Networking Ass1zzzz
Networking Ass1zzzz
[DOCUMENT TITLE]
USER
[COMPANY NAME] [Company address]
HND-45 Aung Kaung Maw
INTRODUCTION
I work for AGB fiber to Home Internet and Service Solution Company as a junior
network technician. Myanmar, AGB is a leading player in a internet service
Providing, Designing, and Setting new network-based infrastructure, and service
and maintaining existing infrastructure all around. It, provides Cloud-based
infrastructure, VPS, VPC, SASS, PASS, etc.
The HR director is planning to introduce and job- training program for a newbie.
That hand on device operations and concepts relating to mid-range networks is
intended for training purposes.
This manual was written to give you a handy resource for AGB new trainees. For
training purposes, this book provides an overview of networks, associated concepts,
and device operations. During your time working with us, I hope you find this to be
a beneficial resource.
The first section of the book is an introduction to the network report, which
explains what a network is, how it works, and describes the many types of
networks and standards, along with their advantages and disadvantages. It also
covers describing the effects of communication and network structure. Additionally,
there is comparisons of popular networking principles (OSI and TCP/IP) and it
describe the advantages of protocols in order to understand the fundamentals of
how a network functions.
What Is Network?
Share resources , such as printers, scanners , etc.,to get more use out of office
equipment(cutting down costs).
Perform data backups quicker and easier with files on shared drives.
Advantages of Network
-it enhances communication and availability of information.
-it allows for more convenient resource sharing.
Role of Network
Relative Jobs
-Network Architect
-System Engineer
-Database Administrator
-Networking Programmer
-Telecommunications Specialist
IT Professional Fields
-Cyber security
-Cloud Computing
-IoT
-MMORPG
HND-45 Aung Kaung Maw
Types of Network
LAN (Local Area Network)
Know due to faster technology LAN devices can be used over longer distances.
-Single Campus
-Video-conferencing is feasible
HND-45 Aung Kaung Maw
Advantages of LAN
The Fundamental LAN setup is not outrageously costly.
LAN users are not obliged to have had their own hard dics or CD-ROM drivers.They
can upload their work in a convenient system on a network file server.
Disadvantages of LAN
Because it is just so easy to gain access to other people’s software components,
security is a major problem. To restrict unwanted access, additional security tests
are recommends.
The emergence of malware on one device can pretty readily extend to all LAN users
MANs provide Internet connectivity for LANs in a metropolitan religion, and connect
them to wider area networks like the Internet.
Multiple campuses
Eg . with a city
Advantages of MAN
-It is more comprehensive than a LAN and offers greater security than a WAN.
HND-45 Aung Kaung Maw
-It improves data handling efficiency while increasing data transfer speed.
-It provides an excellent backbone for a vast network, thus increasing WAN
access.
Disadvantages of MAN
This network’s implementation and management costs are higher than those of
a local area network.
WAN are used to connect LANS and others types of networks together, so that user
And computers in one location can communicate with user and computers in other
locations.
A router connects to the LAN on the side and a hub within the WAN on the other.
-International telecommunications
-Satellite systems
Advantages of WAN
Disadvantages of WAN
Personal Area Network
Interconnects devices in a individual person’s workspace.
Wireless connections-Bluetooth
Advantages of PAN
Disadvantages of PAN
HND-45 Aung Kaung Maw
Peer-to-Peer Network
Unlike client server, the Peer-to-Peer model does not distinguish between
client and server instead each node can either be a client or a server depending on
the whether the node is requesting or providing the services. Each node is consider
as a peer.
Client-Server Network
The client server network model is widely used network model. Here, server is a
powerful system that stores the data or information on it. On the other hands, the
Client is the machine which let the users access the data on the remote data.
Use less expensive computer hardware-Peer to peer networks are the least
hardware-intensive. In a pure peer-to-peer network ,the resources are distriburited
over many computers, so there is no need for a high-end server computer. The
impacts on each workstation is usually (but not always) relatively minor.
each machine. Experience shows that leaving this vital task up to users
means it will not get done.
Hard to maintain version control-In a peer to peer network with files
potentially stored on a number of different machines, it can become
extremely difficult to manage different document versions.
Better Performance- while dedicated server computers are more expensive than
standard computer workstations, they also offer considerably better performance,
and they are optimized to handle the needs of many users simultaneously.
Centralized back up- Backing up a company’s critical data is much easier when it is
located on a centralized server. Often, such back up jobs can be runs overnight
when the server is not being used and the data is static. Aside from being easier,
centralized backups are also much faster than decentralized backups.
Very reliable- While it is true that more build in redundancy exists with a peer-to-
peer network, a good client/server network can be more reliable over all. Dedicated
severs often have much more build-in redundancy than standard workstations.
They can handle the failure of the disk driver power supply, or processor and
continue to operate until the failed component can be replaced. Also, because a
dedicated sever has only one relatively simple jobs to do, its complexity is reduced
and its reliability increased. Contrast this with a peer to peer network ,where
actions on the part of the users can drastically reduce each workstation’s reliability.
For, example needing to restart a PC or a Macintosh every so often is not
uncommon, whereas dedicated servers often run months for without requiring a
restart or crashing.
HND-45 Aung Kaung Maw
Network Standard
Network standards are also ground rules that are set by commissions so that
hardware is compatible among similar computers and assures interoperability.
It is necessary to have standard because if each company had its own protocol
standards and didn’t allow it to talk with order protocols there would be a lack of
communication from different machines.
And would result in one company being hugely successful and the other running out
of business due to lack of being able to communicate with other machines.
What is Standard?
Network standards define the guideline that specify the way computer access the
medium to which they are attached.
802.3
802.11
802.15
This method of transmission requires that only one device on the network can be
transmitted at a time. If, another device can sense that a transmission is already in
the cable, it will have to wait.
HND-45 Aung Kaung Maw
The 802.11 standard uses the 2.4GHz frequency band to transmit data up to
2Mbps.
The smallest and most basic type of network, a PAN is made up of a wireless
modem, a computer or two, phones, printers, tablets, etc.,
And revolves around one person in one building. These types of networks are
typically found in small offices residences, and are managed by one person or
organization from a single device.
Network Topologies
What is network typology
In computer terms, topology means the structure or layout of the communications
network.
Topologies
Bus
Star
Tree
Ring
Mesh
Bus Topology
The bus Topology is passive. In other words, the computers on the bus simply ’
listen’ for a signal; they are not responsible for moving the signal along.
HND-45 Aung Kaung Maw
Some advantages
Easy to implement and extend
Some disadvantages
If there is problem with the cable, the entire network goes down.
Star Topology
A star network consists of one central switch, hub or computer, which acts
as a channel to transmit messages.
Server dependent-often a mainframe
Some advantages
A star network Topology is very easy to manage because to its simplicity in
functionality.
The problems can be easily located logically in a Star Topology and therefore
is easy to troubleshoot.
The star typology reduces the chance of network failure by connecting all of
the systems to a central node.
It is easier to add additional node.
Some Disadvantages
If the central hub fails, all computers connected to that hub would be
disconnected.
The performance and scalability of the network depends on the capabilities
of the hub.
HND-45 Aung Kaung Maw
Tree Topology
Advantages of a Tree Topology
Point-to-point wiring for individual segments.
Ring Topology
An example of a Ring network is a token ring network
Data travels from one node to another until the correct destination has been
reached.
Access is achieved either by means of a taken, passed from one node to the other,
or by polling.
The two main logical topology which use this physical topology are token ring and
FDDI.
Some Advantages
Orderly network because every device has to access the token in order to transmit
data.
Degrades gracefully. Network traffic gradually slows down when busy opposed to
Ethernet which ground to a halt.
Some Disadvantages
A failure in any cable or device breaks the loop and can take down the entire
network.
Mesh Topology
A netlike communications network in which there are at least two pathways to each
node. A fully meshed network means that every node has a direct connections to
every other node
Some Advantages
Self-healing: the network can still operate even when a code breaks down or a
connection goes bad. As a result, a very reliable network is formed.
Some advantages
Expensive
Network Communications
Video conferencing
A form of communication that incorporates both video and audio is called video
conferencing. It serves as an alternative to in-person gatherings for a group of
people who may live across the country or internationally. It uses some network
resources in real-time and is carried out. The essential hardware includes:
Web conferencing
A type of conference that occurs online is known as web conferencing (also referred
to as a webinar). The system makes use of a large number of computers that are
all connected to the internet. It allows for the following types of meetings and, like
video conferencing, is done in real-time such;
Email communication
On a daily basis, people use email for a variety of purposes, including chatting,
assignments, business, and so forth.
Social networking
The most well-known social networking sites today are Facebook, Twitter,
Instagram, Flickr, WhatsApp, and others. On these sites, users can upload images
and update their profiles with details about their interests, hobbies, and other
things.
On these social networking websites, users can interact with one another while at
home or asleep in their beds. They can communicate without ever meeting. In
order to represent themselves, people post photos of themselves. They post
images, status updates, and other content to express their feelings.
Networking principles
OSI Model
The OSI Model is a conceptual and logical model that describes network
communication for systems that can connect to and communicate with other
systems. The Open System Interconnection (OSI) Model efficiently describes
HND-45 Aung Kaung Maw
computer packet transit while also defining a logical network through the use of
numerous protocol layers.
The majority of commercial networks were built before the OSI model using non-
standard technology developed by various manufacturers. This made cross-network
communication difficult to achieve and network expansion challenging. Since one
vendor's technology prevented vendor-to-vendor communication. When a layered
standard is applied, networks are considerably made simpler.
This layer is the top layer of the OSI model. It offers a number of interfaces that
programs can use to access and make use of network services, such as message
handling, networked file transfer, and database query processing. The application
layer is used to provide services to the user.
When a user uses a browser to request a web page, the server tries to respond.
This is an example of the HTTP protocol that is frequently used. Another typical
example is the use of FTP. The program needs to communicate with the server in
order to send and receive files.
It manages the flow of data between parties by breaking up lengthy data streams
into smaller data pieces (based on the allowed "packet" size for a particular
transmission channel). At the other end, pieces are reassembled in the proper
sequence. acknowledges successful transmissions and requests that any packets
that arrive with errors be sent again. The transport layer is in charge of moving
messages from one process to another.
The appropriate transmission speed will be determined by the flow and error control
in this, preventing issues for the recipient if they have a slower speed than the
sender. Error control makes sure that all data is accurately transmitted; if it is not,
it will retransmit the missing data.
For this layer to be applicable, the two devices must not be connected to the same
network; otherwise, layer 2 will be applied. At the network layer, the segments
obtained from the layer before are then further divided into packets. These offer
the information and specifics, like the IP address, required for the receiver to locate
the correct location.
It regulates how certain data frames (packets) are operated between the Physical
layer and the Network layer. This layer transforms the raw data it receives from the
physical layer into data frames before sending them to the network layer. At the
transmitting end, this layer transforms data into unprocessed forms that the
Physical Layer can use. The data link layer is in charge of sending frames from one
hop (node) to the next.
The received layer three packets are used in this, but the local computer that made
the request for the data is not identified. The packet is then given the MAC address
in order to send it to the correct system.
This layer has features for flow management and error control to ensure that the
data is received properly, just like the network layer does.
HND-45 Aung Kaung Maw
It transforms electronic signals back into bits for incoming messages and electronic
signals into bits for outgoing communications. This layer controls the interface
between the computer and the network media (coax, twisted pair, etc.). This layer
outlines what must be transmitted over the medium to the driver software for the
MAU (media attachment unit, which includes NICs, modems, and other network
interface devices). the bottom layer of the OSI model. The physical layer is used to
transfer individual bits from one hop (node) to the next. At this layer, the data is
converted into bits, which are composed of 1s and 0s. They must be properly
synchronized in order to understand the data conversion when connecting across
devices.
TCP/IP Model
It is a collection of flexible protocols that ensures extremely high transmission
speeds and reliability. The "TCP protocols" and "IP protocols" make it up. is the de
facto industry standard for Internet communication protocols, the largest network
in the world. You can select the most effective means of connecting a specific
computer to the internet and of transferring data between those computers using
the TCP/IP Model. You can more easily create a virtual network when many
computer networks are connected to one another. The TCP/IP model's objective is
to make it possible to communicate over very long distances.
TCP/IP stands for Transmission Control Protocol/Internet Protocol. The TCP/IP stack
was specifically developed as a model to provide a very stable, end-to-end byte
stream over unreliable internetwork.
The OSI layers are made up of • Physical and data link layers are
seven levels. combined into a single layer in
• In the OSI model, connections the host-to-network layer of TCP.
are the main focus of the • A presentation layer or session
transport layer. layer are absent from the TCP
• In the OSI model, the physical model.
layer and data connection layer • It was started prior to the
are separate levels. The session development of the internet.
and presentation layers are not • The minimum header size is 20
part of the TCP model. bytes.
This topic compares the widely used networking concepts OSI and TCP/IP.
Protocols
Network protocols are a set of guidelines that specify how information is exchanged
between devices connected to the same network. It basically makes it possible for
linked devices to communicate with one another despite modifications to their
internal procedures, structures, or designs.
With the help of the application-layer protocol HTTP, you can send HTML and other
hypermedia files over the Internet. Although it was developed to facilitate
communication between web browsers and servers, it can also be utilized for other
purposes. Since HTTP is a stateless protocol, the server does not store any data in
between requests (state).
HND-45 Aung Kaung Maw
Benefits
Protection - HTTPS offers protection because the data and information are
encrypted with cryptography. As a result, it is considered one of the best
advantages of HTTPS online payments: Online transactions are very secure when
SSL is enabled on websites.
Reliable: When users see the green padlock next to the URL, they feel at ease using
these websites and finish their transactions, whether they are for money or
information.
Authentication is required for both the server and the browser before they can
establish a connection. The connection will be rejected if unethical behavior is
found.
Reach- Using HTTPS, you can safely and successfully connect to any website on the
internet.
The File Transfer Protocol (FTP) is a widely used communication protocol for
sending files from a server to a client over a computer network. FTP is based on a
client-server model with independent control and data connections between the
client and server. If the server is configured to permit it, FTP users can connect
anonymously. Alternatively, they can identify themselves by using a clear-text sign-
in protocol, typically in the form of a username and password. For secure
transmission that safeguards the account and password and encrypts the data, FTP
is frequently protected with SSL/TLS (FTPS) or replaced with SSH File Transfer
Protocol (SFTP).
Benefits
The concurrent communication of multiple directories via the use of FTP clients
enables the transfer of numerous files at once.
The speed with which files can be transferred between ends via FTP is by far and
away its greatest and most significant advantage. A file will continue to transfer if a
connection is reestablished after one has dropped while it is being transferred.
When the connection is reestablished, a transfer can be paused and then continued.
The directories automatically respond to user commands by scheduling directory
transfers. The automatic backup function of FTP is a useful tool. Using FTP, files are
HND-45 Aung Kaung Maw
quickly transferred from one location to another. Every hosting service supports the
use and accessibility of FTP. Large files can be exchanged without problems.
The network layer communications protocol for moving datagrams across network
boundaries is the Internet Protocol (IP), part of the Internet protocol suite. Its
routing feature makes internetworking easier and essentially establishes the
Internet. IP's responsibility is to transmit packets solely based on the IP addresses
in the packet headers from a source host to a destination host. For this purpose, IP
specifies packet structures that hold the data to be transmitted. Furthermore, it
describes the addressing strategies for tagging datagrams with source and
destination details.
Benefits
We rely heavily on the internet in today's world. We can communicate with one
another quickly and get the information we need thanks to it. Internet Protocol (IP)
communication has proven to be a very helpful form of internet communication for
the alarm industry as well as our customers.
Benefits
SMTP was created on a straightforward foundation, allowing for quick and simple
sending of email messages. If one's SMTP mail server is functioning properly and up
HND-45 Aung Kaung Maw
and running, one can anticipate that messages will be delivered quickly to a variety
of recipients.
POP3 enables a recipient or their email client to routinely download mail from the
server. POP3 enables email clients to download messages from servers so that the
recipient can access them while they are offline. In some ways, POP3 is like a
"store-and-forward" service.
Once the email is downloaded to the client, POP3 deletes it from the server. In
some implementations, users or an administrator can specify that email be kept for
a specific period of time, allowing users to download email as often as they'd like
during that time.
Benefits
For the user, the PC downloads emails. Users who are online can still read their
messages. The fact that attachments have already been downloaded makes
opening them quick and simple. There is less need for server storage space
because all emails are stored locally. Depending on the amount of hard drive space
you have, you can save a certain number of emails. It is very well-liked and simple
to set up and use.
The protocols (HTTP, FTP, IP, SMTP, POP3) and their advantages were
discussed in this topic in order to comprehend the fundamentals of how a
network works.
connectivity than the Internet. High-end switches can be modified to suit the needs
of your network thanks to pluggable modules.
Hub
Hubs that have a power source of their own and can boost, clean up, and relay the
network's signal are called active hubs. It functions simultaneously as a wiring
center and repeater. The maximum distance between nodes may be increased
thanks to these.
Passive hubs are hubs that accept wire from nodes and electricity from active hubs.
These hubs cannot be utilized to increase the distance between nodes because they
merely send signals into the network without boosting or cleaning them Intelligent
hubs are capable of remote management and perform similarly to active hubs.
Additionally, they offer programmable data rates to network devices. It can be used
by a hub administrator to configure each port and track traffic.
Switches enable you to link numerous devices together. They allow you to control
who has access to different areas of the network and stop traffic between two
devices from interfering with other devices on the same network. Switches make it
easier to monitor consumption and offer faster internal network connectivity than
the Internet. High-end switches can be modified with pluggable modules to suit the
needs of your network.
Router
To connect a LAN to the Internet, a router and a modem must first exchange
communications. There are two fundamental ways to do this:
HND-45 Aung Kaung Maw
Wireless router
Wired router
Like a wireless router, a wired router connects to a modem via an Ethernet cable. It
then establishes separate connections with one or more network devices to form a
LAN and link those devices to the Internet.
Wired network devices called Wireless Access Points (WAP) transmit signals that
wireless devices can connect to and use to connect to the internet. A device that
enables wireless devices to connect to a wired network through Wi-Fi is included in
wireless access points, which are used in computer networking.
Wi-Fi wireless standards are supported by wireless access points, which are
primarily used in home or small business networks. Each access point in a specific
network region can support a large number of users. Additionally, it automatically
switches to the next access point when a user moves outside the range of one.
Bridge
In order to create a single, larger local area network (LAN), a bridge is a type of
network equipment that connects numerous LANs. Network bridging is another
name for network aggregation. A bridge connects the numerous segments, giving
the impression that there is just one network overall. Since they operate at the
data connection layer of the OSI model, bridges are also referred to as Layer 2
switches.
The bridge in a computer network uses the destination's MAC address, which is
encoded into each frame of data, to block or advance the data. When the
destination address is on a network, the bridge helps pass the data to the other
linked networks. The data cannot transit if there is no address. With transparent
bridges, there is no need for station reconfiguration whether a bridge is added or
removed from the network because the stations are completely unaware of the
bridge's presence. On these bridges, the bridge forwarding and bridge learning
techniques are employed.
In source routing bridges, the source station handles all routing tasks, and the
frame selects the optimal course of action. The host can find the frame by
transmitting a special frame called a discovery frame, which travels the entire
network using all practical routes to the target.
HND-45 Aung Kaung Maw
The topic described how network devices are connected to one another
(switch, hub, router, WAP, bridge).
Advantages
With DHCP, which is easy to set up, IP addresses can be automatically assigned to
requesting clients. As a result, it is possible to shorten the time needed to manually
configure IP addresses. The deployment is not accompanied by any extra costs. It
is prohibited to assign duplicate or incorrect IP addresses. Therefore, IP address
conflicts are not a possibility. It simplifies network administration. Numerous
scopes, including super scope and multicast scope, are supported. Mobile users gain
a lot from it because the new network gives them the right configuration
parameters right away.
Disadvantages
It's possible for a network's single DHCP server to fail if there are only one or no
other DHCP servers installed. All lease requests on both network segments must be
handled by a relay agent because DHCP packets cannot pass through a router.
Relay agents take in DHCP broadcast packets, which they then send as unicast
packets to the DHCP server. The IP address of the DHCP server must be specified in
the configuration of the relay agent in this case. Due to the lack of a secure
authentication method for clients, it is possible for the DHCP server to gain
unauthorized access to IP addresses by supplying credentials like client IDs from
other DHCP clients. The machine name is unaffected by the assignment of a new IP
address. The client is unable to connect to the network without the DHCP server.
DNS server
The phonebook of the Internet is the Domain Name System (DNS). DNS is in
charge of locating the correct IP address for websites when users type domains like
"google.com" or "nytimes.com" into a web browser. The browser then contacts the
origin server or the edge CDN server using these addresses to access website data.
HND-45 Aung Kaung Maw
Advantages
A DNS has the advantage of having a large network of additional DNS servers that
are similar to it. This suggests that if one DNS server is unable to convert a domain
name into an IP address, the other DNS servers can be used by the current DNS
server to assist the first DNS. A DNS also has the benefit of making web addresses
easier for users to remember since they only need to retain the domain name
rather than the IP address. Users can now find websites on the internet more
quickly and easily thanks to this.
Disadvantages
Incorrect DNS configuration may result in DNS redirection. This implies that a
person will be taken to a completely different location if they search for a website
and type the domain name into their web browser. Another drawback of DNS is that
it has a number of security flaws that could leave networks vulnerable to external
threats like hacking.
File server
A device that manages access to separately stored files is known as a file server. A
networked computer called a file server, which is a component of a multiplier
system, serves primarily as a storage location for accessing shared hard drives.
This computer has files on it that are accessible to everyone on your local area
network (LAN). The microcomputer is referred to as a file server on some LANs,
while it is a computer with a sizable hard drive and specialized software on other
LANs.
Advantages
Since servers frequently have redundant hard drives, which guard against data loss
from even a single disk failure, data is more secure. Data is safer because the
server may be physically sealed in a room that only authorized individuals are
allowed to access. Since files are frequently backed up, data is safer and consumers
are relieved of the responsibility of maintaining their own data. The central
management of files makes it simple to set up new employees. File permissions are
easy to set up and offer precise access control for data. Users can log in to any
client computer to access their data.
Disadvantages
If the file server fails or becomes corrupted, all data is lost or rendered inaccessible
until a backup can be used to restore it. As more users read and write files to and
from the file server, network bandwidth will grow. They typically need to be
installed and managed by an experienced IT professional. Due to their high price,
they might not be the best choice for a small company with two or three
employees.
HND-45 Aung Kaung Maw
Web Server
Web browsers access web pages that are stored on web servers. Additionally, you
can incorporate a database of a user or product data that your browser can use and
access.
Advantages
You are allowed to use scripting languages for the server, such as PHP, Ruby, etc.
Your coding style makes it possible because the structure of your website can be
represented as predefined paths rather than your computer's system directory
structure. If you want to know how it operates in a real-world setting, it can help to
give you useful knowledge to start a conversation with your hosting company. Any
web application can benefit from performance and download speed monitoring. To
view the URL hierarchy, broken links, etc., you must have authorization. The
interactions between your website and server while it is being hosted are more
transparent thanks to this. The live page's function is the same as that of your local
site. Before implementing them in the production environment, you could, for
instance, configure folder security, check your custom error pages, etc.
Additionally, it gives more information about how HTTP communication functions. It
is more flexible and controllable. It is kept up in a secure infrastructure. App
management is simple. You have the right to set up a special server in accordance
with your needs.
Disadvantages
Compared to using electronic website hosting, it might cost more. The modification
of hosting services is more difficult. Due to server overload, your website may go
offline at any time. It is convenient to use straightforward online businesses, but it
is not the best choice if you want to use it for your own businesses that are more
sophisticated and demand distinctive design and style. Websites must take
additional security precautions, such as requiring credit cards on the server when
an online store is operating.
A network interface card (NIC) is a circuit board made to connect devices like
computers and network servers to the internet. MAC (Media Access Control)
addresses are a low-level addressing system used by NICs to provide physical
HND-45 Aung Kaung Maw
access to network media. Users can now connect to one another wirelessly or over
cables thanks to this.
The most well-known and widely used connector type in the computer industry is
the RJ45. RJ45 cable is primarily used to establish an Ethernet connection between
devices. The RJ45 connection can be used by peripheral devices like cable or DSL
modems, computers, printers, and network storage devices. Instead of using Wi-Fi,
provide access to the Internet in person (802.11). STP cable, UTP cable, and some
fiber optic connections all use RJ45. Computers are typically connected to Ethernet-
based local area networks using plugs or sockets with an 8-pin/8-position
configuration (LAN). Twisted pair cables are terminated using one of two wiring
schemes, T568A or T568B, at the connector interface.
Cable UTP
LAN networks are the main application for UTP cables. These can be used for
building automation and control systems, voice, slow data, high speed data, audio
and paging systems, and more. Both horizontal and backbone cable subsystems
can use UTP cables. UTP is less expensive than STP and has no shield.
Cable STP
Four pairs of signal transmission wires are covered by the shielded twisted pair
cable, which reduces electromagnetic interference by acting as a conductive shield.
STP cables come in a variety of varieties. B. The shield- and foil-twisted pairs
(S/FTP). Shielded twisted pair is used to protect the current when routing cables in
a delicate environment.
In a plastic housing, fiber optic cables contain a few to hundreds of fiberglass fibers.
It is also known as an optical cable or fiber optic cable, and it transmits data signals
via light, which travels much more quickly than conventional electrical cables. It
consists of a glass core in the center encased in several layers of safety material.
Software
Server Software
Window Server
Microsoft developed the Windows Server family of operating systems specifically for
servers. A server is a very strong computer system made to constantly manage
other computers and supply resources. Despite this, Windows Server is almost
never used outside of business environments.
Mac Server
HND-45 Aung Kaung Maw
Your business, home office, or school will now have even more power thanks to
MacOS Server. MacOS Server makes it simple to configure Mac and iOS devices
because it is made to work with both operating systems. It's also surprisingly easy
to install, configure, and manage.
Linux Server
Firewall
By installing a firewall, network users are kept safe behind a "wall" and hackers are
kept out of insecure networks. For a more secure network solution, think about
installing a unified threat management appliance and related software on your
network.
Anti-spyware software
Software that blocks spyware also offers additional data security protection. A
medium-sized business might need more robust antivirus protection or all-
encompassing internet security software. If you use Apple's MacBooks or Macintosh
laptops, you might not need an antivirus program because the majority of malware
is made to target Windows PCs. On the other hand, the rise in popularity of the Mac
could lead to the creation of new Mac viruses.
A file server is a computer connected to a network that serves as the main hub for
shared disk access. It is a device that, as part of a multiplier system, grants users
access to files that are stored separately. Only file servers can be used by clients to
access a remote file system. Any type of data, including documents, executables,
images, and videos, may be stored on them.
The data is frequently kept in the form of files or binary data blobs. This indicates
that they don't further process or index the stored files. There might be extra
plugins or server features, though, that can provide additional functionalities.
HND-45 Aung Kaung Maw
A file server does not provide any built-in means of interaction, so the client is
required to access the data. Databases are not called file servers because they only
function with organized data that can be retrieved by a query.
File servers commonly provide extra features to enable multiple users to view files
simultaneously:
Permission management is used to manage who has access to which files and who
has the power to change or delete them. Due to file locking, multiple users cannot
edit the same file at once. Conflict resolution keeps data integrity when files are
overwritten. By distributing the data across several servers located in different
locations, the data can be made redundant and highly accessible.
Web server
When a browser submits a request, a web server is software that processes the
request and responds with an HTML document, or more specifically, a website page.
However, the phrase "web server" can be used to describe both a piece of hardware
and software.
Hardware-wise, all data, including HTML text, images, CSS stylesheets, and
JavaScript files, are stored on web servers. The web server functions as a command
hub for managing requests from web browsers on the software side. Everything
related to a website is frequently also related to the web server because the web
server's role is to manage all communication between the browser and the server
throughout the processing of a website. When a browser requests a website page,
the web servers respond to the request. HTTP requests are received by web
servers. Before executing the HTTP request, the web servers perform a security
check. On a web server, HTTP requests are handled by an HTTP server. An
application known as an HTTP server decodes HTTP requests and URLs (website
addresses) (protocols used by browsers to display website pages). The web server
sends the browser an HTTP response, which is then transformed into a website
page.
In order to fulfill an HTTP request that a web server receives from a browser, it
might be necessary to launch a database query.
DNS Server
In most cases, calling someone involves opening your contact list, tapping their
name, and then choosing call. You are aware that doing this unintentionally makes
the contact and phone number associated, and your mobile connection makes the
call. DNS is your online phonebook. You can tell your browser to find the IP address
and get a domain name by simply pressing the enter key and waiting. Let's explore
this topic in greater detail.
One nameserver and a set of DNS records make up DNS. A nameserver's job is to
explicitly store instructions on how to access DNS records. You can find out more
HND-45 Aung Kaung Maw
about the DNS records by visiting the nameserver that your browser uses to
request a domain. Simply put, a DNS record is what converts a URL to an IP
address.
DNS refers to the name service that the Internet provides for TCP/IP networks. The
DNS is made up of domains, which are logical collections of computers connected to
a larger network. The domains exist at different levels and are connected in a
hierarchy that resembles a tree's root system. Each domain extends from the node
above the root-level domain, which is at the top. The second-level domains and
subdomains are found below the root-level domain, then the top-level domains. The
DNS namespace specifies the organization of the domains that are combined to
form a complete domain name. For example, "com" stands for the top-level
domain, "secondary" stands for the secondary domain name (typically a website
hosted by a business or organization), and "sub" stands for a subdomain inside the
larger network. The entire DNS domain hierarchy is referred to as the DNS
namespace. The name of a computer or domain relates to its location within the
namespace.
Private network protocols are used by DNS servers that are organized hierarchically
to communicate with one another. The master DNS servers, also referred to as
"root servers," maintain the complete database of Internet domain names and the
corresponding IP addresses. They are owned by numerous independent companies
with locations in the UK, the US, Japan, and Sweden. Only a portion of the total
database of domains and addresses is kept by the other lower-level DNS servers,
which are owned by businesses or ISPs (Internet Server Providers). A DNS server is
any device running specialized DNS software that is registered with the DNS system
and assists in resolving domain names to their correct hosts. Every DNS server has
a public IP address and a database of the network names and addresses of other
Internet hosts.
DHCP Server
When a user turns on a computer and connects it to a server using this service, the
computer immediately requests an IP address from the server. The computer
eventually receives the IP address and creates a network connection after the
server responds to the query.
Avoiding IP conflict happens when two devices use the same IP address. If this
happens, the device won't be able to connect to the network. By using this tool, IP
address-sharing errors can be minimized. Additionally, it might manage IP address
exchanges correctly, reducing the possibility of errors.
HND-45 Aung Kaung Maw
Supports IP Address Reuse: Client computers may use P addresses that have
already been in use. You must make sure that no other machine is already using
the IP address before you can reuse it. The Dynamic Host Configuration Protocol
server can help you determine whether the IP address is off and available for use
so that it can be reused.
This article covered a variety of server types and provided justification for
the server choice (File server, Web server, DNS server, DHCP server).
The key to running a profitable cafe is bringing in new customers while holding on
to your current ones. These can be accessed by using a wireless internet
connection. Due to the quick and dependable WiFi, they will have yet another
reason to visit the café. WLAN will be my choice in this scenario because it is
simpler to install, less expensive, has a high data transmission rate, and eventually
enables our clients and employees to connect to a network whenever necessary
without needing to attach a cable to each device.
We only need a very small amount of effective network hardware for a network this
size. There would be numerous wireless access points, switches, and routers. Our
network could only connect to nearby resources without a router. We use it as our
first line of defense against unauthorized cyberattacks because it serves as the
verification link connecting internal and external networks for monitoring,
diagnostics, and enforcement of security policies at the access layer of our data
center. connecting the outside network to our internal one. One of the router's
security features is a firewall, which keeps an eye on incoming web traffic and
prevents any fraudulent activity from entering our network. To give clients the most
dependable experience possible, I deploy access points everywhere. We can put our
router in a useful location by using WAP, which also acts as the conduit that is
closest to the area where the Wi-Fi network is needed. Even so, performance and
the user experience start to suffer the further users are from the access point.
This is due to its amazing speeds, dependability, and effectiveness as well as how
simple it is to add new nodes to networks without having an impact on the ones
that are already in place. In addition, I would build a secure network for our
company using at least one protocol.
HND-45 Aung Kaung Maw
Given the size of this network, I would use a variety of computer models. In
addition, it is capable of the following: Even if an educational package took one
path but went the wrong way on the other, it would still arrive at its destination.
Furthermore, the remaining parts of the network would keep operating normally
even if a breach rendered a part of it inoperable. I think these elements could be
combined to create a helpful little network for a small business.
Medium Network
Because they link faculty, staff, and students to the LAN and the internet, routers
are crucial in higher education. Routers that are incorrectly installed could pose a
security risk. But reliable routers can defend our university from threats from
outside. Routers can have built-in firewalls and filters that protect our network from
malicious software, as I've already mentioned. I frequently use WAPS because they
offer a quick, dependable internet connection across the entire campus without
encountering problems in areas that appear to be too far from the network router
or that are obstructed by high walls. Since modern educational institutions,
particularly colleges, use technology like computers, projectors, and other gadgets
in the classroom, having a strong internet connection is essential.
Large Network
We must be very clear about the DHCP configurations because some computers or
devices can use IP from the DHCP pool while others may need static IP. Calculate,
divide, and then distribute the internet bandwidth to each department either
equally or in accordance with a predetermined ratio. Then, a MAN network is
required to connect those two corporate branches if that company has another
branch and wants to establish a network connection between them. To create a
faster and more secure network, we might connect via fiber cable as opposed to the
internet. The connection could be client/server or point-to-point depending on how
many branches they want to link.
This article discussed factors to take into account for an office network
(small network, medium network and large network).
.
HND-45 Aung Kaung Maw
HND-45 Aung Kaung Maw
https://www.aplustopper.com/lan-advantages-and-disadvantages/
https://www.naukri.com/learning/articles/metropolitan-area-network-man-
advantages-and-disadvantages/