Networking Assignment Pearson ID – PG38606 Assignment – 1 Kyaw Khine Htay | Hnd-43| 20.9.2022 HND-43 Kyaw Khine Htay Contents P1........................................................................................................................................................................... 3 What is network? ......................................................................................................................................... 3 LAN (Local area network) ...................................................................................................................... 3 MAN (Metropolitan area network) ...................................................................................................... 4 WAN (Wide area network) .................................................................................................................... 4 For this project, WAN network ............................................................................................................ 4 What ARE protocols? ................................................................................................................................... 5 The purpose of using network protocols .......................................................................................... 5 TCP/IP .......................................................................................................................................................... 6 The Different between OSI and TCP/IP ............................................................................................ 6 Network Standard ........................................................................................................................................ 6 Some of the international Standard Organizations are .............................................................. 6 IEEE 802.11 (Wireless LAN) ................................................................................................................. 7 Peer to peer................................................................................................................................................ 7 Client server ............................................................................................................................................... 7 P2........................................................................................................................................................................... 8 what is topology? ............................................................................................................................................. 8 Mesh Topology .......................................................................................................................................... 8 Tree Topology ............................................................................................................................................ 9 Network communication ............................................................................................................................ 11 Fiber-optic cables ..................................................................................................................................... 11 Bandwidth ................................................................................................................................................... 11 M1.......................................................................................................................................................................... 11 Network principles ....................................................................................................................................... 11 Advantages and disadvantages between packet and circuit switching ................................ 12 How protocols use network principles effectively ............................................................................ 12 Secure Protocol ........................................................................................................................................ 13 P3.......................................................................................................................................................................... 15 Networking devices .................................................................................................................................... 15 Routers ....................................................................................................................................................... 15 PAGE 1 OF 30 HND-43 Kyaw Khine Htay ....................................................................................................................................................................... 15 Wireless Routers ...................................................................................................................................... 15 Switch.......................................................................................................................................................... 16 Firewall........................................................................................................................................................ 17 Gateway ..................................................................................................................................................... 18 Server Types ................................................................................................................................................. 18 DHCP............................................................................................................................................................ 18 DNS .............................................................................................................................................................. 19 Web Server (M2) ..................................................................................................................................... 19 File server (M2) ...................................................................................................................................... 20 Data base server(M2) ........................................................................................................................... 20 P4.......................................................................................................................................................................... 21 What is workstation hardware? .......................................................................................................... 21 Hardware .................................................................................................................................................... 21 What is network software? ................................................................................................................. 22 Client software (OS) and server software (OS) ...........................................................................23 Linux operating system .........................................................................................................................23 WINDOW Operating System .............................................................................................................. 24 M2 ........................................................................................................................................................................ 24 Sever type choosing .............................................................................................................................. 24 D1 ........................................................................................................................................................................ 26 Choosing topology for this project ....................................................................................................... 26 Topology protocol ................................................................................................................................... 27 PAGE 2 OF 30 HND-43 Kyaw Khine Htay Networking assignment My name is Kyaw Khine Htay and I have been hired to extending the existing LAN network to maintain, supporting, developing and in some cases, designing communication networks within organization by Myanmar IT-Garden company. In this project, I have to create a new network which can access to internet and also to maintain, developing for the future use. I prepare this report to share my ideas about this project. I will explain about the networks, protocols, network standards, network topologies, devices, network software and also the server types. P1 WHAT IS NETWORK? A network is a connection between two or more computer which allow to share and exchange files, resource and also enable electrical communications. A connection between computer can be made up easily by the following ways which are cables, phone lines, radio waves, satellites, or infrared laser beams. The network different into three parts by the rage of the network available distance. They are PAN, LAN, MAN, WAN. LAN (Local area network) Lan is also a type of network which is more useful and wider rage than PAN Network and you can increase the rage as you desire but this network is only available for one local network just like the name. It can be use for a whole building or 2 to 3 building but they have to be proximity one another because the network is Local Area Network. PAGE 3 OF 30 HND-43 Kyaw Khine Htay MAN (Metropolitan area network) MAN can be Known as middle size rage which is between Lan and Wan. Man has larger rage of network than PAN and LAN but not wide as Wan network. So, it is fair enough to call it as a middle rage network, I guess. MAN network combines elements from both kind of network. Which connects multiple Lan to create a bigger network is known as MAN. It can spread network entire are which can be a city or town or may be campus. The ownership and management can be managed by one person or can be a group as a large company or organization. Example of MAN network are television cable, DSL line and IEE. WAN (Wide area network) Same as LAN, WAN connect more devices just like the same function of LAN network but WAN network have much wider available area than LAN’s. While LAN can only connect devices in proximate area, WAN can link devices even they are hundreds of kilometers far each other. The internet which can make transition between devices (such as computer, laptop, phone and etc.,) globally, is the elemental examples of WAN network. Who manage wan network, can be a very large group which contain a lot of administrators because Wan network is large network that can link between hundreds of miles. And also, the ownership of this network can be divided into several company. For this project, WAN network is the better choice to choose because the customer asks for the internet access and WAN network have much more benefits than the others. Because WAN network is unlike LAN network WAN can be connect wider just like which explain before and it can be can be an exceptional communication strategy for the right organizations. WAN network is same as internet but there is a reason why internet is not a best choice because the internet is not secure as we think. We can communicate multiple location through WAN. Without any much more effort, by the help of ISP (internet Service Provider). WAN have much wider network area than other network types. That is the best reason to choose WAN. PAGE 4 OF 30 HND-43 Kyaw Khine Htay WHAT ARE PROTOCOLS? A network protocol which is rules and guideline that lead to do how to transmit, format, and receive information from computers, routers to the end destination. Rules also defined each task and progress during transition between two or more computers. To make the transition clear, networks must follow that rules. The purpose of using network protocols Protocols is needed for every network because without the protocols the devices and the computer won’t know how to connect each other. By using protocols, the data transition can be a lot easier. It can also let the computers to communicate even regardless of the differences in their underlying infrastructures whether design or standard. Open Systems interconnection Model Last years ago, OSi (Open Systems interconnection Model) which published by International Standard Organization is most commonly use which is a document that is created to provide technical requirements, specification, and guidelines to make sure the networks are fit to their desire request and also to ensure the quality, safety and efficiency. OSI have 7 layers to pass through. They are Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer PAGE 5 OF 30 HND-43 Kyaw Khine Htay TCP/IP TCP and IP are two separated protocols which are Transmission Control Protocol and Internet Protocol. TCP is responsible for data transfer after the IP found the address where to send. Like OSI model, TCP/IP also have four layers and this protocol is closely related to FTP, SMTP and HTTP. The four layers are Application Layer Transport Layer Internet Layer Host-to- Network Layer The Different between OSI and TCP/IP OSI use internet layer to define the standard and protocol but TCP/IP only use internet layer. And OSI follows a vertical approach and TCP/IP follows a horizontal approach. For this project TCP/IP is better choice because later these days TCP/Ip is more used than OSI protocol because TC[/IP is more useful and easier to use. NETWORK STANDARD Networking standard define the rules for data communication. They are needed for interoperability of networking technologies and process. We can create and maintain the network connection by the help of standards. Some of the international Standard Organizations are International Standards Organization (ISO) International Telecommunication (ITU) Institute of Electronics and Electrical Engineers (IEEE) American National Standard Institute (ANSI) Internet research Task Force (IETF) Electronic Industries Association (EIA) PAGE 6 OF 30 HND-43 Kyaw Khine Htay IEEE 802.11 (Wireless LAN) 802.11 and 802.11x alludes to a gathering of particular made by the IEEE for remote LAN (WLAN) advancement. 802.11 decides an over-the-air interface between a remote client and a base station or between two remote clients. As the advantages of IEEE 802.11, it is easy to install, it has effective coding technique and it can also reduce wiring cost because it is a wireless LAN IEEE 802.11. but it also has disadvantage which are IEEE802.11 is a wireless so any WIFI ready device can be connect and use it with very easy way. So, it required a lot of network security and also maintenance to keep it under control. As a wire network whenever the network is crowed the traffic can be occurred. There are several types of IEEE 802.11 in it family which are 802.11a, 802.11b, 802.11e,802.1X. Peer to peer Which is very cheap and easier to connect within the small Lan network which have ability to share data, allow others to use its peripherals such as printer, allow other to read and write over computer hard disk and some also allow it to internet access is called peer to peer network and also known as p2p network. It is very cheap cause the operating system software which is already installed on your computer have a power to share the data with other end devices on the network even the features are limited. All the famous operating system come with this feature since manufactured. Client server This server is mostly use in large types of network which contain one or more server computer and it have to share the information to manly workstation computers. It also consists of different roles which are file services, web service, email service and so on. The great example of the client server the world wide web which have access by web browser of the client or computer. For this project, the client server is more suitable because this type of server is specific for the client and the service for the client. And its focus on sharing PAGE 7 OF 30 HND-43 Kyaw Khine Htay information. Client server is more expensive than the peer to peer but it is more stables and scalable. When the client request for the service the server response. P2 what is topology? A network topology is used to represent as a graph which is physical and logical arrangement of nodes and connection in a network. Nodes are usually including in devices such as router and switch. As a physical topology, it is required to connected physically to transfer data each other. But the logical topology doesn’t require to connect physical devices. Each topology types have several different designs for topology and each type is created for its own desire purpose. There are some most commonly used types which are Star Topology, Bus Topology, Mesh Topology, Tree network and Ring Topology. Just like I said before, each of these networks have their own unique advantages and disadvantages. But for the internet access Mesh topology is the better choice. Mesh Topology Mesh topology refers to the way that a device and a computer are connected to one another. With this architecture, the majority of transmissions can still be disseminated even if one of the connections fails. Wireless networks typically use this structure. Full mesh topology and a partially linked mesh are the two types of mesh topology. Full mesh topology The creators of MetroE foresaw the need for devices to be fully mesh connected so that they can all transmit and receive Ethernet frames directly from each other without the requirement for a centralized hub. Ethernet Lan, sometimes known as E-Lan, is the metroE service. The WAN architecture's full mesh topology facilitates PAGE 8 OF 30 HND-43 Kyaw Khine Htay communication between every connected device. The formula n(n-1)/2 can be used to determine how many connections are present in this network. Partially-connected mesh In a partially connected mesh topology, at least two computers in the network are connected to many other computers in the network. It is a cheap way to give a network redundancy. Even if one of the primary machines or connections fails, the rest of the network still operates normally. Advantages of a Mesh Topology manages heavy traffic since numerous devices can transmit data at once. A network or data transmission disruption is not brought on by the breakdown of one device. Data transfer between existing devices is unaffected by the installation of further devices. Disadvantages of a mesh topology This network topology is less preferable since it is more expensive to implement than other network topologies. It takes time and effort to build and maintain the topology. The likelihood of redundant connections is considerable, which raises the expenses and raises the possibility of decreased efficiency. Tree Topology Because several parts are connected to one another in a way that resembles a cluster of trees, it is known as a tree topology. Because it is carried out by both star topology and bus topology, it is also known as Star Bus Topology. Each node in this structure is linked to every other node by a topological hierarchy. There are at least three levels in this hierarchy. That also goes by the name of hierarchical topology. In a tree topology, there are only two types of nodes: the root node, which is the highest node, and the rest, which are the offspring of the root node. Because there PAGE 9 OF 30 HND-43 Kyaw Khine Htay is only one path for data transmission between two nodes, the topological hierarchy in a tree topology is also referred to as a parent-child hierarchy. Advantages of Tree Topology Tree topology can be added a lot of leave nodes in the hierarchical chain and this topology provide high scalability. The other node in this network are not affected if one of their nodes get damaged or does not work. Tree topology can be easily maintained and easily fault identification can be founded. It has highly security. Disadvantages of Tree Topology Because of the number of nodes, the preferment of tree topology can be a little bit slower. If the top-most nodes (the root nodes) is in error, the rest descendants of the root node can be also under problem. This network is very difficult to configure as compared to the other network topologies. PAGE 10 OF 30 HND-43 Kyaw Khine Htay NETWORK COMMUNICATION A communication network is a set of channels through which users can get crucial information. Vertical networks, circuit networks, chain networks, and wheel and spoke networks are the most prevalent networks in many businesses. Fiber-optic cables To create a communication network, we have to connect devices to devices with cables. Fiber cables is the best to use rather than standard cables. Because it can transfer the data in a light form through hundreds of miles and faster than any other traditional electrical cables. There are 4 types of fiber network which are FTTH (Fiber to the home), FTTP (fiber to the premises), FTTC (fiber to the curb) and FTTB (fiber to the building). And there are 2 types of fiber cables which are the multimode fiber and single-mode fiber which are different in sizes and as the different of size the capability will different. Bandwidth It is the amount of data that can be moved across a connection in a given amount of time. Bandwidth is frequently confused with internet speed, but it actually refers to the rate at which data is transferred. BPS (bits per second) and MBPS can be used to assess bandwidth (megabits per second). The cables which connect the network already come with the exact amount of capable bandwidth. For the fiber cables or fiber-optic cables come with the capability of 100gbps (Gigabytes per second). M1 NETWORK PRINCIPLES Network principles are a kind of way that the protocols use to transfer the data through the network. The principles are to help the protocols to transfer faster and secure while the data are transferring. There are commonly two types of network principles. First one is Packet-switching principle. In this type, the data pass through PAGE 11 OF 30 HND-43 Kyaw Khine Htay the network by separate the data into small block or packet based on the destination address. When the data arrive the destination address, the separated small block or packet are reassembled in to the original data form. The second one is circuit switching. This type mostly used in telephone system. The circuit switching is different from the first one because it serves as a physical path between the sender and the receiver while the first one doesn’t require physical path to transfer the data and it transfer individually through the network. Advantages and disadvantages between packet and circuit switching The circuit switching can minimize the delay by the help of having the physical path between the sender and the receiver. It can provide the best user experience and the user can be enjoy communication. The packet switching can’t provide that because unlike circuit switching, it wasn’t work with physical path. If the one of the users, sender or receivers is leave or disconnected, circuit switching can’t be performed and also the price to connect individual physical path to each other is expensive. These are the disadvantages of circuit switching. But the packet switching can transfer the data without require the physical path. So, it can lower the price expense and it does require to connect physically between the sender and receiver. It can also find the right destination and ensure the information reach the desire destination. The packet switching can provide a little low-quality user experience and can be delay or dropped in the transit cause of data traffic. HOW PROTOCOLS USE NETWORK PRINCIPLES EFFECTIVELY The protocols are created to transfer the data from one to another. To perform the transition, the protocols need the network principle as a way to perform the work. By the help of network principle, the protocol performs the transition by the ways of how to transfer, where is the destination, and what to do. If the protocols use the circuit switching, the protocols transfer the data through the physical path to the other user which connect with physical path. It mostly uses in telecommunication to provide the better user experience and fatter data transfer. If the protocols use packet switching, the protocols perform the transition by separate the data into PAGE 12 OF 30 HND-43 Kyaw Khine Htay small packet and transfer it wirelessly. So, by using the network principle which is wired and wirelessly, the protocols can be make sure the data transfer securely and quickly. Secure Protocol HTTPS The most secure protocol is Hypertext Transfer Protocol Secure (HTTPS). Now a day most of the network use HTTPS instead of other because https is more secure than other. HTTPS is similar to HTTP but the different part is http transfer data in hypertext form but https uses encrypted format which is more secure and can’t be used even they got it. The encrypted form prevent hacker from reading and changing information while transferring between browser and web server. Https produce an encrypted link between them by the help of Secure Socket Layer (SSl) or Transport Layer Security (TlS) protocols which is update version of SSl. The advantages of using https are Secure Communication, Data integrity, Privacy and Security, Faster performance than other protocols and have a ability to create a better future which is safe for the user and also website owners. The different between http and https are HTTP HTTPS Uses hypertext (Structured text) from Uses encrypted form Uses port 80 (default) Uses 443 port(default) Not secure Secure (SSL or TLS) Starts with http:// Starts with https:// PAGE 13 OF 30 HND-43 Kyaw Khine Htay What is SSL? SSL mean Secure Socket Layer which is used for authenticating and encrypting communication over a network. How its work? The main function of SSL is to establish a secure connection at the transport layer between the server and the client. Typically, this connection occurs between a website server and the client's browser or between a mail server and the client's email program, such as Outlook. SSL consists of two distinct protocols: The Handshake protocol negotiates crypto suites, creates the shared key, and authenticates the server (and optionally the client). Each connection is isolated by the Record protocol, which also uses the shared key to encrypt messages for the duration of the session. What is TLS An encryption system called Transport Layer Security was created to provide endto-end security for web-based communications. To prevent manipulation and eavesdropping, the Internet Engineering Task Force (IETF) adopted TLS as the default protocol. How its work? The TLS protocol definition moves via two layers, the TLS handshake protocol and the TLS record protocol, once the client and server have decided to interact over TLS. Combining symmetric and asymmetric cryptography is a feature of TLS protocols. Asymmetric cryptography produces key pairs, one public (shared by the sender and receiver) and one private, as opposed to symmetric cryptography, which generates keys known to both the sender and recipient. PAGE 14 OF 30 HND-43 Kyaw Khine Htay P3 NETWORKING DEVICES Routers A hardware device which created to receive, analyze, sent data to another devices. Router is more updated than the other network devices because router was not only can do sending, receiving but also analyze the data and transferred it to another network and also change the packaged, can also sent it to the different network deceives. A wired router has a port and ports to connect directly to the computer through the cables. It comes with the port to connect the modem to have a communication in network. The others ports allow to connect the other end device which are computer, laptop and so on through the wires. The main advantages of the router are router ensure the information didn’t end up the wrong end device which wasn’t supposed to be and it can deliver the data along thousands of channels to their destinations. The disadvantage is it can cause a lot more cause each end device need cable to have a connection from router and require more router for more end devices to connect. There are a lot of types of routers which are wireless router, Brouter, core router and Edge router. Wireless Routers A wireless router is a device which is also known as Wi-Fi router or WLAN. It combines the networking functions of a wireless access point and a router. The wireless router is usually based on the IEEE 802.11 family which is a wireless standard. It connects the device to the network wirelessly as it’s named. Unlike PAGE 15 OF 30 HND-43 Kyaw Khine Htay wired router, the wireless router only has one port which is to connect directly the modem with cables. That allow to get the information from the network and also from the internet. And it also provides to transfer the information through the cables. For the end devices, the router creates home Wi-Fi by built in antennas and allow to communicate and also provide the internet access to all device which have the built in Wi-Fi supports. The advantage of the wireless router is it can reduce the cost of the cables which is affordable unlike wired routers. The disadvantage is it can delay and can cause traffic while the users are using network at the same time. There are two types of best wireless router types in my view which are single-unit wireless which are mostly used in home network and mesh router which is the new one. For this project, 1841 router types is the best choice because it is a new-generation, best-in-class router platform designed to deliver multiple concurrent services at wire-speed performance up to single T1/E1/xDSL speeds. Chassis performance has been increased up to five-fold, and security performance increased up to seven-fold compared to the Cisco 1700 Series. Switch A switch is a physical device which allow you to sent data and also receive data. Switch is not powerful as router. Switch can control the open and close of the connection while the network on switch allow the data to pass through the connection but while the connection close, switch stop the data transition by break the connection. Switches are key building blocks for any network. They connect multiple devices, such as computers, wireless access points, printers, and servers; on the same network within a building or campus. A switch enables connected devices to share information and talk to each other. to set up the switch by using Ethernet cable to connect with router and also with devices. When the device connects to the switch, the switch analyzes the MAC (media access control) address which baked into the device NIC (network-interface card). When device sends data to the other device which connect to the same switch, the data packet pass through the switch which read the header and determine the destination address or PAGE 16 OF 30 HND-43 Kyaw Khine Htay addresses to send the data packet to the appropriate ports which connect the destination devices. There are some advantages which are Increases Capacity, Reduces Burden, Increment Presentation, and Less casing Impacts. Also, it has disadvantages, Costly, Tough Availability issues, Defenseless and Mechanical Component can wear out. For this project, manage switch is more compactable because manage switch are unlike unmanage switch which are designed to just plug in and run, with no settings to configure. The manage switches are fully configurable, are customizable, and provide a range of data on performance. Firewall Firewall is a security device which use to prevent the network from unidentified access to the private network which connected internet. It is only allowing the transition which under the firewall policy. And the rest will be blocked by the firewall policy. It has two types of firewall protection. One is hardware firewall which is a built-in component of the network devices. It is usually come with 4 port for network. The next one is software firewall which have to install in end device or provide by network device since manufactured. There are 6 types of firewall which are stateful firewalls, next generation firewall, proxy server firewall, circuit-level firewall, packet filtering firewall and application-layer firewall. PAGE 17 OF 30 HND-43 Kyaw Khine Htay Gateway Gateway is a entrance and also a exit for the data which data have to pass through or communicate it. A gateway is a node which connect two different transition protocol networks. When the network wants to transfer data to devices, the function of gateway is required. The router also performs some of the gateway functions. There are 5 types of Gateways which are VoIP Truck gateways, media gateways, API, cloud storage gateway and web application firewall. SERVER TYPES DHCP DHCP is also known as Dynamic Host Configuration Protocol, is a network server which provide IP address to every device and also the gateways. It automatically delivers the required network IP address to have a connection to communicate. PAGE 18 OF 30 HND-43 Kyaw Khine Htay Without DHCP server, the administrator has to manually put the IP address to every client device. That will be over work. DHCP usually give dynamic IP address, which is only work for a while and then the address has expired. And the unique dynamic IP address can only be used in one end device which can’t be share with others. Usually the IP address was given by the administrator one by one but DHCP server only need one time to give the IP address and the rest user will have the same network types automatically by the help of DHCP ser. It makes the use and the administrator a lot easier to have a connection. DNS DNS is also known as Domain Name System, is more look like a phone book of the internet. A domain name is a unique name which can be found the correct IP address by using domain name. Which is like managing the mapping between unique name and correct IP address. DNS servers’ control which server the user will connect by translating the unique name which was typed by the user into IP address. Example if the user type unique domain name such as youtube.com into web browser, the DNS server will translate it to find the right IP address of it and the user will reach their destination by the unique name they typed. Web Server (M2) A web server is a server computer that runs software that enables the computer to host an internet web site. A web server is software and hardware that uses HTTP (Hypertext Transfer Protocol) and other protocols to respond to client requests made over the World Wide Web. The main job of a web server is to display website content through storing, processing and delivering webpages to users. The web server has few steps to work before the user interface it. At first the web browser requests the access through the internet which is called HTTP request and also looks for the IP address of the requested web page by translating the DNS (Domain Name System) or by searching in its cache. After receiving the IP address the HTTP server search through the server files to obtain the data to show. After that the web server return the requested data and then the user see the website content data. If the requested PAGE 19 OF 30 HND-43 Kyaw Khine Htay data content not found the web server return the 404 code which mean the data was not found. The two most popular Web server programs are Microsoft’s IIS (Internet Information Services) and Apache, an open-source Web server managed by the Apache Software Foundation. File server (M2) A file server is a computer responsible for the storage and management of data files so that other computers on the same network can access the files. It enables users to share information over a network without having to physically transfer files. An operating system like the Windows operating system includes a file server. A file server enables a connected client device to add a network file system to its local file system (such as those on a C Drive or a D Drive). True, reading or writing files from a local C drive is faster than accessing files via a network. However, the networking effect instantly makes linked and authorized client agents capable of doing fundamental tasks like listing files and folders, reading and writing files, and most significantly, locking files to support group collaboration. The most common way to evaluate file servers is by the quantity of storage space they offer, which is typically measured in Terabytes (TB) or thousands of Gigabytes (GB). Businesses must purchase storage capacity every three to five years. They typically acquire file servers with more space than they would need in order to save space for future years. These days, full and fault-tolerant storage services can be offered by connecting numerous file server nodes into a file server storage ring using cloud storage technology and other technologies like Storage Space Direct. Some types of file servers are Windows File Server (2003 and 2008 Servers) and Windows Server Cluster (Server 2003 mode). Data base server(M2) A piece of hardware that runs database software is called a database server. Users and businesses can store, manage, retrieve, update, or modify files, information logs, and other types of digital data with the use of database software. Back-end operations and client-facing services are the two main parts of database servers. All PAGE 20 OF 30 HND-43 Kyaw Khine Htay digital files and data are kept on a database server's backend. The client-facing services give the individuals or businesses using the database easy access to, modification of, addition to, or monitoring of the data stored on the server. Database servers’ function by combining a database management system with memory and storage space for databases (DBMS). Clients utilize the DBMS program to access their digital data via the database server. The database management system (DBMS) subsequently performs the client's desired operation after receiving a specific command from a database server client. Updates to access privileges, adding new data to the database server, obtaining current data from the server, and making changes to the data stored on the server are all examples of commands from a client to a database server. Some examples of the data base servers are Centralized database server, Distributed database servers, Operational database servers and Cloud database servers. P4 What is workstation hardware? Workstation is a computer used by a user or a group of users working in business or professional work. It can be an individual computer or a group of computers used by the user to perform work. It also can be included one or more monitors which have higher resolution and higher capability of multitasking by the additional random-access memory (RAM). The workstation hardware refers to the personal computer or maintain terminal on the network. Hardware WINDOW The WINDOW is the most required in computer. Without the instruction (WINDOW) the physical part of the computer won’t know what to do or how to work. The WINDOW version under WINDOW 7 can’t provide the better user interface cause of the WINDOW performance of your pc. To use the network the end device personal computer or laptop must have the latest WINDOW version or above WINDOW 7. PAGE 21 OF 30 HND-43 Kyaw Khine Htay RAM To use the WINDOW 7 or above version the requirement of the ram is also required. Insufficient random-access memory (RAM) can slow down the computer and also the work speed. If RAM is lacking your pc can’t perform the multitasking which can slow you down. The minimum requirement for WINDOW 7 was 1 Gigabytes for 32 bit and 2 gigabytes for 64 bits. HDD Hard disk drive is also required to for the workstation hardware. To save the data for permanently we need HDD space. Not having the enough HDD space can cause the data missing. The HDD must have at least 300 gb to store the require data for the work and also to run the network software. CPU A central processing unit (CPU) is the essential of the personal computer, laptop, or all kind of devices. It is a part of a brain of the computer and it have to be at least i5 or Ryzen 7. Because the performant of the computer is a lot depend on the CPU of the computer. We have to make sure the CPU is qualifying enough to use the network. The insufficient component of the device can the affect the network and the low CPU performance can easily collapse. What is network software? Network software is a basic ingredient for all types of network system which was useful for administrators and also reduce the network complexities, and also help to manage, monitor and also better control over network. The most useful advantage of network software is its direct correlation with productivity. Network software PAGE 22 OF 30 HND-43 Kyaw Khine Htay Client software (OS) and server software (OS) Client and server OS are two different types of operating systems. The client OS runs on end-user devices like PCs and other portable devices. In contrast, server OS runs on a specific device known as a server. Therefore, the client and server both operating systems differ. The client server come with the graphical user interface to support the presentation of the data and it come with the various shape of application. The server software requires a lot of space to store the data of the client for the farther use. Linux operating system An open source operating system is Linux (OS). A system's hardware and resources, such as the CPU, memory, and storage, are directly managed by an operating system, which is a piece of software. The OS establishes links between all of your software and the working physical resources by sitting in between apps and hardware. Advantages of Linux Operating System General Public License is included with the Linux operating system (GPL). It doesn't need any licenses, unlike WINDOWS. Thus, using the OS is free. On Linux, even some software is completely free. Because of this, Linux is quite affordable. Linux was developed with security in mind. Linux is far less susceptible to infections than WINDOWS is. Linux can occasionally contract a virus. Due to its small market share, Linux does not attract many hackers. Even if it is, there are locks on each layer, so they cannot simply take over the system. Disadvantages of Linux Operating System Linux might be challenging to understand for those with little technical knowledge. Because of the terminals utilized, the majority of users find it challenging to adapt to Linux. You must type particular commands into terminals' command line interfaces in order to execute tasks. There aren't any widely used Windows or Mac applications available for Linux. The low commercial value of Linux deters many PAGE 23 OF 30 HND-43 Kyaw Khine Htay developers from creating software for it. Despite being an open source operating system, Linux lacks technical help. You must come up with a solution on your own if you want the issue to be solved. WINDOW Operating System Microsoft created the graphical operating system known as WINDOWS. It offers a way to access the internet, lets users browse and store files, run software, play games, and watch videos. It was made available for both personal and business use. Advantages of window Operating System WINDOW have much more advantages in user interface rather than any other operating system. The WINDOW os is widely used in most of the pc and laptop so the market interest is high and all of the software are available and better user interface than the other. This operating system is widely used so the technical support is easy to soft at any store and no need to work on your own to solve the errors. All of the hard ware components are easy to work in window os and a lot of brands to choose because it has high market interest high. Disadvantages of window Operating System Firstly, the WINDOW Operating System is a lot pricier than Linux and it can cost around 50 to 100 dollars for the license fee. Due to the highly user usage the security of this system is a lot more threatful than other and it is normally contract with the virus. And also, the hackers are a lot more interest and possibility for having an attack. M2 Sever type choosing As the given scenario, the DNS server was chosen for this network. The DNS server is to find the right direction to send the data. in the given scenario, the company is a telecom so, DNS server have to be chosen. The company will need to send a lot PAGE 24 OF 30 HND-43 Kyaw Khine Htay of data and also receiving. By the performance of DNS server, the network will be improved in internet dependency, internet speed, security, IP address conversion and also in stability. The internet has been becoming the most essential for people’s daily life and the DNS server can make it easier to use the internet by remembering all IP address. And also, the DNS server can provide the high-speed connections and also a lot more secure because of their attempts, are prevented gaining access into your systems. With the help of DNS server, the user can achieve search term without remembering the IP address. All the domains are converted into IP addresses by using DNS server. The IP address can be updated so, it’s impossible to remember it all but the DNS sever also constantly update which help the user to avoid the important efforts. DNS server can be optimizing by increasing chase invalidation time, using custom name server and also, using CDN which uses their own name servers. The domain IP addresses will be served from the closest cache if the cache invalidation time is increased. Low latency DNS resolution will be the effect of this. Name servers are used to offer a valid IP address that is related to a domain. Each time a domain receives a request, it may be resolved to a different IP address using custom logic by using custom name. By using these methods, the performance of the DNS server will be increase. To perform this server, there should be server hardware device. There is a lot of brand which can provide the best server but the recommended server brand will DELL. Because dell sever Does not require a paid support program to download any updates or firmware. According to research, not uncommon to hear about Dell servers running without a single breakdown for many years. To maintain this hardware is also lower cost than the other brands. Dell’s durability is also qualified and it is also power and the performance is also acceptable. For the last, it is way cheaper than other brands. its exhibition rate is acceptable. Additionally, it appears to be tough and financially perceptive. It is an ideal machine for little and medium measured organizations. Among of different version of Dell servers, Dell PowerEdge R730 Xeon E5-2603 v4 4GB 1TB SAS H330 Rack Server is the most suitable for this network. The specification of this server is Intel Xeon E5-2603 v4, Optional Operating System, 4GB Memory, 1TB SAS H330 Hard Drive which is exact requirement which needed. It will be cost around 2,009$. For the DNS server, cloud DNS can be cost $0.20 per managed zone per month. PAGE 25 OF 30 HND-43 Kyaw Khine Htay D1 CHOOSING TOPOLOGY FOR THIS PROJECT The mesh topology and the tree topology are the most suitable topology for this network. A mesh topology is a network setup where each computer and network device are interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks. Mesh topology can also manage high amounts of traffic, because multiple devices can transmit data simultaneously. A failure of one device does not cause a break in the network or transmission of data. Adding new device to this network won’t be different to connect and it will not also disturb the data transition with old devices. For the tree topology, a unique kind of structure called a tree topology has numerous connected parts arranged like the branches of a tree. For instance, tree topologies are widely used to arrange the data in a database or the machines in a business network. This topology combines the bus topology and the star topology. The nodes are arranged in a hierarchical and central data organization using this architecture. This topology offers excellent scalability because the leaf nodes can expand by adding one or more nodes to the hierarchical chain. If one of a network's nodes is broken or malfunctions, the other nodes are unaffected. Easy fault discovery and maintenance are provided by tree topology. A topology with callable. More nodes can fit inside leaf nodes. Supported by a number of software and hardware providers. Wiring for individual segments that is point to point. Incredibly secure is tree topology. It is applied to WAN. Tree topology is trustworthy. Between these two the mesh topology is much more secure than the tree topology because the mesh topology connected the device directly node to node. But it cost more than the tree topology due to the usage of the cable between node to node. Mesh is also a great choice for the larger network area usage. So, this project mesh topology is much more suitable than the tree topology even it cost more than tree topology system. It is more secure, faster, can manage the data traffic and even it is complex to set up it is worth it. There is another solution. Using both type of topology for different types of work place. Cause some place would PAGE 26 OF 30 HND-43 Kyaw Khine Htay require mesh topology setup and also be compatible with tree topology which is cheaper and more sample than mesh topology. The router will be connected in these topologies based on the project. And also, the switch and cables will be also used in this project. Topology protocol A protocol is a set of guidelines and instructions for sending data. When two or more computers communicate, each step and process have its own set of rules. These guidelines must be followed by networks to successfully transfer data. The physical and data link layers are served by the local area network (LAN) collection of protocols known as Ethernet. The IEEE 802.11standard was built on the Ethernet protocol. The Physical and Data Link Layers are dealt with at a low level by Ethernet. There are two sublayers that make up the data link layer. Logical Link Control (LLC). This sublayer establishes the communication channels between computers or other networked devices. Media Access Control (MAC). A computer or peripheral device on a network is identified by its specific hardware address, which is provided by the network interface card (NIC). Either the hardware address or MAC sublayer addressing is employed. Each packet transported via Ethernet employs the source and destination MAC hardware addresses. Ethernet transmits packets using CSMA/CD. The Carrier Sense Multiple Access with Collision Detection (CSMA/CD) technique helps to prevent transmission collisions when sending and receiving packets across a common network hardware media. When there are no other transmissions on the network, the computer transmissions can start. The packet is retransmitted later if a collision is found. PAGE 27 OF 30 HND-43 Kyaw Khine Htay Refrences https://www.techtarget.com/searchnetworking/definition/protocol https://business.sparklight.com/the-wire/tech-talk/business-internet/wide-areanetwork-advantages https://www.intrado.com/blog/cloud-collaboration/ip-communication-protocols101# https://bookvea.com/what-is-network-standardorganization/#What_is_network_standard_organization https://www.geeksforgeeks.org/standard-organizations-for-data-communications/ https://www.guru99.com/difference-tcp-ip-vs-osimodel.html#:~:text=OSI%20refers%20to%20Open%20Systems,both%20connec tion%2Doriented%20and%20connectionless. https://www.n-able.com/blog/most-effective-types-of-network-topology-a-quickguide-formsp#:~:text=Star%20topology%20is%20by%20far,creating%20a%20star%2Dlik e%20shape. https://study-ccna.com/wan-topologies/ https://www.lifewire.com/what-is-a-router-2618162 https://www.techtarget.com/searchsecurity/definition/firewall https://www.cisco.com/c/en/us/products/routers/what-is-a-network-gateway.html https://www.efficientip.com/what-is-dhcp-and-why-is-it-important/ https://www.namecheap.com/support/knowledgebase/article.aspx/766/10/whatis-dns-server-namePAGE 28 OF 30 HND-43 Kyaw Khine Htay server/?gclid=CjwKCAjw9suYBhBIEiwA7iMhNDx2Frt5qFspm0crjd3mMJ9LN_D8vQk nRs9d2uAerATPFTQRFR-dvRoCpmUQAvD_BwE https://www.tutorialspoint.com/operating_system/os_linux.htm https://www.techopedia.com/definition/441/database-server https://www.gladinet.com/what-is-file-server/ PAGE 29 OF 30