Professional Documents
Culture Documents
Infrastructure
Defining Network Infrastructure
A network can be defined as the grouping of hardware devices and software components which are
necessary to connect devices within the organization, and to connect the organization to other
organizations and the Internet.
Typical hardware components utilized in a networking environment are network interface
cards, computers, routers, hubs, switches, printers, and cabling and phone lines.
Typical software components utilized in a networking environment are the network services
and protocols needed to enable devices to communicate.
Only after the hardware is installed and configured, can operating systems and software be
installed into the network infrastructure. The operating systems which you install on your
computers are considered the main software components within the network infrastructure. This is
due to the operating system containing network communication protocols that enable network
communication to occur. The operating system also typically includes applications and services
that implement security for network communication.
Another concept, namely network infrastructure, is also commonly used to refer to the grouping of
physical hardware and logical components which are needed to provide a number of features for
the network, including these common features:
Connectivity
Routing and switching capabilities
Network security
Access control
The network or network infrastructure has to exist before a number of servers needed to support
applications which are needed by your users can be deployed into your networking environment:
File and print servers
Web and messaging servers
Database servers
Application servers
When you plan your network infrastructure, a number of key elements need to be clarified or
determined:
Determine which physical hardware components are needed for the network infrastructure
which you want to implement.
Determine the software components needed for the network infrastructure.
Determine the following important factors for your hardware and software components:
Specific location of these components
How the components are to be installed.
How the components are to be configured.
When you implement a network infrastructure, you need to perform a number of activities that can
be broadly grouped as follows:
Determine the hardware and software components needed.
Purchase, assemble and install the hardware components.
Install and configure the operating systems, applications and all other software.
The physical infrastructure of the network refers to the physical design of the network together
with the hardware components. The physical design of the network is also called the networks
topology. When you plan the physical infrastructure of the network, you are usually limited in your
hardware component selection by the logical infrastructure of the network
The logical infrastructure of the network is made up of all the software components required to
enable connectivity between devices, and to provide network security. The networks logical
infrastructure consists of the following:
Software products
Networking protocols/services.
It is therefore the networks logical infrastructure that makes it possible for computers to
communicate using the routes defined in the physical network topology.
The logical components of the network topology define a number of important elements:
Physical Layer layer 1: The Physical layer transmits raw bit streams over a physical
medium, and deals with establishing a physical connection between computers to enable
communication. The physical layer is hardware specific; it deals with the actual physical connection
between the computer and the network medium. The medium used is typically a copper cable that
utilizes electric currents for signaling. Other media that are becoming popular are fiber-optic and
wireless media. The specifications of the Physical layer include physical layout of the network, voltage
changes and the timing of voltage changes, data rates, maximum transmission distances, and physical
connectors to transmission mediums. The issues normally clarified at the Physical Layer include:
Whether data is transmitted synchronously or asynchronously.
Whether the analog or digital signaling method is used.
Whether baseband or broadband signalling is used.
Data-Link Layer layer 2: The Data-link layer of the OSI model enables the movement of
data over a link from one device to another, by defining the interface between the network medium
and the software on the computer. The Data-link layer maintains the data link between two computers
to enable communications. The functions of the Data-link layer include packet addressing, media
access control, formatting of the frame used to encapsulate data, error notification on the Physical
layer, and management of error messaging specific to the delivery of packets. The Data-link layer is
divided into the following two sublayers:
The Logical Link Control (LLC) sublayer provides and maintains the logical links
used for communication between the devices.
The Media Access Control (MAC) sublayer controls the transmission of packets from
one network interface card (NIC) to another over a shared media channel. A NIC has a unique MAC
address, or physical address. The MAC sublayer handles media access control which essentially
prevents data collisions. The common media access control methods are:
Network Interface layer: The Network Interface layer maps to the Physical Layer (Layer 1)
and the Data-link layer (Layer 2) of the OSI reference model. The Network Interfae layers function is to
move bits (0s and 1s) over the network medium.
Internet layer: The Internet layer is associated with the OSI models Network layer. The
Internet layer handles the packaging, addressing, and routing of data. The main protocols of the TCP/IP
suite that operate at the Internet layer are:
Internet Protocol (IP): IP is a connectionless, routable protocol which performs
addressing and routing functions. IP places data into packets, and removes data from packets.
Internet Control Message Protocol (ICMP): The protocol is responsible for dealing
with errors associated with undeliverable IP packets, and for indicating network congestion and
timeout conditions.
Internet Group Management Protocol (IGMP): The IGMP protocol controls host
membership in groups of devices, called IP multicast groups. The devices in the IP multicast groups
receive traffic which is addressed to a shared multicast IP address. Unicast messages are sent to a
host, while a multicast is sent to each member of an IP multicast group.
Address Resolution Protocol (ARP): The ARP protocol maintains the associations
which map IP addresses to MAC addresses. Because mappings are stored in the ARP Cache, when the
same IP address needs to be mapped again to its associated MAC address, the discovery process is not
performed again. Reverse Address Resolution (RARP) resolves MAC addresses to IP addresses.
Transport layer/ Host-to-Host Transport: This layer is associated with the Transport layer of
the OSI model. The main TCP/IP protocols operating at the Host to Host or Transport layer are:
Transmission Control Protocol (TCP): TCP offers greater reliability when it comes to
transporting data than what UDP, the other protocol which works at this level provides. With TCP, the
application which sends the data receives acknowledgement or verification that the data was actually
received. TCP is regarded as a connection-orientated protocol a connection is established before data
is transmitted. A three-part TCP handshake process is performed to establish a host to host
connection. The three-part TCP handshake process establishes a reliable connection over which to
exchange data.
User Datagram Protocol (UDP): UDP does not provide reliable data transport. No
acknowledgements are transmitted. While UDP is faster than TCP, it is less reliable.
Application layer: The Application layer is associated with the Session layer, Presentation
layer, and Application layer of the OSI model. Application layer protocols of the TCP/IP protocol suite
functions at these layers. Application layer protocols enable applications to communicate between
each other, and also provide access to the services of the lower layers.