Title: INTRODUCTION TO NETWORK INFRASTRUCTURE ADMINISTRATION
1INTRODUCTION TO NETWORK INFRASTRUCTURE
ADMINISTRATION
2CHAPTER INTRODUCTION
- Describe the network infrastructure design
process - Understand the security ramifications of network
design decisions - List the tasks involved in maintaining a network
infrastructure - Select the appropriate data-link and
network/transport layer protocols for a given
environment - Plan locations for workstations, peripherals,
cables, connectivity devices, and servers on your
network
3NETWORK INFRASTRUCTURE DESIGN OVERVIEW
- Select the hardware and software components that
will make up the network infrastructure - Determine the specific location for each
component - Specify how each component will be installed and
configured
4NETWORK DESIGN COMPONENTS
- Physical Infrastructure
- Logical Infrastructure
5PHYSICAL INFRASTRUCTURE
- Topology
- Cabling
- Network Devices (routers, hubs, switches)
6LOGICAL INFRASTRUCTURE
- Software elements including
- Network communication Protocols
- Security protocols
- Network routing protocols
7DETERMINING NETWORK REQUIREMENTS
- Evaluating user requirements
- Designing security
8IMPLEMENTING A NETWORK INFRASTRUCTURE
- Installation of physical components
- Deployment of server operating systems
- Configuration of services
9NETWORK INFRASTRUCTURE SECURITY OVERVIEW
- Estimating security risks
- Specifying security requirements
- Selecting security features
- Implementing security policies
- Designing security deployments
- Specifying security management policies
10DETERMINING SECURITY REQUIREMENTS
- Determine responsibilities for designing,
implementing, and maintaining the security
policies. - Assign responsibilities to technical and
management staff. - Consider economic issues and the effect of
security policies on employee productivity and
morale.
11MAPPING OUT A SECURITY LIFECYCLE
- Designing a security infrastructure
- Implementing security features
- Ongoing security management
12NETWORK INFRASTRUCTURE MAINTENANCE OVERVIEW
- Deploying Software Updates
- Monitoring Network Performance
- Troubleshooting Network Problems
13SELECTING PROTOCOLS
- What is a protocol?
- This slide asks the question What is a
protocol? Although students should have this
knowledge, they may not be able to fully explain
what a protocol does. The standard student answer
to this question is that a protocol allows two
devices on a network to communicate. While this
is true, protocols actually dictate - The way in which data is formatted for transport
across the network - The method by which computers exchange messages
- Recovery methods for incomplete transmissions or
corrupted messages
14UNDERSTANDING THE OSI REFERENCE MODEL
15SELECTING DATA-LINK LAYER PROTOCOLS
- The Data-Link layer protocol defines
- Physical layer implementation
- Media access method
- Speed of the network
16SELECTING A MEDIA TYPE
- Unshielded Twisted Pair
- Fiber Optic
- Wireless Networking
17CHOOSING AN ETHERNET VARIANT
- Standard Ethernet10Mbps
- UTP
- Fast Ethernet100Mbps
- UTP, Fiber Optic
- Gigabit Ethernet1000Mbps
- UTP, Fiber Optic
18USING TOKEN RING
- Has maximum speed of 16Mbps
- Uses token passing media access control mechanism
- Uses connectivity devices called multistation
access units (MAU)
19MIXING MEDIA
- Means routers and switches can accommodate more
than one media type. - Allows higher speed media like fiber optic to be
implemented on high demand network segments such
as backbones. - Enables the most appropriate media to be used for
a specific purpose.
20SELECTING NETWORK/TRANSPORT LAYER PROTOCOLS
- Transmission Control Protocol/Internet Protocol
(TCP/IP) - Internetwork Packet Exchange (IPX)
- NetBIOS Extended User Interface (NetBEUI)
21USING TCP/IP
- Protocol used on the Internet
- Almost universal support
- Complex addressing
22USING IPX
- Proprietary technology
- Routable
- Implemented as NWLink on Windows networks
23USING NETBEUI
- Designed for small networks
- Not routable
- Proprietary
24LOCATING PHYSICAL RESOURCES
- Workstations
- Peripherals
- Cables
- Connectivity devices
- Servers
25DETERMINING LOCATION CRITERIA
- Access for users
- Access for technical staff
- Security of devices and data
- Environmental considerations (noise, heat, etc.)
26LOCATING WORKSTATIONS
- Where are users located?
- What kind of computers do they use?
27LOCATING PERIPHERALS
28LOCATING CABLES
- Internal Inside walls, ceiling spaces, risers.
- External Along walls or door frames.
29LOCATING CONNECTIVITY DEVICES
- Hubs, Switches, Patch Panels, Routers
- Network constraints
- Security
- Noise
30LOCATING SERVERS
- Proximity to users
- Security
- Controlled environment
31CHAPTER SUMMARY
- A network infrastructure is a set of components
that provide connectivity, security, management,
access, and other integral features on a network.
- Maintaining a network infrastructure includes
deploying software updates, monitoring network
performance, and troubleshooting problems. - Selecting a data-link layer protocol is primarily
a matter of choosing an appropriate network
medium and transmission speed.
32CHAPTER SUMMARY (CONT.)
- TCP/IP is the industry standard protocol suite at
the network and transport layers. Windows Server
2003 also supports NWLink IPX/SPX compatible
transport and NetBEUI. - Determining the appropriate location for network
components is a critical part of the network
infrastructure planning process.