Você está na página 1de 7

Networking Essentials Notes Chapter 8 Designing and Installing a Network

Choosing a Network Design

Peer-to-peer or server based? The first decision we need to make for the new network is whether it should be a peer-to-peer or a server-based network. The factors we need to examine include the: Size of the network. Level of security. Type of business. Level of administrative support available. Amount of network traffic. Needs of the network users. Network budget.

Taking Inventory After deciding on the overall network design, our next step in creating a network is to take inventory to determine what hardware and software is already available and what needs to be acquired. To take inventory, you'll need to survey four categories: Hardware

For each computer, you will need to gather information, including: Make and model. Processor manufacturer and speed. Amount of memory (RAM) installed. The size and manufacturer of each hard drive. Details of any other installed drives, such as compact-disc and removable disk drives. Monitormake, model, and size. Video cardmake, model, and amount of memory. Any installed peripherals. Type of busEISA, Micro Channel, ISA, or PCIthe computer uses and whether there are any free slots; you will need free slots to install network interface cards.

Networking Essentials, Chapter 8

Page 1of7

Software

For each software program, gather the following information: Program name Program version number Availability of the original installation floppy disks or compact discs Any licensing information

Telecommunications equipment

It might seem strange to review the existing telecommunications equipment when you are installing a LAN, but this is actually a very important element of your survey, especially if you intend to use Internet connections or some form of remote access server. Network requirements

At a minimum, you should consider the following: The size of the facility (located on a single floor vs. multiple floors) The number of users Whether the LAN will be extended to several buildings The environment (office, manufacturing, out-of-doors) The current network media, if any The technical competence of users The amount of network traffic (initially, and anticipated for the future) The level of security

Building a Map During this step, you should consider two aspects of the network: the physical layout, including the location of each piece of hardware and how it relates to the others, and the physical and logical topology of the proposed network. Choosing Network Media Type of media twisted pair, coaxial, fiber, wireless or combination of those. Installing Network Media It requires skill and appropriate tools.

Centralized vs. Client/Server Computing Centralized Computing o Here the application operates on the server and all clients interact with the central application through client side interface terminals - dumb terminals

Networking Essentials, Chapter 8

Page 2of7

o o

when a client requests data from a database, the system moves all the data across the network to the client this causes the network to slow down for other clients

Client/Server Computing o o the client computer makes a request and a computer acting as the server fulfills the request the client software uses the structured query language (SQL) to translate what the user sees into a request that the database can understand. Therefore portions of the application reside on the client and some on the server. Here's an example using SQL: o o The client requests the data The request is translated into SQL The SQL request is sent over the network to the server The database server carries out a search on the computer where the data exists The requested records are returned to the client The data is presented to the user

The application (MS Access for example) is the client, or FRONT END The database server (SQL Server) is the server or BACK END

The Client o The front end client runs an application that o o o presents an interface to the user (this doesn't reside on the server at all) formats requests for data displays data it receives from the server

The user uses an on-screen form, called a search key to specify search requests the data can be presented to the user in various ways - different users access the same database to present information in a way that suits them Front End Tools query tools user applications many common applications e.g. Excel provides front end access to back end databases

program development tools

Networking Essentials, Chapter 8

Page 3of7

The Server o o

Visual Basic is used to develop front end tools to access backend data.

usually dedicated to storing and managing data most of the database activity happens on the server sorting data updates, additions, deletions, and protection

Stored procedures are short, pre-written data-processing routines used by client applications stored on the server and can be used by any client one stored process can be called by any number of client applications instead of having to incorporate the same routine into the code of each program this means processing is done on the server instead of the client network traffic is reduced because one request begins a series of stored procedures on the server instead of many different requests security controls can prevent unauthorized use of some procedures

Server hardware server computers in a client/server environment should be more powerful and faster than client computers. server computers need lots of RAM and plenty hard-drive space These computers must be able to handle: multiple requests security network management tasks

Client / Server Architecture o two primary arrangements single server multiple servers with special tasks distributed server arrangements

Networking Essentials, Chapter 8

Page 4of7

servers across a WAN link synchronized to endure they all have the same data in common Data Warehouse. One server stores large amounts of data and forwards the most sought after data to intermediate servers that format the data. This off loads some of the processing from the intermediate servers that care contacted by clients.

Advantages of the Client / Server Environment Provides relatively inexpensive networks. Provides mainframe-computing capacity while allowing easy customization for specific applications Less network traffic => only results of query are sent over the network The server is more powerful than the client and does most of the processing More RAM and storage space on server means you don't have to spend as much money on each client Back end data is more easily secured and backed up

Working with Device drivers and NICs Working with drivers encompasses: Installation

Most popular network operating systems use interactive graphical interfaces, or dialog boxes, that guide the installer through the process. Configuring o o Network interface cards usually have configurable options that must be set correctly for the NIC to function properly. Most of the newer NICs are software-configurable or Plug and Play (PnP) compliant.

Updating o o o Occasionally, a manufacturer will write additions or changes to a driver to improve a component's performance. Manufacturers can send these driver changes by mail to registered users, post them on manufacturers internet site. The user can download and then install the updated driver.

Removal. o o It is sometimes necessary to remove drivers, such as when the original driver conflicts with newer drivers. If a piece of equipment is being removed, remove its drivers at the same time, too, to ensure that no conflicts arise between the old drivers and any new drivers that are installed.

Networking Essentials, Chapter 8

Page 5of7

Installing NICs Before purchasing NICs, it's helpful to keep several important points in mind. Type of Expansion Slot : You need to know the answers to three questions for each computer you plan to link: o o o What type of expansion bus does it have? Does it have a slot available for the card? Which type of cable will be connected to it?

Type of Card : For example, a card designed to work on an Ethernet system will not work on a Token Ring system. Network Speed : When designing your network, be sure to keep future networking needs in mind. Media Connection: Be sure to look carefully at the cards you purchase to ensure that they will fit the cabling of the network. Installing a NIC : The following is a summary of the procedure, step-by-step: o o Read the documentation that comes with the card Determine which interrupt request numbers (IRQs) and I/O addresses are available on the computer. This is especially true if you are installing in an operating system that is not equipped with PnP technology. Configure any jumpers or switches, if required. Turn off the computer and unplug the power cord. Follow the appropriate electrostatic discharge procedures. Remove the cover of the computer. Install the card in a free slot. Reconnect the computer's cables and turn on the computer before replacing the cover. This way, if any conflicts require hardware adjustment, you won't have to remove the cover again. After the new hardware appears to be operating properly (you have resolved any conflicts), replace the cover. Install the appropriate software drivers.

o o o o o o

o o

Ensuring Hardware Compatibility Networking is hardware-dependent, and not all hardware products are compatible. The most common incompatibilities occur between hardware and software. Changing or upgrading a computer or network operating system can lead to major problems. Hence, be sure to address this issue before you start. Read all the documentation about the products involved. When you install a new computer or network operating system, check the list of detected hardware and ensure that it matches what is already in the machine.

Networking Essentials, Chapter 8

Page 6of7

Before you install, make sure that you exceed the minimum requirements for the resources in the computer.

Networking Essentials, Chapter 8

Page 7of7

Você também pode gostar