Wednesday, June 2, 2010

Network Design












As a Network Administrator, helpdesk tech, or other computer professional, you don't remove that many viruses. Most company networks are secure enough that viruses are not really an issue. The issue is when friends, family and people from work get viruses in their home computers. There are so many request for virus removal that it is easy to be desensitized. I am as guilty as anyone when someone asks for help and I tell them they should take their computer to the Geek Squad, or Nerd Herd. There are literally thousands of viruses, and unless you are a professional virus expert it is impossible to keep up with all the removals. So, listed below are some popular virus removal tools and programs


Network Design
Design considerations for computer networks cover a wide range of topics including layout, capacity planning, and security.
OSI Model (4) Network Protocols (36) Area Networks (6) Network Certifications (8) Cisco Networking (7) Network Software (28) Information Technology (51) Network Storage (10)
Network TopologiesCommon network topologies include the bus topology, star, and ring. Learn more about these and other topologies in computer network design.
Visual Overview of the OSI ModelThe OSI model provides a good conceptual framework for understanding the implementation of network protocol and services design. This page explains the OSI model through visual illustration.
Introduction to Area NetworksBesides LANs and WANs, other types of area networks like MAN and SAN also exist. Discover all the different forms of area networks and the roles they play in network design.
Network Design - Bandwidth and LatencyTwo critical elements of network design are the bandwidth and latency a network supports.
Network GatewayA network gateway joins two networks together through a combination of hardware and software.
QoS - Quality of ServiceQoS technologies support levels of predictable performance for network systems. Elements of QoS include availability (uptime), bandwidth (throughput), latency (delay), and error rate.
The 5-4-3-2-1 Rule of Network DesignThis rule of thumb proves useful especially when planning a business network layout.
PAN - Personal Area NetworkA personal area network (PAN) is a computer network organized around an individual person. Personal area networks typically include a mobile computer, a cell phone and/or a handheld computing device such as a PDA.
Symmetric and Asymmetric NetworkingIn a symmetric network, all devices normally can transmit and receive data at equal rates, whereas asymmetric networks support disproportianately more bandwidth in one direction than the other. Symmetric and asymmetric network designs also pertain to management of resources as in P2P and network encryption architectures.
Computer Network Topology DiagramsA computer network topology is the physical communication scheme used by connected devices. These pages illustrate the common computer network topologies with diagrams including bus, ring and star topology diagrams.


firewalling and filtering
connection sharing
caching
The features of proxy servers are especially important on larger networks like corporate intranets and ISP networks. The more users on a LAN and the more critical the need for data privacy, the greater the need for proxy server functionality.
Proxy Servers, Firewalling and Filtering
Proxy servers work at the Application layer, layer 7 of the OSI model. They aren't as popular as ordinary firewalls that work at lower layers and support application-independent filtering. Proxy servers are also more difficult to install and maintain than firewalls, as proxy functionality for each application protocol like HTTP, SMTP, or SOCKS must be configured individually. However, a properly configured proxy server improves network security and performance. Proxies have capability that ordinary firewalls simply cannot provide.
Some network administrators deploy both firewalls and proxy servers to work in tandem. To do this, they install both firewall and proxy server software on a server gateway.
Because they function at the OSI Application layer, the filtering capability of proxy servers is relatively intelligent compared to that of ordinary routers. For example, proxy Web servers can check the URL of outgoing requests for Web pages by inspecting HTTP GET and POST messages. Using this feature, network administrators can bar access to illegal domains but allow access to other sites. Ordinary firewalls, in contrast, cannot see Web domain names inside those messages. Likewise for incoming data traffic, ordinary routers can filter by port number or network address, but proxy servers can also filter based on application content inside the messages.
Connection Sharing with Proxy ServersVarious software products for connection sharing on small home networks have appeared in recent years. In medium- and large-sized networks, however, actual proxy servers offer a more scalable and cost-effective alternative for shared Internet access. Rather than give each client computer a direct Internet connection, all internal connections can be funneled through one or more proxies that in turn connect to the outside.
Proxy Servers and CachingThe caching of Web pages by proxy servers can improve a network's "quality of service" in three ways. First, caching may conserve bandwidth on the network, increasing scalability. Next, caching can improve response time experienced by clients. With an HTTP proxy cache, for example, Web pages can load more quickly into the browser. Finally, proxy server caches increase availability. Web pages or other files in the cache remain accessible even if the original source or an intermediate network link goes offline.