Uploaded by Kyaw Khine Htay

networking assignment

advertisement
Networking Assignment
Pearson ID – PG38606
Assignment – 1
Kyaw Khine Htay | Hnd-43|
20.9.2022
HND-43
Kyaw Khine Htay
Contents
P1........................................................................................................................................................................... 3
What is network? ......................................................................................................................................... 3
LAN (Local area network) ...................................................................................................................... 3
MAN (Metropolitan area network) ...................................................................................................... 4
WAN (Wide area network) .................................................................................................................... 4
For this project, WAN network ............................................................................................................ 4
What ARE protocols? ................................................................................................................................... 5
The purpose of using network protocols .......................................................................................... 5
TCP/IP .......................................................................................................................................................... 6
The Different between OSI and TCP/IP ............................................................................................ 6
Network Standard ........................................................................................................................................ 6
Some of the international Standard Organizations are .............................................................. 6
IEEE 802.11 (Wireless LAN) ................................................................................................................. 7
Peer to peer................................................................................................................................................ 7
Client server ............................................................................................................................................... 7
P2........................................................................................................................................................................... 8
what is topology? ............................................................................................................................................. 8
Mesh Topology .......................................................................................................................................... 8
Tree Topology ............................................................................................................................................ 9
Network communication ............................................................................................................................ 11
Fiber-optic cables ..................................................................................................................................... 11
Bandwidth ................................................................................................................................................... 11
M1.......................................................................................................................................................................... 11
Network principles ....................................................................................................................................... 11
Advantages and disadvantages between packet and circuit switching ................................ 12
How protocols use network principles effectively ............................................................................ 12
Secure Protocol ........................................................................................................................................ 13
P3.......................................................................................................................................................................... 15
Networking devices .................................................................................................................................... 15
Routers ....................................................................................................................................................... 15
PAGE 1 OF 30
HND-43
Kyaw Khine Htay
....................................................................................................................................................................... 15
Wireless Routers ...................................................................................................................................... 15
Switch.......................................................................................................................................................... 16
Firewall........................................................................................................................................................ 17
Gateway ..................................................................................................................................................... 18
Server Types ................................................................................................................................................. 18
DHCP............................................................................................................................................................ 18
DNS .............................................................................................................................................................. 19
Web Server (M2) ..................................................................................................................................... 19
File server (M2) ...................................................................................................................................... 20
Data base server(M2) ........................................................................................................................... 20
P4.......................................................................................................................................................................... 21
What is workstation hardware? .......................................................................................................... 21
Hardware .................................................................................................................................................... 21
What is network software? ................................................................................................................. 22
Client software (OS) and server software (OS) ...........................................................................23
Linux operating system .........................................................................................................................23
WINDOW Operating System .............................................................................................................. 24
M2 ........................................................................................................................................................................ 24
Sever type choosing .............................................................................................................................. 24
D1 ........................................................................................................................................................................ 26
Choosing topology for this project ....................................................................................................... 26
Topology protocol ................................................................................................................................... 27
PAGE 2 OF 30
HND-43
Kyaw Khine Htay
Networking assignment
My name is Kyaw Khine Htay and I have been hired to extending the existing LAN
network to maintain, supporting, developing and in some cases, designing
communication networks within organization by Myanmar IT-Garden company. In
this project, I have to create a new network which can access to internet and also
to maintain, developing for the future use. I prepare this report to share my ideas
about this project. I will explain about the networks, protocols, network standards,
network topologies, devices, network software and also the server types.
P1
WHAT IS NETWORK?
A network is a connection between two or more computer which allow to share and
exchange files, resource and also enable electrical communications. A connection
between computer can be made up easily by the following ways which are cables,
phone lines, radio waves, satellites, or infrared laser beams. The network different
into three parts by the rage of the network available distance. They are PAN, LAN,
MAN, WAN.
LAN (Local area network)
Lan is also a type of network which is more useful and wider rage than PAN Network
and you can increase the rage as you desire but this network is only available for
one local network just like the name. It can be use for a whole building or 2 to 3
building but they have to be proximity one another because the network is Local
Area Network.
PAGE 3 OF 30
HND-43
Kyaw Khine Htay
MAN (Metropolitan area network)
MAN can be Known as middle size rage which is between Lan and Wan. Man has
larger rage of network than PAN and LAN but not wide as Wan network. So, it is fair
enough to call it as a middle rage network, I guess. MAN network combines elements
from both kind of network. Which connects multiple Lan to create a bigger network
is known as MAN. It can spread network entire are which can be a city or town or
may be campus. The ownership and management can be managed by one person
or can be a group as a large company or organization. Example of MAN network
are television cable, DSL line and IEE.
WAN (Wide area network)
Same as LAN, WAN connect more devices just like the same function of LAN network
but WAN network have much wider available area than LAN’s. While LAN can only
connect devices in proximate area, WAN can link devices even they are hundreds of
kilometers far each other. The internet which can make transition between devices
(such as computer, laptop, phone and etc.,) globally, is the elemental examples of
WAN network. Who manage wan network, can be a very large group which contain
a lot of administrators because Wan network is large network that can link between
hundreds of miles. And also, the ownership of this network can be divided into
several company.
For this project, WAN network is the better choice to choose because the
customer asks for the internet access and WAN network have much more benefits
than the others. Because WAN network is unlike LAN network WAN can be connect
wider just like which explain before and it can be can be an exceptional
communication strategy for the right organizations. WAN network is same as
internet but there is a reason why internet is not a best choice because the internet
is not secure as we think. We can communicate multiple location through WAN.
Without any much more effort, by the help of ISP (internet Service Provider). WAN
have much wider network area than other network types. That is the best reason to
choose WAN.
PAGE 4 OF 30
HND-43
Kyaw Khine Htay
WHAT ARE PROTOCOLS?
A network protocol which is rules and guideline that lead to do how to transmit,
format, and receive information from computers, routers to the end destination.
Rules also defined each task and progress during transition between two or more
computers. To make the transition clear, networks must follow that rules.
The purpose of using network protocols
Protocols is needed for every network because without the protocols the devices and
the computer won’t know how to connect each other. By using protocols, the data
transition can be a lot easier. It can also let the computers to communicate even
regardless of the differences in their underlying infrastructures whether design or
standard.
Open Systems interconnection Model
Last years ago, OSi (Open Systems interconnection Model) which published by
International Standard Organization is most commonly use which is a document that
is created to provide technical requirements, specification, and guidelines to make
sure the networks are fit to their desire request and also to ensure the quality, safety
and efficiency. OSI have 7 layers to pass through.
They are
 Application Layer
 Presentation Layer
 Session Layer
 Transport Layer
 Network Layer
 Data Link Layer
 Physical Layer
PAGE 5 OF 30
HND-43
Kyaw Khine Htay
TCP/IP
TCP and IP are two separated protocols which are Transmission Control Protocol and
Internet Protocol. TCP is responsible for data transfer after the IP found the address
where to send. Like OSI model, TCP/IP also have four layers and this protocol is
closely related to FTP, SMTP and HTTP. The four layers are
 Application Layer
 Transport Layer
 Internet Layer
 Host-to- Network Layer
The Different between OSI and TCP/IP
OSI use internet layer to define the standard and protocol but TCP/IP only use
internet layer. And OSI follows a vertical approach and TCP/IP follows a horizontal
approach.
For this project TCP/IP is better choice because later these days TCP/Ip is more used
than OSI protocol because TC[/IP is more useful and easier to use.
NETWORK STANDARD
Networking standard define the rules for data communication. They are needed for
interoperability of networking technologies and process. We can create and maintain
the network connection by the help of standards.
Some of the international Standard Organizations are
 International Standards Organization (ISO)
 International Telecommunication (ITU)
 Institute of Electronics and Electrical Engineers (IEEE)
 American National Standard Institute (ANSI)
 Internet research Task Force (IETF)
 Electronic Industries Association (EIA)
PAGE 6 OF 30
HND-43
Kyaw Khine Htay
IEEE 802.11 (Wireless LAN)
802.11 and 802.11x alludes to a gathering of particular made by the IEEE for remote
LAN (WLAN) advancement. 802.11 decides an over-the-air interface between a
remote client and a base station or between two remote clients. As the advantages
of IEEE 802.11, it is easy to install, it has effective coding technique and it can also
reduce wiring cost because it is a wireless LAN IEEE 802.11. but it also has
disadvantage which are IEEE802.11 is a wireless so any WIFI ready device can be
connect and use it with very easy way. So, it required a lot of network security and
also maintenance to keep it under control. As a wire network whenever the network
is crowed the traffic can be occurred. There are several types of IEEE 802.11 in it
family which are 802.11a, 802.11b, 802.11e,802.1X.
Peer to peer
Which is very cheap and easier to connect within the small Lan network which have
ability to share data, allow others to use its peripherals such as printer, allow other
to read and write over computer hard disk and some also allow it to internet access
is called peer to peer network and also known as p2p network. It is very cheap cause
the operating system software which is already installed on your computer have a
power to share the data with other end devices on the network even the features
are limited. All the famous operating system come with this feature since
manufactured.
Client server
This server is mostly use in large types of network which contain one or more server
computer and it have to share the information to manly workstation computers. It
also consists of different roles which are file services, web service, email service and
so on. The great example of the client server the world wide web which have access
by web browser of the client or computer.
For this project, the client server is more suitable because this type of server is
specific for the client and the service for the client. And its focus on sharing
PAGE 7 OF 30
HND-43
Kyaw Khine Htay
information. Client server is more expensive than the peer to peer but it is more
stables and scalable. When the client request for the service the server response.
P2
what is topology?
A network topology is used to represent as a graph which is physical and logical
arrangement of nodes and connection in a network. Nodes are usually including in
devices such as router and switch. As a physical topology, it is required to connected
physically to transfer data each other. But the logical topology doesn’t require to
connect physical devices. Each topology types have several different designs for
topology and each type is created for its own desire purpose. There are some most
commonly used types which are Star Topology, Bus Topology, Mesh Topology, Tree
network and Ring Topology. Just like I said before, each of these networks have
their own unique advantages and disadvantages. But for the internet access Mesh
topology is the better choice.
Mesh Topology
Mesh topology refers to the way that a device and a computer are connected to one
another. With this architecture, the majority of transmissions can still be
disseminated even if one of the connections fails. Wireless networks typically use
this structure. Full mesh topology and a partially linked mesh are the two types of
mesh topology.
Full mesh topology
The creators of MetroE foresaw the need for devices to be fully mesh connected so
that they can all transmit and receive Ethernet frames directly from each other
without the requirement for a centralized hub. Ethernet Lan, sometimes known as
E-Lan, is the metroE service. The WAN architecture's full mesh topology facilitates
PAGE 8 OF 30
HND-43
Kyaw Khine Htay
communication between every connected device. The formula n(n-1)/2 can be used
to determine how many connections are present in this network.
Partially-connected mesh
In a partially connected mesh topology, at least two computers in the network are
connected to many other computers in the network. It is a cheap way to give a
network redundancy. Even if one of the primary machines or connections fails, the
rest of the network still operates normally.
Advantages of a Mesh Topology
 manages heavy traffic since numerous devices can transmit data at once.
 A network or data transmission disruption is not brought on by the breakdown
of one device.
 Data transfer between existing devices is unaffected by the installation of
further devices.
Disadvantages of a mesh topology
 This network topology is less preferable since it is more expensive to implement
than other network topologies.
 It takes time and effort to build and maintain the topology.
 The likelihood of redundant connections is considerable, which raises the
expenses and raises the possibility of decreased efficiency.
Tree Topology
Because several parts are connected to one another in a way that resembles a
cluster of trees, it is known as a tree topology. Because it is carried out by both star
topology and bus topology, it is also known as Star Bus Topology. Each node in this
structure is linked to every other node by a topological hierarchy. There are at least
three levels in this hierarchy. That also goes by the name of hierarchical topology.
In a tree topology, there are only two types of nodes: the root node, which is the
highest node, and the rest, which are the offspring of the root node. Because there
PAGE 9 OF 30
HND-43
Kyaw Khine Htay
is only one path for data transmission between two nodes, the topological hierarchy
in a tree topology is also referred to as a parent-child hierarchy.
Advantages of Tree Topology
 Tree topology can be added a lot of leave nodes in the hierarchical chain and
this topology provide high scalability.
 The other node in this network are not affected if one of their nodes get
damaged or does not work.
 Tree topology can be easily maintained and easily fault identification can be
founded.
 It has highly security.
Disadvantages of Tree Topology
 Because of the number of nodes, the preferment of tree topology can be a
little bit slower.
 If the top-most nodes (the root nodes) is in error, the rest descendants of the
root node can be also under problem.
 This network is very difficult to configure as compared to the other network
topologies.
PAGE 10 OF 30
HND-43
Kyaw Khine Htay
NETWORK COMMUNICATION
A communication network is a set of channels through which users can get crucial
information. Vertical networks, circuit networks, chain networks, and wheel and
spoke networks are the most prevalent networks in many businesses.
Fiber-optic cables
To create a communication network, we have to connect devices to devices with
cables. Fiber cables is the best to use rather than standard cables. Because it can
transfer the data in a light form through hundreds of miles and faster than any other
traditional electrical cables. There are 4 types of fiber network which are FTTH (Fiber
to the home), FTTP (fiber to the premises), FTTC (fiber to the curb) and FTTB (fiber
to the building). And there are 2 types of fiber cables which are the multimode fiber
and single-mode fiber which are different in sizes and as the different of size the
capability will different.
Bandwidth
It is the amount of data that can be moved across a connection in a given amount
of time. Bandwidth is frequently confused with internet speed, but it actually refers
to the rate at which data is transferred. BPS (bits per second) and MBPS can be
used to assess bandwidth (megabits per second). The cables which connect the
network already come with the exact amount of capable bandwidth. For the fiber
cables or fiber-optic cables come with the capability of 100gbps (Gigabytes per
second).
M1
NETWORK PRINCIPLES
Network principles are a kind of way that the protocols use to transfer the data
through the network. The principles are to help the protocols to transfer faster and
secure while the data are transferring. There are commonly two types of network
principles. First one is Packet-switching principle. In this type, the data pass through
PAGE 11 OF 30
HND-43
Kyaw Khine Htay
the network by separate the data into small block or packet based on the destination
address. When the data arrive the destination address, the separated small block or
packet are reassembled in to the original data form. The second one is circuit
switching. This type mostly used in telephone system. The circuit switching is
different from the first one because it serves as a physical path between the sender
and the receiver while the first one doesn’t require physical path to transfer the data
and it transfer individually through the network.
Advantages and disadvantages between packet and circuit switching
The circuit switching can minimize the delay by the help of having the physical path
between the sender and the receiver. It can provide the best user experience and
the user can be enjoy communication. The packet switching can’t provide that
because unlike circuit switching, it wasn’t work with physical path. If the one of the
users, sender or receivers is leave or disconnected, circuit switching can’t be
performed and also the price to connect individual physical path to each other is
expensive. These are the disadvantages of circuit switching. But the packet
switching can transfer the data without require the physical path. So, it can lower
the price expense and it does require to connect physically between the sender and
receiver. It can also find the right destination and ensure the information reach the
desire destination. The packet switching can provide a little low-quality user
experience and can be delay or dropped in the transit cause of data traffic.
HOW PROTOCOLS USE NETWORK PRINCIPLES EFFECTIVELY
The protocols are created to transfer the data from one to another. To perform the
transition, the protocols need the network principle as a way to perform the work.
By the help of network principle, the protocol performs the transition by the ways
of how to transfer, where is the destination, and what to do. If the protocols use the
circuit switching, the protocols transfer the data through the physical path to the
other user which connect with physical path. It mostly uses in telecommunication to
provide the better user experience and fatter data transfer. If the protocols use
packet switching, the protocols perform the transition by separate the data into
PAGE 12 OF 30
HND-43
Kyaw Khine Htay
small packet and transfer it wirelessly. So, by using the network principle which is
wired and wirelessly, the protocols can be make sure the data transfer securely and
quickly.
Secure Protocol
HTTPS
The most secure protocol is Hypertext Transfer Protocol Secure (HTTPS). Now a day
most of the network use HTTPS instead of other because https is more secure than
other. HTTPS is similar to HTTP but the different part is http transfer data in
hypertext form but https uses encrypted format which is more secure and can’t be
used even they got it. The encrypted form prevent hacker from reading and
changing information while transferring between browser and web server. Https
produce an encrypted link between them by the help of Secure Socket Layer (SSl)
or Transport Layer Security (TlS) protocols which is update version of SSl. The
advantages of using https are Secure Communication, Data integrity, Privacy and
Security, Faster performance than other protocols and have a ability to create a
better future which is safe for the user and also website owners. The different
between http and https are
HTTP
HTTPS
Uses hypertext (Structured text) from
Uses encrypted form
Uses port 80 (default)
Uses 443 port(default)
Not secure
Secure (SSL or TLS)
Starts with http://
Starts with https://
PAGE 13 OF 30
HND-43
Kyaw Khine Htay
What is SSL?
SSL mean Secure Socket Layer which is used for authenticating and encrypting
communication over a network.
How its work?
The main function of SSL is to establish a secure connection at the transport layer
between the server and the client. Typically, this connection occurs between a
website server and the client's browser or between a mail server and the client's
email program, such as Outlook.
SSL consists of two distinct protocols:
The Handshake protocol negotiates crypto suites, creates the shared key, and
authenticates the server (and optionally the client).
Each connection is isolated by the Record protocol, which also uses the shared key
to encrypt messages for the duration of the session.
What is TLS
An encryption system called Transport Layer Security was created to provide endto-end security for web-based communications. To prevent manipulation and
eavesdropping, the Internet Engineering Task Force (IETF) adopted TLS as the
default protocol.
How its work?
The TLS protocol definition moves via two layers, the TLS handshake protocol and
the TLS record protocol, once the client and server have decided to interact over
TLS. Combining symmetric and asymmetric cryptography is a feature of TLS
protocols. Asymmetric cryptography produces key pairs, one public (shared by the
sender and receiver) and one private, as opposed to symmetric cryptography, which
generates keys known to both the sender and recipient.
PAGE 14 OF 30
HND-43
Kyaw Khine Htay
P3
NETWORKING DEVICES
Routers
A hardware device which created to receive, analyze, sent data to another devices.
Router is more updated than the other network devices because router was not only
can do sending, receiving but also analyze the data and transferred it to another
network and also change the packaged, can also sent it to the different network
deceives. A wired router has a port and ports to connect directly to the computer
through the cables. It comes with the port to connect the modem to have a
communication in network. The others ports allow to connect the other end device
which are computer, laptop and so on through the wires. The main advantages of
the router are router ensure the information didn’t end up the wrong end device
which wasn’t supposed to be and it can deliver the data along thousands of channels
to their destinations. The disadvantage is it can cause a lot more cause each end
device need cable to have a connection from router and require more router for
more end devices to connect. There are a lot of types of routers which are wireless
router, Brouter, core router and Edge router.
Wireless Routers
A wireless router is a device which is also known as Wi-Fi router or WLAN. It
combines the networking functions of a wireless access point and a router. The
wireless router is usually based on the IEEE 802.11 family which is a wireless
standard. It connects the device to the network wirelessly as it’s named. Unlike
PAGE 15 OF 30
HND-43
Kyaw Khine Htay
wired router, the wireless router only has one port which is to connect directly the
modem with cables. That allow to get the information from the network and also
from the internet. And it also provides to transfer the information through the
cables. For the end devices, the router creates home Wi-Fi by built in antennas and
allow to communicate and also provide the internet access to all device which have
the built in Wi-Fi supports. The advantage of the wireless router is it can reduce the
cost of the cables which is affordable unlike wired routers. The disadvantage is it
can delay and can cause traffic while the users are using network at the same time.
There are two types of best wireless router types in my view which are single-unit
wireless which are mostly used in home network and mesh router which is the new
one.
For this project, 1841 router types is the best choice because it is a new-generation,
best-in-class router platform designed to deliver multiple concurrent services at
wire-speed performance up to single T1/E1/xDSL speeds. Chassis performance has
been increased up to five-fold, and security performance increased up to seven-fold
compared to the Cisco 1700 Series.
Switch
A switch is a physical device which allow you to sent data and also receive data.
Switch is not powerful as router. Switch can control the open and close of the
connection while the network on switch allow the data to pass through the
connection but while the connection close, switch stop the data transition by break
the connection. Switches are key building blocks for any network. They connect
multiple devices, such as computers, wireless access points, printers, and servers;
on the same network within a building or campus. A switch enables connected
devices to share information and talk to each other. to set up the switch by using
Ethernet cable to connect with router and also with devices. When the device
connects to the switch, the switch analyzes the MAC (media access control) address
which baked into the device NIC (network-interface card). When device sends data
to the other device which connect to the same switch, the data packet pass through
the switch which read the header and determine the destination address or
PAGE 16 OF 30
HND-43
Kyaw Khine Htay
addresses to send the data packet to the appropriate ports which connect the
destination devices. There are some advantages which are Increases Capacity,
Reduces Burden, Increment Presentation, and Less casing Impacts. Also, it has
disadvantages, Costly, Tough Availability issues, Defenseless and Mechanical
Component can wear out.
For this project, manage switch is more compactable because manage switch are
unlike unmanage switch which are designed to just plug in and run, with no settings
to configure. The manage switches are fully configurable, are customizable, and
provide a range of data on performance.
Firewall
Firewall is a security device which use to prevent the network from unidentified
access to the private network which connected internet. It is only allowing the
transition which under the firewall policy. And the rest will be blocked by the firewall
policy. It has two types of firewall protection. One is hardware firewall which is a
built-in component of the network devices. It is usually come with 4 port for
network. The next one is software firewall which have to install in end device or
provide by network device since manufactured. There are 6 types of firewall which
are stateful firewalls, next generation firewall, proxy server firewall, circuit-level
firewall, packet filtering firewall and application-layer firewall.
PAGE 17 OF 30
HND-43
Kyaw Khine Htay
Gateway
Gateway is a entrance and also a exit for the data which data have to pass through
or communicate it. A gateway is a node which connect two different transition
protocol networks. When the network wants to transfer data to devices, the function
of gateway is required. The router also performs some of the gateway functions.
There are 5 types of Gateways which are VoIP Truck gateways, media gateways,
API, cloud storage gateway and web application firewall.
SERVER TYPES
DHCP
DHCP is also known as Dynamic Host Configuration Protocol, is a network server
which provide IP address to every device and also the gateways. It automatically
delivers the required network IP address to have a connection to communicate.
PAGE 18 OF 30
HND-43
Kyaw Khine Htay
Without DHCP server, the administrator has to manually put the IP address to every
client device. That will be over work. DHCP usually give dynamic IP address, which
is only work for a while and then the address has expired. And the unique dynamic
IP address can only be used in one end device which can’t be share with others.
Usually the IP address was given by the administrator one by one but DHCP server
only need one time to give the IP address and the rest user will have the same
network types automatically by the help of DHCP ser. It makes the use and the
administrator a lot easier to have a connection.
DNS
DNS is also known as Domain Name System, is more look like a phone book of the
internet. A domain name is a unique name which can be found the correct IP address
by using domain name. Which is like managing the mapping between unique name
and correct IP address. DNS servers’ control which server the user will connect by
translating the unique name which was typed by the user into IP address. Example
if the user type unique domain name such as youtube.com into web browser, the
DNS server will translate it to find the right IP address of it and the user will reach
their destination by the unique name they typed.
Web Server (M2)
A web server is a server computer that runs software that enables the computer to
host an internet web site. A web server is software and hardware that uses HTTP
(Hypertext Transfer Protocol) and other protocols to respond to client requests made
over the World Wide Web. The main job of a web server is to display website content
through storing, processing and delivering webpages to users. The web server has
few steps to work before the user interface it. At first the web browser requests the
access through the internet which is called HTTP request and also looks for the IP
address of the requested web page by translating the DNS (Domain Name System)
or by searching in its cache. After receiving the IP address the HTTP server search
through the server files to obtain the data to show. After that the web server return
the requested data and then the user see the website content data. If the requested
PAGE 19 OF 30
HND-43
Kyaw Khine Htay
data content not found the web server return the 404 code which mean the data
was not found. The two most popular Web server programs are Microsoft’s IIS
(Internet Information Services) and Apache, an open-source Web server managed
by the Apache Software Foundation.
File server (M2)
A file server is a computer responsible for the storage and management of data files
so that other computers on the same network can access the files. It enables users
to share information over a network without having to physically transfer files. An
operating system like the Windows operating system includes a file server. A file
server enables a connected client device to add a network file system to its local file
system (such as those on a C Drive or a D Drive). True, reading or writing files from
a local C drive is faster than accessing files via a network. However, the networking
effect instantly makes linked and authorized client agents capable of doing
fundamental tasks like listing files and folders, reading and writing files, and most
significantly, locking files to support group collaboration. The most common way to
evaluate file servers is by the quantity of storage space they offer, which is typically
measured in Terabytes (TB) or thousands of Gigabytes (GB). Businesses must
purchase storage capacity every three to five years. They typically acquire file
servers with more space than they would need in order to save space for future
years. These days, full and fault-tolerant storage services can be offered by
connecting numerous file server nodes into a file server storage ring using cloud
storage technology and other technologies like Storage Space Direct. Some types
of file servers are Windows File Server (2003 and 2008 Servers) and Windows
Server Cluster (Server 2003 mode).
Data base server(M2)
A piece of hardware that runs database software is called a database server. Users
and businesses can store, manage, retrieve, update, or modify files, information
logs, and other types of digital data with the use of database software. Back-end
operations and client-facing services are the two main parts of database servers. All
PAGE 20 OF 30
HND-43
Kyaw Khine Htay
digital files and data are kept on a database server's backend. The client-facing
services give the individuals or businesses using the database easy access to,
modification of, addition to, or monitoring of the data stored on the server. Database
servers’ function by combining a database management system with memory and
storage space for databases (DBMS). Clients utilize the DBMS program to access
their digital data via the database server. The database management system
(DBMS) subsequently performs the client's desired operation after receiving a
specific command from a database server client. Updates to access privileges,
adding new data to the database server, obtaining current data from the server,
and making changes to the data stored on the server are all examples of commands
from a client to a database server. Some examples of the data base servers are
Centralized database server, Distributed database servers, Operational database
servers and Cloud database servers.
P4
What is workstation hardware?
Workstation is a computer used by a user or a group of users working in business
or professional work. It can be an individual computer or a group of computers used
by the user to perform work. It also can be included one or more monitors which
have higher resolution and higher capability of multitasking by the additional
random-access memory (RAM). The workstation hardware refers to the personal
computer or maintain terminal on the network.
Hardware
WINDOW
The WINDOW is the most required in computer. Without the instruction (WINDOW)
the physical part of the computer won’t know what to do or how to work. The
WINDOW version under WINDOW 7 can’t provide the better user interface cause of
the WINDOW performance of your pc. To use the network the end device personal
computer or laptop must have the latest WINDOW version or above WINDOW 7.
PAGE 21 OF 30
HND-43
Kyaw Khine Htay
RAM
To use the WINDOW 7 or above version the requirement of the ram is also required.
Insufficient random-access memory (RAM) can slow down the computer and also
the work speed. If RAM is lacking your pc can’t perform the multitasking which can
slow you down. The minimum requirement for WINDOW 7 was 1 Gigabytes for 32
bit and 2 gigabytes for 64 bits.
HDD
Hard disk drive is also required to for the workstation hardware. To save the data
for permanently we need HDD space. Not having the enough HDD space can cause
the data missing. The HDD must have at least 300 gb to store the require data for
the work and also to run the network software.
CPU
A central processing unit (CPU) is the essential of the personal computer, laptop, or
all kind of devices. It is a part of a brain of the computer and it have to be at least
i5 or Ryzen 7. Because the performant of the computer is a lot depend on the CPU
of the computer. We have to make sure the CPU is qualifying enough to use the
network. The insufficient component of the device can the affect the network and
the low CPU performance can easily collapse.
What is network software?
Network software is a basic ingredient for all types of network system which was
useful for administrators and also reduce the network complexities, and also help to
manage, monitor and also better control over network. The most useful advantage
of network software is its direct correlation with productivity.
Network software
PAGE 22 OF 30
HND-43
Kyaw Khine Htay
Client software (OS) and server software (OS)
Client and server OS are two different types of operating systems. The client OS
runs on end-user devices like PCs and other portable devices. In contrast, server
OS runs on a specific device known as a server. Therefore, the client and server
both operating systems differ. The client server come with the graphical user
interface to support the presentation of the data and it come with the various shape
of application. The server software requires a lot of space to store the data of the
client for the farther use.
Linux operating system
An open source operating system is Linux (OS). A system's hardware and resources,
such as the CPU, memory, and storage, are directly managed by an operating
system, which is a piece of software. The OS establishes links between all of your
software and the working physical resources by sitting in between apps and
hardware.
Advantages of Linux Operating System
General Public License is included with the Linux operating system (GPL). It doesn't
need any licenses, unlike WINDOWS. Thus, using the OS is free. On Linux, even
some software is completely free. Because of this, Linux is quite affordable. Linux
was developed with security in mind. Linux is far less susceptible to infections than
WINDOWS is. Linux can occasionally contract a virus. Due to its small market share,
Linux does not attract many hackers. Even if it is, there are locks on each layer, so
they cannot simply take over the system.
Disadvantages of Linux Operating System
Linux might be challenging to understand for those with little technical knowledge.
Because of the terminals utilized, the majority of users find it challenging to adapt
to Linux. You must type particular commands into terminals' command line
interfaces in order to execute tasks. There aren't any widely used Windows or Mac
applications available for Linux. The low commercial value of Linux deters many
PAGE 23 OF 30
HND-43
Kyaw Khine Htay
developers from creating software for it. Despite being an open source operating
system, Linux lacks technical help. You must come up with a solution on your own
if you want the issue to be solved.
WINDOW Operating System
Microsoft created the graphical operating system known as WINDOWS. It offers a
way to access the internet, lets users browse and store files, run software, play
games, and watch videos. It was made available for both personal and business use.
Advantages of window Operating System
WINDOW have much more advantages in user interface rather than any other
operating system. The WINDOW os is widely used in most of the pc and laptop so
the market interest is high and all of the software are available and better user
interface than the other. This operating system is widely used so the technical
support is easy to soft at any store and no need to work on your own to solve the
errors. All of the hard ware components are easy to work in window os and a lot of
brands to choose because it has high market interest high.
Disadvantages of window Operating System
Firstly, the WINDOW Operating System is a lot pricier than Linux and it can cost
around 50 to 100 dollars for the license fee. Due to the highly user usage the security
of this system is a lot more threatful than other and it is normally contract with the
virus. And also, the hackers are a lot more interest and possibility for having an
attack.
M2
Sever type choosing
As the given scenario, the DNS server was chosen for this network. The DNS server
is to find the right direction to send the data. in the given scenario, the company is
a telecom so, DNS server have to be chosen. The company will need to send a lot
PAGE 24 OF 30
HND-43
Kyaw Khine Htay
of data and also receiving. By the performance of DNS server, the network will be
improved in internet dependency, internet speed, security, IP address conversion
and also in stability. The internet has been becoming the most essential for people’s
daily life and the DNS server can make it easier to use the internet by remembering
all IP address. And also, the DNS server can provide the high-speed connections
and also a lot more secure because of their attempts, are prevented gaining access
into your systems. With the help of DNS server, the user can achieve search term
without remembering the IP address. All the domains are converted into IP
addresses by using DNS server. The IP address can be updated so, it’s impossible
to remember it all but the DNS sever also constantly update which help the user to
avoid the important efforts. DNS server can be optimizing by increasing chase
invalidation time, using custom name server and also, using CDN which uses their
own name servers. The domain IP addresses will be served from the closest
cache if the cache invalidation time is increased. Low latency DNS
resolution will be the effect of this. Name servers are used to offer a valid
IP address that is related to a domain. Each time a domain receives a
request, it may be resolved to a different IP address using custom logic by
using custom name. By using these methods, the performance of the DNS
server will be increase.
To perform this server, there should be server hardware device. There is a lot of
brand which can provide the best server but the recommended server brand will
DELL. Because dell sever Does not require a paid support program to download any
updates or firmware. According to research, not uncommon to hear about Dell
servers running without a single breakdown for many years. To maintain this
hardware is also lower cost than the other brands. Dell’s durability is also qualified
and it is also power and the performance is also acceptable. For the last, it is way
cheaper than other brands. its exhibition rate is acceptable. Additionally, it appears
to be tough and financially perceptive. It is an ideal machine for little and medium
measured organizations. Among of different version of Dell servers, Dell PowerEdge
R730 Xeon E5-2603 v4 4GB 1TB SAS H330 Rack Server is the most suitable for this
network. The specification of this server is Intel Xeon E5-2603 v4, Optional
Operating System, 4GB Memory, 1TB SAS H330 Hard Drive which is exact
requirement which needed. It will be cost around 2,009$. For the DNS server, cloud
DNS can be cost $0.20 per managed zone per month.
PAGE 25 OF 30
HND-43
Kyaw Khine Htay
D1
CHOOSING TOPOLOGY FOR THIS PROJECT
The mesh topology and the tree topology are the most suitable topology for this
network. A mesh topology is a network setup where each computer and network
device are interconnected with one another. This topology setup allows for most
transmissions to be distributed even if one of the connections goes down. It is a
topology commonly used for wireless networks. Mesh topology can also manage
high amounts of traffic, because multiple devices can transmit data simultaneously.
A failure of one device does not cause a break in the network or transmission of
data. Adding new device to this network won’t be different to connect and it will not
also disturb the data transition with old devices. For the tree topology, a unique kind
of structure called a tree topology has numerous connected parts arranged like the
branches of a tree. For instance, tree topologies are widely used to arrange the data
in a database or the machines in a business network. This topology combines the
bus topology and the star topology. The nodes are arranged in a hierarchical and
central data organization using this architecture. This topology offers excellent
scalability because the leaf nodes can expand by adding one or more nodes to the
hierarchical chain. If one of a network's nodes is broken or malfunctions, the other
nodes are unaffected. Easy fault discovery and maintenance are provided by tree
topology. A topology with callable. More nodes can fit inside leaf nodes. Supported
by a number of software and hardware providers. Wiring for individual segments
that is point to point. Incredibly secure is tree topology. It is applied to WAN. Tree
topology is trustworthy. Between these two the mesh topology is much more secure
than the tree topology because the mesh topology connected the device directly
node to node. But it cost more than the tree topology due to the usage of the cable
between node to node. Mesh is also a great choice for the larger network area usage.
So, this project mesh topology is much more suitable than the tree topology even it
cost more than tree topology system. It is more secure, faster, can manage the data
traffic and even it is complex to set up it is worth it. There is another solution. Using
both type of topology for different types of work place. Cause some place would
PAGE 26 OF 30
HND-43
Kyaw Khine Htay
require mesh topology setup and also be compatible with tree topology which is
cheaper and more sample than mesh topology. The router will be connected in these
topologies based on the project. And also, the switch and cables will be also used in
this project.
Topology protocol
A protocol is a set of guidelines and instructions for sending data. When two or more
computers communicate, each step and process have its own set of rules. These
guidelines must be followed by networks to successfully transfer data.
The physical and data link layers are served by the local area network (LAN)
collection of protocols known as Ethernet. The IEEE 802.11standard was built on the
Ethernet protocol.
The Physical and Data Link Layers are dealt with at a low level by Ethernet.
There are two sublayers that make up the data link layer.
Logical Link Control (LLC). This sublayer establishes the communication channels
between computers or other networked devices.
Media Access Control (MAC). A computer or peripheral device on a network is
identified by its specific hardware address, which is provided by the network
interface card (NIC). Either the hardware address or MAC sublayer addressing is
employed. Each packet transported via Ethernet employs the source and destination
MAC hardware addresses.
Ethernet transmits packets using CSMA/CD. The Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) technique helps to prevent transmission collisions
when sending and receiving packets across a common network hardware media.
When there are no other transmissions on the network, the computer transmissions
can start. The packet is retransmitted later if a collision is found.
PAGE 27 OF 30
HND-43
Kyaw Khine Htay
Refrences
https://www.techtarget.com/searchnetworking/definition/protocol
https://business.sparklight.com/the-wire/tech-talk/business-internet/wide-areanetwork-advantages
https://www.intrado.com/blog/cloud-collaboration/ip-communication-protocols101#
https://bookvea.com/what-is-network-standardorganization/#What_is_network_standard_organization
https://www.geeksforgeeks.org/standard-organizations-for-data-communications/
https://www.guru99.com/difference-tcp-ip-vs-osimodel.html#:~:text=OSI%20refers%20to%20Open%20Systems,both%20connec
tion%2Doriented%20and%20connectionless.
https://www.n-able.com/blog/most-effective-types-of-network-topology-a-quickguide-formsp#:~:text=Star%20topology%20is%20by%20far,creating%20a%20star%2Dlik
e%20shape.
https://study-ccna.com/wan-topologies/
https://www.lifewire.com/what-is-a-router-2618162
https://www.techtarget.com/searchsecurity/definition/firewall
https://www.cisco.com/c/en/us/products/routers/what-is-a-network-gateway.html
https://www.efficientip.com/what-is-dhcp-and-why-is-it-important/
https://www.namecheap.com/support/knowledgebase/article.aspx/766/10/whatis-dns-server-namePAGE 28 OF 30
HND-43
Kyaw Khine Htay
server/?gclid=CjwKCAjw9suYBhBIEiwA7iMhNDx2Frt5qFspm0crjd3mMJ9LN_D8vQk
nRs9d2uAerATPFTQRFR-dvRoCpmUQAvD_BwE
https://www.tutorialspoint.com/operating_system/os_linux.htm
https://www.techopedia.com/definition/441/database-server
https://www.gladinet.com/what-is-file-server/
PAGE 29 OF 30
Download