NETACAD 17 BUILD A SMALL NETWORK Flashcards
What is the difference between large networks and small networks
Small networks typically have a single WAN connection provided by DSL, cable, or an Ethernet connection.
Large networks require an IT department to maintain, secure, and troubleshoot network devices and to protect organizational data. Managing a small network requires many of the same skills as those required for managing a larger one. Small networks are managed by a local IT technician or by a contracted professional.
Explain the factors that must be considered when selecting network devices.
Cost
The cost of a switch or router is determined by its capacity and features. This includes the number and types of ports available and the backplane speed. Other factors that influence the cost are network management capabilities, embedded security technologies, and optional advanced switching technologies. The expense of cable runs required to connect every device on the network must also be considered. Another key element affecting cost considerations is the amount of redundancy to incorporate into the network.
Speed and Types of Ports/Interfaces
Choosing the number and type of ports on a router or switch is a critical decision. Newer computers have built-in 1 Gbps NICs. Some servers may even have 10 Gbps ports. Although it is more expensive, choosing Layer 2 devices that can accommodate increased speeds allows the network to evolve without replacing central devices.
Expandability
Networking devices are available in fixed and modular physical configurations. Fixed configuration devices have a specific number and type of ports or interfaces and cannot be expanded. Modular devices have expansion slots to add new modules as requirements evolve. Switches are available with additional ports for high-speed uplinks. Routers can be used to connect different types of networks. Care must be taken to select the appropriate modules and interfaces for the specific media.
Operating System Features and Services
Network devices must have operating systems that can support the organizations requirements such as the following:
Layer 3 switching Network Address Translation (NAT) Dynamic Host Configuration Protocol (DHCP) Security Quality of service (QoS) Voice over IP (VoIP)
What devices factor into the IP addressing scheme
End user devices - The number and type of connection (i.e., wired, wireless, remote access)
Servers and peripherals devices (e.g., printers and security cameras)
Intermediary devices including switches and access points
What is the benefit of using a planned IP addressing scheme
makes it easier to identify a type of device and to troubleshoot problems, as for instance, when troubleshooting network traffic issues with a protocol analyzer.
What are some ways of accomplishing redundancy
Redundancy can be accomplished by installing duplicate equipment, but it can also be accomplished by supplying duplicate network links for critical areas, as shown in the figure.
*Small networks typically provide a single exit point toward the internet via one or more default gateways. If the router fails, the entire network loses connectivity to the internet. For this reason, it may be advisable for a small business to pay for a second service provider as backup. Have a second router that is connected to another ISP
Discuss traffic management in a small network
The routers and switches in a small network should be configured to support real-time traffic, such as voice and video, in an appropriate manner relative to other data traffic. In fact, a good network design will implement quality of service (QoS) to classify traffic carefully according to priority during times of congestion,
*Listed from highest priority to lowest
Voice, SMTP, Instant Messaging and FTP
What is required to classify traffic according to priority?
QoS
What are the two forms of software programs or processes that provide access to the network
network applications and application layer services.
Describe network applications
Applications are the software programs used to communicate over the network. Some end-user applications are network-aware, meaning that they implement application layer protocols and are able to communicate directly with the lower layers of the protocol stack. Email clients and web browsers are examples of this type of application.
Describe application layer services
Other programs may need the assistance of application layer services to use network resources like file transfer or network print spooling. Though transparent to an employee, these services are the programs that interface with the network and prepare the data for transfer. Different types of data, whether text, graphics or video, require different network services to ensure that they are properly prepared for processing by the functions occurring at the lower layers of the OSI model.
Each application or network service uses protocols, which define the standards and data formats to be used. Without protocols, the data network would not have a common way to format and direct data.
What are some stipulations for using SSH
Network device - The network device (e.g., router, switch, access point, etc.) must support SSH to provide remote access SSH server services to clients.
Server - The server (e.g., web server, email server, etc.) must support remote access SSH server services to clients.
Describe various network servers and their required related network protocols.
Web Server
Web clients and web servers exchange web traffic using the Hypertext Transfer Protocol (HTTP).
Hypertext Transfer Protocol Secure (HTTPS) is used for secure web communication.
Email Server
Email servers and clients use Simple Mail Transfer Protocol (SMTP) to send emails.
Email clients use Post Office Protocol (POP3) or Internet Message Access Protocol (IMAP) to retrieve email.
Recipients are specified using the user@xyz.xxx format.
FTP Server
File Transfer Protocol (FTP) service allows files to be downloaded and uploaded between a client and FTP server. FTP Secure (FTPS) and Secure FTP (SFTP) are used to secure FTP file exchange.
DHCP Server
Dynamic Host Configuration Protocol (DHCP) is used by clients to acquire an IP configuration (i.e., IP address, subnet mask, default gateway and more) from a DHCP server.
DHCP Server
Dynamic Host Configuration Protocol (DHCP) is used by clients to acquire an IP configuration (i.e., IP address, subnet mask, default gateway and more) from a DHCP server.
What do network protocols define to a network administrator?
Processes on either end of a communication session
Types of messages
Syntax of the messages
Meaning of informational fields
How messages are sent and the expected response
Interaction with the next lower layer
Describe the factors that a small network administrator must consider when supporting real-time applications.
Infrastructure
The network infrastructure must support the real-time applications.
Existing devices and cabling must be tested and validated.
Newer networking products may be required.
VoIP
VoIP devices convert analog telephone signals into digital IP packets.
Typically, VOIP is less expensive than an IP telephony solution, but the quality of communications does not meet the same standards.
Small network voice and video over IP can be solved using Skype and non-enterprise versions of Cisco WebEx.
IP Telephony
An IP phone performs voice-to-IP conversion with the use of a dedicated server for call control and signaling.
Many vendors provide small business IP telephony solutions such as the Cisco Business Edition 4000 Series products.
Real-Time Applications
The network must support quality of service (QoS) mechanisms to minimize latency issues for real-time streaming applications.
Real-Time Transport Protocol (RTP) and Real-Time Transport Control Protocol (RTCP) are two protocols that support this requirement.
What elements are required to scale a network?
Network documentation - Physical and logical topology
Device inventory - List of devices that use or comprise the network
Budget - Itemized IT budget, including fiscal year equipment purchasing budget
Traffic analysis - Protocols, applications, and services and their respective traffic requirements should be documented