Successfully reported this slideshow.

2010fall ch31 naymka

875 views

Published on

J.EL310

Published in: Education, Technology
  • Be the first to comment

2010fall ch31 naymka

  1. 1. Enterprisenetworks<br />
  2. 2. During the 1980s, organizations began to install local area networks to connect computers in departments and workgroups. Department-level managers usually made decisions about what type of computers and networks they wanted to install.<br /> Eventually, organizations saw benefits in building enterprise networks that would let people throughout the organization exchange e-mail and work together using collaborative software. An enterprise network would connect all the isolated departmental or workgroup networks into an intracompany network, with the potential for allowing all computer users in a company to access any data or computing resource. It would provide interoperability among autonomous and heterogeneous systems and have the eventual goal of reducing the number of communication protocols in use. Toward this goal, industry organizations were formed to create open standards, and vendors developed their own strategies.<br />
  3. 3. An enterprise network is both local and wide area in scope. It integrates all the systems within an organization, whether they are Windows computers, Apple Macintoshes, UNIX workstations, minicomputers, or mainframes.<br /> An enterprise network can be thought of as a "plug-and-play" platform for connecting many different computing devices. In this platform scenario, no user or group is an island. All systems can potentially communicate with all other systems while maintaining reasonable performance, security, and reliability.<br />
  4. 4.
  5. 5.
  6. 6. The main attributes of the enterprise network are these:<br />Quality of service (QoS). The network is designed, configured, and<br />managed with QoS as its keystone. This means that traffic is classified<br />at the source and prioritized end-to-end through an infrastructure that<br />requires nothing of its users outside their normal method of operation.<br />The ideal network is an extension of its applications and remains<br />invisible to the users except for the jack in the wall.<br />Standards-based. Recognizing that no single vendor can provide all the<br />elements of the enterprise network, the design and structure are based<br />on open standards. This does not preclude the use of equipment with<br />proprietary elements, but cross-platform and cross-product interoperability<br />are required. Furthermore, purchases, including those made with<br />departmental budgets, must conform to the company’s equipment and<br />application standards.<br />
  7. 7. Security. The network is designed, configured, and managed with<br />security and server protection paramount. It integrates both wired and<br />wireless components and is designed to detect and prevent intrusion<br />at the edge and to survive attacks without service interruption. Policies<br />and procedures such as sanitizing files and applications are conveyed<br />to users to protect the network core.<br />Reliability. Fault tolerance is designed into the network. Components are<br />manufactured to high standards of performance and are hot swappable.<br />Management announces and adheres to service-level agreements (SLAs)<br />that give the users assurance that mission-critical applications will not<br />experience unscheduled downtime.<br />Asset and investment protection. Existing equipment is applied for maximum<br />benefit. Duplicate infrastructures are avoided by adapting to new<br />applications and new technologies without major changes or upgrades.<br />
  8. 8. PRIVATE DATA NETWORKS <br /> The main attraction of connection-oriented services such as frame relay as a platform for private networks is the lack of concern about security. The Internet has spawned a type of data network known in the trade as a VPN, referred to here as a data VPN to distinguish it from a voice VPN. A VPN is a set of sites that communicate with one another over a public IP network while maintaining the security and management capabilities of a dedicated circuit or frame relay network. The basic functions of a VPN are membership discovery—who belongs to what VPN and the establishment of a secure tunnel through the network.<br />
  9. 9. VPN subscribers have the following objectives for the network:<br />Security. The VPN is secure from unauthorized access to the same<br />degree as a network implemented over frame relay or dedicated circuits.<br />Connectivity. Any authorized site can use IP’s connectionless capability<br />to connect to other sites. New sites can be added quickly. Mobile users<br />can access the network from remote locations. Also, the network can<br />span multiple service providers where necessary.<br />Simplicity. The network is easy to set up and manage.<br />Resiliency. The network can respond rapidly to changing traffic patterns.<br />Scalability. The network can scale to meet changing needs as the subscriber adds locations or connects to external users such as customers and business partners.<br />Quality. The VPN can support multiple media including voice,<br />video, and multicast with sufficient QoS. The service provider<br />offers and adheres to SLAs based on worst-case scenarios as opposed<br />to averages.<br />
  10. 10.
  11. 11. A VPN consists of a combination of authentication, tunneling,<br />access control, and encryption that is designed to carry data securely over a public network. A network tunnel is a metaphor for the process of encapsulating the data of one protocol inside the data field of another protocol.<br />
  12. 12. Thank you <br />J.TC08D712 B.Nyamdavaa<br />J.TC08D006 G.Azbayar<br />

×