Professional Documents
Culture Documents
Student ID – MG16573
1
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
Contents
Network Types ..........................................................................................................................................................3
LANs (Local area networks) .....................................................................................................................................3
WANs (Wide area networks).....................................................................................................................................3
Client-Server (Centralized) ........................................................................................................................................4
Cluster Network .........................................................................................................................................................5
Peer-to-Peer ...............................................................................................................................................................6
Mesh Topology ..........................................................................................................................................................7
Star Topology ............................................................................................................................................................8
Communication .........................................................................................................................................................9
Connection: Fiber Optic Cable ..................................................................................................................................9
Bandwidth................................................................................................................................................................ 10
OSI model vs TCP/IP model ................................................................................................................................... 10
TCP/IP Model .......................................................................................................................................................... 14
HTTP and HTTPS ................................................................................................................................................... 16
Switch ...................................................................................................................................................................... 17
Router ...................................................................................................................................................................... 17
Access Point ............................................................................................................................................................ 17
Web Server .............................................................................................................................................................. 18
eMail Server ............................................................................................................................................................ 19
FTP Server ............................................................................................................................................................... 19
Database Server ....................................................................................................................................................... 19
Interdependence of workstation hardware ............................................................................................................... 20
Networking Software ............................................................................................................................................... 20
Server Software ....................................................................................................................................................... 20
Web Server Software ............................................................................................................................................... 21
Application Server Software.................................................................................................................................... 21
Database Server ....................................................................................................................................................... 22
Server Operating System ......................................................................................................................................... 22
Client Operating System .......................................................................................................................................... 23
Hardware Requirements .......................................................................................................................................... 23
Advantages of web servers: ..................................................................................................................................... 23
Cost of web server ................................................................................................................................................... 24
Performance of web server ...................................................................................................................................... 24
References ............................................................................................................................................................... 25
2
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
Introduction Report:
Hello, I am Swam Pyae Maung Maung who is working as a Network Engineer in “Info Tech”
company that is also called one stop IT service company. In the report, I would like to explain
what networks we used, how they work and types of networks benefits. We explain so many
network types and which network are the most usage around the world. Our project goal is to
ensure the integrity of high availability networks infrastructure to provides maximum
performance for the user’s requirement. We will also explain how to install configure and various
network devices and services which are reliable to use easily.
(P1)
Role of networks:
Network Types
They are classified relative to their geographic coverage and size. Their two most common
classifications are LANs (Local area networks) and WANs (Wide area networks).
Typically, a high speed and less cost than WAN because of its nature.
3
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
System types:
Client-Server (Centralized)
Client-Server includes many devices connected to the main server. Main server controls
everything, including hosting data and other forms of resources. Clients have mobiles, tablets,
one or more PCs or other devices which run applications and are connected to the main server
through Ethernet cable or Wireless connection.
This network is designed for end-users, which are also called clients. Clients can access
files inside the server. Server can be also called “A Central Computer” because it’s also mentioned
as “Centralization”. The aim of a server is to serve its clients. For instance, when you play games
on “EPIC Store” or something like that, you have to Log-In to its network first. It links your PC to
its EPIC’s server networks and downloads games and updates everything we want.
The network is a way to connect the server from clients. It is used to send and receive
data and commands from server and clients. When the commands are accepted by the server,
then it proceeds the request if it’s a valid command. At that time, the server will resume its
process depending on the Internet connection.
• Lots of disruption can occur when any part of the network fails.
4
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
Cluster Network
It’s a set of servers and other devices which work as a single device to increase the
availability of services and applications. The clustered servers are also known as “Nodes”. They
are only designed for high performance workloads.
Cluster is a logical unit file of storage on a hard drive, controlled by the computer's
operating system. The files can take up to one or more clusters of storages. It can also be a set of
workstations or terminals attached to a regular control unit.
These networks are built on the top of the instance features, which is why most
operations are directly controlled by the network. Not all regions around the world can support
Cluster networks. If you want to get access to a cluster-network, you may have to create an
availability domain of capable hardware.
• As the cluster network contains many servers, the performances and availability
are high.
5
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
Peer-to-Peer
In this network, each personal PCs and device share bandwidth equally. Mostly, home
networks are peer-to-peer. It doesn’t need a primary server and is not able to handle heavy loads
like “Client-Server”.
It can also be a permanent network which connects a large group of PCs in an office with
Ethernet wires. In this type of network, Peer-to-Peer, all permissions can be set to allow access
to all files.
• Advantages of Peer-to-Peer
• Low cost.
• Simple to configure.
• Disadvantages of Peer-to-Peer
• Slow performance.
• The whole system can be invaded by viruses because they are all connected
together.
• No backup server.
6
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
(P2)
Topologies:
Mesh Topology
A mesh topology where each computer and network device are associated with one
another. If one of the connections breaks down, this topology allows it to be spread for
transmissions.
Benefits of impact - Mesh topology is a dynamic network routing, which means traffic can
travel across from multiple paths. If one network node breaks down, data can take another route
to reach its destination; this eliminates disabled devices and affects network performance.
There’re also two types of mesh topology named: full mesh and partially-connected
mesh. In full mesh, every computer in this network has a connection to each one of the other
computers in that network.
• Advantages
7
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
• Disadvantages
• Complex structure.
Star Topology
In star topology, a central connection, that seems like a switch, is placed instead of
backbone, like in bus topology. All devices (nodes) are individually connected to the central
connection point also like in bus topology.
As each connecting device is isolated from other connecting nodes, it limits the impact of
a single point of failure which means if one connecting node goes down, it will not impact the
performance of other connecting devices in the network.
Another impact is the performance of the network can suffer when too many devices
compete for access to the central node. Devices are directly connected to the central node so
the network can manage from the central point.
• Advantages
• Highly efficient.
• User-friendly.
• Safe to use.
8
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
• Disadvantages
• High cost.
• High maintenance.
• If the central node breaks down, the whole network will break down.
Communication
Telecommunication is speedily changing from copper wire to fiber optics. Fiber Optic
cable guides lights for long distances which is made with a very thin strand of glass wire. It may
be made up of two layers of glass containing “The Core and The Cladding”. The core carries the
actual light signal. The cladding, that is creating a full total internal reflection within the core
which has a lower refractive index than the core. The cables usually send and receive light in dual
pairs, one to transmit and one to receive, sometimes, it’s also possible that both can receive and
transmit over a single strand.
Optical fiber cables have partially unlimited information, which means they have data
carrying with high capacity.
9
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
Bandwidth
The amount of data that might be transferred over connection per second can be
mentioned as Internet bandwidth. Bandwidth is measured in “Bits per second”.
The most speed used in the office is 150 mbps because it is enough to do a large variety
of online business and tasks every day. That internet speed delivers download speed at 17.9
mbps, which can support 255 mbps operating system.
Bandwidth can be calculated in following formula; (TD * (100 / DR) * 8192) / (RWT * 3600)
= Required Network Bandwidth (Mbps/second).
(M1)
Networking Standards:
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1.Physical Layer
This is the first layer of OSI Model, which is responsible for the connection for the physical
cable or wireless between network nodes. In the form of bits, this layer contains information.
From one node of individual bits to the next, it is responsible to transmit. When receiving data,
it will get the signal and transmit it into 0s and 1s and deliver to the Data Link layer, which will
put the frame back together.
10
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
Functions
1. Bit synchronizations - provides the bits by clock and clock controls both sender and
receiver at bit level.
2. Bit rate control - also represent the program rate i.e., the number of bits sent per second.
3. Physical topologies - indicate the way different devices(nodes) are organized in a network
i.e., bus, star or mesh topology.
4. Transmission mode - also specify the way how data flows between the two connected
devices. Different transmission modes are possibly Simplex, half-duplex and full-duplex.
Logical Link Control is known as identifies network protocols, which performs to check
error and synchronizes frames.
As for Media Access Control, devices, which use MAC addresses to connect and define
permissions to send and receive data.
Functions:
1. Framing - is one of the functions of the data link layer and provides a way which is
meaningful for a sender to transmit a set of bits and to the receiver. To the beginning and
end of the frame, it is accomplished by attaching special bit forms.
2. Physical addressing - after creating frames, this layer adds physical addresses which
means (MAC address) of sender or receiver of each frame in the header.
3. Error control - it describes the error of the mechanism when it detects and retransmits
damaged or lost frames.
4. Flow control - the data rate must be endlessly running on both sides or else the data may
get corrupted.
5. Access control - when multiple devices share with a single communication, the MAC
sublayer of this layer helps to determine which devices has control over the channel at a
given time.
11
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
3.Network Layer
For the transmission of data, this layer works data from one host to another location in
different networks and also takes care of packet routing, from the number of routes which are
available in the selection of the shortest path to transmit the packet. This layer has two main
functions.
Functions:
1. Routing - layer protocols take a decision of which route is relevant from source to terminal
which means breaking up segments into packets and reassembling the packets on the
receiving end.
2. Logical Addressing - to identify each device on internetwork uniquely that the network
layer provides an addressing scheme and routing packets by discovering the best path to
cross a physical network.
4.Transport Layer
In the end of the transmission, data transferred is taken into the session layer and breaks
it into segments. It’s responsible for the End-to-End delivery of the complete message. This layer
also provides a successful data transmission and when error is found, the data are re-
transmitting.
Functions:
12
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
1. Segmentation and Reassembly - accept the message from the layer and break it into
smaller units. At the destination station, the layer restores the message.
2. Service Point Addressing - messages are delivered to the correct process and include a
type of address called service point address or port address.
5.Session Layer
This is the 5th layer of OSI model and is responsible for setting up of connection, sessions
maintenance, authentication and also ensures security.
Functions:
6.Presentation Layer
For application layer, this 6th layer prepares data, it’s also known as “Translation Layer”.
This layer shows how two devices should encode, encrypt and summarize data and so on the
other end, it is correctly received. The data is extracted and manipulated as the format to relay
over the network.
7.Application Layer
This layer is the 7th layer and also top of the OSI Model, which is used by end-user software
such as web browsers and email clients. The allowance of software is to send receive information
and instant meaningful data to users. Few examples of application layer protocols are HTTP, FTP,
POP, SMTP and DNS. One of those protocols will be shown under.
Functions:
13
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
TCP/IP Model
TCP/IP means “Transmission Control Protocol/ Internet Protocol”. This model is a kind of short
or small version of the OSI model. It is based on standard protocols and was developed in 1960
by “Department of Defense (DOD). This model contains 4 layers.
This is same as 1st layer and also performs the functions of top of three layers: Application,
Presentation and Session layer in OSI model. To communicate and control user-interface, it is
responsible for node-to-note.
14
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
Similar to the transport layer of the OSI model. This layer is important for end-to-end
communication and error-free delivery of data. Two main protocols including in this layer are:
TCP and UDP.
3: Internet Layer
This is the parallel function pf OSI’s Layer. It is the protocol which is the logical
transmission of data over the entire network. The protocols residing in this layer are
1.IP – known as Internet Protocol which responsible to deliver packets from the main
host to station host at looking at IP addresses in the packet headers. There’s two
version calling IPv4 and IPv6. IPv4 is one of the most IP using currently for websites.
IPv6 is growing as IPv4 addresses when the numbers of users more and are limited in
number.
3.ARP – stands as Address Resolution Protocol. Its task is to search hardware address
of a host from known IP address. There are several types of ARP: Reverse ARP, Proxy
ARP, Gratuitous ARP and Inverse ARP.
This layer is similar to the combination of two layers naming: Data Link Layer and Physical
Layer of OSI model. It reviews for hardware addressing and for the physical transmission of data
which allow the present protocol in this layer.
OSI TCP/IP
15
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
OSI has strict boundaries TCP/IP does not have very strict
boundaries.
OSI uses different session and TCP/IP uses both session and presentation
presentation layers. layer in the application layer itself.
OSI developed model then protocol. TCP/IP developed protocols then model.
In OSI model, transport layer provides Transport layer in TCP/IP does not provide
assurance delivery of packets. assurance delivery of packets.
Connection less and connection oriented TCP/IP model network layer only provides
both services are provided by network connection less services.
layer in OSI model.
While in OSI model, Protocols are better Protocols cannot be replaced easily less
covered and is easy to replace with the services.
change in technology.
Protocols:
16
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
HTTPS is an extension of HTTP, which is more secure and known as “Hypertext Transfer
Protocol Secure”. HTTPS is also encrypted in order to increase security of data transfer.
(P3)
Networking Devices:
For communication links between computers and for data communications between
devices in such high network structure, devices, hardware and physical devices, (like gateways,
switches and routers) will be necessary.
Data examining, finding the best route for transmission and to commute the different
network among the infrastructure. This structure includes many star topologies and moreover.
So, we will need switches to boost the data transportation and let multi devices to communicate
and routers, gateways will connect many networks.
Switch
It’s a device mixed with a hub and bridge. A switch contains multiport to let multiple
computers connect directly with each other. To connect multi devices and the data transmission
between devices, they will act like multiport bridges. It has also had the understanding to
examinee the data before sending which is checking the data in case there has an error and then
make the transition to get more efficient and then send it to the right destination. This network
transfers data without slowing down and also lets several users send and receive data. A switch
is more intelligent than a hub so it can easily understand and learn new mac addresses. Switches
are used in this network after improving the network security.
Router
It’s a network communication device where it is used to connect two or more networks.
To send and receive data to a specific network, a router device is used and also often used as a
layer to connect to the internet. Like LANs and Wans, both static and dynamic routings based on
the decisions of the data packages, routers are devices that connect the various network.
Access Point
An Access Point works at the second OSI layer, the Data Link layer which operates either
as a bridge connecting a standard wired network to wireless devices or as a router passing data
transmissions from one access point to another.
17
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
Wireless access points (WAPs) consist of a transmitter and receiver (transceiver) device
used to create a wireless LAN (WLAN) and use the wireless infrastructure network mode to
provide a connection point between WLANs and a wired Ethernet LAN.
Access points are separate network devices with a built-in antenna, transmitter, and
adapter. They have several ports to expand the network to support additional clients. Depending
on the size of the network, the requirement of AP to provide full coverage varies.
Additional APs allow access to more wireless clients and expand the range of the wireless
network. AP is limited by its transmission distance. It depends on the wireless standard, the
obstructions and environmental conditions between the client and the AP. The Higher end APs,
the more the wireless signal can travel. PS provides ports to increase the network’s size such as,
a switch, DHCP server, router and firewall.
In order to connect a wireless AP, a service set identifier (SSID) name is needed. It is used
to identify all systems belonging to the same network, and client stations must be configured
with the SSID to be authenticated to the AP. Then, it will broadcast the SSID to allow all wireless
clients in the area to see the AP’s SSID. Wireless devices ship with default SSIDs, security settings,
channels, passwords and usernames.
For security reasons, APs can be configured not to broadcast the SSID, which means that
an administrator needs to give client systems the SSID instead of allowing it to be discovered
automatically and for the wireless devices, it is strongly recommended to change these default
settings as soon as possible as many internet sites list the default settings used by manufacturers.
Access points are either thin or fat, controller-based or stand-alone. Fat Aps refer to as
autonomous Aps which need to be manually configured with network and security settings so
they are essentially left alone to serve clients until they can no longer function. Thin APs allow
remote configuration using a controller and do not need to be manually configured, they can be
easily reconfigured and monitored.
Server Types:
Web Server
A web server can indicate hardware or software, or two of them working together.
18
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
As a hardware, a web server is a website’s component files like CSS files, HTML,
Documents, images and server that store computing web server software.
For software, it contains many parts that control files which only a user can access. Web
servers and browsers use primary protocol with HTTP server. In society, most web servers
support server-side languages encoding business logic to deliver dynamic content.
eMail Server
An email server runs on “SMTP” or “Simple Mail Transfer Protocol” as the dominant
protocol. It powers mail services and simply takes in emails from one client to another and
forwards the data to the other server.
Data is simplified when sent through SMTP, so some information can be lost in email
transactions. The modern approach to email servers is paired with web servers to allow for users
to have a “web client” that shows the data on a web page. Some newer web applications without
installing anything can even mimic a home computer email client.
FTP Server
FTP (File Transfer Protocol) servers’ purpose is to host a file exchange among users. These
servers do not provide any type of encryption by default, so sFTP which is FTP over secure SSH
protocol are often used in its place.
This type of server allows users to upload, browse or download files individually after
authenticating through an FTP client.
A file server is a main server that stores and manages files in a computer network. It can
also share files over a network without needing a USB or hard drive. As a remote hard drive, it
can also be a NAS (network-attached storage). On the internet, some programs often use the
FTP (file transfer protocol).
Database Server
A database server operates to store data in groups. There are many types of methods to
keep data that operate on different theories. One of the common types is “SQL” or “Structured
Query Language”.
Programmers can create databases on these servers by scripting in the language of the
database. To grab data as users request, web applications usually have their server-side
components connected to a Database server.
19
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
It is important to have web servers and database servers on different machines for
security so that if a hacker accesses the main web server it will be easier to retrieve or modify
the data stored in the database server.
(P4)
Networking Software
A workstation is a computer which is specially designed for scientific or technical use and
importantly to be used by only one person at a time. Also connected with a local area network
and multi-user operating system to a working area.
It’s a collection of instructions which access the user to interact with the computer,
especially hardware. With most of the computers, without software, you can’t do any interaction.
If you want to do some network configurations and adjustments over your network, you
might need software, operating system or OS. It helps administrative deploy, manage and
monitor over a network.
Server Software
Server software is a type of software that is designed to be used and control a computing
server. By giving better control to the server, it helps maintain the server in good state and
configure the network of the server. To link with a server’s hardware infrastructure, (including
the processor, storage, memory, I/O (input/output) and the many other communication ports.
Depending on the usage of the server software, it may be divided into various forms. They
are the following as below:
20
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
21
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
And key is required to these features. Furthermore, this server must be connected by enterprise
systems, networks or intranet and remotely accessed via the Internet.
Depending on the installed application, this server should be classified in a variety way,
including as a web server, database application server or enterprise application (EA) server.
Database Server
These servers are used to store and manage databases which are stored upon the serve
and to transfer data access who have authorize to. This should store the data in central location
that can be easily regularly backed up.
The database server allows clients access to Db2 for i functions. This server provides as
following:
-Support for remote SQL access
-Access data through ODBC, ADO, OLE
DB and .NET data providing interfaces.
-Database functions (such as creating
and deleting files and adding and
removing files members)
-Retrieval functions for obtaining
information about database files that
exist on the system (such as SQL
catalog functions.)
The client takes the user's request, checks the syntax, and generates database requests
in SQL or another database language. After that it transmits the message to the server, waits for
a response, and formats the response to the end-user. And then server accepts and processes
the database requests, and send the results back to the client. This process includes checking
authorization, maintaining the system catalog, and performing query and update process.
22
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
party application support and can choose many versions. The cons are that they need license and
can get more virus into windows OS when compared to other platforms.
Linux is the family of UNIX-like operating systems which have all features of UNIX. It is
available free for everyone, open-source, ease for multi-users and multi-process. Furthermore,
Linux servers will require more technical knowledge starting from installation to maintenance
and bug fixing.
This system helps computers to run and also connected to printing devices, screen
monitors and cameras. Also, it can accept only one user at a time and capable of getting services
from server operating system. Examples of client OS systems are: Windows and Mac. This client
system operates systems which let the network to centralize functions and applications in one or
more exclusive servers. This is the center of the system, allowing access in instituting security.
As a new cloud service of Windows Virtual Desktop, that can deliver a many users
Windows 10 experience which is multiplying to work with Office 365 Pro. It’s really efficient to
scale Windows 10 on Azure and comes with built-in security and compliance.
Hardware Requirements
The hardware requirements for Windows 10 System are as follows.
I would use Intel core i7 to get more performance. As for memory, 16 GB Ram will be
enough for me and also can make high performance for programmers and graphic designers. The
disk should be at least 1 TB to store a lot of data or you can add more hard disk how much do
you want. The display should be at least 800 x 600 and can get 1080 x 1920 which depends on
your computer specifications.
(M2)
Server Selection:
23
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
As a shared web, the price is mostly cheap, starting from $2.5 to $14 per month but prices
can be higher depending on features and options.
For VPS Hosting, it usually costs around $20 to $90 per month which is based on different
categories.
As for Dedicated Hosting, it can cost more than above two hosting because it’s starting
from around $80 to $506 per month. But it’s for the websites which are more active. So, it is not
a huge cost for companies to say “Expensive”.
24
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
References
(Tr's lecture)
(https://solutionsreview.com/network-monitoring/network-topology-how-does-your-network-
layout-affect-performance/)
(https://beginnersbook.com/2019/03/types-of-computer-network-lan-man-and-wan/)
(https://slideplayer.com/slide/16383028/)
(https://www.ibm.com/docs/en/tsm/7.1.1?topic=planning-estimating-network-bandwidth)
(https://smallbusiness.chron.com/can-affect-bandwidth-68780.html)
(https://www.javatpoint.com/computer-network-client-and-server-model)
(https://www.manageengine.com/network-monitoring/network-protocols.html)
(https://www.cloudflare.com/learning/ssl/what-is-https/)
(https://www.geeksforgeeks.org/layers-of-osi-model/)
(https://www.geeksforgeeks.org/tcp-ip-model/)
(https://www.imperva.com/learn/application-security/osi-model/)
(https://www.nginx.com/resources/glossary/web-server/)
(https://www.indeed.com/career-advice/career-development/types-of-servers)
(https://blog.netwrix.com/2019/01/08/network-devices-explained/)
(https://www.networkstraining.com/different-types-of-servers/)
(https://www.digitalsamba.com/blog/client-software-vs-web-
browser#:~:text=Client%20software%20is%20a%20specific,to%20run%20on%20your%20comp
uter.)
(https://support.microsoft.com/en-us/windows/windows-10-system-requirements-6d4e9a79-
66bf-7950-467c-795cf0386715)
(https://www.hitechwhizz.com/2021/03/5-advantages-and-disadvantages-drawbacks-benefits-
of-web-server.html)
25
HND-42 GUSTO UNIVERSITY Swam Pyae Maung Maung
(https://www.websitebuilderexpert.com/web-hosting/cost-to-host-a-
website/#:~:text=Shared%20Hosting%3A%20%242.49%20%E2%80%93%20%2413.95%20per,H
osting%3A%20%2480%20%E2%80%93%20%24506%20per%20month)
(https://www.netreo.com/blog/server-performance-guide/)
(https://www.techopedia.com/definition/23735/server-
software#:~:text=Server%20software%20is%20a%20type,end%20computing%20services%20an
d%20functions.)
(https://www.techopedia.com/definition/4928/web-server)
(https://www.techopedia.com/definition/432/application-server)
(https://www.techopedia.com/definition/441/database-server)
(https://www.sciencedirect.com/topics/computer-science/database-server)
(https://www.techopedia.com/definition/30145/server-operating-system-server-os)
(https://phoenixnap.com/kb/server-operating-system)
26