Your SlideShare is downloading. ×
0
Chapter 5 Local Area Network  Concepts and Architecture <ul><li>Network Fundamentals </li></ul><ul><li>Local Area Network ...
Network Fundamentals <ul><li>Definitions </li></ul><ul><li>Classifications </li></ul><ul><li>Network topology </li></ul><u...
Definition <ul><li>Network </li></ul><ul><li>Backbond network </li></ul>
Classification <ul><li>Topology </li></ul><ul><li>Ownership </li></ul><ul><li>Geography </li></ul><ul><li>Transmission </l...
Network Topology <ul><li>Star </li></ul><ul><li>Hierarchical  </li></ul><ul><li>Mesh </li></ul><ul><li>Bus </li></ul><ul><...
Star Network <ul><li>Usage </li></ul><ul><ul><li>Centralized processing or communication </li></ul></ul><ul><li>Pros </li>...
Hierarchical Network <ul><li>Usage </li></ul><ul><ul><li>Distributed processing </li></ul></ul><ul><li>Tree structure with...
Mesh Network <ul><li>Web structure </li></ul><ul><li>Usage </li></ul><ul><ul><li>Public telephone system </li></ul></ul><u...
Bus Network <ul><li>Usage </li></ul><ul><ul><li>Date entry or office environment </li></ul></ul><ul><li>Pros </li></ul><ul...
Ring Network <ul><li>Usage </li></ul><ul><ul><li>Manufacturing </li></ul></ul><ul><li>Pros </li></ul><ul><ul><li>Less atte...
Hybrid Networks <ul><li>Usage </li></ul><ul><ul><li>Connecting different networks </li></ul></ul><ul><li>Pro </li></ul><ul...
Network Ownership <ul><li>Private networks </li></ul><ul><li>Public networks </li></ul><ul><li>Valued added networks </li>...
Private networks <ul><li>Full control </li></ul><ul><li>Special needs </li></ul><ul><li>Expense </li></ul>
Public networks <ul><li>Controlled by carriers </li></ul><ul><li>Regulated by government </li></ul><ul><li>Inexpensive </l...
Valued Added Networks <ul><li>Functions </li></ul><ul><ul><li>Code translation </li></ul></ul><ul><ul><li>Speed conversion...
Networks by Geography <ul><li>Wide area network (WAN) </li></ul><ul><li>Metropolitan area network (MAN): 30 miles </li></u...
LAN Characteristics <ul><li>Limited distance within a few miles </li></ul><ul><li>High data rate - 2 to 1000Mbps </li></ul...
Business Needs <ul><li>Corporate asset for competitive edge </li></ul><ul><li>Data accessibility (information distribution...
LAN Analysis  & Design <ul><li>Meet business objectives (strategic planning) </li></ul><ul><li>Prevent technological obsol...
LAN Hardware & Software <ul><li>Hardware </li></ul><ul><ul><li>PC: servers and clients </li></ul></ul><ul><ul><li>Network ...
Open System Interconnection Model <ul><li>International Standards Organization </li></ul><ul><li>Interconnection of dissim...
Application Layer <ul><li>Utilities support end-user application program </li></ul><ul><li>Determine data to be send at or...
Presentation Layer <ul><li>Change data format  </li></ul><ul><li>Compression/expansion </li></ul><ul><li>Encryption/decryp...
Session Layer <ul><li>Communication rules of machines or application programs </li></ul><ul><li>Accounting functions </li>...
Transport Layer <ul><li>Identify receiving address </li></ul><ul><li>Flow control: rate of transmission  </li></ul><ul><li...
Network Layer <ul><li>Route message </li></ul><ul><li>Dissemble and assemble data (packets) </li></ul><ul><li>Accounting f...
Data Link Layer <ul><li>By IEEE 802 </li></ul><ul><li>Establish link between two ends </li></ul><ul><li>Detect and correct...
Physical Layer <ul><li>Electrical, mechanical, procedural specifications for data transmission  </li></ul><ul><li>Hardware...
Other Concepts <ul><li>Protocol </li></ul><ul><li>Encapsulation/ de-encapsulation </li></ul>
Standards <ul><li>IEEE 802.2: LLC protocol </li></ul><ul><li>IEEE 802.3: CSMA/CD baseband bus </li></ul><ul><li>IEEE 802.4...
LAN Architecture Model <ul><li>Network architecture includes </li></ul><ul><ul><li>Access methodology </li></ul></ul><ul><...
Access Methods <ul><li>Contention: carrier sense multiple access with collision detection (CSMA/CD) </li></ul><ul><ul><li>...
Topology <ul><li>Logical </li></ul><ul><ul><li>Sequential </li></ul></ul><ul><ul><li>Broadcast </li></ul></ul><ul><li>Phys...
Ethernet <ul><li>Functionality </li></ul><ul><ul><li>Access method: CSMA/CD </li></ul></ul><ul><ul><li>Logical topology: b...
Media-related Ethernet <ul><li>10BaseT </li></ul><ul><li>10Base2 (Thinet with RG-58 coax) </li></ul><ul><li>10Base5 (thick...
Token Ring <ul><li>Functionality </li></ul><ul><ul><li>Access method: token passing </li></ul></ul><ul><ul><li>Logical top...
Fiber Distributed Data Interface <ul><li>Fiber distributed data interface (FDDI) by American National standard Institute (...
Fiber Distributed Data Interface <ul><li>High speed backbone between LANs </li></ul><ul><li>Primary ring and secondary rin...
Fiber Distributed Data Interface <ul><li>Applications </li></ul><ul><ul><li>Campus backbone </li></ul></ul><ul><ul><li>Hig...
100VG-AnyLAN <ul><li>Ethernet and token ring packets </li></ul><ul><li>Demand priority access (DPA) or demand priority pro...
100VG-AnyLAN <ul><li>Hardware: 100VG-AnyLAN hubs arranged in a hierarchical form </li></ul><ul><li>Media: 4 pair of  Categ...
Isochronous Ethernet <ul><li>Iso-Ethernet in IEEE802.9a (Isochronous Ethernet Integrated Services) </li></ul><ul><li>Synch...
Isochronous Ethernet <ul><li>16.144-Mpbs bandwidth </li></ul><ul><ul><li>P channel for Ethernet traffic </li></ul></ul><ul...
Isochronous Ethernet <ul><li>Hardware: </li></ul><ul><ul><li>hubs: Iso-Ethernet attachment units (AU)  </li></ul></ul><ul>...
Wireless <ul><li>Transmitter and receiver </li></ul><ul><li>100 - 300 feet </li></ul><ul><li>Infrared technology (line-of-...
Performance Factors <ul><li>Protocol (CSMA/CD, token ring) </li></ul><ul><li>Speed of transmission (line) </li></ul><ul><l...
Selection Process <ul><li>Long range thinking, planning and forecasting </li></ul><ul><li>Selection team </li></ul><ul><li...
Selection Criteria - I <ul><li>Number of user </li></ul><ul><li>Geographic spread </li></ul><ul><li>Applications </li></ul...
Selection Criteria - II <ul><li>Installation </li></ul><ul><li>Maintenance </li></ul><ul><li>Vendor support and training <...
Costs <ul><li>Workstations </li></ul><ul><li>Servers </li></ul><ul><li>Printers </li></ul><ul><li>Cabling </li></ul><ul><l...
Installation <ul><li>Choices </li></ul><ul><ul><li>Suppliers or dealers </li></ul></ul><ul><ul><li>In house  </li></ul></u...
Management & Maintenance <ul><li>Organization: LAN administrator </li></ul><ul><li>Management: policies and procedures </l...
Security <ul><li>Password </li></ul><ul><li>Sign off </li></ul><ul><li>Encryption </li></ul><ul><li>Backup </li></ul><ul><...
Assignment <ul><li>Review chapter 5 </li></ul><ul><li>Read chapter 6 </li></ul>
Upcoming SlideShare
Loading in...5
×

Chapter 5

444

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
444
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Chapter 5"

  1. 1. Chapter 5 Local Area Network Concepts and Architecture <ul><li>Network Fundamentals </li></ul><ul><li>Local Area Network (LAN) </li></ul><ul><li>Open Systems Interconnection (OSI) </li></ul><ul><li>LAN Architectures </li></ul>
  2. 2. Network Fundamentals <ul><li>Definitions </li></ul><ul><li>Classifications </li></ul><ul><li>Network topology </li></ul><ul><li>Network types </li></ul><ul><li>Local Area Network </li></ul>
  3. 3. Definition <ul><li>Network </li></ul><ul><li>Backbond network </li></ul>
  4. 4. Classification <ul><li>Topology </li></ul><ul><li>Ownership </li></ul><ul><li>Geography </li></ul><ul><li>Transmission </li></ul>
  5. 5. Network Topology <ul><li>Star </li></ul><ul><li>Hierarchical </li></ul><ul><li>Mesh </li></ul><ul><li>Bus </li></ul><ul><li>Ring </li></ul><ul><li>Hybrid </li></ul>
  6. 6. Star Network <ul><li>Usage </li></ul><ul><ul><li>Centralized processing or communication </li></ul></ul><ul><li>Pros </li></ul><ul><ul><li>Expansion </li></ul></ul><ul><ul><li>Implementation </li></ul></ul><ul><ul><li>No limit to no. and length of arms </li></ul></ul><ul><li>Cons </li></ul><ul><ul><li>Single point of failure </li></ul></ul><ul><ul><li>Overload of mater during peak traffic </li></ul></ul>
  7. 7. Hierarchical Network <ul><li>Usage </li></ul><ul><ul><li>Distributed processing </li></ul></ul><ul><li>Tree structure with a root </li></ul><ul><li>pro </li></ul><ul><ul><li>No single point of failure </li></ul></ul>
  8. 8. Mesh Network <ul><li>Web structure </li></ul><ul><li>Usage </li></ul><ul><ul><li>Public telephone system </li></ul></ul><ul><li>Pro </li></ul><ul><ul><li>Alternative communication route </li></ul></ul><ul><li>Con </li></ul><ul><ul><li>Line cost </li></ul></ul>
  9. 9. Bus Network <ul><li>Usage </li></ul><ul><ul><li>Date entry or office environment </li></ul></ul><ul><li>Pros </li></ul><ul><ul><li>Independent between nodes </li></ul></ul><ul><ul><li>High reliability </li></ul></ul><ul><li>Cons </li></ul><ul><ul><li>Limited number of attached device </li></ul></ul><ul><ul><li>Hard to locate the problems </li></ul></ul>
  10. 10. Ring Network <ul><li>Usage </li></ul><ul><ul><li>Manufacturing </li></ul></ul><ul><li>Pros </li></ul><ul><ul><li>Less attenuation </li></ul></ul><ul><ul><li>Error control </li></ul></ul><ul><ul><li>Network management </li></ul></ul><ul><li>Cons </li></ul><ul><ul><li>Failing of a node </li></ul></ul>
  11. 11. Hybrid Networks <ul><li>Usage </li></ul><ul><ul><li>Connecting different networks </li></ul></ul><ul><li>Pro </li></ul><ul><ul><li>Communication between networks </li></ul></ul><ul><li>Con </li></ul><ul><ul><li>Conversion device and costs </li></ul></ul><ul><ul><li>Compatibility </li></ul></ul>
  12. 12. Network Ownership <ul><li>Private networks </li></ul><ul><li>Public networks </li></ul><ul><li>Valued added networks </li></ul>
  13. 13. Private networks <ul><li>Full control </li></ul><ul><li>Special needs </li></ul><ul><li>Expense </li></ul>
  14. 14. Public networks <ul><li>Controlled by carriers </li></ul><ul><li>Regulated by government </li></ul><ul><li>Inexpensive </li></ul>
  15. 15. Valued Added Networks <ul><li>Functions </li></ul><ul><ul><li>Code translation </li></ul></ul><ul><ul><li>Speed conversion </li></ul></ul><ul><ul><li>Store message and delivery </li></ul></ul><ul><li>Examples </li></ul><ul><ul><li>Telex </li></ul></ul><ul><ul><li>SWIFT </li></ul></ul><ul><ul><li>SITA (airline) </li></ul></ul><ul><ul><li>IVAN (insurance) </li></ul></ul>
  16. 16. Networks by Geography <ul><li>Wide area network (WAN) </li></ul><ul><li>Metropolitan area network (MAN): 30 miles </li></ul><ul><li>Local area network (LAN): 5 miles </li></ul>
  17. 17. LAN Characteristics <ul><li>Limited distance within a few miles </li></ul><ul><li>High data rate - 2 to 1000Mbps </li></ul><ul><li>Low error rate </li></ul><ul><li>Good response time </li></ul><ul><li>Private owned </li></ul><ul><li>No regulation </li></ul><ul><li>Share hardware, software, and data files </li></ul>
  18. 18. Business Needs <ul><li>Corporate asset for competitive edge </li></ul><ul><li>Data accessibility (information distribution) </li></ul><ul><li>Less expenses </li></ul><ul><li>Better service - response time and reliability </li></ul><ul><li>Higher productivity </li></ul><ul><li>Control or secure </li></ul>
  19. 19. LAN Analysis & Design <ul><li>Meet business objectives (strategic planning) </li></ul><ul><li>Prevent technological obsolescence </li></ul>
  20. 20. LAN Hardware & Software <ul><li>Hardware </li></ul><ul><ul><li>PC: servers and clients </li></ul></ul><ul><ul><li>Network interface card (NIC): physical address </li></ul></ul><ul><ul><li>Media or Cables </li></ul></ul><ul><ul><ul><li>Unshielded twisted pair (inexpensive) </li></ul></ul></ul><ul><ul><ul><li>Coaxial cable (faster, expensive) </li></ul></ul></ul><ul><ul><ul><li>Optical fiber (fastest, expensive) </li></ul></ul></ul><ul><ul><ul><li>Air for wireless </li></ul></ul></ul><ul><ul><li>Hub (compatible) </li></ul></ul><ul><ul><ul><li>connect wires and cables, repeater, error detection </li></ul></ul></ul><ul><li>Software: network operating system </li></ul>
  21. 21. Open System Interconnection Model <ul><li>International Standards Organization </li></ul><ul><li>Interconnection of dissimilar network </li></ul><ul><li>Seven Layers </li></ul><ul><ul><li>Application </li></ul></ul><ul><ul><li>Presentation </li></ul></ul><ul><ul><li>Session </li></ul></ul><ul><ul><li>Transport </li></ul></ul><ul><ul><li>Network </li></ul></ul><ul><ul><li>Data Link </li></ul></ul><ul><ul><li>Physical </li></ul></ul>
  22. 22. Application Layer <ul><li>Utilities support end-user application program </li></ul><ul><li>Determine data to be send at originating end </li></ul><ul><li>Process data at receiving end </li></ul>
  23. 23. Presentation Layer <ul><li>Change data format </li></ul><ul><li>Compression/expansion </li></ul><ul><li>Encryption/decryption </li></ul>
  24. 24. Session Layer <ul><li>Communication rules of machines or application programs </li></ul><ul><li>Accounting functions </li></ul>
  25. 25. Transport Layer <ul><li>Identify receiving address </li></ul><ul><li>Flow control: rate of transmission </li></ul><ul><li>Recovery: calculate and check checksum of entire message </li></ul>
  26. 26. Network Layer <ul><li>Route message </li></ul><ul><li>Dissemble and assemble data (packets) </li></ul><ul><li>Accounting functions </li></ul>
  27. 27. Data Link Layer <ul><li>By IEEE 802 </li></ul><ul><li>Establish link between two ends </li></ul><ul><li>Detect and correct transmission error </li></ul><ul><li>Add header and trailer </li></ul><ul><li>Divide data unit for transmission (frames) </li></ul><ul><li>Sublayers </li></ul><ul><ul><li>Media access control (MAC): token ring or Ethernet </li></ul></ul><ul><ul><li>Logical link control (LLC): assembling and disassembling frames, error control, flow control </li></ul></ul>
  28. 28. Physical Layer <ul><li>Electrical, mechanical, procedural specifications for data transmission </li></ul><ul><li>Hardware specification by RS-232-C </li></ul>
  29. 29. Other Concepts <ul><li>Protocol </li></ul><ul><li>Encapsulation/ de-encapsulation </li></ul>
  30. 30. Standards <ul><li>IEEE 802.2: LLC protocol </li></ul><ul><li>IEEE 802.3: CSMA/CD baseband bus </li></ul><ul><li>IEEE 802.4: token passing bus </li></ul><ul><li>IEEE 802.5 token passing ring </li></ul><ul><li>Fiber Distributed Data Interface (FDDI) Standard </li></ul>
  31. 31. LAN Architecture Model <ul><li>Network architecture includes </li></ul><ul><ul><li>Access methodology </li></ul></ul><ul><ul><li>Logical topology </li></ul></ul><ul><ul><li>Physical topology </li></ul></ul><ul><li>Network configuration includes </li></ul><ul><ul><li>Network architecture </li></ul></ul><ul><ul><li>Media choice </li></ul></ul>
  32. 32. Access Methods <ul><li>Contention: carrier sense multiple access with collision detection (CSMA/CD) </li></ul><ul><ul><li>Inexpensive NIC </li></ul></ul><ul><ul><li>For: office application </li></ul></ul><ul><ul><li>Not for: manufacturing due to inconsistent response time </li></ul></ul><ul><li>Token passing: 24 bits of token (free or busy) </li></ul><ul><ul><li>More efficient at higher network utilization rate </li></ul></ul><ul><ul><li>More expensive NIC </li></ul></ul><ul><ul><li>Supported by IBM </li></ul></ul>
  33. 33. Topology <ul><li>Logical </li></ul><ul><ul><li>Sequential </li></ul></ul><ul><ul><li>Broadcast </li></ul></ul><ul><li>Physical </li></ul><ul><ul><li>Bus: line broken </li></ul></ul><ul><ul><li>Ring: PC or NIC broken </li></ul></ul><ul><ul><li>Star (hub, concentrator, MAU (multistation access unit, repeater, switching hub): single point of failure </li></ul></ul>
  34. 34. Ethernet <ul><li>Functionality </li></ul><ul><ul><li>Access method: CSMA/CD </li></ul></ul><ul><ul><li>Logical topology: broadcast </li></ul></ul><ul><ul><li>Physical topology: bus or star </li></ul></ul><ul><li>Ethernet II </li></ul><ul><ul><li>Header (preamble) for synchronizing </li></ul></ul><ul><ul><li>Destination & source address (MAC layer address) </li></ul></ul><ul><ul><li>Type field for network protocol </li></ul></ul><ul><ul><li>Data field </li></ul></ul><ul><ul><li>Frame check sequence (FCS): CRC-32 </li></ul></ul><ul><li>IEEE 802.3 replace type field with length field </li></ul>
  35. 35. Media-related Ethernet <ul><li>10BaseT </li></ul><ul><li>10Base2 (Thinet with RG-58 coax) </li></ul><ul><li>10Base5 (thick coaxial cable RG-11) </li></ul><ul><li>100BaseT Fast Ethernet with 100-Mbps </li></ul><ul><ul><li>100BaseTX (2 pair of Category 5 UTP or 1 pair of Type 1 STP) </li></ul></ul><ul><ul><li>100BaseT4 (4 pair of Category 3, 4, or 5 UTP) </li></ul></ul><ul><ul><li>100BaseFX (fiber optic cable) </li></ul></ul><ul><ul><li>Trade off between speed and maximum network diameter </li></ul></ul><ul><li>Gigabit Ethernet (1000Base-X) </li></ul>
  36. 36. Token Ring <ul><li>Functionality </li></ul><ul><ul><li>Access method: token passing </li></ul></ul><ul><ul><li>Logical topology: sequence </li></ul></ul><ul><ul><li>Physical topology: ring or star </li></ul></ul><ul><li>IEEE 802.5 </li></ul><ul><ul><li>Starting delimiter alert NIC about token approaching </li></ul></ul><ul><ul><li>Access control field (1 for busy, 0 for free) </li></ul></ul><ul><ul><li>Frame control field indicate regular data or network management frame </li></ul></ul><ul><ul><li>Destination & source address (MAC layer address) </li></ul></ul><ul><ul><li>Routing information field for multiple token ring LANs </li></ul></ul><ul><ul><li>Data field </li></ul></ul><ul><ul><li>Frame check sequence (FCS): CRC-32 </li></ul></ul><ul><ul><li>Ending delimiter (ending or intermediate frame) </li></ul></ul><ul><ul><li>Frame status field for successful delivery </li></ul></ul>
  37. 37. Fiber Distributed Data Interface <ul><li>Fiber distributed data interface (FDDI) by American National standard Institute (ANSI) </li></ul><ul><li>Functionality </li></ul><ul><ul><li>Access method: Modified token passing </li></ul></ul><ul><ul><li>Logical topology: sequential </li></ul></ul><ul><ul><li>Physical topology: dual counter-rotating rings </li></ul></ul><ul><li>Build-in reliability and longer distance </li></ul><ul><li>Single-attachment stations (SAS) or dual-attachment stations (DAS) </li></ul>
  38. 38. Fiber Distributed Data Interface <ul><li>High speed backbone between LANs </li></ul><ul><li>Primary ring and secondary ring - 100Mbps token ring </li></ul><ul><li>Fault tolerance </li></ul><ul><li>High-priority station having longer access time </li></ul><ul><li>Maximum 500 stations </li></ul><ul><li>Maximum length of 200 kilometers (rings) </li></ul><ul><li>Maximum 2 kilometers between stations </li></ul><ul><li>Constant data rate for video and voice </li></ul>
  39. 39. Fiber Distributed Data Interface <ul><li>Applications </li></ul><ul><ul><li>Campus backbone </li></ul></ul><ul><ul><li>High-bandwidth workgroups (multimedia application) </li></ul></ul><ul><ul><li>High-bandwidth subworkgroup connection (servers) </li></ul></ul><ul><li>Hardware: FDDI concentrator or hub, FDDI/Ethernet bridge </li></ul><ul><li>Media: fiber optic cable or copper distributed data interface (CDDI) for limited distance (100m) </li></ul>
  40. 40. 100VG-AnyLAN <ul><li>Ethernet and token ring packets </li></ul><ul><li>Demand priority access (DPA) or demand priority protocol: round robin polling scheme </li></ul><ul><li>Priority is assigned by application program and ports </li></ul><ul><li>Max 4 hubs between two nodes </li></ul>
  41. 41. 100VG-AnyLAN <ul><li>Hardware: 100VG-AnyLAN hubs arranged in a hierarchical form </li></ul><ul><li>Media: 4 pair of Category 3, 4, or 5 UTP; 1 pair of Type 1 STP; or single mode and multimode fiber optic cable </li></ul>
  42. 42. Isochronous Ethernet <ul><li>Iso-Ethernet in IEEE802.9a (Isochronous Ethernet Integrated Services) </li></ul><ul><li>Synchronize all circuits with a single common clocking reference </li></ul><ul><li>Guaranteed delivery time for voice and video </li></ul><ul><li>Use ISDN WAN link </li></ul>
  43. 43. Isochronous Ethernet <ul><li>16.144-Mpbs bandwidth </li></ul><ul><ul><li>P channel for Ethernet traffic </li></ul></ul><ul><ul><li>C channel ( B channel and D channel) </li></ul></ul><ul><li>Service Modes </li></ul><ul><ul><li>10BaseT </li></ul></ul><ul><ul><li>Mutiservice: multimedia </li></ul></ul><ul><ul><li>All-isochronous: real time video or voice distribution </li></ul></ul>
  44. 44. Isochronous Ethernet <ul><li>Hardware: </li></ul><ul><ul><li>hubs: Iso-Ethernet attachment units (AU) </li></ul></ul><ul><ul><li>Workstation with Iso-Ethernet NIC: integrated service terminal equipment (ISTE) </li></ul></ul>
  45. 45. Wireless <ul><li>Transmitter and receiver </li></ul><ul><li>100 - 300 feet </li></ul><ul><li>Infrared technology (line-of-sight) </li></ul><ul><li>Spread spectrum technology (no ling-of-sight) </li></ul><ul><li>Special application </li></ul>
  46. 46. Performance Factors <ul><li>Protocol (CSMA/CD, token ring) </li></ul><ul><li>Speed of transmission (line) </li></ul><ul><li>Amount of traffic </li></ul><ul><li>Error rate </li></ul><ul><li>Software </li></ul><ul><li>Hardware </li></ul>
  47. 47. Selection Process <ul><li>Long range thinking, planning and forecasting </li></ul><ul><li>Selection team </li></ul><ul><li>Checklist of criteria </li></ul><ul><li>Cost & benefit analysis </li></ul><ul><li>Technical alternatives </li></ul><ul><li>Management and Maintenance </li></ul>
  48. 48. Selection Criteria - I <ul><li>Number of user </li></ul><ul><li>Geographic spread </li></ul><ul><li>Applications </li></ul><ul><li>Performance </li></ul><ul><li>Cost </li></ul><ul><li>Security </li></ul><ul><li>Wiring </li></ul>
  49. 49. Selection Criteria - II <ul><li>Installation </li></ul><ul><li>Maintenance </li></ul><ul><li>Vendor support and training </li></ul><ul><li>Future expansion </li></ul><ul><li>Workstations </li></ul><ul><li>Compatibility to existing LANs </li></ul><ul><li>Interface to other networks </li></ul>
  50. 50. Costs <ul><li>Workstations </li></ul><ul><li>Servers </li></ul><ul><li>Printers </li></ul><ul><li>Cabling </li></ul><ul><li>Bridges, routers, brouters, gateways </li></ul><ul><li>Training </li></ul><ul><li>People (consultant, administrator etc.) </li></ul><ul><li>Maintenance </li></ul><ul><li>Space & Environment </li></ul>
  51. 51. Installation <ul><li>Choices </li></ul><ul><ul><li>Suppliers or dealers </li></ul></ul><ul><ul><li>In house </li></ul></ul><ul><li>Tasks (project management) </li></ul><ul><ul><li>Install hardware and software </li></ul></ul><ul><ul><li>Test access and capability </li></ul></ul><ul><ul><li>Trouble shoot </li></ul></ul><ul><ul><li>Document </li></ul></ul><ul><ul><li>Train user </li></ul></ul><ul><ul><li>Help center </li></ul></ul>
  52. 52. Management & Maintenance <ul><li>Organization: LAN administrator </li></ul><ul><li>Management: policies and procedures </li></ul><ul><li>Documentation </li></ul><ul><li>Hardware and software control </li></ul><ul><li>Change control </li></ul><ul><li>Back up (hardware and software) </li></ul><ul><li>Security (logical and physical) </li></ul><ul><li>Application (compatibility, integrity, & efficiency) </li></ul><ul><li>Performance monitoring </li></ul>
  53. 53. Security <ul><li>Password </li></ul><ul><li>Sign off </li></ul><ul><li>Encryption </li></ul><ul><li>Backup </li></ul><ul><li>Downloading </li></ul><ul><li>Viruses protection </li></ul><ul><li>Dial-up access </li></ul><ul><li>Legal software </li></ul><ul><li>Internal and external auditing </li></ul><ul><li>Written policy and procedure </li></ul>
  54. 54. Assignment <ul><li>Review chapter 5 </li></ul><ul><li>Read chapter 6 </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×