 |
Operators may enable or disable lines and devices.
|
 |
A network device publishing a new route or a different metric to a destination may cause the remainder of the network devices to dynamically recompute paths to all other destinations.
|
 |
Servers may insert traffic.
|
 |
Users may insert traffic.
|
 |
Operators: For the purpose of this article, let's describe the Operators as all the people who operate the network,
including the network engineers, the installers, the people who monitor the network, and all the other people who make it
work. The first group then is made of the operators and the devices that these operators use to run the network, such as the
network management stations and all other operations consoles. Operators periodically make changes for moves and additions
for better network performance, or to overcome disruptions. They will also monitor the network through polling, receiving
alerts, and sometimes directly interacting with the network devices. Generally the amount of traffic inserted into the
network from their activities is minimal. Because they generally have physical access to all locations, they can insert or
remove network devices. Operators can have influence over all aspects of the network at all layers from the physical layer,
all the way up the stack. Operators can influence the network either in band or out of band, and they should be the only
people who directly access the network infrastructure devices such as the routers and DNS servers. Usually this access will
be from the management platforms, but in many situations, operators require access from devices that would otherwise be
classified as a user's workstation.
|
 |
Infrastructure Devices: The network infrastructure devices themselves have the ability to change the network as
well. This is mostly done through the dynamic nature of the network. At some times the physical portions of the network might
fail and cause outages. In some cases, such as self-healing ring topologies, physical-layer devices may heal the network. In
other cases, such as when a router is taken out of the network for maintenance, the routing updates will heal the network to
the best of their abilities. The network infrastructure devices can be somewhat separated into two categories. The first of
these would be the infrastructure devices that have no direct interaction with the users of the network. This category would
consist of the devices such as the routers, switches, access control devices, and perhaps even the physical-layer devices
such as multiplexers and modems. The user machines and content servers normally would not form sessions or require any
information from these devices. The second category would be the devices with which customers indirectly interact. These
would be devices such as the DNS servers, Dynamic Host Configuration Protocol (DHCP) servers, Network Time
Protocol (NTP) servers, authentication servers, and the like. The users and servers would form sessions with these
supporting devices and would require information from them for the basic operation of the network. In some cases, such as
with a DNS/DHCP server, the results of the indirect user interaction would even update the servers with information. This
latter group may be called "supporting devices." These two categories can be taken together with all the wires, circuits, and
lines to form the infrastructure of the network. Although the users do not actively see their presence, this infrastructure
must be available and functioning before any user can actually do anything productive on the network.
|
 |
Servers: The servers in this group are those that contain content or services with which the users directly
interact. These would be databases, Web servers, application servers, and the like. Like the operators group, this group is
not considered to be part of the network infrastructure.
|
 |
Users: The users and their machines constitute the bulk of the network. The changes that the users make upon the
network will probably come through transferring content or requesting and utilizing services. They can change the nature of
the network by withdrawing from the network, or by causing others to withdraw from the network. In a nonmalicious way, the
user base can degrade the state of the network by using it beyond its expected capacity. In certain situations, users with
malicious intent may find exploitable network vulnerabilities. In most normal cases, however, the influence from the users
upon the network will be through their interactions with the servers.
|