]
Networking Devices Section

All-in-One SOHO Devices

[Link]
Small Office Home Office (SOHO) Device
• All-In-One Wireless Router with Expanded Capabilities:
Router, Wireless Access Point, Firewall, Switch, DHCP Server, NAT Device, File Server,
etc.

[Link]
Networking Devices Section

Media Converters

[Link]
Media Converters
• Like its name implies, it converts one media type to another.
• Layer 1 Device: Performs physical layer signal conversion.
• Ethernet to fiber optic media converters are commonly used.

[Link]
Networking Devices Section

Firewalls

[Link]
Firewalls
• Firewalls are the foundation of a defense-in-depth network security
strategy.
• They protect your network from malicious activity on the Internet.
• Prevent unwanted network traffic on different networks from accessing
your network.
• Firewalls do this by filtering data packets that go through them.
• They can be a standalone network device or software on a computer
system, meaning network-based (hardware) or host-based (software).

[Link]
Types of Firewalls
Packet Filtering Firewalls
• 1st Generation & Most Basic
• Basic Filtering Rules

Circuit-Level Firewalls
• 2nd Generation
• Monitors Valid/Invalid TCP Sessions

Application Layer 7 (NGFW) Firewalls


• 3rd Generation
• Much more Advanced; Covered Later in Course

[Link]
Networking Devices Section

DHCP Servers

[Link]
DHCP Server
• Dynamic Host Configuration Protocol (DHCP) Server
• Automatically Assigns IP Addresses to Hosts
• Makes Administering a Network Much Easier
• An Alternative is Static IP addressing
• We'll Talk More About DHCP Later in the Course

[Link]
Networking Devices Section

VoIP Endpoints

[Link]
Voice over IP (VoIP) Endpoints
• Most phone systems run over IP networks via dedicated protocols, such as
the Session Initiation Protocol (SIP), both in-home and office environments.
• VoIP endpoint devices are hardware devices (phones) or software, such as
Cisco Jabber, that allow you to make phone calls.

[Link]
Network Cabling Section

Types of Network Cabling

[Link]
Types of Network Cabling
• Coaxial
• Twisted Pair
• Fiber Optic

[Link]
Network Cabling Section

Ethernet Standards

[Link]
Ethernet Explained
• Ethernet is a network protocol that controls how data is transmitted over a LAN.
• It’s referred to as the Institute of Electrical and Electronics Engineers (IEEE) 802.3
Standard.
• It supports networks built with coaxial, twisted-pair, and fiber-optic cabling.
• The original Ethernet standard supported 10Mbps speeds, but the latest supports
much faster gigabit speeds.
• Ethernet uses CSMA/CD & CSMA/CA access methodology.

[Link]
Ethernet N<Signaling>-X Naming
• Ethernet uses an “xx Base T” naming convention: 10Base-T
o N: Signaling Rate, i.e., Speed of the cable.
o <Signaling>: Signaling Type: Baseband (Base) communication.
o X: Type of cable (twisted pair or fiber).

[Link]
Twisted Pair Standards
Cat Network Type Ethernet Standard Speed Max. Distance

Cat 3 Ethernet 10Base-T 10Mbps 100 meters

Cat 5 Fast Ethernet 100Base-TX 100Mbps 100 meters

Cat 5e Gigabit Ethernet 1000Base-T 1Gbps 100 meters

Gigabit Ethernet 1000Base-T 1Gbps 100 meters


Cat 6
10 Gigabit Ethernet 10GBase-T 10Gbps 55 meters

Cat 6a 10 Gigabit Ethernet 10GBase-T 10Gbps 100 meters

Cat 7 10 Gigabit Ethernet 10GBase-T 10Gbps 100 meters

Cat: Copper Cabling Standard.

[Link]
Network Cabling Section

Coaxial Cabling

[Link]
Coaxial Cable
• Antiquated technology used in the 1980s. Coaxial cables are rarely used today, except
for cable modem connections.
• Categorized as Radio Grade (RG)
o RG-6: Used for modern cable TV and broadband cable modems.
o RG-8: Used in early 10Base5 “Thick-net” Ethernet networks.
o RG-58: Used in early 10Base2 “Thin-net” Ethernet networks.
o RG-59: Used for closed-circuit TV (CCTV) networks
• Metallic shield helps protect against electromagnetic interference (EMI)

[Link]
Coaxial Cable Connectors

F-Connector BNC Connector


• Tension spring twist-on
• Screw-on connection connection
• RG-6 Cable TV and Broadband • RG-8 “Thick-net” and RG-58 “Thin-
Cable Applications. net” network applications.

[Link]
Network Cabling Section

Twisted Pair Copper Network


Cabling

[Link]
Twisted Pair Copper Cabling
• 4 Twisted Pairs of Wires with RJ-45 Connector
• Balanced pair operation
o + & - Signals
o Equal & Opposite Signal
• Why are they twisted?
o To Help Reduce Interference
• Crosstalk
• Noise (Electromagnetic Interference)
• Security concerns
o Signal Emanations
• 100 Meters Maximum Distance
o Signal Attenuation

[Link]
Shielded vs. Unshielded & EMI
• Unshielded Twisted Pair (UTP)
o More susceptible to electromagnetic
interference (EMI).
• Shielded Twisted Pair (STP)
o Less susceptible to EMI & Crosstalk (if each
pair shielded).
• Electromagnetic Interference
o The disruption of an electronic device's
operation when it's in the vicinity of an
electromagnetic field caused by another
electronic device (manufacturing equipment,
microwave ovens, etc.).

[Link]
Roles of Twists
• Increased twists per inch:
o Reduces Crosstalk
o Increases Signals
o Supports Faster Speeds

[Link]
Twisted Pair Standards
Cat Network Type Ethernet Standard Speed Max. Distance Frequency

Cat 3 Ethernet 10Base-T 10Mbps 100 meters 16 MHz

Cat 5 Fast Ethernet 100Base-TX 100Mbps 100 meters 100 MHz

Cat 5e Gigabit Ethernet 1000Base-T 1Gbps 100 meters 100 MHz

Gigabit Ethernet 1000Base-T 1Gbps 100 meters


Cat 6 250 MHz
10 Gigabit Ethernet 10GBase-T 10Gbps 55 meters

Cat 6a 10 Gigabit Ethernet 10GBase-T 10Gbps 100 meters 500 MHz

Cat 7 10 Gigabit Ethernet 10GBase-T 10Gbps 100 meters 600 MHz

Cat: Copper Cabling Standard.

[Link]
Other Copper Cable Connectors
RJ-11 DB-9
• 4-pin connection used for • 9-pin connection used for serial
telephone connections. connections on networking devices

DB-25
• 25-pin connection previously commonly
used for serial printer connections.

[Link]
Network Cabling Section

Wiring Standards: 568A & 568B


and Cable Types

[Link]
TIA/EIA 568A & 568B Wiring Standards
• Industry-standard that specifies the pin
arrangement for RJ-45 connectors.
• Two Standards:
• 568A & 568B
• 568B is newer and the recommended standard.
• Either can be used.
• Why are standards important?
o Lower Costs
o Increase Interoperability
o Easier Maintenance

[Link]
Straight-Through & Crossover Cables
Straight-Through Cable Crossover Cable
• Connecting “Unlike” Devices • Connecting “Like” Devices
o Computer to Switch o Router to Router
o Switch to Router o Computer to Computer

[Link]
Which Twisted Pairs Are Used?
Ethernet & Fast Ethernet Gigabit & 10 Gigabit Ethernet
Cat 3 and Cat 5 Cat 5e & Faster
Only Green and Orange Pairs Used: All Four Pairs Used:
• Pins 1, 2, 3, and 6 • Supports bi-directional data transmission on
o One Pair to Transmit Data (TX) each pair of wires.
o One Pair to Receive Data (RX)

[Link]
Network Cabling Section

Plenum-Rated Cabling

[Link]
The Plenum
• The plenum is the open space above the ceiling or below a raised floor.
• A “plenum space” is the part of a building that enables air circulation by
providing pathways for heated/air-conditioned and return airflows at a higher
pressure than normal.
• All network cabling placed in the plenum should be “plenum-rated.”

[Link]
Non-Plenum-Rated & Fire Hazard
• Non-plenum cable or polyvinyl chloride (PVC)
cable is often much less expensive than
plenum-rated cable.
• When PVC burns or smolders, it releases
toxic fumes into the air (Hydrochloric Acid
and Dioxin).
• The plenum air return would unknowingly
circulate toxic air throughout an office.
• Sprinkler systems typically can’t access the
plenum area.
• Building codes often require Plenum Rated
cable installed through any plenum space.

[Link]
Plenum-Rated Cables
• Plenum-rated cables have a special insulation that has low smoke,
low flame and non-toxic characteristics.
• Coated with nonflammable materials that minimize toxic fumes:
o Teflon
o Fluorinated ethylene polymer (FEP)
o Low-Smoke PVC

[Link]
Network Cabling Section

Fiber Optic Network Cabling

[Link]
Fiber Optic Cabling
• Glass or plastic fiber that carries light (photons)
o High Bandwidth: Photons travel faster than electrons.
o Long Distances: Less attenuation.
o Immune to Electromagnetic Interference (EMI)
o Doesn’t Emanate Signals
• Two Types
o Multi-mode Fiber (MMF)
• Shorter Distances (LAN / Building-to-Building)
• Up to 2 Kilometers
o Single-mode Fiber (SMF)
• More expensive than multi-mode
• Longer Distances (WAN / Across Town)
• Up to 200 Kilometers

Informational Note: 9-micron Single-Mode Fiber can travel 75 miles at 400 Gbps
[Link]
MMF versus SMF
Multi-Mode Fiber (MMF) Single-Mode Fiber (SMF)
• Many photons of light travel • A single direct photon of light
through the cable at once, and travels through the cable, which
bounce off the walls, which allows greater distances and
reduces the distance and speed. speed.
• Larger Core: 50 to 62.5 microns • Smaller Core: 8 to 10 microns

[Link]
Fiber Optic Cable Connectors
Lucent Connector (LC) Subscriber Connector (SC)
• Small form-factor design that has a flange on • Square connector that uses a push-pull
the top, similar to an RJ-45 connector. connector similar to A/V equipment.
• Commonly used in MMF & SMF gigabit and • Commonly used in MMF & SMF gigabit
10-gigabit Ethernet networks. Ethernet networks.

Straight Tip (ST) Mech. Transfer Register Jack (MTRJ)


• BNC style connector with a half-twist
• Similar to the RJ-45 connector, and houses
bayonet locking mechanism.
two fiber optics cables.
• Was used in MMF networks but not
• Designed for MMF networks.
commonly used anymore.

[Link]
Why use Fiber?
• Fiber cable is more expensive than twisted pair, as is the equipment
• But you can perform much longer network cable runs with fiber.
o 100m versus up to 200 Kilometers
• So you have decreased network equipment costs
o Switches, routers, etc.
• Plus fiber is:
o Immune to EMI and signal emanations
o Has lower signal attenuation
o Making it more reliable and secure
• Costs are steadily decreasing as more people adopt fiber

[Link]
Network Cabling Section

Networking Cable Selection


Criteria

[Link]
Cable Selection Criteria
Cost Constraints
• What is your budget?

Transmission Speed Requirements


• How fast does your network need to be?
• 10Mbps, 100Mbps, 1Gbps, 10Gbps?

Distance Requirements
• Electrical signals degrade relatively quickly (100 meters)
• Fiber can transmit over long distances

Noise & Interference Immunity (Crosstalk, EMI, Security)


• Interference is all around us: power cables, microwaves, mobile phones, motors, etc.
[Link]
Planning a Network Section

Why We Plan

[Link]
Planning a Network
Why do we do it?
• Many small and medium businesses utilize an ad hoc network design with a break-fix
mentality

Ad Hoc Networks with a Break-Fix Mentality can Lead to Issues


• Troubleshooting issues
• Scalability issues
• Reliability issues
• Security issues
• Data loss issues
• Costly repairs

[Link]
Planning a Network
• Business downtime → Decreased Revenues & Profitability, Tarnished Reputation and
Loss of Customers

• Keeps the Process Focused and Organized

• Good Plans Produce the Best Results

• Clients and Employers Expect It

[Link]
Planning a Network Section

The Overall Process

[Link]
The Overall Process

Plan

Tune (Continual
Design
Improvement)

Maintain Implement
[Link]
Planning a Network Section

Understanding the Business

[Link]
Understanding the Business
• You Must Understand the Business to Properly Plan and Design a Network for It
• Business and Regulatory Requirements Drive Technical Needs
• What are the Business's Core and Strategic Competencies?

You Should Perform the Following:


• Business Process Analysis: Understand Business Processes

• Business Impact Analysis: Define Essential Business Processes

• Key Stakeholder Interviews: Analyses Established via Interviews

• Examine Regulatory Requirements: Review all Regulatory Requirements

[Link]
Planning a Network Section

Establishing a Business Need

[Link]
Establishing a Business Need
Ask, How Can IT and a Network Help the Organization?

• Increased Operational Efficiencies via Business Process Improvement

• Decreased IT and Operational Costs

• Increasing Profitability, i.e., the Bottom Line

• Ensure we Meet Regulatory Requirements

• Increased Network Security Posture

Where Is the Positive ROI Coming From?

[Link]
Planning a Network Section

Defining Specific Areas of


Improvement

[Link]
Define Specific Areas of Improvement
Some Areas of Improvement

• Improved Communications and Data Sharing


o Knowledgebase Software or Service
o Interoffice Chat System (Video / Audio)
o Voice Over IP (VoIP) Phones

• Automated Business Processes


o Digitize Antiquated Paper-Based Processes
o Automate Essential Business Processes
o Automate Reporting with On-Demand Dashboards

[Link]
Define Specific Areas of Improvement
Some Areas of Improvement

• Implementation of Business Intelligence Solutions


o Business Objects

• Implementation of a Data Backup System


o Ensure Data is Properly Backed Up and Restorable

• Enhanced Information Security


o Better Protect the Company Against Network and Data Breaches

[Link]
Planning a Network Section

Buy-in and Resources

[Link]
Buy-In & Resources
• Obtain Management / Customer Approval & Buy-In
o Initial Proposal

• Obtain the Necessary Resources


o Funding
o Personnel
o Time

[Link]
Planning a Network Section

Hidden Costs

[Link]
Understand the Hidden Costs
• Planning a Network Involves More than Just
o Designing the physical and logical network
o Planning equipment purchases
o Selecting necessary software

• Networks Change the Way People Work (Process Improvement & Change
Management)
o Resistance to change and instituting change management
o Training costs (end-users and administrators)
o Documentation & ongoing support costs
o Transition planning

It’s more than just designing and building the network

[Link]
Planning a Network Section

Other Considerations

[Link]
Some Considerations
• Assess your needs against available technologies
o What are the latest trends?
o Virtualization
o Cloud Computing

• Pick the solutions that best fit your needs

• Weigh your solutions options against your financial budget

[Link]
More Considerations
Bandwidth Requirements Size and Scalability
• High or Low Bandwidth? • Plan for Further Growth?
• 100Mbps or Gigabit Speeds? • Equipment will Handle Size and Growth?

Security Needs Specialized Software Requirements


• Regulations & Requirements • What are They?
• Encryption?
• Physical & Logical Security?
• Twisted Pair or Fiber Optics?

[Link]
Planning a Network Section

Planning Questions

[Link]
Planning Questions
You should ask questions regarding the following:

• Network Type (Peer-to-Peer or Client-Server)?

• Network Cabling (UTP, STP, Fiber Optic, Wireless)?

• Printer Requirements (Centralized or not)?

• E-mail Requirements (Internal or External)?

• Data Requirements (Centralized)?

• Network Security Requirements (Logical & Physical)?

Whatever you do, stay within your cost constraints!

[Link]
Planning a Network Section

The Next Steps

[Link]
What’s Next

Plan Design

[Link]
The Network Design Process

Transform Plans into Design

Physical Topology Design

Physical Layout

Logical Topology Design


Define Design
Specifications

[Link]

You might also like