Build Internet Infrastructure
Module Code: EIS HNS4 M02 1123
This module covers the units:
• Internet infrastructure
• Install and configure internet
• Internet security and access
• User account and account security
• Internet management and support
Unit one: Plan and design internet infrastructure
Learning Objectives
• Define Internet Infrastructure and its components.
• Explain Business Needs and Functions in networking.
• Describe LAN Communication Technologies.
• Identify hardware, software, and security requirements.
• Understand Internet Protocol (IP) address allocation.
Introduction to Internet Infrastructure
• Internet is a collection of computers that communicate using a
standard set of protocols.
• Internet is a global network of networks (no single owner).
• Internet Infrastructure is a set of physical and logical components
that provide connectivity, security, routing, management, access, and
other integral features on a network.
• Key Aspects of Internet Infrastructure :
Hardware (routers, switches, cables).
Software (protocols, OS, security tools).
Design → Implementation → Maintenance.
Business Needs & Functions
• Business functions are the things a business does to provide the
product or service that it offers.
• Examples of a primary business function include
Providing tutoring services to college students
Manufacturing precision parts for airplanes
Building custom homes
• Internet Role:
Global reach,
productivity,
Communication and collaboration.
Choosing the Right Business Internet Connection
• Understand Your Business Needs:
Identify current and future IT requirements.
• Find Available Connection Types:
Not all types available everywhere (e.g., Fiber, DSL, Cable, Satellite, Leased Line).
• Figure Out What You are Paying For:
Beware of long-term commitments (services, technology, pricing change frequently).
• Assessing User Requirements
User Desires: Application Availability
• Components of Application Availability:
Response Time: Time between command entry and host execution/response. Critical
for interactive services (ATMs, POS).
Throughput: Volume of data processed over time. Important for file transfers, often
with low response-time requirements (can be scheduled off-peak).
Reliability: Uptime and consistency. Critical for financial services, securities
exchanges, emergency operations (requires high hardware/topological redundancy).
LAN Communication Technologies
A local area network (LAN) is a computer network that interconnects computers
within a limited area such as a home, school, campus or office building.
The two most common and LAN communication technologies are:
• Ethernet (Wired LAN):
Description: IEEE 802.3 standard, uses twisted-pair or fiber optic cables.
Speeds: 10 Mbps to 400+ Gbps (Fast, Gigabit, 10 Gigabit Ethernet).
Advantages: High speed, reliable, secure, less interference.
Disadvantages: Requires cabling, less mobility.
Use: Offices, data centers, homes for stationary devices.
• Wi-Fi (Wireless LAN/WLAN):
Description: IEEE 802.11 standards, uses radio waves.
Speeds: Varies by standard (802.11n, ac, ax/Wi-Fi 6, Wi-Fi 7). 2.4 GHz, 5 GHz, 6 GHz.
Advantages: Flexibility, mobility, easy installation.
Disadvantages: Interference, signal degradation, potential security vulnerabilities.
Use: Homes, public spaces, mobile devices, IoT.
Cont’d.
Satellite
(Traditional Leased Line
Feature Fiber DSL Cable GEO) (DIA)
Electrical Electrical
Light over signals over signals over Dedicated fiber
Technolog glass/plastic copper phone coaxial TV Radio waves via (usually) or
y cables lines cables orbiting satellites copper
Very Fast Slow to Fast Very Fast
(Symmetrica Moderate (Asymmetric Slow to Moderate (Symmetrical
Speed l) (Asymmetrical) al) (Asymmetrical) & Guaranteed)
Excellent Fair (Affected Good (Can Fair (Affected by Excellent
(Low by distance/line slow at peak weather/line of (Dedicated,
Reliability interference) quality) times) sight) SLA-backed)
Very High (except Very Low &
Latency Very Low Moderate Moderate LEO) Consistent
Cont’d.
Growing, but Very High (Uses Very High Global (Best Limited
Availab limited in rural existing phone (Urban/Sub for (Business-
ility areas lines) urban) rural/remote) focused)
Moderate to High
(Becoming
Cost competitive) Low Moderate High Very High
No (Dedicated No
Shared No (Dedicated copper pair to the Yes (Shared Yes (Shared (Dedicated,
Bandwi fiber to home, but backhaul with across satellite uncontended
dth home/business) might be shared) neighbors) users) connection)
General Critical
High-demand Basic use, remote home use, Rural/remote business ops,
Best users, businesses, areas with phone streaming, areas with no high data
For future-proof lines gaming other options transfer
Cont’d.
• We should consider four main factors when selecting a LAN technology:
Cost efficiency: Faster technology not always more expensive.
Installed base: Incorporating existing applications, equipment, servers, and
cabling can be more cost-effective than a complete overhaul.
Maintainability: Design for reliability reduces maintenance costs.
Performance: Network must fulfill business needs; high throughput and low
latency are useless if applications aren't supported.
• Internet Technologies encompass the various hardware, software, and
protocols that make the internet function.
Hardware: Routers, servers, cables.
Software: Firewalls, OS, monitoring tools.
Security: Encryption, access controls, updates.
protocols
Network Hardware
• Routers: Devices that direct data packets between different networks (e.g.,
from your home network to the internet). They use IP addresses to determine
the best path.
• Switches: Connect devices within a local area network (LAN), enabling them
to communicate directly with each other.
• Modems: Convert digital signals from your computer into analog signals for
transmission over telephone lines (DSL) or coaxial cables (cable), and vice-
versa.
• Servers: Powerful computers that provide services (like web hosting, email,
file storage) to other computers (clients) on the network.
• Cables: Physical media for data transmission, including copper (Ethernet) and
fiber optic cables.
• Wireless Access Points (WAPs): Enable devices to connect to a network
wirelessly using radio waves
Software and Applications
• Web Browsers: Software applications (e.g., Chrome, Firefox, Edge)
that allow users to access and display content from the World Wide
Web.
• Email Clients: Applications for managing email (e.g., Outlook).
• Operating Systems: Modern operating systems (Windows, macOS,
Linux, Android, iOS) have built-in support for internet protocols and
networking.
• Web Servers: Software that stores website content and delivers it to
browsers upon request.
Protocols
• Protocol is a fundamental set of rules that governs how data
is sent and received over the internet and other networks.
IP (Internet Protocol):
• IPv4: The most widely used version, uses 32-bit addresses.
• IPv6: The newer version, uses 128-bit addresses.
TCP (Transmission Control Protocol)
HTTP (Hypertext Transfer Protocol)
HTTPS (HTTP Secure)
FTP (File Transfer Protocol)
SMTP (Simple Mail Transfer Protocol):
DNS (Domain Name System)
UDP (User Datagram Protocol)
Network standards
• Network standards are sets of rules, guidelines, and specifications
that ensure different devices, networks, and software from various
manufacturers can communicate and work together seamlessly.
• Key Concepts of Network Standards:
Interoperability: The primary goal. Standards allow different systems to
"talk" to each other effectively.
Reliability: Standards contribute to the stability and predictability of network
operations.
Innovation: By providing a stable foundation, standards enable developers to
build new technologies and applications that can function across the internet.
Security: Many standards incorporate security principles and best practices to
protect data confidentiality, integrity, and authenticity.
Types of Standards
1. Formal/De Jure Standards:
Developed by official, recognized international bodies through a rigorous,
consensus-driven process.
Thoroughly reviewed, stable, well-documented, maintained by neutral bodies.
But, Can be slow to develop and adapt.
• Examples of Organizations:
IEEE (Institute of Electrical and Electronics Engineers)
ISO (International Organization for Standardization):
ITU-T (International Telecommunication Union - Telecommunication
Standardization Sector)
W3C (World Wide Web Consortium)
Cont’d
2. De Facto Standards:
Emerge organically through widespread adoption and market dominance of a
particular technology or product, without formal standardization.
Pros: Can emerge quickly, reflecting practical usage.
Cons: May be proprietary, can change rapidly, may not have formal
maintenance.
• Example: While TCP/IP is now a formal internet standard, its initial
widespread adoption in ARPANET laid the groundwork for it to
become a de facto standard before its formalization.
ISO MODEL
• ISO is composed of groups for various countries that set standards
working towards the establishment of world-wide standards for
communication and data exchange.
• Open Systems Interconnect Reference Model (OSI RM), was
developed by ISO in 1981 (?) and revised in 1984.
• OSI RM is a set of rules that explains how different computer systems
communicate over a network.
• The OSI RM uses 7 layers, each independent of each other, to allow
computers to exchange data.
The 7 layers of OSI RM
• Layer 7, Application Layer: This layer defines network applications
such as error recovery, flow control and network access.
• Layer 6, Presentation Layer: This layer determines the format used
to exchange data in such aspects as data translation, encryption and
protocol conversion
• Layer 5, Session Layer: It is responsible for establishing and
removing communication sessions between computers.
• Layer 4, Transport Layer: This layer is responsible for ensuring that
data is delivered free of error and provides some flow control.
Cont’d.
• Layer 3, Network Layer: determines the route for the information to
follow. The data is divided into packets with addressing information
attached. It also translates address from names into numbers.
• Layer 2, Data Link Layer: This layer defines the network control
mechanism and prepares the packets for transmission.
• Layer 1, Physical Layer: concerned with the transmission of binary
data(10011…) between stations and defines the connections.
The 7 layers of OSI RM
•x
Understanding IPv4 Addressing, Classes, and Subnetting
• An IP address is an address used in order to uniquely identify a
device on an IP network.
• Purpose: Unique identifiers for devices.
• Types: IPv4 (32-bit) vs. IPv6 (128-bit).
• IPv4 (32-bit) splited into 4 octets (e.g., [Link]).
Binary to Decimal Conversion
• Example1: Convert 01000001 (binary) to decimal:
01000001
↓↓↓↓↓↓↓↓
0 64 0 0 0 0 0 1 = 65 (decimal)
• Example2: Convert [Link] to Binary
Octet 1: 192 Subtract the largest possible value (from left to right):
192 (128 + 64) → Bits for 128 and 64 are 1, rest are 0. Binary: 11000000
Octet 2: 168 (128 + 32 + 8) → Bits for 128, 32, 8 are 1. Binary: 10101000
Octet 3: 1 → Only the last bit is 1. Binary: 00000001
Octet 4: 1 Same as above: 00000001
Final Binary IP:
11000000.10101000.00000001.00000001
IP Address Classes (A-E)
Class Range Network/Host Bits Use Case
A [Link] – [Link] N.H.H.H Large networks (e.g., ISPs)
B [Link] – [Link] N.N.H.H Enterprises
C [Link] – [Link] N.N.N.H Small offices
D [Link] – [Link] Multicast Streaming
E [Link] – [Link] Experimental Research
Default Subnet Masks
• Class A: [Link] (/8)
• Class B: [Link] (/16)
• Class C: [Link] (/24)
Private IP Ranges (Used in Local Networks)
Each class has reserved private IP ranges for internal use (not routable
on the public Internet):
Class Private IP Range Common Use Case
A [Link] – [Link] Large enterprises, data centers
B [Link] – [Link] Medium businesses, campuses
C [Link] – [Link] Home networks, small offices
Subnetting
• Subnetting is the process of dividing a large IP network into smaller,
manageable sub-networks (subnets).
• It defines which part of an IP is the network and which is the host.
• Why Subnet?
Improve security
Avoid wasting addresses.
optimizes IP allocation.
• Example: Split [Link]/24 into 4 subnets:
Subnet 1: [Link]/26 (Hosts: 1-62)
Subnet 2: [Link]/26 (Hosts: 65-126)
Subnet 3:
Subnet 4:
CIDR (Classless Inter-Domain Routing)
• CIDR replaces classful addressing
• No fixed classes (unlike A/B/C).
• Uses slash notation (e.g., /24) to define network size.
• Allows variable-length subnet masking (VLSM).
• It reduces routing table size
• Flexible subnet masks and Efficient IP usage.
• Example: [Link]/26 means:
First 26 bits = Network portion.
Last 6 bits = Hosts (allows 62 usable hosts).
CIDR Example (ISP Allocation)
• An ISP owns [Link]/24 and needs to allocate IPs to 3 customers:
Customer A: Needs 100 IPs.
Customer B: Needs 50 IPs.
Customer C: Needs 10 IPs.
Solution Using CIDR
• Step 1: Allocate Largest First (Customer A - 100 IPs)
Nearest power of 2 ≥100 → 128 IPs (/25).
Subnet: [Link]/25 (Range: [Link]–[Link]).
CIDR Example (ISP Allocation)
• Step 2: Allocate Next (Customer B - 50 IPs)
Nearest power of 2 ≥50 → 64 IPs (/26).
Subnet: [Link]/26 (Range: [Link]–[Link]).
• Step 3: Allocate Smallest (Customer C - 10 IPs)
Nearest power of 2 ≥10 → 16 IPs (/28).
Subnet: [Link]/28 (Range: [Link]–[Link]).
• Remaining Space
[Link]/28 to [Link] (unallocated).
Subnetting Steps (Class C Example)
• Problem: Divide [Link]/24 into 4 subnets with ~50 hosts each.
• Step 1: Determine Subnet Requirements
Needed: 4 subnets.
Hosts per subnet: ≥50.
• Step 2: Calculate New Subnet Mask
Borrow bits from the host portion:
2^n ≥ Subnets → 2^2 = 4 (borrow 2 bits).
New prefix: /26 (24 + 2 = 26).
• Subnet mask: [Link] (binary: 11111111.11111111.11111111.11000000).
Cont’d.
Subnet Network ID Usable Host Range Broadcast
1 [Link]/26 [Link] – [Link] [Link]
2 [Link]/26 [Link] – [Link] [Link]
3 [Link]/26 [Link] – [Link] [Link]
4 [Link]/26 [Link] – [Link] [Link]
OHS Requirements
• OH&S is the practice of managing risks to the health and safety of
everyone in the workplace, including workers, customers, visitors and
suppliers.
• Some common elements of OHS requirements :
OH&S policy
Risk assessments.
Equipment safety (cable management, ventilation).
Compliance with local laws.