This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:network-tech-guide:appendix_1_-_internet_standards [2020/11/06 22:08] scott.leslie |
public:network-tech-guide:appendix_1_-_internet_standards [2024/05/09 05:04] (current) |
||
---|---|---|---|
Line 7: | Line 7: | ||
===== Internet Protocol ===== | ===== Internet Protocol ===== | ||
- | Internet Standards are created and published by the Internet engineering Task Force (IETF) . Internet Standards create interoperability of systems on the Internet by defining protocols, message formats, data schemas and display and data handling languages. The most fundamental of the Internet Standards are the ones defining the Internet Protocol. This family of protocol standards are commonly known as TCP/IP after the 2 protocols that form the basic functional layers historically. Increasingly, | + | Internet Standards are created and published by the Internet engineering Task Force (IETF) . Internet Standards create interoperability of systems on the Internet by defining protocols, message formats, data schemas and display and data handling languages. The most fundamental of the Internet Standards are the ones defining the Internet Protocol. This family of protocol standards are commonly known as TCP/IP after the 2 protocols that form the basic functional layers historically. Increasingly, |
===== IP Address Space Exhaustion ===== | ===== IP Address Space Exhaustion ===== | ||
Line 28: | Line 28: | ||
===== Encryption ===== | ===== Encryption ===== | ||
- | Modern Browsers are nearly all built to refuse to open websites that are not encrypted as a defence against malware attacks on Internet | + | Modern Browsers are nearly all built to refuse to open websites that are not encrypted, as a defence against malware attacks on internet |
- | Encryption is implemented on the Internet | + | Encryption is implemented on the internet |
- | To enable HTTPS on your website, organizations , or their agents, | + | To enable HTTPS on your website, organizations, |
- | If you have paid for a website developer to build your website and it is hosted somewhere on the Internet, it is common for the host site company | + | If you have paid for a website developer to build your website and it is hosted somewhere on the internet, it is common for the host site company to also offer DNS and PKI Certificate services. |
Annual Fees amount to $20 to $50 a year per domain host name used, so encryption, while essential, is not a major expense in your IT budget. Subscription cycles are available from 1, 2 or up to 10 years. It is very important to renew the certificate and DNS entries with the Domain and Certificate authorities. | Annual Fees amount to $20 to $50 a year per domain host name used, so encryption, while essential, is not a major expense in your IT budget. Subscription cycles are available from 1, 2 or up to 10 years. It is very important to renew the certificate and DNS entries with the Domain and Certificate authorities. | ||
Line 43: | Line 43: | ||
The data network in your library is based on a group of network standards known as Ethernet. Developed at Xerox PARC in USA in the 1970’s, the basic Ethernet network technology is called Carrier Sense Multiple Access with Collision Detect (CSMA/CD) and is IEEE Standard 802.3, approved in 1983. There are nowadays many extensions and modifications to the original standard to allow higher speeds, many more workstations and different media such as copper cable, fibre optics and radio. | The data network in your library is based on a group of network standards known as Ethernet. Developed at Xerox PARC in USA in the 1970’s, the basic Ethernet network technology is called Carrier Sense Multiple Access with Collision Detect (CSMA/CD) and is IEEE Standard 802.3, approved in 1983. There are nowadays many extensions and modifications to the original standard to allow higher speeds, many more workstations and different media such as copper cable, fibre optics and radio. | ||
- | ===== Power Over Ethernet ===== | + | ===== Power Over Ethernet |
- | PoE is a technology that delivers power to the WIFI access point (and other devices) | + | PoE is a technology that delivers power to the WIFI access point (and other devices) over the data cable from the data switch, |
===== WIFI ===== | ===== WIFI ===== | ||
Line 51: | Line 51: | ||
There are 2 standard organizations regulating the WIFI radio systems in Canada. | There are 2 standard organizations regulating the WIFI radio systems in Canada. | ||
- | The actual radio regulations are the responsibility of the Canadian Government, found on the Internet | + | The actual radio regulations are the responsibility of the Canadian Government |
- | The technical specifications for the equipment sold for WIFI service are produced by the IEEE and are found at 802.11 standards. WIFI is a trademark owned by the Wi-Fi Alliance, a USA industry group dedicated to certifying that WIFI products meet the standards. The names of the products were rebranded recently from the IEEE' | + | The technical specifications for the equipment sold for WIFI service are produced by the IEEE and are found at 802.11 standards. WIFI is a trademark owned by the Wi-Fi Alliance, a USA industry group dedicated to certifying that WIFI products meet the standards. The names of the products were rebranded recently from the IEEE' |
- | Radio networks can be tricky to design and install in library buildings because the signals can be blocked by building walls, columns, floors and ceilings and bookshelves. Use a dealer with network discovery and testing capability (often an application on a cell phone nowadays) to design and purchase your WIFI capacity. | + | Radio networks can be tricky to design and install in library buildings because the signals can be blocked by building walls, columns, floors and ceilings and bookshelves. Use a dealer with network discovery and testing capability (often an application on a cell phone nowadays) to design and purchase your WIFI capacity. You are not delivering a home network for convenience so when buying WIFI equipment, remote management integrated with your data network and the ability to run through Power over Ethernet (PoE) are both important functions that should be on your list of requirements. This requirement |
- | New WIFI equipment using WIFI5 standards should offer at least two radio bands, a 2.4GHz band and a 5GHz band. The 2.4GHz band offers better range because it is more adept at penetrating walls and other structures. However, | + | New WIFI equipment using WIFI5 standards should offer at least two radio bands, a 2.4GHz band and a 5GHz band. The 2.4GHz band offers better range because it is more adept at penetrating walls and other structures. However, |
- | The latest Wi-Fi protocol, 802.11ax, is also known as Wi-Fi 6 or High Efficiency (HE) Wireless. | + | The latest Wi-Fi protocol, 802.11ax, is also known as Wi-Fi 6 or High Efficiency (HE) Wireless. Wi-Fi 6 is designed to increase throughput to 9.6Gbps with less network congestion, greater client capacity and better range performance using improved wireless technologies. |
Target Wake Time (TWT) is designed to reduce power consumption, | Target Wake Time (TWT) is designed to reduce power consumption, | ||
- | No sooner will WIFI 6 be available in 2021 than another is on the horizon. WIFI 6E operates on a new 6-7 gHz radio band and is not certified for use in Canada as of 2020. It may be at least 3 to 5 years before product is available in Canada. | + | No sooner will WIFI 6 be available in 2021 than another is on the horizon. WIFI 6E operates on a new 6-7 gHz radio band and is not certified for use in Canada as of 2020. It may be at least 3 to 5 years before |
===== Cabling Standards ===== | ===== Cabling Standards ===== | ||
Line 68: | Line 68: | ||
Data cabling systems for customer premises are guided by standards to create very structured systems that support many possible uses and media. | Data cabling systems for customer premises are guided by standards to create very structured systems that support many possible uses and media. | ||
- In Canada and USA, the standard is ANSI/ | - In Canada and USA, the standard is ANSI/ | ||
- | - The International Standard on Information Technology Generic Cabling for Customer Premises is the ISO/IEC 11801 Ed. 2 standard. | ||
- | |||
- | These documents are very similar. | ||
The cabling standard breaks structured cabling into six areas: | The cabling standard breaks structured cabling into six areas: | ||
Line 88: | Line 85: | ||
===== Network Management ===== | ===== Network Management ===== | ||
- | The network management services in a Local Area Network are based on a protocol named SNMP (Simple Network Management Protocol). In 2004, the IETF recognized SNMPV3 as defined in RFC3411-3418 as the current standard and it is not a full Internet Standard. The new standard is an attempt to improve the security of the SNMP protocols and processes through use of encrypted channels and processes. | + | The network management services in a Local Area Network are based on a protocol named SNMP (Simple Network Management Protocol). In 2004, the IETF recognized SNMPV3 as defined in RFC3411-3418 as the current standard and it is not a full Internet Standard. The new standard is an attempt to improve the security of the SNMP protocols and processes through |
+ | |||
+ | Security issues have been extremely common for as long as SNMP has been deployed. Version 1 is still the only widely deployed level, but is known to have serious security weaknesses. Version 3 is now widely deployed in new IT purchases but may require complex encryption support from IT staff. Care should to be taken when introducing these tools with a new management system vendor. | ||
+ | |||
+ | ---- | ||
- | Security issues have been extremely common for as long as SNMP has been deployed. Version 1 is still the only widely deployed level but is known to have serious security weaknesses. Version 3 is now widely deployed in new IT purchases but may require complex encryption support from IT staffs | + | <WRAP group> |
+ | <WRAP half column> | ||
+ | [[start|< | ||
+ | </ | ||
+ | <WRAP half column> | ||
+ | NEXT [[appendix_2_-_vendor_links|Appendix 2 - vendor links---> | ||
+ | </ | ||
+ | </ | ||