Thursday, November 26, 2009

Lesson 4

Okay, so a bit late but I have been having a hectic week - I thought that I would sneak this in at work! Don't bust me!

So in this lesson we looked again at the planning of a site: (inside of the OSI model covering, Network, Datalink and Physical)
  • Where to put the backbone (if there is a central lift shaft this is good!)
  • Where to put the IT department (in the middle somewhere to reduce the length of cable between the workstations and the server)
  • Decide on what medium to use for the backbone (we looked at fibre or STP dependending on the budget and how fancy you want to be)
  • Decide on a topology (per floor or department in the building)
  • Remember that the backbone needs to be terminated at each end!
  • Decide on the minimum data speed 100/1000
    • Once a decision is made on the backbone speed, everything else should be in line with this decission - of course the last section connecting to the workstations would be fine with 100 megs
  • Decide on redundancy
    • Server with a mirroring server
    • Server connected to a switch which distributes to switches on each floor
    • Switches on each floor could be connected in duplicate to the switch at the server
The switch configurations are between:
  • 8, 16, 32, 64, 128 ports - decide on what is necessary, this would depend on the number of employees with an idea of possible growth and upgradeability.
    • WAP - wireless access point is another switch which you could use
Remember that the software controlling the network now would be the Domain Controller (we would be using Microsoft Active Directory)
With the redundancey and the mirrioring of the servers you have two options:
  1. Intrasite - means that both servers are on site so both domain controllers are mirrored on site
  2. Intersite - means that there is off-site replication (domain controller on-site replicates with a DC off site to cover you in the event of fire and floods etc)
The intrasite replicates every 8 minutes, and intersite can be setup as per your requirements (best to do this at like 3 in the morning when the network is quiet. It all depends on the clients needs and the type of business.
'
Load balancing - this is when the domain controllers can replicate in both directions to share the resource when the network is under pressure (help each other out)

With the domain controllers there are two types that we looked at this weekend and they are:
  1. Post 2000 - this has no hierarchy and both would be equal, thus the the DC can be primary or back-up
  2. Pre 2000 - (NT server) here there was hierarchy and the DC would be primary or back-up, this was PDC or BDC (primary domain controller or back-up domain controller)
We then looked at the term collision domains, if you look at the building that we designed, each floor would be a collision domain from its switch on the floor. By doing this you minimise the collision domain thus ensureing a beter flow of data.

We looke at the Firewall - this could be the server - a Proxy server can be chosen to aid in the firewall - this is created in the domain controller server. The proxy stores the sites in cache and retains the handshakes up until the time you shut down your machine (like the proxy when it does this on your behalf!). The Proxy is the DMZ (demilitarised zone) on the domain controller. - this is a bit confusing, do some more research and draw your own pictures!
The area between the proxy adn the domain controller is called this DMZ. Proxy's can be set up to filter sites visited like porn etc (must filter Facebook!!!) The Proxy can also filter ports like a port associated with the Internet is port 80.

in the Network layer (MESH) and there are routers involved when you have a WAN remember, as soon as you have more than one network card it becomes a router!

A router changes a public IP address into a private IP address ( it translates like MODEM this can also be a gateway)

We then looked at the transmission methods:
Baseband and Broadband - baseband uses all the available bandwidth and broadband uses only sections of the bandwidth.
Bandwidth can be used as:
  • Unicast - like a two way radio (simplex)
  • Broadcast - like SABC (this goes to everyone - switch or hub using 802.3)
  • Multicast - like M-net - only broadcast to certain specific groups
Further definitions below:
  • Unicast - Unicast transmission is a method where data is transferred fro a specific source address to a specific detsination address
  • Broadcast - is a method in which data goes from a source node to all other nodes on a network.
  • Multicast - is a transmission method in which data is sent from a server to specific nodes that have been defined as members of a multicast group.
Access methods:
Communication method categories include transmission, media access and signalling.

Media Access methods
 Only 1 node can transmit at a time, the media access method determines whether or not a particular node can place data on the network a any given time. Ther are two categories: contention based or competitive media access. The nodes negotiate themselves for media access time with deteministic medai access a centralised device or system contriols when and for how long they can transmit.

Multiplexed Media Access
Multiplexing is a controlled media access whcih a central device combines the signals from multiple nodes and transmits the joined signal across the medium.
Signals can be multiplexed by using either TDM (time division multiplexing) or FDM ( frequency division multiplexing) the central device that the rely on is called a MUX (multiplexer) - at the other end a DEMUX or demultiplexer separates the signal again.
  • TDM - divides the signal into discrete time slots
  • FDM - data is sent over different frequencise or channels (put together again on the other side)
Polling
(token ring environment)
Polling is s acontrolled media access method where a central device contacts each node to see if it has data to transmit, each node has guaranteed access but time is wasted polling nodes that have nothing to transmit.

Demand Priority
This is a polling technique  where the nodes signal their state - either ready to transmit or idle not ready to an intellegent hub. The hub favours high pripority transmission requests.

Now for an important bit of revision! NBNBNB

CSMA/CD adn CSMA/CA - carrier sense multiple access with dollison detection or collision avoidance!

CSMA/CD - this is a contention based media access method, they must detect and manage the inevitable collisons that occur on the network when mulitple nodes transmit at the same time. They detect a collision and then re-transmit at a later time, these times are set at random amounts to avoid further collisions.
  1. A node has to transmit
  2. The node determines if the media is available
  3. If it is it transmits the data
  4. The node determines if a collision has occurred by detecting the fragmented data that results from the collision
  5. If a collision has occurred, the node waits for the random "back-off" period which is in milliseconds and the repeats from 1 above.
CSMA/CO - this is also a contention based media access method used by 802.5 and 802.11 LAN's. In this setup the nodes can transmit whenever they have data to send, they do however takes some steps beforehand to ensure that the media is unused adn that they can send without collision.
  1. A node has data to transmit
  2. The node checks to see if the media is available
  3. If it is available it transmits a "jam" signal, which lets the other nodes aware that it intends to send (advertises)
  4. The node waits until all the other nodes should have had time to recieve the jam signal
  5. The node transmits its data
  6. While it is busy transmitting it monitors the media for a jam signal from other nodes on the network, if it recieves a jam signal from another node, it stops transmitting adn retries after a random delay.
Contention Domains
This is also known as a collision domain - this is where a groiup of nodes compete with each other for access to the media. So, by deviding your network in various / many contention / collision domains will reduce the possibility of collisions.



Each time that you have a DC you have a domain, each time that you have a switch you have a collision domain - think of the building we planned!
A collision / contention domain is the SAME thing.

The last topic is SIGNALING METHODS:
Analogue Signals
Analogue signals form a contiuous wave
Digital Signals
Unlike the analaogue signal wave which can have multiple values depending on the amplitude the digital wave only has two values, ones and zeros (on or off)




Terms:

  • Amplitude: - the height or depth of a wave from its midpoint to the top or the bottom.


  • Cycle: - One complete oscillation


  • Frequency: - The number of complete cycles per second (measured in hertz)


  • Phase: - Where the cycle begins in relation to a fixed point, so if two waves start at the same time - they are in phase - think of electricity and a video camera showing lines on a tv


  • Wavelength: - The distance between the successive peaks in a waveform

That's all for now - expect the next post next week!

Sunday, November 15, 2009

Lesson 3

With this lesson we continue with Topology - but, we start to look at the LOGICAL topology now. Remember that Physical was the tangible side of things, thus the Logical is the flow of data - we cannot see this! :)

  • Logical Bus Topology
In the logical bus topology the signal sent is received by all the nodes at the same time, so one signal is broadcast and all the nodes receive the signal. - this is 802.3 CSMA/CD
  • Logical Ring Topology


In the logical ring topology, the signal is sent around the Ring like a dog chasing it's tail - it always travels in a clockwise direction. (a token continually travels around the ring looking for information to pick up from the network card and transport it to the required destination)
  • Logical Star Topology


This is a topology which is implemented less frequently than a Ring or bus. In the star, the nodes are connected to a central device and are all on the same bus cable. The central device continually polls the nodes to determine if the need to send information. This can be more complex and a MUX (multiplexer) can be used - this will split up different sections of the network and send only to the section that requires it.


  • MSAU / MAU - multi-station access unit
In this situation, the logical ring topology has a MAU whereby the signal travels in the ring inside the unit and then sends the signal down the last section of cable once it has established its location.
When you have two different standards, namely 802.3 and 802.5 in a situation where you have a MAU, for the two topologies to be able to connect, you would require some sort of "gateway" which translates the one standard into the other so that they may communicate - this is also a good way to safeguard your network (security).
In Lesson 3 we had a look at what we would need to consider should be be designing the architecture of a network in a building, in the points following we will list the necessary steps or things to consider.
  • How many floors is the building? Always try to put your server room in the centre of the building to reduce cable pulls.
  • Where is the lift shaft? Usually in the middle of the building - this shaft provides you with a good spot to run your cables from floor to floor - cables need to be shielded in this environment.
  • decide on a topology for the network per floor
  • decide on a minimum network speed - then ensure that your back-bone which runs up and down the lift shaft is of maximum speed.
  • a patch panel (there would more than like be one for the telephone system) will be required on each floor to distribute that cables to each topology on each floor, this patch panel will hold the switch and the switch is connected to the server via the back-bone.
  • The switches on each floor could also be MAU devices.
  • Server room should be off the ground level if possible - water issues
  • Your back-bone through the lift shaft must be terminated on each end.
  • where the back-bone connects to the server, you need to focus on the failure points here, you could have a switch or multiple switches between the back-bone and the server or servers to lessen the chances of failure due to cable breaks.
  • Server mirroring will also reduce the effects of failure, redundancy is important!
  • Network Categories
LAN
Local area network - this is a self-contained network which covers a defined small area such as an office. Can be connected directly via cable or via wireless technologies
WAN
Wide area network - this is a network which spans a large and multiple geographic locations (much like a national or international company) it would connect multiple LANs.
Now this gets interesting as a WAN is the basis of the Internet as when a a device has more than one connection it becomes a Router. Thus each LAN is connected via the WAN which includes TELECOMS.
A WAN will always use a MESH topology. SO you can see how the Internet is a giant WAN connecting all the computers around the globe, A Mesh has at least 4 connections per workstation.
Lastly there are some other Networks listed below:
  • MAN - metropolitan area network, imagine the city's network
  • CAN - Campus area network, imagine the network that UCT might have
  • PAN - Personal area network, this connects 2 or 3 workstations together, imagine the network you might have at home or in a small office.
  • WPAN - wireless personal area network, this is a small network much like the PAN but uses wireless technology rather the a wired/cabled network.
That's all for now - next update after lesson 4.

Lesson 2

So, I was unable to make it to this class so there might be one or two things missing or extra as I tried to fill in the blanks.

Lesson 2 primarily focuses on the topology of a network, this can be split up into:
  • Physical topology (architecture)
  • Logical topology
The physical topology is how the network actually looks, how is has been laid out with cables etc.

The logical topology is the route that the data follows - this is what you can't see!

The physical topologies that we look at are:
  • The Physical Bus topology
This is where nodes are arranged in a linear fashion - one after the other, each node is directly connected to the network cable (backbone) with a T-connector and then by a BNC connector directly to the node. Think of peer-peer. These types of networks are not very reliable as if there is a break in the cable, the entire network goes down, they are also typically slow and difficult to troubleshoot. The backbone must have terminators on each end so that when information is broadcast, it knows where to end! (can't use UTP in bus)
  • Physical Star Topology
This type of architecture uses a central device from which all nodes branch off or connect. A device such as a HUB or Switch. When using a hub, the signal is broadcast to all, when using a switch there is some intelligence as the switch has record of where the nodes are situated on the physical topology. Thus it will be a bit faster.
  • Physical Ring Topology
This is a layout whereby each node is connected to its nearest node and the signal travels like a dog chasing it's tail. Each node then amplifies the signal to the next node. The signal always travels in a clockwise direction around the ring. The nodes will have network cards with an "in' and "out" point which determines the upstream and downstream node. Failure of a node could potentially bring down the entire network.
  • Physical Mesh Topology
This is when each nodes is connected to each and every other node

In this mesh topology, each node has 4 network cards in it, the mesh is very difficult to fail as it always has a redundancy to the entire network. In the Physical Mesh, the data will always follow OSPF - open, shortest path first! NB!!!

  • Hybrid Topology
This is exactly as it says - it is a hybrid between two or more topologies.

The acronyms that we need to know and some other points to remember:

  • T.T.L. - time to live (the amount of time given to a signal, its life)
  • UTP - unshielded twist pair (cable) - Connects to a RJ45
  • STP - shielded twisted pair (cable) - connects to a RJ45
  • Coax - cable with a core and a protective sheath (like television cable)
  • Fibre - shielded cable with a glass core
  • CSMA/CD - carrier sense multiple access with collision detection (802.3) Ethernet
  • CSMA/CA - carrier sense multiple access with collision avoidance (802.5)
  • UTP - cannot be used in a bus topology
  • In the exam, we will need to know and be able to draw the types of topologies!
  • Below is some cable information:


Saturday, October 31, 2009

Network + : Damelin College Mowbray

So, I am studying the N+ course through Damelin and have decided to use my blog as a medium to summarise lessons that I and my classmates can use as a reference to help with studying! I hope that my fellow classmates make use of it and also find it useful - all feedback will be appreciated!

Lesson 1

The OSI model (Open System Inter-connect): this is a 7 layered model which covers all the aspects in the environment of computing, the steps are as follows:

  1. Physical Layer - Media, signal and binary transmission (can also be the hub or repeater)
  2. Data Link - Physical addressing (The switch would fit in here)
  3. Network - Path determination and logical addressing (the router would fit in here)
  4. Transport - end to end connections and reliability
  5. Session - Interhost communication
  6. Presentation - data representation and encryption
  7. Application - network process to application

1 - 3 are physical (hardware) and 4 - 7 are logical (software, services)

The OSI model would work in order of sent i.e. the sending device would send in order of 1 to 7 and the receiving device would receive as 7 to 1.

Here is some terminology that we learnt and need to know:

  • Networks - To communicate and share resources which could be files, printers and email
  • Network components -
  1. Device - any hardware
  2. Media - connects devices to the network and carries the data between
  3. Network adapter - hardware that translates the data between network and device
  4. Network operating system - (NOS) - software that controls traffic and resources
  5. Protocol - set of rules for communications

Servers

Server is a network computer which shares resources with and responds to requests from other network computers.

Clients

Also known as a node or peer, this is a network computer which utilises the resources of other network computers. This client computer has its own processor, memory and storage.

Peers

Self sufficient computer which acts as both a server and client to similar computers on its network.

They have decentralised security and will have a DOS running (like XP) and not a NOS (Server 2003/8)

Host Computers

A powerful centralised computer system such as a mainframe computer that performs data storage and processing on behalf of clients.

TCP/IP

TCP/IP is routable (routers can and need to be used and not switches) The router recognises, for leaving the network to get to the www.

Terminals

Terminals have a chip on the network card which is called a PROM (Programmable Read Only Memory) It is a specialised network device on a host-based network that transmits the data entered by the user to to the host for processing and then displays the result ( like a bank teller) - these terminals are often called "dumb".

Authentication

This is network security measures to gain access to the network resources

  • Username and passwords - usernames are usually public info and are often available, the password is secret and should be protected at all costs.

Network Directory Services

A network Directory is a a centralised hierarchical database which stores and organises data about network users and resources - we will be using MS Active Directory (all control is here)

Some important notes to remember:

  • DOS, like XP is Disc operating system
  • NOS, like server 2003 is Network operating system
  • Persons have permissions and resources have rights
  • SMTP - simple mail transfer protocol
  • TCP/IP - transmission control protocol / Internet protocol
  • 802.3 - ethernet
  • 802.5 - token, ring environment
  • 802.11 - Wireless
  • Server client - provides better security and is centralised
  • Peer to Peer - less security and is decentralised
  • HUB or Repeater - broadcasts to everyone on the network
  • Switch - has some intelligence and will remember the MAC address of computers in its network
  • Router - uses TCP/IP and not MAC

There are two types of servers:

  1. Member servers - provide resources such as databases (SQL, sequel server)
  2. Domain Controller - Authenticates users, contains the directory services (Active Directory) which contains all users, rights and permissions

Servers need to provide:

  • ACCESS
  • FAULT TOLERANCE
  • SECURITY
  • HIGH AVAILABILITY

Friday, October 23, 2009

18 holes at Westlake

So, the morning was a bit early but this meant that the skies were still and there was no wind! Yes, I mean it..... No wind, this is of course very strange for Cape Town in October but we have been blessed with some wicked awesome weather.

We had a good round with a two ball but were joined buy a pair of old geese for the front nine after a toasted bacon and cheese. As golf goes, there were some good shots, some great shots and then of course the majority of shots that we pretend never really happened.

I think that after playing at Westlake on a day like today, I will most certainly be considering membership there!

So, I guess another couple of months before I get to play again!


Wednesday, October 21, 2009

So, the outlaws arrive:


Tomorrow! Well they won't be arriving, I will be collecting as their faithful 330D has got the flu - flu of the gearbox of some sort!


You can see the photo attached - please know that this is only after my game of golf is insulted really badly!
We have got a round of golf planned for Friday morning - this will be a huge change for me from my gardening leave!
Anyway, I have spent the day cleaning the car to collect them in, sorted out the entrance hall table which seems to be the dumping ground of the masses and of course made some space in the spare room closet. This closet is traditionally my dumping ground for anything that I don't need right now, but might require in 2019 or so.
My wife will be happy to see some structure and reminiscence of a walk in closet.
So will be collecting Pops and Nessa at about 12H30 Zulu at Arabella! Watch out as I pin it down the N2!
Wow, it was hot in the Kruger National park!

"Gardening Leave"

What a load of cr@p! Why can't they just call it "has left and doesn't want to work notice"?

Since the beginning of this period of relaxation and confusion as to where to next, i have most certainly done my share of gardening - how many times can you mow the lawn?

Anyway, time off is never a hloiday if you have no cash or your wife is at work. There is not much to do if you don't have the cash money!

Anyway, this was just a test to see how a blog works so I am out and will think of someting to share in my free time (got a lot of that at the moment)