2 Network Components
2 Network Components
Network components
2.1. Hub
A Hub is a device that allows multiple nodes to connect to a network. Previously popular as a
cheap alternative, it has no network information and broadcasts all data to all nodes. This is a
security risk. A Switch is a better solution for all networks.
2.2. Switch
A Network Switch is a small hardware device that joins multiple computers together within one
local network. Switches can be of various types. They can simply pass all traffic through to other
segments as a simple Switch would do. A managed Switch is a more powerful network device. It
can prioritise network traffic and group devices into logical areas as VLANs.
2.3. Bridge
A Bridge device filters data traffic at a network boundary. Bridges reduce the amount of traffic on a
LAN by dividing it into two segments.
2.4. Router
A Network Router joins two computer networks together. DSL and cable Modem Routers are often
used in homes and small businesses, while other types of Network Routers are also used on the
Internet.
2.5. Repeater
This is a device that allows a network to be extended. Often, networks can be limited by the
physical properties of the devices and cabling involved in the physical network.
For example, the limitation of CAT 5 cabling is 100m. Where longer runs of this length are
required, a Hub or Switch can play the role Repeater to allow the signal to be transmitted over the
required distance.
Wireless networks, too, are limited by the range of the Wireless Router to which network devices
are joined. This may be as little as 30m in some Networks. A Wireless Access Point can be used
to extend the range of the network. The access point is within range of the main Network Router.
This allows devices that are within range to this access point to be connected to the Router.
2.6. Server
Severs may play many roles in a local network. A Windows Server may provide services such as:
Domain controller
File server
DNS
DHCP - Dynamic host configuration protocol.
Print server
Firewall
IDS
2.6.1. Domain controller
All users connected to the Server must login to an account setup on the network. This provides a
layer of security, helping to prevent unauthorised access.
2.6.2. File server
The Server provides access to files on the server. Permissions may be set at various levels – full
control, modify, write read and execute.
2.6.3. DNS
A domain name server (DNS) converts network addresses to network names. For example,
www.google.com.et . If you give the network command: ping www.google.com.et you will get a
reply from: 216.58.209.131.This indicates that a DNS server has converted the Internet name to
the corresponding network address.
2.6.4. DHCP - Dynamic Host Configuration Protocol
Each node on the local network must be assigned an Internet protocol (IP) address.
This is commonly assigned by a Router whose role it is. Some Networks find it more useful to
have a Server assign these addresses, so that actions access of these addresses can be
controlled.
2.6.5. Print server
A Server assigned as a print server allows administrator to control the use of the printer. Jobs can
be prioritised and the management of the print queue can be assigned to specific users as
required.
2.6.6. Firewall
A network firewall guards a computer network against unauthorized incoming messages or
undesired outgoing messages. Network firewalls may be hardware devices, software programs, or
a combination of the two.
2.6.7. IDS
A network-based intrusion detection system (IDS) is used to monitor and analyse network traffic to
protect a system from network-based threats.
An IDS reads all inbound packets and searches for any suspicious patterns. When threats are
discovered, based on its severity, the system can take action such as notifying administrators, or
barring the source IP address from accessing the Network.
3. Network Segments
A network segment is an area of the network that performs one or more roles.
The term network segment is also used to describe a network connection e.g. a Wi-Fi link or a
fibre link.
3.1. The role of network segments
Reduce network traffic
Forming several segments allows traffic to be contained to the areas that are required. There is no
need to allow all nodes to access every other node.
Increased security
Preventing packets from entering segments that are not required also a role in network security. In
the same way as users can be prevented from running applications, network segments can easily
be blocked from accessing other segments.
Further, if one segment is compromised by an intruder and all the nodes on the segment are at
risk, other segments remain protected.
It is important also to provide security on more than one layer. A hardware firewall may block most
unwanted traffic, but user authentication will serve as a second level of security for the network.
Isolate network issues
Where network issues affect many users, it is common that those on the same subnet can be
involved. Troubleshooting such a problem is made easier, due to the problem’s isolation.
Scalability
Adding an extra segment is more reliable than adding more nodes to an existing one. This
prevents interruption to existing segments and allows a new network to be tested without impacting
other users.
3.2. Type of segments
In many local networks, each segment will play one particular role. The roles will help determine
the physical layout of the network, as well as the topology.
3.2.1. User segment
A segment may be created for the purpose of collecting end users together. This is typical of a
room of computers, such as an office where similar work is being done or a teaching room where
users are accessing the same resources.
3.2.2. Storage segment
There may be advantages in grouping file storages together. It is easy to apply the same security
levels to these computers.
3.2.3. Database segment
Here, there may be important business data stored. This may have less traffic, depending on how
many users access the local database.
3.2.4. Security segment
Several devices may be put in place to bolster security of the Network. This may be achieved with
the use of firewalls, authentication and IDS.
4. Network Functional Analysis
Taking the time to analyse network function will result in a list of the components that make up the
network, including:
all components and their means of connectivity to the network
cabling
protocols
In order to create the best topology for a local network you need to look at exactly what the
network will be used for.
It is good practice to:
Build the network to allow only those business functions that are necessary. Avoid
allowing networks to communicate, if business requirements do not need it.
Build the network based on security requirements. Where users and systems need to
access other systems, enforce security measures to maintain the requirements
White list segments. This involves using managed Switches to identify packets based on
their source. Then only necessary packets will be able to enter the network. This is more
efficient than blacklisting, which is an ongoing process.
4.1. Network traffic
It is important that an estimate of network traffic be made prior to implementing a network. This is
particularly true of segments with a many to one (1) connection.
Consider a network with 4 users connected to a Switch which is also connected to a Server. The 4
users are generating 2 Mb/s bandwidth on the Network. If all users are communicating with the
server on the same segment then the server is getting up to 8Mb/s traffic.
This is a simple example, with only a small number of users. Consider an office where typically 20
or 30 users are connected to a Switch.
If the users were all generating the same amount of data (e.g. requesting the same video file from
a server) then the implications are that a bottleneck would occur if these requests were made at
the same instant. As this is an unlikely turn of events, the network would not be under threat as
the bandwidth in an office is unlikely to be sufficiently large to create such a problem.
4.2. Calculate total bytes
To estimate traffic in a network segment, the following calculation will assist in testing the network.
Always use maximum values when using estimates.
Bytes = users x time period x bitrate / 8
It is common to use wall plates and jacks to run cables through the walls of a building. This makes
the network tidy, as well as allowing easy connection to the network via workstations.
Switches
Switches will need to be 16 or 24 port, depending on the complexity of the Network.
It is important to consider the growth of the Network, anticipating further connections and
segments being added (scalability).
Routers
These may perform the role of DHCP in a local network, assigning IP addresses to devices that
connect.
Their main role however, is to correctly rout packets to the destination node in the Network.
Modem / Routers
A modem / router plays the role of a Router, with the additional function of a Modem - to convert
data for use on a phone line.
2.4. Purchase Orders
Purchase orders are usually used in a business to acquire the resources required for a network. It
is advisable to get quotes and estimates before you purchase your resource hardware. Costing
maybe impact on the network topology you ultimately select particularly if your resource budget is
low and your needs are minimal. Remember you should plan for scalability meaning that you can
often add segments to expand your network in the event of changing business requirements.
A sample purchase order is provided below
All traffic will go through the central Switch. This may not be an issue with a relatively small
number of users. Since the traffic from most users is either to the File Server or the Internet, it
would be more efficient to segment this traffic with a Switch for each of these services.
The physical layout may affect the solution if distances are large. If any of these areas of the
Network are hundreds of metres distant from the others, then some network extension will be
required. Repeaters may be necessary to avoid excessive cable runs and loss of data.