Networking
Networking
Internal verification:
CONTENTS
INTRODUCTION
ACTIVITY 1
I. Overview of your report
II. Explanation of
1. Network Principles
2. Networking Protocols
3. Networking Devices
4. Network Structure
5. Network Services
6. Network software, network hardware, and the relationship between them.
7. Network Topology
8. 802.3, 802.11 Standards
9. Bandwidth
ACTIVITY 2
1. Prepare a written plan of how you will design the Local Area Network including your
LAN blueprint.
2. Demonstrate the security and quality of service requirements required for the accessory
selection
3. Design a networked system to meet a certain specification
4. Provide an IP address allocation table for the network. (Separate IP reasonably)
5. Install and configure the network services and applications of your choice (Web, DNS,
mail, ...)
6. Conduct design testing and evaluation to meet requirements and analyze user feedback.
7. Recommend maintenance schedule to support networked system.
ACTIVITY 3
1. Implement a networked system based on your prepared design.
2. Conduct verification with example Ping, extended ping, traceroute, telnet, SSH, etc.
3. Record test results and analyze these against expected results.
4. Investigate what functions will allow the system to support device growth and the addition
of communication devices.
INTRODUCTION
- The internet has taken on a significant role in society today, becoming all-pervasive and
practically necessary. It makes it easier for people to interact with one another, work, play,
learn, receive and send mail, search for information quickly and easily, and engage in
economic activity. People will benefit much from the advancement of the internet and many
technical tools when working and managing information, but it is also simple to stop the
transmission process. and receive information, a lack of privacy protection due to the
carelessness with which the information system between devices is operated. Therefore,
effective administration of the information system is essential for ensuring smooth operation
and the ability to adapt to changing security needs. a crucial and increasingly vital role. It is
vital to have an extremely ideal network system design to fulfill a range of requirements for
individuals, departments, and systems inside the organization while preserving costs and
efficiency, and having a high working capacity. And in this project, the basic principles of
creating network systems are addressed, including computer networks, network protocols,
network devices, network designs, and network services. To offer consistency and security
while managing and operating information within the organization, apply to a network design
issue for the BKACAD company from there.
ACTIVITY 01
I. Overview of your report
- BKACAD is a company specializing in providing information technology services. In the
process of development, the company is growing stronger and has a new branch.
- The head office is in building A and the servers are located in the same building and most
of the administration, sales, human resources, and management functions are supported in
building A. The branch is located in building B and has a limited number of employees. Both
buildings are located in the same facility.
- The company's branch network has grown without proper planning. The LAN cabling in
both offices is Cat5e Ethernet. The office complex provides an Ethernet link between the two
buildings.
- The current network is a flat network design with minimal redundancy. A small wireless
LAN is occasionally used by several project managers with laptops and guests at Building B.
a) Building A - general office and managers, including administration, human resources, and
sales departments. It includes 30 PCs, 2 Servers, and 02 printers. (Admin: 5 PCs, HR: 5 PCs,
SALE: 20 PCs)
b) Building B: including 10 PCs, and 2 printers.
- As a member of a consulting company and deploying network systems for businesses, you
are appointed as a design consultant for BKACAD company, write a detailed guide that
outlines the principles, models, and network equipment for network training purposes and
outlines the sections of the manual that are relevant to BKACAD.
II. Explanation of
1. Network Principles
- Principles of Effective Networking:
+ Win/Win Situations Produce Strong Connections. Having a strong network is extremely
valuable because of the long-term impact it can have on your business. ...
+ Give More Than You Get. ...
+ Activity Beats Inactivity. ...
+ Quality Over Quantity. ...
+ People Do Business With People They Like.
2. Networking Protocols
- A Network Protocol is a group of rules accompanied by the network. Network protocols
will be formalized requirements and plans composed of rules, procedures, and types that
describe communication among a couple of devices over the network. The protocol can be
described as an approach to practices that enable a couple of entities of a communication
program to transfer information through various physical mediums. The protocol identifies
the rules, syntax, semantics, and synchronization of communication and feasible error-
managing methods. In this article, we will discuss the different types of networking protocols.
2.1 HTTP or HTTPS
- This stands for Hypertext Transfer Protocol or Hypertext Transfer Protocol (secure). The
secure version is encrypted, meaning that we will encrypt all the data as we send it from the
client to the server.
- Now client and server here become very important with application layer protocol. Nearly
all application-layer protocols use this model, using one device on the client’s network and
the other on the server.
- Now when we are using HTTP or HTTPS or transferring a file. Transferring a file in the
format of the hypertext. Hypertext is readable by a web browser. The client software you are
likely very familiar with. This is either Google Chrome or Firefox, which may be Microsoft
Edge or Ale’s Safari browser. Thall web cliehat support the use of HTTP or HTTPS.
- The server side also runs some software. It is a running server software. For the website, we
usually use Apache, an open-source software web server that can run on either Linux or
Windows. We have Nginx, which is used in large website deployments and can run on
UNIX. We have Microsoft’s Internet Information Services or IIS, which can be run on
Microsoft systems. There are several web server options that a server administrator can install
to host a website on the internet. So the whole purpose of the client-server here is to have
client software like a web browser and the web server like Apache work in conjunction with
each other and transfer these hypertext documents to get the website from the server to the
client.
- The Port number uniquely identifies the layer-7 protocol being used at layer 4. We can use
these port numbers to identify traffic at layer 4 quickly, The HTTP by default, we have port
80, and for HTTPS by default, we have port 443 as the transport layer protocols.
2.2 FTP (File Transfer Protocol)
- The FTP allows us to transfer files from a client to a server or from a server to a client.
- We can do it in both directions here, and this protocol is either going to be FTP, sFTP, or
TFTP.
- FTP is a File Transfer Protocol, SFTP is a Secure File Transfer Protocol, and TFTP is a
Trivial File Transfer Protocol.
- FTP and SFTP are pretty similar to one another. These protocols will transfer files from one
device to the other, and client and server software is specifically designed to do this.
- TFTP works a little bit differently. It’s meant for sending tiny files between two devices or
having simple setups where you can transfer a file quickly without worrying about
authentication or firewall issues causing your traffic to be knocked down.
- FTP and SFTP typically require a username and password to transfer these files. TFTP does
not require this. SFTP, specifically here, is going to encrypt the traffic.
- FTP will use ports 20 and 21; one is used for authentication, and the other for transferring
information. Port 22 is used for SFTP, and the reason for that port 22 is the port number for
another protocol we are going to look at called Secure Shell or SSH, and what happens here
is we take the FTP protocol. We put it inside an SSH session, which allows us to encrypt
traffic, which is why the port numbers are the same for both SFTP and SSH. TFTP uses port
number 69.
- Email is specifically designed for transferring files. We are transferring files in the format of
these email documents. A client operates two to retrieve mail from a server. POP and IMAP
are explicitly used to take email messages that live on a server, Gmail, or your company’s
email server, and they use it to transfer those emails over to your client.
- SMTP, however, is a Simple Mail Transfer Protocol. This protocol takes a message you
create on a client email application and sends that email to an SMTP server. SMTP is used to
forward the email to the server; the server then figures out how to get messages to the
recipient you intended.
- POP stands for Post Office Protocol; we are using version 3 there.
- IMAP is the Internet Message Access Protocol, and then like SMTP, is the Simple Mail
Transfer Protocol. All these protocols work either in unencrypted or encrypted modes.
- So here, with POP3, for unencrypted traffic, we will use port 110; for encrypted traffic, we
will use port 995. IMAP, we will use port 143 for the unencrypted traffic, port 993 for
encrypted traffic, and SMTP, port 25 for unencrypted and 465 for encrypted traffic.
3. Networking Devices
3.1. Router
a. Concept
- Router (router or router) is a network device used to deliver data packets to end devices. It
is a device to share the Internet with many other devices in the same network layer.
b. Functions
- To create segments: Segment the internet into an intranet, transmitting all packets from the
intranet to the Internet. helps specific external web traffic to the internet as a safety concern
and avoids data damage caused by a data packet being routed to the wrong network.
- To assign IP addresses: Dynamic Host Configuration Protocol (DHCP) allows the transfer
of IP addresses to each computer associated with the network. Most routers that are enabled
with the DHCP protocol over the internet are used for small types of home and office
networks.
- As a Firewall: Helps protect from intruders and malicious users over internal networks.
Allows blocking of unauthorized or unwanted traffic. A firewall is a software that is installed
on each computer over a network, but routers are identified over the internet along with the
firewall software and software.
- Resource Sharing: The router also helps multiple users to share resources such as faxes,
scanners, printers, and file folders on drives located remotely, so it saves extra money and
space for setting the printer. All files and folders stored on the user's hard drive can be shared
across the entire network without printing or copying.
c. Working principle
- A router selects routes and forwards packets. Upon receiving a packet, a router selects a
proper path, which may have one or multiple hops, to send the packet to the next router
according to the destination address in the packet. The last router is responsible for sending
the packet to the destination host.
3.2. Switch
a. Concept
- Switch is an important switching device in the network, used to connect network segments
in a star model.
b. Function
- Looping Avoidance: Where switches can be used to prevent looping when receiving data
for unknown purposes. Then the data received will be forwarded to the destination IP
Address through blocking on one of the ports connected to other devices.
- Forward Data Frames: Switches are also used to filter and forward data frames to the
address being addressed. In addition to sending data to the destination address, the
forwarding of data frames will also continue to a specific MAC address and port. This can
reduce the occurrence of collision events during the data transmission process.
- Address Learning: Address learning on the switch functions to record MAC addresses
between network devices that are currently connected. When the switch is in the process of
receiving data, the switch also records the MAC address of the sender and learns where the
data will be sent.
c. Working principles
- Where the ability of the switch is better and more efficient when exchanging data,
processing, and sending data than the HUB. In its application, the switch will receive data
sent by other devices that are already connected. Then the switch will detect and match the
MAC address of the destination device with the table data it has.
- The next stage, the switch will make a logical connection using the port that is already
connected to the destination device. Thus the data to be sent can only be received by the
destination port. As for the other ports can not receive the data. The way this switch works
can reduce the potential for data collisions.
d. Types of switches
- Unmanaged Switch
- Managed Switch
- Smart Switch
- Enterprise-Managed Switch
f. Applications
- Connect multiple hosts: Normally, a switch provides a large number of ports for cable
connections, allowing for star topology routing. It is usually used to connect multiple PCs to
the network.
- Forwards a message to a specific host: Like a bridge, a switch uses the same forwarding or
filtering logic on each port.
- Manage traffic: A switch in networking can manage traffic either coming into or exiting the
network and can connect devices like computers and access points with ease.
- Keep electrical signal undistorted: When a switch forwards a frame, it regenerates an
undistorted square electrical signal.
- Increase LAN bandwidth: A switch divides a LAN into multiple collision domains with
independent broadband, thus greatly increasing the bandwidth of the LAN.
3.3. Firewall
a. Concept
- Firewalls are one of the most effective security tools available for protecting users from
external threats.
b. Function
- Controlling and Monitoring Data Packet Flow: The firewall function on the first
computer network is useful in controlling and monitoring the flow of data packets flowing on
the network. The firewall function also includes modification of incoming data packets and
can hide an IP address.
- Become a Network Security Post: Furthermore, the firewall function on a computer network
can control data traffic when accessing a protected private network. All traffic either coming
out or entering the network must pass through the firewall to be checked, either by filtering,
limiting, or even rejecting.
- Log User Activity: When a computer user accesses data, the firewall will record it as
documentation (log files). The existence of these data records will be used to develop a
computer security system. Then, the function of the firewall is to authenticate access to the
network.
- Prevent Information Leakage: Firewalls are also able to prevent the leakage of valuable
information. Simply put, a firewall that will prevent users from sending valuable files that are
confidential or secret to other parties without realizing it.
c. Working principle
- When your computer has firewall protection everything entering and leaving the computer
will be monitored. The firewall monitors all information traffic to allow ‘good data’ to enter,
and blocks ‘bad data’ from entering the computer.
- Firewalls use one or more of the three methods below to control traffic flowing into and out
of the network:
+ Packet filtering
+ Proxy service
+ State inspection
d. Types of firewalls
- Personal Firewall
- Network Firewall
f. Application
- A firewall sits between a computer (or local area network) and another network (such as the
Internet), controlling incoming and outgoing network traffic.
- Having a firewall to help limit the situation that computers are directly connected to the
Internet has caused many Windows XP computers to become infected with viruses within
minutes of being directly connected to the Internet.
- Instead of accepting all incoming connections, a firewalled system discards all incoming
connections unless it is specifically configured to allow these incoming connections.
- Control access to network services from other computers on the local network
3.4. Gateway
a. Concept
- Gateway is a network node used in telecommunications to connect two networks with
different communication protocols that can communicate with each other.
The gateway handles the network's input and output because all data must pass through or
communicate with the gateway before it can be routed.
b. Function
- The gateway functions allow data exchange between all available communication
technologies. This is accomplished by using “connections” which connect data points of
different technologies
- The gateway converts information, data, or other communications from one protocol or
format to another. A router may perform some of the functions of a gateway. An Internet
gateway can transfer communications between an enterprise network and the Internet.
c. Working principle
- It can be linked to the router since a router accurately knows about the routing path of data
packets that appears at the gateway then a switch decides the suitable in and out path of the
gateway for the designated packet. The gateway is a mandatory attribute of routes even
though the other devices can act well as a gateway. But the operating system used here with
internet sharing behaves like a gateway and establishes the connection with internal
networks.
d. Types of gateways
- There are two main types of gateways: unidirectional gateways and bidirectional gateways.
f. Application
- Gateways are mainly used in personal or business situations that want to simplify internet
connectivity for a single device. In the enterprise, a gateway can also act as a proxy server
and firewall.
3.5. Server
a. Concept
- A server is a system (appropriate computer hardware and software) that responds to a
request on a computer network to provide, or support, the delivery of a network service.
b. Function
- Providing Requests to Client System
- Keeping Store Data
- Provides a database to store and process data.
- The server is also capable to keep managing the communication and transfer of data or
information to the client.
- The final function of the server is to provide security for your computer system or website
from cyber-attack.
c. Working principle
- The client computer will request data or services on the server. Then after the request is
received, the server will process it and the results are sent back to the client’s computer.
d. Types of servers
- Web Server
- Mail Server
- DNS Server
- Application Server
- Database Server
- FTP Server
- DHCP Server
- File Server
- Proxy Server
- Streaming Server
- Game Server
f. Application
- There are many types of server developed today, so it is used in many different situations.
The main job of a server is actually "serving" the users (clients) who are connecting to the
system.
- Mail server: helps businesses communicate via e-mail quickly, securely, and more easily if
businesses know how to manage the server.
- Web server: Web server will help businesses build and operate websites for Internet users
around the world, making it easy to manage, extremely easy to access internal information,
and manage directly. connection line.
- Active Directory server: Their data will be stored in a central server, and the server manager
will easily grant permission to view, share, etc. the data of each user.
g. Server selection
- Should choose a CPU with multiple cores for the server:
+ One of the most important factors when it comes to the server configuration is the CPU
core. The more CPU cores, the better for the user. Because it helps the data processing
process take place many times faster.
+ A CPU with few cores but with a high clock speed will not be as good as a CPU with many
cores with a lower clock speed (according to the latest research from NASA). So always
prioritize CPU with multiple cores
- Invest maximum RAM for server configuration:
+ Configure the server with high RAM to help process a lot of data at the same time,
avoiding the "sluggish" computer situation. Meanwhile, the RAM slot on the machine is
limited, so install good RAM from the beginning.
+ If you only choose 2GB RAM sticks, you will surely have to pay more for it later on
because the performance is not as expected. So choose 4GB or 8GB RAM sticks at first use.
- How to choose HDD/SSD hard drive for the server:
+ Currently, there are two types of hard drives for servers: HDD (Hard Disk Drive) and SSD
(Solid-State Drive). If buying HDD, hard drives with SCSI or SAS interface should be
selected. Because these types have high bandwidth and a higher rotational speed than hard
drives using other interface standards. They help to increase the speed of reading and writing
data. But if you buy an SSD-type hard drive, you should give preference to those with good
performance. There are many types, and although the capacity is only about 120 GB to 140
GB, they have very good operating speeds. Depending on your budget, you can buy larger-
capacity drives.
+ However, today SSD hard drive is almost common and superior to HDDs because it has
many advantages such as reading and writing speed being much times faster than HDDs, and
SSD is considered to be more reliable because it does not. data fragmentation, SSDs are
much more durable than HDDs because they do not have a spinning disc motor, are not afraid
of vibrations, SSDs consume less power than HDDs, and do not emit noise...
- Select RAID for server configuration:
+ Raid is a hard drive system that is assembled from many physical hard drives together. It
has the role of increasing the speed of reading and writing data or helping to increase the
safety of the data contained in the disk system. This is also an important component when
considering server configuration. Because it helps ensure the safety of your data thanks to its
backup, restore, and error-proof functions.
+ Currently, there are quite a few types of Raid such as Raid 0, 1, 2, and 3, ... making users
confused as to which type to choose. It depends on your needs and financial capabilities. If
you need to access large volumes of data and need high data rates, you should choose RAID
0, but it is less secure. RAID 1 is for people who need to store and manage really important
documents, but its speed is not high. If you want the best possible Raid, then Raid 10 is the
choice for you, but you need to have a small condition that is a lot of money...
- Note about the network system with server configuration: No matter how high your server
configuration is, it depends on the network system. If the network system is unstable, it will
reduce the ability to operate smoothly and smoothly of the whole system. Physical servers
always need high bandwidth for an internet connection to avoid congestion. So you also need
to invest in the network system as well as regularly check the connection speed to ensure the
whole system is operating most effectively.
4. NETWORK STRUCTURE
4.1. WAN
4.1.1 . Point to point
- Concept
+ Permanent link between two endpoints.
b. Benefits and limits
- Benefits:
+ Ensure information transmission between 2 devices, easily detect and fix errors, and do not
appear traffic problems due to mainly using cable or radio connections.
+ It can connect two locations far apart to create a wireless connection that allows large
enterprises to share data and applications between headquarters and branches/offices due to
terrain conditions that do not allow to create of a wired network connection
+ Limitations:
+ Efficiency is not high
4.1.3. Mesh
a. Concept
- Provides high availability, but requires that every end system be interconnected to every
other system. Administrative and physical costs can be significant.
b. Benefits and limits
- Benefits:
+ Using a dedicated point-to-point connection, there is no circulation problem, along with the
advantages of point-to-point connections such as information security and error correction!
+ Very stable, when a connection is disconnected, it does not affect the entire network.
- Limitations:
+ The number of I/O ports on each device is quite a lot, so the cost will be high!
+ Expanding the network is quite difficult.
+ Is a form of topology with limited use.
4.2 LAN
4.2.1Star
a. Concept
- End devices are connected to a central intermediate device. Use Ethernet switches.
4.2.4. Ring
a. Concept
- End systems are connected to their respective neighbor forming a ring. Unlike the bus
topology, the ring does not need to be terminated. Ring topologies were used in legacy Fiber
Distributed Data Interface (FDDI) and Token Ring networks.
b. Benefits and limits
- Benefits:
+ Relatively easy to set up the structure.
+ Fast and simple error detection.
- Limitations:
+ Due to the ring structure, the signal moves in one direction, resulting in a slow transmission
rate.
+ Low sustainability.
5. NETWORK SERVICES
5.1.DHCP
a. Concept
- Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to
automate the process of configuring devices on IP networks, thus allowing them to use
network services such as DNS, NTP, and any communication protocol based on UDP or
TCP.
b. Function
- Manage and Distribute IP Addresses
- Prevent IP Conflict
- Update IP Address Automatically
- Supports IP Address Reuse.
c. Working principle
- When a user turns on a computer and connects it to a server with this service, the computer
will automatically request an IP address to the server. Then the server answers the request
until finally the computer gets the IP address and connects to the network.
d. Advantages and disadvantages
- The advantages of DHCP:
+ The time for manual configuration of IP addresses can be reduced.
+ There is no cost to make requests
+ There is no possibility of conflicts in IP addresses due to duplication and invalidation
prevention.
+ Simplify network administration.
+ Support multiple ranges
+ Valid configuration parameters are automatically taken from the new network for the
benefit of users
- The disadvantages of DHCP:
+ DHCP cannot travel through the router, so a forwarding agent is needed for the DHCP
server to process all leases on both network segments.
+ DHCP does not have a security mechanism to authenticate clients, it can gain unauthorized
access to IP addresses by presenting credentials such as client identifiers that belong to other
DHCP clients.
+ The hostname does not change when a new IP address is assigned.
+ The client cannot access the network without a DHCP server.
5.2.DNS
a. Concept
- The Domain Name System (DNS) turns domain names into IP addresses, which browsers
use to load internet pages. Every device connected to the internet has its IP address, which is
used by other devices to locate the device.
b. Function
- The main DNS function is to translate IP addresses into domain addresses, however, the
DNS has some additional functions:
- It can be used as a mechanism for validating trustable mail servers using the TXT records
- It can be used as a switch mechanism
- Website ownership validation
- Domain contact information, DNS system has a record of the different contacts
c.Working principle
- A user enters a domain name in the web browser. For example north.xyz.com. However, for
them to receive corresponding data for that domain name, the domain name must be
converted into a machine-readable IP address. This means that the IP address of the tIP
address will be requested from the data center before you can be able to access your site.
d. Advantages and disadvantages
- Internet Dependency
- It can offer high-speed connections.
- Some DNS servers are specifically designed for security purposes
- DNS allows users to categorize and archive search terms without needing to remember IP
addresses.
- DNS system constantly updates IP address so that users can avoid important efforts.
5.3.WEB
a. Concept
- A web service is a software system that supports interoperable machine-to-machine
interaction over a network. It has an interface described in a machine-processable format
(specifically, web Service Definition Language, or WSDL).
b. Function
- Process and deliver information to customers through personal computers on the Internet
over the HTTP protocol.
- Any computer can be a server if it has a server software program installed and has an
internet connection.
- Allows users to install and operate on any computer that meets the memory requirements.
- Store data in the form of renting small servers, VPS servers, or hosting.
c. Working principle
- A page on the internet can be viewed when the browser requests it from the web server and
the web server responds with that page.
- Simple process consists of 4 steps, they are:
+Obtaining the IP Address from the domain name
+ Browser requests the full URL
+ Web server responds to request
+ Browser displays the web page
d. Advantages and disadvantages
- The advantages of WEB:
+ A web server always provides the opportunity to interact with the hosting provider.
+ The log files present in a web server are made easy to configure.
+ Hosting through a web server is far more flexible compared to clustered web hosting.
+ A website using a web server experiences less number of bandwidth restrictions.
+ Whenever there are new requests, a web server does not allow sharing of resources such as
processor, hard drive, or bandwidth with others since it is not a shared host. Even under the
condition of obtaining virtual internet hosting.
- The disadvantages of WEB:
+ The expenses involved in a web server are far greater compared to an electronic web
hosting method.
+ Using web servers also brings many security concerns.
+ The convenience of web servers depends on the type of website you are using.
+ The contents on the web are edited frequently. As a result, it becomes impossible for the
web servers to work without an internet access
+ There may be a hardware failure, software failure, update, or maintenance in the web server
causing part of its availability so all the rest of the web servers to be congested with traffic.
This means that the web server receives more traffic than usual.
5.4.MAIL
a. Concept
An email server, also called a mail server, is essentially a computer system that sends and
receives emails.
b. Function
- Mail Server allows users to send or receive Email over the Internet with the domain name of
each organization.
- Ensure confidentiality of internal information.
- Helps minimize messages containing viruses or spam.
- Manage all email content of all members in the system.
- The user can set the maximum capacity.
- On the other hand, you can also set up automatic data backup function. This helps to ensure
that the necessary information and data are always present.
c. Working principle
- The sender uses a computer to sign into their email account and write a message. As well as
the message, they must include the recipient’s email address before they hit send. The email
is first sent to SMTP or outgoing email servers. Here, the server does a DNS record check to
translate domain names in email addresses into IP addresses that servers can use to route the
email.
- If the email goes to a domain within the same network, the first server can simply route the
email to the correct IMAP server. However, if the mail is addressed to a domain on an IMAP
server in a different network, the initial SMTP server will rely on unrelated SMTP servers to
route the mail. Finally, the incoming mail server uses a protocol like IMAP or POP to send
all messages to the recipient’s computer. The recipient can then find the message in the inbox
of their account.
d. Advantages and notes on using a mail server
- Advantages of mail:
+ Email with the company's domain name shows professionalism in operation.
+ High speed, and security, with many utilities.
+ Check mail anywhere: at the office (via mail browser) and at any place (when traveling on
business), on all types of mail browsers (Outlook…)
+ Can customize parameters and functions for each User.
+ Extremely effective spam and virus blocking.
+ There is a separate, impregnable storage space.
+ High security thanks to SSL protocol.
+ Using a private IP will prevent you from being blacklisted for no reason.
+ Support Email Forwarder feature to set up Email Offline.
- Notes on using the mail server:
+ The IP address is not sent to the spam box
+ Need to pay more attention to outgoing mail
+ Mail server is not allowed Open Relay Access
+ Do not use too many languages or capital letters in the mail
5.5. CLOUD
a. Concept
- A cloud server is a pooled, centralized server resource that is hosted and delivered over a
network typically the Internet, and accessed on demand by multiple users.
b. Function
- Cloud servers can perform all the same functions of a traditional physical server, delivering
processing power, storage, and applications
c. Working principle
- Cloud servers work by virtualizing physical servers to make them accessible to users from
remote locations. The computing resources of the physical servers are then used to create and
power virtual servers, also known as cloud servers. Cloud servers are provisioned and
managed through cloud-based APIs.
5.6.FTP
a. Concept
- An FTP Server is a software application that enables the transfer of files from one computer
to another. FTP (which stands for “File Transfer Protocol”) is a way to transfer files to any
computer in the world that is connected to the Internet.
b.Function
- FTP can be used by backup services or individual users to back up data from a location to a
secure backup server running FTP services.
- Replication involves copying data from one system to another but takes a more holistic
approach to provide greater availability and resiliency.
- FTP is also commonly used to access shared cloud and web hosting as a mechanism for
uploading data to a remote system.
c. Working principle
- FTP is a client-server protocol and it is based on two communication channels between the
client and server.
- Control connection: It is used to send and receive commands and responses. Normally,
users need to log in to an FTP server to establish a connection, but some servers provide all
their content without logging in. These servers are called anonymous FTP.
Data Connection: For transfer, n the files and folder we use a separate connection called data
connection:
+ Active Mode: In this mode, the user connects from a random port(random port 1) on the
FTP client to port 21 of the server. It sends the PORT command which tells the server what
port of the client it should connect to i.e.(random port 2). The server connects from port 20 to
the port that the client has designated i.e. Random Port 2. Once the connection is established
the data transfer takes place through the client and server ports.
+ Passive Mode: In the situation, where the client can not accept a connection like when
blocked by a firewall, the passive mode has to be used. This is the most common mode
because nowadays the client is behind the firewall(e.g. built-in Windows Firewall). In this
mode, the user connects from a random port(random port 1) on the FTP client to port 21 of
the server. It sends the PASV command which tells the client what port of the server it should
connect to i.e.(random port 3) for establishing the connection. The client connects from
Random port 2 to the port that the server has designated i.e. Random Port 3. Once the
connection is established the data transfers take place through the client and server ports.
d. Advantages and disadvantages
- Advantages of FTP:
+ FTP is used to allow you to transfer multiple files as well as directories
+ Faster transferthann HTTP
+ Quick file transfer speed
+ Supported in almost all host
+ Most clients have a synchronizing utility
+ Many more FTP clients also can schedule a transfer
+ No size limitation on single transfers
+ Many clients have scripting capabilities through a command line
+ The ability to add items to a queue to be uploaded as well as downloaded
+The ability to resume a transfer if the connection I lost
+ FTP can also include an automatic backup facility
- Disadvantages of FTP:
+ Usernames, passwords, and files are sent in clear text
+ Hard to script jobs
+ All providers aren't created equal
+ Encryption is not inherently offered or enforced by every provider
+ Servers can be spoofed to send data to a random port on an unintended computer side
+ Filtering active FTP connection is difficult on your local machine
+vEasy for an inexperienced user to wipe out work
+TLS 1.2is not always supported over HTTPS
6. NETWORK SOFTWARE, NETWORK HARDWARE, AND THE RELATIONSHIP
BETWEEN THEM.
6.1 Network Software
- Network software is an umbrella term used to describe a wide range of software that
streamlines the operations, design, monitoring, and implementation of computer networks.
- Network software is a fundamental element for any networking system. It helps
administrators and security personnel reduce network complexities, and manage, monitor,
and better control network traffic. Network software plays a crucial role in managing a
network infrastructure and simplifying IT operations by facilitating communication, security,
content, and data sharing.
- Functions of network software:
+ User management allows administrators to add or remove users from the network. This is
particularly useful when hiring or relieving
+ File management lets administrators decide the location of data storage and control user
access to that data.
+ Access enables users to enjoy uninterrupted access to network resources.
+ Network security systems assist administrators in looking after security and preventing data
breaches.
- Key Components of Network Software:
+ Application layer: The first component is the application layer or the application plane,
which refers to the applications and services running on the network. It is a program that
conveys network information, the status of the network, and the network requirements for
particular resource availability and application. This is done through the control layer via
application programming interfaces (APIs). The application layer also consists of the
application logic and one or more API drivers.
+ Control layer: The control layer lies at the center of the architecture and is one of the most
important components of the three layers. You could call it the brain of the whole system.
Also called the controller or the control plane, this layer also includes the network control
software and the network operating system within it. It is the entity in charge of receiving
requirements from the applications and translating the same to the network components. The
control of the infrastructure layer or the data plane devices is also done via the controller. In
simple terms, the control layer is the intermediary that facilitates communication between the
top and bottom layers through API interfaces.
+ Infrastructure layer: The infrastructure layer, also called the data plane, consists of the
actual network devices (both physical and virtual) that reside in this layer. They are primarily
responsible for moving or forwarding the data packets after receiving due instructions from
the control layer. In simple terms, the data plane in the network architecture components
physically handles user traffic based on the commands received by the controller.
Infrastructure has 2 APIs: Northbound API and Southbound API
- Types of Network Software:
7. Network Topology
7.1. What is network topology?
- Network topology refers to how various nodes, devices, and connections on your network
are physically or logically arranged to each other. Think of your network as a city, and the
topology as the road map. Just as there are many ways to arrange and maintain a city—such
as making sure the avenues and boulevards can facilitate passage between the parts of town
getting the most traffic—there are several ways to arrange a network. Each has advantages
and disadvantages and depending on the needs of your company, certain arrangements can
give you a greater degree of connectivity and security.
- There are two approaches to network topology: physical and logical. Physical network
topology, as the name suggests, refers to the physical connections and interconnections
between nodes and the network—the wires, cables, and so forth. Logical network topology is
a little more abstract and strategic, referring to the conceptual understanding of how and why
the network is arranged the way it is, and how data moves through it.
9. BANDWIDTH
- A definition of bandwidth is the fastest rate at which internet information may be
transmitted in a second. Broadband terminology like USB copy speed and fiber optic speed
are occasionally used.
-Bandwidth types:
+ Committed bandwidth: This is the kind of bandwidth that the internet service provider
promises to maintain at a specific connection speed. The bandwidth will never fall below that
threshold at any moment. Typically, network providers may provide packages with capped
bandwidth, such as 128 Mbps, 256 Mbps, etc. For people, households, or small organizations,
this kind of bandwidth is extremely acceptable.
+ Shared bandwidth: This type of bandwidth enables numerous servers to share a single
bandwidth allotment. The internet data transmission speed will be poor if there are numerous
servers (phone, tablet, laptop, or desktop) accessing the network since one bandwidth must be
divided into several. In contrast, the connection speed will increase as fewer devices contact
the network. MonaMedia, a hosting company, claims that when fewer devices are accessing
but they are all still inside the package's bandwidth restriction, the connection speed will be
faster. It is seen to be quite appropriate for commercial establishments, enterprises, and
corporations. It's like you and everyone else walking down the street, to put it simply. On a
crowded day, you must travel more slowly; on the other hand, when there are fewer vehicles,
you can move more quickly while staying under the posted speed limit.
+ Dedicated bandwidth: Private bandwidth, as the name suggests, is set aside for only one
user. You are the only subscriber authorized to use this kind of bandwidth. Private bandwidth
enables you to access the internet at a constant pace without experiencing lag during "peak"
times (when many people often use the same internet). This kind of bandwidth is seen to be
appropriate for companies that rely on online networks (e-commerce, online games, online
chat, etc.) to be able to transmit data steadily, avoiding issues like transmission lines.
unreliable, and annoying to consumers Bandwidth is particularly crucial for businesses that
specialize in design, software, or Vietnamese independent web designers. High transmission
speed will make the work easier and more convenient.
ACTIVITY 2
1. Prepare a written plan of how you will design the Local Area Network including your
LAN blueprint.
- Building A: 30 PCs, 2 Servers, and 02 printers. (Admin: 5 PCs, HR: 5 PCs, SALE: 20 PCs)
- Building B: 10 PCs, 2 printers.
- LAN blueprint:
2. Demonstrate the security and quality of service requirements
- Cisco 2911 router.
+ The system I built uses a Cisco 2911 switch to communicate between two intelligent
systems. Each switch has its wattage button that can be toggled on and off. Modules can be
combined or removed only when the force button is off. The Cisco 2911 is an Integrated
Services Router (ISR) with two Fast Ethernet ports, two Fast WAN Interface Card (HWIC)
slots, and one Advanced Integration Module (AIM) slot. The Cisco 2911 Switch is a perfect
replacement for Enclave Films Co due to its superior features and superior quality.
+ The Cisco 2911 Switch includes a firewall that blocks excessive internet traffic and
prevents further attacks. It also includes a VPN (Virtual Private Network). Being marked as a
switch, it offers great security and you can protect your system with a good password. Cisco
2960 Switch Switches allow various utilities in the system to communicate. The switch used
by the system is a workgroup switch. Ethernet switch for PC communication. It can also look
up MAC addresses to ensure confidentiality between two utilities when sharing profiles. This
switch was chosen because it is stackable and has a short uptime. These switches are fixed.
These switches are useful for medium-sized organizations. With that in mind, we chose
Enclave Films Co.
- Cisco 2960 Switch:
+ The device has 24 Gigabit Ethernet ports and 4 plugs with a mini pairing feature.
+ Line rate 10/100/1000 on the port.
+ 1 gigabit Ethernet uplink module slot. Configure rj45 and 1G USB USB console
+ Fixed memory: CPU ARMv7 800 MHz, DRAM 512 MB
+ 256 MB fast memory
- PCs (HP EliteOne 800)
+ This PC is especially intended for business purposes. Multi-center has been planned in a
manner by which it improves certain products to work. It guarantees that the records are
ensured since it has multi-faceted security. It is likewise known for its sturdiness. These are a
portion of the reasons why I picked the HP EliteOne 800.
+ A decent enemy of Virus programming could be introduced to forestall framework crashes
and records from getting defiled. You may likewise give a solid secret key to shield the PC
from unapproved clients from getting to the significant records in the PC.s
- Printers (HP LaserJet Pro Multi-Function)
+ As the name recommends, these printers are known for their multi-working capacities, for
example, printing, duplicating, and filtering; the sky is the limit from there. It can print
around 3500 pages each month for up to 10 individuals. It has Ethernet and remote systems
administration alternatives which appear to be ideal for Enclave Films as there are printers
utilized in the systems(Building A and B). This printer can print 42 pages each moment and
the expense excessively appears to be entirely sensible.
- Servers (Applications Server)
+ It is also known as AppServer. A program that controls all application activity between
users and an enterprise organization's back-end applications or databases. Typical application
services are typically used for basic transaction federation applications. To support high
demand, an application service must have internal redundancy, high-visibility control, high-
level representation, distribution of application services, and a basic access link support
database.
5. Install and configure your network services and applications (Web, DNS, mail, ...)
5.1. DHCP
5.2 DNS and Web
5.3. Email
5.3 Telnet
5.4 SSH
6. Conduct design testing and evaluation to meet requirements and analyze user feedback.
7. Recommend maintenance schedule to support networked system.
- Whether a network system is large or small, if it is not maintained regularly, it is also very
easy to encounter problems during operation. Therefore, as soon as you use the network
system, you need to prepare and plan as well as the impact factors during operation to offer
the most optimal maintenance plan.
- Things to note when maintaining the network system:
+ Backing up the system before maintenance: For every business, backing up the system's
documents is relatively important because it is not possible to guarantee that during the
maintenance process will not occur problems such as loss of data. data, configuration loss,
etc.
+ Need to find a network maintenance expert: Arbitrarily dismantling, repairing, or shutting
down a part of the equipment will seriously affect the entire network. Therefore, when you do
not have too much knowledge in the field of network maintenance, it is advisable to hire
maintenance professionals to repair instead of dismantling it yourself.
+ Check system information before performing maintenance to avoid data loss or mess after
repair.
+ After the maintenance is completed, the system should be tested one last time to determine
if the system is no longer faulty and whether the system is operating stably and normally.
ACTIVITY 03
1. Implement a networked system based on your prepared design.
- Name the VLANs and configure them
4. Investigate what functions will allow the system to support device growth and the
addition of communication devices.
- Based on user feedback, the function that the system will need
+ is a firewall to protect software and all the data.
+ Install security software
+ Upgrade anti-virus
+ Upgrade ram, hard drive
+ Using phishing to...