The Basics.

What is a network?
A Network is two or more connected computers that can share resources such as data and applications, office machines, an internet connection, or some combination of all these.
Example of a Simple Network
image.png
A Workgroup is a set of devices with no centralized or connected security with one another.
Each device in a workgroup handles their own security.
Workgroups are typically seen in LANs — By splitting devices in their own logical zones, it makes administration easier to manage these devices.
What is a LAN?
LANs (Local Area Networks) are small networks that are restricted to a spanning particular geographic location such as an office building, a single department within an office building, or even a SOHO (Small Office/Home Office)
Workgroups are vey common in LANs.
To access the resources of a LAN you have to be physically connected to it (Ethernet Cables or through a network connectivity)
Ex. Any device that physically connects to the Marketing LAN will have access to the Marketing LAN’s resources.
This causes two problems though
You must be physically connected to a workgroup’s LAN to get the resources from it.
You can’t remotely connect to another LAN to use it’s resources.
A solution to this problem is a device called a Router.
Routers connect two LANs so any device connected to one of these LANs can use the resources of both of them. In the most basic definition, routers connect networks together!
They separate workgroups while still allowing access between them. This is better than just having one big workgroup.
Larger workgroups tend to be slow, have high latency, and are generally harder to administrate.
Network Devices 101.
Workstations
Often powerful computers that a end-user utilizes on a daily basis
Its resources can be accessed by other workstations on the same network.
Servers
Servers are insanely powerful computers that specialize in providing one “service” to the entire network.
Servers serve the network and all the workstations that are on the network.
Because of this, they need to have very high CPUs, hard drive space, and RAM.
They serve many workstations on the network and must provide any resources they require.
They’re highly specialized and are there to handle one important labor-intensive job. This doesn’t mean that a server can’t do more than one job, it just means that ideally you’d only want them doing one job because you’ll get better performance and better results if you do!
Ex. of servers
File Server
stores and dispenses files
Mail Server
the network’s post office; handles email functions
Print Server
manages printers on the network
Web Server
manages web-based activities
Fax Server
handles any faxes sent over the network
Application Server
manages network applications
Telephony Server
handles the call center and call routing; a sophisticated network answering machine
Proxy Server
handles tasks in the place of other machines on the network; provides a gateway between users and the internet.
Hosts
Hosts are networking devices, workstations, and servers that have IP addresses.
MPLS (Multiprotocol Label Switching)
A very popular WAN protocol being used today.
It acts a switching mechanism that imposes numbers to data and then uses those numbers to forward data when it arrives at the MPLS network.
Key Benefits
It has physical layout flexibility
You can rearrange data based on priority
Offer redundancy incase of link failure

Network Architecture: Peer-to-Peer or Client Server
We’ve developed networking as a way to share resources and information, and how that’s achieved directly maps to the particular architecture of the network operating system software.
There are 2 main types of Networks
Peer-to-Peer
Computers connected together in peer-to-peer networks do not have any central, or special authority— they’re all peers, meaning that when it comes to authority , they’re all equals!
Security checks occur on an individual PC basis — meaning that each PC has the individual right to do a security check on any other computer that tries to access resources from it.
Because it’s every man for himself, or should I say “every PC for itself”, there is no centralized security administration. Meaning that every computer has to remember and maintain a list of all the users and passwords on each and every machine.
Image
image.png
Client-Server Networks
These are pretty much the exact opposite of peer-to-peer networks.
Zero client-to-client communication.
A single server uses a network operating system for managing the whole network.
Here’s how it works:
1.) A client machine’s request for a resource goes to the main server first.
2.) The main server responds by handling security and directing the client to the PC with the desired resource.
This happens instead of the request going directly to the machine!
Advantages
Organization: because the network is much better organized and doesn’t depend on users remembering where the needed resources are, it’s way easier to find the files you need because every file is one spot; and not spread out all over the network.
Security: is a whole lot tighter because all the usernames and passwords are on that specific server, which is never used by a workstation.
Scalability: Client-Server networks can have armies of workstations on them thanks to having highly specialized computers (servers) perform highly specialized services!
Image
image.png
Network Topologies
Bus
Type of network where all the devices on the network are connected by a single ethernet cable or coaxial cable; Mainly used in 802.3 Ethernet Networks.
The single cable where all the data is transmitted on, is called the bus!
Pros
Easy to install
Not very expensive
Cons
harder to troubleshoot because all of the devices are on one RJ-45 cable or coaxial cable.
Offers zero fault tolerance; meaning any one single fault in the cable would bring the whole network down.
Image
image.png
Star
Type of network where the computers are connected to a central point with their own individual cables or wireless connections.
The central point is often times inhabited by a connectivity device like a hub, switch, or an access point.
Star topologies offer a lot of advantage over bus topology, making it widely used even though it does require more physical media (cables).
Pros
New stations can be added or moved quickly
A single cable failure won’t bring the network down
Easy to troubleshoot
Centralized Connection Point.
Cons
Total installation cost can be higher because of the large number of cables you need.
It has a central single point of failure — the hub or other central connectivity device.
One of the best features about a star topology is that since each computer is connected to the central device via their own individual cable, if one PC’s cable goes down then the entire network can still operate normally!
This makes the network much more fault tolerant and a whole lot easier to troubleshoot.
Image
image.png
Ring
Each computer is directly connected to other computers within the same network using a circular data path. The network’s data flows through the entire network from computer to computer.
Similar to a bus topology, because if you want to add to the network you’ll have to break the cable ring and essentially bring the entire network down!
Different from a bus topology in the sense that there is no single backbone cable that all of the workstations are connected.
Pros
Chances of Data collision are low.
Troubleshooting is easier compared to a bus network
In a ring topology, the data travels from one device to another until they reach their destination, so there is a high level of security.
If there is a point of failure, the data will simply keep looping data through the still connected devices in the network.
Cons
You’ll need several cables to connect the computers
Adding to the network requires you to break a cable, which in turns brings down the whole network
Zero Fault tolerance.
Image
image.png
Mesh
This network type includes a path from every machine to every other one in the network. This topology type wins the award for “Most Physical connections between machines”.
A network is only considered “Mesh” if there’s a connection between every device on the network.
Often used within WANs to create a hybrid version of an actual Mesh.
Not used in corporate settings anymore because they’re so complicated to manage, but they work great in smaller networks.
Mesh is a very robust fault tolerant network topology. Great for redundancy!
Pros
Awesome option for network fault redundancy because failure during a single device won’t break the network.
Collisions are uncommon in a full mesh network topology.
Collisions are when the data from two hosts trying to communicate simultaneously “collides” and gets lost.
Troubleshooting faults is pretty straightforward since each PC is physically connected to each other.
Provides multiple paths to travel to the destination.
No centralized authority.
Cons
Due to the sheer number of cables involved, this topology type can get very costly!
Installation can be very difficult and tedious.
Challenging to maintain
Image
image.png
Point-to-Point
Type of network where you have a direct connection between two devices or two locations, using a layer 2 connection and in the process this creates a closed network.
Data on these connections don’t travel on the internet; this method avoids hackers and cyber criminals and is leaps + bounds more secure than the other network topologies
Pros
Extremely secure, so much that built-in encryption may not be needed
Mainly used when High-Bandwidth (the amount of data that can be transmitted in a particular window of time) and Low-Latency (the delay between the user’s action and the network’s response) are a main priority.
P2P can provide these two things because data always travels back and forth the same way when using a dedicated route (a single connection).
When businesses use the public internet, their data may be routed differently at different times or rerouted to reach its destination. With a point-to-point connection, data travels a predictable path, meeting customer expectations (and provider promises) for a high quality of service (QoS)
They’re most often used when establishing secure cloud or data center connections, facilitating large file transfers, or protecting data in transit to a disaster recovery backup solution.
Cons
Not scalable!
There’s only a max of two devices in the entire network.
There’s only one-point of failure: the single cable or wireless connection that’s connecting the two.
Really only applicable when the two devices are close to each other or you have a really long cable if the devices have some distance between them.
Image
image.png
Point-to-Multipoint
One point of connection (one router) to multiple points of connections (multiple routers). Every router involved in this type of network are apart of the same network.
Image
image.png
Hybrid
Type of network that is a combination of two or more players of physical or logical network topologies working together within the same network.
When choosing the right network topology, consider:
Cost
Ease of Installation
Ease of Maintenance
Fault-Tolerance requirement
Security requirement
Today’s networks are complicated, so it’s important that we have a standard way of communicating with each other coherently about which part of the network we’re talking about.
To do this, we separate the network into the Backbone & Segments.
Network Backbone
A network backbone is very similar to our own in the way that it’s what all the network segments and servers connect to.
It gives the network a very transparent structure.
Backbones have to use very fast and robust connection technology to optimize network performance, speed, and efficiency.
Image
image.png
Network Segments
Network segments can mean any small section of the network that may be connected indirectly to the backbone.
image
image.png
CAN
A CAN (Campus Area Network) refers to a network that encompasses several buildings.
It consists of the part of the network where data, services, and connectivity to the outside world is provided to those who work in the corporate office and headquarters.
Image
image.png
SAN
SANs (Storage Area Networks) are compromised of high-capacity storage devices that are connected by a high-speed private network (separate from the LAN) using a switch built specifically for the storage.
SANs regulate the collection of data, management of data, and use of the data.
Normally ran on Fiber networks.
Image
image.png
SDWAN
SD-WAN aka Software Defined - Wide Area Network is a virtual WAN architecture that uses software to manage connectivity, devices, and services — and can make changes in the network based on current operations.
The SD-WAN controller can make changes in real time to add or remove bandwidth or to route around failed circuits.
SD-WAN can simplify wide-area networking management and operations by decoupling the networking hardware from its control mechanism.
SD-WAN uses the cloud to get the job done.
Before the cloud, if a workstation wanted to access a particular resource, it had to go directly to the data center first.
Data center had all the servers; including email servers, SMTP servers, web servers, database servers, etc. All of the remote sites had to first connect to the datacenter to gain access to all of these resources.
SD-WAN uses cloud technology to take this “gatekeeper” (datacenter) out the mix, and have the remote sites connect directly to the resource itself.
How the data is routed is determined completely by the software configurations set by the network admin or network engineer.
Images
Datacenter Layout (Before the Cloud)
image.png
SD-WAN Layout (After the Cloud)
image.png
MPLS
Multiprotocol Label Switching or MPLS uses a switching mechanism that utilizes labels that determines how to route the traffic through the WAN. It’s often referred to as being on “Layer 2.5” of the OSI model.
Routers on the edge of the network will assign labels to the packets before they enter the MPLS cloud. Upon reaching the MPLS cloud, the labels will be used to route it to the correct destination. This has been the main way that ISPs have built WANs over the past decade
Image of MPLS
image.png
Context of MPLS
image.png
Benefits
The term multiprotocol refers to a system not dependent on any one operating protocol. It's an overlay, which allows it to forward a wide range of data types independent of the protocol used to arrange them.
Can use IP Traffic, ethernet frames, TCP/UDP, ATM,etc.
The primary benefit of MPLS is it’s labeling. Labeling the packets that come through the network made it easier to correctly route it to its destination. But routing has since then became much easier to implement using software (think SD-WAN).
Labeling also gives the network the ability to do some QoS (quality of service) and prioritize certain traffic types over others, no matter what type of data it is.
Redundancy due to the multiple paths for the data to be forwarded through the MPLS cloud, One-to-many connection.
Allows for one network to control all applications. Before, companies had separate networks for voice and data, which was very expensive.
Drawbacks
Why not use SD-WAN and The Cloud?
More enterprise applications have shifted to the cloud. It makes less sense to bring traffic back to a central hub and then send the traffic onto the Internet, which is what’s commonly done with MPLS, than sending the Internet-bound traffic directly onto the Internet. Yes, there are security implications, and those need to be addressed, but the principle remains true.
Very Expensive
MPLS is far more expensive than other technologies such as broadband. If a company decides to go ahead with MPLS, it must do a thorough cost assessment to ensure that the advantages outweigh the additional cost.
The farther a host is from the MPLS data center, the longer it takes for the packet to travel, causing slow network connectivity.
mGRE
Multipoint Generic Routing Encapsulation
mGRE or Multipoint Generic Routing Encapsulation, is a protocol that encapsulates user data, creates a VPN connection to one or many nodes, and when completed, tears down the connection.
It’s used extensively for Dynamic Multipoint VPN (DMVPN) and is very common on Cisco routers.
The VPN builds and destroys its self.


Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.