Professional Documents
Culture Documents
File 5th Sem
File 5th Sem
Functions:-
The network switch plays an integral part in most modern Ethernet local area
networks (LANs). Mid-to-large sized LANs contain a number of linked managed
switches. Small office /home office (SOHO) applications typically use a single
switch, or an all purpose converged device such as a gateway to access small
office/home broadband services such as DSL or cable internet. In most of these
cases, the end-user device contains a router and components that interface to the
particular physical broadband technology.
1. Future Growth:-
Switches comes in different sizes, features and function, choosing a switch to
match a particular network sometimes constitute a daunting task. Consider what
will happen if the HR or HQ department grows by five employees or more’ A solid
network plan includes the rate of personnel growth over the past five years to be
able to anticipate the future growth. With that in mind, you would want to purchase
a switch that can accommodate more than 24 ports, such as stackable or modular
switches that can scale.
2. Performance:-
When selecting a switch for the access, distribution, or core layer, consider the
ability of the switch to support the port density, forwarding rates, and bandwidth
aggregation requirements of your network.
3. Access layer switches:-
Facilitate the connection of end node devices to the network e.g. PC, Modems, IP
phone, Printers etc. For this reason, they need to support features such as port
security, VLANs, Fast Ethernet/Gigabit Ethernet, PoE (power over Internet, and
link aggregation. Port security allows the switch to decide how many or what type
of devices are permitted to connect to the switch. This is where most Cisco comes
in, they all support port layer security. Most renowned network administrator
knows this is the first line of defiance.
4. Distribution Layer switches:-
Plays a very important role on the network. They collect the data from all the
access layer switches and forward it to the core layer switches. Traffic that is
generated at Layer 2 on a switched network needs to be managed, or segmented
into VLANs, Distribution layer switches provides the inter-VLAN routing
functions so that one VLAN can communicate with another on the network.
Distribution layer switches provides advanced security policies that can be applied
to network traffic using Access Control Lists (ACL). This type of security allows
the switch to prevent certain types of traffic and permit others. ACLs also allow
you to control, which network devices can communicate on the network.
5. Core layer switches:-
These types of switches at the core layer of a topology, which is the high-speed
backbone of the network and requires switches that can handle very high
forwarding rates. The switch that operates in this area also needs to support link
aggregation (10GbE connections which is currently the fastest available Ethernet
connectivity.) to ensure adequate bandwidth coming into the core from the
distribution layer switches.
Hardware requirements:-
CPU Architecture:- LISTSERV will currently run under Windows
2000/2003/XP on Intel architectures, and will run under Windows
2000/2003/XP on AXP architectures, to the extent that the operating system
itself continues to be supported on AXP architectures.
Multiple Processors:- While LISTSERV itself will not use multiple
processors (LISTSERV is a single-threaded application), overall machine
performance may be enhanced by use of multiple processors if other
applications running simultaneously on the machine can take advantage of
them.
Memory:- L-Soft recommends that a Windows 2000/2003/XP LISTSERV
machine start out with a minimum of 256M, as this will minimize paging
and can lead to a marked improvement in performance, particularly if the
web archive/administration interface (see below) is implemented.
Disk Space Needed:-LISTSERV itself takes up very little space (perhaps
4MB total for all of its default system files). When planning a LISTSERV
system you need to take into account how large your lists will be (100 bytes
per subscriber entry in a given list) and how much space you will need for
discussion list archives, which have the potential to grow quite large
depending on your traffic and number of lists.
Disk Architecture:- LISTSERV will run perfectly well for most sites on
inexpensive EIDE disks of the modern sort (ATA-33 or ATA-66). If
performance is an issue, it will be greatly enhanced by the use of fast SCSI
disks in a RAID array with write-back caching and a write-back battery
back-up. Write-through caching is not recommended.
Disk Format and Security:- L-Soft strongly recommends that
LISTSERV be installed on an NTFS-formatted partition.
Networking requirements:-
TCP/IP connectivity, preferably 24/7, with enough bandwidth to handle your
workload. Please note carefully that LISTSERV is not designed to dial up
and access POP mailboxes. The proper installation and operation of
LISTSERV is contingent on direct connection to the Internet in order for it
to receive and send SMTP mail. If you do not understand this, L-
Soft strongly recommends that you get expert technical advice before
proceeding further, or consider using a hosting service instead of running
LISTSERV yourself (for instance
see http://www.lsoft.com/products/ease.asp for an overview of hosting
services offered by L-Soft).
In conjunction with networking requirement #1, and as a fundamental
requirement of the SMTP mail protocol, LISTSERV requires a static IP
address which is mapped via a DNS A or MX record to a particular host
name (typically LISTSERV. Your domain, for example,
LISTSERV.EXAMPLE.COM). If you are planning to use the web
archive/administration interface with LISTSERV, an A record is required at
minimum (web browsers cannot connect to hosts that have only an MX
record). Please note carefully that L-Soft does not support LISTSERV
servers running without DNS entries (i.e. we do not support servers
configured with bracketed IP addresses instead of FQDNs [fully-qualified
domain names, for example, LISTSERV.EXAMPLE.COM]).
Most copper wires used in data communications today have eight strands of
copper, organized in unshielded twisted pairs, or UTP.[1] The wires are twisted
around one another because it reduces electrical interference from outside sources.
In addition to UTP, some wires use shielded twisted pairs (STP), which reduce
electrical interference even further. The way copper wires are twisted around one
another also has an effect on data rates. Category 3 cables (Cat3), has three to four
twists per foot and can support speeds of 10 M bit/s. Category 5 cable (Cat5) is
newer and has three to four twists per inch, which results in a maximum data rate
of 100 M bit/s. In addition, there are category 5e (Cat5e) cables which can support
speeds of up to 1,000 M bit/s, and more recently, category 6 cables (Cat6), which
support data rates of up to 10,000 bit/s (or 10 bit/s).
Optical:-Optical fiber is a thin and flexible piece of fiber made of glass or plastic.
Unlike copper wire, optical fiber is typically used for long-distance data
communications, being that it allows for data transmission over far distances and
can produce high transmission speeds. Optical fiber also does not require signal
repeaters, which ends up reducing maintenance costs, since signal repeaters are
known to fail often.
There are two major types of optical fiber in use today. Multimode fiber is
approximately 62.5 µm in diameter and utilizes LEDs to carry signals over a
maximum distance of about 2 kilometers.[1] Single mode fiber is approximately
10 µm in diameter and is capable of carrying signals over tens of miles.
Coaxial cables:-Coaxial cables have two different layers surrounding a copper
core. The inner most layer has an insulator. The next layer has a conducting shield.
These are both covered by a plastic jacket. Coaxial cables are used for microwaves,
televisions and computers.
Advantages:-
Lower error rates - the inner conductor serves as a Faraday shield that
protects the network from electronic noise.
Disadvantages:-
Great noise - the return path has some noise problems, and the end
equipment requires added intelligence to take care of error control.
Ethernet The most widely used LAN technology in use today is Ethernet, and it’s
the technology we recommend for Account Edge (unless you don’t mind the extra
expense of Fast Ethernet, described below). It strikes a good balance between
speed, price, ease of installation and supportability. Approximately 80 percent of
all LAN connections today use Ethernet. Ethernet networks run at a data rate of 10
million bits per second (10 Mbps). This means that when a computer transmits
information using Ethernet, it travels along that medium at 10 Mbps.
Token Ring Another major LAN technology in use today is Token Ring, which
can run at two different data rates, 4 Mbps or 16 Mbps. Only rarely used in
Macintosh networks, Token Ring gets its name from the manner in which the
network is set up (in a ring-like configuration) and from the way the network
passes information (using a special “packet” of information called a token) from
computer to computer. Token Ring networks are slightly more expensive and more
difficult to set up than Ethernet networks.
Q.8. Install and Configure the LAN Card?
A LAN card connects a computer to a network, whether local or foreign. LAN
cards typically connect to a computer's motherboard via a serial port. There are
other varieties that connect via a SATA, eSATA or USB port.
Almost all LAN cards that are released today have wireless radio capabilities built
into them. These are known as WLAN modules. They allow a computer to connect
to a network not only through an RJ-45 Ethernet cable but also via 802.11 wireless
network signals. The speed capabilities of each LAN vary by its own
specifications. Some LAN cards are able to do 10/100 mbps, while others are rated
10/100/1000, meaning that they are able to access up to a one gigabit network
speed.
Q.9. Establishing LAN (Star Topology) for your LAB using
Hubs?
In Star topology, all the components of network are connected to the central device
called “hub” which may be a hub, a router or a switch. Unlike Bus topology
(discussed earlier), where nodes were connected to central cable, here all the
workstations are connected to central device with a point-to-point connection. So it
can be said that every computer is indirectly connected to every other node by the
help of “hub”. All the data on the star topology passes through the central device
before reaching the intended destination. Hub acts as a junction to connect
different nodes present in Star Network, and at the same time it manages and
controls whole of the network. Depending on which central device is used, “hub”
can act as repeater or signal booster. Central device can also communicate with
other hubs of different network. Unshielded Twisted Pair (UTP) Ethernet cable is
used to connect workstations to central node.
Figure:- Star Topology Diagram