1. OSI model network - 2. Model TCP/IP - 3. Types of connected computers - 4. Types of servers - 5. Characteristic of a network - 6. Safety and administration
Before talking of network infrastructures, let's take a few theoretical basics about computer networks in general. A networks able to share resources between computers: data or peripheral (printer, Internet connection, tape backup, scanner,...). As this course is typically hardware, I only see that the hardware aspect. The other parts of a network are included in other courses, including 'Bases networks', "Introduction to LINUX and; UNIX systems", "Software systems",...
Information transfers between two computer on 2 different network equipment is based on two theoretical models: the OSI model or TCP/IP model. These two models are more theoretical and practical. Each includes multiple layers and each layer must send (receive to the other computer) a comprehensible message by both parties. Next chapter (transmission network bases) will address in detail of the communication.
OSI Model (Open System Interconnection) defined in 1977 regulates the communication between 2 computer systems according to 7 levels. At each level, the communication between the two systems must be "compatible". In network hardware, we use only the lower layers to level 3. These levels are also called layers.
The OSI model defines 7 different levels for data transports. These levels are also called layers.
Application |
ß |
Application level | 7 | Application level | Ý | |
ß | Presentation level | 6 | Presentation level | Ý | ||
ß | Session level | 5 | Session level | Ý | ||
Data transmission |
ß | level Transport | 4 | level Transport | Ý | |
ß | level Network | 3 | level Network | Ý | Package |
|
ß | level data link | 2 | level data link | Ý | Trame |
|
Þ | Physical Layer | 1 | Physical Layer | Þ | ||
Support of communication |
At each of these levels of the OSI model, it encapsulates a header and an end of frame (message) that contains the necessary information according to the rules defined by the employee network protocol. The Protocol is the language of communication (formatting) used for the transfer of data (currently TCP/IP but others were used as (prior to Windows 98) NetBeui, Novell IPX,...). In the graph below, the part that is added to each layer is on a white background. The shaded part is obtained after encapsulation (integration) of the previous level. The last frame that is obtained after having wrapped the physical layer, is one that will be sent over the network.
In this course, only the first three levels of the OSI model (up to top of the range switch and routers) are used, possibly up to level 4 for certain managed switches and firewall. The upper layers are reserved for other courses of technician training PC / network, including basic network and TCP/IP protocol.
The TCP/IP model is inspired by the OSI model: it takes modular approach but reduced the number to four. The three layers of the OSI model are often used by an application. This is not the case of the TCP/IP model. It is currently the most used theoretical model.
Protocols used |
Model TCP/IP |
OSI model |
level application |
level application |
|
level Presentation |
||
level session |
||
TCP/UDP |
level Transport |
level transport |
IP / ARP / ICMP / RARP / IGMP |
level Internet (IP) |
level network |
Access network sleep |
level Data link |
|
Physical Layer |
Again, is added to each level a header, the names of the data packets change each time:
The layers of the TCP/IP model are more general than those of the OSI model
Application Layer includes the standards applications of the network:
and some others less current.
The transport layer allows the transfer of data and controls that allow to check the State of the transmission.
The following layers protocols to send data from the application layer. It does not actually define software that communicate, but port numbers associated with the type of application (number ranging from 0 to 65535 - 216). For example, Internet browsing uses TCP port 80, the https-443, FTP uses 21...
The transport layer handles 2 protocols of transport of information, regardless of the type of network being used:
These two types (connection-oriented or not) are a term used for the firewall. If you close a TCP port, sending a message returns no signal back (acknowledge), believing that the IP is free, not in use. UDP on the other hand, a port closed returns no information, believing a used IP address. The UDP protocol only returns a message if the port is in error (not responding).
The INTERNET layer is responsible for providing the data packet. It defines the datagrams and manages the fragmentation - reconstruction of the segments.
The Internet layer uses 5 protocols, only the first 3 are important:
The layer Access network specifies the form in which the data must be transmitted. It deals with the following concepts:
A network makes it possible to connect computers between-them whatever the type (PC, Mac, Main Frames, ...) to share resources.
Two types of computers connected on the network are used: servers and stations (clients). The servers share their resources (files, storage, printer, ...). The clients use these shared resources.
One distinguishes three types of networks:
The costs and difficulties of implementation, security and management are proportional. We see that the facilities, Peer To Peer, server considerations or Wan are determined by the operating system and use, not by the network hardware.
In the preceding chapter, we talked about servers in the broad sense. In IT, there are three types of servers:
In practice, a server often contains three applications.
Local networks are complex infrastructures, not just the cables between workstations. If one enumerates the list of the components of a local area network, we will be surprised to find a larger than expected amount:
One of the important aspect of a local computer network is the centralization of the data administration. This allows to backup and secure the data on a single machine. Safety takes a set of measures against intrusions and viruses, the management of privileges and access rights, the daily backup of data, redundant equipment failure... There are no ideal solutions for the security of networks (and computer security in General). Three solutions are possible: hardware-based solutions as we will see, solutions based on Linux and Windows-based solutions or programs added on to these Windows workstations. The mix of several solutions is possible in some cases. Some solutions are complementary. On a big "sensitive" network, put a hardware VPN is not enough. A complementary software security including access controls to the administration server (server, folder, access rights) level and software safety checking traffic on the internal network is not superfluous.
Depending on applications, desired level of security, number of computers,... and budgets, the design of the network will use a hardware or software solution or a combination of these solutions. Other management networks (software) programs to manage traffic, users... Clearly, by hardware, you can block complete access to a server, by software, allow only a part of the resources of a server. Access rights solutions often integrate the two.
In relation: