Networking

Here at IT Yuda we carry 2 of the most popular brands of Networking equipment: HP and Cisco. In this range we specialize in Enterprise level Switches, Routers, Firewalls, Wireless and IP Telephony. We also carry all the associated options to keep your network running smoothly.

Networking There is 1 product.

Subcategories

  • Switches

    What are Switches?

    Switches occupy the same place in the network as hubs. Unlike hubs, switches examine each packet and process it accordingly rather than simply repeating the signal to all ports. Switches map the Ethernet addresses of the nodes residing on each network segment and then allow only the necessary traffic to pass through the switch. When a packet is received by the switch, the switch examines the destination and source hardware addresses and compares them to a table of network segments and addresses. If the segments are the same, the packet is dropped or “filtered”; if the segments are different, then the packet is “forwarded” to the proper segment. Additionally, switches prevent bad or misaligned packets from spreading by not forwarding them.

    Filtering packets and regenerating forwarded packets enables switching technology to split a network into separate collision domains. The regeneration of packets allows for greater distances and more nodes to be used in the total network design, and dramatically lowers the overall collision rates. In switched networks, each segment is an independent collision domain. This also allows for parallelism, meaning up to one-half of the computers connected to a switch can send data at the same time. In shared networks all nodes reside in a single shared collision domain.

    Easy to install, most switches are self learning. They determine the Ethernet addresses in use on each segment, building a table as packets are passed through the switch. This “plug and play” element makes switches an attractive alternative to hubs.

    Switches can connect different network types (such as Ethernet and Fast Ethernet) or networks of the same type. Many switches today offer high-speed links, like Fast Ethernet, which can be used to link the switches together or to give added bandwidth to important servers that get a lot of traffic. A network composed of a number of switches linked together via these fast uplinks is called a “collapsed backbone” network.

    Dedicating ports on switches to individual nodes is another way to speed access for critical computers. Servers and power users can take advantage of a full segment for one node, so some networks connect high traffic nodes to a dedicated switch port.

    Full duplex is another method to increase bandwidth to dedicated workstations or servers. To use full duplex, both network interface cards used in the server or workstation and the switch must support full duplex operation. Full duplex doubles the potential bandwidth on that link.

  • Modules

    We sell a wide range of Cisco and HP modules. These can be broken down into 3 subcategories and are compatible with all current Network switches associated with these brands:

    1) Transceiver modules: These are otherwise known as SFP modules or GBICs. The majority of these modules take the form of 1GB or 10GB formats and come in a variety of speeds, protocols, reaches and supported transmission media.

    2) Expansion modules: These modules allow the expansion of modular based switches to enable extra ports and connectivity options.

    3) Power modules: Either available as a stand alone option for most modular switches or as a redundant option, these enable flexible power needs for your switch environment. Whether its more PoE power or the option to reduce failure we carry the majority of current power modules for all our switches.

  • Routers

    Routers are small electronic devices that join multiple computer networks together via either wired or wireless connections.

    How Routers Work

    In technical terms, a router is a Layer 3 network gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model.

    Routers contain a processor (CPU), several kinds of digital memory,and input-output (I/O) interfaces. They function as special-purpose computers, one that does not require a keyboard or display.

    The router's memory stores an embedded operating system (O/S). Compared to general-purpose OS products like Microsoft Windows or Apple Mac OS, router operating systems limit what kind of applications can be run on them and also need much smaller amounts of storage space. Examples of popular router operating systems include Cisco Internetwork Operating System (IOS)and DD-WRT. These operating systems are manufactured into a binary firmware image and are commonly called router firmware.

  • Firewalls

    A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

    Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet. 

    A firewall can be hardware, software, or both.

    Types of Firewall:

    Proxy firewall

    An early type of firewall device, a proxy firewall serves as the gateway from one network to another for a specific application. Proxy servers can provide additional functionality such as content caching and security by preventing direct connections from outside the network. However, this also may impact throughput capabilities and the applications they can support.

    Stateful inspection firewall

    Now thought of as a “traditional” firewall, a stateful inspection firewall allows or blocks traffic based on state, port, and protocol. It monitors all activity from the opening of a connection until it is closed. Filtering decisions are made based on both administrator-defined rules as well as context, which refers to using information from previous connections and packets belonging to the same connection.

    Unified threat management (UTM) firewall

    A UTM device typically combines, in a loosely coupled way, the functions of a stateful inspection firewall with intrusion prevention and antivirus. It may also include additional services and often cloud management. UTMs focus on simplicity and ease of use.

    Next-generation firewall (NGFW)

    Firewalls have evolved beyond simple packet filtering and stateful inspection. Most companies are deploying next-generation firewalls to block modern threats such as advanced malware and application-layer attacks.

    According to Gartner, Inc.’s definition, a next-generation firewall must include:

    • Standard firewall capabilities like stateful inspection
    • Integrated intrusion prevention
    • Application awareness and control to see and block risky apps
    • Upgrade paths to include future information feeds
    • Techniques to address evolving security threats

    While these capabilities are increasingly becoming the standard for most companies, NGFWs can do more.

    Threat-focused NGFW

    These firewalls include all the capabilities of a traditional NGFW and also provide advanced threat detection and remediation. With a threat-focused NGFW you can:

    • Know which assets are most at risk with complete context awareness
    • Quickly react to attacks with intelligent security automation that sets policies and hardens your defenses dynamically
    • Better detect evasive or suspicious activity with network and endpoint event correlation
    • Greatly decrease the time from detection to cleanup with retrospective security that continuously monitors for suspicious activity and behavior even after initial inspection
    • Ease administration and reduce complexity with unified policies that protect across the entire attack continuum

    Block more threats and quickly mitigate those that do breach your defenses with the industry’s first threat-focused NGFW. Our Cisco Firepower NGFW appliances combine our proven network firewall with the industry’s most effective next-gen IPS and advanced malware protection. All so you can get more visibility, be more flexible, save more, and protect better.

    See this useful guide for choosing your next Cisco Firewall:

    http://www.cisco.com/c/dam/en/us/products/collateral/security/next-gen-firewall.pdf

  • Wireless

    Wireless Networking: Getting Started

    Wireless networking is an essential productivity tool for today's mobile workforce. With wireless networking, you and your employees can stay connected to your company's information resources virtually anytime, anywhere.

    Ready to get started with wireless networking? Begin by familiarizing yourself with the basics and benefits of having a wireless network.

    Next, consider the following steps:

    1. Make Sure Your PCs Are Wireless

    Most laptops today have built-in wireless networking connections. If yours doesn't, you'll need to install a wireless network adapter card, which is typically inexpensive and easy to use.

    2. Get a Router Capable of Wireless Networking

    Many network routers today act as wireless networking access points. They let you connect multiple computers to a single wireless network. And they connect your network to the Internet.

    You can extend wireless networking throughout your office, store, or campus by placing additional wireless access points in various locations. The additional access points extend the wireless signal's range and strength over a wider geographical area, so that it's available in more places, such as conference rooms.

    3. Pay Attention to Location

    The signal generated from each wireless access point or router extends up to approximately 300 feet. Walls, metal (such as in elevator shafts) and floors can negatively affect range. And the wireless signal's strength weakens the longer it has to travel. For best results, space out your access points and position them in central areas. Tip: Access points can provide stronger signals when installed on or near ceilings.

    4. Don't Overshare Access Point

    For best results, don't share any single wireless access point with more than 20 users. Typically, the more users sharing an access point, the slower the wireless network can become. If your business network supports a voice over Internet Protocol (VoIP) or Unified Communications system, limit each access point to 8-12 users. This will prevent potential degradation in voice quality.

    5. Secure Your Network

    Security is vital to wireless networking. Some security methods to consider for your network include:

    • Data encryption, so only authorized users can access information over your wireless network
    • User authentication, which identifies computers trying to access the network
    • Secure access for visitors and guests
    • Control systems, which protect the laptops and other devices that use the network.
  • IP Telephony

    Voice over IP (VoIP) defines a way to carry voice calls over an IP network including the digitization and packetization of the voice streams. IP Telephony utilizes the VoIP standards to create a telephony system where higher level features such as advanced call routing, voice mail, contact centers, etc., can be utilized.

    Session Initiation Protocol (SIP) is a peer-to-peer, multimedia signaling protocol developed in the IETF. SIP is ASCII-based, resembling HTTP, and reuses existing IP protocols (DNS, SDP, etc.) to provide media setup and teardown. Since its first publication in 1999, SIP has generated a high level of interest in the VoIP industry, and many people believe that SIP will become the de facto standard protocol for future voice networks.

    We sell the Cisco range of VOIP phones and accessories. Please contact us for further help with your telephony needs.

Showing 1 - 1 of 1 item
Showing 1 - 1 of 1 item