Bài giảng Network+ Certification - Chapter 14, Planning the Network

Tài liệu Bài giảng Network+ Certification - Chapter 14, Planning the Network: Chapter 14, Planning the Network |1| Chapter Overview A. Determining Network Needs B. Providing Fault Tolerance C. Collecting Essential Information Chapter 14, Lesson 1 Determining Network Needs 1. Evaluating Business Requirements A. The first step in developing a network plan is to understand the requirements of the organization that will run the network and the needs of the people who will use it. |2| B. Why does the organization want a new network installed? 1. You might be providing a network for a new installation that has no existing equipment. 2. You might be asked to network a group of existing stand-alone computers. 3. The organization might have an existing network that it wants to upgrade to a new or different technology. |3| C. What services does the organization want the network to provide? 1. An organization with an existing network (or a group of computers that it wants to connect to a network) probably has a basic idea of...

pdf12 trang | Chia sẻ: honghanh66 | Lượt xem: 873 | Lượt tải: 0download
Bạn đang xem nội dung tài liệu Bài giảng Network+ Certification - Chapter 14, Planning the Network, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
Chapter 14, Planning the Network |1| Chapter Overview A. Determining Network Needs B. Providing Fault Tolerance C. Collecting Essential Information Chapter 14, Lesson 1 Determining Network Needs 1. Evaluating Business Requirements A. The first step in developing a network plan is to understand the requirements of the organization that will run the network and the needs of the people who will use it. |2| B. Why does the organization want a new network installed? 1. You might be providing a network for a new installation that has no existing equipment. 2. You might be asked to network a group of existing stand-alone computers. 3. The organization might have an existing network that it wants to upgrade to a new or different technology. |3| C. What services does the organization want the network to provide? 1. An organization with an existing network (or a group of computers that it wants to connect to a network) probably has a basic idea of what services it wants the network to provide. a. An organization that wants a new installation might know less about what it needs. 2. At the most basic level, organizations usually want their users to be able to access shared drives and printers and connect to the Internet. a. Sharing drives and printers is a fundamental networking task that almost any network technology can provide. b. Computers must run the Transmission Control Protocol/Internet Protocol (TCP/IP) protocols to access the Internet, and they need a router to connect the network to an Internet service provider (ISP). 3. Users often know what they want in a network but do not understand the technical requirements and implementation issues. a. Some organizations might need to maintain elaborate databases, which require powerful servers with fast processors, a lot of memory, and large hard drives. b. Others might need to work with huge graphic images or full-motion video, which require enormous amounts of network bandwidth and a lot of storage. c. A financial company might want to provide users with real-time data feeds for multiple stock markets around the world, which require large amounts of internal bandwidth and high-speed Internet access. 2 Outline, Chapter 14 Network+ Certification, Second Edition d. You must determine what the organization wants and what it can afford, and then try to find a solution that satisfies both requirements. 4. In addition to talking to the heads of organizations about their network needs, it is a good idea to talk with the people who will use the network. a. Example: the owner of a company might decide that the network needs three laser printers. b. The network users can point out the best locations for the printers and request a printer with an envelope feeder to save the time they spend manually feeding envelopes. 2. Evaluating the Installation Site |4| A. A proper site evaluation helps you to choose 1. What type of network to install 2. What network medium to use 3. How to install the network |5| B. Distances between components 1. Understanding where the various computers and other network components must be located in relation to each other is a crucial part of the site evaluation. 2. Know the maximum distances supported by the protocols you will use. a. On a typical 10Base-T or 100Base-TX Ethernet network, computers can be up to 100 meters away from the hub. (1) A distance of 100 meters is far more than necessary in the average office networking environment. 3. Be sure to consider the actual route that your cables will take, not just the distance between the components. a. Cables must often snake up through a wall, through ceilings, around lighting fixtures, around doorways and other obstacles, and back down through another wall to complete a connection. b. You might need a cable that is much longer than the walking distance from a computer to the hub. c. Note where you might connect computers that are far apart, on different floors, or even in different buildings. (1) You might need to consider a fiber optic networking solution, which can span longer distances and run safely outdoors. 4. Consider the obstacles between the computers that are to be connected to the network. a. If the network will consist of computers that are all in a single room, you might be able to network them with prefabricated cables running loose around the perimeter of the room. b. You must plan an internal cable installation if (1) The network will be large (2) The computers are located in many different rooms (3) The site requires the most professional appearance possible c. Considerations for internal cable installations (1) Use bulk cable, installed into ceilings and walls Outline, Chapter 14 3 Network+ Certification, Second Edition (2) All cables are connected to a central patch panel at one end and to individual wall plates at each computer location. (3) Require additional planning, more equipment, and greater expertise (4) Are more expensive than external installations 5. Determine where to put the back-end components, such as hubs, servers, and routers. a. In all but the smallest installations, it is important to secure back-end equipment physically, such as in a locked room or closet, to protect it from damage. b. Depending on the size of the installation, you might need several locking closets to house servers, hubs, and patch panels. c. Large sites might need a full-fledged data center that (1) Contains all of the back-end components (2) Functions as the cabling nexus for an entire building or campus |6| C. Ergonomics 1. Planning a network includes a. Selecting equipment designs that are suitable for the working environment b. Placing equipment where it will be most useful and cause the least distraction 2. Examples a. Move the department laser printer off a user’s desk and onto a printer stand in a central location b. Purchase computers that can easily be placed on the floor or that fit under or beside desks, rather than on them |7| D. Environmental conditions 1. In addition to the physical locations of the network components, you must also be aware of the physical environment they will run in. 2. Be conscious of the climate conditions at all equipment locations and at all times of day. 3. Most office buildings maintain constant levels of temperature and humidity, but there are other important factors to consider. a. Is the climate during working hours maintained around the clock? (1) Some offices shut off the heat and air conditioning at night, and any computer equipment that is left running in a sealed building could easily overheat on a hot summer night or be affected by the cold in winter. b. Equipment closets where servers and other components are located might not be climate controlled. 4. A data center containing a large number of computers, routers, and other heat-producing devices will probably need an independent climate control system to keep the room cool enough. 5. Make sure a source of clean, consistent electrical power is available. 4 Outline, Chapter 14 Network+ Certification, Second Edition a. A data center might require its own electrical circuits to support a lot of equipment in a single location. b. Consider adding surge protection and a backup power supply for the entire installation, such as uninterruptible power supply (UPS) units, or even a backup generator with a failover switch. 6. Not every network installation is located in a comfortable office building. a. Some networks are exposed to extreme environments, such as outdoors or industrial areas that expose the equipment to abnormal amounts of heat or cold, humidity, dust, electromagnetic interference, or chemical vapors. b. Products that enable computers to operate in extreme conditions include (1) Waterproof keyboards (2) Computers with air filtering systems that keep out dust and other contaminants (3) Networking technologies to suit a variety of conditions, such as fiber optic and wireless media |8| E. Sources of interference 1. For internal cable installations, you must examine the anticipated cable locations and routes for possible obstructions and sources of interference. 2. Copper-based cables are highly susceptible to electromagnetic fields caused by fluorescent light fixtures, electric motors, and other types of electrical equipment. a. Even seemingly benign equipment such as television sets, radios, and electric heaters can affect network performance. b. Electromagnetic interference might cause error messages or other network problems. 3. Use cable routes that avoid sources of interference. a. If proper routes are not available, you might have to use cable with additional shielding, or even fiber optic cable, which is not affected by electromagnetic interference. 4. Be aware of the local fire and building codes for cabling. a. You might need to purchase cables with a special plenum-rated sheath to run them through the building’s ventilation spaces (which are called plenums). |9| 3. Selecting Hardware A. After you have determined the organization’s networking needs and evaluated the site, you can start to design the network and select the products needed to construct it. B. Computers 1. For a new network installation, you might be responsible for selecting the computers themselves. a. Select models that can fully support the networking tasks expected of them. Outline, Chapter 14 5 Network+ Certification, Second Edition 2. If you will be networking existing computers, consider their age and whether you need to upgrade them by adding memory or disk space. a. It does not make sense to install a state-of-the-art, high-speed network to connect old 486 computers. b. Depending on the users’ needs and the budget, you might have to settle for a more modest network or purchase new computers. C. Hardware compatibility 1. Compatibility is crucial when you use existing equipment, either an existing network or a group of stand-alone computers. 2. Many of the hardware purchasing decisions you make are based on the protocols you choose to run, especially at the data-link layer. 3. Most Ethernet products work well together, even when they are made by different manufacturers. a. Be sure that the products you select all support the same type of Ethernet. b. Example: when expanding an existing network, you might want to (1) Purchase dual-speed network interface cards (NICs) for the new computers and use Fast Ethernet (2) Leave the 10-Mbps NICs in the existing computers and upgrade them from regular Ethernet later c. In the preceding example, you must also purchase a dual-speed hub because, although a Fast Ethernet hub can support the new computers at 100 Mbps, it cannot support the old computers at 10 Mbps. (1) You cannot connect a 10-Mbps hub to a 100-Mbps hub, so the old and the new computers cannot communicate with each other. (2) A dual-speed hub with ports that can support either Fast Ethernet or regular Ethernet lets you connect all of the computers to one network. 4. Network interface adapters a. Make sure that you purchase NICs that use the appropriate bus type for the computers and the correct connector for your network medium. b. Make sure that network adapter drivers are available for your operating system. 5. When using a particular grade of cable (such as Category 5), be sure that all of the cabling components that carry network signals—including connectors, wall plates, patch panels, and patch cables—are of the same grade. 6 Outline, Chapter 14 Network+ Certification, Second Edition Chapter 14, Lesson 2 Providing Fault Tolerance |10| 1. What Is Fault Tolerance? A. Depending on the organization, an equipment failure or other service interruption can mean lost productivity, lost revenue, and, in some cases, even lost lives. B. Fault-tolerance mechanisms enable a computer or a network to continue operating despite the failure of a major compoment. 1. When network functions are absolutely critical, such as in hospitals or airport control towers, the fault-tolerance mechanisms can be incredibly elaborate. 2. In most cases, however, fault-tolerance mechanisms protect only a few key components from outages due to hardware or software faults. 2. Data Availability A. Many organizations must have their data available at all times. B. If a drive on a server fails, you can probably restore the data from a backup, but the time lost replacing the drive and restoring the data can mean lost productivity. C. Some of the hardware technologies used to provide greater data availability are mirroring, duplexing, volumes, disk striping, RAID, network attached storage (NAS), and Storage Area Networks (SANs). |11| 1. Mirroring a. An arrangement in which two identical hard drives connected to a single host adapter always contain identical data (1) The two drives appear to users as one logical drive. (2) Whenever users save data to the mirror set, the computer writes it to both drives simultaneously. (3) If one hard drive unit fails, the other takes over immediately until the malfunctioning drive is replaced. b. Many operating systems, including Windows 2000, Microsoft Windows NT, and Novell NetWare, support disk mirroring. c. Two main drawbacks of this technique: (1) The server provides only half of its available disk space to users. (2) Although mirroring protects against a drive failure, a failure of the host adapter or the computer can still render the data unavailable. |12| 2. Duplexing a. Disk duplexing provides a higher degree of data availability than mirroring because it uses duplicate host adapters as well as disk drives. b. Identical disk drives on separate host adapters maintain exact copies of the same data, creating a single logical drive, just as in disk mirroring. Outline, Chapter 14 7 Network+ Certification, Second Edition c. Allows the server to survive either a disk failure or a host adapter failure and still make its data available to users |13| 3. Volumes a. A volume is a fixed amount of data storage space on a hard drive or other storage device. (1) On a typical computer, the hard drive may be broken up into multiple volumes to separate data into discrete storage units. (2) Example: if you have drive C and drive D on your computer, these two letters can refer to two different hard drives or to two volumes on a single drive. b. Network servers function in the same way, but with greater flexibility. You can create (1) Multiple volumes on a single drive (2) A single volume out of multiple drives (called drive spanning) c. Drive spanning makes all of the storage space on multiple drives in a server appear as a single entity. d. Drive spanning has a drawback: if one of the hard drives containing part of the volume fails, the whole volume is lost. |14| 4. Disk striping a. A method in which you create a single volume by combining the storage on two or more drives and writing data alternately to each one b. When you use disk striping, the computer splits each file into multiple segments and writes alternate segments to each disk. (1) Normally, a spanned volume stores whole files on each disk. c. Advantage of striped volumes (1) Speeds up data access by enabling one drive to read a segment while the other drive’s heads are moving to the next segment (2) Servers often process dozens of file access requests at once (from various users), so disk striping can improve speed significantly. d. Disadvantages of striped volumes (1) Striped volumes are subject to the same problems as spanned volumes. (2) If one drive in the stripe set fails, the entire volume is lost. |15| 5. Redundant array of independent disks (RAID) a. A comprehensive data availability technology with various levels that provide all of the functions of mirroring, duplexing, volumes, and disk striping. b. Higher RAID levels store error correction information along with the data. (1) Even if a drive in a RAID array fails, its data still remains available from the other drives. c. Although RAID is available as a software product that works with standard disk drives, many high-end servers use dedicated RAID drive arrays, which (1) Consist of multiple hard drive units in a single housing 8 Outline, Chapter 14 Network+ Certification, Second Edition (2) Often have hot swap capability (a) Hot swapping is the ability to remove and replace a malfunctioning drive without shutting off the other drives in the array. (b) In hot swapping, the data remains continuously available to network users, even when the support staff is repairing a drive. |19| 6. Network attached storage (NAS) a. Uses a dedicated storage appliance that connects directly to the network and contains its own embedded operating system b. Essentially a multiplatform file server c. Computers on the network can access the NAS appliance in a variety of ways. |20| 7. Storage Area Networks (SANs) a. A SAN is a separate network installed at a local area network (LAN) site that connects servers to disk arrays and other network storage devices. b. This makes it possible to use dedicated storage hardware arrays without overloading the client network with storage-related traffic. c. SANs typically use the Fibre Channel protocol to communicate, but they can theoretically use any network medium and protocol. D. None of these data availability techniques are intended to replace regular backups using a device such as a tape drive. 3. Server Availability A. Technologies similar to specialized data availability techniques can make servers more reliable. 1. Some servers take the concept of hot swapping to the next level by providing redundant components that you can remove and replace without shutting down the entire computer. a. Examples: fan assemblies and various types of drives B. The ultimate solution for server fault tolerance is to have more than one server. C. Various server duplication technologies enable multiple computers to operate as one, so that if one server fails, another immediately takes its place. |21| 1. Novell NetWare SFT III a. One of the first commercially successful server duplication technologies b. NetWare SFT III is a version of NetWare that consists of two copies of the network operating system, plus a proprietary hardware connection that links the two separate server computers. (1) The servers run an application that synchronizes their activities. (2) When a user saves data to one server volume, the data is written to both servers at the same time. Outline, Chapter 14 9 Network+ Certification, Second Edition (3) If one of the servers should malfunction for any reason, the other server instantly takes its place. c. SFT III is designed solely to provide fault tolerance, but the next generation of this technology, clustering, does more. |23| 2. Clustering a. A technique for interconnecting multiple computers to form a unified computing resource and provide fault tolerance b. A cluster can also (1) Distribute the processing load for specific tasks among the various computers (2) Balance the processing load by allocating client requests to different computers in turn c. To increase the cluster’s speed and efficiency, you can connect another computer to the group. (1) The new computer adds its capabilities to those of the others. d. Both Microsoft and Novell support clustering. (1) Microsoft Windows 2000 Advanced Server and Microsoft Windows NT 4.0 Enterprise Edition (2) Novell NetWare Cluster Services for NetWare 5.1 4. Network Redundancy A. Service interruptions on a network are not always the result of a computer or drive failure; sometimes the network itself is to blame. B. Many larger internetworks include redundant components that allow traffic to reach a destination in more than one way. 1. If a network cable is cut or broken, or if a router or switch fails, redundant equipment enables data to take another path to its destination. 2. Typically, you have at least two routers or switches connected to each network, so that the computers can use either one as a gateway to the other segments. |25| a. For example, you can build an internetwork with two backbones, as shown on Slide 25. (1) Each workstation can use either of the routers on its local segment as a gateway. (2) You can also use this arrangement to balance the traffic on the two backbones by configuring half of the computers on each LAN to use one of the routers as their default gateway and the other half to use the other router. Chapter 14, Lesson 3 Collecting Essential Information |26| 1. Standardizing Workstation Configurations A. Many network administrators create a great deal of additional work for themselves by letting the configuration of the network evolve on its own. 10 Outline, Chapter 14 Network+ Certification, Second Edition 1. Allowing users to install and configure their own software might make them happy at first, but when something goes wrong later on, the network administrator is responsible for fixing the problem. 2. If the administrator does not know anything about the configuration of the user’s workstation, the job is much harder. B. Creating a standard workstation configuration for all users simplifies the troubleshooting process, because all of the computers are functionally the same. C. A workstation configuration can include any or all of the following elements: 1. Which applications are installed 2. Where the applications are installed 3. Where the users will store data files 4. Drive letter mappings for shared network drives 5. Local drive sharing parameters 6. Printer connections D. The ideal situation when deploying new network workstations is to make them completely identical, with one exception: 1. Parameters such as computer names and Internet Protocol (IP) addresses must be unique. E. Many administrators use a disk imaging program to build new workstations. F. Disk imaging creates bit-for-bit copies of a drive’s contents and makes it possible to create identically configured computers. 1. If several users have different requirements, you might need to create several different workstation configurations. G. With standard configurations, when a problem arises because of a hardware failure or user error, you can easily correct it. 1. In the worst-case scenario, you can completely restore the computer to its base configuration. 2. Selecting TCP/IP Parameters A. Configuring TCP/IP clients is a problematic aspect of building a new network because you cannot create an identical configuration for every workstation. 1. Every computer on the network must have a unique IP address. 2. Other parameters, such as the default gateway, can vary depending on the computer’s location. |27| B. The primary task in developing a TCP/IP configuration for your network is to select IP addresses. 1. The IP addresses you assign to your computers depend on many factors, including the following: a. How many computers are there? b. How many network segments are there? c. Will you connect the network to the Internet? d. If so, how will you connect the network to the Internet? Outline, Chapter 14 11 Network+ Certification, Second Edition e. Will your new computers interact with existing computers? 2. In most cases, it is a good idea to use private, unregistered network addresses for your computers, such as those discussed in Lesson 2 of Chapter 8, “TCP/IP Fundamentals.” a. When the network is connected to the Internet, use these addresses to protect the computers from unauthorized access. b. To use private addresses on an Internet-connected network, you must provide a way for users to access Internet services, such as network address translation (NAT) or a proxy server. c. If you want to use registered IP addresses (to make your computers visible from the Internet), you must obtain a range of addresses from your ISP. |28| C. Additional TCP/IP configuration issues 1. What routers should your workstations use as their default gateways? 2. Which Domain Name System (DNS) servers should the workstations use? 3. Should you run Windows Internet Name Service (WINS)? D. After you have determined what parameters you will assign to each workstation, you must create individual address assignments for each computer and choose a method for keeping track of them. 1. You will probably add more computers to the network someday, and you will need to know then which addresses are available. 2. The most convenient method for assigning and tracking TCP/IP configuration parameters is to use DHCP. 3. Even if you want to assign a specific address to each computer permanently, DHCP is an excellent tool for keeping track of the assignments and determining which computer is using which address. |29| 3. Creating Accounts A. Other important elements of network configuration that you should plan are the computer names, user account names, and administrative accounts and passwords. B. Assigning computer names 1. The best way to assign computer names and account names is to develop a formula and stick to it. a. Example: you can create computer names that use codes to represent the subnet the computer is located on or the physical location of the computer in the building. (1) Example: the name 3FLRNW9 might represent computer number nine in the northwest corner of the building’s third floor. b. Do not assign computer names based on the names of their users. (1) You do not want to change the name of the computer whenever someone new uses it. C. Assigning user account names 12 Outline, Chapter 14 Network+ Certification, Second Edition 1. For user account names, combining the user’s initials and several letters of the first and last name is appropriate. a. Example: using the first initial and the first five letters of the surname makes David Jaffe’s user name DJAFFE. b. In smaller companies, you might want to use the first name and last initial, as in DAVIDJ, but that can cause conflicts when, for example, David Jaffe and David Johnson work in the same department. D. You must also set a policy for the administrative accounts for your network and their passwords. 1. Depending on the network operating system you intend to use and the network configuration, you might need to create individual administrative accounts on many different computers (or possibly all of them). 2. Use the same password for these administrative accounts so that you are not locked out while you look up one of many passwords. E. In addition to creating individual user accounts, you must also decide which groups or organizational units you want to create to administer the accounts most efficiently. F. If you will use a hierarchical directory service, such as the Microsoft Active Directory service or Novell Directory Services (NDS), planning the directory tree is a complex undertaking. |30| Chapter Summary A. Determining network needs 1. Consult with both management and staff to determine what network services are required when you are planning a network installation. 2. Evaluate the site where the network is to be located to determine what type of network to install, what network medium to use, and how to install the network. 3. Check distances between network components, environmental conditions, local building codes, and possible sources of structural and electromagnetic interference. 4. Select network hardware carefully to ensure that all products are compatible. |31| B. Providing fault tolerance 1. Networks use a variety of data storage techniques to increase the efficiency and fault tolerance of the network storage subsystem. 2. Creating redundant paths through the network enables communications to continue, even if a cable breaks or a router fails. C. Collecting essential information 1. Creating standard workstation configurations simplifies the process of supporting the computers later. 2. Before installing the network, you must decide what IP addresses you will use and how you will assign them. 3. The best way to assign computer names and user account names is to develop a formula and use it consistently.

Các file đính kèm theo tài liệu này:

  • pdfch14_195.pdf