0% found this document useful (0 votes)
27 views

Assignment It Infrastructure

The document discusses several key concepts related to networking: - The major building blocks of networks are workstations, network applications, the type of network (LAN, WAN, etc.), servers, routers, and switches. These components work together to allow devices to connect and share information and resources. - Network availability measures the percentage of time a network is operational over a given period. It is calculated by dividing network uptime by total time. High availability networks aim for 99.999% uptime. - Network performance is evaluated based on parameters like bandwidth, throughput, latency, packet loss, and jitter which measure how quickly and reliably data moves through a network. Ensuring high performance is important for network users

Uploaded by

Muhammad Ramzan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Assignment It Infrastructure

The document discusses several key concepts related to networking: - The major building blocks of networks are workstations, network applications, the type of network (LAN, WAN, etc.), servers, routers, and switches. These components work together to allow devices to connect and share information and resources. - Network availability measures the percentage of time a network is operational over a given period. It is calculated by dividing network uptime by total time. High availability networks aim for 99.999% uptime. - Network performance is evaluated based on parameters like bandwidth, throughput, latency, packet loss, and jitter which measure how quickly and reliably data moves through a network. Ensuring high performance is important for network users

Uploaded by

Muhammad Ramzan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Networking

 The action or process of interacting with others to exchange


information and develop professional or social contacts.
 The linking of computers to allow them to operate interactively.
 Networking is the process of making connections and building
relationships. These connections can provide you with advice and
contacts, which can help you make informed career decisions.
 Networking is the exchange of information and ideas among
people with a common profession or special interest, usually in an
informal social setting.

Networking Building Blocks

Over the past twenty years, the use of the internet and other digital
networks has grown exponentially around the world. Although to some
it may seem complex, these networks are relatively simple and made
up of only a few parts. The major networking building blocks are:

 Workstations
 Network applications
 The type of network
 Servers
 Routers
 Switches
Workstations: There must be workstations for a network to be
present. Workstations include laptops, desktop computers,
tablets, phones, or any other device made to connect to a
network and do tasks.

Network Applications: Network applications are programs and


resources that can be shared through the network.Applications can be
shared with everybody or have restrictions placed on them so only a
few people can access them.Without applications, there would be little
need for a network to exist.

The Type of network: The two most common types of networks are
Local Area Networks (LAN) and Wide Area Networks (WAN). Other
types of networks include Metropolitan Area Networks (MAN),
Storage Area Networks (SAN), Campus or Controller Area Networks
(CAN) and Personal Area Networks (PAN). Networks typically require a
hardwire connection, but there are also wireless networks available for
people to connect to.

Servers:  A server is a computer program or a device that provides


functionality for called clients which are other programs or devices. This
architecture is called the client–server model. 

Routers: A Router is a networking device that forwards data packets


between computer networks. By sending data packets to their intended
IP addresses, it manages traffic between different networks and
permits several devices to share an Internet connection.

Switches: Switches are key building blocks for any network. They


connect multiple devices, such as computers, wireless access points,
printers, and servers; on the same network within a building or campus.
A switch enables connected devices to share information and talk to
each other.
Network Availability
What is network availability?
Network availability is the amount of uptime in a network system over
a specific time interval. Uptime refers to the amount of time a network
is fully operational. Network availability is measured as a percentage
and is monitored to ensure the network runs consistently for end users.

Network professionals typically record availability in a proactive


manner with real-time network performance monitoring tools. This
approach helps networking professionals catch pauses in availability as
soon as they occur. Additionally, most networks provide users with
reactive availability tools that permit them to submit support tickets
when the network becomes unavailable.

How to measure network availability


Network availability is measured as the percentage of time a system
stays fully operational over a period of time.

The formula for availability is equivalent to the uptime divided by the


total time, where the total time is uptime plus downtime. Measured
downtime includes all times where the network system is down, such
as during maintenance, unplanned failures or the time it takes for a
system to recover.

Network professionals aim to achieve 100% availability, which is when a


network system is fully operational and available for its entire
runtime. High availability typically strives for 99.999%, also known
as five-nines availability.
Question :A Fibre Channel switch has eight ports and all ports must be
operational 24x7. However, a failure of Port
5 occurs on a particular week as follows:

• Monday = 11 AM to 12 PM
• Thursday = 7 AM to 11 AM
• Saturday = 11 AM to 1 PM
What is the availability of Port 5 in that week?

Explanation :

We have the formula

Network availability = uptime / totaltime

totaltime= downtime + uptime

So from the given data , Downtime :

For Monday :1 Hr

For Thursday : 4 Hr

For Saturday : 2 Hr

Total downtime = 1 + 4+2 =7Hr


Now, Uptime:

For the Monday : 24 hrs — 1 hr = 23Hr

similarly for Thursday : 20 Hr

For Saturday : 22 Hr

So, total uptime = 23+20+22 + 96= 161 Hrs

Reason for 96 Hrs : notice that according to the data no downtime was
mentioned on the other 4 days of the week, so we consider all 24 Hrs of
a day as uptime only.

Total time will be : 7 Hr + 161 Hr = 168 Hrs

Using the formula from above ,

Network availability = 161/ 168 = 0.95833333


Network availability = 0.95833333*100=95.8%

Network Performance
Network performance refers to measures of service quality of a
network as seen by the customer.
There are many different ways to measure the performance of a
network, as each network is different in nature and design. 
How to measure network performance?
The following parameters are used to measure Network Performance :
 Bandwidth
 Throughput
 Latency
 Packet Loss
 Jitter
Bandwidhth: The amount of data or information that can be
transmitted in a given amount of time is referred to as bandwidth. The
bandwidth of digital devices is measured in bits per second (bps) or
bytes per second (bps). The bandwidth of analog devices is measured in
cycles per second, or Hertz (Hz).
Throughput: The number of messages successfully delivered per unit
time is referred to as throughput.
Latency: Latency is simply the time it takes for data to travel from one
designated location to another regarding network performance
evaluation. The term "delay" is sometimes used to describe this
attribute. The latency of a network should be as low as possible.
Packet Loss: Packet loss refers to the number of packets that fail to
transfer from one destination to another regarding network
performance measurement. This statistic can be measured by recording
traffic data on both ends and then identifying lost packets and packet
retransmission.
Jitter: The variance in time delay for data packets carried over a
network is known as jitter.
Network Security
Network security is a set of technologies that protects the usability and
integrity of a company’s infrastructure by preventing the entry or
proliferation within a network of a wide variety of potential threats.
What are the different types of network security devices and
tools?
There are quite a few different networking security tools you can
incorporate into your line-up of services. The following list is by no
means exhaustive, but available security tools can include:

Firewalls:Firewalls are common element of a network security model.


They essentially function as a gatekeeper between a network and the
wider internet. Firewalls filter incoming and, in some cases, outgoing
traffic by comparing data packets against predefined rules and policies,
thereby preventing threats from accessing the network.

Mobile device security: The vast majority of us have mobile devices


that carry some form of personal or sensitive data we would like to
keep protected. This is a fact that hackers are aware of and can easily
take advantage of. Implementing mobile device security measures can
limit device access to a network, which is a necessary step to ensuring
network traffic stays private and doesn’t leak out through vulnerable
mobile connections.

Data loss prevention: Data loss prevention (DLP) technologies are


those that prevent an organization’s employees from sharing valuable
company information or sensitive data—whether unwittingly or with ill
intent—outside the network. DLP technologies can prevent actions that
could potentially expose data to bad actors outside the networking
environment, such as uploading and downloading files, forwarding
messages, or printing.

Access control: This refers to controlling which users have access to


the network or especially sensitive sections of the network. Using
security policies, you can restrict network access to only recognized
users and devices or grant limited access to noncompliant devices or
guest users.

What are the principles of network security?


There are three principles within the concept of network security—
confidentiality, integrity, and availability—which together are
sometimes referred to as the “CIA triad.”

 Confidentiality makes sure that only authorized personnel are given access or


permission to modify data.
 Integrity helps maintain the trustworthiness of data by having it in the correct
state and immune to any improper modifications.
 Availability means that the authorized users should be able to access data
whenever required.

You might also like