Home Contact
Specs Explained
 
     
     
Networking Specs Explained :
 
Up
Your Choices
Budget Options
Specs Explained
Shopping Tips
Glossary

 

Networks are for sharing. Networks allow two or more computers to share files, access, and hardware, as well as services such as printing. Every network, regardless of size or application, has many (if not all) of the items listed below, as well as some specific pieces and parts.

Network Components
This list describes the fundamental and universal parts of a network. Every network with an Internet connection, regardless of the network's size or function, has (or should have) these elements.

bulletCables. Even wireless networks use some cables. Most network devices send their signals over copper cables. Planning for and handling the cable connections can be a problem in installations of every size.

The mystique surrounding cables is partly justified. A single intermittent connection in a cable can spawn troubleshooting efforts leading in many false directions. Always buy cables certified to conform to the Category 5 (known as CAT 5) standards of the EIA/TIA (Electronic Industries Association and Telecommunications Industry Association).

Keep in mind that wireless LAN connections are now quite affordable and can be operational in minutes. Wireless can economically extend and substantially reduce the need for wired cable connections.

 

bulletFirewall security. From the networks in homes to those in large enterprises, any local networks with attachments to the Internet need protection against intrusion. A firewall examines inbound packets of data to make sure the packets are legitimate. The firewall's function can be performed by software running on a desktop PC or router or by a specially designed single-function device.

 
bulletHub/switch. A hub or switch is the device where all of the cables come together. Hubs, which combine network signals on a first-come-first-served basis, were commonly used a few years ago because they cost much less than switches. Switches use on-board processors to pass network traffic without contention. Although more sophisticated than hubs, switches are now quite affordable. Today, you should always buy a switch. In installations with more than eight networked devices, the switch will be a separate device. In very small networks (of up to eight connected devices), the switch might be integrated in the Internet router that links the network to the Internet.

 
bulletInternet router. Whether your Internet connection to an ISP comes over a dedicated leased circuit (as it typically does for businesses with more than a few dozen users), over cable or DSL, or over a dial-up connection, you'll need a router if you want to share the connection. Simply stated, a router distributes the incoming packets of Internet data to the appropriate networked computers and accepts packets from all of the computers on the local network for shipment over the Internet. In businesses with more than a few dozen employees, a router will be a dedicated single-function device--either a special-purpose box or software running on an Intel-based computer. In smaller installations, a router can be software running on a desktop PC or a specially designed box that includes additional hardware such as a switch, a firewall, and even a wireless access point. In the home and small business market, a router is often called a gateway. Whether called routers or gateways, these multipurpose boxes are fine for homes and small offices, but can't meet the data-handling needs of large installations.

 
bulletIP addressing. Any device with Internet access needs a special address that follows the format described by the Internet protocol (IP). Your Internet service provider controls the IP address of the cable modem, DSL modem, dial-up modem, or other device the provider connects to the Internet. (In the case of a dial-up modem, the computer the modem belongs to gets the IP address.) You can control all of the addresses inside your network, but they must conform to the IP addressing rules.

In large corporate networks, IP addressing is a job for experts. The need for network efficiency forces network administrators to consider ways to break the addresses down into subgroups aggregated according to traffic patterns and workgroup affiliation. Additionally, large networks contend with a limited supply of IP addresses.

Those planning smaller networks can choose from among two special blocks of IP addresses set aside for internal use. One block is 10. 0. 0. xxx and the other is 192.168.xxx.xxx (where you decide what numbers to use in the positions marked with an x). A device called a DHCP (Dynamic Host Configuration Protocol) server can assign addresses from these blocks as devices in your home or organization connect to the network. A service called network address translation (NAT), typically provided by your router or gateway, takes the multiple IP addresses within your network and presents an acceptable single IP address to the Internet. NAT offers some protection from Internet intruders because they can see only the single IP address presented to the Internet, but not the IP addresses within your network. Home and small office networks almost always use DHCP and NAT. Note that some devices, such as printers, need an assigned static IP address so that other systems on the network always know where to find these devices. There is no problem with combining dynamically assigned and static IP addresses on the same network.

Most people allow the DHCP function of a router or gateway to assign the IP addresses on the internal network. But IP addressing is a tricky business, and organizations with extended networks should get expert help.

 

bulletNetwork adapter. This device converts between the high-speed signals inside your computer and the slower but more robust signals that go over the cable or, with wireless systems, through the air. You generally need an adapter for each computer you plan on hooking to the network. With the help of special software, you can use a PC's built-in USB connection for networking, but you won't get the performance of a real Ethernet adapter, and you'll never know when interoperability issues will arise. Ethernet adapters are very affordable and easy to install. They install either inside a PC's chassis or, in the case of notebooks, in a PC Card slot. Many notebooks and desktops now come network-ready, meaning they have an Ethernet adapter already built in.

 
bulletNetworking software. Every networked device requires software that identifies the device, relates to other network devices, and packages data for transmission. There are many alternatives, but today we most often use networking software conforming to the TCP/IP protocols. This software ships as a part of all Windows products (since Windows 95 second edition) and all flavors of Unix and Linux.

 
bulletVirus checking. Virus checking examines incoming packets and specific files, such as e-mail attachments, for patterns of data associated with virus activity. On detecting a possible problem, the software can take actions ranging from deleting the questionable data to notifying a network administrator by pager or e-mail. Virus-checking software can run in individual PCs or in a centralized server.

 

Network Elements:
Large corporate networks generally have all of these functions, services, and devices, but these network elements can provide benefits to even a two-node home network.

bulletCentralized backup. Whether you have a dedicated file server or use a desktop PC to hold your data, you need backup. The network can connect any desktop computer or dedicated file server to a shared backup device. A variety of software products will allow you to back up all files, changed files, or specified files to devices such as tape drives, separate storage servers, or even CD/RW drives.

You should also consider the security of your backup. If you use removable media, like tape or CD/RW, then periodically placing backup copies of your most important files in some other location is a good idea.

If you don't want to invest in your own backup hardware, you can use online storage. Storage Service Providers (SSPs) will share their capacity and offer installation, ongoing maintenance, and management of the storage and backup processes.
 

bulletFile server. A file server makes storage available to computers across the network. This system can be a computer that is still used as a desktop workstation or a dedicated device housed in an environmentally controlled data center. A Web server is a special class of file server that delivers the stream of files that make up all of the elements of a Web page, a process which often requires substantial processing. Similarly, a database server or an application server does a considerable amount of processing before retrieving and transmitting the appropriate files.

 
bulletNetwork storage. As the quantity of sound and image files grows and the amount of linked data increases, storage needs rise quickly in networks of all sizes. Two types of network storage systems are answering the demand: Network Attached Storage and Storage Area Networks.

Network attached storage (NAS) devices come alive after you plug in two cables: one for power and one for the network connection. Immediately, all authorized users see another disk drive or storage location. These devices offer high capacity, high reliability, and ease of use.

A Storage area network (SAN) is more complex. A SAN is a single, shared, high-speed storage vault for data used by many file, database, or Web servers. A SAN has direct and very fast connections to the servers and, in addition to high speed, offers high reliability and detailed management of the stored data.

 

bulletPrint server. A print server makes printers available for sharing across a network. A print server can be a PC or a dedicated black box that can host three or four printers on the network.

 
bulletURL filtering. URL and IP address filtering prevents Internet users from gaining access to Internet sites deemed objectionable. Although most companies and home users use filtering for the purpose of blocking pornographic Web sites, you can just as easily block access to entertainment and even news sites. A router, software running on a separate PC, or a special-purpose device can provide URL filtering.

 
bulletVirtual Private Network (VPN). A VPN is a secure encrypted link for data that travels over the Internet. VPN software allows work-at-home and road-warrior employees to access a corporate LAN as if they were on the network. VPNs can also connect branch offices to corporate headquarters in a LAN-to-LAN configuration, but the individual-to-LAN session is the most common use. Each end of the VPN link uses special software to create the encrypted session. At the client end, however, the lack of compatibility among operating systems, VPN software, and applications is a recurring problem. As more people adopt handhelds and other specialized devices, new compatibility issues arise. Interoperability among VPN products from different vendors is also a problem.

At the LAN end, the VPN termination can reside in routers, dedicated VPN devices, or software running on special-function servers. The cost of VPN-equipped routers is dropping, but cost isn't everything. The lower-end devices can only handle a limited number of interactive sessions. (The actual capacity depends a great deal on the amount of traffic generated in each session.) As a rule of thumb, if you have more than a few dozen simultaneous sessions, you need a dedicated VPN device. Several vendors are now offering low-cost routers with VPN services for the small-office market.

Network administrators should also be aware that most VPNs do not allow split tunneling, which lets a client using the VPN access the Internet without having to go through the VPN. As long as the VPN session is active, all client requests for Internet services will go through the VPN tunnel to your network. Your network will provide all Internet access and services for the client. In effect, you will become the ISP for your VPN users. If a telecommuter activates the VPN, checks e-mail and corporate applications, then de-activate the client, there is little impact on traffic. However, if a person working off-site keeps the tunnel active and then engages in Web surfing, there will be a greater impact on the company's Internet traffic.

VPNs are highly desirable because of their security capabilities and convenience to end users, but establishing a VPN involves compatibility testing of every application and operating system employees use. Also, you'll want to find one VPN vendor and stick with it because of interoperability issues, so select the company carefully. Microsoft's introduction of IPsec VPN client software into Windows has helped interoperability, but it's not likely that every client device in your inventory uses Windows. VPNs are important and desirable, but can carry hidden support costs.

 

bulletWireless LAN connections. In a wireless LAN, one or more small devices called access points are connected to the network via standard cables. A laptop or a desktop that has a wireless LAN adapter installed communicates with the network through the access point, over a range of a few hundred feet, without having to be physically wired to the LAN. Wireless LANs are appropriate across the scale from networks in the home to those in large enterprises. Manufacturers have rallied to adopt IEEE 802.11b, a standard for wireless networking. They are also backing an industry certification standard called Wi-Fi, which guarantees that certified products will interoperate. And the cost of wireless LANs is dropping so fast that wireless networking is becoming an economical alternative to wired connections.

Wireless LANs are sometimes used to extend the reach of a wired network beyond the cable so that workers can roam within a building or even to fairly distant corners of, let's say, a campus. On a campus, for example, access points might appear every couple of hundred feet for complete coverage. In a small office, one access point might cover the entire facility. In a home, an Internet router or gateway might include a wireless access point to allow roaming connections and a switch for wired connections.

Don't confuse wireless LANs with mobile wireless Internet services, cellular-like services, or broadband wireless connections from an ISP. Each of these is a separate kind of wireless connection.

 

 


 

Back Next
 

Copyright © 2005, Buy and Click, All rights reserved