Upload
lawrenciaudife
View
220
Download
0
Embed Size (px)
Citation preview
8/13/2019 Defining Network Infrastructure
1/12
Defining Network Infrastructure
A network can be defined as the grouping of hardware devices and software components which are necessary to connect
devices within the organization, and to connect the organization to other organizations and the Internet.
Typical hardware components utilized in a networking environment are network interface cards, computers,routers, hubs, switches, printers, and cabling and phone lines.
Typical software components utilized in a networking environment are the network services and protocols neededto enable devices to communicate.
Only after the hardware is installed and configured, can operating systems and software be installed into the network
infrastructure. The operating systems which you install on your computers are considered the main software components
within the network infrastructure. This is due to the operating system containing network communication protocols that
enable network communication to occur. The operating system also typically includes applications and services that
implement security for network communication.
Another concept, namely network infrastructure, is also commonly used to refer to the grouping of physical hardware and
logical components which are needed to provide a number of features for the network, including these common features: Connectivity Routing and switching capabilities Network security Access controlThe network or network infrastructure has to exist before a number of servers needed to support applications which are
needed by your users can be deployed into your networking environment:
File and print servers Web and messaging servers Database servers Application serversWhen youplan your network infrastructure, a number of key elements need to be clarified or determined:
Determine which physical hardware components are needed for the network infrastructure which you want toimplement.
Determine the software components needed for the network infrastructure. Determine the following important factors for your hardware and software components:
Specific location of these components How the components are to be installed. How the components are to be configured.
When you implement a network infrastructure, you need to perform a number of activities that can be broadly grouped as
follows:
Determine the hardware and software components needed. Purchase, assemble and install the hardware components. Install and configure the operating systems, applications and all other software.
8/13/2019 Defining Network Infrastructure
2/12
Thephysical infrastructure of the network refers to the physical design of the network together with the hardware
components. The physical design of the network is also called the networkstopology. When you plan the physical
infrastructure of the network, you are usually limited in your hardware component selection by the logical infrastructure of
the network
The logical infrastructure of the networkis made up of all the software components required to enable connectivity between
devices, and to provide network security. The networks logical infrastructure consists of the following: Software products Networking protocols/services.It is therefore the networks logical infrastructure that makes it possible for computers to communicate using the routes
defined in the physical network topology.
The logical components of the network topology define a number of important elements:
Speed of the network. Type of switching that occurs. Media which will be utilized. Type of connections which can be formed.Understanding the OSI Reference Model and TCP/IP Protocol Suite
The International Organization for Standardization (ISO) developed the Open Systems Interconnection (OSI) reference
model for computing. TheOSI modeldefines how hardware and software function to enable communication between
computers. The OSI model is a conceptual framework which can be referenced to better comprehend how devices operate on
the network. It is the most widely used guide for a networking infrastructure. When manufacturers design new products, they
reference the OSI models concepts on the manner in which hardware and software components should function.
The OSI model defines standards for:
How devices communicate between each other. The means used to inform devices when to send data and when not to transmit data. The methods which ensure that devices have a correct data flow rate. The means used to ensure that data is passed to, and received by the intended recipient. How physical transmission media is arranged and connected.The OSI model is made up of seven layers which are presented as a stack. Data which is passed over the network moves
through each layer. Each layer of the OSI model has its own unique functions and protocols. Different protocols operate at
the different layers of the OSI model. The layer of the OSI reference model at which the protocol operates defines itsfunction. Different protocols can operate together at different layers within a protocol stack. When protocols operate
together, they are referred to as aprotocol suite or protocol stack.When protocols support multiple path LAN-to-LAN
communications, they are called routable protocols. The binding order determines the order in which the operating system
runs the protocols.
The seven layers of the OSI reference model, and each layers associated function are listed here:
Physical Layer layer 1: The Physical layer transmits raw bit streams over a physical medium, and deals withestablishing a physical connection between computers to enable communication. The physical layer is hardware
specific; it deals with the actual physical connection between the computer and the network medium. The medium
used is typically a copper cable that utilizes electric currents for signaling. Other media that are becoming popular
are fiber-optic and wireless media. The specifications of the Physical layer include physical layout of the network,
voltage changes and the timing of voltage changes, data rates, maximum transmission distances, and physical
connectors to transmission mediums. The issues normally clarified at the Physical Layer include:
http://www.tech-faq.com/osi-model.htmlhttp://www.tech-faq.com/osi-model.htmlhttp://www.tech-faq.com/osi-model.htmlhttp://www.tech-faq.com/osi-model.html8/13/2019 Defining Network Infrastructure
3/12
Whether data is transmitted synchronously or asynchronously. Whether the analog or digital signaling method is used. Whether baseband or broadband signalling is used.
Data-Link Layer layer 2: The Data-link layer of the OSI model enables the movement of data over a link fromone device to another, by defining the interface between the network medium and the software on the computer.
The Data-link layer maintains the data link between two computers to enable communications. The functions of
the Data-link layer include packet addressing, media access control, formatting of the frame used to encapsulate
data, error notification on the Physical layer, and management of error messaging specific to the delivery of
packets. The Data-link layer is divided into the following two sublayers:
TheLogical Link Control (LLC) sublayerprovides and maintains the logical links used forcommunication between the devices.
TheMedia Access Control (MAC) sublayercontrols the transmission of packets from one networkinterface card (NIC) to another over a shared media channel. A NIC has a unique MAC address, or
physical address. The MAC sublayer handles media access control which essentially prevents data
collisions. The common media access control methods are:
Token Passing; utlized in Token Ring and FDDI networks Carrier Sense Multiple Access/Collision Detection (CSMA/CD); utilized inEthernetnetworks. Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA);utilized in AppleTalk
networks.
Network Layer layer 3: The Network layer provides end-to-end communications between computers that existon different network. One of the main functions performed at the Network layer is routing. Routing enables
packets to be moved between computers which are more than one link from one another. Other functions include
traffic direction to the end destination, addressing, packet switching and packet sequence control, end-to-end error
detection, congestion control, and Network layer flow control and error control.
Transport Layer layer 4: The Transport layer deals with transporting data in a sequential manner, and with nodata loss. The Transport layer divides large messages into smaller data packets so that it can be transmitted to the
destination computer. It also reassembles packets into messages for it to be presented to the Network layer.
Functions of the Transport layer include guaranteed data delivery, name resolution, flow control, and error
detection and recovery. The common Transport protocols utilized at this layer are Transmission Control Protocol
(TCP)and User Datagram Protocol (UDP).
Session Layer layer 5: The Session layer enables communication sessions to be established between processes orapplications running on two different computers. A process is a specific task that is associated with a particular
application. Applications can simultaneously run numerous processes. The Session layer establishes, maintains and
terminates communication sessions between applications. The Session layer utilizes the virtual circuits created by
the Transport layer to establish communication sessions.
Presentation Layer layer 6: The Presentation layer is responsible for translating data between the formats whichthe network requires and the formats which the computer is anticipating. The presentation layer translates the
formats of each computer to a common transfer format which can be interpreted by each computer. Functions
include protocol conversion, data translation, data encryption and decryption, data compression, character set
conversion, and interpretation of graphics commands.
Application Layer layer 7: The Application layer provides the interface between the network protocol and thesoftware running on the computer. It provides the interface for e-mail, Telnet and File Transfer Protocol (FTP)
applications, and files transfers. This is the location where applications interrelate with the network.
Transmission Control Protocol/Internet Protocol (TCP/IP) is a network communication protocol suite that can be utilized as
the communications protocol on private networks. TCP/IP is also the default protocol utilized on the Internet. The majority
of network infrastructures are based on TCP/IP.
As an engineer designing the network infrastructure, you have to provide a TCP/IP design which can provide the following:
http://www.tech-faq.com/csma-cd.htmlhttp://www.tech-faq.com/csma-cd.htmlhttp://www.tech-faq.com/csma-cd.htmlhttp://www.tech-faq.com/ethernet.htmlhttp://www.tech-faq.com/ethernet.htmlhttp://www.tech-faq.com/ethernet.htmlhttp://www.tech-faq.com/installing-and-configuring-tcp-ip.htmlhttp://www.tech-faq.com/installing-and-configuring-tcp-ip.htmlhttp://www.tech-faq.com/installing-and-configuring-tcp-ip.htmlhttp://www.tech-faq.com/udp.htmlhttp://www.tech-faq.com/udp.htmlhttp://www.tech-faq.com/udp.htmlhttp://www.tech-faq.com/ftp.htmlhttp://www.tech-faq.com/ftp.htmlhttp://www.tech-faq.com/ftp.htmlhttp://www.tech-faq.com/ftp.htmlhttp://www.tech-faq.com/udp.htmlhttp://www.tech-faq.com/installing-and-configuring-tcp-ip.htmlhttp://www.tech-faq.com/ethernet.htmlhttp://www.tech-faq.com/csma-cd.html8/13/2019 Defining Network Infrastructure
4/12
Connect devices in the private internal network to the Internet. Enable users to access TCP/IP based resources. Protect confidential company data. Provide application responses in accordance to the requirements of the organization.The TCP/IP protocol suite is a four layer model which corresponds to seven layers of the OSI reference model:
Network Interface layer: The Network Interface layer maps to the Physical Layer (Layer 1) and the Data-link layer(Layer 2) of the OSI reference model. The Network Interfae layers function is to move bits (0s and 1s) over the
network medium.
Internet layer: The Internet layer is associated with the OSI models Network layer. The Internet layer handles thepackaging, addressing, and routing of data. The main protocols of the TCP/IP suite that operate at the Internet
layer are:
Internet Protocol (IP): IP is a connectionless, routable protocol which performs addressing and routingfunctions. IP places data into packets, and removes data from packets.
Internet Control Message Protocol (ICMP): The protocol is responsible for dealing with errorsassociated with undeliverable IP packets, and for indicating network congestion and timeout conditions.
Internet Group Management Protocol (IGMP): The IGMP protocol controls host membership in groupsof devices, called IP multicast groups. The devices in the IP multicast groups receive traffic which is
addressed to a shared multicast IP address. Unicast messages are sent to a host, while a multicast is sent
to each member of an IP multicast group.
Address Resolution Protocol (ARP): The ARP protocol maintains the associations which map IPaddresses to MAC addresses. Because mappings are stored in theARP Cache,when the same IP address
needs to be mapped again to its associated MAC address, the discovery process is not performed again.
Reverse Address Resolution (RARP) resolves MAC addresses to IP addresses.
Transport layer/ Host-to-Host Transport: This layer is associated with the Transport layer of the OSI model. Themain TCP/IP protocols operating at the Host to Host or Transport layer are: Transmission Control Protocol (TCP): TCP offers greater reliability when it comes to transporting data
than what UDP, the other protocol which works at this level provides. With TCP, the application which
sends the data receives acknowledgement or verification that the data was actually received. TCP is
regarded as a connection-orientated protocola connection is established before data is transmitted. A
three-part TCP handshake process is performed to establish a host to host connection. The three-part
TCP handshake process establishes a reliable connection over which to exchange data.
User Datagram Protocol (UDP):UDP does not provide reliable data transport. No acknowledgementsare transmitted. While UDP is faster than TCP, it is less reliable.
Application layer: The Application layer is associated with the Session layer, Presentation layer, and Applicationlayer of the OSI model. Application layer protocols of the TCP/IP protocol suite functions at these layers.
Application layer protocols enable applications to communicate between each other, and also provide access to theservices of the lower layers.
Understanding Networking Services
Running on the physical hardware in the network infrastructure are networking services. Networking services basically
extend the physical network by providing a number of key capabilities, including the following:
Multiprotocol support,networks can run multiple protocol, including: Transmission ControlProtocol/Internet Protocol (TCP/IP) Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) Appletalk
http://www.tech-faq.com/ip.htmlhttp://www.tech-faq.com/ip.htmlhttp://www.tech-faq.com/ip.htmlhttp://www.tech-faq.com/snmp.htmlhttp://www.tech-faq.com/snmp.htmlhttp://www.tech-faq.com/snmp.htmlhttp://www.tech-faq.com/arp.htmlhttp://www.tech-faq.com/arp.htmlhttp://www.tech-faq.com/arp.htmlhttp://www.tech-faq.com/arp-cache.htmlhttp://www.tech-faq.com/arp-cache.htmlhttp://www.tech-faq.com/arp-cache.htmlhttp://www.tech-faq.com/installing-and-configuring-tcp-ip.htmlhttp://www.tech-faq.com/installing-and-configuring-tcp-ip.htmlhttp://www.tech-faq.com/installing-and-configuring-tcp-ip.htmlhttp://www.tech-faq.com/udp.htmlhttp://www.tech-faq.com/udp.htmlhttp://www.tech-faq.com/udp.htmlhttp://www.tech-faq.com/udp.htmlhttp://www.tech-faq.com/installing-and-configuring-tcp-ip.htmlhttp://www.tech-faq.com/arp-cache.htmlhttp://www.tech-faq.com/arp.htmlhttp://www.tech-faq.com/snmp.htmlhttp://www.tech-faq.com/ip.html8/13/2019 Defining Network Infrastructure
5/12
Systems Network Architecture (SNA) Multiprotocol routing among network different network segments: The Routing and Remote Access Service
(RRAS) feature of Windows 2000 and Windows Server 2003 can be used to identify networks with different
topologies and secure segments of the network. The Routing and Remote Access Service can be configured for:
LAN-to-LAN routing
LAN-to-WAN routing Virtual private network (VPN) routing Network Address Translation (NAT)routing Routing features, including IP multicasting, Packet filtering, Demand-dial routing, and DHCP relay
Support for strong network security: Internet Protocol Security (IPSec) and Virtual Private Networks (VPNs) canbe used to provide a number of features. VPNs provide secure and advanced connections through a non-secure
network by providing data privacy. Private data is secure in a public environment. VPN client software is assured
private access in a publicly shared environment. By using analog, ISDN, DSL, cable technology, dial and mobile
IP; VPNs are implemented over extensively shared infrastructures. IPSec protects, secures and authenticates databetween IPSec peer devices by providing per packet data authentication. Data flows between IPSec peers are
confidential and protected. IPSec supports the following:
Unicast IP datagrams High-Level Data-Link Control (HDLC) ATM Point-to-Point Protocol (PPP) Frame Relay serial encapsulation Generic Routing Encapsulation (GRE) IP-in-IP (IPinIP) Encapsulation Layer 3 tunneling protocols.
Enable connectivity between the private internal network and Internet applications:Networking services such asthe RRAS service and Network Address Translation (NAT)service enable users on the private internal network to
connect to the Internet, while at the same time securingresourceslocated on the private network.
NAT translates IP addresses and associated TCP/UDP port numbers on the private network to public IPaddresses which can be routed on the Internet. Through NAT, host computers are able to share a single
publicly registered IP address to access the Internet. NAT also offers a number of security features which
can be used to secure the resources on your private network.
RRAS IP packet filters can be used to restrict incoming or outgoing IP address ranges based oninformation in the IP header. You can configure and combine multiple filters to control network traffic.
You can also map external public IP addresses and ports to private IP addresses and ports so that internal
private resources can be accessed by Internet users. You use a special port to map specific Internet users
to resources within the private network.
The Internet Connection Sharing (ICS) service is basically a simplified implementation of a NetworkAddress Translation (NAT)server. You can use ICS to connect the entire network to the Internet. This is
due to the ICS service providing a translated connectionall computers can access resources on the
Internet. Implementing ICS is though only recommended for those exceptionally small networks.
Microsoft Proxy Server can also be used to provide connectivity between the private internal network,and Internet applications.
http://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.html8/13/2019 Defining Network Infrastructure
6/12
Enable users to remotely access the private network.The service that enables this capability is the Routing andRemote Access Service (RRAS). The different types of remote access are:
Dial-in remote access: Dial-in remote access uses modems and servers running the Routing and RemoteAccess (RRAS) service. To enable communication, dial-in access utilizes the Point-to-Point (PPP)
protocol.
VPN remote access: A VPN provides secure and advanced connections through a non-secure network.With VPN access, encryption is used to create the VPN tunnel between the remote client and the
corporate network. To secure VPN access, Windows Server 2003 provides strong levels of encryption.
Wireless remote access: Wireless networks are defined by the IEEE 802.11 specification. With wirelessnetworks, wireless users connect to the network through connecting to a wireless access point (WAP).
To secure wireless networks and wireless connections, administrators can require all wireless
communications to be authenticated and encrypted. When planning wireless remote access, planning
security for wireless networks should be a high priority factor.
Name resolution capabilities: The Domain Name System (DNS)service or Windows Internet Name Service(WINS)service can be used to resolve host names to IP addresses. Name resolution has to occur whenever the host
name is used to connect to a computer and not the IP addresses. Name resolution has to occur so that the IP
address can be resolved to the hardware address for TCP/IP based communication to occur. The DNS service resolves host names and fully qualified domain names (FQDNs) to IP addresses in
TCP/IP based networks. The DNS server manages a database of host name to IP address mappings. This
is the primary method used for name resolution in Windows Server 2003.
WINS is an enhanced NetBIOS name server (NBNS) which was designed by Microsoft to resolveNetBIOS computer names to IP addresses, and at the same time eliminate the usage ofbroadcastsfor
name resolution. WINS can resolve NetBIOS names for local hosts and remote hosts.
Automatic configuration of IP addressing and other IP parameters: The Dynamic Host Configuration Protocol(DHCP)service simplifies the administration of IP addressing in TCP/IP based networks. One of the primary tasks
of the protocol is to automatically assign IP addresses to DHCP clients. A server running the DHCP service is
called a DHCP server. The DHCP protocol automates the configuration of TCP/IP clients because IP addressing
occurs through the system. IP addresses that are assigned via a DHCP server are regarded as dynamically assigned
IP addresses. The DHCP server assigns IP addresses from a predetermined IP address range(s). The functions of
the DHCP server running the DHCP service are listed here:
Dynamically assign IP addresses to DHCP clients. Assign the following TCP/IP configuration information to DHCP clients:
Subnet mask information Default gateway IP addresses Domain Name System (DNS) IP addresses. Windows Internet Naming Service (WINS)IP addresses.
There are a number of tools and features included with Windows 2000 and Windows Server 2003 that can be used to
manage and monitor the networking services which you deploy within your networking infrastructure.
Network Infrastructure Planning Overview
Planning network infrastructure is a complex task that needs to be performed so that the network infrastructure needed by the
organization can be designed and created. Proper planning is crucial to ensure a highly available network
andhigh performancenetwork that result in reduced costs and enhances business procedures for the organization.
To properly plan your network infrastructure, you have to be knowledgeable on a number of factors, including the following:
Requirements of the organization. Requirements of users.
http://www.tech-faq.com/what-is-dns.htmlhttp://www.tech-faq.com/what-is-dns.htmlhttp://www.tech-faq.com/what-is-dns.htmlhttp://www.tech-faq.com/microsoft-winshttp://www.tech-faq.com/microsoft-winshttp://www.tech-faq.com/microsoft-winshttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/dhcp.htmlhttp://www.tech-faq.com/dhcp.htmlhttp://www.tech-faq.com/dhcp.htmlhttp://www.tech-faq.com/microsoft-winshttp://www.tech-faq.com/microsoft-winshttp://www.tech-faq.com/microsoft-winshttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/microsoft-winshttp://www.tech-faq.com/dhcp.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/microsoft-winshttp://www.tech-faq.com/what-is-dns.html8/13/2019 Defining Network Infrastructure
7/12
8/13/2019 Defining Network Infrastructure
8/12
The Resultant Set of Policy (RSoP) MMC snap-in can be used to determine the effects of applying changes toGroup Policy Objects (GPOs) in Windows 2000 and Windows Server 2003 Active Directory
environments beforeapplying the changes.
The Group Policy Management Console (GPMC) can be used if you want to view configuration information onthe existing GPO settings in Windows 2000 and Windows Server 2003 Active Directory environments.
Determining Network Layer and Transport Layer Protocols
Windows Server 2003 supports the following network layer and transport layer protocol combinations:
Transmission Control Protocol/Internet Protocol (TCP/IP): TCP/IP is a grouping of protocols which provides acollection of networking services. TCP/IP is the main protocol which Windows Server 2003 utilizes for its
network services. The main protocols in the TCP/IP suite are Transmission Control Protocol (TCP)that operates
at the Transport layer, andInternet Protocol (IP)that operates at the Network layer. When communication takes
place through TCP/IP, IP is used at the Network layer, and either TCP or UDP is used at the Transport layer. With
TCP/IP, the TCP component of the protocol suite utilizesport numbers to forward messages to the correct
application process. Port numbers are assigned by the Internet Assigned Numbers Authority (IANA), and they
identify the process to which a particular packet is connected to. Port numbers are found in the packet header.
The main advantages of using TCP/IP are summarized below:
Can be used to establish connections between different types of computers and servers. Includes support for a number of routing protocols. Enables internetworking between organizations. Includes support for name and address resolution services, including Domain Name Service (DNS),
Dynamic Host Configuration Protocol (DHCP), and Windows Internet Name Service (WINS).
Includes support for a number of different Internet standard protocols for Web browsing, file and printservices, and transporting mail.
The disadvantages of TCP/IP are summarized below:
IPX is faster than TCP/IP. TCP/IP is intricate to set up and manage. The overhead of TCP/IP is higher than that of IPX.
Internetwork Packet Exchange (IPX): The Microsoft implementation of Novells IPX/SPX protocol stack isNWLink IPX/SPX. NWLink IPX/SPX is used in Novell NetWare, and is basically IPX for Windows. Windows
Server 2003 includes NWLink IPX/SPX support to enable Windows Server 2003 to communicate with legacy
Novell NetWare servers and clients. NWLink IPX/SPX could become problematic in large networks because it
does not have a central IPX addressing scheme which prevents networks from utilizing the same address numbers.
The main advantages of NWLink IPX/SPX are summarized below:
NWLink IPX/SPX is simple to implement and manage. Connecting to is NetWare servers and clients is a simple process. NWLink IPX/SPX is routableThe disadvantages of NWLink IPX/SPX are summarized below:
Windows Server 2003 only includes limited support for NWLink IPX/SPX. Exchanging data between different organizations via NWLink IPX/SPX is an intricate process. NWLink IPX/SPX does not support standard network management protocols.
http://www.tech-faq.com/installing-and-configuring-tcp-ip.htmlhttp://www.tech-faq.com/installing-and-configuring-tcp-ip.htmlhttp://www.tech-faq.com/installing-and-configuring-tcp-ip.htmlhttp://www.tech-faq.com/ip.htmlhttp://www.tech-faq.com/ip.htmlhttp://www.tech-faq.com/ip.htmlhttp://www.tech-faq.com/dhcp.htmlhttp://www.tech-faq.com/dhcp.htmlhttp://www.tech-faq.com/dhcp.htmlhttp://www.tech-faq.cm/wins.shtmlhttp://www.tech-faq.cm/wins.shtmlhttp://www.tech-faq.cm/wins.shtmlhttp://www.tech-faq.cm/wins.shtmlhttp://www.tech-faq.com/dhcp.htmlhttp://www.tech-faq.com/ip.htmlhttp://www.tech-faq.com/installing-and-configuring-tcp-ip.html8/13/2019 Defining Network Infrastructure
9/12
NetBIOS Extended User Interface (NetBEUI):NetBIOS naming is supported in Windows Server 2003. WindowsServer 2003 does not though support the NetBEUI protocol. NetBEUI is a single protocol that was initially used in
Windows NT 3.1 and Windows for Workgroups operating systems. The protocol provides basic file sharing
services for Windows computers, and is designed for small networks. NetBEUI does not perform well on large
networks. The protocol can also not support internetwork traffic because it cannot route traffic between networks.
NetBEUI cannot address traffic to a computer on a different network
TCP/IP Design Requirements
Before deciding to use a TCP/IP based network design, you first have to determine whether you actually need to utilize
TCP/IP. Whether a TCP/IP based network design is required or not is dictated by the networking services and applications
required within your network infrastructure:
TheActive Directory directory service uses the Lightweight Directory Access Protocol (LDAP) and DomainName System (DNS). These protocols are dependent on TCP/IP.
Domain Name System (DNS) is the primary name resolution method used in Windows Server 2003, and isdependent on TCP/IP being installed.
Web servers usethe File Transfer Protocol (FTP)protocol and HTTP protocol, which are each reliant on TCP/IP. As mentioned earlier, the default protocol on the Internet is TCP/IP. In fact, all Internet protocols are based on
TCP/IP. If you are planning to enable internet connectivity, TCP/IP is a requirement.
BothLine Printer Daemon (LPD) and PrinterRemote (LPR) printers need TCP/IP to be installed. To enable interoperability between UNIX and other operating systems, TCP/IP is used as the common transport
protocol.
In order to implement a TCP/IP network infrastructure, you have to gather a number of design requirements, including the
following:
The existing TCP/IP networks characteristics, if applicable, should include: The number of network segments which currently exist. The IP address range assigned to the organization. The routing protocols being utilized.
The attributes of the data which is to be transmitted over the network segments: The quantity of data transmitted over each network segment. The confidentiality requirements of the data.
The amount of tie which users need to access the network. The desired response times for any applications that access resources in the network. Possible future network expansion expectations.There are a number of additional factors which need to be determined before you can create a routing solution for your
network:
The IP addressing scheme which will be utilized. The IP subnet masks which will be utilized. The Variable Length Subnet Masks (VLSMs) which will be utilized. The Classless Interdomain Routing utilization. The standards for creating TCP/IP filters
http://www.tech-faq.com/ftp.htmlhttp://www.tech-faq.com/ftp.htmlhttp://www.tech-faq.com/ftp.htmlhttp://www.tech-faq.com/ftp.html8/13/2019 Defining Network Infrastructure
10/12
The authentication methods for protecting access to the private network. The encryption algorithms for ensuring data confidentiality.Determining the IP Addressing Scheme
The IP addressing scheme which you use can be based on:
Public IP addresses: Here, the IP addressing scheme consists of only public IP addresses. Private IP addresses: Here, the IP addressing scheme consists of private IP addresses and a small number of public
IP addresses needed to enable Internet connectivity.
If you are only using apublic IP addressing scheme in your network design, then you need to perform the following
activities:
Purchase a range of public IP addresses from an ISP that is approved by the Internet Corporation for AssignedNames and Numbers (ICANN).
The IP address range should have sufficient IP addresses for all interfaces in your network infrastructure design.Devices that connect to the private network need an IP address, and so too does VPN connections.
You need to be certain that network address translation (NAT)is not required. You need to implementfirewallsand router packet filters to secure the resources within your private network from
Internet users.
If you are implementing aprivate IP addressing scheme, then the network design would consist of the following:
Private IP addresses would be assigned to all devices in the private internal network. Public IP addresses would be assigned to all devices connecting to the public network.The selection of the IP address range needed for the organization should be based on the following factors:
Maximum number of IP devices on each subnet
Maximum number of network subnets needed in the network design.If you are using a private IP addressing scheme in your network design, consider the following important points:
For those IP devices that connect the company network to public networks such as the Internet, you need to obtaina range of public IP addresses from the ISP for these devices.
You should only assign public IP addresses to those devices that communicate directly with the Internet. This ismainly due to you paying for each IP address obtained. Devices which directly connect to the Internet are your
network address translation (NAT)servers, Web servers, VPN remote access servers, routers, firewalldevices, and
Internet application servers.
The private IP address range which you choose should have sufficient addresses to support the number of networksubnets in your design, and the number of devices or hosts on each particular network subnet.
You must cater for a network address translation (NAT)implementation. NAT translates IP addresses andassociated TCP/UDP port numbers on the private network to public IP addresses which can be routed on the
Internet. Networks that do not require an implementation of a firewall solution or a proxyserver solutioncan use
NAT to provide basic Internet connectivity. Through NAT, host computers are able to share a single publicly
registered IP address to access the Internet.
IP version 6 (IPv6) was designed to deal with the current shortage of IP addresses with IP version 4 (IPv4). IP version 6
also includes some modifications to TCP/IP.
The primary differences between IPv6 and IPv4 are listed here
Source and destination addresses:IPv4: 128 bits in length; IPv6: 32 bits in length IPSec support: IPv4: Optional; IPv6: Required.
http://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/considerations-in-planning-a-network-infrastructure.htmlhttp://www.tech-faq.com/nat-network-address-translation.html8/13/2019 Defining Network Infrastructure
11/12
Configuration of IP addresses: IPv4: Manually or via DHCP; IPv6: Via Address Autoconfiguration - DHCP is nolonger required, nor is manual configuration.
Packet flow identification for QoS handling in the header: IPv4: No identification of packet flow; IPv6: Packetflow identification for QoS handling exists via the Flow Label field.
Broadcast addresses:IPv4: Broadcast addresses are used to transmit traffic to all nodes on a specific subnet; IPv6:Broadcast addresses are replaced by a link-local scope all-nodes multicast address.
Fragmentation: IPv4: Performed by the sending host and at the routers; IPv6: Performed by the sending host. Reassembly: IPv4: Has to be able to reassemble a 576-byte packet; IPv6: Has to be able to reassemble a 1,500-byte
packet.
ARP Request frames:IPv4: Used by ARP to resolve an IPv4 address to a link-layer address; IPv6: Replaced withNeighbor Solicitation messages.
ICMP Router Discovery: IPv4: Used to determine the IPv4 address of the optimal default gateway; IPv6: Replacedwith ICMPv6 Router Solicitation and Router Advertisement messages.
Internet Group Management Protocol (IGMP): IPv4: Used to manage local subnet group membership; IPv6:Replaced with Multicast Listener Discovery (MLD) messages.
Header checksum: IPv4: Included; IPv6: ExcludedThe advantages of IPv6 are listed below:
Large address space:Because of the larger number of available addresses, it is no longer necessary to use utilizeNetwork Address Translator (NAT)to map a public IP address to multiple private IP addresses.
A new header format which offers less overhead: The new header format of IPv6 is designed to minimize headeroverhead. All optional fields which are needed for routing are moved to extension headers. These extension
headers are located after the IPv6 header. The IPv6 header format is also streamlined so that it is more efficiently
processed at intermediate routers. The number of bits in IPv6 addresses is four times larger than IPv4 addresses.
An efficient hierarchical addressing and routing infrastructure:The IPv6 global addresses are designed to createan efficient routing infrastructure.
Built in support for securityIPSec: A requirement of IPv6 is support for IPSec. IPSec contains the followingcomponents that provide security:
Authentication header (AH): The AH provides data authentication, data integrity and replay protectionfor the IPv6 packet. The only fields in the IPv6 packet that are excluded are those fields that change
when the packet moves over the network.
Encapsulating Security Payload (ESP) header: The ESP header provides data authentication, dataconfidentiality, data integrity, and replay protection for ESP encapsulated payload
Internet Key Exchange (IKE) protocol: The IKE protocol is used to negotiate IPSec security settings. Support for Stateless and stateful address configuration: IPv6 can support a stateful address configuration and a
stateless address configuration. With IPv4, hosts configured to use DHCP have to wait a minute before they can
configure their own IPv4 addresses. Stateless address configuration however enables a host on a link to
automatically configure its own IPv6 address for the link. These addresses are called link-local addresses. A link-
local address is configured automatically, even when no router exists. This allows communication between
neighboring nodes on the same link to occur immediately.
Support for Quality of service (QoS)header fields: There are new fields in the IPv6 header that specify the waytraffic is identified and handled.
Traffic Class field:This field defines traffic that must be prioritized. Flow Label field:This field enables the router to identify packets, and also handle packets that are part of
the identical flow in a special way.
Unlimited extension headers: You can add extension headers after the IPv6 header if you want to extend IPv6 forany new features.
The Neighbor Discovery (ND) protocol for managing nodes on the same link:Neighbor Discovery is a series ofInternet Control Message Protocol for IPv6 (ICMPv6) messages that are used in IPv6 environments to identify the
relationships between neighboring nodes. ND enables hosts to discover routes on the same segment, addresses and
address prefixes. Address Resolution Protocol (ARP), ICMPv4 Router Discovery and ICMPv4 Redirect messages
are replaced with the more efficient multicast and unicast Neighbor Discovery messages.
http://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/nat-network-address-translation.htmlhttp://www.tech-faq.com/qos.htmlhttp://www.tech-faq.com/qos.htmlhttp://www.tech-faq.com/qos.htmlhttp://www.tech-faq.com/arp.htmlhttp://www.tech-faq.com/arp.htmlhttp://www.tech-faq.com/arp.htmlhttp://www.tech-faq.com/arp.htmlhttp://www.tech-faq.com/qos.htmlhttp://www.tech-faq.com/nat-network-address-translation.html8/13/2019 Defining Network Infrastructure
12/12
If you want an IP address to provide all services to the network, then each particular service must have a unique TCP port or
UDP port from that specific IP address. There are a number of well-known portswhich are used by the different services
running on your computers.