SlideShare una empresa de Scribd logo
1 de 20
Unit11:
Network Configuration
Overview
• Using Switches to Create VLANs
• Network Attached Storage
• Storage Area Networks
• Disaster Recovery
• Fault Tolerance
• Working with a Small Network—The
SOHO
• Security Impact on the Network
Using Switches to Create VLANs
• A local area network (LAN) is often
considered a broadcast domain
• Broadcast domains are bounded by any
device that translates above the physical
layer
• VLANs are created using switches
VLANs
VLANs
• You can create a VLAN in three ways
– Port-based.
• Early on, VLANs were constructed through the simple
assignment of ports on a switch to a VLAN identified by a
number..
– Layer 2 grouping.
• The layer 2 grouping method is also called the MAC
Membership VLAN. As you might guess, it’s based on the
MAC address of the computer
– Layer 3 grouping.
• This method uses the network layer address to identify the
computers that should participate in a particular VLAN. If
TCP/IP is in use, this would be the IP address; if IPX/SPX is
in use, it would be the IPX address..
Network Attached Storage
• A NAS device is dedicated to nothing more than serving
the network with storage
• A NAS device is a server of sorts because it provides file
services
• A workstation in a network using NAS does not
authenticate to the NAS device
Network Attached Storage
NAS
• NAS communicates using common
protocols, including :
– Network File System (NFS) typically found in
UNIX environments
– Common Internet File System (CIFS) in
Windows networks
– File Transfer Protocol (FTP) and Hypertext
Transfer Protocol (HTTP) in IP networks
Storage Area Networks
• A SAN is a network of one or more storage devices that
communicate outside the regular network with one or more servers
• In the SAN, storage devices are placed on a separate network using
fibre channel technology to connect to a hub
• Servers are also equipped with special adapters to connect to the
hub and access the stored data on any of the connected storage
devices
• SANs make it possible to separate large transfers of data from the
LAN
• Central management of data is possible via a SAN, yet the data is
still available to many different systems and applications
SAN
Disaster Recovery
• Types of disasters you might encounter :
– Mission-critical server failures.
• Any component within a server can cause it to fail to provide
services, including hard disk, power supply, processor, memory, and
even the network interface.
– Network component failures.
• When network components such as hubs, switches, and routers fail,
entire sections of the network become unusable.
– Building problems.
• If the building power goes out, the wiring is damaged, or the wide
area network (WAN) link is cut, the network fails.
– Mother Nature.
• Floods, tornadoes, fires, and the occasional monsoon are the types
of disasters that can completely devastate the entire network and all
the data stored within it.
Disaster Recovery
• In the event of a total disaster, these are your options :
– Wait to resume operations after a new site can be constructed.
– Temporarily move operations to another site in a different
location.
– Use a “cold” site, which is another location with equipment
available to begin operations as soon as you can move
personnel to that location and restore data to that equipment.
– Use a “hot” site, which is another location that mirrors your
location’s data operations, usually is directly connected to your
network, and is able to begin operations the moment your
location is affected by the disaster.
Fault Tolerance
• Fault tolerance is another term for redundancy
• less expensive to prevent a disaster than to restore one
• Fault tolerance can work for the following :
– Memory.
• Some servers support error-correcting memory
with a spare memory module to use in case of
memory failure.
– Network interface cards (NICs).
• NICs can be redundant in two ways. They can
share the network traffic, or one of the NICs can
wait until the first fails before it kicks in.
Fault Tolerance
– Redundant Array of Inexpensive Disks (RAID).
• Data is mirrored, shared, or striped across multiple disks.
Pay attention to these versions of RAID:
• RAID 1: Mirroring disks connected to a single hard disk
controller, or duplexing disks connected to two different hard
disk controllers.
• RAID 5: A group of three or more disks is combined into a
volume with the disk striped across the disks, and parity is
used to ensure that if any one of the disks fails, the
remaining disks will still have all data available.
– Power supplies.
• One power supply takes over if the original fails.
– Clusters.
• Two or more servers are grouped to provide services as if
the group were a single server. A cluster is transparent to
end users. Usually, a server member of a cluster can take
over for a failed partner with no impact on the network.
Working with a Small Network
The SOHO
• The goals of a SOHO network are different from those of
an enterprise network. Most, listed below, are fairly
basic:
– Share an Internet connection.
– Share printers and scanners.
– Share files, access e-mail messages, and back up the
data.
– Access a corporate network via virtual private network
(VPN).
– Send or receive faxes without a fax machine.
Using DSL to Access the Internet
• DSL uses standard telephone wires to carry high-speed data
• doesn’t interrupt standard telephone calls
• ADSL is ideal for SOHO networks
A DSL connection can be shared.
Using Cable Modems for Internet
Sharing
• The Data Over Cable Service Interface Specification (DOCSIS) is
the cable TV industry’s response to the telephone companies’
domination over Internet connectivity
• Cable TV companies have since upgraded their backend networks
with hybrid fiber coax (HFC) to bring fiber optics into the cable TV
network, which does the trick
• In DOCSIS 1, a download bandwidth of 40 Mbps is available, with a
10-Mbps upload speed
• The media is shared by all the cable subscribers within a local area
• A cable modem is shared in the same way that a DSL connection
can be shared
Home Satellite
• Direct broadcast satellite TV is another medium under exploration
for delivering high-speed Internet services
• The other type of home satellite is a point-to-point wireless service
using line of sight connections between the Internet Service
Provider (ISP) and the subscriber
Using Dialup
• Dialup connections are the mainstay for many a SOHO
• SOHO will access the Internet only through individual
dialup connections on each of the network’s PCs
• However, it is possible to share a dialup connection

Más contenido relacionado

La actualidad más candente

Computer networks--osi model
Computer networks--osi modelComputer networks--osi model
Computer networks--osi modelAditya Mehta
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)welcometofacebook
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devicesOnline
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)Dhani Ahmad
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comTechLinu.com
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologiesmc aa
 
Computer network
Computer networkComputer network
Computer networkSimran Kaur
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devicesRaveena kumari
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Aneesh Nelavelly
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Raj vardhan
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014Zuhaib Zaroon
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communicationHarpreet Dhaliwal
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerUjjwal 'Shanu'
 

La actualidad más candente (20)

Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
 
Computer networks--osi model
Computer networks--osi modelComputer networks--osi model
Computer networks--osi model
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.com
 
Network devices
Network devicesNetwork devices
Network devices
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
 
Computer network
Computer networkComputer network
Computer network
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Network devices
Network devicesNetwork devices
Network devices
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
networking devices
networking devicesnetworking devices
networking devices
 

Similar a Unit11

Introduction to network
Introduction to networkIntroduction to network
Introduction to networkDhani Ahmad
 
COMPUTER APPLICATIONS TECHNOLOGY (CAT) NETWORK TECHNOLOGIES.pptx
COMPUTER APPLICATIONS TECHNOLOGY (CAT) NETWORK TECHNOLOGIES.pptxCOMPUTER APPLICATIONS TECHNOLOGY (CAT) NETWORK TECHNOLOGIES.pptx
COMPUTER APPLICATIONS TECHNOLOGY (CAT) NETWORK TECHNOLOGIES.pptxSinenhlanhla Vilakazi
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network ComponentsJyoti Akhter
 
14.-NETWORKS.pptx
14.-NETWORKS.pptx14.-NETWORKS.pptx
14.-NETWORKS.pptxandree45846
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdfNehaam3
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networkingNor Zailani
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 
Introduction to computer networking chapter 2
Introduction to computer networking chapter 2Introduction to computer networking chapter 2
Introduction to computer networking chapter 2binakasehun2026
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure orYogeshKumar187055
 
8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use Them8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use ThemAuvik Networks Inc.
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level Samit Singh
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and NetworkingSajitha Pathirana
 
Computer networks
Computer networks Computer networks
Computer networks ABUBAKAR270
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to NetworkingMohammed Adam
 

Similar a Unit11 (20)

Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Basic networking
Basic networkingBasic networking
Basic networking
 
COMPUTER APPLICATIONS TECHNOLOGY (CAT) NETWORK TECHNOLOGIES.pptx
COMPUTER APPLICATIONS TECHNOLOGY (CAT) NETWORK TECHNOLOGIES.pptxCOMPUTER APPLICATIONS TECHNOLOGY (CAT) NETWORK TECHNOLOGIES.pptx
COMPUTER APPLICATIONS TECHNOLOGY (CAT) NETWORK TECHNOLOGIES.pptx
 
NW.pdf
NW.pdfNW.pdf
NW.pdf
 
Computer network
Computer networkComputer network
Computer network
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
14.-NETWORKS.pptx
14.-NETWORKS.pptx14.-NETWORKS.pptx
14.-NETWORKS.pptx
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networking
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Introduction to computer networking chapter 2
Introduction to computer networking chapter 2Introduction to computer networking chapter 2
Introduction to computer networking chapter 2
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure or
 
8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use Them8 Common Network Topologies & Where to Use Them
8 Common Network Topologies & Where to Use Them
 
Computer network
Computer networkComputer network
Computer network
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Topology.ppt
Topology.pptTopology.ppt
Topology.ppt
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and Networking
 
computer network 2
computer network 2computer network 2
computer network 2
 
Computer networks
Computer networks Computer networks
Computer networks
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 

Más de Nurul Nadirah (8)

Unit10
Unit10Unit10
Unit10
 
Unit09
Unit09Unit09
Unit09
 
Unit08
Unit08Unit08
Unit08
 
Unit06
Unit06Unit06
Unit06
 
Unit05
Unit05Unit05
Unit05
 
Unit04
Unit04Unit04
Unit04
 
Unit07
Unit07Unit07
Unit07
 
Unit00
Unit00Unit00
Unit00
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Unit11

  • 2. Overview • Using Switches to Create VLANs • Network Attached Storage • Storage Area Networks • Disaster Recovery • Fault Tolerance • Working with a Small Network—The SOHO • Security Impact on the Network
  • 3. Using Switches to Create VLANs • A local area network (LAN) is often considered a broadcast domain • Broadcast domains are bounded by any device that translates above the physical layer • VLANs are created using switches
  • 5. VLANs • You can create a VLAN in three ways – Port-based. • Early on, VLANs were constructed through the simple assignment of ports on a switch to a VLAN identified by a number.. – Layer 2 grouping. • The layer 2 grouping method is also called the MAC Membership VLAN. As you might guess, it’s based on the MAC address of the computer – Layer 3 grouping. • This method uses the network layer address to identify the computers that should participate in a particular VLAN. If TCP/IP is in use, this would be the IP address; if IPX/SPX is in use, it would be the IPX address..
  • 6. Network Attached Storage • A NAS device is dedicated to nothing more than serving the network with storage • A NAS device is a server of sorts because it provides file services • A workstation in a network using NAS does not authenticate to the NAS device
  • 8. NAS • NAS communicates using common protocols, including : – Network File System (NFS) typically found in UNIX environments – Common Internet File System (CIFS) in Windows networks – File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP) in IP networks
  • 9. Storage Area Networks • A SAN is a network of one or more storage devices that communicate outside the regular network with one or more servers • In the SAN, storage devices are placed on a separate network using fibre channel technology to connect to a hub • Servers are also equipped with special adapters to connect to the hub and access the stored data on any of the connected storage devices • SANs make it possible to separate large transfers of data from the LAN • Central management of data is possible via a SAN, yet the data is still available to many different systems and applications
  • 10. SAN
  • 11. Disaster Recovery • Types of disasters you might encounter : – Mission-critical server failures. • Any component within a server can cause it to fail to provide services, including hard disk, power supply, processor, memory, and even the network interface. – Network component failures. • When network components such as hubs, switches, and routers fail, entire sections of the network become unusable. – Building problems. • If the building power goes out, the wiring is damaged, or the wide area network (WAN) link is cut, the network fails. – Mother Nature. • Floods, tornadoes, fires, and the occasional monsoon are the types of disasters that can completely devastate the entire network and all the data stored within it.
  • 12. Disaster Recovery • In the event of a total disaster, these are your options : – Wait to resume operations after a new site can be constructed. – Temporarily move operations to another site in a different location. – Use a “cold” site, which is another location with equipment available to begin operations as soon as you can move personnel to that location and restore data to that equipment. – Use a “hot” site, which is another location that mirrors your location’s data operations, usually is directly connected to your network, and is able to begin operations the moment your location is affected by the disaster.
  • 13. Fault Tolerance • Fault tolerance is another term for redundancy • less expensive to prevent a disaster than to restore one • Fault tolerance can work for the following : – Memory. • Some servers support error-correcting memory with a spare memory module to use in case of memory failure. – Network interface cards (NICs). • NICs can be redundant in two ways. They can share the network traffic, or one of the NICs can wait until the first fails before it kicks in.
  • 14. Fault Tolerance – Redundant Array of Inexpensive Disks (RAID). • Data is mirrored, shared, or striped across multiple disks. Pay attention to these versions of RAID: • RAID 1: Mirroring disks connected to a single hard disk controller, or duplexing disks connected to two different hard disk controllers. • RAID 5: A group of three or more disks is combined into a volume with the disk striped across the disks, and parity is used to ensure that if any one of the disks fails, the remaining disks will still have all data available. – Power supplies. • One power supply takes over if the original fails. – Clusters. • Two or more servers are grouped to provide services as if the group were a single server. A cluster is transparent to end users. Usually, a server member of a cluster can take over for a failed partner with no impact on the network.
  • 15. Working with a Small Network The SOHO • The goals of a SOHO network are different from those of an enterprise network. Most, listed below, are fairly basic: – Share an Internet connection. – Share printers and scanners. – Share files, access e-mail messages, and back up the data. – Access a corporate network via virtual private network (VPN). – Send or receive faxes without a fax machine.
  • 16. Using DSL to Access the Internet • DSL uses standard telephone wires to carry high-speed data • doesn’t interrupt standard telephone calls • ADSL is ideal for SOHO networks
  • 17. A DSL connection can be shared.
  • 18. Using Cable Modems for Internet Sharing • The Data Over Cable Service Interface Specification (DOCSIS) is the cable TV industry’s response to the telephone companies’ domination over Internet connectivity • Cable TV companies have since upgraded their backend networks with hybrid fiber coax (HFC) to bring fiber optics into the cable TV network, which does the trick • In DOCSIS 1, a download bandwidth of 40 Mbps is available, with a 10-Mbps upload speed • The media is shared by all the cable subscribers within a local area • A cable modem is shared in the same way that a DSL connection can be shared
  • 19. Home Satellite • Direct broadcast satellite TV is another medium under exploration for delivering high-speed Internet services • The other type of home satellite is a point-to-point wireless service using line of sight connections between the Internet Service Provider (ISP) and the subscriber
  • 20. Using Dialup • Dialup connections are the mainstay for many a SOHO • SOHO will access the Internet only through individual dialup connections on each of the network’s PCs • However, it is possible to share a dialup connection