PART II IMPLEMENTING A NETWORK
The focus will shift from overview of implementation, and will begin putting together the elements
from Part I. The emphasis will be on the nuts and bolts of designing and rolling out a complete
network: choosing a network type (peer-to-peer or server based) selecting hardware and
software for installation, and choosing and establishing security through shares and accounts.
Also, looked at is environmental factors that affect networks, as well as administering, upgrading,
troubleshooting and relocating networks.
CHAPTER 8
DESIGNING AND INSTALLING A NETWORK
Lesson 1: Choosing
a Network Design . . . . . . . ……….
340
Lesson 2:
Establishing a Client/Server Environment …
354
Lesson 3: Working
with Device Drivers and NICs……. 363
Lesson 4: Ensuring
Hardware Compatability ………… 371
Introduction:
This chapter will touch on system design, for a fictitious company. It will move from the design phase
right up until the installation.
Choosing a Network Design
This will begin with creating a computer network, laying the foundation upon which your network
will be built. The decisions that you make now can make life easier for you or come back to haunt
you. You must determine the companys needs and choose the appropriate media and hardware to
meet their needs.
Peer-to-Peer or Server-Based?
A Case study, a manufacturing custom-made bicycle company has asked you to install an economical
computer network that will bring it up-to-date in communication technology and be flexible enough to
allow for future expansion.
=======================================================================
netnotes8.html PAGE 2 2001/10/03
Company Goals:
Network the existing computers so they can share information and printers
Add two additional computers to the network, one for Product Design Group, and one for Manufacturing
Department. Allow for the possible addition of three computers a later date
Provide and Internet connection for the Product Design Group
Present System
Old System New
System Proposals
---------------------------------------------------------------------------------------------------------------------------------------
Location
Number of Employees 23 May be future growth of 3
Product Custom Bicycles
Facility Single-Story building Consider type of cable
245 sq ft, 2625 sq meters Shielded in Manufac. area
Current Number of Five Personal Computers,
Computers Distributed as follows:
Managing Director: Pentium III 100MHz
Accounting Dept.: 486/200 MHz
Sales Dept.: 486/200
Shipping Dept.: 286/25 286 too low.
Product Design Group: Pentium II 300
Operating Systems Managing Dir. & Prod. Des. Gr.
Windows 98
Accounting and Sales Win 95
Shipping Sept. MS-DOS Ver 5.0
Peripheral Equipment Managing Director has a modem
Internet connection and color ink
Jet printer.
Design Dept. has an old laser printer.
Accounting and Sales share a second old laser
Printer on a switch box.
Shipping dept. has a dot matrix printer Can this one,
=======================================================================
netnotes8.html PAGE 3 2001/10/03
FIRST STEP, TYPE OF NETWORK
1) Size of
Network
2) Level of
security
3) Type of
business
4) Level of
administrative support available
5) Amount of
Network Traffic
6) Needs of the network
users, growth potential
7) Network
budget
8) Intercompatability,
software network
In a peer-to-peer network, all users on the network are equal. Each will have equal access to all
other computers on the network, providing the owner of the computer has shared access.
Everyone is responsible for their own computer and files maintenance. While the peer-to-peer looks
like a good choice for out bicycle company, it has some drawbacks that must be considered. If a user
has their printer attached to their machine, and when they leave they shut off the printer, no other users
can access the data. In a peer-to-peer network, no system administrator is designated, security
precautions are few, and each user is responsible for his or her own data.
Another downside to peer-to-peer network is its limited performance. If another user is accessing
your computer, no matter how fast the processor is, it will slow down your computer.
If a server based network is chosen, the network will be more secure. With a peer-to-peer network,
all resources are shared equally across the network. If the Accounting Department shares the directory
that contains the salary files so that the Managing Director can access them, everyone else on the
network can also access these files. On the other hand, server-based networks allow for the creation
of accounts and permissions that provide for further security. For example, a server-based network
can share individual files within a directory without making the directory itself available to everyone
on the network.
As the server based network grows, you can designate the Accounting Department and another
server designated for the Sales Department. If the bicycle company reaches this level, we will need
to consider using a network that supports file-level sharing and user groups with shared rights to
network resources.
=======================================================================
netnotes8.html PAGE 4 2001/10/03
At present, the better choice for our company is to use a peer-to-peer network. But in order to
provide more flexibility and to prepare it for further expansion, another option exists: create a hybrid
network. Therefore, while the basic network will be peer-to-peer, we will install one computer as a
file server. With this approach, access to the file server requires an account and permissions, while
access to other computers on the network is shared equally.
NOTE: If budget is tight, and security not much of an issue, and < 10 users,
then a peer-to-peer set-up is easy.
So, after weighing these factors, we arrive at our network-design selection for this bicycle company:
a hybrid peer-to-peer network, with one new computer to be installed and configured as a file server
and used to centralize company information.
If getting into a hybrid peer-to-peer you may as well go to a server based system.
Taking Inventory
Now that the design has been chosen, it is time to take an inventory of the current hardware. To
take and inventory, you’ll have to survey four categories:
Hardware
Software
Telecommunications equipment (who is the carrier supporting service)
Network requirements (existing LAN or WAN, the physical layout)
Hardware Survey
Record the specifications of each computer, the details you gather at this stage can save time
in the long run. You must meet the minimum standards for the hardware to work with the software.
For each computer gather this information:
1) Make a model
2) rocessor manufacturer and speed, and how old
3) mount of memory (RAM) installed
4) he size and manufacturer of each hard drive
5) etails of any other installed drives, such as compact-disc and removable disk
6) rives, floppys, CD-ROLM, Keyboards, Mouses.
7) onitor, make and model size
8) Video card, make model and amount of memory
9) Any installed peripherals
10) Type of bus EISA, Micro-Channel, ISA, or PCI the computer uses and
Whether there are any free slots; you will need free slots to install network
Interface cards.
=======================================================================
netnotes8.html PAGE 5 2001/10/03
Also, make a list of the manufacturers and the model numbers for any peripheral devices such as printer,
plotters and scanners, whether they are installed or simply sitting on a shelf. Also note whether you have
the original disk with drivers.
Software survey
To be a good administrator you must be aware of the current software installed on the system. For
example, it you were to convert all the computers to Windows NT while you were installing the new
network, you might find that some of the old standby programs once used on a daily basis, now no
longer run. For example, the Union Gas problem with DOS. Be careful when evaluating
custom-made programs such as accounting based, you may need to contact the manufacturer.
Not all these programs will run in a network environment. Gather the following information so you
can do your research:
Program name
Program version number
Availability of the original installation floppy disks or
compact disks
any licensing
information (any non-licensed software, eg games on the
machines), this is
illegal with-in a company. You must
determine
how many licenses are being used, maybe do it manually.
Notice that the Bicycle company has several inconsistencies between every department. For example
the Accounting Department might be using WordPerfect, whereas the Sales Department is using
Microsoft Office. If you are planning to upgrade some day, now is the time to make any changes
needed to ensure that the same system is used company wide.
Telecommunications Equipment Survey
It is very important to know where you stand with the telecommunications, especially if you intend to enter
onto the Network, or use RAS.
=======================================================================
netnotes8.html PAGE 6 2001/10/03
Requirements of the Network
After you have examined the existing facility and equipment, you need to define the requirements of your
network. You’ll then match these requirements to the existing hardware, software, and telecommunications
features available and determine what steps need to be taken to develop the network. At a minimum you
should consider the following.
1) Size of the facility (located on single vs. multiple floors)
2) Number of Users
3) Whether the LAN will be extended to several buildings
4) Environment (office, manufacturing, out-of-doors)
5) Current network media
6) Technical competence of Users
7) Amount of
Network Traffic (Initially, and anticipated for the future) IMPORTANT
Security
Building a Map
Now it is time to lay out the network. But before you begin to recommend a network plan for our
bicycle company, you will first need to make a map of all the elements involved. You should
consider the physical layout,
including the location of each piece of hardware and how it
relates to the others,
and the physical and logical topology of the proposed network.
Also know where the water pipes and electrical cables
run, you do not want to be near
water pipes. Also is it a leased or rented building, you will have to okay any physical changes to the
location by the owner.
NOTE: Adequately
documenting a network is the key to successful troubleshooting in the
future. Start with the facility map and equipment survey.
Choosing Network Media
Do not choose the wrong type of media, doing it twice can mean kicking your lunch pail down the
road!! The media you choose will usually be related to the geographic requirements of the site.
If the site is in or near a manufacturing environment, in which a large amount of electrical noise is
generated, fiber-optic cable might be required because it is unaffected by electrical signals. On the
other hand in a small office, simple twisted-pair cable will usually be appropriate. The most
important thing to keep in mind is not the cost today, but in the future. This is how you have to
sell it to the customer also, they will appreciate your honesty.
=======================================================================
netnotes8.html PAGE 7 2001/10/03
If we install Cat5 UTP now, we can upgrade out network to 100 Mbps at any time in the future
without needing to rewire the building. Wiring is very important, if it is chosen wisely, you will be
commended for your thorough research. And CAT5 UTP cable costs only a few cents more per
foot than Cat 3 UTP cable.
If video conferencing: fiber-optic will be necessary, you must make sure you know what the user
wants, and how frequently, and how many people will be accessing it.
INSTALLATION:
To have the wire installed, get a subcontractor, it is a crappy job, do not do it yourself, get someone
who knows what they are doing. Do not underestimate the number of users. The Wiring closet is
usually at one end, it can be a real headache, so get someone knowledgable to do this connection.
Always have 3 metres at least
at each end for extra, for repairs down the road.
Label the plates on the wall, eg. RJ-11 and RJ-45. Use Plenum grade where necessary, do not
cut corners, or your reputation is on the line.
LESSON 2:
ESTABLISHING A CLIENT/SERVER ENVIRONMENT
The Client/Server Process
The process of requesting and receiving information consists of six steps:
1) The client request the data
2) The request is translated into SQL (Structured Query Language)
3) The SQL request is sent over the network to the server
4) The database server carries out a search on the computer where the data
Exists.
5) The requested records are returned to the client
6) The data is presented to the user.
The Client: The
user generates a request at the front end.
The client runs an application that:
Presents an interface to the user, Formats request for
data,
And Displays data it receives from the server.
Each department needs a front end designed to access the common database and retrieve information
for a particular need.
=======================================================================
netnotes8.html PAGE 8 2001/10/03
FRONT END TOOLS:
1) Query tools, they are built in tools that help users access back-end data.
2) User Applications, Excel can provide front-end access to back-end databases
3) Program development tools, Microsoft Visual Basic help programmers
Develop front-end tools to access back-end data.
THE SERVER:
The server in a client/server environment is usually dedicated to storing and managing data. The
database software in the file server reacts to client queries by running searches. As part of a
client/server system, it returns only the results of the searches.
Back-end processing includes sorting data, extracting the
requested data, and sending
that data back to the
user.
Additionally, database server software manages the data in a database including:
Updates, Deletions, Additions, and
Security.
Server Hardware need a high-speed processor, these computer need lots or FAN and plenty of
hard-drive space. These computers must be able to handle multiple requests, security, and network
management tasks.
Data can be placed on a single server, or can be distributed across several database servers.
Servers over a WAN periodically synchronize their databases to ensure that they all have the
same data.
A data warehouse stores large volumes of data and forwards the most sought-after data to an
intermediate system that is able to format the data into its most requested form.
ADVANTAGES OF WORKING IN A CLIENT/SERVER
ENVIROMNENT
These systems provide mainframe-computing capacity while allowing easy customization for specific
applications. Because client/server processing sends only the results of a query across the network,
it cuts down on network traffic.
=======================================================================
netnotes8.html PAGE 9 2001/10/03
Security is an issue also. Because the file services and the data are on the back-end server, the servers
are easier to secure and maintain in one location. Data is more secure in a client/server environment
because it can be p0laced in a secure area away from the users. The data is also more secure when
Windows NT Server-based security is used to prevent unauthorized access to the files.
Backups are simplified, because the data is stored at one central location.
LESSON 3:
WORKING WITH DEVICE DRIVERS AND NICS
A driver (sometimes called a device driver) is software that enables a computer to work with a
particular device. With each installation of hardware onto a computer, you must add a driver or the
instructions for how that piece of hardware is to act.
The driver must be installed and configured and set-up properly. Here is a list
of drivers for different computer devices:
Input devices, such as mouse devices
Hard and floppy disk drives and controllers
Multimedia devices, such as microphones, cameras, and recorders
NICs
Printer, plotters, and tape drives
Printers are a good example of how to explain drivers. Each printer on the market has its own set
of individual features and functions. Before a printer can send a document
to the printer, you must install or load the drivers for that printer so that the computer will be able to
communicate with it. NIC card manufacturers must include a disc including the driver, when you
purchase a NIC card.
THE NETWORK ENVIRONMENT
Network drivers provide communication between a NIC and the network redirector running in the
computer. (The redirector is part of the networking software that accepts input/output (I/O)
requests for remote files and then sends, or redirects, them over the network to another computer)
The network administrator uses a utility program to install the driver. During installation, the driver
is placed on the computers hard disk.
Drivers and the OSI Model
NIC drivers reside in the Media Access Control (MAC) sublayer of the data-link layer of the OSI.
The MAC sublayer is responsible for providing shared access for the computer’s NIC to the
physical layer. In other words the NIC drivers ensure direct communication between the computer
and the NIC. This, in turn established a link between the computer and the rest of the network.
=======================================================================
netnotes8.html PAGE 10 2001/10/03
DRIVERS AND NETWORKING SOFTWARE
The HCL Hardware Compatibility List, lists the drivers they have tested and included with the operating
system. Before buying a NIC card you should research the compatibility your card will have with your
operating system.
NOTE: If you are
upgrading from one operating system to another (from Microsoft Windows
95 to Windows NT) you might need to contract your NIC
supplier and download a new driver.
It is a good idea to do this before you start your upgrade.
WORKING WITH DRIVERS
When you work with a driver you must perform a variety of tasks such as, installation, configuring,
updating, and removal. Some Drivers come with a diagnostic disk, just check them out. Ensure you
have the latest version of the driver. Readme.txt is a good way to become familiar with the files
parameters.
1) INSTALLING DRIVERS: Usually the user is guided through a series of
Dialog boxes that help with the driver installation.
2) CONFIGURING DRIVERS: You must set the configurable options
correctly in order for the NIC to work properly. Most of the newer NICs are
software-configurable, or Plug and Play (PnP) compliant. There are no DIP
switches or jumpers to configure. Plug and Play can be a problem, it states
that it can pick it
up but it does not.
3) UPDATING DRIVERS: Occasionally a manufacturer will make additions
or changes to a driver to improve a component’s performance. The changes
can be sent to the users by mail, or can be posted over the Internet. The
drivers must be up-to-date for each part of the hardware.
4) REMOVING DRIVERS: Sometimes you will have an existing driver
conflicting with a newer driver. If a piece of equipment is being removed,
remove its drivers at the same time, too, to ensure that no conflicts arise
between the old drivers and any new drivers that are installed.
=======================================================================
netnotes8.html PAGE 11 2001/10/03
Installing NICs
Before purchasing a NIC do a little research so you will not run into problems. The Know the type of
Expansion Slot, there are many different types ISA, EISA, Micro Channel and/or PCI buses. Whether
you are purchasing one NIC or several for a large network you must answer the following questions:
1) TYPE OF CARD – Not all NICs are equal. There are special NICs for certain types of Networks.
For example an Ethernet car will not work on
a Token Ring.
2) NETWORK SPEED – Ethernet can be configured to two speeds: 10BASET
or (10Mbps) or 100BASETX (100Mbps). Many newer NICs can run at
both, but some older ones only run at 10Mbps. When designing the network
be sure to keep the future in mind. It may be more cost-effective to purchase
ual speed cards now rather than later.
3) MEDIA CONNECTION -- Make sure the car you purchase will fit the
cabling for the system. Some cards have a selection of BNCs or RJ45
connectors; some will have only one or the other.
ADDING EXTRAS
Purchasing cards that have diagnostic lights built-in can be a good investment that will pay off
later. The purpose of these lights is to indicate the status of the card and the network. They
can tell you if the card is properly connected (it detects the presence of a network) and when
data is being processed through the card. Typically a green light indicates that a proper
connection exists between the card and the media.
A flashing yellow light usually indicates that the card is processing data.
Installing a NIC
1) Read the Documentation that comes with the card, make notes of special
requirements.
2) Determine which IRQ and I/O addresses are available on the computer.
3) Configure any jumpers or switches if required. If no switches or jumpers
are on the card, use the installation software to make any changes after you have
installed the NIC.
=======================================================================
netnotes8.html PAGE 12 2001/10/03
4) Turn off the
computer and unplug the power cord.
NOTE: NEVER
Try to fix a monitor, leave it to the experts, too dangerous.
5) Follow the appropriate electrostatic discharge procedures. Keep the
Bag that is labeled static-free for the future, if you need repairs. Read
any documentation, and registry information. Before working on the
computer GROUND yourself.
6) Remove the cover of the computer. View the inside, the mother-board
have a bottle of compressed air, spray it out. Do not vacuum, too strong,
and too much static.
7) Install the card in a free slot. Make sure you are putting the card
in the
proper slot, it may have a particular slot.
NEVER put a NIC
between a display card, will get too hot. Clean out the new slot if
it has
never been used, may be dusty, pull off the tongue. DO NOT
USE the Shared slot.
8) Reconnect the computer’s cable and turn on the computer before replacing the cover. This way,
if any conflicts require hardware adjustment, you won’t have to remove the cover again.
9) After the new hardware appears to be operating properly, install the
Driver. If you are replacing a NIC, remove it from END to END.
10) One the driver installed, try to reboot, view the cards, see it there
is any conflict.
11) If everything is working, now replace the cover.
Lesson 4:
Ensuring Hardware Compatibility
WHEN HARDWARE IS A PROBLEM
Networking is hardware-dependent, and not all hardware products are compatible.
Hardware incompatibilities are a fact of life. Copyright and patent issues further complicate
the matter.
=======================================================================
netnotes8.html PAGE 13 2001/10/03
Evaluating and selecting hardware is a major part of planning for network implementation. It is
likely that you will have to create a network out of an existing collection of hardware. Don’t be
too quick to accept one vendor’s opinion, research.
It is sometimes more cost-effective to discard the old hardware and start over than trying to
patch everything.
The most common incompatibilities occur between hardware and software. Don’t forget you
may need to upgrade drivers on the system.
READING THE DOCUMENTATION
Read the documentation, your hardware or software may have recurring problems or might conflict
with another product. Sometimes the manufacturers will supply a fix, you may need to contact the
manufacturer.
DETECTION DURING INSTALLATION
When you install a new computer or network operating system, your computer will usually attempt
to detect the hardware in the system during the installation process and load the appropriate drivers.
If you are installing Novell’s IntranetWare, for example, the install utility will automatically scan your
computer for hardware such as hard disks, CD-ROM drivers, and NICs. If the devices are
recognized, the appropriate drivers will then be loaded for the recognized drivers.
MINUMUM HARDWARE REQUIREMENTS FOR NETWORK SOFTWARE
NetWare 5 Windows NT Server 4.0 Windows 98 |
Processor Pentium Processor 486 33 MHz or higher 486 66 MHz or more Memory 64 MB 16 MB 16 MB RAM Disk Space 200 MB 125 MB 225 MB Disk CD-ROM CD-ROM 3.5 density Monitor VGA VGA VGA NIC YES YES YES |
|
=======================================================================
netnotes8.html PAGE 14 2001/10/03
NETWORK HARDWARE
Network hardware is not as susceptible as software to conflicts and compatibility problems.
Connectivity Devices, covers the basics of how these devices (repeaters, bridges, router, brouters,
and gateways) work. These devices operate at the two lower layers of the OSI reference model
(the physical and data-link layers). Since these devices are common on many different types of
networks and work mainly with data packets, they are less likely to present conflicts. Don’t forget
the Ethernet and Token Ring networks use different methods of accessing the network. Therefore,
a device designed to meet the 802.3 Ethernet standard will not communicate with a device designed
to operate with the 802.5 Token Ring standard.
SUGGESTIONS FOR BUYING A NIC
1) Research on the internet, read all about the hardware you can to become
knowledgeable about it.
2) Tomshardwareguide.com
3) Cost
4) Check machine, any free slots (PCI or ISDA)
5) Compatibility with system
6) Mouse, bus, serial port
7) Do you really need it (at home is different issue than business)
Research the Company
8) Does the NIC have some extra features, will there be conflicts
9) What are the minimum system requirements
10) Technical Support, ask other people, get other references.
STANDARDIZE THE COMPANYS HARDWARE
Makes it easier for the Help Desk
Easier for warranty issues
Compatibility issues
Most companies allow $1,500.00 per computer.
Minimum Requirements WINDOWS NT4
RAM 12MB
HD 120MB
CPU 486/dx33
Input device = keyboard (sometimes installed by CD)