Naeem

Tuesday, May 5, 2009

Wireless LAN (WLAN)


IST provides a full suite of consulting services to help you plan, design, implement, and operate a secure wireless network. Our networking experts have extensive knowledge in current and emerging wireless network standards and implementations, including IEEE 802.11 protocol, RF engineering and spectrum allocation, large-scale wireless network design, and wireless security architecture

Digi - Wireless Device Networking


Digi - Wireless Device Networking
"...device networking for business, develops reliable products and technologies to connect and securely manage local or remote electronic devices over the network or via the web."
Wi-Fi - 802.11a/b/g Wireless LAN Networking -
External and embedded Wi-Fi products make it easy to add embedded 802.11a/b/g wireless LAN networking to any electronic device, or to connect serial devices over a Wi-Fi network.

Network Cable Tester, LAN Tester

Detailed Product Description

Specifications:
This LAN tester for different cable types is indispensable in network installation and maintenance.
This compact device can be used for testing network.
Telephone (rj-45 rj-11 rj12) and most types of computer cable
----LED indication
----advanced design for easy testing
----ability to test cables from a distance and in places that are not easily accessible
----automatically runs all tests and checks for continuity, open, shorted and crossed wire pairs
----switch can automatic shut when open 2-3 minute
----tests: rj-45, 10 base-t, token ring, rj11 / 12 cable
----power supply supply 9v-battery (not incl)

Network Server

Detailed Product Description
A. Network Attached Storage
Multiple users can access the same storage device to share and exchange files. Simply connect up to two USB drives to the M-DM Download Manager, set up a shared folder and let users access the files via local network connection using SMB or FTP.

B. Printer sharing
No need to connect the printer to a specific computer, only need to connect it to this product and this product should be in Local area network, then, all of the computer in the Local area network can use this printer

C. FTP server
The FTP utility on the Mac will be able to read the data on the network storage but you can not write new data to the drive. To do that,you will need to install a dedicated FTP application,which can either be a free utility or professional shareware programs.
Outside Hard drive as a FTP Server, any user who knows IP ID or Password of this products can download the shared data on the hard disk through internet.
Function is similar with some companies which download product data with long-distance.

D. Support BT or other download method
MDT-LS201 Download Manager allows you to put up to ten Torrent files in to a queue, and will download two at a time, to maximise the speed of the download. As soon as one download is finished, the next one will automatically start. If one download is for any reason broken off, the Download Manager will go on to the next download and try that one again later. You can then turn off your computer and go about other things (like sleeping!) and when you come back, you will have all kinds of new media files to enjoy.
After setting the download contents to this product on PC, then, close the PC, this product also can work for long time or finish download task independently.
User group can focus on SOHO crowd, you can download Electronic book or film, or other documents with it when no power on computer.

F. USB OTB Copy
The USB copy function can be used to copy data from one USB storage device to another.Simply connect both drives,tum them on and press the copy button to start the process.In general,the source is on port B and the destination is on port A but there are a couple of exceptions.
The copy function will copy all data stored on the source drive,create a new folder on the destination drive with the current time and then paste the files into that newly created folder.

G. Universal Plug and Play (UPnP is only available on request)
The MDT-LS201 Download Manager supports UPnP v1.0. If you have other devices that can access UPnP storage devices,you will be able to share your files on the attached USB drives in the local network via UPnp
There is no need to configure anything,this function is turned ON by default and other devices will be able to recognise it automatically.
Ø Up to two external USB storage drives
Ø Interface/Ports 10/100Base-TX Auto MDI/MDI-X, 1 port (RJ-45)
Ø USB 2.0 High Speed (USB1.1), 2 upstream ports (Type A)
Ø Half-Duplex and Full-Duplex operation
Ø TCP/IP (UPnP available on request)
Ø Up to 8 simultaneous connections
Ø DHCP Setup, Auto IP, Fixed IP, System Time (NTP)
Ø Setup for Accounts, Status, Access Right and User Setup, Share Level Access
Ø Input: AC 100-240V, 0.6A, 50-60Hz
Ø Output: DC +5V/2A
Product Size 133mm x 8.0mm x 2.0mm

Saturday, May 2, 2009

Firewall


A Firewall is a device which combines hardware and software to secure access to and from a network. A firewall allows security administrators a great deal of flexibility and control to allow/disallow certain ports, protocols, and access to certain machines. Typical configurations for a corporate network include a "DMZ" area (de-militarized zone) which is the only section of the network with direct access to and from the Internet.
The typical corporate environment has three zones: External (untrusted), DMZ (untrusted internal), and Internal (trusted). A DMZ is used as an “in-between” zone between the internal network and the external network (the Internet). It is designed to compartmentalize security access and reduce the risk of malicious users gaining access to an organization’s resources. We refer to this zone as untrusted as it has connections between the servers within this zone and the external network (the Internet).
A firewall can operate in several layers of the OSI model. There are four categories of firewalls:
  • Packet filtering firewall
  • Circuit level firewall
  • Application level firewall
  • Stateful inspection firewall

A packet filtering firewall is a router or computer (with special software) which screens incoming and outgoing packets. It reads information contained in each packet's TCP and IP headers then accepts or denies the packets based on the rules it has configured. Typically, it looks at rules based on the source address, the destination address, the application, the protocol, the source port number, or the destination port number. A packet filtering firewall operates only in the network layer of the OSI model.

A circuit level firewall monitors TCP handshaking between packets from trusted clients or servers to untrusted hosts to determine if the session is legitimate. A circuit level gateway checks the handshaking occurring with the synchronize (SYN) and acknowledge (ACK) packets in TCP. Since these packets occur at certain times and in a certain order, the circuit level gateway determines if they are operating correctly before allowing the communication. This type of firewall operates at the session layer of the OSI model.

An application level firewall operates a proxy between internal and external machines. It intercepts incoming and outgoing packets and copies and forwards the information to the destination addresses. The application level firewall acts as a proxy for the services it can proxy. For example, you can setup an application level firewall to proxy http and telnet requests - if you do not have it configured to proxy FTP requests, those would get dropped. An application level firewall checks packets up through the application layer of the OSI model.

A stateful inspection firewall combines aspects of the previously described firewalls. It operates at the network layer of OSI model, filtering all incoming and outgoing packets based on source, destination IP address, and port numbers. It also functions as a circuit level firewall by determining which packets in a session are appropriate. A stateful inspection firewall can also mimic an application level gateway in the application layer. A stateful inspection firewall is one of the most common firewalls as it combines features of the first three types.

Transceiver


A Transceiver, or media converter, is a device which interfaces between the network and a local node. An example of a transceiver is an MAU. A transceiver generally converts to different types of connectors, like AUI and RJ-45.
An MAU is a media attachment unit - a device which connects the computer to the Ethernet network.
A transceiver works at the Physical layer (layer 1) of the OSI model.

Modem


A Modem is a device which enables a computer to transmit data over analog telephone lines. Modem is short for modulator-demodulator. A modem converts the digital information in a computer into analog data. Traditional modems can operate at a top speed of 56Kbps, though most do not go that fast on today's phone lines.
A lot of companies still rely on dial-up access using modems for connectivity, though companies are increasingly moving to other methods of connectivity including cellular modem cards and high speed Internet access (such as DSL or cable modem).
A modem operates in the Physical Layer (layer 1) of the OSI model.

ISDN Adapter



A Wireless Access Point (WAP) is a transceiver or radio component in a wireless LAN that acts as the transfer point between wired and wireless signal and vice versa. The access point connects the wired LAN to an antenna. It bridges the wired and wireless networks together.
A Wireless Access Point operates in layer 3 of the OSI model.

CSU/DSU


A Network Interface Card (NIC) is a device which plugs into a computer and adapts the network interface to the appropriate standard. NICs come in all sort of adapter types: ISA, PCI, PCMCIA, USB, and more. The NIC is a physical card which provides a connection for the physical network. The NIC operates in the Data Link layer of the OSI model.

Friday, May 1, 2009

Gateway



A Gateway is a networking device which translates between two dissimilar protocols. A gateway links and translates between local area networks with different protocols. It can function across all layers of the OSI model but commonly does so at the application layer.

Router



A Router is a device that determines the next point a data packet needs to be forwarded to on to its destination. The router is connected to more than one network and determines where each data packet should be sent based on its current understanding of the networks it is connected to. Routers have table which shows the available routes and decides based on this table what the best route is for a given packet of information.

A router operates in level 3 of the OSI model.

If you have a cable modem or DSL modem at home, you probably have a router between your internal network and Internet.

Bridge

A Bridge is a networking device which connects multiple LANs and forwards or filters data packets between them based on their destination address. Bridges operate at the data link (level 2) of the OSI model.
Bridges are most frequently used to connect LAN segments to other LAN segments or to a wide area network (WAN). Bridges are protocol independent, you could connect an Ethernet network with a Token Ring network using a bridge. Typically though, they are used to connect two similar networks together.

Switch


48-port Switch




A Switch, on the otherhand, do not distribute signals without verifying whether it really needs to propagate to a given port or ports. It decides it based on its internal configuration settings. We can say that a Switch is a Hub with some intelligence.

HUB


A Hub connects all the nodes of a network using Twisted Pair (UTP or STP) cables. In a Hub, the signals received on one port are transmitted to all other ports, and vice versa. All nodes (work stations) connected using a Hub can listen to one another all the time. The advantage of using a Hub is low cost, and easy integration. The disadvantage is reduced bandwidth, and data security. The reduction in bandwidth comes due to the fact that all workstations are in the same collision domain. If two or more workstations try to transmit during the same time, it results in collision of signals, and the signals are lost altogether. As a result, the available bandwidth of the Ethernet network is reduced.

Network Interface Card(NIC)

A Network Interface Card (NIC) is a device which plugs into a computer and adapts the network interface to the appropriate standard. NICs come in all sort of adapter types: ISA, PCI, PCMCIA, USB, and more. The NIC is a physical card which provides a connection for the physical network. The NIC operates in the Data Link layer of the OSI model.

The Network Interface Card (NIC) used connect the computer to the external network. It will normally have a PCI connector (Edge connector) to connect to one of the PC expansion slots, and an RJ-45 connector to connect to external Ethernet. Note that the interface connectors may differ depending upon the expansion bus being used (for example, PCI, ISA, EISA, USB etc.), and the networking media being used (for example, 10Base2, 10Base5, 10BaseT, etc.). Each of these have their own interface specifications. Almost all NICs have LED indicators showing the network connectivity.



Wireless Access Point


A Wireless Access Point (WAP) is a transceiver or radio component in a wireless LAN that acts as the transfer point between wired and wireless signal and vice versa. The access point connects the wired LAN to an antenna. It bridges the wired and wireless networks together.
A Wireless Access Point operates in layer 3 of the OSI model.




Using Wireless Routers on ResNet

Many students have more than one network device (desktop, laptop, video game consoles, handheld devices, etc) they wish to use on the network simultaneously. However, ResNet only has enough available IP addresses to allow one network connection per student. So, you can either alternate which network device you currently have registered by editing Your Account (link on left sidebar) or you can use a network router.

Router Basics
A router is a network device allowing multiple computers, handheld devices and game consoles to communicate with each other and share a single connection to the Internet. They usually contain one uplink (WAN) jack and between 4 and 24 ethernet (LAN) jacks where network devices can be plugged in. By connecting a router in the correct way to ResNet, multiple network devices can share the same connection.

Securing Your Wireless Router
ResNet requires you to secure your wireless router to use it on ResNet. You must use wireless encryption, which encodes the data transmitted between your PC and your wireless router. Unfortunately, most routers ship with encryption turned off, leaving it completely exposed. Enable your router's encryption and use the strongest form supported by your comptuer. The Wireless Protected Access (WPA) protocol and more recent WPA2 have supplanted the older and less-secure Wireless Encryption Protocol (WEP).

network service

HiWAAY's Network Services specializes in network design, business process analysis, information security and managed IT services.
Why Choose HiWAAY?
…Because we've got the experts. Network engineers, server administrators, Windows, Linux and security experts. You name it, HiWAAY's got the knowledge and proven expertise. Our team members are vendor-certified and have a broad range of experience in network infrastructure, VPNs, email and Internet technologies, Microsoft products, web applications and network security.
Because we will customize your professional services package to fit your needs. Starting with a customized evaluation, our network services team will analyze your existing network, system infrastructure and security. Based on our analysis, we will be able to provide you with the best, most cost-effective solution that fits your IT needs. Whether you have three computers or 3,000 HiWAAY will be there with a solution.
Because we put you first. We understand what it takes to run a successful business. We also understand how important a stable, reliable and secure network is and how dependent your organization success is on network services. You've got a business to run, and we want to minimize your IT headaches. This is, after all, our specialty. We want you to focus on your business while we focus on the framework behind it. Your needs are our number one priority.
HiWAAY can provide an end-to-end solution using the Network Services division's expertise paired with HiWAAY Internet access products you know and trust. Contact your account representative today to learn more about the diverse portfolio of services available from HiWAAY Network Services.
What can we do for you?
HiWAAY Network Services professionals are top of the line, vendor-certified integration experts with extensive experience in network infrastructures, VPNs, email and Internet technologies, Microsoft products, web applications and network security.
We can create a custom quote for your business based on the following services:
• Network Assessments: Professional survey of existing network and systems infrastructure, including HiWAAY's propriety model-based approach to analyzing customer business processes. Results in a detailed document that summarizes the state of the customer's IT resources and recommends non-vendor-specific solutions to any identified problem areas.
• Remote Management Solutions: Flat monthly fees on a term basis that cover a defined set of tasks. These contracts allow HiWAAY to step in and augment existing IT staff or act as IT staff when none are present. Tasks are negotiable, and pricing is customized for each contract. Task examples include software updates, virus scanning, log analysis, user account management, backup management and router management.
• Research and Documentation: Development of a set of organizational and/or procedural manuals for operating a piece of software, hardware or other IT asset. This product is useful when your business no longer has manuals or vendor support for an existing product or needs a better understanding of how the existing product integrates with your network.

Campus Network Design


Campus Network


A campus network is a building or group of buildings all connected into one enterprise network that consists of many local-area networks (LANs). A campus is generally a portion of a company (or the whole company) that is constrained to a fixed geographic area.


The distinct characteristic of a campus environment is that the company that owns the campus network usually owns the physical wires deployed in the campus. The campus network topology is primarily LAN technology connecting all the end systems within the building. Campus networks generally use LAN technologies, such as Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), Fast Ethernet, Gigabit Ethernet, and Asynchronous Transfer Mode (ATM). The Enterprise Composite Network Model. As shown in the follow figure.


Example of a Campus Network


A large campus with groups of buildings can also use WAN technology to connect the buildings. Although the wiring and protocols of a campus might be based on WAN technology, they do not share the WAN constraint of the high cost of bandwidth. After the wire is installed, bandwidth is inexpensive because the company owns the wires and there is no recurring cost to a service provider. However, upgrading the physical wiring can be expensive Consequently, network designers generally deploy a campus design optimized for the fastest functional architecture that runs on the existing physical wire. They might also upgrade wiring to meet the requirements of emerging applications. For example, higher-speed technologies��such as Fast Ethernet, Gigabit Ethernet, and ATM as a backbone architecture��and Layer 2 switching provide dedicated bandwidth to the desktop.
The Enterprise Composite Network Model is a blueprint that network designers can use to simplify the complexity of a large internetwork. The blueprint lets you apply a modular, hierarchical approach to network design. With the Enterprise Composite Network Model, you can analyze the functional, logical, and physical components of a network, and thus simplify the process of designing an overall enterprise network.The Enterprise Composite Network Model comprises three major areas, which can each be made up of smaller modules:
Enterprise campus. The enterprise campus includes the modules required to build a robust campus network that provides high availability, scalability, and flexibility. This area contains all the network elements for independent operation within one campus location. An enterprise can have more than one campus.
Enterprise edge. The enterprise edge aggregates the connectivity from the various elements at the edge of an enterprise network. The enterprise edge functional area filters traffic from the edge modules and routes it into the enterprise campus. The enterprise edge contains all the network elements for efficient and secure communication between the enterprise campus and remote locations, business partners, mobile users, and the Internet.







Network Design










Computer Network Design
Initial needs assessment - With Network Designer capabilities on-staff, Ezotec can assist in assessing your complete needs. Our approach will look at not only your immediate applications but will also take into account future applications, future growth of your organization and possible technology changes which would impact your cabling needs. Considerations like type of equipment, load balancing and redundancy will be factored into our cost/benefit analysis. Our comprehensive design capabilities are recognized by many as among the best in the industry

Complex Network / System Design - Your network will be designed by a Network Designer with many years of complex design experience with various types of cable installations. Our designs include state of the art components integrated in conjunction with the latest design specifications and requirements. Our infrastructure design capabilities range across a broad spectrum of commercial applications including large data centers, multi-building campus environments, commercial airports as well as any traditional office environments.










Network Design and Implementation

Local Area Networks
There is a perception that LAN design is very simple and straightforward, and that a single solution will fit almost any scenario. This is where most LAN-related problems originate. To build a well-balanced LAN, a number of factors must be taken into consideration. Some of them are: desired network size (# of machines), layout, amount of current traffic, future traffic expectations, security requirements. We evaluate all of these factors, among others, which helps us design a flexible solution within budget, and with sufficient room for expansion.

Remote Network Solutions
When a company has several offices, remote connectivity is essential. In most cases, communicating only via email is far from adequate. File sharing, Windows domain-based services, and direct access between workstations are often needed. To achieve this, we build virtual tunnels between your offices, as well as to our own network. Machines in separate locations can now communicate as if they were on the same physical network. And for those working at home or on the road, we provide easy VPN access to the office network.
Centralized Routing
We handle all routing at the core of our network. If you have several locations, we will interconnect them with redundant virtual links. In case one of those links becomes unavailable, our dynamic routing protocols automatically send traffic via the remaining ones. In the meantime, our network engineers are notified of the situation and start working on the problem immediately. Having multiple paths brings peace of mind to our customers and us.
Network Redundancy
For critical applications, a single-sided network may not be adequate. Designing redundant systems is one of our specialties. We can set up router and switch redundancy with failover, up to a full network mesh. In case any one device fails, connectivity is not affected. In addition, we are able to utilize multiple Internet links, if available. They can be used in an active-standby scenario, or an active-active one. Load-balancing solutions play an important role in networking, and we take full advantage of what today’s technology offers.