 |
Networking Specs Explained : |
 |
|
|





 |
Networks are
for sharing. Networks allow two or more computers to share files,
access, and hardware, as well as services such as printing. Every
network, regardless of size or application, has many (if not all) of the
items listed below, as well as some specific pieces and parts.
Network Components
This list describes the fundamental and universal parts of a network.
Every network with an Internet connection, regardless of the network's
size or function, has (or should have) these elements.
 | Cables. Even wireless
networks use some cables. Most network devices send their signals over
copper cables. Planning for and handling the cable connections can be
a problem in installations of every size.
The mystique surrounding cables is partly justified.
A single intermittent connection in a cable can spawn troubleshooting
efforts leading in many false directions. Always buy cables certified
to conform to the Category 5 (known as CAT 5) standards of the EIA/TIA
(Electronic Industries Association and Telecommunications Industry
Association).
Keep in mind that wireless LAN connections are now
quite affordable and can be operational in minutes. Wireless can
economically extend and substantially reduce the need for wired cable
connections.
|
 | Firewall security.
From the networks in homes to those in large enterprises, any local
networks with attachments to the Internet need protection against
intrusion. A firewall examines inbound packets of data to make sure
the packets are legitimate. The firewall's function can be performed
by software running on a desktop PC or router or by a specially
designed single-function device.
|
 | Hub/switch. A hub or
switch is the device where all of the cables come together. Hubs,
which combine network signals on a first-come-first-served basis, were
commonly used a few years ago because they cost much less than
switches. Switches use on-board processors to pass network traffic
without contention. Although more sophisticated than hubs, switches
are now quite affordable. Today, you should always buy a switch. In
installations with more than eight networked devices, the switch will
be a separate device. In very small networks (of up to eight connected
devices), the switch might be integrated in the Internet router that
links the network to the Internet.
|
 | Internet router.
Whether your Internet connection to an ISP comes over a dedicated
leased circuit (as it typically does for businesses with more than a
few dozen users), over cable or DSL, or over a dial-up connection,
you'll need a router if you want to share the connection. Simply
stated, a router distributes the incoming packets of Internet data to
the appropriate networked computers and accepts packets from all of
the computers on the local network for shipment over the Internet. In
businesses with more than a few dozen employees, a router will be a
dedicated single-function device--either a special-purpose box or
software running on an Intel-based computer. In smaller installations,
a router can be software running on a desktop PC or a specially
designed box that includes additional hardware such as a switch, a
firewall, and even a wireless access point. In the home and small
business market, a router is often called a gateway. Whether called
routers or gateways, these multipurpose boxes are fine for homes and
small offices, but can't meet the data-handling needs of large
installations.
|
 | IP addressing. Any
device with Internet access needs a special address that follows the
format described by the Internet protocol (IP). Your Internet service
provider controls the IP address of the cable modem, DSL modem,
dial-up modem, or other device the provider connects to the Internet.
(In the case of a dial-up modem, the computer the modem belongs to
gets the IP address.) You can control all of the addresses inside your
network, but they must conform to the IP addressing rules.
In large corporate networks, IP addressing is a job
for experts. The need for network efficiency forces network
administrators to consider ways to break the addresses down into
subgroups aggregated according to traffic patterns and workgroup
affiliation. Additionally, large networks contend with a limited
supply of IP addresses.
Those planning smaller networks can choose from
among two special blocks of IP addresses set aside for internal use.
One block is 10. 0. 0. xxx and the other is 192.168.xxx.xxx
(where you decide what numbers to use in the positions marked with an
x). A device called a DHCP (Dynamic Host Configuration Protocol)
server can assign addresses from these blocks as devices in your home
or organization connect to the network. A service called network
address translation (NAT), typically provided by your router or
gateway, takes the multiple IP addresses within your network and
presents an acceptable single IP address to the Internet. NAT offers
some protection from Internet intruders because they can see only the
single IP address presented to the Internet, but not the IP addresses
within your network. Home and small office networks almost always use
DHCP and NAT. Note that some devices, such as printers, need an
assigned static IP address so that other systems on the network always
know where to find these devices. There is no problem with combining
dynamically assigned and static IP addresses on the same network.
Most people allow the DHCP function of a router or
gateway to assign the IP addresses on the internal network. But IP
addressing is a tricky business, and organizations with extended
networks should get expert help.
|
 | Network adapter. This
device converts between the high-speed signals inside your computer
and the slower but more robust signals that go over the cable or, with
wireless systems, through the air. You generally need an adapter for
each computer you plan on hooking to the network. With the help of
special software, you can use a PC's built-in USB connection for
networking, but you won't get the performance of a real Ethernet
adapter, and you'll never know when interoperability issues will
arise. Ethernet adapters are very affordable and easy to install. They
install either inside a PC's chassis or, in the case of notebooks, in
a PC Card slot. Many notebooks and desktops now come network-ready,
meaning they have an Ethernet adapter already built in.
|
 | Networking software.
Every networked device requires software that identifies the device,
relates to other network devices, and packages data for transmission.
There are many alternatives, but today we most often use networking
software conforming to the TCP/IP protocols. This software ships as a
part of all Windows products (since Windows 95 second edition) and all
flavors of Unix and Linux.
|
 | Virus checking. Virus
checking examines incoming packets and specific files, such as e-mail
attachments, for patterns of data associated with virus activity. On
detecting a possible problem, the software can take actions ranging
from deleting the questionable data to notifying a network
administrator by pager or e-mail. Virus-checking software can run in
individual PCs or in a centralized server.
|
Network Elements:
Large corporate networks generally have all of these functions,
services, and devices, but these network elements can provide benefits
to even a two-node home network.
 | Centralized backup.
Whether you have a dedicated file server or use a desktop PC to hold
your data, you need backup. The network can connect any desktop
computer or dedicated file server to a shared backup device. A variety
of software products will allow you to back up all files, changed
files, or specified files to devices such as tape drives, separate
storage servers, or even CD/RW drives.
You should also consider the security of your
backup. If you use removable media, like tape or CD/RW, then
periodically placing backup copies of your most important files in
some other location is a good idea.
If you don't want to invest in your own backup
hardware, you can use online storage. Storage Service Providers (SSPs)
will share their capacity and offer installation, ongoing maintenance,
and management of the storage and backup processes.
|
 | File server. A file
server makes storage available to computers across the network. This
system can be a computer that is still used as a desktop workstation
or a dedicated device housed in an environmentally controlled data
center. A Web server is a special class of file server that delivers
the stream of files that make up all of the elements of a Web page, a
process which often requires substantial processing. Similarly, a
database server or an application server does a considerable amount of
processing before retrieving and transmitting the appropriate files.
|
 | Network storage. As
the quantity of sound and image files grows and the amount of linked
data increases, storage needs rise quickly in networks of all sizes.
Two types of network storage systems are answering the demand: Network
Attached Storage and Storage Area Networks.
Network attached storage (NAS) devices come alive
after you plug in two cables: one for power and one for the network
connection. Immediately, all authorized users see another disk drive
or storage location. These devices offer high capacity, high
reliability, and ease of use.
A Storage area network (SAN) is more complex. A SAN
is a single, shared, high-speed storage vault for data used by many
file, database, or Web servers. A SAN has direct and very fast
connections to the servers and, in addition to high speed, offers high
reliability and detailed management of the stored data.
|
 | Print server. A print
server makes printers available for sharing across a network. A print
server can be a PC or a dedicated black box that can host three or
four printers on the network.
|
 | URL filtering. URL and
IP address filtering prevents Internet users from gaining access to
Internet sites deemed objectionable. Although most companies and home
users use filtering for the purpose of blocking pornographic Web
sites, you can just as easily block access to entertainment and even
news sites. A router, software running on a separate PC, or a
special-purpose device can provide URL filtering.
|
 | Virtual Private Network (VPN).
A VPN is a secure encrypted link for data that travels over the
Internet. VPN software allows work-at-home and road-warrior employees
to access a corporate LAN as if they were on the network. VPNs can
also connect branch offices to corporate headquarters in a LAN-to-LAN
configuration, but the individual-to-LAN session is the most common
use. Each end of the VPN link uses special software to create the
encrypted session. At the client end, however, the lack of
compatibility among operating systems, VPN software, and applications
is a recurring problem. As more people adopt handhelds and other
specialized devices, new compatibility issues arise. Interoperability
among VPN products from different vendors is also a problem.
At the LAN end, the VPN termination can reside in
routers, dedicated VPN devices, or software running on
special-function servers. The cost of VPN-equipped routers is
dropping, but cost isn't everything. The lower-end devices can only
handle a limited number of interactive sessions. (The actual capacity
depends a great deal on the amount of traffic generated in each
session.) As a rule of thumb, if you have more than a few dozen
simultaneous sessions, you need a dedicated VPN device. Several
vendors are now offering low-cost routers with VPN services for the
small-office market.
Network administrators should also be aware that
most VPNs do not allow split tunneling, which lets a client
using the VPN access the Internet without having to go through the VPN.
As long as the VPN session is active, all client requests for Internet
services will go through the VPN tunnel to your network. Your network
will provide all Internet access and services for the client. In
effect, you will become the ISP for your VPN users. If a telecommuter
activates the VPN, checks e-mail and corporate applications, then
de-activate the client, there is little impact on traffic. However, if
a person working off-site keeps the tunnel active and then engages in
Web surfing, there will be a greater impact on the company's Internet
traffic.
VPNs are highly desirable because of their security
capabilities and convenience to end users, but establishing a VPN
involves compatibility testing of every application and operating
system employees use. Also, you'll want to find one VPN vendor and
stick with it because of interoperability issues, so select the
company carefully. Microsoft's introduction of IPsec VPN client
software into Windows has helped interoperability, but it's not likely
that every client device in your inventory uses Windows. VPNs are
important and desirable, but can carry hidden support costs.
|
 | Wireless LAN connections.
In a wireless LAN, one or more small devices called access points are
connected to the network via standard cables. A laptop or a desktop
that has a wireless LAN adapter installed communicates with the
network through the access point, over a range of a few hundred feet,
without having to be physically wired to the LAN. Wireless LANs are
appropriate across the scale from networks in the home to those in
large enterprises. Manufacturers have rallied to adopt IEEE 802.11b, a
standard for wireless networking. They are also backing an industry
certification standard called Wi-Fi, which guarantees that
certified products will interoperate. And the cost of wireless LANs is
dropping so fast that wireless networking is becoming an economical
alternative to wired connections.
Wireless LANs are sometimes used to extend the reach
of a wired network beyond the cable so that workers can roam within a
building or even to fairly distant corners of, let's say, a campus. On
a campus, for example, access points might appear every couple of
hundred feet for complete coverage. In a small office, one access
point might cover the entire facility. In a home, an Internet router
or gateway might include a wireless access point to allow roaming
connections and a switch for wired connections.
Don't confuse wireless LANs with mobile wireless
Internet services, cellular-like services, or broadband wireless
connections from an ISP. Each of these is a separate kind of wireless
connection. |
|
|
 |
 |
 |
|
|
|
|