0% found this document useful (0 votes)
7 views

Networking Ass1zzzz

The document provides an overview of networks, associated concepts, and device operations. It has two sections, with the first introducing networks and covering topics like network types and standards. The second section addresses how network devices interact and explores typical server types and protocol selection for efficient use in an office network.

Uploaded by

Aung Kaung Maw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Networking Ass1zzzz

The document provides an overview of networks, associated concepts, and device operations. It has two sections, with the first introducing networks and covering topics like network types and standards. The second section addresses how network devices interact and explores typical server types and protocol selection for efficient use in an office network.

Uploaded by

Aung Kaung Maw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

[Type here] [Type here] [Type here]

[DOCUMENT TITLE]

USER
[COMPANY NAME] [Company address]
HND-45 Aung Kaung Maw

INTRODUCTION

I work for AGB fiber to Home Internet and Service Solution Company as a junior
network technician. Myanmar, AGB is a leading player in a internet service
Providing, Designing, and Setting new network-based infrastructure, and service
and maintaining existing infrastructure all around. It, provides Cloud-based
infrastructure, VPS, VPC, SASS, PASS, etc.

The HR director is planning to introduce and job- training program for a newbie.
That hand on device operations and concepts relating to mid-range networks is
intended for training purposes.

This manual was written to give you a handy resource for AGB new trainees. For
training purposes, this book provides an overview of networks, associated concepts,
and device operations. During your time working with us, I hope you find this to be
a beneficial resource.

This book has two sections:

The first section of the book is an introduction to the network report, which
explains what a network is, how it works, and describes the many types of
networks and standards, along with their advantages and disadvantages. It also
covers describing the effects of communication and network structure. Additionally,
there is comparisons of popular networking principles (OSI and TCP/IP) and it
describe the advantages of protocols in order to understand the fundamentals of
how a network functions.

The second section of the book is after introducing fundamental concepts,


guidelines, and kinds, it is addressed how various network devices interact with one
another as well as the typical server types found in a network. The required
hardware and software for a workstation to connect to a network are then covered.
Additionally, a variety of server types are explored, and the choice of a server is
justified in terms of cost and performance optimization. Finally, protocol selection
for efficient use is taken into account for an office network situation with identified
topology.
HND-45 Aung Kaung Maw

What Is Network?

A network is nothing more than two or more computers connected by a cable or by


a wireless radio connection so that they can exchange information. Of course,
computers can exchange information in ways other than networks. Most of us have
used what computer nerds call the sneakernet. That’s where you copy a file to a
flash drive or other portable storage device and then walk the data over to
someone else’s computer. (The term sneaker net is typical of computer nerds’
feeble attempts at humor.) The whole problem with the sneakernet is that it’s slow,
and it wears a trail in your carpet. One day, some penny-pinching computer geeks
discovered that connecting computers with cables was cheaper than replacing the
carpet every six months. Thus, the modern computer network was born. You can
create a simple computer network by hooking together all the computers in your
office with cables and using the computer’s network interface (an electronic circuit
that resides inside your computer and has a special jack on the computer’s
backside). Then you tweak a few simple settings in the computer’s operating
system (OS) software, and you have a working network. That’s all there is to it. If
you don’t want to mess with cables, you can create a wireless network instead. In a
wireless network, the computers use wireless network adapters that communicate
via radio signals. All modern laptop computers have built-in wireless network
adapters, as do most desktop computers. (If yours doesn’t, you can purchase a
separate wireless network adapter that plugs into one of the computer’s USB ports.
HND-45 Aung Kaung Maw

What is the purpose of a Network?


Enables file sharing (should cut down on printing costs)

Share resources , such as printers, scanners , etc.,to get more use out of office
equipment(cutting down costs).

Share software with multi-user licenses.

Perform data backups quicker and easier with files on shared drives.

Easier and more manageable Internet connection.

Advantages of Network
-it enhances communication and availability of information.
-it allows for more convenient resource sharing.

-it makes file sharing easier.

-it is highly flexible

-it is an inexpensive system

-it increases cost efficiency

-it boosts storage capacity

Role of Network

Relative Jobs
-Network Architect

-Network Security Manager

-Network and Computer Systems Administrators

-Wireless Network Engineer


HND-45 Aung Kaung Maw

-System Engineer

-Database Administrator

-Networking Programmer

-Network Service Technician

-Network Security Technician

-Network Security Administrator

-Telecommunications Specialist

IT Professional Fields
-Cyber security

-Cloud Computing

-IoT

-MMORPG
HND-45 Aung Kaung Maw

Types of Network
LAN (Local Area Network)

MAN (Metropolitan Area Network)

WAN (Wide Area Network)

PAN (Personal Area Network)

VPN (Virtual Private Network)

LAN (Local Area Network)


The Definition of a LAN has become increasingly vague over the last ten years.

It was understood that it was interconnected computers at one location. For


examples, a collage or a workplace.

Know due to faster technology LAN devices can be used over longer distances.

A LAN can be as small as two computers by using a simple Ethernet connection or


can divided into sub networks using switches and routers.

-Single Campus

-Can be multiple networks interconnected.

-No Special telecommunication hardware is necessary, as a cable/signals server


leave the company’s premises

-Fast data transfer rates

-Video-conferencing is feasible
HND-45 Aung Kaung Maw

Advantages of LAN
The Fundamental LAN setup is not outrageously costly.

The accessibility of necessary protocols in the Operating System(OS)itself renders


LAN installation relatively simple.

LAN users are not obliged to have had their own hard dics or CD-ROM drivers.They
can upload their work in a convenient system on a network file server.

Disadvantages of LAN
Because it is just so easy to gain access to other people’s software components,
security is a major problem. To restrict unwanted access, additional security tests
are recommends.

The emergence of malware on one device can pretty readily extend to all LAN users

If the server malfunctions in a server-based LAN Architecture, all participants are


significantly impacted.
HND-45 Aung Kaung Maw

Metropolitan Area Network(MAN)


A metropolitan Area Network(MAN) is a large computer network that spans a
metropolitan area or campus.

The Network size falls intermediate between LANs and WANs.

MANs provide Internet connectivity for LANs in a metropolitan religion, and connect
them to wider area networks like the Internet.

They typically use wireless infrastructure or optical fiber(or fiber) connections to


link their sites.

Multiple campuses

Eg . with a city

Small geographical area

Australians are MANs to interconnect South Eastern cities

Need reliability of WANs with speed of LANs

Advantages of MAN

-It can send data in both directions at the same time

-Metropolitan Area Network allows people to connect LANs.

-It is more comprehensive than a LAN and offers greater security than a WAN.
HND-45 Aung Kaung Maw

-Metropolitan Area Network usually encompasses several city blocks or an


entire city.

-It improves data handling efficiency while increasing data transfer speed.

-It facilitates the cost-effective sharing of shared resources such as printers.

-It provides an excellent backbone for a vast network, thus increasing WAN
access.

-The implementation cost of a Metropolitan Area Network are lower than


WAN since it requires fewer resources

Disadvantages of MAN

The data rate is slow in a Metropolitan Area Network compared to LAN.

Compared to LAN, more cable is required to set up a Metropolitan Area


Network.

Because this network comprises multiple LANs, it is difficult to keep hackers


out.

These networks must be implemented by skilled technicians and network


administrators.

This network’s implementation and management costs are higher than those of
a local area network.

It is challenging to manage this network because it’s an extensive network of


numerous local area networks.

As skilled technicians and network administrators are needed to implement


this network, the overall installation and management costs rise.
HND-45 Aung Kaung Maw

Wide Area Network(WAN)


A WAN is a complex network system , comprising of interconnected LANs.

WAN are used to connect LANS and others types of networks together, so that user

And computers in one location can communicate with user and computers in other
locations.

WANs are often built using leased lines.

A router connects to the LAN on the side and a hub within the WAN on the other.

-The rest of the planet

-Slower data transfer rates (end to end)

Reliability is a high priority

Retransmission of missing data is a large overhead

Extensive use of eternal telecommunication systems.

Backbone transfer rate is now faster than LANs.

-International telecommunications

-Satellite systems

Global Positioning System-GPS


HND-45 Aung Kaung Maw

Advantages of WAN
Disadvantages of WAN
Personal Area Network
Interconnects devices in a individual person’s workspace.

Wireless connections-Bluetooth

Can connect to a higher level network or Internet.

Bluetooth-short range video waves up to 10 metres .

Computers, cell phones, PDAs, headsets, mouse or other pointing devices

Advantages of PAN
Disadvantages of PAN
HND-45 Aung Kaung Maw

Peer-to-Peer Network
Unlike client server, the Peer-to-Peer model does not distinguish between
client and server instead each node can either be a client or a server depending on
the whether the node is requesting or providing the services. Each node is consider
as a peer.

This Photo by Unknown Author is


licensed under CC BY-ND

Client-Server Network
The client server network model is widely used network model. Here, server is a
powerful system that stores the data or information on it. On the other hands, the
Client is the machine which let the users access the data on the remote data.

This Photo by Unknown Author is licensed under CC BY-SA


HND-45 Aung Kaung Maw

Advantages of Peer-to-Peer Network

Use less expensive computer hardware-Peer to peer networks are the least
hardware-intensive. In a pure peer-to-peer network ,the resources are distriburited
over many computers, so there is no need for a high-end server computer. The
impacts on each workstation is usually (but not always) relatively minor.

Easy to administer-Peer-to-peer networks are, overall easiest to set up and


administer provided that they aren’t too many computers with the peer-to-peer
network. Because each machines performs its own administration-usually for
certain limited resources-the efforts of administering the network is widely
distributed among money different people.

No network operating system required- Peer-to-peer networks do not require a


network operating system (NOS).You can build a peer to peer network using
Windows XP or Vista on all the workstations, or all Macintosh computers for that
matter. These client operating systems include all the features necessary for peet-
to-peer networking. Similarly, you can do this with all UNIX- or Linux-based
computer(although this is much more complicated to set up and maintain,because
UNIX and LINUX are very powerful and complex).

More built-in redundancy-If you have a small network with 10 to 20 workstations


each storing some important data, and one fails, you still have most of your shared
resources available. A peer-to-peer networks design can offer more redundancy
than a client/server network because fewer single points of failure can affect the
entire network and everyone who uses it.

Disadvantage of Peer-to-Peer Network


Might impact user’s performance-If some workstations have frquently used
resources across the network might adversely affect the person using the
hosting workstation.
Not very secure-Peer-to-peer networks are not nearly are secure as
client/server networks because you cannot guarantee that all of the users
will appropriately administer their machines. In fact in a network of any
size(say, more than ten people),you can expect that at least a few people
will not good administration practices on their own machine. Moreover, the
most common desktop operating systems used for peer-to-peer networking,
like Windows XP or the Macintosh, are not designed to be secure network
operating system.
Difficult to back up-Reliably backing up all the data scattered over many
workstations is a difficult and it is not wise to delegate this job to the user of
HND-45 Aung Kaung Maw

each machine. Experience shows that leaving this vital task up to users
means it will not get done.
Hard to maintain version control-In a peer to peer network with files
potentially stored on a number of different machines, it can become
extremely difficult to manage different document versions.

Advantages of Client/Server network


Very Secure-A client /server network’s security comes from several things.
First, because the shared resources and located in a centralized area, they
can be administered at that point. Managing a number of resources is much
easier if those resources are all located on one or two server computers, as
opposed to needing to administer resources across tens or hundred of
computers. Second usually the server are physically in a secure location,
such as a lockable server room. Physical security is an important aspect of
network security, and it cannot be achieved with a peer-to-peer network.
Third, the operating systems on which client/server networks run are
designed to be secure. Provided that good security and administration practices
are in a place, the server cannot be easily “hacked”.

Better Performance- while dedicated server computers are more expensive than
standard computer workstations, they also offer considerably better performance,
and they are optimized to handle the needs of many users simultaneously.

Centralized back up- Backing up a company’s critical data is much easier when it is
located on a centralized server. Often, such back up jobs can be runs overnight
when the server is not being used and the data is static. Aside from being easier,
centralized backups are also much faster than decentralized backups.

Very reliable- While it is true that more build in redundancy exists with a peer-to-
peer network, a good client/server network can be more reliable over all. Dedicated
severs often have much more build-in redundancy than standard workstations.
They can handle the failure of the disk driver power supply, or processor and
continue to operate until the failed component can be replaced. Also, because a
dedicated sever has only one relatively simple jobs to do, its complexity is reduced
and its reliability increased. Contrast this with a peer to peer network ,where
actions on the part of the users can drastically reduce each workstation’s reliability.
For, example needing to restart a PC or a Macintosh every so often is not
uncommon, whereas dedicated servers often run months for without requiring a
restart or crashing.
HND-45 Aung Kaung Maw

Disadvantages of Client/Server network


Require professional administration-Client/server networks usually need some level
of professional administration, even if they are small. Knowing the ins and outs of a
network operating system is important, and require experience and training. You
can hire a network administer, or you can use a company that provides
professional network administration services.

More Hardware-Intensive-In addition to the client computers, you also need a


server computer, usually a pretty “beefy” computer with a lot of memory and disk
space. Plus, you need a network operating system and an appropriate number of
client licenses, which can add at least several thousand dollars to the cost of the
server. For Large networks, these requirements add tens of thousands of dollars.

Network Standard
Network standards are also ground rules that are set by commissions so that
hardware is compatible among similar computers and assures interoperability.

This is done to ensure that backwards compatibility and compatibility.

It is necessary to have standard because if each company had its own protocol
standards and didn’t allow it to talk with order protocols there would be a lack of
communication from different machines.

And would result in one company being hugely successful and the other running out
of business due to lack of being able to communicate with other machines.

What is Standard?

Standard- are guidelines these are more abstract.

Network standards define the guideline that specify the way computer access the
medium to which they are attached.

The well known standards of IEEE are the 802 standards:

802.3

802.11

802.15

IEE 802.3 (Ethernet LAN)

It is the standard for an Ethernet LAN. In 802.3,Ethernet refers to the physical


cabling, while the ways data is transmitted through the cable is called Carrier Sense
Multiple Access/Collision Detection (CSMA/CD).

This method of transmission requires that only one device on the network can be
transmitted at a time. If, another device can sense that a transmission is already in
the cable, it will have to wait.
HND-45 Aung Kaung Maw

IEE 802.11(Wireless LAN)

This standard defines communication between a wireless computer or client and an


access point or between two wireless computers or clients.

The 802.11 standard uses the 2.4GHz frequency band to transmit data up to
2Mbps.

IEE 802.15 (Wireless PAN)

The smallest and most basic type of network, a PAN is made up of a wireless
modem, a computer or two, phones, printers, tablets, etc.,

And revolves around one person in one building. These types of networks are
typically found in small offices residences, and are managed by one person or
organization from a single device.

Network Topologies
What is network typology
In computer terms, topology means the structure or layout of the communications
network.

Every components on a network is known as a node.

Topologies

Bus

Star

Tree

Ring

Mesh

Bus Topology

A bus network topology is a network architecture in which a set of clients/nodes are


connected via a shared communications line, called a bus. A device wanting to
communicate with another device on the network sends a broadcast message onto
the wire that all other devices see, but only the intended recipient actually accepts
and processes the message.

A media access method called CSMA(Carrier Sense Multiple Access) is used to


handle the collision that occur when two signals placed on the wire at the same
time.

The bus Topology is passive. In other words, the computers on the bus simply ’
listen’ for a signal; they are not responsible for moving the signal along.
HND-45 Aung Kaung Maw

Some advantages
Easy to implement and extend

Requires less cable length than a star topology

Cost effective as only a single cable is used.

Some disadvantages
If there is problem with the cable, the entire network goes down.

Performance degrades as additional computers are added or on heavy traffic.

It works best with limited number of nodes.

It is slower than the other topologies.


HND-45 Aung Kaung Maw

Star Topology
A star network consists of one central switch, hub or computer, which acts
as a channel to transmit messages.
Server dependent-often a mainframe

Some advantages
A star network Topology is very easy to manage because to its simplicity in
functionality.
The problems can be easily located logically in a Star Topology and therefore
is easy to troubleshoot.
The star typology reduces the chance of network failure by connecting all of
the systems to a central node.
It is easier to add additional node.

Some Disadvantages
If the central hub fails, all computers connected to that hub would be
disconnected.
The performance and scalability of the network depends on the capabilities
of the hub.
HND-45 Aung Kaung Maw

Tree Topology
Advantages of a Tree Topology
Point-to-point wiring for individual segments.

Supported by several hardware and software vendors.

Easily extendable-add new components

Disadvantages of a Tree Topology


Overall length of each segment is limited by the type of cabling used.

If the backbone line breaks, the entire segment goes down.

More difficult to configure and wire than other topologies


HND-45 Aung Kaung Maw

Ring Topology
An example of a Ring network is a token ring network

Each node connects to two other nodes creating a circular effect.

Data travels from one node to another until the correct destination has been
reached.

A node handles every packet that is sent through the network.

Access is achieved either by means of a taken, passed from one node to the other,
or by polling.

The two main logical topology which use this physical topology are token ring and
FDDI.

Some Advantages

Orderly network because every device has to access the token in order to transmit
data.

Degrades gracefully. Network traffic gradually slows down when busy opposed to
Ethernet which ground to a halt.

Some Disadvantages

A failure in any cable or device breaks the loop and can take down the entire
network.

Any movement of devices on the network can cause it to fail.


HND-45 Aung Kaung Maw

Mesh Topology

It allows for continuous connections and reconfigurations around broken or blocked


paths by” hopping” from node to node until the destination is reached.

A netlike communications network in which there are at least two pathways to each
node. A fully meshed network means that every node has a direct connections to
every other node

Some Advantages

Self-healing: the network can still operate even when a code breaks down or a
connection goes bad. As a result, a very reliable network is formed.

Some advantages

Setup time can be quite time consuming

Expensive

Network Communications
Video conferencing

A form of communication that incorporates both video and audio is called video
conferencing. It serves as an alternative to in-person gatherings for a group of
people who may live across the country or internationally. It uses some network
resources in real-time and is carried out. The essential hardware includes:

• Large monitors or television screens


• Webcams
• Speakers
• Microphones
HND-45 Aung Kaung Maw

Web conferencing

A type of conference that occurs online is known as web conferencing (also referred
to as a webinar). The system makes use of a large number of computers that are
all connected to the internet. It allows for the following types of meetings and, like
video conferencing, is done in real-time such;

• meetings to discuss new ideas


• presentations
• online training or education

Email communication

A variety of companies, including Microsoft, Yahoo, and Google, offer Email


(Electronic Mail) service without charge. Nowadays, sending emails is a quick and
simple method of communication.

On a daily basis, people use email for a variety of purposes, including chatting,
assignments, business, and so forth.

Social networking

It is an online platform that enables users of computers, tablets, mobile phones,


and other devices to access the internet.

The most well-known social networking sites today are Facebook, Twitter,
Instagram, Flickr, WhatsApp, and others. On these sites, users can upload images
and update their profiles with details about their interests, hobbies, and other
things.

On these social networking websites, users can interact with one another while at
home or asleep in their beds. They can communicate without ever meeting. In
order to represent themselves, people post photos of themselves. They post
images, status updates, and other content to express their feelings.

The effects of communication and network structure were discussed in this


topic.

Networking principles
OSI Model

The OSI Model is a conceptual and logical model that describes network
communication for systems that can connect to and communicate with other
systems. The Open System Interconnection (OSI) Model efficiently describes
HND-45 Aung Kaung Maw

computer packet transit while also defining a logical network through the use of
numerous protocol layers.

OSI 7 Layers Model

The majority of commercial networks were built before the OSI model using non-
standard technology developed by various manufacturers. This made cross-network
communication difficult to achieve and network expansion challenging. Since one
vendor's technology prevented vendor-to-vendor communication. When a layered
standard is applied, networks are considerably made simpler.

Application Layer (Layer 7)

This layer is the top layer of the OSI model. It offers a number of interfaces that
programs can use to access and make use of network services, such as message
handling, networked file transfer, and database query processing. The application
layer is used to provide services to the user.

When a user uses a browser to request a web page, the server tries to respond.
This is an example of the HTTP protocol that is frequently used. Another typical
example is the use of FTP. The program needs to communicate with the server in
order to send and receive files.

Presentation layer (Layer 6)

It maintains the data-format information used by the network translator for


networked communications. It does the opposite for incoming messages and
converts data from a general network format into a format that the receiving
application can understand for outgoing messages. This layer also handles a few
protocol conversions, data encryption/decryption, and data
compression/decompression. The presentation layer handles compression,
encryption, and decryption.

Session Layer (Layer 5)

It permits ongoing communication between two networked resources, known as a


session. Applications on both ends of the connection can communicate for the
duration of the session. This layer controls the beginning, continuation, and
termination of sessions as well as the security and access control of session data
through the identification of session participants. It also controls checkpoint
services and synchronization services. Synchronization and management of dialog
are the responsibility of the session layer.
HND-45 Aung Kaung Maw

Transport Layer (Layer 4)

It manages the flow of data between parties by breaking up lengthy data streams
into smaller data pieces (based on the allowed "packet" size for a particular
transmission channel). At the other end, pieces are reassembled in the proper
sequence. acknowledges successful transmissions and requests that any packets
that arrive with errors be sent again. The transport layer is in charge of moving
messages from one process to another.

The appropriate transmission speed will be determined by the flow and error control
in this, preventing issues for the recipient if they have a slower speed than the
sender. Error control makes sure that all data is accurately transmitted; if it is not,
it will retransmit the missing data.

Network Layer (Layer 3)

It chooses how messages should be addressed for delivery, manages message


addressing, and transforms logical network addresses and names into their physical
equivalents. Additionally, this layer controls network congestion and packet
switching. It also handles the choices needed to move data along a network path
from one point to the next. The network layer must transmit distinct packets from
the source host to the destination host.

For this layer to be applicable, the two devices must not be connected to the same
network; otherwise, layer 2 will be applied. At the network layer, the segments
obtained from the layer before are then further divided into packets. These offer
the information and specifics, like the IP address, required for the receiver to locate
the correct location.

Data Link Layer (Layer 2)

It regulates how certain data frames (packets) are operated between the Physical
layer and the Network layer. This layer transforms the raw data it receives from the
physical layer into data frames before sending them to the network layer. At the
transmitting end, this layer transforms data into unprocessed forms that the
Physical Layer can use. The data link layer is in charge of sending frames from one
hop (node) to the next.

The received layer three packets are used in this, but the local computer that made
the request for the data is not identified. The packet is then given the MAC address
in order to send it to the correct system.

This layer has features for flow management and error control to ensure that the
data is received properly, just like the network layer does.
HND-45 Aung Kaung Maw

Physical Layer (Layer 1)

It transforms electronic signals back into bits for incoming messages and electronic
signals into bits for outgoing communications. This layer controls the interface
between the computer and the network media (coax, twisted pair, etc.). This layer
outlines what must be transmitted over the medium to the driver software for the
MAU (media attachment unit, which includes NICs, modems, and other network
interface devices). the bottom layer of the OSI model. The physical layer is used to
transfer individual bits from one hop (node) to the next. At this layer, the data is
converted into bits, which are composed of 1s and 0s. They must be properly
synchronized in order to understand the data conversion when connecting across
devices.

TCP/IP Model
It is a collection of flexible protocols that ensures extremely high transmission
speeds and reliability. The "TCP protocols" and "IP protocols" make it up. is the de
facto industry standard for Internet communication protocols, the largest network
in the world. You can select the most effective means of connecting a specific
computer to the internet and of transferring data between those computers using
the TCP/IP Model. You can more easily create a virtual network when many
computer networks are connected to one another. The TCP/IP model's objective is
to make it possible to communicate over very long distances.

TCP/IP stands for Transmission Control Protocol/Internet Protocol. The TCP/IP stack
was specifically developed as a model to provide a very stable, end-to-end byte
stream over unreliable internetwork.

OSI Model TCP/IP

• The International Standard • ARPANET (Advanced Research


Organization, or ISO, developed Project Agency Network) is the
it. organization behind its creation.
• According to the OSI paradigm, • TCP/IP lacks a clear definition of
interfaces, services, and the differences between services,
protocols are distinct from one interfaces, and protocols. TCP
another. OSI stands for Open stands for Transmission Control
Systems Interconnection. Protocol.
• The OSI adopts a vertical • It uses the Internet layer only
strategy and defines routing and adopts a horizontal strategy.
standards and protocols using TCP/IP only employ one layer
the network layer. (link). They come in groups of
• The OSI model uses the two four.
distinct layers of physical and • A layer that is both connection-
data connection to describe the oriented and connectionless is
functionality of the lowest levels. included in the TCP/IP concept.
HND-45 Aung Kaung Maw

The OSI layers are made up of • Physical and data link layers are
seven levels. combined into a single layer in
• In the OSI model, connections the host-to-network layer of TCP.
are the main focus of the • A presentation layer or session
transport layer. layer are absent from the TCP
• In the OSI model, the physical model.
layer and data connection layer • It was started prior to the
are separate levels. The session development of the internet.
and presentation layers are not • The minimum header size is 20
part of the TCP model. bytes.

This topic compares the widely used networking concepts OSI and TCP/IP.

Protocols
Network protocols are a set of guidelines that specify how information is exchanged
between devices connected to the same network. It basically makes it possible for
linked devices to communicate with one another despite modifications to their
internal procedures, structures, or designs.

Why protocols are necessary?

A protocol is a set of guidelines for information exchange. Because they operate in


the background, the user is unaware of them, but every action they take (such as
clicking a link or dialing a phone number) generates some kind of log. The client
computer typically sends a signal to the server containing information about the
kind of data requested to start communication between devices. When the server
cuts off the connection, some exchanges will start and eventually end. Computers
could not communicate with one another without a protocol or set of rules because
these protocols allowed for organized, clear communication between computers.

Hyper Text Transfer Protocol (HTTP)

With the help of the application-layer protocol HTTP, you can send HTML and other
hypermedia files over the Internet. Although it was developed to facilitate
communication between web browsers and servers, it can also be utilized for other
purposes. Since HTTP is a stateless protocol, the server does not store any data in
between requests (state).
HND-45 Aung Kaung Maw

In HTTP, a server-client model is employed. A client could be a laptop, desktop


computer, or mobile device, for instance. The HTTP server is typically a web server
running on a web host, like Apache or IIS. When you visit a website, your browser
sends a request to the related web server, and the web server responds with an
HTTP status code. The server will send the webpage and pertinent files to your
browser if the URL is legitimate and the connection can be made.

Benefits

Protection - HTTPS offers protection because the data and information are
encrypted with cryptography. As a result, it is considered one of the best
advantages of HTTPS online payments: Online transactions are very secure when
SSL is enabled on websites.

Reliable: When users see the green padlock next to the URL, they feel at ease using
these websites and finish their transactions, whether they are for money or
information.

Authentication is required for both the server and the browser before they can
establish a connection. The connection will be rejected if unethical behavior is
found.

Reach- Using HTTPS, you can safely and successfully connect to any website on the
internet.

File Transfer Protocol (FTP)

The File Transfer Protocol (FTP) is a widely used communication protocol for
sending files from a server to a client over a computer network. FTP is based on a
client-server model with independent control and data connections between the
client and server. If the server is configured to permit it, FTP users can connect
anonymously. Alternatively, they can identify themselves by using a clear-text sign-
in protocol, typically in the form of a username and password. For secure
transmission that safeguards the account and password and encrypts the data, FTP
is frequently protected with SSL/TLS (FTPS) or replaced with SSH File Transfer
Protocol (SFTP).

Benefits

The concurrent communication of multiple directories via the use of FTP clients
enables the transfer of numerous files at once.

The speed with which files can be transferred between ends via FTP is by far and
away its greatest and most significant advantage. A file will continue to transfer if a
connection is reestablished after one has dropped while it is being transferred.
When the connection is reestablished, a transfer can be paused and then continued.
The directories automatically respond to user commands by scheduling directory
transfers. The automatic backup function of FTP is a useful tool. Using FTP, files are
HND-45 Aung Kaung Maw

quickly transferred from one location to another. Every hosting service supports the
use and accessibility of FTP. Large files can be exchanged without problems.

Internet Protocol (IP)

The network layer communications protocol for moving datagrams across network
boundaries is the Internet Protocol (IP), part of the Internet protocol suite. Its
routing feature makes internetworking easier and essentially establishes the
Internet. IP's responsibility is to transmit packets solely based on the IP addresses
in the packet headers from a source host to a destination host. For this purpose, IP
specifies packet structures that hold the data to be transmitted. Furthermore, it
describes the addressing strategies for tagging datagrams with source and
destination details.

Benefits

We rely heavily on the internet in today's world. We can communicate with one
another quickly and get the information we need thanks to it. Internet Protocol (IP)
communication has proven to be a very helpful form of internet communication for
the alarm industry as well as our customers.

Thanks to advancements in IP technology, alarms can now transmit information to


the security monitoring center via an internet router. This information spreads very
quickly. The alarm systems I've installed quickly transmit signals and data to the
monitoring station using IP modules. Because of how quickly it reacts, an IP
communicator on your alarm panel is almost like having an instant alarm.

Simple Mail Transfer Protocol (SMTP)

An internet communication protocol for sending and receiving electronic mail is


called Simple Mail Transfer Protocol (SMTP). Mail servers and other message
transfer agents send and receive mail messages using SMTP. According to RFC
8314, user-level email clients typically use SMTP only to send messages to a mail
server for relaying and send outgoing email through port 587 or 465. The preferred
method for retrieving messages is IMAP (which replaced POP3 earlier), but
proprietary servers, like Exchange ActiveSync, also frequently use proprietary
protocols.

Benefits

The simplest method of email transmission between various machines on a


particular network is made possible by SMTP. Electronic communication is made
simple and easy by requiring only that end users type their email and send it to the
recipient's email address. From the SMTP server to the exchange server for the
recipient's computer, the email simply follows a simple process.

SMTP was created on a straightforward foundation, allowing for quick and simple
sending of email messages. If one's SMTP mail server is functioning properly and up
HND-45 Aung Kaung Maw

and running, one can anticipate that messages will be delivered quickly to a variety
of recipients.

Post Office Protocol 3 (PoP3)

For receiving and storing email on a server, POP3 is a one-way client-server


protocol. The "3" designates the third iteration of the primary POP protocol.

POP3 enables a recipient or their email client to routinely download mail from the
server. POP3 enables email clients to download messages from servers so that the
recipient can access them while they are offline. In some ways, POP3 is like a
"store-and-forward" service.

Once the email is downloaded to the client, POP3 deletes it from the server. In
some implementations, users or an administrator can specify that email be kept for
a specific period of time, allowing users to download email as often as they'd like
during that time.

Benefits

For the user, the PC downloads emails. Users who are online can still read their
messages. The fact that attachments have already been downloaded makes
opening them quick and simple. There is less need for server storage space
because all emails are stored locally. Depending on the amount of hard drive space
you have, you can save a certain number of emails. It is very well-liked and simple
to set up and use.

The protocols (HTTP, FTP, IP, SMTP, POP3) and their advantages were
discussed in this topic in order to comprehend the fundamentals of how a
network works.

Interconnecting Network Devices


Switch

A switch connects to other devices in a wired network using Ethernet connections.


Each linked device can communicate with the others thanks to the switch. Wireless-
only networks lack switches because wireless routers and adapters communicate
directly with one another. It connects other devices on a computer network. To
enable communication between networked devices, a switch has several data
cables connected to it. By sending a network packet only to the one or more
devices it is intended for, switches can regulate the flow of data across a network.
By identifying each networked device connected to a switch by its network address,
the switch is able to control traffic while enhancing network security and
effectiveness. Switches enable you to link numerous devices together. They allow
you to control who has access to different areas of the network and stop traffic
between two devices from interfering with other devices on the same network.
Switches make it easier to monitor consumption and offer faster internal network
HND-45 Aung Kaung Maw

connectivity than the Internet. High-end switches can be modified to suit the needs
of your network thanks to pluggable modules.

Hub

A device that connects to one or more pieces of machinery is known as a


networking hub. For instance, a network hub enables a computer to link up with a
server, printer, and other computers. It aids in resource sharing and information
dissemination. It assists in connecting various devices without a direct connection
being necessary. It acts as the LAN's central node (Local Area Network). Hubs are
designed to work with twisted pair cabling. The devices are typically connected
using RJ45 jacks. Hubs frequently retransmit incoming data frames or packets to all
components rather than filtering them. The switch is more careful where it
transmits data when it comes in through one of its ports. In modern networks,
almost all PCs are connected to a single hub or switch.

Hubs that have a power source of their own and can boost, clean up, and relay the
network's signal are called active hubs. It functions simultaneously as a wiring
center and repeater. The maximum distance between nodes may be increased
thanks to these.

Passive hubs are hubs that accept wire from nodes and electricity from active hubs.
These hubs cannot be utilized to increase the distance between nodes because they
merely send signals into the network without boosting or cleaning them Intelligent
hubs are capable of remote management and perform similarly to active hubs.
Additionally, they offer programmable data rates to network devices. It can be used
by a hub administrator to configure each port and track traffic.

Switches enable you to link numerous devices together. They allow you to control
who has access to different areas of the network and stop traffic between two
devices from interfering with other devices on the same network. Switches make it
easier to monitor consumption and offer faster internal network connectivity than
the Internet. High-end switches can be modified with pluggable modules to suit the
needs of your network.

Router

An item of hardware known as a router connects two or more IP networks or


subnetworks. By sending data packets to their intended IP addresses, it can control
traffic between these networks and enable multiple devices to share an Internet
connection. A network switch frequently includes a router as a part of it. It prevents
traffic from unnecessarily transferring to the opposite side. Routing is the term for
this.

To connect a LAN to the Internet, a router and a modem must first exchange
communications. There are two fundamental ways to do this:
HND-45 Aung Kaung Maw

Wireless router

An Ethernet connection is used to link a wireless router to a modem. By converting


binary code packets into radio waves, which are then wirelessly broadcast through
antennas, it disseminates data. Instead of establishing LANs, wireless routers
create WLANs (wireless local area networks), which use wireless communication to
link numerous devices.

Wired router

Like a wireless router, a wired router connects to a modem via an Ethernet cable. It
then establishes separate connections with one or more network devices to form a
LAN and link those devices to the Internet.

WAP (Wireless Access Point)

Wired network devices called Wireless Access Points (WAP) transmit signals that
wireless devices can connect to and use to connect to the internet. A device that
enables wireless devices to connect to a wired network through Wi-Fi is included in
wireless access points, which are used in computer networking.

Wi-Fi wireless standards are supported by wireless access points, which are
primarily used in home or small business networks. Each access point in a specific
network region can support a large number of users. Additionally, it automatically
switches to the next access point when a user moves outside the range of one.

Bridge

In order to create a single, larger local area network (LAN), a bridge is a type of
network equipment that connects numerous LANs. Network bridging is another
name for network aggregation. A bridge connects the numerous segments, giving
the impression that there is just one network overall. Since they operate at the
data connection layer of the OSI model, bridges are also referred to as Layer 2
switches.

The bridge in a computer network uses the destination's MAC address, which is
encoded into each frame of data, to block or advance the data. When the
destination address is on a network, the bridge helps pass the data to the other
linked networks. The data cannot transit if there is no address. With transparent
bridges, there is no need for station reconfiguration whether a bridge is added or
removed from the network because the stations are completely unaware of the
bridge's presence. On these bridges, the bridge forwarding and bridge learning
techniques are employed.

In source routing bridges, the source station handles all routing tasks, and the
frame selects the optimal course of action. The host can find the frame by
transmitting a special frame called a discovery frame, which travels the entire
network using all practical routes to the target.
HND-45 Aung Kaung Maw

The topic described how network devices are connected to one another
(switch, hub, router, WAP, bridge).

Standard server types


DHCP server

An automatic distribution and assignment of IP addresses, default gateways, and


other network parameters to client devices is performed by a DHCP server, a type
of network server. The network parameters required for clients to function properly
over the network are automatically sent by the DHCP server. Without it, the
network administrator would need to set up each client's network configuration by
hand. This can be inconvenient, particularly on broad networks. Each client is
typically given a different dynamic IP address by the DHCP server. When the
client's lease on that IP address expires, this dynamic IP address changes.

Advantages

With DHCP, which is easy to set up, IP addresses can be automatically assigned to
requesting clients. As a result, it is possible to shorten the time needed to manually
configure IP addresses. The deployment is not accompanied by any extra costs. It
is prohibited to assign duplicate or incorrect IP addresses. Therefore, IP address
conflicts are not a possibility. It simplifies network administration. Numerous
scopes, including super scope and multicast scope, are supported. Mobile users gain
a lot from it because the new network gives them the right configuration
parameters right away.

Disadvantages

It's possible for a network's single DHCP server to fail if there are only one or no
other DHCP servers installed. All lease requests on both network segments must be
handled by a relay agent because DHCP packets cannot pass through a router.
Relay agents take in DHCP broadcast packets, which they then send as unicast
packets to the DHCP server. The IP address of the DHCP server must be specified in
the configuration of the relay agent in this case. Due to the lack of a secure
authentication method for clients, it is possible for the DHCP server to gain
unauthorized access to IP addresses by supplying credentials like client IDs from
other DHCP clients. The machine name is unaffected by the assignment of a new IP
address. The client is unable to connect to the network without the DHCP server.

DNS server

The phonebook of the Internet is the Domain Name System (DNS). DNS is in
charge of locating the correct IP address for websites when users type domains like
"google.com" or "nytimes.com" into a web browser. The browser then contacts the
origin server or the edge CDN server using these addresses to access website data.
HND-45 Aung Kaung Maw

Advantages

A DNS has the advantage of having a large network of additional DNS servers that
are similar to it. This suggests that if one DNS server is unable to convert a domain
name into an IP address, the other DNS servers can be used by the current DNS
server to assist the first DNS. A DNS also has the benefit of making web addresses
easier for users to remember since they only need to retain the domain name
rather than the IP address. Users can now find websites on the internet more
quickly and easily thanks to this.

Disadvantages

Incorrect DNS configuration may result in DNS redirection. This implies that a
person will be taken to a completely different location if they search for a website
and type the domain name into their web browser. Another drawback of DNS is that
it has a number of security flaws that could leave networks vulnerable to external
threats like hacking.

File server

A device that manages access to separately stored files is known as a file server. A
networked computer called a file server, which is a component of a multiplier
system, serves primarily as a storage location for accessing shared hard drives.
This computer has files on it that are accessible to everyone on your local area
network (LAN). The microcomputer is referred to as a file server on some LANs,
while it is a computer with a sizable hard drive and specialized software on other
LANs.

Advantages

Since servers frequently have redundant hard drives, which guard against data loss
from even a single disk failure, data is more secure. Data is safer because the
server may be physically sealed in a room that only authorized individuals are
allowed to access. Since files are frequently backed up, data is safer and consumers
are relieved of the responsibility of maintaining their own data. The central
management of files makes it simple to set up new employees. File permissions are
easy to set up and offer precise access control for data. Users can log in to any
client computer to access their data.

Disadvantages

If the file server fails or becomes corrupted, all data is lost or rendered inaccessible
until a backup can be used to restore it. As more users read and write files to and
from the file server, network bandwidth will grow. They typically need to be
installed and managed by an experienced IT professional. Due to their high price,
they might not be the best choice for a small company with two or three
employees.
HND-45 Aung Kaung Maw

Web Server

Web browsers access web pages that are stored on web servers. Additionally, you
can incorporate a database of a user or product data that your browser can use and
access.

Advantages

You are allowed to use scripting languages for the server, such as PHP, Ruby, etc.
Your coding style makes it possible because the structure of your website can be
represented as predefined paths rather than your computer's system directory
structure. If you want to know how it operates in a real-world setting, it can help to
give you useful knowledge to start a conversation with your hosting company. Any
web application can benefit from performance and download speed monitoring. To
view the URL hierarchy, broken links, etc., you must have authorization. The
interactions between your website and server while it is being hosted are more
transparent thanks to this. The live page's function is the same as that of your local
site. Before implementing them in the production environment, you could, for
instance, configure folder security, check your custom error pages, etc.
Additionally, it gives more information about how HTTP communication functions. It
is more flexible and controllable. It is kept up in a secure infrastructure. App
management is simple. You have the right to set up a special server in accordance
with your needs.

Disadvantages

Compared to using electronic website hosting, it might cost more. The modification
of hosting services is more difficult. Due to server overload, your website may go
offline at any time. It is convenient to use straightforward online businesses, but it
is not the best choice if you want to use it for your own businesses that are more
sophisticated and demand distinctive design and style. Websites must take
additional security precautions, such as requiring credit cards on the server when
an online store is operating.

This topic covered the advantages and disadvantages of the common


server types (DHCP server, DNS server, file server, and web server).

Hardware and software necessary for a workstation to access a


network
Hardware

NIC (Network Interface Card)

A network interface card (NIC) is a circuit board made to connect devices like
computers and network servers to the internet. MAC (Media Access Control)
addresses are a low-level addressing system used by NICs to provide physical
HND-45 Aung Kaung Maw

access to network media. Users can now connect to one another wirelessly or over
cables thanks to this.

Cables and Connectors

The most well-known and widely used connector type in the computer industry is
the RJ45. RJ45 cable is primarily used to establish an Ethernet connection between
devices. The RJ45 connection can be used by peripheral devices like cable or DSL
modems, computers, printers, and network storage devices. Instead of using Wi-Fi,
provide access to the Internet in person (802.11). STP cable, UTP cable, and some
fiber optic connections all use RJ45. Computers are typically connected to Ethernet-
based local area networks using plugs or sockets with an 8-pin/8-position
configuration (LAN). Twisted pair cables are terminated using one of two wiring
schemes, T568A or T568B, at the connector interface.

Cable UTP

LAN networks are the main application for UTP cables. These can be used for
building automation and control systems, voice, slow data, high speed data, audio
and paging systems, and more. Both horizontal and backbone cable subsystems
can use UTP cables. UTP is less expensive than STP and has no shield.

Cable STP

Four pairs of signal transmission wires are covered by the shielded twisted pair
cable, which reduces electromagnetic interference by acting as a conductive shield.
STP cables come in a variety of varieties. B. The shield- and foil-twisted pairs
(S/FTP). Shielded twisted pair is used to protect the current when routing cables in
a delicate environment.

Cable Fiber Optic

In a plastic housing, fiber optic cables contain a few to hundreds of fiberglass fibers.
It is also known as an optical cable or fiber optic cable, and it transmits data signals
via light, which travels much more quickly than conventional electrical cables. It
consists of a glass core in the center encased in several layers of safety material.

Software
Server Software

Window Server

Microsoft developed the Windows Server family of operating systems specifically for
servers. A server is a very strong computer system made to constantly manage
other computers and supply resources. Despite this, Windows Server is almost
never used outside of business environments.

Mac Server
HND-45 Aung Kaung Maw

Your business, home office, or school will now have even more power thanks to
MacOS Server. MacOS Server makes it simple to configure Mac and iOS devices
because it is made to work with both operating systems. It's also surprisingly easy
to install, configure, and manage.

Linux Server

Linux servers are made to be able to handle the ever-increasing demands of


business applications like database management, system and network
administration, and web services. Due to its reputation for security, reliability, and
flexibility, Linux servers are frequently chosen over other server operating systems.
The Linux server operating systems CentOS, Ubuntu Server, Gentoo, Debian, and
Slackware are a few examples.

Firewall

By installing a firewall, network users are kept safe behind a "wall" and hackers are
kept out of insecure networks. For a more secure network solution, think about
installing a unified threat management appliance and related software on your
network.

Anti-spyware software

Software that blocks spyware also offers additional data security protection. A
medium-sized business might need more robust antivirus protection or all-
encompassing internet security software. If you use Apple's MacBooks or Macintosh
laptops, you might not need an antivirus program because the majority of malware
is made to target Windows PCs. On the other hand, the rise in popularity of the Mac
could lead to the creation of new Mac viruses.

The hardware (NIC, Connectors and Cables) and software (Server


Software, Firewall, Anti-Spyware Software) required for a workstation to
access a network were covered in this topic.

Exploring the range of server types and justify the selection of


the server
File Server

A file server is a computer connected to a network that serves as the main hub for
shared disk access. It is a device that, as part of a multiplier system, grants users
access to files that are stored separately. Only file servers can be used by clients to
access a remote file system. Any type of data, including documents, executables,
images, and videos, may be stored on them.

The data is frequently kept in the form of files or binary data blobs. This indicates
that they don't further process or index the stored files. There might be extra
plugins or server features, though, that can provide additional functionalities.
HND-45 Aung Kaung Maw

A file server does not provide any built-in means of interaction, so the client is
required to access the data. Databases are not called file servers because they only
function with organized data that can be retrieved by a query.

File servers commonly provide extra features to enable multiple users to view files
simultaneously:

Permission management is used to manage who has access to which files and who
has the power to change or delete them. Due to file locking, multiple users cannot
edit the same file at once. Conflict resolution keeps data integrity when files are
overwritten. By distributing the data across several servers located in different
locations, the data can be made redundant and highly accessible.

Web server

When a browser submits a request, a web server is software that processes the
request and responds with an HTML document, or more specifically, a website page.
However, the phrase "web server" can be used to describe both a piece of hardware
and software.

Hardware-wise, all data, including HTML text, images, CSS stylesheets, and
JavaScript files, are stored on web servers. The web server functions as a command
hub for managing requests from web browsers on the software side. Everything
related to a website is frequently also related to the web server because the web
server's role is to manage all communication between the browser and the server
throughout the processing of a website. When a browser requests a website page,
the web servers respond to the request. HTTP requests are received by web
servers. Before executing the HTTP request, the web servers perform a security
check. On a web server, HTTP requests are handled by an HTTP server. An
application known as an HTTP server decodes HTTP requests and URLs (website
addresses) (protocols used by browsers to display website pages). The web server
sends the browser an HTTP response, which is then transformed into a website
page.

In order to fulfill an HTTP request that a web server receives from a browser, it
might be necessary to launch a database query.

DNS Server

In most cases, calling someone involves opening your contact list, tapping their
name, and then choosing call. You are aware that doing this unintentionally makes
the contact and phone number associated, and your mobile connection makes the
call. DNS is your online phonebook. You can tell your browser to find the IP address
and get a domain name by simply pressing the enter key and waiting. Let's explore
this topic in greater detail.

One nameserver and a set of DNS records make up DNS. A nameserver's job is to
explicitly store instructions on how to access DNS records. You can find out more
HND-45 Aung Kaung Maw

about the DNS records by visiting the nameserver that your browser uses to
request a domain. Simply put, a DNS record is what converts a URL to an IP
address.

DNS refers to the name service that the Internet provides for TCP/IP networks. The
DNS is made up of domains, which are logical collections of computers connected to
a larger network. The domains exist at different levels and are connected in a
hierarchy that resembles a tree's root system. Each domain extends from the node
above the root-level domain, which is at the top. The second-level domains and
subdomains are found below the root-level domain, then the top-level domains. The
DNS namespace specifies the organization of the domains that are combined to
form a complete domain name. For example, "com" stands for the top-level
domain, "secondary" stands for the secondary domain name (typically a website
hosted by a business or organization), and "sub" stands for a subdomain inside the
larger network. The entire DNS domain hierarchy is referred to as the DNS
namespace. The name of a computer or domain relates to its location within the
namespace.

Private network protocols are used by DNS servers that are organized hierarchically
to communicate with one another. The master DNS servers, also referred to as
"root servers," maintain the complete database of Internet domain names and the
corresponding IP addresses. They are owned by numerous independent companies
with locations in the UK, the US, Japan, and Sweden. Only a portion of the total
database of domains and addresses is kept by the other lower-level DNS servers,
which are owned by businesses or ISPs (Internet Server Providers). A DNS server is
any device running specialized DNS software that is registered with the DNS system
and assists in resolving domain names to their correct hosts. Every DNS server has
a public IP address and a database of the network names and addresses of other
Internet hosts.

DHCP Server

When a user turns on a computer and connects it to a server using this service, the
computer immediately requests an IP address from the server. The computer
eventually receives the IP address and creates a network connection after the
server responds to the query.

Several DHCP server features to be aware of are listed below:

Manage IP addresses and distribute them: The administration and facilitation of IP


address transfer to client PCs is the main purpose of this device. This process can
be automated and used simultaneously on a lot of different devices. This implies
that not every machine needs to have it configured.

Avoiding IP conflict happens when two devices use the same IP address. If this
happens, the device won't be able to connect to the network. By using this tool, IP
address-sharing errors can be minimized. Additionally, it might manage IP address
exchanges correctly, reducing the possibility of errors.
HND-45 Aung Kaung Maw

Automatic IP Address Update: The IP address of the server typically has an


expiration time or a period. If the IP address is still in use but past its expiration
date, you should upgrade your system or request a new one. The Dynamic Host
Configuration Protocol allows for automatic IP address changes without the need for
reconfiguration.

Supports IP Address Reuse: Client computers may use P addresses that have
already been in use. You must make sure that no other machine is already using
the IP address before you can reuse it. The Dynamic Host Configuration Protocol
server can help you determine whether the IP address is off and available for use
so that it can be reused.

This article covered a variety of server types and provided justification for
the server choice (File server, Web server, DNS server, DHCP server).

Consideration for an office network scenario


Small Network

I want to launch a small-scale internet café.

The key to running a profitable cafe is bringing in new customers while holding on
to your current ones. These can be accessed by using a wireless internet
connection. Due to the quick and dependable WiFi, they will have yet another
reason to visit the café. WLAN will be my choice in this scenario because it is
simpler to install, less expensive, has a high data transmission rate, and eventually
enables our clients and employees to connect to a network whenever necessary
without needing to attach a cable to each device.

We only need a very small amount of effective network hardware for a network this
size. There would be numerous wireless access points, switches, and routers. Our
network could only connect to nearby resources without a router. We use it as our
first line of defense against unauthorized cyberattacks because it serves as the
verification link connecting internal and external networks for monitoring,
diagnostics, and enforcement of security policies at the access layer of our data
center. connecting the outside network to our internal one. One of the router's
security features is a firewall, which keeps an eye on incoming web traffic and
prevents any fraudulent activity from entering our network. To give clients the most
dependable experience possible, I deploy access points everywhere. We can put our
router in a useful location by using WAP, which also acts as the conduit that is
closest to the area where the Wi-Fi network is needed. Even so, performance and
the user experience start to suffer the further users are from the access point.

This is due to its amazing speeds, dependability, and effectiveness as well as how
simple it is to add new nodes to networks without having an impact on the ones
that are already in place. In addition, I would build a secure network for our
company using at least one protocol.
HND-45 Aung Kaung Maw

Given the size of this network, I would use a variety of computer models. In
addition, it is capable of the following: Even if an educational package took one
path but went the wrong way on the other, it would still arrive at its destination.
Furthermore, the remaining parts of the network would keep operating normally
even if a breach rendered a part of it inoperable. I think these elements could be
combined to create a helpful little network for a small business.

Medium Network

A medium-sized network is more difficult to design than a large network. Another


feature of LAN is the ability to share an internet connection among all LAN users.
Some employees in the administrative or financial departments are required to
work all day at a desk. Usually faster, more dependable, and easier to secure is a
wired network.

Because they link faculty, staff, and students to the LAN and the internet, routers
are crucial in higher education. Routers that are incorrectly installed could pose a
security risk. But reliable routers can defend our university from threats from
outside. Routers can have built-in firewalls and filters that protect our network from
malicious software, as I've already mentioned. I frequently use WAPS because they
offer a quick, dependable internet connection across the entire campus without
encountering problems in areas that appear to be too far from the network router
or that are obstructed by high walls. Since modern educational institutions,
particularly colleges, use technology like computers, projectors, and other gadgets
in the classroom, having a strong internet connection is essential.

An institution is required to keep track of a number of significant things, including


financial data and details about its students, employees, and instructors. Because a
database server has a robust security system that keeps unauthorized users from
accessing the data, I use it to store my data. Using a proxy server in this situation
is essential because it shields students from inappropriate and hazardous web
browsing. In times of high demand, the network would be able to increase its speed
thanks to this. Due to potential problems, the college cannot require everyone to
adhere to the same schedule. Due to the fact that they currently share the same
operating system and DHCP packets cannot pass through a switch, if we have
different systems, we may also need different DHCP servers. But doing so would be
very expensive. This situation necessitates the use of a DHCP hand-off operator,
which acts as a mediator between DHCP servers and clients to allow clients to
request IP addresses from servers that are not configured on the same network.
Star topology would be my topology of choice because it is frequently the most
dependable topology and is suitable for use in professional and academic settings.
If one relationship fails, the others are not significantly impacted. There are very
few information conflicts in this design because each workstation has a dedicated
cable that connects it to the server. Systems could be added without having any
impact on the current administration. A packet of information will still get to its
destination even if it is lost on one route by taking a different one. Since
HND-45 Aung Kaung Maw

workstation-to-workstation communication must go through the server, security is


also increased. I think all of these things will strengthen the university network, so
I want to add them.

Large Network

We need to separate a sizable Class B network (WELINK, ATOM) into numerous


subnets. We can use a LAN network and have to manage routes because some
departments have communication limitations. Then, we require a sizable tower-
style server for some essential servers, such as file servers, mail servers, database
servers, and possibly application servers or web servers.

We must be very clear about the DHCP configurations because some computers or
devices can use IP from the DHCP pool while others may need static IP. Calculate,
divide, and then distribute the internet bandwidth to each department either
equally or in accordance with a predetermined ratio. Then, a MAN network is
required to connect those two corporate branches if that company has another
branch and wants to establish a network connection between them. To create a
faster and more secure network, we might connect via fiber cable as opposed to the
internet. The connection could be client/server or point-to-point depending on how
many branches they want to link.

This article discussed factors to take into account for an office network
(small network, medium network and large network).

.
HND-45 Aung Kaung Maw
HND-45 Aung Kaung Maw

https://www.aplustopper.com/lan-advantages-and-disadvantages/

https://www.naukri.com/learning/articles/metropolitan-area-network-man-
advantages-and-disadvantages/

You might also like