Chapter 8 Outline

advertisement
Chapter 8, Designing and Installing a Network
Chapter 8, Lesson 1
Choosing a Network Design
1.
Peer-to-Peer or Server-Based?
A.
B.
C.
D.
E.
2.
Bicycle Company Goals
1.
Network existing computers so that they can share information and
printers.
2.
Add two additional computers to the network: one for the Product
Design Group and one for the Manufacturing Department.
3.
Allow for the possible addition of three computers at a later date.
4.
Provide an Internet connection for the Product Design Group.
Factors to Consider
1.
Network size
2.
Security level
3.
Business type
4.
Level of administrative support available
5.
Amount of network traffic
6.
Needs of users
7.
Network budget
Peer-to-Peer Considerations
1.
All users are equal and have equal access.
2.
No system administrator is designated.
3.
Users determine which information or resources will be shared.
4.
Security precautions are few.
5.
Limited performance.
Server-Based Network Considerations
1.
Resources are centralized and always available.
2.
Scalable; size can be easily adjusted to local changes.
3.
More secure than peer-to-peer.
4.
Segregated as the network grows.
Hybrid Peer-to-Peer Network
1.
One computer installed and configured as a file server.
2.
Access to file server requires an account and permission.
3.
Access to other computers is shared equally.
Taking Inventory
A.
Hardware Survey
1.
Make and model
2.
Processor manufacturer and speed
3.
Amount of memory (RAM) installed
4.
Size and manufacturer of each hard drive
5.
Details of any other installed drives, such as CD and removable drives
B.
C.
D.
3.
Building a Map
A.
B.
4.
Map All Elements of the Network
1.
Physical layout, including the location of each piece of hardware and
how it relates to the others
2.
Physical and logical topology of the proposed network
Map the Facility.
1.
Create a layout of the network topology including printers and other
peripherals, such as scanners and modems.
2.
Map the location of existing equipment.
Choosing Network Media
A.
B.
2
6.
Monitor: Make, model, and size
7.
Video card: Make, model, and amount of memory
8.
Any installed peripherals
9.
Type of bus and number of free NIC slots
Software Survey
1.
Program name.
2.
Program version number.
3.
Original floppy disks or compact discs.
4.
Any licensing information.
5.
Note any software incompatibility within the company.
Telecommunications Equipment Survey
1.
Number of phone lines in each office
2.
Type of telephone system and whether it will support modems
3.
Types of telephone jacks in each office and whether they are capable of
voice and data communications
Requirements of the Network
1.
Size of the facility
2.
Number of users
3.
Whether the LAN will be extended to several buildings
4.
Environment
5.
Current network media
6.
Technical competence of users
7.
Amount of network traffic
8.
Level of security
Network Media Considerations
1.
Choice will usually be related to the geographic requirements of the site.
2.
It is not the cost today, but the cost in the future.
3.
Being overly cost conscious during design can limit the scalability and,
thus, the life span of the network.
Installing Network Media
1.
If the topology is complex, the cable installation is best left to a
professional cable installer.
Outline, Chapter 8
Networking Essentials Plus, Third Edition
2.
C.
Simplest way to lay out a network in a small office environment is to
use a physical star, with the focal point being a patch panel.
3.
Patch panel is an array of RJ-45 female connectors that have terminals
for connecting the wires.
4.
Mounting the patch panel near the hub creates an easier connection to
the network.
5.
CAT 5 outlet is similar to standard telephone outlet, but uses an RJ-45
connection.
6.
Be sure cable meets local construction and fire codes.
7.
Use plenum-grade cable where it is required.
8.
Punch down tool is a small hand tool that will ensure that the wires are
properly connected to the terminal.
Connecting Media to Computers
1.
All connections are made through CAT 5 patch cables.
2.
One end of the cable is secured to the computer’s NIC and the other to
the RJ-45 outlet.
3.
If using a hub, short patch cables connect the patch panel and an outlet
on the hub.
Chapter 8, Lesson 2
Establishing a Client/Server Environment
1.
Centralized vs. Client/Server Computing
A.
B.
Centralized Computing
1.
Early networks were based on the centralized computing model.
2.
Today’s users have the full power of a mainframe computer at their
fingertips, with the added advantage of an interconnected network.
3.
One large server (a mainframe computer) handled all aspects of the
network, while each user accessed the main server from a terminal.
4.
Terminals were typically inexpensive, low performance computers.
5.
In a typical mainframe environment, the terminal sends a request for
information to the mainframe computer; the mainframe retrieves the
information and then displays it on the terminal.
6.
File access takes place through the NOS and the cable.
7.
Data is processed on the mainframe and then delivered to the terminal.
8.
Data transfer between the terminal and the mainframe increases network
traffic and slows down requests from other terminals.
Client/Server Computing
1.
Refers to the process by which data processing chores are shared
between the client computer and the more powerful server computer.
2.
Benefits organizations in which many people need continual access to
large amounts of data.
3.
Client/Server network is the most efficient way to provide:
a.
Database access and management for applications such as
spreadsheets, accounting, communications, and document
management.
Outline, Chapter 8
Networking Essentials Plus, Third Edition
3
b.
c.
2.
Client/Server Model Overview
A.
B.
C.
4
Network management.
Centralized file storage.
The Client/Server Process
1.
Database query example:
a.
Client requests data.
b.
Request is translated into SQL.
c.
SQL request is sent over the network to the server.
d.
Database server carries out a search on the computer where the data
exists.
e.
Requested records are returned to the client.
f.
Data is presented to the user.
2.
Two principle components in client/server environment:
a.
Application also referred to as the “client” or “front end.”
b.
Database server, referred to as the “server” or “back end.”
Client
1.
Client application is responsible for:
a.
Presenting an interface to the user.
b.
Formatting requests for data.
c.
Displaying data it receives from the server.
2.
Using the Front End
a.
Can present the same information to users in different ways.
b.
Each department needs a front end designed to access the common
database for their particular needs.
3.
Front-End Tools
a.
Query tools
b.
User applications
c.
Program development tools
Server
1.
Overview
a.
Usually dedicated to storing and managing data.
b.
Fulfills the requests for the client.
c.
Backend processing includes sorting data, extracting the requested
data, and sending that data back to the server.
d.
Database server software also manages updates, deletions, additions,
and security.
2.
Stored Procedures
a.
Short prewritten data processing routines that help with data
processing details.
b.
Stored on the server and can be used by any number of clients.
c.
Perform some of the processing usually performed by the client.
d.
Reduce network traffic.
Outline, Chapter 8
Networking Essentials Plus, Third Edition
e.
D.
3.
Include security controls to prevent unauthorized users from running
some of the procedures.
3.
Server Hardware
a.
Server computers should have high-speed processor, lots of RAM
and plenty of disk space.
b.
Should use dedicated servers to handle the back-end functions.
Client/Server Architecture
1.
Primary client/server arrangements:
a.
Data can be placed on a single server.
b.
Data can be distributed across several servers.
2.
Two variations of the distributed server arrangement:
a.
Distributed servers over a WAN periodically synchronize their
databases to ensure that they all have the same data.
b.
Data warehouse stores large volume of data and forwards the most
sought-after data to an intermediate system that is able to format the
data into its most requested form; distributes processing across
servers.
Advantages of Working in a Client/Server Environment
A.
B.
C.
D.
E.
F.
G.
Provides relatively inexpensive networks.
Provides mainframe computing capacity while allowing easy
customization for specific applications.
Cuts down on network traffic.
Processing will be distributed more efficiently than in a traditional
mainframe system.
Servers are easier to secure and maintain in one location.
Data is more secure.
Backups are simplified.
Chapter 8, Lesson 3
Working with Device Drivers and NICs
1.
Role of Drivers
A.
B.
Software Device Drivers
1.
Tells the computer how to work with the device so that the device can
perform its job.
2.
Computer’s OS cannot communicate with the device until the driver for
that device has been installed and configured.
3.
As a general rule, manufacturers of components, such as peripherals or
cards that must be physically installed, are responsible for supplying the
drivers for their equipment.
4.
Can also be downloaded from a service such as Microsoft Network
(MSN), CompuServe, or the manufacturer’s Internet site or bulletin
board.
Drivers for nearly every type of computer device and peripheral
including:
Outline, Chapter 8
Networking Essentials Plus, Third Edition
5
1.
2.
3.
4.
5.
2.
Network Environment
A.
B.
C.
3.
Network Device Drivers
1.
Provide communication between a NIC and the network redirector
running in the computer.
2.
Redirector is part of the networking software that accepts input/output
(I/O) requests for remote files and then sends, or redirects, them over the
network to another computer.
3.
Network administrator uses a utility program to install the driver that
copies the diver to the computer’s hard disk.
Drivers and the OSI Model
1.
NIC drivers reside in the MAC sublayer of the data-link layer of the OSI
reference model and are responsible for providing shared access for the
computer’s NIC to the physical layer.
2.
Ensure direct communication between the computer and the NIC, which
then establishes a link between the computer and the network.
Drivers and Networking Software
1.
Common for NIC manufacturer to provide drivers to the networking
software vendor so that the drivers can be included with the NOS.
2.
The operating system’s Hardware Compatibility List (HCL) lists the
drivers they have tested and included with the OS.
Working with Drivers
A.
B.
C.
6
Input devices, such as mouse devices
Hard and floppy disk drives and controllers
Multimedia devices, such as microphones, cameras, and recorders
NICs
Printers, plotters, and tape drives
Installing Drivers
1.
Each NOS has its own method for installing drivers.
2.
Most NOSs use interactive graphical interfaces, or dialog boxes, that
guide the installer through the process.
3.
Windows NT Server features a utility called the Control Panel Network
icon.
Configuring Drivers
1.
NICs usually have configurable options that must be set.
2.
DIP switches or jumpers are used to configure older NIC cards.
3.
Newer NICs are software configurable or Plug-and-Play (PnP) BIOS
compliant.
4.
OS tries to automatically configure PnP BIOS–compliant devices.
5.
Windows NT 4.0 does not support PnP, although it will attempt to
recognize the devices.
Updating Drivers
1.
Manufacturer will write additions or changes to a driver to improve a
component’s performance.
Outline, Chapter 8
Networking Essentials Plus, Third Edition
2.
D.
4.
Manufacturer will send these driver changes by mail, post them on an
Internet bulletin board, or make them available through MSN,
CompuServe, or the manufacturer’s Web site.
3.
Updating drivers is similar to installing them, although it might be
necessary to remove the old driver first.
Removing Drivers
1.
If a piece of equipment is being removed, remove its drivers at the same
time.
2.
Process of removing a driver is similar to installing a driver.
Installing NICs
A.
B.
C.
D.
E.
F.
Type of Expansion Slot
1.
What type of expansion bus does the computer have?
2.
Does the computer have a slot available for the card?
3.
Which type of cable will be connected to it?
Type of Card
1.
NICs are not equal.
2.
Designed for different expansion buses and specified by network type.
3.
Ethernet NIC will not work on a Token Ring system.
Network Speed
1.
NICs run at different speeds.
2.
When designing a network, be sure to keep future networking needs in
mind.
3.
Newer NICs run at multiple speeds, older cards run only at one speed.
Media Connection
1.
Determines whether NIC fits the cabling of the network.
2.
Some cards have selections of BNC or RJ-45; some will have only one
or the other.
Adding Extras
1.
NICs with diagnostic lights built in can be a good investment that will
pay off later.
2.
Purpose of these lights is to indicate the status of the card and network.
Installing a NIC
1.
Read the documentation that comes with the NIC.
2.
Determine which interrupt request numbers (IRQs) and I/O addresses
are available on the computer.
3.
Configure jumpers or switches, if required. If no switches or jumpers
are present, use the installation software to make any changes after the
NIC is installed.
4.
Turn off the computer and unplug the power cord.
5.
Follow the appropriate electrostatic discharge procedures.
6.
Remove the cover of the computer.
7.
Install the card in a free slot.
8.
Test the configuration before replacing the computer’s cover.
9.
Replace the cover.
Outline, Chapter 8
Networking Essentials Plus, Third Edition
7
10.
Install the appropriate software drivers.
Chapter 8, Lesson 4
Ensuring Hardware Compatibility
1.
When Hardware is a Problem
A.
B.
C.
2.
Checking Minimum Requirements
A.
B.
3.
Exceed the minimum requirements for the resources in the computer.
Resources include processor speed, memory, and disk space.
Network Hardware
A.
B.
C.
8
Compatibility Overview
1.
Hardware incompatibilities are a fact of life.
2.
Evaluating and selecting hardware is a major part of planning for
network implementation.
3.
Most common incompatibilities occur between hardware and software.
4.
Upgrading a computer or NOS can lead to major problems.
Reading the Documentation
1.
Read all documentation about the products involved.
2.
Search the manufacturer’s Web site for additional information.
3.
Contact the manufacturer for the product and ask for undocumented
conflicts.
Detection During Installation
1.
Computer will usually attempt to detect the hardware in the system and
load the appropriate drivers.
2.
Check the list of detected hardware and ensure it matches what
hardware is in the machine.
Hardware is not as susceptible as software to conflicts and
compatibility problems.
To increase compatibility, manufacturers adhere to the IEEE 802.X
standards.
Expect incompatibility issues to arise when two devices meet different
standards.
Outline, Chapter 8
Networking Essentials Plus, Third Edition
Download