Академический Документы
Профессиональный Документы
Культура Документы
Al
R
T
il?
r9 Part 1 of the text provides vital background information that forms the foun-
dation for much of the remainder of the book. In Chapter 1, Local Area Net-
works: A Business Perspective, the reader is introduced to the what, how,
and why of local area networking. In addition, key challenges and solutions
to effective LAN analysis, design, and impiementation are introduced.
Chapter 2,LocalArea Network Architectures, more deeply explores the
underlying local area network architectures that allow hardware and soft-
ware technologies to transparently interact. In this chapter, the components
of a network architecture will first be explored, followed by comparative
evaluations of the numerous network architectures either currently available
or emerging into the networking marketplace.
Local Area Network Hardware, Chapter 3, focuses on the hardware
technology including wiring centers, network interface cards, and media
that must be employed to implement a given network architecture.
Having covered the alternatives for LAN connectivity on OSI Model
Layers I and2 in the first three chapters, Chapter 4 introduces the communi-
cations protocols that work on OSI Model layers 3 thru 7. Once the general-
ized behavior of networking protocols is understood from this chapter, the
second part of the text introduces the differences between specific network
operating system implementations.
t:
i! tr
l::':_l:
:t,-.,,,,,,,.,.-,.,':l:
CHAPTER
BT]Sil\ESS PUNSPECTWE
Concepts Introduced
Local Area Networks Top-Down Model
OSLT Layer Model Network Interface Cards
Internet Suite of Protocols Model Network Operating SYstems
I-F-O Model Protocols and ComPatibilitY
Business-Oriented LAN AnalYsis Logical Network Design
OBJEOT
LANsalsoallowmessagestobesentbetweenattachedcomputers
thereby enabling .rr"r, to wórk together electronically
in a-process often
The local nature of a local area net-
referred to as co-iaborative computing.
There is no hard and fast rule
work is a relative rather than absoluteioncept.
of network that qualifies to be
or definition as to the geographic limitations a
calledalocalur"u't""t*o.-,k'Ingeneral,LANsareconfinedtoanareano
lurg", than a single building or a small group of buildings'..
LANs can be extendeá by conneiting to other similar
or dissimilar
coriputers' This process is generally
LANs, to remote users, or to máinframe
is .orr"t^"d in-depth in Part Three of the
referred to as LAN connectivity and
be connected to the LANs of trading
text. LANs of a particulur .o*pur1y can
may be
partnefs such ás vendors aná customers. These trading partners
Arrangements linking these
located in the same town or around the globe.
enterprise networks. These
trading partners are commonly referredto as
enterprise networks are created by combining LANs
with a variety of wide
AreaÑetwork (WAN) services, including the Internet'
of the LAN' In
Strictly speaking, the computers theinselves are not part
on personal
other words, u ,ir-rgi" .rr". .olld be productive a stand-alone
information, fesoufces/ or mes-
computef (PC). Howe\¡et, il1 Order to Share
sageswithotherusersandtheirComputels/aLANmustbeimplementedto
connect these computers. The LAN is the combination
of technology that
Figure 1-1 provides a concep-
allows computers ánd their users to interact.
tual illustration of a LAN.
BEFORE:
Stand-alone PCs
5
n
i-
e
€
rO
af
11'
AFTER:
tte
:tg
be
5e
5e
,de
In
nal
[es-
Ito
hat
Ep-
ThesamePCswiththeadditionofaLocalAreaNetwork(LAN.)ALANisacombinationof
hardwareandsoftware.".r*otogywhichenablescommunicationandresourcesharingamong
attached comPuters.
PIE-
eilV Figure 1-1 What Is a Local Area Network?
L\\T
iritY
a shared media local area network
provides a highly conceptual view of how
st be
mightbe imPlemented
-''-"po., of the illus-
úcate
,uJ foote¿ uy tt apparent simplicity of Figure 1-2.,A11
ically " be cómpatible not only rt'ith
trated networking trura*ur" und softwaie must u'ith the
rvari- it is installed' but also
the compute, o, p"ript1"á d"t'ic" in which
üa to and the netu'orkirrg
hardware and software .hu..o^p,ises the LAN
itself,
ñca1lY instaleá on all other computers and peripheral
hardware and software
re 7-2
Chapter One Local Area Networks: A Business Perspective
Shared Application
Seruer
of hardware
devices attached to the LAN. Compatibility refers to the ability
and software, manufactured by,rulions vendols, to work together success-
fully without intervention by ihe end user. In other words, the combination
oi JompatlUle hardware uná ,oftwure technology is transparent to the
end
receiving the information they need to do
user. ljsers realize that they are
networking hard'are and soft-
iheir job effectively. Compátifitty among
analysis and
ware iechnology isone of tn" tey cna[enges to successful LAN
design.
Nehvorking Hardware
implement-
Among the types of possible networking hardware employed in
ing a LAN are:
Given the relative slow speeds of the serial and parallel ports as compared to
most NICs, Zerc-sLot tÁNs are usually limited to two to four users. \fant-
computers, especially laptops, are now equipped-with built-in infrared
transmission iorts that Lttá¡t" them to transfer data to other similarlr-
equipped computers without the need for additional wires or cables.
' in" netwórk interface card (or adapter) is appropriately named. Its job
is to provide a transparent interface between the shared media of the LAN
and the computer into which it is physically installed: Tlle NI9 takes mes-
sages whichihe computer directs it to send to other LAN attached
comput-
o, devices and formats those messages in a manner appropriate for
"rí
transport over the LAN. Conversely, messages arriving from the LAN are
!-are
-ress- Networking Software
Ltion
end Among the types of possible networking software employed in implement-
odo ing a LAN are:
sott-
iand r software that allows personal computers which are physically
attached to the LAN toihare networked resources such as printers,
data, and aPPlications
¡ software that runs on shared network devices such as printers, data
storage devices, and application servers which allow them to be
shared by multiple LAN-attached users
ngtt-
A stand-alone (not LAN-attached) PC requires software in order to oper-
interfaces
ate. Commonly referred to as the operating iystem, this software
nked Program' and the
between application programs ,.t.li ut a wórd processing
client hardware (CPU, memory, disk drive)'
hüe The software that runs on personal computers and allows them to log
into a LAN and converse with other LAN-attached devices is sometimes
PC is a
referred to as client software or client network software. A client
to LAN-attached resources and
cards computer that a user logs into in order access
is sometimes characterized as a sen'ice
paral- ,"rrri""r. A LAN-attach*ed client PC
the network
ation. requester. The client network software must be compatible with
Chapter One Local Area Networks: A Business Perspective
Netrvorking Media
SERVICE REQUESTER
Rccess via local keYboard/login
o
G
zt¡l
J
o
m
DT
m
:t-
rk
:al
úil
r0- É,
ul
É.
t¡l
a
a
z
o
eed
rit]- o
the
J
G
red G
tan-
htll'
tbe
_l\
rts of
PRovIDER
call)'
alea Access via Network Connections
r des-
-senvlcE
Topics
Contents of LAN-related
Figure 1-3 Visual Table of
10 Chapter One Local Area Networks: A Business Perspective
Eigure 1-4 Business Needs and Perspectives That May Lead to Local Area Net-
working Solutions
Why Are Local Area Networks lmplemented? Llt
stated busi'-
only be implemented if they meet
that local area networks should methodology ihat leads up'
ness needs.
p,.rrt¡termo'e, ;h" ;"1É1t and design
nature and should be docu-
to LAN implementatián snout¿ Ue of a structuréd
mentableinordertojustifyfinalconclusionsandrecommendations.Thebr:si.
a basis for
ness needs urrd p""p"tliíes
[sted in Figure L-4 will be used as
aád design later in this chapter'
turther business-oriJJi;Ñ;agsis
FlowcansuchavisionStatementbetranslatedintomoreconcretetermsor
strategy that would
measurable,u¡".ti.rJri ¿;^;ñ;"ts of the network objectives or evalua-
support such lofty vision itatement can be identified.
a
network characteristics can
tion criteria fo, "ulh of these business-driven
business-driven strategic characteristics
then be established. some possible_ are
later chapters in which these issues
of Local Area Netwárt , u.,¿ the
further are listed in Figure 1'-5'
".pfáit*a
Follow-uP ChaPtet
Strategic LAN Characteristic
Chapter 15
iluiuuirityzn"nuuirity/Faulttolerance/Redundancy
Chapter 15
Responsiveness / Perf ormance
Chapters 4,5
ConnectivitY
Chapters 9, 13
InteroperabilitY
Chapter 15
Management
Chapter 16
SecuritY
Chapter 9, 10
DirectorY Services
Given that LANs are implemented to solve real-world business needs as artic-
ulated by senior management and that recommended solutions must be both
justifiable and documentable, it is essential that LAN analysis and design be
conducted in a structured, effective manner. As will be seen in the following
section, because of the number of possible different pieces of hardware and
software technology manufactured by different vendors that may have to
interoperate, effective LAN analysis and design can be an overwhelming task.
From a business perspective, senior management wants assurance that money
invested in technology will have the desired business impact.
¡ Chief Executive Officers seek business solutions, not technical solutions, and
are concemed r,r'ith ensuring that information technology spending practices
';*:1.
Mffig$$al are properlv aligned lvith skateglc business objectives. Furthermore, senior
K{iil¡e$,t&e business executir-es realtze that the most expensive technology is not always
¡::t:t:::i:t);;:::.;:rr:i:1,
the best at delivering business solutions and that, in fact, less expensive tech-
nologf is olten sufficient. Perhaps most important, CEOs are concerned with
the ineviiable, constant, accelerating rate of technological change. Dealing with
this technological change by having a well-defined, strategic technology plan
and infrastructure closely aligned with business strategic plans is the best way
to prevent technological obsolescence from determining business outcomes.
Many networking organizations now take the time to create formal doc-
uments that articulate how the company's business mission is aligned with a
clearly articulated network architecture plan. Such a document assures
senior management that the network organization is strategically aligned
with the corporate business mission while also providing written documen-
tation of acceptable processes and technology to be used by any employee
involved with the corporate network infrastructure.
ducted research indicates that there has been little if any increase irr pr.-
ductivity as a direct result of this investment. In \990, Paul Strassma:r
wrote inBusiness Value of Computers that there was no relationship betrr-een
expenses for computers and business profitability. This dilemma, in rr-hich
investments in technology have no relationship to traditional measure-
ments of productivity such as return on investment, is known as the pro-
ductivity paradox. Erik Brynjolfsson of MIT concluded that the problem
lies in the measurements that have been used to gauge the impact of tech-
nology investment. In other wotds, the real return on investment from
information technology is not in the incremental cost savings incurred by
computerizing manual tasks previously done by humans. Rather, success-
ful information technology investment must be more closely linked to
business strategy and organizational structure. More profitable technology
investments are achieved by computerizing new tasks and business
processes that deliver higher value to the customer, such as better designs,
faster delivery, higher quality, greater customization, or better customer
service. Clearly, something is wrong with an analysis and design process
which recommends technology implementations that fail to meet strategic
I
business objectives.
I
What are the characteristics required of a business first-technology last
I
analysis and design process with the potential to overcome the productivity
i
paradox?
a
Solution: The Top-Down Approach
5
d
In order to overcome the productivity paradox, a structured methodol-
t-
ogy must be followed to ensure that the implemented network meets
€
the communications needs of the intended business, organization, or
individual.
One such structured methodology is known as the top-down approach.
€
Such an approach can be graphically illustrated in a top-down model as
5
shown in Figure L-6. Using a top-down approach as illustrated in the top-
nt
down model is relatively straightforward. Insisting that a top-down
tf,
approach to network analysis and design is undertaken should ensure that
d the network design implemented will meet the business needs and objec-
\ tives that motivated the design in the first place.
This top-down approach requires network analysts to understand busi-
ness constraints and objectives as well as information systems applications
and the data on which those applications run, before considering data com-
munications and networking options.
Notice where the Network Layer occurs in the top-down model. It is no
accident that Data Communications and Networking form the foundation of
¡s.
today's sophisticated information systems. A properly designed network
supports flexible delivery of data to distributed application programs,
allowing businesses to respond quickly to 'customer needs and rapidl''
'1n
)n- changing market conditions.
r -F
BUSINESS
n APPLICATION
m
o a
g z
n o
m DATA tr
:f
J
m
z o
a
-l
a NETWORK
TECHNOLOGY
ffi THETOP-DOWNMODAL
How does the proper use of the top-down model ensure effective, business-
oriented LAN analysis and design? Figure 1-7 lists the analysis processes
associated with each layer of the top-down model. One must start with the
business level objectives. What is the company (organization, individual) try-
ing to accomplish by installing this network? Without a clear understanding
of business level objectives it is virtually impossible to configure and imple-
ment a successful network. In many cases, firms take this opportunity to crit-
ically reexamine their business processes in an analysis methodology known
as business process reengineering (BPR). In what is perhaps the most
famous book on BPR, Reengineering the Corporation: A Manifesto for Business
Reaolution by Michael Hammer and James Champy, the authors state that
"Business reengineering means starting all over, starting from scratch. Busi-
ness reengineering means putting aside much of the received wisdom of two
hundred years of industrial management. It means forgetting how work was
done in the age of the mass market and deciding how it can best be done
now. In business reengineering, old job titles and old organizational arrange-
ments-departments, divisions, groups/ and so on-cease to matter. They
are artifacts of another age."
Once business level objectives are understood, one must understand the
applications that will be running on the computer systems attached to these
networks. After all, the applications will be generating the traffic that will
travel over the implemented network.
Once applications are understood and have been documented, the data
which those applications generate must be examined. In this case, the term
datn is used in a general sense as today's networks are likely to transport a
variety of payloads including voice, video, image, and fax in addition to true
The Top-Down Model 15
data. Data traffic analysis must determine not only the amount of data to be
transported, but also must detetmine important characteristics about the
nature of that data.
Once data traffic analysis has been completed, the following should be
known:
Giventheserequirementsasdeterminedbytheupperlayersofthetop-
down model, the next job is to determine the requirements of the
network
that will possess the capability to deliver this data in a timely, cost-effective
as what lhe
mannef. These network p"rfoimunce criteria could be referred to
business objectives out-
implemented network must do in order to meet the
requirements afe also
lined at the outset of this top-down analysis. These
sometimes referred to as the logical network design'
var\ous
The technology layer analyiis, in contrast, will determine how
hardware and softwar" .o*pár-r"nts will be combined to build a functional
network that will meet predltermined business objectives. The delineation
design.
oi r"q.rir"a technologv ii often referred to as the physical network
model
Overall, the reliáonship between the layers of the top-down
produces require-
could be described as folloivs: Analysis at upper layers
ments that are passed down to lower layers, while solutions meeting
these
among lay-
requlrements are passed back to uppef úyers. If this relationship
then the
ers holds true throughout the business-oriented network analysis,
implemented techno"logy (bottom layer) should meet the initially outlined
buiiness objectives (toiiayer). Hencé, the name, the Top-Down Approach'
Assuming that the pfoper use of the top-down model will ensure that imple-
more
mented tJchnical ról.rtior-rt will meet siated business requirements, the
technical challenges of LAN analysis and design must be addressed.
Thereasonthatthesevariousinterfacesareabletobebridgedsuc-
components' is due to
between
cessfully, thereby t"p;;;t*;;ompatibllity
than rules for how communicating
protocols. Protocols Jt" ''totiiog more
bridge interfaces or talk to one another'
hardware and soitwal;;r*p.";"ts or
(used excltisivety by one or more vendors)
Protocols may be pr"pti"táty prótoéots may be officially sanc-
open (used freety by itt iot"r"rt"¿ parties).
bodies such as the ISO' or may be
tioned by internatio''ui 'tu'l¿u'ds-making
p'ototots)' rlgu1e.1-8 illustrates the relation-
trilij market dri"Ji;" ';ttá
ourelv
il ;"n inte r f ac e s, p ro to c óh' and c omp atib ility- to software' and
";
For every pot"'-tiiui tu'd*ure to hardware' 'oft*u'" to be one or more
there is likely
hardware to software interface imaginable,
of the protocols employed in a
possible protocols Jp;;;;'1h" s'um
of all
protocol
particular computer is sometimes referred to as tÉat comPuter's
suppor't9d 1
il;i.-*.."rri"[v determining which protocols -]:t l"
possible in a complicated
which instances for the muititride of intlrfaces in a LAN
LAN design is likely i"L" in" difference between ir'.""tt or failure
t*o[ffi1t:Íl?"t*orr interfaces
l- analyst possibly keep track of a' potential
rt att i^X-attacheá devices? what is
and their associated protocols between
organize the various potential interfaces
needed is a framewort ir-, which lo
¡e
designs' More than one
and protocot, lr-, ,tiÁ lomplicated ilternetwork
¡o
AT
suchframework,otherwiseknownaScommunicationsarchitectures,exists.
Twoofthemostp.p"r"'""".'municationsarchitecturesaretheT-layeroSI
model'
protocols
model and the +-fuy'et Internet suite of
lmplementing
mutuallY suPPoried
protocols allows
interfacing
Thisgaph hardware and/or
software technologY
to communicate,
therebY ensuring
compatibility.
I I
I Ethernet 10 Base-T
I
I Network lnterface
I
E Card (NlC)
I
:l running on each
.1
,i
."pr"r"r,i, the servic-es required by the apphcátion Program
'I !
li
.t
OSI Model LaYer Functionality Automob¡le AssemblY Line
'i I
:ffi it'r#.ll*;f;:q#'$m*x*#3i"*::n#t''ii'ffi
r"-áitrit-tg layers (2 through 6) may not be as obvious but, nonetheless, rep-
resent a sufficiently distinct logical gfoup of functions required to connect
two computets, as to justify a separate layer. As will be seen later in the text,
some of the layers are divided into sublayers.
To use the OSI model, a network analyst lists the known protocols for
each computing device or network node in the proper layer of its own seven-
layer OSI model. The collection of these known protocols in their proper lay-
it-r krtown as the protocol stack of the network node. For example, the
"ri
physical media employed such as unshielded twisted pair, coaxial cable, or
liber-optic cable would be entered as a layer 1 protocol, whereas Ethernet or
Token Ring network architectures might be entered as a layer 2 protocol.
Technically speaking, the electrical and mechanical specifications of the
selected media type are the actual layer 1 protocols. The media itself is some-
times referred to as Iayer A.
The OSI model allows network analysts to produce an accurate inventory
of the protocols present on any given network node. This protocol profile rep-
resents a unique personality of each network node and gives the network ana-
lyst some insight into what protocol conversion, if any, may be necessary in
order to get any two network nodes to communicate successfully. Ultimately,
the OSI model provides a structured methodology for determining what hard-
ware and software technology will be required in the physical network design
in order to meet the requirements of the logical network design.
Perhaps the best analogy for the OSI reference model which illustrates
its architectural or framework purpose, is that of a blueprint for a large office
building or skyscraper. The various subcontractors on the job may only be
concerned n ith the "Iayer" of the plans that outlines their specific job speci-
fications. Horvever, each specific subcontractor needs to be able to depend
on the work of the "lower" layers' subcontractors just as the subcontractors
of the "upper" layers depend on these subcontractors performing their func-
tion to specification.
similarty, each layer of the osl model operates independently of all
other layers, while depending on neighboring layers to perform according to
specification while cooperating in the attainment of the overall task of com-
munication between two computers or networks.
The OSI model is neither a protocol nor group of protocols. It is a stan-
d.ardized, empty framework into which protocols can be listed in order to
perform effective LAN analysis and design. As will be seen later in the text,
ño*"t et, the ISO has also produced a set of OSI protocols that correspond to
some of the layers of the OSI model. It is important to differentiate between
the OSI model and OSI protocols.
The OSI model will be used throughout the remainder of the text as the
protocol stacks of various network operating systems are analyzed, and in
the analysis and design of advanced LAN connectivity alternatives.
The ToP-Dorm \'Iodel 2L
TELNET
FTP
Messages TFTP
Application or SMTP
Streams SNMP
CMOT
MIB
lP Diagrams
networked device (I) and the data that came out of that same device (O). By
defining this difference, the processing (P) performed by the device is docu-
mented.
Although at first glance the I-P-O model may seem overly simplistic, it is
another valuable model that can assist network analysts in organizing
thoughts, documenting requirements, and articulating needs.
The business activities listed in Figure 1-11 are more precisely the
informa-
tion systems or networking-relateá business activities identified as possiblr-
and perspectives' Obviousiy' the
suppórting the expressed iusiness needs
defined to include sales, inven-
teiÁUus¡iess qctiaitiescould be more broadly
tory control, marketing, research and development, accoultllg, payroll'
and
,.r.t. tt business activities in these other areás were listed, they shouid still
fulfill one or more of the identified business needs'
In order to ensure consistency within the top-down business model and
compliance of business activities with stated business needs, a
grid such as
thatin Figure L-11 can be employed. For each network-related activity that
check off which strategic
must be sirpported in the eventuál network design,
o
a
o
0)
(d
o
(ú
a o
(ú Y
o
C C)
6)
.E =
b
.9
(d 'o .cq)
o
E a o
o
.= c)
o
to
-E o o
(s -c o
o
c)
E
f p o a
! (ú (ú o o
o
c (s
o oa (d f
lv
o
'E c o ! E
c)
=
c .E 5 o o
c oE o@(ú c)a(ú -o o o
q)
o- o) o
o o c) c) o a o
o o () (ú (ú
a c 5
dJ cú E
É. Ul LU
15
:tg Printers
the
Figure 1-11 Network-related Business Activities should support Busines-'
\eeis
24 Chapter One Local Area Networks: A Business Perspective
User lssues
How many users?
What are their business activiiies?
What is the budgeted cosVuser?
Comprehensive cost of ownershiP?
What are the security needs? (password protection
levels, suPervisor Privileges)
What are the support issues?
Local Communication
Required speed?
Resource Sharing
How many CD-ROMs, printers, modems, and FAXs
are to be shared?
What is the greatest distance from the server to each
service?
File Sharing
ls printer/queue management requ¡red?
How many simultaneous users?
Application Sharing
Wnat ¡s the number and type of required applications?
S
Are E-mail services required?
,t Distributed Data Access
t-
Where will shared data files be stored?
e LAN ManagemenVAdministration
\ Will trainiñg be required to manage the network?
How easy ¡s the network to use?
I- Extended Communication
How many MACs will be part of the network?
o How many mini/mainframe connections are needed?
:o (and what tYPe, lBM, DEC, UNIX based?)
in Will this be an lnter-LAN network? (LAN-LAN
concerns. Which NOS? Must other protocols be
considered? Are the connections local or remote
(long-distance)?)
What are the needs for electronic commerce?
What are the needs for access to/from the
lnternetANorld Wide Web?
n5
he Eigure 1-12 LAN Business Analysis Questions
Perspective
26 Chapter One Local Area Networks: A Business
as necessary' Two
an example. Add, modify'
or d'elete questions from this list are:
r;;"ín;Juuo.rt list of business analysis questions
*y
important things,"
sys-
into the required information
1. The questions should dig deeper
temslrelated business activities'
should provide sufficient insight
as
2. The answers to these questions
toenable *""titgu'tio" of possible technical solutions'
'i*
Eachofthecategoriesofbusinessanalysisquestionsisexplainedbriefly
below.
imple-
key to any successful network
UserIssues User satisfaction is the be thoroughly under-
mentation. I" "'d";;;;;;;u
t"""' ihóir ;e;dá must
qi.*t¡i;ilHo* many users must the network
stood. Bevond,n" lJlt'""t
sur:port?,,arethemoreinsightfulquestionsdealingwithspecificbusiness
iti*t of indii idual users'
".rii
times of day?
1. Do users require large file transfers at certain
the day?
2. Do users process many short transactions throughout day
be done at certain times of
3. Are there certain activities thatmust
of elapsed time?
or within a certain amount
between employees?
How fast must files be transferred
4.
of net-
These questions are important
in.order to establish the amount
levels of secu-
indiviáual users. Required
work communication required by
ritY should also be addressed'
network?
L. Are payroll files going to be accessed via the
security measures
2, \A4ro should have access to these files and what
will ensure authorized access?
project
In some cases, senior management may have an approximate
This accepiable
budget in mind that could be sha"red with nétwork analysts.
user/ serves as a
finaiciat range, sometimes expressed as budgeted cost per
are explored. In this
frame of reférence for analysts as technicaioptions
sense,budgetaryconstraintsareiustanotheroverall'high-levelbusiness
;;J;t p"irp".íirr" that helps to shape eventual networking proposals'
5 and not
Localcommunication Because these are business analysis questions
how fast their net-
technical analysis questions, users really can't be asked
second have little
tly work connections ,r't.rrt U". Éit, p"' '"to'-'d or megabits per
or-rro-"uningformostusers'Ifusershavebusinessactivitiessuchas
or
Manufacturing)
CAD/CAM (Compuier Aided Design/Computer Aided
accessing the network'
other 3-D modeling or graphics softíare that will be
large consumers of net-
)le-
the network analyst rná"td be aware that these are
ier- workbandwidth.
ork Bandwidthrequirementsanalysisaswellasthebandwidthofferedby
the text' It is suffi-
€SS various networking alternatives will be explored later in
business
cient at this point to document those information system+elated
á.iirriti", thai may be large consumers of networking bandwidth'
for
Resouree sharing The resource sharing business analysis questions
LANs are similar to the business analysls questions for peripheral/printe-r
sharing devices outlined previously' It is important
duy to identify which
resources and how *uny uri to be sháred: printers'
modems' faxes' cd-roms;
distance
ur,i ,n" preferred locatións of these shared resources. The required
between shared resources and users can have a bearing on acceptable techni-
net- cal options.
>ecu- versions of soft-
File Sharing and Application Sharing In many tu?9t: l"T?rk
cost less than multiplé individual licenses of the same
ware packáges may
analyst is
,oi*ár" pulkugu fár individual personal computers. The network
that r't'ill
trying at ihis pJir,t to com91l9llisting of all applications Programs
are available in net-
lfes bZ sháred by users. Not ali PC-based áoftware packages
work versións and not all PC-based software packages allow
simultaneous
access by multiPle users.
to perfLlrr1
1. Which programs or software packages will users need
l their jobs?
2. \zVhich programs are they currently using?
arched 3. Which new products must be purchased?
; oi the
ha-'been !tr¡nplieted'
orking Once a list of required shared application programs
or the net-
reports it is important to investigate both ihe availabilit]- and capabi'i¡'
producti'e
rr man- work versions of these [rogru*, in order to err<u¡e -ati-.ried.
l finan- users and the successful áttainment of business needs'
28 Chapter One Local Area Networks: A Business Perspective
ErtendedConrmunicationsTheabilityofcertainlocalareanetworkingsolu-
area network remains a key differen-
tions to .o-*rr.i.J" U"yo'ra the loóal
alternatives Y:": should be able
tiating fucto, u,oon!';".j;:;;*"tri"g
tevond the LAN' The accomplish-
to articulate connectivity requirements
of the network analyst'
ment of these requir"-""t' is tne 1oU
ár communications might include
Some possibb';;;;ú; il""q"a
communicatio,'" to á"oiñer LAN' In
this case' the network analyst must
LAN in order to
investigate th"-¿;nlll.ut specifications of this target compati-
"ll "f local LAN' An example^of such a
determine compatiüility *itr't
'f'tá an Apple N'iAC network to a PC-
bilitv issue would be the need to connect
local (within the s19e building) or
il,Ju ""?*;;i. ril;;;l"ir-Áx may be world)' LAN to LAN connection is
remote (across to*''' o? around the
studied in depth in Chapter L3.
known as internetw;;kid and will be hás led to a tremendous
The explosive growtñ of mobile computing home'
corporate infoimation systems from
need. for users to ue able to access willbe explored
hotels, and even uirplarrer. nemote
computing
automobiles,
in dePthin CHrt::tii be the necessity for
extended communications may
LANuserstogainaccesstominicomputersormainfrámes,eitherlocallyor to' and
remotely. eguh1, ;;*;*" o"ty u't'"d-inot they need connectionsjob to figure
where tltose.or^,,'J¡.,, must óccur;
it is the network analyst's
function'
otfihowto make those connections
IANNlanagementandAtlministrationAnotherkeydifferentiatingfactor
among lnN atternail""' i' tn" level
of sophisticatiol l:q"it"d to manage
and administer ihe network. If the
L,{N ,"qnit"r a full-time, highly trained
manager, rnu",nui'
shouldte considered as palt of the pur-
"^ug"';ttulury cost of the proposed
chase cost u, *ufiurine Sp"rutionut lAN
the users may have requirementJ for certain management or
Second,
bL present ly*pl": light be'user-ID
administratior-t f*1t'"' tliat must
of átc"ss to files or user directories'
creation o, *u"^-g"*i""'-tt, o' to''ttot
Getting Started with Business-Oriented LAN Analysis
ar-ld Design 29
.,.:t:a::,
ACCURATE AND CONIPTETE BUDGETS
ARE A MUST
?
n DetailedandaccuratecostprojectionisaVelyimportantskillfornelrr-ork
of a financial nature
.-q :':lPr:ádlcal Advice analysts. Management does nót appreciate surprises
a f.:ráliil Information due to unanticiPated costs' it is
re In order to ensure that all necessary costs have been determined, user,
generators). Thorough
!o essential to identify all user needs (the cost
needs identification is the goal of the business lnalysis questions Phase ot
0f the top-down model.
n-
immediate in nature'
IIS Anticipated Growth Is Ke,v User needs are not always
These needs can vary dramutically over time.
In order to design networking
;ia
Ia- solutionsthatwiltnotbecomeobsoleteinthenearfuture,itisessentialto
anticipated growth in user demands might be'
m5 ;;; ; ,"rrr" of whatofthe to manage-
ich i-ugin" the chagrin the network analyst who must explain
cannot be expanded and
ment that the network which was installeá last year
,""tt Uu replaced due to unanticipated growth of network demand' networking
¡lu- one method of gaining the neceséary insight into.future
set of busi-
€n- ,"qrrir"-".tts (illustra'ted iJrigure 1'-12), .i; to ask users the to three years
same
two
rble ."á, u.ulysls questions with irojected time horizons of
Lsh- and five y"urr. kt.r"dible as ii may seem' five years is about the maximum
iif",t*" for a given neiwork architecture or design. Of course,
;;#ili necessary information or
ude there are exceptions. Eniusers may not}rave the
be very helpful in
nust üo-f"ag" to make inur" pto¡""tions' Management can if the com-
lr to in" ur.u íf projected gro*tir urrd ir-rfor*utionál needs, especially
irr lr-ry sort of formalized strategic planning methodology'
fati- O""t n* "rigug"a
PC'
g) or
¡n is
The Logical Netw-ork Design
,dous
[ome/ At this point, a network analyst slroul{. n1v9 a fairly clear picture of the busi-
,1,ored
nessnetworkingrequire-"''tt'identifiedthroughtheuseofthetop-down
model. Because t".h";1";t-specific issues have
iotbeen covered as yet'only
have been discussed. All
tr- for the logical or functionaillp"'.r, of network design
and software considera-
úh or of the numerorm ut.t ir"ctüre, topology, hardwaie'
of the text'
¡. and iions will Ue explored in the remaining chapters
tigure As each area of ,re* t"chnotogy áltert-rutives is discussed, that technol-
ogy *ni.n meets logical networkáesign requireT"."q
*i+,!: l"""stigaied
for possible iicl.rsio.r in a physi-cal neiwork design. The physical nei-
i.|in", technology that
tactor
work design is a map of the actual irardware and software
mnage
gui;-i-pf";ented and through which the data physicallyflow-,tl: remainder
úained As physical network aeJlgn alternatives aie óxplored i"
pur- and determined in this chap-
of the text, the business requirám"r-rts analyzed
he
philosoph;" of the tcp-
ter will be referenced less'frequently. If tire overall
nent or logical nehvork desisr
down model has been adheredto, tkre now complete
u-ser-ID
shouldensuleachievementoftheagreed-uponbusinesslar-errequire...e:.:s
s.
t
KeY Question
What do we hoPe to accomPlish?
FigureT-l3PhysicalandLogicalNetworkDesignsSupporiBusinessRequirements
Itshouidfollowthen,asFigurel-l3illustrates,thataslongasthe-physical
network a"rij" (Technolo[y layer) supports the logical network
deslgn
the íád i-pl"me"t"d network should support the
(Networkffirj, tn""
strategic business tequirements-lthe ultimate goal of the top-down
approach to LAN analysis and design'
assure that the implemented physical net- nication, either the OSI model or the Internet
work design will support strategic business suite of protocols model (TCP/iP modelr
objectives. In order to apply some structure to should óff"t u suitable framework for r-erifi-
thé analysis of complex internetwork commu- able analysis and design.
I{EYTARMS
rsical REYIEW.QUBSTIONS
esign
rt the l4 In simple terms, what is the difference
1. What is a loca1 area network?
betweén an operating system and a network
Con'n 2. What are the advantages of a local area net-
work as opposed to a group of stand-alone operating sYstem?
PCs?
15. What other'technology must a NIC be able to
interface with in a compatible fashion?
3. What are the potentiai disadvantages or nega-
ti.ve aspects of a locai area network?
76 What other technology must a hub be able to
interface with in a compatible fashion?
4. How would a business know when it needed
17. What is the function of a client PC operating
a LAN?
system?
5. What are the most popular business uses of a
18. Whut it the function of a client PC network
LAN?
6. What i.s the difference between file transfer operating sYstem?
19. Fiow do ilient and server versions of the
and file sharing?
same network operating system differ?
ts rvill What types of hardware and software tech-
20. What is the difference in terms of usage and
¡ther nology áre required to support fiie sharjnS?-
function between client and server PCs?
8. Whai resourcés other than printers are LAN-
Llvsis 21 What other technology must network media
attached comPuters likely to want to share?
3-te be able to interface with in a compatible fash-
ities
9. What is meant by the term media-sharing ion?
LAN?
¡rtt- 22. Why is it i.mportant for a network analyst to
10. Are all LANs media-sharing LANs? Explain'
understand. management's business needs
11. Simply speaking, what hardware and soft-
and perspectives?
net- ware iechnology components are required to
; implement a LAN? 2.1, What are some examples of management
business needs and PersPectives?
itul 12. What is the function of a network interface aÁ Give examples of the potential impact t'i
card?
3n management's business needs a¡t1 p-1s::'-
associ- i3. What is the function of a hub or wiring cen-
tives on network anah'sis and ¡i'es-='
should ter?
JZ Chapter One Local Area Networks: A Business Perspective
{CTIAUBS
CÁSE..STUDY
net, saYs Glen BarrY, Project The software distribution GI\¡ING UPS A BOOST
ieader of the Tivoli imPle- function fits into the Tivoli
EnterPrise framework, which Other functions in the ll;-::':¿-
n"Lentation at UPS'
unitei manY network and sYs- work that L IS u-e: ::"-' -'-=
"We would create more
tems management features monitoring serr''¿l: :: l:
rhan 1,000 uPgrade CDs, send man\' :ltes. : ::' :
rnd
ihem to regional tech suPPort'
under a common umbrella'
34 Chapter One Local Area \etu-orks: A Business Perspective
UPS' technical suPPort staff n't completed until August tion by 2004.
also uses Tivoli's remote con- 1998.
,,Managing the Tightest ship in the shipping Biz," Netzoork world, vol. 76, no' 19 (May 10, 1999)' p' 57'
source: Jeffcaruso,
Copyright Network World. Reprinted with permission'
of com-
but 3. What are some of the different types
A
What is the alternative to the all-inclusive puting Platforms used bY UPS?
expensive frameworks? 'Cun tfi"y allbe monitotéd fto^ a single appii-
that UPS is 4.
5. What are some new applications cation?
i.*"ai"g to use the Tivoli framework for?
TechnologY
Data What was the key function of the
network
cul- 1.
1. What key functionalities are not being - *u.ug"*..tt framework that UPS was most
UPS to upgrade?
.""iit ".rt,, thereby forcing interested in?
:
2. Whai are Point Products?
in the 2. Wnut *ut the traditional negative
opinign
; á,. Wh;i ;*;"t"" of tt"tu other functions about enterprise network management frame-
I framework used bY UPS? works?
-
Network 3. iiiá Üps agree or disagree with this traditional
b.
1. What type of network is used for
the electronic view? WhY or whY not?
d
software distribution?
5 2. V\rhat operating system was the
software
ty installed on?
fo
ce
Lts
1.
úh
to
[or
ta-
51.
rhit
I
iiare
nan-
ñ
I
Eon
ion
2
k aP-
É:nt