You are on page 1of 26

HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

Swam Pyae Maung Maung

Student ID – MG16573

Assignment Submission Date - 13/6/2022

Assignment Hand-In Date - 22/6/2022

1
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

Contents
Network Types ..........................................................................................................................................................3
LANs (Local area networks) .....................................................................................................................................3
WANs (Wide area networks).....................................................................................................................................3
Client-Server (Centralized) ........................................................................................................................................4
Cluster Network .........................................................................................................................................................5
Peer-to-Peer ...............................................................................................................................................................6
Mesh Topology ..........................................................................................................................................................7
Star Topology ............................................................................................................................................................8
Communication .........................................................................................................................................................9
Connection: Fiber Optic Cable ..................................................................................................................................9
Bandwidth................................................................................................................................................................ 10
OSI model vs TCP/IP model ................................................................................................................................... 10
TCP/IP Model .......................................................................................................................................................... 14
HTTP and HTTPS ................................................................................................................................................... 16
Switch ...................................................................................................................................................................... 17
Router ...................................................................................................................................................................... 17
Access Point ............................................................................................................................................................ 17
Web Server .............................................................................................................................................................. 18
eMail Server ............................................................................................................................................................ 19
FTP Server ............................................................................................................................................................... 19
Database Server ....................................................................................................................................................... 19
Interdependence of workstation hardware ............................................................................................................... 20
Networking Software ............................................................................................................................................... 20
Server Software ....................................................................................................................................................... 20
Web Server Software ............................................................................................................................................... 21
Application Server Software.................................................................................................................................... 21
Database Server ....................................................................................................................................................... 22
Server Operating System ......................................................................................................................................... 22
Client Operating System .......................................................................................................................................... 23
Hardware Requirements .......................................................................................................................................... 23
Advantages of web servers: ..................................................................................................................................... 23
Cost of web server ................................................................................................................................................... 24
Performance of web server ...................................................................................................................................... 24
References ............................................................................................................................................................... 25

2
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

Introduction Report:
Hello, I am Swam Pyae Maung Maung who is working as a Network Engineer in “Info Tech”
company that is also called one stop IT service company. In the report, I would like to explain
what networks we used, how they work and types of networks benefits. We explain so many
network types and which network are the most usage around the world. Our project goal is to
ensure the integrity of high availability networks infrastructure to provides maximum
performance for the user’s requirement. We will also explain how to install configure and various
network devices and services which are reliable to use easily.

(P1)
Role of networks:

Network Types
They are classified relative to their geographic coverage and size. Their two most common
classifications are LANs (Local area networks) and WANs (Wide area networks).

LANs (Local area networks)


It’s a network data that is restricted to a single location and generally encompasses a small
area, including an office building or school. LAN’s function is to interconnect workstation design
to share files and resources.

Typically, a high speed and less cost than WAN because of its nature.

WANs (Wide area networks)


A network which has one more than geographic location is called wide area networks. It
can even connect to separate LANs. Mostly, WANs are slower than LANs and hardware costs are
high. It has complicated implementation procedures.

3
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

System types:

Client-Server (Centralized)
Client-Server includes many devices connected to the main server. Main server controls
everything, including hosting data and other forms of resources. Clients have mobiles, tablets,
one or more PCs or other devices which run applications and are connected to the main server
through Ethernet cable or Wireless connection.

This network is designed for end-users, which are also called clients. Clients can access
files inside the server. Server can be also called “A Central Computer” because it’s also mentioned
as “Centralization”. The aim of a server is to serve its clients. For instance, when you play games
on “EPIC Store” or something like that, you have to Log-In to its network first. It links your PC to
its EPIC’s server networks and downloads games and updates everything we want.

The network is a way to connect the server from clients. It is used to send and receive
data and commands from server and clients. When the commands are accepted by the server,
then it proceeds the request if it’s a valid command. At that time, the server will resume its
process depending on the Internet connection.

• Advantages of Client-Server network

• It has a centralized management system.

• Only administrators can have access to the server.

• Understandable and easy to set up.

• Many folders and files can be backed up to the main server.

• Disadvantages of Client-Server network

• Administrators are needed to take care of the server.

• Lots of disruption can occur when any part of the network fails.

4
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

• Need to require your own server.

Cluster Network
It’s a set of servers and other devices which work as a single device to increase the
availability of services and applications. The clustered servers are also known as “Nodes”. They
are only designed for high performance workloads.

Cluster is a logical unit file of storage on a hard drive, controlled by the computer's
operating system. The files can take up to one or more clusters of storages. It can also be a set of
workstations or terminals attached to a regular control unit.

These networks are built on the top of the instance features, which is why most
operations are directly controlled by the network. Not all regions around the world can support
Cluster networks. If you want to get access to a cluster-network, you may have to create an
availability domain of capable hardware.

• Advantages of Cluster network

• As the cluster network contains many servers, the performances and availability
are high.

• Scalable means courses can be added to the clusters correspondingly.

• Also, it is easy to maintain because server maintenance can perform without


stopping the server services programs.

• Disadvantages of Cluster network

• Clustering needs numbers of servers and network costs are high.

• Always need an administrator to look after the servers.

• Not flexible because all servers can’t support clustering.

5
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

Peer-to-Peer
In this network, each personal PCs and device share bandwidth equally. Mostly, home
networks are peer-to-peer. It doesn’t need a primary server and is not able to handle heavy loads
like “Client-Server”.

It can also be a permanent network which connects a large group of PCs in an office with
Ethernet wires. In this type of network, Peer-to-Peer, all permissions can be set to allow access
to all files.

• Advantages of Peer-to-Peer

• Low cost.

• Simple to configure.

• Easier to set up than Client-Server.

• Users have full accessibility.

• Disadvantages of Peer-to-Peer

• Difficult to uphold security policy.

• Slow performance.

• The whole system can be invaded by viruses because they are all connected
together.

• No backup server.

6
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

(P2)
Topologies:

Mesh Topology
A mesh topology where each computer and network device are associated with one
another. If one of the connections breaks down, this topology allows it to be spread for
transmissions.

Benefits of impact - Mesh topology is a dynamic network routing, which means traffic can
travel across from multiple paths. If one network node breaks down, data can take another route
to reach its destination; this eliminates disabled devices and affects network performance.

There’re also two types of mesh topology named: full mesh and partially-connected
mesh. In full mesh, every computer in this network has a connection to each one of the other
computers in that network.

In a partially-connected mesh, there must be at least two computers that have


connections to multiple other computers in that network.

• Advantages

• Almost impossible to take down.

• Easy to add new devices.

7
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

• Adding new devices does not affect the network, etc.

• Disadvantages

• Complex structure.

• Difficult to setup initially.

• Costly compared to others, etc.

Star Topology
In star topology, a central connection, that seems like a switch, is placed instead of
backbone, like in bus topology. All devices (nodes) are individually connected to the central
connection point also like in bus topology.

As each connecting device is isolated from other connecting nodes, it limits the impact of
a single point of failure which means if one connecting node goes down, it will not impact the
performance of other connecting devices in the network.

Another impact is the performance of the network can suffer when too many devices
compete for access to the central node. Devices are directly connected to the central node so
the network can manage from the central point.

It is easier to administer performance-related changes to all devices. However, if the


central point suffers an issue, it will affect every device on your network.

• Advantages

• Highly efficient.

• User-friendly.

• Safe to use.

8
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

• Disadvantages

• High cost.

• High maintenance.

• If the central node breaks down, the whole network will break down.

Communication

Connection: Fiber Optic Cable


In networking, optical fibers are used to connect to servers and users, which is helping in
increasing accuracy and the transmission speed of data processing. For the new department’s
connection, it helps to get a better connection.

Telecommunication is speedily changing from copper wire to fiber optics. Fiber Optic
cable guides lights for long distances which is made with a very thin strand of glass wire. It may
be made up of two layers of glass containing “The Core and The Cladding”. The core carries the
actual light signal. The cladding, that is creating a full total internal reflection within the core
which has a lower refractive index than the core. The cables usually send and receive light in dual
pairs, one to transmit and one to receive, sometimes, it’s also possible that both can receive and
transmit over a single strand.

Optical fiber cables have partially unlimited information, which means they have data
carrying with high capacity.

9
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

Bandwidth
The amount of data that might be transferred over connection per second can be
mentioned as Internet bandwidth. Bandwidth is measured in “Bits per second”.

The most speed used in the office is 150 mbps because it is enough to do a large variety
of online business and tasks every day. That internet speed delivers download speed at 17.9
mbps, which can support 255 mbps operating system.

Bandwidth can be calculated in following formula; (TD * (100 / DR) * 8192) / (RWT * 3600)
= Required Network Bandwidth (Mbps/second).

(M1)
Networking Standards:

OSI model vs TCP/IP model


OSI, which means “Open Systems Interconnection”. This system was developed in 1984
by ISO “International Organization of Standardization”. OSI contains 7 layers and each of them
are performing in different functions. These 7 layers work together so the system functions are
properly the same.

Containing 7 layers of OSI Model are:

1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

1.Physical Layer
This is the first layer of OSI Model, which is responsible for the connection for the physical
cable or wireless between network nodes. In the form of bits, this layer contains information.
From one node of individual bits to the next, it is responsible to transmit. When receiving data,
it will get the signal and transmit it into 0s and 1s and deliver to the Data Link layer, which will
put the frame back together.

10
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

Functions

1. Bit synchronizations - provides the bits by clock and clock controls both sender and
receiver at bit level.
2. Bit rate control - also represent the program rate i.e., the number of bits sent per second.
3. Physical topologies - indicate the way different devices(nodes) are organized in a network
i.e., bus, star or mesh topology.
4. Transmission mode - also specify the way how data flows between the two connected
devices. Different transmission modes are possibly Simplex, half-duplex and full-duplex.

2.Data Link Layer (DLL)


Between two physically connected nodes on a network, this layer establishes and
terminates the connection. This layer is divided into two parts, Logical Link Control (LLC) and
Media Access Control (MAC).

Logical Link Control is known as identifies network protocols, which performs to check
error and synchronizes frames.

As for Media Access Control, devices, which use MAC addresses to connect and define
permissions to send and receive data.

Functions:

1. Framing - is one of the functions of the data link layer and provides a way which is
meaningful for a sender to transmit a set of bits and to the receiver. To the beginning and
end of the frame, it is accomplished by attaching special bit forms.
2. Physical addressing - after creating frames, this layer adds physical addresses which
means (MAC address) of sender or receiver of each frame in the header.
3. Error control - it describes the error of the mechanism when it detects and retransmits
damaged or lost frames.
4. Flow control - the data rate must be endlessly running on both sides or else the data may
get corrupted.
5. Access control - when multiple devices share with a single communication, the MAC
sublayer of this layer helps to determine which devices has control over the channel at a
given time.

11
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

3.Network Layer
For the transmission of data, this layer works data from one host to another location in
different networks and also takes care of packet routing, from the number of routes which are
available in the selection of the shortest path to transmit the packet. This layer has two main
functions.

Functions:

1. Routing - layer protocols take a decision of which route is relevant from source to terminal
which means breaking up segments into packets and reassembling the packets on the
receiving end.
2. Logical Addressing - to identify each device on internetwork uniquely that the network
layer provides an addressing scheme and routing packets by discovering the best path to
cross a physical network.

4.Transport Layer
In the end of the transmission, data transferred is taken into the session layer and breaks
it into segments. It’s responsible for the End-to-End delivery of the complete message. This layer
also provides a successful data transmission and when error is found, the data are re-
transmitting.

Functions:

12
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

1. Segmentation and Reassembly - accept the message from the layer and break it into
smaller units. At the destination station, the layer restores the message.
2. Service Point Addressing - messages are delivered to the correct process and include a
type of address called service point address or port address.

5.Session Layer
This is the 5th layer of OSI model and is responsible for setting up of connection, sessions
maintenance, authentication and also ensures security.

Functions:

1. Session establishment, maintenance and termination - allows two processes to establish


and terminate a connection.
2. Synchronization - allows a process to add checkpoints which are synchronization points
into the data. These points help to check the error so data is re-synchronized but
messages are not deleted prematurely and data loss is avoided.
3. Dialog Controller - allows two systems to start communication with each other in half-
duplex or full-duplex.

6.Presentation Layer
For application layer, this 6th layer prepares data, it’s also known as “Translation Layer”.
This layer shows how two devices should encode, encrypt and summarize data and so on the
other end, it is correctly received. The data is extracted and manipulated as the format to relay
over the network.

7.Application Layer
This layer is the 7th layer and also top of the OSI Model, which is used by end-user software
such as web browsers and email clients. The allowance of software is to send receive information
and instant meaningful data to users. Few examples of application layer protocols are HTTP, FTP,
POP, SMTP and DNS. One of those protocols will be shown under.

Functions:

13
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

1. Network Virtual Terminal


2. FTAM – file transfer access and management
3. Mail Services
4. Directory Services

OSI model in Nutshell

TCP/IP Model
TCP/IP means “Transmission Control Protocol/ Internet Protocol”. This model is a kind of short
or small version of the OSI model. It is based on standard protocols and was developed in 1960
by “Department of Defense (DOD). This model contains 4 layers.

4 Layers of TCP/IP model are:

1: Process/ Application Layer

This is same as 1st layer and also performs the functions of top of three layers: Application,
Presentation and Session layer in OSI model. To communicate and control user-interface, it is
responsible for node-to-note.

14
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

2: Host-to-Host/ Transport Layer

Similar to the transport layer of the OSI model. This layer is important for end-to-end
communication and error-free delivery of data. Two main protocols including in this layer are:
TCP and UDP.

1. TCP (Transmission Control Protocol)

Known as reliable and error-free communication between end systems. It


performs sequencing and segmentation of data. Cost can be increased leads to
increased overhead.

2. UDP (User Datagram Protocol)


This doesn’t provide any kinds of features. It is very cost-effective if
application doesn’t reliable transport.

3: Internet Layer

This is the parallel function pf OSI’s Layer. It is the protocol which is the logical
transmission of data over the entire network. The protocols residing in this layer are

1.IP – known as Internet Protocol which responsible to deliver packets from the main
host to station host at looking at IP addresses in the packet headers. There’s two
version calling IPv4 and IPv6. IPv4 is one of the most IP using currently for websites.
IPv6 is growing as IPv4 addresses when the numbers of users more and are limited in
number.

2.ICMP – standing for Internet Control Message Protocol. It is summarized within IP


datagrams and responsible for providing hosts with the information about network
problems.

3.ARP – stands as Address Resolution Protocol. Its task is to search hardware address
of a host from known IP address. There are several types of ARP: Reverse ARP, Proxy
ARP, Gratuitous ARP and Inverse ARP.

4: Network Access Layer/ Data Link

This layer is similar to the combination of two layers naming: Data Link Layer and Physical
Layer of OSI model. It reviews for hardware addressing and for the physical transmission of data
which allow the present protocol in this layer.

OSI TCP/IP

15
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

OSI refers to Open Systems TCP refers to Transmission Control


interconnection. Protocol.

OSI has 7 layers. TCP/IP has 4 layers.

OSI is less reliable TCP/IP is more reliable

OSI has strict boundaries TCP/IP does not have very strict
boundaries.

OSI follows a vertical approach. TCP/IP follow a horizontal approach.

OSI uses different session and TCP/IP uses both session and presentation
presentation layers. layer in the application layer itself.

OSI developed model then protocol. TCP/IP developed protocols then model.

In OSI model, transport layer provides Transport layer in TCP/IP does not provide
assurance delivery of packets. assurance delivery of packets.

Connection less and connection oriented TCP/IP model network layer only provides
both services are provided by network connection less services.
layer in OSI model.

While in OSI model, Protocols are better Protocols cannot be replaced easily less
covered and is easy to replace with the services.
change in technology.

Protocols:

HTTP and HTTPS


HTTP: Hypertext Transfer Protocol, which is the foundation of “World Wide Web” which
means (www.) and also using hypertext links to load web pages. HTTP is an application layer
protocol between networked devices, when clients send a request to the server, and then
processed before getting back the request by clients.

16
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

HTTPS is an extension of HTTP, which is more secure and known as “Hypertext Transfer
Protocol Secure”. HTTPS is also encrypted in order to increase security of data transfer.

(P3)
Networking Devices:
For communication links between computers and for data communications between
devices in such high network structure, devices, hardware and physical devices, (like gateways,
switches and routers) will be necessary.

Data examining, finding the best route for transmission and to commute the different
network among the infrastructure. This structure includes many star topologies and moreover.
So, we will need switches to boost the data transportation and let multi devices to communicate
and routers, gateways will connect many networks.

Switch
It’s a device mixed with a hub and bridge. A switch contains multiport to let multiple
computers connect directly with each other. To connect multi devices and the data transmission
between devices, they will act like multiport bridges. It has also had the understanding to
examinee the data before sending which is checking the data in case there has an error and then
make the transition to get more efficient and then send it to the right destination. This network
transfers data without slowing down and also lets several users send and receive data. A switch
is more intelligent than a hub so it can easily understand and learn new mac addresses. Switches
are used in this network after improving the network security.

Router
It’s a network communication device where it is used to connect two or more networks.
To send and receive data to a specific network, a router device is used and also often used as a
layer to connect to the internet. Like LANs and Wans, both static and dynamic routings based on
the decisions of the data packages, routers are devices that connect the various network.

Access Point

An Access Point works at the second OSI layer, the Data Link layer which operates either
as a bridge connecting a standard wired network to wireless devices or as a router passing data
transmissions from one access point to another.

17
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

Wireless access points (WAPs) consist of a transmitter and receiver (transceiver) device
used to create a wireless LAN (WLAN) and use the wireless infrastructure network mode to
provide a connection point between WLANs and a wired Ethernet LAN.

Access points are separate network devices with a built-in antenna, transmitter, and
adapter. They have several ports to expand the network to support additional clients. Depending
on the size of the network, the requirement of AP to provide full coverage varies.

Additional APs allow access to more wireless clients and expand the range of the wireless
network. AP is limited by its transmission distance. It depends on the wireless standard, the
obstructions and environmental conditions between the client and the AP. The Higher end APs,
the more the wireless signal can travel. PS provides ports to increase the network’s size such as,
a switch, DHCP server, router and firewall.

In order to connect a wireless AP, a service set identifier (SSID) name is needed. It is used
to identify all systems belonging to the same network, and client stations must be configured
with the SSID to be authenticated to the AP. Then, it will broadcast the SSID to allow all wireless
clients in the area to see the AP’s SSID. Wireless devices ship with default SSIDs, security settings,
channels, passwords and usernames.

For security reasons, APs can be configured not to broadcast the SSID, which means that
an administrator needs to give client systems the SSID instead of allowing it to be discovered
automatically and for the wireless devices, it is strongly recommended to change these default
settings as soon as possible as many internet sites list the default settings used by manufacturers.

Access points are either thin or fat, controller-based or stand-alone. Fat Aps refer to as
autonomous Aps which need to be manually configured with network and security settings so
they are essentially left alone to serve clients until they can no longer function. Thin APs allow
remote configuration using a controller and do not need to be manually configured, they can be
easily reconfigured and monitored.

Server Types:

Web Server
A web server can indicate hardware or software, or two of them working together.

18
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

As a hardware, a web server is a website’s component files like CSS files, HTML,
Documents, images and server that store computing web server software.

For software, it contains many parts that control files which only a user can access. Web
servers and browsers use primary protocol with HTTP server. In society, most web servers
support server-side languages encoding business logic to deliver dynamic content.

eMail Server
An email server runs on “SMTP” or “Simple Mail Transfer Protocol” as the dominant
protocol. It powers mail services and simply takes in emails from one client to another and
forwards the data to the other server.
Data is simplified when sent through SMTP, so some information can be lost in email
transactions. The modern approach to email servers is paired with web servers to allow for users
to have a “web client” that shows the data on a web page. Some newer web applications without
installing anything can even mimic a home computer email client.

FTP Server
FTP (File Transfer Protocol) servers’ purpose is to host a file exchange among users. These
servers do not provide any type of encryption by default, so sFTP which is FTP over secure SSH
protocol are often used in its place.
This type of server allows users to upload, browse or download files individually after
authenticating through an FTP client.
A file server is a main server that stores and manages files in a computer network. It can
also share files over a network without needing a USB or hard drive. As a remote hard drive, it
can also be a NAS (network-attached storage). On the internet, some programs often use the
FTP (file transfer protocol).

Database Server
A database server operates to store data in groups. There are many types of methods to
keep data that operate on different theories. One of the common types is “SQL” or “Structured
Query Language”.
Programmers can create databases on these servers by scripting in the language of the
database. To grab data as users request, web applications usually have their server-side
components connected to a Database server.

19
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

It is important to have web servers and database servers on different machines for
security so that if a hacker accesses the main web server it will be easier to retrieve or modify
the data stored in the database server.

(P4)

Interdependence of workstation hardware


Hardware and software which are interdependent on each other. They should work
separately to form a computer which to produce a cooperative output. When there is no any
support for any hardware device, the software can’t be used. Also, if there’s no any appropriate
instructions given, the hardware cannot be used and is useless. Into the hardware, the relevant
software package has to be loaded to get selected job done on the pc.
Hardware is kind of expensive in former times also software development is amazingly
highly and could be more expensive. To run many different jobs, different software package can
be loaded. The software acts as an associate interface between the user and also the hardware.
We can absolutely say that the hardware and software are the most essential, the heart
and soul of a digital computer.

Networking Software
A workstation is a computer which is specially designed for scientific or technical use and
importantly to be used by only one person at a time. Also connected with a local area network
and multi-user operating system to a working area.

It’s a collection of instructions which access the user to interact with the computer,
especially hardware. With most of the computers, without software, you can’t do any interaction.

If you want to do some network configurations and adjustments over your network, you
might need software, operating system or OS. It helps administrative deploy, manage and
monitor over a network.

Server Software
Server software is a type of software that is designed to be used and control a computing
server. By giving better control to the server, it helps maintain the server in good state and
configure the network of the server. To link with a server’s hardware infrastructure, (including
the processor, storage, memory, I/O (input/output) and the many other communication ports.

Depending on the usage of the server software, it may be divided into various forms. They
are the following as below:

20
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

1. Web server software

2. Application server software

3. Database server software

4. Cloud computing server software

5. File Server Software

Web Server Software


It’s a system delivers contents or services over the internet to end users. A web server
stands of a physical server, OS (server operating system) and software which is used to facilitate
HTTP communication. This is also known as an internet server.
Web server, which runs a website by sending HTML files over HTTP connection. This may
have been true in primary of the internet but some of the line has been blurred between
websites, web services, etc. As for example, a server which delivers XML document to another
device must be a web server. Better definition might be that server can be internet server that
responds to HTTP requests to deliver contents and services.
On the server, the title can be referred to the hardware or web server software on the
server. As an accurate, for example, when you have “10 web servers at the web field” and “the
IIS web server is on the machine which has 32 GB of RAM.”

Application Server Software


This is the type of server which is designed to be installed, operate and host applications
and associated services for end users, including IT services and organizations. For hosting and
delivery of high-end consumers or business applications which are used to facilitate by multiple
and simultaneously connected locally or remote users.
To provide intensive operations and services to the residing application which are working
as together and consisting of an OS which is standing as Server operating system.
This server includes
Data redundancy
High availability
Load balancing
User management
Data/application security
Centralized management interface

21
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

And key is required to these features. Furthermore, this server must be connected by enterprise
systems, networks or intranet and remotely accessed via the Internet.
Depending on the installed application, this server should be classified in a variety way,
including as a web server, database application server or enterprise application (EA) server.

Database Server
These servers are used to store and manage databases which are stored upon the serve
and to transfer data access who have authorize to. This should store the data in central location
that can be easily regularly backed up.
The database server allows clients access to Db2 for i functions. This server provides as
following:
-Support for remote SQL access
-Access data through ODBC, ADO, OLE
DB and .NET data providing interfaces.
-Database functions (such as creating
and deleting files and adding and
removing files members)
-Retrieval functions for obtaining
information about database files that
exist on the system (such as SQL
catalog functions.)
The client takes the user's request, checks the syntax, and generates database requests
in SQL or another database language. After that it transmits the message to the server, waits for
a response, and formats the response to the end-user. And then server accepts and processes
the database requests, and send the results back to the client. This process includes checking
authorization, maintaining the system catalog, and performing query and update process.

Server Operating System


Server Operating Systems are those which are designed to run on compatible servers. It’s
also like server software which can maintain and manage the servers. There are many Servers
OS, namely, Windows OS, Mac OS, Linux, Red Hat Enterprise Server and so on. It’s an advanced
version of an operating system which is having more features and capabilities requiring within a
client-server architecture.

Windows OS is a series of operating systems which is designed to share services with


multiple users and can provide extensive to control data storage, applications and corporate
networks. Features in later versions of Windows OS include Active directory, which automatically
manage the user data, security and resources. Windows OS is very family operating system in
everyday personal usage and professional use in servers. Pros of Windows OS support for third-

22
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

party application support and can choose many versions. The cons are that they need license and
can get more virus into windows OS when compared to other platforms.

Linux is the family of UNIX-like operating systems which have all features of UNIX. It is
available free for everyone, open-source, ease for multi-users and multi-process. Furthermore,
Linux servers will require more technical knowledge starting from installation to maintenance
and bug fixing.

Client Operating System


Not the same as Server OS, they are designed to use daily and not to deal with servers.
They are used in schools, office work and games. In our daily use, Windows, Android, Mac are
client OS.

This system helps computers to run and also connected to printing devices, screen
monitors and cameras. Also, it can accept only one user at a time and capable of getting services
from server operating system. Examples of client OS systems are: Windows and Mac. This client
system operates systems which let the network to centralize functions and applications in one or
more exclusive servers. This is the center of the system, allowing access in instituting security.

As a new cloud service of Windows Virtual Desktop, that can deliver a many users
Windows 10 experience which is multiplying to work with Office 365 Pro. It’s really efficient to
scale Windows 10 on Azure and comes with built-in security and compliance.

Hardware Requirements
The hardware requirements for Windows 10 System are as follows.

I would use Intel core i7 to get more performance. As for memory, 16 GB Ram will be
enough for me and also can make high performance for programmers and graphic designers. The
disk should be at least 1 TB to store a lot of data or you can add more hard disk how much do
you want. The display should be at least 800 x 600 and can get 1080 x 1920 which depends on
your computer specifications.

(M2)
Server Selection:

Advantages of web servers:


• High-level security

23
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

• Have better control and flexibility

• Can store in a safe framework

• Manage applications easy

• A web server does not allow sharing resources

Cost of web server


For a website, there are different types of servers to host. There are many different prices
and it depends on different features and options that we prefer.

As a shared web, the price is mostly cheap, starting from $2.5 to $14 per month but prices
can be higher depending on features and options.

For VPS Hosting, it usually costs around $20 to $90 per month which is based on different
categories.

As for Dedicated Hosting, it can cost more than above two hosting because it’s starting
from around $80 to $506 per month. But it’s for the websites which are more active. So, it is not
a huge cost for companies to say “Expensive”.

Performance of web server


Performance of a web server is based on the computer and network you are using. The
performance will drop if your specifications are not high enough and the network is not in stable
connection. Especially, it mostly depends on your specifications.

24
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

References
(Tr's lecture)

(https://solutionsreview.com/network-monitoring/network-topology-how-does-your-network-
layout-affect-performance/)

(https://beginnersbook.com/2019/03/types-of-computer-network-lan-man-and-wan/)

(https://slideplayer.com/slide/16383028/)

(https://www.ibm.com/docs/en/tsm/7.1.1?topic=planning-estimating-network-bandwidth)

(https://smallbusiness.chron.com/can-affect-bandwidth-68780.html)

(https://www.javatpoint.com/computer-network-client-and-server-model)

(https://www.manageengine.com/network-monitoring/network-protocols.html)

(https://www.cloudflare.com/learning/ssl/what-is-https/)

(https://www.geeksforgeeks.org/layers-of-osi-model/)

(https://www.geeksforgeeks.org/tcp-ip-model/)

(https://www.imperva.com/learn/application-security/osi-model/)

(https://www.nginx.com/resources/glossary/web-server/)

(https://www.indeed.com/career-advice/career-development/types-of-servers)

(https://blog.netwrix.com/2019/01/08/network-devices-explained/)

(https://www.networkstraining.com/different-types-of-servers/)

(https://www.digitalsamba.com/blog/client-software-vs-web-
browser#:~:text=Client%20software%20is%20a%20specific,to%20run%20on%20your%20comp
uter.)

(https://support.microsoft.com/en-us/windows/windows-10-system-requirements-6d4e9a79-
66bf-7950-467c-795cf0386715)

(https://www.hitechwhizz.com/2021/03/5-advantages-and-disadvantages-drawbacks-benefits-
of-web-server.html)

25
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung

(https://www.websitebuilderexpert.com/web-hosting/cost-to-host-a-
website/#:~:text=Shared%20Hosting%3A%20%242.49%20%E2%80%93%20%2413.95%20per,H
osting%3A%20%2480%20%E2%80%93%20%24506%20per%20month)

(https://www.netreo.com/blog/server-performance-guide/)

(https://www.techopedia.com/definition/23735/server-
software#:~:text=Server%20software%20is%20a%20type,end%20computing%20services%20an
d%20functions.)

(https://www.techopedia.com/definition/4928/web-server)

(https://www.techopedia.com/definition/432/application-server)

(https://www.techopedia.com/definition/441/database-server)

(https://www.sciencedirect.com/topics/computer-science/database-server)

(https://www.techopedia.com/definition/30145/server-operating-system-server-os)

(https://phoenixnap.com/kb/server-operating-system)

26

You might also like