Title: System
1System Network Administration
- Chapter 18 Networks
- By Chang-Sheng Chen (20080304)
2Contents of Chapter 18
- 18.1 The Basics
- 18.1.1 The OSI Model
- 18.1.2 Clean Architecture
- 18.1.3 Network Topologies
- 18.1.4 Intermediate Distribution Frame
- 18.1.5 Main Distribution Frame
- 18.1.6 Demarcation Point
- 18.1.7 Documentation
- 18.1.8 Simple Host Routing
- 18.1.9 Use Network Devices
- 18.1.10 Overlay Network
- 18.1.11 Number of Vendors
- 18.1.12 Standard-based Protocols
- 18.1.13 Monitoring
- 18.1.14 Single Administrative Domain
- 18.2 The Icing
- 18.2.1 Leading-Edge vs. Reliability
- 18.2.2 Multiple Administrative Domains
- 18.3 Conclusion
3The Closed Network (????)
- PSTN Public Switched Telephone Network
4The Network Today
5Internet ?Intranet Extranet
- Intranets differ from "Extranets" in that the
former are generally restricted to employees of
the organization while extranets can generally be
accessed by customers, suppliers, or other
approved parties. - The Internet is a worldwide, publicly accessible
series of interconnected computer networks that
transmit data by packet switching using the
standard Internet Protocol (IP). It is a "network
of networks" that consists of millions of smaller
domestic, academic, business, and government
networks, which together carry various
information and services, such as electronic
mail, online chat, file transfer, etc.
6Local-area Networks (LANs)
7802.3 LAN Development Todays LANs
8Wide-area Networks (WANs)
9Metropolitan-Area Network (MANs)
10Storage-Area Networks (SANS)
1118.1.1 OSI Model
12Network Protocols
13Peer-to-Peer Communication
14Devices Function at Layers
1518.1.2 Clean Architecture
- A network architecture should be as simple and
clean to understand as it can be. - It should be possible to briefly describe the
approach used in designing the network and to
draw a few simple pictures to illustrate that
design. - A clean architecture makes debugging network
problem much easier. - You can tell what path traffic should take from
point A to point B. You can tell which links
affect which networks. - Having a clear understanding of traffic flow on
your network puts you in control of it.
16Clean Architecture (cont.)
- A clean architecture encompasses both physical
and logical network topologies and the network
protocols that are used on both host and network
equipments. - It also has a clearly defined growth strategy,
both for adding LAN segments and for connecting
new remote offices.
17Developing a LAN Topology
1818.1.3 Network Topology
- Network topologies change as technologies and
cost structures change. - They also change as companies grow, set up large
remote offices, or buy other companies. - Typical Network Topologies
- Star topology
- Pro it is easy to understand, simple and often
cost-effective to implement. - Con it has an obvious single-point-of-failure
problem. - Extended star topology (multi-star)
- A common variant of the start topology,
consisting of multiple stars, the centers of
which are connected to each other with redundant
high-speed links.
19?????????????
20Network Topology
21Typical Network Topologies (cont.)
- Ring topology (i.e., redundant links)
- Most often used for particular low-level
topologies such as SONET rings. They are often
found in local area and campus networks and are
sometimes useful for WANs. - Any one link or network entity can fail without
affecting connectivity between functioning
members of the ring. - Adding new members to the ring, particularly in a
WAN, can involve reconfiguring connectivity at
multiple sites, however. - There are many other possible network topologies,
as shown in the figures of the previous page.
22Network Topology (cont.)- Logical Network
Topology
- The star, multistar, ring topologies described
previously can appear in either physical or
logical topology. - In the following, we will describe some other
common logical topologies. - Flat topology (bus topology)
- In a flat topology, there are no layer 3 devices
except at the egress point (????). - E.g., all machines reside in the same address
block with the same network number and network
mask. - Location-based topology
- Layer 2 networks are assigned based on physical
location. - Functional group-based topology (e.g., VLAN)
- Each member of a group that works as a functional
unit is connected to the same (flat) network
regardless of location (within reason).
23VLANs and Physical Boundaries
2418.1.4 Intermediate Distribution Frame (IDF)
- An Intermediate Distribution Frame (IDF) is a
fancy name for a wiring closet (???/?). - The distribution system is the set of network
closets and wiring that brings network
connectivity out to the desktops. - The need for IDFs, and how to design them and lay
them out, is not something that has changed
dramatically over time. - The technologies and wiring specifics are what
change with time.
25Extended Star Topology in a Multi-Building Campus
26Intermediate Distribution Frame (cont.)
- New innovations in network hardware require
high-quality copper or fiber wiring to operate at
increase speeds. - If you use the newest, highest-specification
wiring available when you build your cable plant,
it is reasonable to expect it to last for five
years before network technologies outpaces it. - However, if you try to save money by using older,
cheaper, lower-specification wiring, you will
need to go through the expense and disruption of
an upgrade sooner than if you had selected better
cabling. - E.g., Category 3 (10M), Category 5 (fast
ethernet), etc.
27Cabling Standards (1/2) -- Unshielded and
shielded twisted pair cabling standards
- The listed information is from Wikipedia
- Cat 1 Previously used for POTS telephone
communications, ISDN and doorbell wiring
(Currently unrecognized by TIA/EIA). - Cat 2 Previously was frequently used on 4
Mbit/s token ring networks (Currently
unrecognized by TIA/EIA). - Cat 3 Currently defined in TIA/EIA-568-B, used
for data networks using frequencies up to 16 MHz.
Historically popular for 10 Mbit/s Ethernet
networks. - Cat 4 Provided performance of up to 20 MHz, and
was frequently used on 16 Mbit/s token ring
networks (Currently unrecognized by TIA/EIA).
28Unshielded and shielded twisted pair cabling
standards (2/2)
- Cat 5 Provided performance of up to 100 MHz, and
was frequently used on 100 Mbit/s ethernet
networks. May be unsuitable for 1000BASE-T
gigabit ethernet (Currently unrecognized by
TIA/EIA). - Cat 5e Currently defined in TIA/EIA-568-B.
Provides performance of up to 100 MHz, and is
frequently used for both 100 Mbit/s and gigabit
ethernet networks. - Cat 6 Currently defined in TIA/EIA-568-B. It
provides performance of up to 250 MHz, more than
double category 5 and 5e. - Cat 6a Future specification for 10 Gbit/s
applications. - Cat 7 An informal name applied to ISO/IEC 11801
Class F cabling. This standard specifies four
individually-shielded pairs (STP) inside an
overall shield. Designed for transmission at
frequencies up to 600 MHz.
29Intermediate Distribution Frame (cont.)
- There are two ways to make a connection between
two IDFs. - One is to run bundles of cables between IDFs
within a building. - However, if there are large number of IDFs, the
number of links can make this very expensive and
complicated to maintain. - The other is to have a central location (i.e.,
MDF, Main Distribution Frame) and only run
bundles from IDFs to this central location. - Then, to connect any two IDFs, one simply creates
a cross-connect in the MDF.
30Intermediate Distribution Frame (cont.)
- You generally only get a chance to lay out and
allocate space for your IDFs before moving into a
building. - It is difficult and expensive to change at a
later date if you decide that you did the wrong
thing. - You should have one IDF per floor, more if the
floor is large. - You should align those IDFs vertically within the
building (in other words, located in the same
place on each floor, so that they stack on each
other through the building). - Vertical alignment means that cabling between the
IDFs and the MDF is simpler and cheaper to
install and it is easier to add extra cabling
between the IDFs at a later date. - The IDFs should be numbered with the building
number, floor number, and closet number.
31Intermediate Distribution Frame (cont.)
- IDF should be locked and subject to restricted
access. - Wiring closet should also be on protected power.
- IDF closets should have special cooling beyond
what the building air-conditioning can supply. - Network equipment is compact, so you will have
hot-generating devices packed into a small area.
A small IDF closet can get very hot without extra
cooling. - You should also provide remote console access to
all the devices located in the IDFs that support
the functionality.
32Intermediate Distribution Frame (cont.)- Wiring
to the Desktop (1/2)
- It is less expensive to install jacks at
construction time rather than add them one at a
time afterward as needed. - It is reasonable to install one or two more jacks
at every desktop than you think any of your
customer will add later. - Extra wiring to the closet is very expensive and
disruptive to add later. - The same is true when running fiber to the
desktop. - Fiber cable is cheap compared with the cost of
terminating the fiber itself. - Some sites run fiber to the desktop but only
terminate what they actually planning on using
(plus 5 to 10 percent in case of failure).
33Intermediate Distribution Frame (cont.)- Wiring
to the Desktop (2/2)
- Another thing to consider about installing
network jacks is their orientation (??/??). - Jacks are installed in some kind of termination
box or face-plate, which determines which way the
jacks face (e.g., Up, Down, Right, Left). - If the jacks are on the side of the box they can
face up, down, right, or left. - Face right or left (good), Face Up or down (not
good)
3418.1.5 Main Distribution Frame (MDF)
- The Main Distribution Frame (MDF) is what connect
the IDFs together and to the data center. - There should always be plenty of cabling between
the MDF and the IDFs. - It is common for part of the data center to be
the MDF. - In a data center, the MDF is often referred to as
the network row or network racks. - Patch panels in these racks connect to a patch
panel (???) at the top of each rack in the data
center.
35Main Distribution Frame (cont.)
- The MDF must have protected power because it
connects all the server networks that are on
protected power to each other. It also needs
adequate cooling. - It often connects the Internet, WANS, and remote
access customers to the data center. - It connects the IDFs to each other and everything
else. - Typically, there is a single MDF per campus.
- A large campus, or one that is particularly
concerned about redundancy, may have more than
one. - An MDF should have the same level of restrict
access as the data center. - Only the network administrator team should need
access to it.
3618.1.6 Demarcation Point
- A demarcation point(???????) is the boundary
between your organization and a utility company,
such as telephone company or network provider. - It can be a fiber cabinet, a set of punch down
blocks, a board in a rack, a piece of network
hardware or a small plastic box on the wall with
a jack or socket for plugging in a cable. - The telephone company is only responsible for the
wiring up to its demarcation points (demarc). - If you have a fault with a line, you need to be
able to show the service engineer where the
correct demarc is, so that he does not end up
trying to test and fix another operational line. - The main thing to know about your demarcation
points is where they are. - Make sure they are properly labeled.
37Example HiNet ADSL????????????
3818.1.7 Documentation
- Network documentation takes on many forms, the
most fundamental of which is labeling. - Maps of the physical and logical networks should
be part of the network documentation. - The physical network map should show where the
wires go and the end points or ranges of wireless
networks. - If redundancy was part of the physical network
design, it should clearly indicate and document
the physical diverse paths. - The amount and type of connectivity available for
each link should be indicated.
39Documentation (cont.)
- The logical map should show the logical network
topology, with network numbers, names, and
speeds. - It should also show routing protocols and
administrative domains if those vary across the
network. - Both the physical and logical network maps should
reach to the perimeter of the organizations
network and identify its outer boundaries.
40Documentation Logical Diagram
41Documentation (cont.)
- Labeling is the single most important component
of the network documentation. - Clear, consistent labeling on patch panels and
long distance connections is particularly
important. - A patch panel (???)
- should clearly indicate the physical location of
the corresponding patch panel or jacks, and each
of the connections on the patch panel should be
clearly and consistently labeled at both ends.
42Documentation (cont.)
- Long distance connections
- should clearly indicate where the circuit goes,
who to report problems to, and what information
will be required when reporting a problem, such
as the circuit ID and where it terminates. - Network cables are often hard to label.
- One of the most effective is to use a cable tie
with a protruding flat tab, to which standard
sticky labels can be affixed.
43Documentation (cont.)
- less-permanent connections, such as the network
connection for each host connection, should also
be labeled. - You should only attempt to do this level of
labeling if you can maintain it. Or, incorrect
labels are worse than none at all. - The other key location for documentation is
online, as part of the configuration of the
network devices themselves. - Wherever possible, comment fields and device
names should be used to provide documentation for
the network administrators. - Routers (and switches) usually permit a text
comment to be recorded with each interface.
44Server Placement
4518.1.8 Simple Host Routing
- The routing within a site should be simple,
deterministic, predictable, and easy to
understand and diagnose. - Using simple routing techniques on hosts.
- Making routing on hosts simple makes it possible
to have the same configuration on all host
devices and know that they will behave in the
same deterministic way. - Redundancy for such hosts should be taken care of
by the network devices and should be transparent
to the hosts.
46Simple Host Routing (cont.)
- If a host is simple-homed, it should have a
single default route. - it should not listen to any dynamic routing
information. - If a host is multi-homed, it should not route
packets from other sites. - It should only accept packets that are addressed
to it. - It should have a static routing table and not
listen to any dynamic routing information. - Simple host routing makes debugging network
problems easier and more predictable. - There is also a performance problem with
requiring hosts to perform routing.
4718.1.9 Use Network Devices
- The building blocks of any modern networks should
be dedicated network devices, such as routers and
switches, rather than general-purpose hosts that
have been configured to do routing. - They should be designed to perform only tasks
directly related to pushing packets, managing the
traffic and the device itself. - They should not be all-purpose devices that are
configured to handle just network traffic, and
they should most definitely not be devices that
are also trying to perform other tasks or to
perform additional services.
48Networking Devices
4918.1.10 Overlay Networks
- An overlay network is a logical topology that
rides on top of a physical topology. - Examples include VLAN (virtual LAN), Frame Relay,
ATM, etc. - This lets us design simple physical architectures
that can support whatever complexity we require
in the logical overlay, yet maintain simplicity
on the physical layer.
50Overlay Networks (cont.)
- One the WAN level, this could mean that all sites
have a single connection to the ATM or
Frame-Relay cloud. - The Frame-Relay or ATM switches are then
configured to provide virtual connections
(circuits) between them. - Another WAN example is the use of encrypted
tunnels (virtual private network, VPNs) across
the Internet. - On the LAN level, an overlay network usually
means - creating a simple, flat physical topology and
using IEEE 802.1q VLAN protocols to overlay
subnetworks that are needed by the customers.
51Virtual Private Networks (VPNs)
52VPN Scenario Multiple Internet Access Methods
Headquarter
53Benefits of VPNs
54VLANs
VLANs logically segment switched networks based
on an organization's functions, project teams, or
applications as opposed to a physical or
geographical basis.
5518.1.11 Number of vendors
- Using equipment from many vendors can add
unnecessary complexity. - The more vendors whose equipment is on the
network, the more interoperability problems you
are likely to experience. - In addition, there is extra overhead for the
network administrative staff in learning the
configurations and quirks of the diverse
equipment and in tracking software upgrades and
bugs. - Minimize the number of the vendors makes the
network more reliable and easier to maintain.
56Number of vendors (cont.)
- However, exclusive use of a single vendor has its
own problems. - A single vendor cannot possibly make the best
product in every area. - Exclusive use of a vendor also leaves your
protocol interoperability untested, which can
lead to a surprise the first time a new vendor is
introduced. - Somewhere between the extremes is a reasonable
balance. - Some sites find choosing a single vendor for each
protocol layer (e.g., layer1/2/3/7, etc) or each
tier of the network works well.
5718.1.12 Standards-based Protocols
- An organizations network should be built using
standards-based protocols. - Vendor-proprietary protocols lock you into a
single vendor by making it difficult to integrate
equipment from competing vendors. - Being locked into a particular vendor makes it
difficult to negotiate for better prices and
prevent you from adopting another companys
products to take advantage of their improvements. - It also leaves you vulnerable to that vendors
business problems.
5818.1.13 Monitoring
- You dont know how your network is performing or
how reliable it is until you monitor it. - There are two primary types of network
monitoring. - One is real-time availability monitoring (e.g.,
MRTG of routers/switches) and alerting. - The other is gathering data to do trend analysis
to predict future demand or for usage-based
billing purpose.
5918.1.14 Single Administrative Domain
- A single administrative domain
- having a single, closely tied network
administrative team with a single management
structure. - A network should be a single organism that moves
traffic around in a coherent, coordinated
fashion. - It should be governed by a single set of policies
and practices that are implemented consistently
across the entire network. - Properly designing networks, maintaining them,
and debugging problems across multiple
organizations are always difficult.
60Single Administrative Domain (cont.)
- There are security issues associated with not
having a single administrative domain. - When different groups have control over different
parts of the network, they probably will also
have different policies with respect to
connecting other networks to their piece of
network and the security that should surround
those connections. - This results in an unknown level of security for
the network because it is a single entity and
only as secure as the weakest link.
61Single Administrative Domain (cont.)
- Having a single administrative domain does not
exclude the possibility of having regional or
divisional network teams that - all report to the same management structure
- and all are governed by the same set of policies
and practices. - The network will still act as a single organism
if multiple teams work closely together in a
coordinated fashion.
6218.2.1 Leading-Edge vs. Reliability
- Typically, the most important quality people seek
in their networks is reliability. - Older products that have gone through many
firmware and hardware revisions tend to be more
reliable. - The bugs have been shaken out.
- On the other hand, new features and faster
connectivity are often only available in new
products, which may not be field tested.
63Leading-Edge vs. Reliability (cont.)
- There are different ways to manage this risk.
- You might perform your own certification of new
products in a lab before they are put into
product situations and then only slowly deploy
them to establish confidence before beginning a
major installation. - You might have separate customer groups that
differ in the amount of risk they are willing to
accept.
64Leading-Edge vs. Reliability (cont.)
- Some may be willing to accept slightly lower
reliability in exchange for having access to
newer features. - Even then, such equipment should be tested in the
lab first. People who want cutting edge
performance still want reliability. - Sometimes, the customer groups that are willing
to take the risks are in a different SA teams
domain of control. - They may have customer groups with business
requirements that mean they must use some of the
new technologies when they become available. - Let them suffer through the teething problems, if
you can, and take advantage of your chance to let
others work out the bugs for you.
65Leading-Edge vs. Reliability (cont.)
- If you use leading-edge gear, make sure that each
person who is going to be affected by its early
problems knows that he is likely to suffer
outages because the technology is so new. - If you do not do that in advance, your customer
will be unhappy and the reputation of your
network as a whole will be adversely affected. - If a high-level manager approves the risk, make
sure the end-users and their direct managers are
aware of this decision, - so that outages are not blamed on you.
6618.2.2 Multiple Administrative Domains
- For political, practical, or security reasons, it
is sometimes impossible to have a single
administrative domain. - If different organizations manage different parts
of the network and are not governed by the same
set of policies or managed by the same management
chain, the network needs a different model. - The various pieces of the network should have
explicit borders between them, making use of
border routing protocols (e.g., BGP) and security
mechanism (e.g., firewalls) to provide routing
stability and known levels of security in each of
the administrative domains, independent of the
others.
67Multiple Administrative Domains (cont.)
- If you have multiple administrative domains, you
should do it the right way. - The choices and actions of one network
administrative team should be completely
independent of what the other teams are doing and
unable to affect the operations or reliability of
other networks.
68Discussion
- Cutting edge
- Windows Vista ???
- KMS authentication
- Routers vs. firewall
- All-in-one servers (e.g., DNS, mail, web, etc.)
- Wireless LAN
- 802.11n vs. 802.11 abg
- Thin client
- Features Mesh ID, controller
- Backbone (wired, wireless)
69?????????BetaSite??????
70?????????
??10G??
?????
?????
?????
71????????
- ????????????,??????? router
- ? 1G ?? TANet ??????
- ? 2G ?? TWAREN ?? POP
- ? 10G ?? HCIX ? 12 ? 1G ? ISP ??
- ? 1.6G/2.5G ?? TWgate ???
- ? 10G ????3G/10G,??1.25G/10G,??1.5G/10G,??1.25G/10
G,??1.25G/10G,??1.25G/10G,??????1G/1G,TWIX625M/1G,
TPIX625M/1G ,????620M/1G,????500M/1G,????300M/1G,?
???200M/1G,????120M/1G ???????
72????????
- ?????????????? 96 ??? (single-mode)???????(???????
?)? - ???????????????????????????????,???????? router?
73??????????
- ??????? 68 Gbits/sec
- lt 128 Bytes/packet ? 91
- ??????, 90 ?? TCP?UDP unknown (e.g., P2P ??),10
?? well known (e.g., Mail, DNS, HTTP, etc.)? - 70 ??? ISP ??,20 ?????????,10 ??? ISP ???
- Top 200 ??? 40?
- Top 200 ????????,?????????
- NO.1 ????? 1,NO.200 ??? 0.1 ?????
74????????????
- ??? Cisco 7609 ??? 144 port ??? Giga bits
Ethernet - ?? 144 port SM mini GBIC?12 port TX mini GBIX
- ?? port mirror ????
- ?? pass through ????
- ???? router pass ??
- ?? Buffer rs232 out bound control ??
- ????????
- ????????
- ??????
- ?? 7 ? 24 ??????
- ?????? IP ????
- ??????????
- ??????
75???????
?????
?????
2G
2G
Switch 12
Switch 48
PC 2500
76?????????
- ?????????????????
- ???????????????
- ??? TOP200 ??? 90 ??????
- ????????????
- ?? Real IP
- ???????? 2500 ???
- ???????? 250 ???????
- ???? 144 ? 1G
77?????????
- ??????????
- ??????????????
- ?????????
- ?????????
- ?????????????
- ???????????spam?open proxy ??????
- ????????,??????
- ??????? ISP ?????,??????????????,?????????
- ????????????????????,?????????????
- ????????????????,??????
- ???????????????,????
- ???????????????????