Chapter 5
Chapter 5
Technology
Hosting hardware(server)
Application server
Operating system
Others
1. Technology choosing
Dial-up lines
Serial links
Cellular
Satellite etc
Ethernet, Token rings, and wireless LAN using IEEE 802.11 are example of standard
LAN technology
Ethernet is the most widely used LAN technology and is defined under IEEE standards
802.3
1
Ethernet operates in two layers of the OSI Model the physical layer and the data link
layer
There are different types of Ethernet networks that are used to connect devices and
transfer data.
There are different types of Ethernet networks that are used to connect devices and transfer data.
1. Fast Ethernet: This type of Ethernet network uses cables called twisted pair or CAT5. It can
transfer data at a speed of around 100 Mbps (megabits per second). Fast Ethernet uses both fiber
optic and twisted pair cables to enable communication. There are three categories of Fast
Ethernet: 100BASE-TX, 100BASE-FX, and 100BASE-T4.
2. Gigabit Ethernet: This is an upgrade from Fast Ethernet and is more common nowadays. It
can transfer data at a speed of 1000 Mbps or 1 Gbps (gigabit per second). Gigabit Ethernet also
uses fiber optic and twisted pair cables for communication. It often uses advanced cables like
CAT5e, which can transfer data at a speed of 10 Gbps.
3.10-Gigabit Ethernet: This is an advanced and high-speed network that can transmit data at a
speed of 10 gigabits per second. It uses special cables like CAT6a or CAT7 twisted-pair cables
and fiber optic cables. With the help of fiber optic cables, this network can cover longer
distances, up to around 10,000 meters.
4. Switch Ethernet: This type of network involves using switches or hubs to improve network
performance. Each workstation in this network has its own dedicated connection, which
improves the speed and efficiency of data transfer. Switch Ethernet supports a wide range of
speeds, from 10 Mbps to 10 Gbps, depending on the version of Ethernet being used.
Token ring is defined by IEEE 802.5 standard. In token ring, there is a station and a special
frame called token. A station in token ring can transmit data frame if it contains a token. Token
ring is a Star shaped topology and handles priority in which some nodes may give priority to the
token.
GSM is a cellular standard for mobile phone communications to cater to voice services and data
delivery using digital modulation where SMS has a profound effect on society. It is the standard-
2
bearer of the 2G technologies. GSM is a circuit-switched network. In GSM billing is based on
the duration of the connection. It does not allow direct connection to the internet. SMS (Short
Messaging Service) is one of the popular features
GPRS is an up-gradation of GSM features over the basic features to obtain much higher data
speeds and simple wireless access to packet data networks than standard GSM. It is the standard-
bearer of the 2.5G technologies. GPRS is a packet-switched network.
X.25 also a protocol that was developed by Telecommunication Standardization Sector (ITU-T)
of International Telecommunication Union
A server is a computer program or equipment that offers a service to another computer program
and its users, referred to collectively as the clients. The physical system that a server program
runs on is sometimes referred to as a server in a data center
The server is similar to personal computers. Its components are the processor (CPU), memory
(RAM), and hard disk. Servers contain hardware and programs that are tailored to their intended
function. As a result, the target server type is determined by the intended purpose.
1. Web Server
The server that is in charge of publishing a website on the internet is known as a web server. A
server that provides hosting, also called "hosting", over the internet protocol is called a web
server. The renting of space required to publish Web pages on the Internet is referred to as
"hosting". Hosting means putting pages, images, or documents meant for a website on a
computer that internet users use to access them. Apache, Microsoft's Internet Information Server
(IIS), and Nginx are the most popular web servers on the Internet.
2. Database Server
3
A database server manages a database and provides database services to clients. The server
manages data access and retrieval as well as the completion of client requests. A database server
is a computer that runs database software and is dedicated to providing database services. A
database server is made up of hardware and software that is used to run a database.
Oracle,IBM DB2, Microsoft SQL server, MySQL server ,MS access e.t.c
3. Email Server
A mail server, also known as an email server, is a computer system that sends and receives
emails. When you send an email, it passes through several servers before arriving at its
destination. While this process is quick and efficient, there is a significant amount of complexity
involved in sending and receiving emails.
For a computer to work as a mail server, mail server software must be installed on it. The system
administrator then uses this software to create and manage email accounts for any of the domains
hosted on the server. Aside from that, you have protocols. Protocols are network software rules
that enable computers to connect to networks from anywhere, allowing you to shop online, send
emails, and so on.
Mail servers are classified into two types: outgoing mail servers and incoming mail servers.
SMTP, or Simple Messages Transfer Protocol, servers handle outgoing mail. Incoming mail
servers are classified into two groups. Messages are kept on the server while using IMAP. When
using POP3, messages are often stored on a device, such as your computer or mobile phone.
IMAP, in general, is more complicated and adaptable than POP3.
SMTP: The SMTP protocol handles all incoming mail and sends emails. SMTP stands for
Simple Mail Transfer Protocol and refers to the outgoing mail server. Consider SMTP to
be the transport of your email across networks. Your emails would be useless without
them.
IMAP / POP: There are two types of incoming mail servers-POP3 and IMAP. Post Office
Protocol version 3 (POP3) servers are well-known for getting your computer's Inbox
4
contents. IMAP servers, which stand for Internet Message Access Protocol, are used for
one-way mailbox synchronization. IMAP is used as an additional protocol retrieval
application on a mail server. And, while there are newer POP versions with more
functionality, the recommended protocol remains POP3 since it is straightforward, has a
high success rate, and gets the job done with the fewest problems. You can even
download your emails and read them offline. Your email would not reach your machine
if one of these protocols was not functioning properly.
A mail server, in its most basic form, collects email and forwards it to its intended recipients. It
can be thought of as a computer serving as an e-mail office, allowing control of e-mail
transmission over a network using various protocols. How an e-mail server works are explained
below:
1. Making a connection to the SMTP server: When you send an email, your email service
or provider will connect to the SMTP server, such as Gmail, Exchange, Office 365,
Expert Mail, or Zimbra. This SMTP server is associated with your domain and has a
unique address. At this point, your email provider will send crucial information to the
SMTP server, such as your email address, message body, and recipient's email address.
2. Taking care of the recipient's email domain: The SMTP server identifies and processes
the recipient's email address in this phase. If you email someone else within your firm,
the message will be sent directly to the IMAP or POP3 server. If you are sending the
message to another company, the SMTP server must speak with the email server of that
company.
3. Determining the IP address of the recipient: At this point, your SMTP server needs to
connect to the recipient's server using DNS (Domain Name System). DNS functions
similarly to a translation mechanism. It aids in the conversion of the recipient's domain
name into an IP address. To function effectively, SMTP requires an IP address to forward
the message to the recipient's server.
5
server. When the recipient receives the email, SMTP validates it before forwarding it to
the IMAP or POP3 server. The email is then processed in a queue until it is available for
the recipient to access.
People rarely consider how complicated the internet is. The threat of crimes such as identity theft
and data security breaches is growing. To protect themselves, many people employ proxy servers
or Virtual Private Networks (VPN). A proxy server is a web server that serves as a conduit
between a client program, such as a browser, and the actual server. It sends queries to the
accurate server on the client's behalf and sometimes fulfills the claim itself. Web proxy servers
offer two key functions: they filter requests and increase performance. In addition, there are
reverse proxy servers that reside between web servers and web clients. Requests from web
clients are routed through reverse proxy servers to web servers. They are used to cache pictures
and pages to drastically minimize the strain on web servers.
5. DNS Server
The Domain Name System (DNS) is the Internet's telephone directory. DNS is responsible for
finding the correct IP address for websites when users enter their domain names, such as
'google.com' or 'nytimes.com,' into web browsers.
The addresses are then used by browsers to communicate with origin servers or CDN edge
servers to access website information. All this is possible by DNS servers, which are specialized
machines for answering DNS queries.
To resolve names, the DNS system has resolving systems. Name resolvers are used to find IP
addresses associated with domain names. DNS clients are the people who use resolvers. A DNS
system can have many name resolvers. As a result, if one of them becomes incapacitated, the
others take over and ensure that communication is not disrupted.
6
6. FTP Server
FTP is a network protocol that is used to transfer files between a client and a server on a
computer network. FTP is a well-known protocol that was developed in the 1970s to allow two
computers to transfer data over the internet. One computer serves as the server, storing
information, while the other serves as the client, sending or requesting files from the server. The
FTP protocol's primary mode of communication is normally port 21. On port 21, an FTP server
will accept client connections. FTP servers, as well as the more secure SFTP Server software,
carry out two basic functions: "Put" and "Get."
7. File Server
A file server is a central server in a computer network that serves file systems or portions of file
systems to clients connected to the network. As a result, file servers provide users with a central
storage location for files on internal data media that is available to all authorized clients. The
server administrator establishes rigorous guidelines for which users have which access rights:
For example, the configuration or file authorizations of the individual file system allow the
admin to specify which files a certain user or user group may access and open, as well as
whether data can only be seen or additionally added, altered, or deleted.
Users can access files over the local network as well as remotely when file servers are linked to
the internet and set up properly. This allows users to view and store files on the file server when
they are on the move. All current operating systems, such as Windows, Linux, or macOS, can be
used on a file server, but the network devices must be compatible with the operating system.
However, file servers are used for more than just file storage and administration. They are also
frequently used as a backup server and as a repository for applications that must be available to
numerous network members.
8. DHCP Server
A DHCP Server is a network server that gives and assigns IP addresses, default gateways, and
other network information to client devices on an automatic basis. To reply to client broadcast
7
inquiries, it uses the standard protocol known as Dynamic Host Configuration Protocol or
DHCP.
A DHCP server automatically sends the network parameters required for clients to communicate
successfully on the network. Without it, the network administrator must manually configure each
client that connects to the network, which can be time-consuming, especially in big networks.
DHCP servers typically assign a unique dynamic IP address to each client, which changes when
the client's lease for that IP address expires.
Each device connected to the Internet on an IP network must be allocated a unique IP address.
DHCP allows network managers to centrally monitor and assign IP addresses. When a computer
is relocated, it can automatically give a new IP address to it. DHCP automates the process of
allocating IP addresses, reducing both the time necessary for device configuration and
deployment and the likelihood of configuration errors. A DHCP server can also manage the
setups of several network segments.
9. Cloud Server
A cloud server is a pooled, centralized server resource that is hosted and distributed across a
network -typically the Internet- and may be accessed by multiple users on demand. Cloud servers
provide all of the same services as traditional physical servers, including processing power,
storage, and applications. Cloud servers can be situated anywhere in the world and provide
remote services via a cloud computing environment. Traditional dedicated server hardware, on
the other hand, is often installed on premises for the sole use of one firm.
An application server is software that runs on the server and is written by a server programmer to
provide business logic for any application. This server might be part of a network or a dispersed
network. Server programs are typically used to give services to client programs that are either on
the same system or a network. Application servers reduce traffic while increasing security. It is
not possible to achieve ideal web server agility by handling both HTTP requests from web
8
clients and passing or storing resources from numerous websites. Application servers fill this
need with a powerful architecture designed to handle dynamic online content requests.
Application servers provide programs with protection and redundancy. The task of conserving
and replicating application architecture across the network becomes more achievable once
deployed between a database and a web server. The extra step between potentially harmful web
connections and the database server's crown jewels offers an extra degree of security. Because
application servers can handle business logic queries, an attempted SQL injection is more
difficult.
A print server is a software program, network device, or computer that manages print requests
and provides end users and network administrators with printer queue status information. Print
servers are used in big business networks as well as small or home office (SOHO) networks.
A single dedicated computer operating as a print server in a large firm manages hundreds of
printers. A print server in a small office is generally a customized plug-in board or tiny network
device the size of a hub that serves the same function as a dedicated print server while freeing up
critical disk space on the workplace's limited number of PCs.
A print server, like other servers, works on the client-server architecture, receiving and
processing user requests. Physical print servers, as shown in the diagram above, sit on the back
end of an organization's network and connect directly to network printers, retaining control over
the print queue. The print server handles devices to request information, such as file and print
requirements. While most printing occurs within workplace networks, print servers are available
to external network clients (typically via approved login).
Print-server software can be deployed on a network file server or your computer. UNIX-based
operating systems such as Mac OS X and Linux, by default, employ the CUPS, or Common
UNIX Printing System, which includes built-in print-server functionality. A print server can also
be a single-purpose network hardware device that connects to a printer directly. Some printers
9
include print-server technology that allows them to connect directly to a network router or
switch.
There are several ways to connect a printer to a print server. It might be physically linked to a
file server or client computer by a parallel, serial, or USB connection. Dedicated network print-
server hardware devices connect to a printer directly through a parallel or USB connection and
the network wirelessly or by an RJ45, Ethernet cable connection. Printers with built-in print-
server hardware can connect to the network through wireless or Ethernet.
Before your document is finally printed and ready for pickup, the print server, and your
computer's operating system must locate the printer you want to use, establish a network
communication path to it, package your document into a data format that the printer can directly
understand, send the formatted data to the printer, and monitor the printer's progress as it prints
your document. Finally, it informs you whether or not the printing procedure was successful. The
printer drivers installed on your computer, as well as network printing protocols such as IPP
(Internet Printing Protocol) and LPR (Line Printer Remote protocol), manage the complex, low-
level details for you.
While printers are slower output devices than hard drives or CD writers, print-server software
may compensate by keeping your document in a temporary file called a spool and only sending
out bits of your document at the pace at which your printer can reliably handle them. If you send
numerous documents to the printer or if many users try to print at the same time, print servers
installed on network file servers can queue each page. The printer server transmits documents in
the queue to the printer in a systematic, dependable, first-come, first-served manner.
An Operating system, which includes software and associated protocols to communicate with
other autonomous computers via a network conveniently and cost-effectively, is called Network
Operating System. It allows devices like a disk, printers, etc., shared between computers. The
individual machines that are part of the Network have their operating system, and the Network
Operating System resides on the top of the individual machines.
10
UNIX is a powerful Operating System initially developed by Ken Thompson, Dennis Ritchie at
AT&T Bell laboratories in 1970. It is prevalent among scientific, engineering, and academic
institutions due to its most appreciative features like multitasking, flexibility, and many more. In
UNIX, the file system is a hierarchical structure of files and directories where users can store and
retrieve information using the files
Novell NetWare also a type of Network Operating System. It provides wide networking services
ranging from easy and simple file to network user, data, security, and even resource
management. It is generally designed for networks or Local Area Network (LAN) operating
system
4. Others
Transmission media
• Twisted-pair cable
– Consists of two conductors (normally copper), each with its own plastic
insulation, twisted together.
– Two types
11
• Fiber-optic cable:- uses glass or plastic conductor and transmits the signals as
light
Maximum
Category Description
supported speed
This cable contains only two pairs (4 wires). This cable was used in the
Cat 1 Up to 1Mbps
telephone network for voice transmission.
This cable and all further cables have a minimum of 8 wires (4 pairs). This
Cat 2 Up to 4Mbps
cable was used in the token-ring network.
Cat 3 Up to 10Mbps This is the first Ethernet cable that was used in LAN networks.
Cat 5 Up to 100Mbps This cable was used in advanced (fast) LAN networks.
This cable reduces attenuation and cross-talk. This cable also potentially
Cat 6a Up to 10Gbps removes the length limit. This is the recommended cable for all modern
Ethernet LAN networks.
Two types of Ethernet network cable are straight through and crossover cable. Straight through
and Crossover cable have different wirearrangement for serving different purposes.
12
Straight Through Cable
Both side (side A and side B) of cable have wirearrangement with same color.
Crossover cable
13
– Connect 2 computers directly
14
15