You are on page 1of 27

Homework of:

Computer networks.

Present by:
Edison Alexander Taborda Rueda.
Nikol Dayanna Castao Zuluaga.
Richar Fabin Zuluaga Lpez.
Lizet Natalia Vlez Villa.

Instructor:
Andrs Mauricio Clavijo.

Grade:
10-

Juan de Dios Girn Educational Institution.

La Unin Valle.
November 04th 2015

Content:
1. Computer networks.
1.1 Basic components of the networks.
1.2.1 Software
1.2.2 Hardware
1.2.3 End-user devices.
2. Servers.
2.1 Servidor file.
2.2 Servidor print.
2.3 Servidor email.
2.4 Servidor fax.
2.5 Servidor telephony.
2.6 Servidor proxy.
2.7 Servidor remote access.
2.8 Service web.
2.9 Service streaming.
2.10 Service booking.
2.11 Service authentication.
2.13 For network services.
2.14 Servitor database.
2.15 Servitor application.
2.16 Services monitoring and management.
3 networked storage.
4. Networking protocols.

5. Classification of RESDES.
5.1. Medios guided.
5.1.1. Cable twisted pair.
5.1.2. Coaxial cable.
5.1.3. Optic fiber.
5.2. Medios unguided.
5.2.1 Red radio.
5.2.2 Infrared network.
5.2.3 Microwave network.
5.3 functional relationships.
5.4 technologies.
5.5. for physical topology.
5.6. for directionality of data.
5.7 For degree of authentication.
5.8. by degree of diffusion.
5.9. for service or function.
6. PAN network.
7. Red WPAN.
8. Red LAN.
9. Red WLAN.
10. CAN network.
11. MAN network.
12. WAN.
13. Red SAN.

14. VLAN.

Introduction:

The next job is to publicize the computer networks and everything about them. Information
you need to know to be part of the mode of institution.

Computer networks.

A computer network also called computer network, data communications network or


computer network is a set of computer software and connected together by means of
physical devices that send and receive electrical signals, electromagnetic waves or any
other means of transport data, in order to share information, resources and deliver
services.
The structure and mode of operation of existing computer networks are defined in various
standards, the most important and widespread of all the TCP / IP model based on the OSI
reference model. The latter network structures every seven layers with specific functions
but interrelated; TCP / IP are reduced to four layers.
Communication through a network is carried out in two different categories: the physical
layer and logical layer.
The physical layer includes all the elements that use a computer to communicate with
other computers in the network, for example, network cards, cables, antennas, etc.
The communication through the physical layer is governed by very rudimentary rules
themselves are of little use. However, using these rules is possible to construct so-called
protocols, which are more complex communication standards (better known as high level),
able to provide services that are useful.
The protocols are very similar to the language of the people concept. If two people speak
the same language, you can communicate and convey ideas.
The most important reason (maybe the only) about why there is differentiation between
physics and layer logic is simple: when there is a division between the two, you can use an
almost infinite number of different protocols, making it easy to upgrade and migration
between different technologies.

Basic components of the networks:


Hardware, software and protocols: to form a network elements are required. The physical
elements are classified into two groups: end-user devices (hosts) and network devices.
The end-user devices include computers, printers, scanners, and other elements that
provide services directly to the user and the latter are those that connect to end-user
devices, allowing intercommunication.

The purpose of a network is to interconnect the hardware components of a network, and


therefore mainly individual computers, also called hosts, teams that make services on the
network, servers, using the wiring or wireless technology supported by the electronic
network and linked by cable or radio frequency. In all cases the network card can be
considered the main item; it is part of a computer, a switch, a printer, etc. and be it
technology (Ethernet, Wi-Fi, Bluetooth, etc.)

Software:
Network operating system: allows the interconnection of computers to access services and
resources. Like a computer can not work without an operating system, a computer network
can not function without a network operating system. In many cases the network operating
system is part of the system of servers and clients.
Application Software: ultimately, all the elements are used for the user of each season, to
use its programs and specific files. This software can be as wide as needed and may
include processors, integrated packages, administrative accounting systems and related
areas, specialized systems, emails, etc. The right software in the network operating
system chosen and the necessary protocols allow servers to create services that are
needed.

Hardware:
To achieve the link between computers and transmission media (cable network or physical
means for wired and infrared or radio networks to wireless networks), the intervention of a
network card (NIC Network Interface Card) is needed with which can send and receive
data packets to and from other computers, using a communication protocol for converting
that data to a format that can be transmitted in the middle (bits, zeros and ones). Note that
each network card is assigned a unique identifier by its manufacturer, known as MAC
(Media Access Control), which consists of 48 bits (6 bytes) direction. This identifier allows
traffic route network data from sender to receiver proper.
The work of the network adapter is to convert electrical signals traveling through the cable
(eg Ethernet) or radio waves (eg Wi-Fi) in a signal that the computer can interpret.
These adapters are some PCI cards that plug into the expansion slots of the computer. In
the case of laptops, these cards come in PCMCIA or similar format. In the twenty-first
century computers, both desktops and laptops, these cards are already integrated into the
motherboard.
Network adapter is the generic name given to the devices that perform the conversion.
This means that these adapters may be either Ethernet, wireless as well as other types

such as optical fiber, coaxial, etc. Also available speeds vary with the type of adapter;
these may be, Ethernet, 10, 100, 1000 or 10000 Mbps, and wireless mainly 11, 54, 300
Mbps.

End-user devices.
Personal computers: are the usual working places of the networks. Within the category of
computers, personal computers, and more specifically, it is gathered all used for different
functions, according to the work they do. They range from the powerful work for editing
video, for example, to light portable computers known as netbooks, whose primary
function is to browse the Internet. The tablets became popular at the end of the first
decade of the century, especially by the success of Apple's iPad.
Terminal: many networks use this type of equipment instead of jobs for data entry. These
data are displayed only or introduced. Such terminals, working together with a server,
which is who actually processes the data and sends data screens to terminals.

Household Electronics: network cards began to be integrated, as usual, from the first
decade of the century, in many common household items: televisions, multimedia
computers, projectors, game consoles, cell phones, e-books, etc. and even in appliances
such as refrigerators, making parts of the networks with computers traditions.
Printers: Many of these devices are able to act as part of a computer network without any
other element, such as a print server acting as an intermediary between the printer and the
device is requesting a print job to be finished. The means of connectivity of these devices
can be wired or wireless, within the latter can be via Ethernet, Wi-Fi, infrared or bluetooth.
In some cases they are integrated into the printer and others through external converters.
Other elements: scanners, CD-ROM.

Servers
Computers are available to customers different services. The following list are some
common types of servers and their purposes:

File server: stores various types of file and distributed to other clients on the
network. They can be served in different format according to the service provided
and the average FTP, HTTP, etc.
Print Server: controlling one or more printers and accepts print jobs from other
clients on the network, queuing print jobs (though you can also change the priority
of different prints), and performing most or all other functions on a workstation

would be made to achieve a print job if the printer was directly connected to the
printer port of the workstation.
Mail Server: stores, sends, receives, en route and perform other operations related
to e-mail (e-mail) for network clients.
Fax Server: stores, sends, receive, en route and perform other functions necessary
for the transmission, reception and appropriate distribution of faxes to and / or from
a computer or a physical fax device.
Telephony Server: Performs functions related to the phone, as is voicemail,
performing the functions of an interactive system for voice response, storing voice
messages, routing calls and also controlling the network or Internet, etc. They can
operate with analog or IP telephony.
Proxy: takes a certain type of functions on behalf of other clients on the network to
increase the performance of certain operations (eg Prefetching and upload
documents or other data requested very often.). Also "serves" security; that is, it
has a firewall (firewall). It enables you to manage Internet access in a computer
network allowing or denying access to different Web sites based on content, origin /
destination, user, schedule, etc.
Remote Access Server (Remote Access Service, RAS) modem control lines or
other communication channels to network requests a remote location connected to
the network answer incoming phone calls or acknowledge the request of the
network and perform the necessary safety checks and other procedures required to
register a user on the network. Their inputs to establish virtual private networks
(VPN).
Web Server: stores HTML documents, images, text files, scripts, and other web
material composed of data (usually called content), and distributing content to
customers who ask on the network.
Streaming server: distributed multimedia servers continuously avoiding the user to
wait for the complete download the file. This will be distributed within content type,
video, etc. in real time and without delay.
Backup Server (standby server): is the backup software of the installed network
and has large amounts of network storage on hard drives or other storage available
to be used in order to ensure that the loss a main server does not affect the
network.

Authentication Server: is responsible for verifying that a user can connect to the
network at any point of access, either wired or wireless, based on the 802.1x
standard can be a RADIUS server type.
Servers for network services: These teams manage those services necessary own
network without which they could not interconnect, at least easily.

Database Server: store information used by applications of all kinds, keeping it


orderly and classified and can be retrieved at any time based on a specific query.
Application server: running certain applications. Usually it is a software device that
provides application services to client computers.
Server monitoring and management: help simplify the tasks of control, monitoring,
trouble shooting, troubleshooting, etc. They allow, for example, centralizing the
receipt of warning messages, alarm and information emitted by different network
elements (not only the servers themselves).

Network Storage
In the medium and large networks of primary data storage it does not occur on the
servers themselves but external, known devices such as disk arrays (disk arrays)
interconnected, usually SAN or network-attached storage (NAS) type networks are
used. These means to centralize information, better management of space,
redundant systems and high availability.
The backup media are often included in the same network where the storage
media mentioned above are housed, thus transferring data between them, both
when backing as possible restorations are produced within this network without
affect customer traffic to servers or between them.
Network Devices:
The computer equipment described in need of a technology that forms the network
in question. Depending on requirements must select the right elements to complete
the system. For example, if we want to join teams including an office must connect
through a switch or hub, if there are also several laptops with network cards Wi-Fi
must connect a wireless access point to pick up their signals and can send that
apply to them, turn the access point is connected to the switch by a cable. If they
all should have access to Internet, to interconnect via a router, it could be ADSL,
Ethernet over fiber, broadband, etc.
The elements of the electronic network most common are:
Network switch.
Router.
Network Bridge.
Bridge and router network.
Wireless Access Point Wireless Access Point (WAP).

Network Protocols

There are various protocols, standards and models that determine the overall
operation of the networks. Highlights include the OSI model and TCP / IP. Each
model structure of a network operating differently. The OSI model has seven layers
very defined and differentiated functions and the TCP / IP with four distinct layers
but combine existing functions in the seven layers of the model OSI.3 protocols are
distributed by the different layers but are not defined as part of the model itself but
as different entities of international regulations, so that the OSI model can not be
considered architecture red.
OSI Model
The OSI (Open Systems Interconnection) was created by the ISO and is
responsible for the connection between open systems, that is, open to
communication with other systems. The principles on which it based its creation
were: a better definition of the functions of each layer, avoid grouping different
functions in the same layer and further simplification in the operation of the model
in general.
This model divides network functions into seven distinct layers:

7.

layers

application layer

exchange unit

APDU

6.

presentation layer

PPDU

5.

Session Layer

SPDU

4.

Transport Layer

TPDU

3.

Network layer

network packet

2.

data link layer

Network Frame

1.

physical layer

Bit

TCP / IP model
This model is currently implemented globally: it was first used in ARPANET and is currently
used in global Internet and local networks. Its name derives from the union of the names of
the two main protocols that comprise TCP at the transport layer and IP layer red.

other standards
There are other standards, More specifically, defining the mode of operation of various
data transmission technologies. The following list is not complete, only shows some
examples:

Tecnology

Ethernet

standard

IEEE 802.3

year of first publication

1983

other details

Token Ring

IEEE 802.5

19706

WLAN

IEEE 802.11

19977

Bluetooth

IEEE 802.15

20028

FDDI

ISO 9314-x

1987

Collect a set of standards.

PPP

RFC 1661

19949

Classification of networks:
A network may receive different denominations classification based on different
taxonomies: range, connection type, technology, etc.

By connection type
Guided media
Twisted pair: a form of connection in which two insulated electrical conductors are
intertwined to have lower noise and increased power and reduce crosstalk from adjacent
cables. Depending on the network can be used, one, two, four or more twisted pairs.
Coaxial cable: used to transport electromagnetic high frequency signals, which has a
solid core (usually copper) or yarn, coated with a dielectric material and a mesh or
shielding used to block or shield the information signal against interference or noise
outside.
Fiber Optics: is a transmission medium routinely used in data networks; a very thin
thread of a transparent material, glass or plastics, whereby light pulses that represent data
to be transmitted is sent.

Media unguided
Network radio is one that employs radiofrequency connecting means of the various
stations of the network.

Red IR (Infrared Data Association, IrDA), allowing communication between two nodes,
using a series of infrared networks for it. They are transmitters / receivers of infrared
waves between the two devices, each device needs the other for communication so it is
little use to large scale. Do not have powerful and require visibility between devices.
Red microwave, is a type of wireless network that uses microwaves as transmission
medium. The most common protocols are: IEEE 802.11b transmits at 2.4 GHz, reaching
speeds of 11 Mbps (megabits per second); the range of 5.4 to 5.7 GHz for IEEE 802.11a
protocol; IEEE 802.11nque allows speeds up to 600 Mbps; etc.

By functional relationship
Client-server architecture is that basically consists of a client making requests to another
program (the server) that gives answer.
Peer-to-peer network or peer computer network is one in which all or some aspects work
without fixed customers or servers, but a series of nodes that behave as equal.

By technology
point to point network is one in which there is a multitude of connections between
individual pairs of machines. This type of network requires, in some cases, intermediate
systems establish routes for data packets can be transmitted. The usual electronic means
for interconnection is the switch or switch.
Broadcasting Network (broadcast) is characterized by transmitting data over a single
communication channel shared by all machines on the network. In this case, the packet
sent is received by all machines on the network but only the recipient can process. The
teams joined by a hub, forming networks of this kind.
multipoint network, has a line or media whose use is shared by all terminals in the
network. Information flows bidirectional. The terminals can be geographically separated.

For physical topology

Physical network topologies.


Network bus (bus or "common wire") or linear Network (line) is characterized by having a
single communications channel (called bus, trunk or backbone) to which the different
devices are connected.
Token Ring '(ring) or Red circle: each station is connected to the next and the last is
connected to the first. In addition, you can match the daisy chain Network (Daisy chain).
Star network (star) stations are directly connected to a central point and all
communications necessarily have to be done through this.
Red mesh (mesh): each node is connected to every other.
Red tree (tree) or hierarchical network: nodes are arranged in a tree. From a topological
view, the connection tree is similar to a series of interconnected networks in star except
that it has no central node.
Hybrid network or mixed network: given any combination of the above. For example,
circular star, star bus, etc.

By directionality of data
Simplex or unidirectional data terminal equipment transmits and the other receives.
Half-duplex or half-duplex: the method or protocol for sending information is bidirectional
but not full duplex, only one device transmits at a time.

Full-duplex or duplex: the two teams involved in the communication can simultaneously
transmit and receive.

By degree of authentication
Private Network: a network that can only be used by some people and that is configured
with personal password.
Public Access Network: a public network is defined as a network that anyone can use
and not as networks that are configured with personal password. It is a network of
interconnected computers able to share information and allows users to communicate
regardless of their geographical location.

By degree of dissemination
An intranet is a private computer network that uses Internet technology to share in an
organization of their information systems and operational systems.
The Internet is a decentralized set of interconnected communications networks that use
the family of TCP / IP protocols, ensuring that the heterogeneous physical networks that
compose function as a single logical network, worldwide.

For service or function


Sales network provides support and information for a company or organization for profit.
Education Network provides support and information for an educational organization in
the field of learning.
Network data processing provides an interface to interface equipment to be jointly
perform a function calculation.

RED PAN (personal rea network)

Personal area network (PAN) is a computer network used for communication between
devices in computer information technologies and different about a person. BREAD
represents the concept of people-centered networks, and that allow these people to
communicate with their personal devices (eg, PDAs, electronic boards of navigation,
PDAs, laptops) so as to enable a wireless connection to the world external. Some
examples of devices that are used in a PAN are personal computers, printers, fax
machines, phones, PDAs, scanners and video game consoles.
The PAN may include wired and wireless devices.
The reach of a PAN typically extends to 10 meters.
A wired PAN is usually constructed with USB and Fire wire connections while technologies
such as Bluetooth and infrared communication typically form a wireless PAN.
Keywords: personal area network (PAN), PAN personal area networks, identifying common
threats to wireless security, bread personal area network, computer network bread, bread
scope of the network, which is the scope of a pan network.

WPAN network

Wireless Personal Area Network (WPAN), Wireless Personal Area Network or Wireless
Personal Area Network is a computer network for communication between different
devices (computers, internet access points, cell phones, PDAs, audio devices, printers )
close to the access point.
These networks are typically a few meters and for personal use.
The basis of the concept of network for personal space came from ideas that emerged in
1995 from the Massachusetts Institute of Technology (MIT) come to use electrical signals
or electrical impulses from the human body, so we can communicate the same with
attached devices. This was accepted first by IBM Research Labs and then had many
variations developed by the various institutions and research companies. PAN different
solutions include:
Project Oxygen (MIT);
Pico-radius;
Infrared Data Association (IrDA);
Bluetooth;
The concept of Bluetooth, originally developed to replace cables, is being accepted
worldwide, and some of these ideas are incorporated into the IEEE 802.15 standard
related to the NAPs.

LAN Red de rea local.

It is a group of computers that belong to the same organization and are linked within a
small geographic area through a network, usually with the same technology (the most he
used is Ethernet).
A local area network is a network in its simplest form. The speed of data transfer in a local
area network can reach 10 Mbps (for example, an Ethernet network) and 1 Gbps (for
example, FDDI, or Gigabit Ethernet). A local area network may contain 100 or even 1000,
users.
By extending the definition of a LAN to the services provided, you can define two different
operating modes:
In a network "peer to peer" (abbreviated P2P) communication takes place from one
computer to another without a central computer and each team has the same function.
In an environment "client / server", a central computer provides network services to
users.

WLAN network

A Wireless LAN, also known as WLAN (wireless local area network of), is a flexible
wireless communication, widely used as an alternative to wired LANs, or as an extension
thereof. Using radio frequency technology that allows greater mobility to users by
minimizing wired connections. These networks are gaining importance in many fields, such
as warehouses or manufacturing, where the information in real time to a central terminal is
transmitted. They are also very popular in nightclubs to share Internet access among
multiple computers.

WiFi access point.

Performance:
Radio waves are used to carry information from one point to another without physical
media guide. Speaking of radio waves we usually refer to radio carriers, on which the
information is going, and which function to bring energy to a remote receiver. Data to be
transmitted are superimposed on the radio carrier and thus can be accurately extracted at
the receiver end.
This process is called modulation of the carrier by the information being transmitted. If the
waves are transmitted at different radio frequencies, several carriers can exist in the same
time and space without interfering with each other. To extract the data receiver is at a given
frequency, carrier frequency, ignoring the rest. In a typical configuration of LAN (wired)
access points (transceiver) connect the wired network from a fixed location using standard
cabling. The access point receives the information, stores and transmits between the
WLAN and the wired LAN. A single access point can support a small group of users and
can function in a range of at least thirty meters up to several hundred. The access point (or
antenna connected to the access point) is normally placed in high but could be placed
anywhere in the desired radio coverage is obtained. The end user accesses the network
via WLAN adapters. They provide an interface between the operating system client
network (NOS: Network Operating System) and waves through an antenna.
The nature of the wireless connection is transparent to the client layer.

CAN network:
A campus network (CAN) is a computer network that connects LANs via a limited
geographical area such as a campus universitario, or a military base. It can be considered
as a metropolitan area network that specifically applies to a university environment.
Therefore a campus network is larger than a local area network but smaller than a wide
area network.
In a CAN, university buildings are connected using the same type of computer and
network technologies that would be used on a LAN. Moreover, all components, including
switches, routers, wiring, and others belong to the same organization.
A CAN is a geographically dispersed collection of LANs within a campus (university,
government offices, or marquises industries) belonging to the same entity in a defined
area in kilometers.
A CAN commonly used technologies such as FDDI and Gigabit Ethernet connectivity
through media such as fiber optics and spread spectrum.

MAN network.
A metropolitan area network (MAN, English acronym Metropolitan Area Network) is a
network of high-speed (broadband) that covers a large geographic area, providing ability to
integrate multiple services by transmitting data, voice and Video on transmission media
such as fiber optic and twisted pair (MAN LOOP), the copper pair technology is positioned
as the world's largest network an excellent alternative to the creation of metropolitan
networks, low latency

(between 1 and 50 ms), high stability and lack of radio interference LOOP MAN networks
offer speeds of 10 Mbit / s or 20 Mbit / s over copper pairs and 100 Mbit / s, 1 Gbit / s and
10 Gbit / s by optical fiber.
Networks MAN loop Bonding technologies are based on so that the links are formed by
multiple pairs of copper in order to provide the required bandwidth.
Furthermore, this technology guarantees 99.999 SLASH'S, thanks to the links are formed
by multiple pairs of copper and is materially impossible for 4, 8 or 16 threads
simultaneously they break down.
The metropolitan area networks have many and varied applications, the main ones:
Deployment of VoIP (Voice over IP), in the metropolitan area, allowing remove "obsolete"
traditional analog lines or ISDN telephony, eliminating the current expenditure of these
lines.
interconnection of local area networks (LAN).
Deployment of Wifi Zones without wireless backhaul (Femtocell) releasing all wireless
channels to access, in practice this is more than 60% improvement in connecting wireless
users.
Interconnection computer to computer.
municipal video surveillance systems.
Transmission CAD / CAM.
Gateways for wide area networks (WAN).
They also allow the transmission of voice traffic, data and video with high latency
guarantees, reasons why the installation of a metropolitan area network at the corporate
level, for corporations with multiple offices in the capital area is necessary.

WAN network:
A broad network, or WAN area (Wide Area Network), is a computer network that spans
multiple physical locations, providing service to a region, a country, even several
continents. It is any network that connects multiple local networks, LAN calls, so that its
members are not all in the same physical location. Many WANs are built by organizations
or companies for private use, others are installed by Internet service providers (ISP) to
provide connection to its customers.

Today, the Internet provides high-speed connections, so that a high percentage of WAN
networks are based in that environment, reducing the need for private networks WAN
while virtual private networks using encryption and other techniques to generate a
dedicated communications network on the Internet, continuously increase.

Characteristics:
It has engaged in the execution of user programs (hosts) machines.
A subnet, which connect multiple hosts.
Division between transmission lines and switching elements (routers).
A system of interconnection of geographically dispersed computers, which may be even
on different continents. The connection system for these networks to public networks
typically involves transmission of data.

WAN Types
Several types of WAN, and three of them are grouped under the classification of switched
network (physical, switching consists in changing the destiny of a signal or an electric
current)
Circuit For communication, this type of WAN requires that a call is made and the
connection only when each user has made a direct link.
By message:
Its switches are usually computers that meet the task to accept traffic from each terminal
that is connected to them. These teams evaluate the address listed in the header of the
message and can store it for later use. It is worth mentioning that you can delete, redirect
messages and respond automatically.
Packet:
Every message sent by users is fractionated and transformed into a number of small parts
called packets, which are reassembled once they arrive at the destination computer to
reconstruct the initial data. These packets move through the network independently, and
this has a positive effect on traffic and facilitates error correction, because in case of failure
only affected parties should forward.

SAN network:
A storage area network, English Storage Area Network (SAN) is a complete
storage network. It is a complete architecture that groups together the following
elements:
A network of high-speed Fiber Channel or iSCSI.
A dedicated interconnection equipment (switches, bridges, etc.).
Network storage elements (hard drives).
A SAN is a network dedicated to storage that is connected to the communication
networks of a company. In addition to traditional network interfaces, computers with
access to the SAN have a specific network interface that connects to the SAN.
SAN performance is directly related to the type of network used. In the case of a
Fiber Channel network, the bandwidth is approximately 100 megabytes / second
(1,000 megabits / second) and can be extended by increasing the amount of
access connections.
SAN capacity can be extended almost limitlessly and can reach hundreds and
even thousands of terabytes.
A SAN can share data among multiple computers on the network without affecting
performance because SAN traffic is completely separate from user traffic. Are
application servers that act as an interface between the data network (usually fiber
channel) and the user network (at general Ethernet).

Moreover, a SAN is much more expensive than a network-attached storage (NAS)


because the first is a complete architecture that uses technology that is still very
expensive. Normally, when a company estimates the total cost of ownership (TCO)
compared to the cost per byte, the cost can be justified more easily.
It is also a designed to connect servers, matrices (arrays) disks and network
support libraries. It is mainly based on fiber channel technology and more recently
in iSCSI. Its function is to connect quickly, securely and reliably the different
elements that comprise manner.
SAN uses different access protocols such as Fibre Channel and Gigabit Ethernet.
On the opposite side is the Network-Attached Storage (NAS), where applications
make data requests to the file systems remotely using Server Message Block
protocols (CIFS) Network File System (NFS).

Esquema.

DAS vs. NAS vs. SAN.

SANs provide connectivity E / S via the host computers and storage devices combining the
benefits of Fibre Channel technologies and network architectures thus providing a more
robust, flexible and sophisticated approach that overcomes the limitations of DAS using
the SCSI same logic interface to access the storage.

SANs are composed of three layers:


1. Host Layer: This layer consists mainly of servers, devices or components (HBA, GBIC,
GLM) and software (operating systems).
2. Fiber Layer: This layer conform cables (fiber optic) and the SAN SAN hubs and
switches as a central connection point for the SAN.
3. Storage Layer: This layer is composed formations disk (Disk Arrays, cache, RAID) and
tapes used to store data.

The storage network can be of two types:


Fibre Channel network: the network fiber channel is the physical network of devices that
uses Fibre Channel Fibre Channel switches and directors and protocol Fibre Channel
Protocol (FCP) for transport (on serial SCSI-3 Fibre Channel).
IP Network: LAN infrastructure used with standard hubs and / or Ethernet switches
interconnected. IP SAN uses an iSCSI transport (SCSI-3 serial over IP).

VLAN:
A VLAN stands for Virtual LAN (virtual local area network) is a method for creating
independent logical networks within a single network fsica.1 Several VLANs can coexist
on a single physical switch or on a single physical network. They are useful to reduce the
size of the broadcast domain and help in network administration by separating logical
segments of a local area network (departments of a company, for example) that should not
exchange data using the local network (although they could make it through a router or a
switch layer 3 and 4).
A VLAN consists of two or more networks of computers that behave as if connected to the
same PCI, even if they are physically connected to different segments of a local area
network (LAN). Network administrators configure VLANs through software rather than
hardware, which make them extremely strong.

Classification:
But the most common are the port-based VLAN (level 1), the virtual local area networks
can be classified into four types depending on the level of the OSI hierarchy in which they
operate:

Level 1 VLAN (per port). Also known as "port switching". Why switch ports belong to the
specified VLAN, VLAN members that are connecting to these ports. It does not allow user
mobility; we should reconfigure the VLAN if the user physically moves. It is the most
common and explained in detail in this article.
VLAN Layer 2 MAC addresses. Hosts assigned to a VLAN based on their MAC address.
It has the advantage that there is no need to reconfigure the switching device if the user
changes their location, ie connected to another port of the same or another device. The
main disadvantage is that if there are hundreds of users would have to appoint the
members one by one.
VLAN level 2 protocol type. The VLAN is determined by the contents of the protocol type
field of the MAC frame. For example, you would associate the IPv4 protocol VLAN 1,
VLAN 2 to IPv6, VLAN 3 to AppleTalk, IPX VLAN 4 to...
Level 3 VLAN subnet addresses (virtual subnet). The head of level 3 is used to map the
VLAN to which it belongs. In this type of VLAN packets are, not the stations, who belong to
the VLAN. Stations with multiple network protocols (level 3) will be in multiple VLAN.
VLAN higher levels. VLAN is created for each application: FTP, streaming media, email ...
Belonging to a VLAN can be based on a combination of factors such as ports, MAC
address, subnet, time of day, form of access, security conditions equipment.

VLAN designs:
Early network designers used to configure VLANs in order to reduce the size of a collision
domain Ethernet segment and improve performance. When the switches accomplished
this, because each port is a collision domain, its priority was to reduce the size of the
broadcast domain. Because, if the number of terminals increases traffic distribution and
consumption of CPU processing unwanted broadcast traffic. One of the most efficient
ways to achieve reducing the broadcast domain is the division of a large network in
multiple VLANs.

You might also like