Building Internet Infrastructure
Building Internet Infrastructure
Level - IV
Page 1 of 27
LEVEL IV: Building Internet Infrastructure
This learning guide is developed to provide you the necessary information regarding the following
content coverage and topics –
Internet infrastructure is selected inline with business and end-user requirements.
Cables is installed and tested where appropriate according to the standard
Mail servers is built and tested when needed
Security access levels is tested and verified based on security policy.
This guide will also assist you to attain the learning outcome stated in the cover page. Specifically,
upon completion of this Learning Guide, you will be able to –
Internet infrastructure is selected inline with business and end-user requirements.
Cables is installed and tested where appropriate according to the standard
Mail servers is built and tested when needed
Security access levels is tested and verified based on security policy.
Learning Activities
1. Read the specific objectives of this Learning Guide.#3
7. Submit your accomplished Operation Sheet. This will form part of your training portfolio.
10. Submit your accomplished Operation Sheet #2. This will form part of your training portfolio.
11. If you earned a satisfactory evaluation see your teacher for further instructions However, if your rating is
unsatisfactory, or go back to Learning Activity #2.
12. Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher
shall advice you on additional work. But if satisfactory you can proceed to Learning Guide.
Page 2 of 27
LEVEL IV: Building Internet Infrastructure
infrastructure
All the hardware and services required to make a web page appear in your browser.
Internet infrastructure is a collective term for all hardware and software systems that
constitute essential components in the operation of the Internet. Physical transmission
lines of all types, such as wired, fiber optic and microwave links, along with routing
equipment, the accompanying critical software services like the Domain Name System
(DNS), Email, website hosting, authentication and authorization, storage systems, and
database servers are considered critical Internet components
Data Centre
A Data Centre is basically a specialist building that has the ability to power (and cool)
massive amounts of computer equipment. Typically a Data Centre would also have a
very large amount of network bandwidth to accommodate data transfer in and out of
it.
Network
Computer Equipment
Computer equipment refers to any or all of the many different parts of a computer, as
well as peripheral devices such as printers, external hard drives and servers. Basically,
anything relating to a computer is considered computer equipment.
Storage Services
Page 3 of 27
LEVEL IV: Building Internet Infrastructure
Data Storage is a huge part of Internet Infrastructure. All those emails accessible
online, all the web pages on your favorite web site, all those photos on Facebook …
are all stored on a hard drive in a DC somewhere. The basic level of storage is on-
server storage, which means the hard drives in the computer server.
Server Applications
The functional specification describes what the system will do, as opposed to how it
will be done. This distinction is important, because:
the client may not be interested in the details of how a function is implemented, and
the technical details may simply cause confusion for the client
the implementation details may need to change during the design and development of
the project
you don’t want to have to negotiate changes to the functional specification just to
change details of implementation
the technical specification for large projects will be detailed in a separate document,
and you should not entangle one with the other.
The language of the functional specification should be clear, concise and (as far as
possible) non-technical. It is very important to attend to details in the functional
specification. One misplaced word may commit a vendor company to develop extra
functionality that was never intended, and damage the profitability of the project.
Fixed requirements
Some requirements are fixed, and not derived from the ideal functionality that the
product or system should possess. These are often in the form of constraints set by
the client. For example:
Page 4 of 27
LEVEL IV: Building Internet Infrastructure
Use cases
A use case is a very useful tool to help you start to determine the required
functionality of a system. Use cases have quickly become a standard tool for capturing
functional requirements.
A use case is a diagram showing how the proposed system will be used in one
particular scenario, by a particular user. Use cases allow the designer to focus on
details, but keep the design grounded in the basics of how the system will be used. A
large system will have many use cases.
Functional requirements
Functional requirements describe the way in which the different components and
functions in the solution will interact. They will clarify how the solution is going to work
and how users can use it.
Next are some examples of the questions you might ask in order to determine the
functional requirements of an IT system.
User requirements
How many users are expected to use the system?
How many people will be utilising the solution at one time?
Where the users will be located (eg overseas, interstate or at home)?
What navigation model will it use?
What is the range of the content?
How much content will it include?
How will the content be structured?
Technical requirements
What types of computers/operating systems will the users operate?
Are their desktops all the same?
What bandwidth restrictions occur presently?
What security (login) will they need?
What backup policies need to be in place?
Who will have administration rights?
What will the business do if the system fails at any stage?
Page 5 of 27
LEVEL IV: Building Internet Infrastructure
Who is the project sponsor?
What does management expect the system will do and won’t do?
Hardware
Compatibility: will the solution work with existing systems?
Support for multimedia formats: will the existing systems and architecture
support all types of media?
Will the new system be supported by existing resources within the company?
Is there funding available for new hardware? (eg new servers)
What is the backup strategy? Has this been costed?
Does the system need to be mirrored?
Will there be time delays to purchase and install hardware?
Will you be relying on another group to set up the hardware? If they don’t
consider your project a priority, is that time delay factored into the delivery
strategy?
Are there other projects that you may be able to share hardware costs with?
If the system needs to cater for multimedia, does there need to be extra
attention paid to being able to store and transmit large graphic, sound and video
files?
If you are a consultant or part time employee, will you be given permissions and
rights to install and support the system fully? (As some computer centres are
secure).
Software
What is the true cost of the software?
Are there licensing issues? (As the system is in development, should you pay for
all the licensing now, or when the system is in live mode?)
Can the software be licensed for use by multiple users who use it on different
machines? (Concurrent licensing)
How long has the software been on the market for?
What happens if the software company becomes insolvent? Who supports it?
Who owns the source code?
What happens if the source code is modified; who supports the product then?
Does the solution work with all other company software systems?
If web-based, does the solution function on all common browsers?
If security is a concern, can the software be delivered in a ‘locked down’ format?
Page 6 of 27
LEVEL IV: Building Internet Infrastructure
Does the software support all file formats? (This is especially important when
working on multimedia tasks.)
Is the software easy to use or are there major training issues/costs?
Support materials
You will need to consider the content and design requirements of all support materials.
Support materials could include:
system specifications
user guides
knowledge banks
intranet/Internet help sites/CD-ROMs
training manuals
General user documentation and print-based help.
You will also need to consider workshops, seminars or briefings you may need to run in
order to support the software/hardware/system.
During the development of the scope document you will have determined the kinds of
support materials that you will need. You will probably also establish who will be
responsible for the production of those materials.
Page 7 of 27
LEVEL IV: Building Internet Infrastructure
Score = ___________
Answer Sheet
Rating: ____________
Answer
1. ____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
__________________________________________________________________
2. ____________________________________________________________________
____________________________________________________________________
__________________________________________________________________
3. ____________________________________________________________________
____________________________________________________________________
__________________________________________________________________
4. ____________________________________________________________________
____________________________________________________________________
__________________________________________________________________
5. ____________________________________________________________________
____________________________________________________________________
__________________________________________________________________
Network hardware
A great variety of networking devices exist—many more than can possibly be covered here.
Local requirements dictate the types of networks be formed using these devices. This reading
will focus on the most common range of network devices and the main standard that supports
them, Ethernet.
Ethernet
Most network devices commonly-used are based upon the Ethernet protocol. Ethernet speeds
have been slowly increasing over the last decade, from 10 megabits per second (10 Mbps, 10
million bps) up to discussions of 10 gigabits per second (10 Gbps, 10 x 1000 Mbps) and
beyond. Currently, most computer networks work very well with the 100 Mbps range of
products, but as data transfers within a local rea network increase, the higher bandwidth and
capacity of faster networks may be needed. Often the limiting factor is not the network speed
but other bottlenecks (limits) in the overall system, such as processing speed and hard drive
access times.
Ethernet uses the concept of CSMA/CD (carrier sense multiple access with collision
detection). Carrier sense means that devices on the network listen first for no network activity
on the network. No activity indicates that no other device is sending information, since they
all use a common medium to transfer data (multiple access). But since just as in a
momentarily quiet room two or more people may start to speak at the same time, the collision
detection mechanism is a method of dealing with this.
Wireless Ethernet devices (based on the IEEE 802.11 standards) have recently become more
available. These include connection devices such as wireless access points (AP) and
individual peripherals, such as printers. Wireless networking devices connect the network by
radio waves. Similar concepts to the wired Ethernet are used to ensure that transmissions
don’t conflict (collisions) and are regulated in some way.
Network devices
Some of the more general types of network devices available are listed in Table 1 on the next
page.
Device Description
Network Often referred to as network interface cards (NICs), they may be installed in
cards a computer or peripheral device and interact with the network medium,
including both wired and wireless networks.
Switches Often switches are used interchangeably with hubs, but they have slightly
different characteristics. The differences will not usually show up as a
performance increase until used in a larger network with multiple servers. A
switch is a better performing device and is only slightly more expensive
than a hub.
Switches operate at layer 2 (data link layer) of the open systems
interconnect—reference model and can make a decision on the destination
of a data packet that they receive. In this way, a switch may send data out to
a port based on the destination media access control (MAC) address that is
included in every frame. In fact, simultaneous data transfer between
computers is possible, which increases overall network capacity.
Hubs A hub creates the basic framework for most local area networks used in
business and home environments. They connect the servers, workstations
and other network devices together.
Hubs are also called multi-port repeaters. Hubs work at the OSI open
systems interconnect—reference model Physical (layer 1).
Routers Routers are used to interconnect two or more LANs. The LANs may
communicate through the router or the router may act as a gateway to
connect to the Internet.
Routers operate at Layer 3 (Network layer) of the open systems interconnect
—reference model and make decisions based on the network addresses
which are included in the data packet. In most networks, the network
address will be based on IP addresses but may also include IPX address
information to work with Novell Netware networks.
Access These devices act as a hub in a wireless network and as a connection
points between the wired and wireless network segments in a combined network.
In some configurations, the access point will act as a switch and/or router
and prevent unnecessary data packets from travelling between the wired and
wireless sections of the network. In other configurations, two or more
access points may only act as a repeater (or relay) and connect segments of
a wired LAN, perhaps between buildings or across roads where wired
access would be difficult or expensive to connect.
Broadband These devices connect between a LAN (or single computer) and a
modem/ permanent broadband Internet connection such as ADSL or Cable. Modem
routers versions tend to have USB connections that must connect directly to a
computer. Router versions have an RJ-45 LAN connection and/or a wireless
antenna that may connect to a computer or hub to share Internet access
between many computers.
Printers Many printers are available to connect directly to an Ethernet network.
These include printer with an inbuilt NIC. Examples are of network-ready
printers are: Brother HL-5170DN, Canon IP4000R and Hewlett Packard
DJ6840.
Scanners Some scanners are network-ready and provide access from the network.
Many of these are included in Multi-Function Centres with printer, copying
and fax capabilities as well. Examples are: Brother MFC-620CN, Canon
NSA-01 and Hewlett Packard Photosmart 2710.
Storage These devices offer additional file storage capabilities to a network. They
act as a file server and the storage can be controlled over the network.
Examples of Network Attached Storage devices are: D-Link DSM-624H,
Iomega NAS 100d/160G and Linksys EFG250
External hardware
Many devices already come with a network interface installed, such as hubs, printers and
storage devices. You may also choose to install a network interface adapter to an external
port, such as USB (Version 2.0) or FireWire (also known as i.Link or IEEE 1394). The
choice of device will have already been made by this time, so the physical installation is
relatively straightforward. Similarly, the location of the external device and provision of
power and suitable network connections should have been arranged.
The connections you produce would resemble those on pages following, shown for:
normal connections with infrastructure (fixed wiring)
normal connections without infrastructure (no fixed wiring)
connecting two devices directly
Connecting multiple hubs directly.
Figure 12: Diagram of the network connections used when there is no fixed wiring infrastructure
available
Configuration
Once new hardware is connected, the equipment is then integrated into the existing network
or a new network begins. Integration includes the naming and addressing schemes for the
protocols used on the network, which may be specified by the organisation.
Many new network devices such as routers or switches include a small web-server that allows
you to log in to the device and change settings using a web browser. In this way devices can
be configured using any operating system with a web browser.
You should have a checklist available with the functions you will test and the expected
outcomes of the test. Leave room for comments, which allows you to log the actual results,
problems and solutions.
It is impractical to test every login account and every function on every workstation. You
need to access all combinations of user groups and functionality with at least one network
function from each workstation. This ensures that all devices are physically connected to the
network and that group based policies and scripts are working. This only leaves doubt about a
few possible non-standard (often undocumented) modifications that exist in an existing
network system. These will be highlighted by help desk calls and allow them to be integrated
into the standard system or documented properly as exceptions if they are really necessary.
Table 6 on the next page has a sample checklist. Note the testing is planned to cover all the
workstations and both the sales and admin groups. Access to the H: drive, Internet and both
printers is confirmed from each group.
Figure 21: Successful response from the ping command; an unsuccessful response will show the
words ‘Request timed out’
Name____________________________________ Date_______________
Information Sheet # 3
Name:____________________
Date:_________________
Instruction: Answer all the questions listed below, if you have some
clarifications- feel free to ask your teacher.
Name____________________________________ Date_______________