A to Z of Computer networking
The concept of network is very old. Because of living together, we have a network everywhere. For example, our network of social kinship, the network of roads for movement, TV, radio, mobile phone network, or the network of blood circulation inside the body are all examples of real networks. From the beginning of civilization, human beings have been trying to communicate with each other through gestures, language, etc. The modern technology of today's age has come in continuity with the attempt of creating communication with each other through today's internet technology. The invention of wireless communication technology is an unprecedented event in the history of human civilization. In the mid-eighteenth century, the American artist and inventor Samuel Morse was able to successfully transmit data in the form of Tore Tucker code with his self-invented telegraph device. Samuel Morse's Morse Key, Morse Code, Tables and Telegraph Tor Takka is quite old today, but it is still our constant telephone technology. With the help of Alexander Graham Bell, telephone technology has revolutionized information and communication around the world. From the middle of this century, computer and telephone technology has opened new horizons in data communication. Naturally, a network is needed to transfer data from one computer to another. And its name is computer network. A network is a system that allows data to be exchanged from one computer to another. Copper wire, fiber optical cable, wireless or wireless medium can be used for data exchange.
If one of the computers in the network has an internet connection, the internet can be used from other computers as well. Our cover report on various topics from the beginning to the end of this network is 'Networking'.
Networking between multiple computers in the office or home can be used for a variety of purposes. The advantages of the network can be explained by a small example. Suppose an office has five computers and a printer. In this case, if five users of computers want to print something, the printer will be stretched. Problems and difficulties connecting the printer to the computer repeatedly. But if the network is created between the computers through the cable, then there will be no problem. In that case, the printer can be connected to any computer in the network to print from all other computers. There are many benefits to using the network. For example, if we have a network between two computers, we can easily use files, movies or programs from one computer to another. Networks are commonly used for data exchange. This data can be exchanged between multiple computers in an office, between computers on different floors of a building, between different computers in an area and even between different computers in different parts of the world.
Data here refers to electronics documents, letters, pictures, words, etc. With the help of network, it is possible to share data files from one computer to another, listen to songs, watch pictures, play games and many other things. Even if one computer has a problem, it can be solved from another computer on the network.
Let's talk about the size and type of network. Just as a building can have a network of four or five computers, it is possible to create a network of millions of computers in a city, a country, or the world. A network that consists of different computers in a building or campus is known as a local area network or LAN. The network of computers in a city is known as the Metropolitan Area Network or Man. And a whole country or intercontinental computer network is actually a wide area network or one.
The global network that is spread all over the world is known as www or world wide web. The Internet is more commonly known to us. Wireless networks are used to bring easily portable computers such as laptops, notebooks, etc. from one place to another under the network.
Protocol
Data is sent in small packets between two computers on a network at regular intervals. In this method, no data packet is lost. Much like sending a letter by post. When sending a letter, the specific address is written on the envelope of the letter. This address contains the name of the recipient, home number, post office, district, country name etc. The postman finds the person at that particular address and delivers the letter. Similarly, every computer on the network has a code address. Its name is IP address.
The rules for sending data are such that every computer can understand them properly. The language that one computer uses to communicate with another computer is called protocol in network terms. Collectively called TCPIP. TCPIPis a protocol widely used on billions of computers worldwide.
Tropology
Computers and other hardware on a network can be connected to it in a variety of ways. The method of adding this is called network trophology in networking terminology. Here are a few of these trophologies.
All computers on a very small network can be connected together with a single cable or backbone. This method is called bus tropology. In this method there are two terminators at the end of the cable. T connectors are also used to connect each computer. The network can be easily expanded in bus trophology. However, if the number of computers is more, the rate of data exchange is significantly reduced. If a computer connected to the backbone of the network is disconnected, only that computer is disconnected from the network. However, if there is a problem with the main wire or the backbone, the whole network becomes unusable. If there is a problem in any part of the network, it is not easy to solve.
Another tropology of networking is Star Tropology. It uses a networking device called a hub. And the computers on the network are connected to a central hub.
In this trophology, it is easy to add new computers to the network. Connecting a computer to a network is easy. Even if one computer of the network is out of order, the network with other computers is still active. However, if there is a problem for any reason or if the hub is broken, the network becomes ineffective.
Another tropology is created by arranging computers in the shape of a star, similar to the star tropology. In this trophology, data rings are transmitted from one computer to another in a circular manner. Hence it is known as Token Ring Tropology.
In this way, each computer in the network can use each other's files or resources equally. However, if one computer in the network is out of order, it affects the whole network. Problem solving and maintenance of this network is quite troublesome.
Only one tropology is used when setting up any network. Computers and devices of different networks are connected in a combination of multiple trophologies. For example, a combination of bus tropology and Star tropology can be used to create a Starbus, Mesh or hybrid network. Such integrated networks are quite effective and popular in practice.
Model
We can usually follow two models to network in the office or at home. The network of the first model does not exist in any central computer. Every computer works independently without relying on anyone. The method of networking is called peer to peer networking. Here the English word peer means equal status or equal.
Another popular model of networking is client-server networking. This model has a central computer. Other computers on the network work with central computers. This means that the central computer here provides various services to other computers in the network and will control the network. The name of this central computer is server. The rest of the computers that depend on the server are called clients. Both networking models have multiple advantages and disadvantages.
The peer-to-peer model is usually followed for networking between ten or less computers. This model is low cost, easy to maintain. That's why any computer user on this network can easily share files and printers with each other. This model is very useful for networking of computers in home, small office or in the same building. However, this model is not suitable if the number of computers in the network is more than ten and the security of the network is important.
Server-based networks or client-server model networks are used if the number of computers in the network and the scope of work is too large. The advantage of client-server networking is that centralized networking can easily control other computers. Computers other than server computers do not require powerful and expensive hardware. In addition, network security is much higher in this model. This is why this networking model is effectively used in large office or business trades. However, it also has some disadvantages. When the network's server computer fails, the entire network becomes inoperable. And in many cases client-server networks are expensive and cumbersome to maintain.
So far we have learned all we need to do networking. Let's actually set up the network. We will consider several types of networks here.
1. PC-to-PC network setup without a hub between two nearby computers.
2. Peer-to-peer network setup of 5-6 computers in the same room, building or two buildings side by side.
3. More effective server based network setup in the office with more than 5-6 computers.
PC to PC networking
Suppose you want to network between just two PCs at home or office. By sharing the network between two PCs, file sharing, printer sharing, internet connection sharing, data backup, etc. can be done well. You will need to set up such a network -
1. Two 10/100 MBPS LAN card or network interface adapter (NIC) with RJ45 port.
2. 2-3 m long copper RJ11 (four conductor) telephone wire or RJ45 (eight conductor) wire as required. The price of RJ11 cable is relatively quite low.
3. Two RJ45 connectors (with eight pins).
4. A 6-pin crimping machine for attaching connector wires.
First open the casing on both the computers and insert the two LAN cards in the PCI slot of the motherboard.
Usually a LANCARD is a plug and play device, so the computer's BIOS configures it automatically. So even if we don't think about configuring Lancard in BIOS.
Cassover cable made
Usually the cable has to be connected to the LANCARD with RJ45 connector. The other end of this cable is similarly connected to the RJ45 port of the hub with the RJ45 connector. Thus for LANCARD to HUB connection RJ45 connector should be connected on both ends of the cable in the same manner. Since we are only using the hub to network between the two computers, the connectors on both ends of the cable need to be connected separately. The following steps can be followed for crossover cabling in the reverse order of how to install at one end and at the other end.
10 Baset CAT-3 or RJ45 (of eight conductors) of UTP cable or RJ11 telephone wire (four conductors of cable) and connect as required. Use crimping machine for this purpose.
If you look closely at the crimping machine, you will see that it has a special blade for cutting its connector. With the help of this blade, lightly press half an inch of wire to remove the upper plastic cover. Now you will see that eight (or four) thin conductors of different colors have come out. Each thin wire must be inserted into each pin of the connector as a rule.
Notice the RJ45 connector with a golden groove on one side and uneven on the other. Count the pin numbers from the left facing the golden grooved side. The color code can be followed to insert the eight thin conductors of the RJ45 wire in phases.
1 white
2 oranges
3 white
4 blue
5 white
6 Green
7 White
8 Gray
Color codes can also be used in reverse if desired. For example, starting from gray in pin 1, white conductor can be inserted in pin 7.
There are four conductors in the case of telephone wires or RJ11 wires. To do this, hold the connector straight and insert the conductors into pins 1, 2, 3, 6 from the left side. The condition for making a crossover cable is to select the color for pin 1 on the first connector and insert it in pin 3 on the second connector. Similarly, the color of the 2nd pin of the 1st connector will enter the 7th pin of the 2nd connector. And the color hub of pins 1 and 2 of the second connector is the connector of pins 3 and 6 of the 1st connector.
After attaching the connectors to both ends of the cable, gently press the connector with your finger to insert it into the RJ45 port of the LANCARD and release it into the port.
Now if you give power to both the computers, if the yellow LED light is on behind the two LAN cards, it will be understood that the physical connection setup of LAN card to LAN card is correct.
However, special types of digital testers are available to test the cable. If you wish, you can also use such tester.
This time you have to configure the network in the operating system of the computers. Linux, Windows, etc. are commonly used as operating systems. How to set up a network on these operating systems will be discussed later.
Network data transmission-access method
A Lancard on the network follows a variety of procedures for data transmission.
CSMA / CD method
Data is transmitted over the Ethernet network using this Carrier Service Multiple access with collision detection or CSMA / CD method. Here all the computers check the network traffic before transmitting the data. Collisions or collisions occur if the computer tries to transmit two at the same time. So the computer tries to re-transmit by waiting for two random or any amount of time.
CSMA / CA Method Carrier Service Multiple access with collision avoidance method Before sending a data packet to a computer network, the desire to send data to other computers in the network is first expressed. In the language of the network which is called broadcast. Although this type of broadcast reduces data collection, it unnecessarily increases the amount of traffic on the network.
Token passing
Data is transmitted or accessed in IBM's token ring network in such a manner. In this method, a data packet or token is released from a computer into the network. If another computer on the network wants to transmit data, it has to wait for the computer to receive the token. The token to him actually sends his data to another computer through the token. The job of a token is to take data from one person and bring it to the right recipient.
Networking device
What is common in a network is-
At least two computers
Each computer has one or more network interface cards or LAN adapters that allow computers to recognize and exchange data with each other.
Connection mediums such as cable or wire, wireless network can be made.
Network operating systems such as Windows 98, NT Server, Linux, Unix, Sansolaris Novell Network, etc.
Computers on each network are connected from a central location via a network hub or switch.
Network interface card
Usually the network interface card or LAN card is placed on the computer's motherboard. LAN cards make serial connections with RJ45 or BNC coaxial connector ports for data exchange over the network. On the other hand, it communicates with the computer through parallel connection. There are a few things to keep in mind when buying a LAN card.
Media type
Whether the network has the required connector port for the type of cable to use. For example - RTP45 connector for UTP cable and RJ45 port in LAN card is required. Again co-axial cable needs to have BNC connector. If you use fiber optic cable, you will need another type of port. Many LAN cards have both RJ45 and BNC ports.
Network type
Find out first what kind of network you will use the card on. Such as - Ethernet, (with a maximum speed of 10 mbps), Fast Ethernet (maximum speed 100 mbps) Tokening fiber distributed data interface FDDI (maximum speed 1 gbps) etc. Different networks use different LAN cards etc.
System bus type
The Lan card must be of the type in which the motherboard will fit (such as PCI or ISA). LAN cards are currently installed in PCI slots on most motherboards.
A special type of device for connecting a large number of computers to a hub or repeater network. The hub has a certain number of ports. LAN cards and hubs are connected by cable to similar ports. Suppose, for example, that the UTP cable is connected to the RJ45 port of the LANCARD by means of an RJ45 connector on one side. On the other hand with another RJ45 connector the other end of the cable will be stuck to the RJ45 port of the hub. The hub has different types of LED lights which show how many hub connections are on and how many are off.
Hub is a broadcast type device. It refuses to accept any data on any of its ports except for the specific port for which the data has been sent to other ports without actually judging it. In this way, during data exchange, strong data collation is created which reduces the speed of the right network.
A few advantages of the hub
The hub can be connected to another hub to provide additional connections to its port number. For example, one port of an 8-port hub can be connected to another 16-port hub cable to make connections to 8 and 15 ports, respectively, for a total of 22 ports.
Hub is well managed with SNMP or Simple network management protocol and its data transmission and receiving statistics can be seen.
Hub is a relatively inexpensive and affordable device.
Switch
The switch is a much smarter and more bandwidth device than the hub. The hub sends data packets from one Lan card to another port after receiving the data packet. Switch but it doesn't. Instead, when the switch receives a data packet at any of its ports, it checks the header of the data packet or the first few bytes (which can be compared to a letter envelope) to see who is the sender and recipient of the data packet and which data is sent through which port. The switch then sends the data packet to the recipient land card only through that particular port. This is why the switch temporarily creates a connection between the sender and the recipient LAN card. This connection automatically becomes invalid after data exchange.
So with the help of the switch, the traffic of data packet movement in the network can be facilitated by making multiple connections between different LAN cards in the same way. The switch is therefore a much more intelligent and effective device than the hub. Another good feature of the switch is full duplex support through which two computers can receive some data packets and send some data packets at the same time. Much like talking on a telephone line between two people. A person can hear and speak at the same time. On the other hand, in the case of half duplex communication, if one side does not finish speaking, the other side will not be able to speak. As in many wireless sets, when one speaks, the other listens. It is not possible to speak and listen at the same time.
There is a huge difference between the data transfer capabilities of hubs and switches. A single eight-port Ethernet hub supports a maximum of 10 megabytes per second of data transmission capacity that shares all of the hub's land cards. On the other hand, a full duplex, eight-port Ethernet switch supports a maximum of 160 megabits per second data transmission capacity.
There are different types of switches. E.g.
Crossbar switch
Sell backplane switch
Store forward switch
Repeater
If the distance from one computer in the network to another is too great, then the data is not transmitted properly from one computer to another. The amount of details and errors continues to increase. Maybe you want to connect two buildings to two local area networks or LANs. But the distance between the two buildings is a bit more which is tied up for data transmission. So as the data packet or signal from one computer goes to another computer, the value of the signal gradually decreases and does not reach the recipient computer properly. The device called repeater will solve such problems. When the repeater is placed in a convenient place between two separate LANs or two separate remote segments (or parts) of a LAN, the repeater amplifies or amplifies the incoming data signal through one of its ports and sends or broadcasts to other ports several times. The maximum number of repeaters that can be added to a network depends on the different capabilities of the network. For example, a maximum of 30 repeaters can be installed in a network of thin coaxial cable. Some of the notable features of the repeater are-
They only amplify the data signal. Does not filter data packets. However, if the data is not transmitted properly through any port of the repeater, the repeater can close that port or segment separately. Using a repeater can overcome the distance constraint on data transmission in the network, that is, data can be transmitted over long distances. This does not mean that data transmission speeds are high or that bandwidth is not available. It is possible to use a repeater even if two types of cables (such as coaxial and UTP) are used in a network. But it is not possible to use repeaters on networks of two different technologies (such as Ethernet and token rings).
The bridge works much like a repeater. But Brick offers some more benefits than repeaters. Using a bridge on a network, the network can be divided into several smaller parts. This can significantly reduce network data traffic. Just as a data packet is actually tested first by a bridge near a bridge, the data packet will not be in the incoming network segment but will go to an external segment. Another good feature of the bridge is that it can simultaneously segment different networks (e.g. Ethernet and token rings) that repeaters cannot.
Router
Routers are used in any complex network. The router does more than just switch and bridge tasks. A network may have multiple paths or routes to send data from one computer to another. In that case, after receiving the data packet from the computer, the router will calculate (based on the network address from the source address of the data packet and the router's own road map or routing table) to see which way the best data can be sent in the shortest time. Multiple ways of sending data packets to the destination can cause the router to do another job. After sending the data in one of the paths, it was seen that if the link is cut in the middle of that path or the data can no longer go, then the router will send the data packet properly using the alternative path. This means that the router can immediately or dynamically decide which way the data will go.
Anothergreat advantage of a router is that it can work seamlessly across different types of networks such as IP (Internet Protocol), or Appletalk Protocol. The router can also be used as a wide area network interface or socket.
Another useful thing can be done with a router. That is to ensure network security. The router can identify the data packet at its protocol level, which way to go or which way not to go. So at the entrance of any network, the router can be placed in the role of doorman or firewall. This means that with the router it can be done whether the data packets of other computers in the network outside your network can be inserted. This special feature of the router can be used to significantly increase network security. However, increasing data filtering reduces network performance.
The router can be remotely administered using SNMP. Broadcast Storm can also be isolated with a router.
Berauter
The router bridge and its good features are integrated into the broader. It filters data packets like a router just as it exchanges data between two different networks like a bridge.
Gateway
The presence of gateway devices is seen in networks of two different protocols where different data types or environments work. For example, suppose your PC is connected to an Internet service provider or ISP's network via a modem. The point-to-point dialup (PPP) protocol is used here. Again, if you connect that machine to Ethernet LAN with the help of LAN card, turn on the internet connection sharing option, then other LAN machines will use your machine as a gateway. When a data packet from the Internet goes to the computer next to you on the LAN, your gateway machine will change the data packet as needed.
Modem: Dialup networking
A device called a modem is used to transmit data from one computer to another via a telephone line. The function of the transmitter modem is to transmit digital data (which is in binary format) from one computer to analog through a telephone line to the customer modem on the other end of the computer. The modem on the other end can present this analog data in digital format. The whole work is divided into modulation and demodulation. And the word modem comes from both modulation and demodulation.
The main part of the modem is four power supply, subscriber interface, CPU, other circuits. The modem's CPU or central processing unit's own ROM is turned on from the chip and the temporary ROM is used for data storage. The function of this unit is to perform data compression and error detection.
The modem has a subscriber interface port for connecting the telephone cable. Data is transmitted through the telephone line through this port. There are two types of modems used in computers, internal and external. The internal modem can be inserted into the PCI or any other slot of the motherboard inside the computer. And the external modem can be connected to the computer's COM1 or COM2 port with the help of cable. The most important modem chip in the modem is for data modulation and demodulation. And the job of the power supply unit is to provide the required DC power supply to the modem at all times.
Most of the current modems transmit data at a speed of 56 kbps. Due to the limitations of the telephone line, it is not possible to get higher speeds with the help of the current V.90 standard modem.
Network cable or wire is required for data transmission from computer through LAN card. There are three main types of cables used in networks.
First is the coaxial cable which looks like cable TV or dish line cable.
Second, twisted pair cable.
And thirdly fiber optic cable.
Twisted pair wires work well on small networks. These are also quite cheap and easy to get. These two types of twisted pair are also available in the market in Shield and Unshield. These are known as STP and UTP respectively. They have different categories due to the difference in data transfer speed. E.g.
The 3rd, 4th and 5th categories of UTP cable are used for 10Base TX network cards. They have four conductors and are also known as RJ11 in the market.
Only the fifth category of UTP cable is used for other 100Base TX LAN cards.
Configuring Windows Network
Let's talk about network configuration in Microsoft Windows 98 / XP.
Driver installation
Start the Control Panel by clicking Settings> Control Panel on the Start menu on the Windows 98 desktop.
Click on the Add / Remove Hardware icon to bring up the Ed Hardware Windows.
Windows will first try to find the plug and play driver on its own. To do this, auto-detect by clicking the Next button once or twice. If auto detect is successful, show the location of your driver file. Usually the location of the floppy drive is specified as A:. And if auto detect is not successful, you have to choose the device type directly. Choose a network adapter for this. In the manufacturer list, select the name of the manufacturer of your LAN card (for example, Thricom, Realtech, Siorcom, etc.) or click on the Have Disk button and select the Windows 98 folder on the floppy drive. If the driver information file (* .inf) is found, Windows will install the driver automatically.
Finally restart the computer and install the driver will be complete. Now notice if Windows has got it right. To do this, right-click on the My Computer icon on the desktop and click Properties. Now click on Device Manager to see if there are network adapters between different devices in the device list. Click the + sign on the left to see if your LAN card is visible. If it does not come at this time, then you need to turn off the computer and put the LAN card in the PCI slot and reconfigure the LAN card as before. And if it seems that the LAN card has not been detected even after inserting it properly, then click on the refresh button.
Finally select your LAN card and click on the Properties button to see if the LAN card configuration is correct. If the configuration is correct, the message "This device is working property" will appear. If for some reason there is ‘Device Conflict’ then troubleshooting is required by changing the setting from BIOS.
If the network card is installed properly, the network neighborhood icon will appear on the desktop after restarting the computer. Clicking on it will display the names of all the computers in the network. But before that you have to configure it. Right-click on Network Neighborhood and select Properties. This will display the following windows.
Click on the Identification tab.
Enter any one name in the computer name. Enter a network name in the Work Group. The same name will be used on both computers. Let's say it's called Friend.
Now click on the Configure tab. If you select TCP / IP from the list and click Properties, the following window will appear.
Select Specify an IP address. Here you can see two cells of IP address and Subnet mask.
Enter 192.168.1.55 in the IP address field and Subnet mask 255.255.255.0. In case of second computer everything will remain the same only IP address 192.168.1.56 days. The IP address here is a familiar computer in a network that will never be the same on two computers, much like a roll number / ID number.
Now select Ok and return to the Configer tab.
Share files and printers by clicking on File & Printer Sharing here. Now restart the computer by Ok.
Configure the network in the same way on the second computer.
Server based networking in Linux
If you are familiar with the Linux operating system, let us know the basics of network setup in Linux.
Install and detect LAN card
If you install Linux while the machine has a Lan card attached, you will be given the option to detect and configure the Lan card at the time of installation. After installing Linux again, if you turn on the machine, it can be configured by auto-detecting the LAN card. However, if your Lan card is not auto detected to Linux, check with the floppy (or manufacturer's website) that comes with the LAN card to see if it has Linux support or what to do to get Linux support.
Ethernet 1st Lan card interface in Linux is known as eth0. Similar 2nd, 3rd lan card will be eth1, eth2 etc. Basically some information has to be given while configuring eth0.
Hostname - The computer name of the machine (eg My PC)
IP address - The network IP address of the machine
More on DNS, Gateway, Broadcast, etc. You should talk to your network administrator before providing such information.
Finish the cabling by inserting the RJ45 connector into the Lan card and Hub while the computer and hub are in power off.
Now you can use the previously discussed (Windows 98 method) for configuring Two Peer or Workshop Network.
This time both computers came under each other's network. Let's see how we can share files this time. Right-click on any folder in Windows Explorer and select Sharing. The following window will appear. From here select Shared as and click Ok in the share folder with a name. This time, when you go to Network Neighborhood and click on your computer, you will see your shared folders. Your folder can be viewed in this way from another computer.
Linux Networking Server
Linux is a unique and popular operating system for networking. The popularity of Linux is largely dependent on the availability of low-configuration hardware usage, open source, and the entire operating system, including open source code, so why not use Linux if you have full control of your system? Highly reliable Linux is used in large government or non-government organizations, hospitals or service organizations, ISPs (Internet Service Providers), banks, insurance companies, etc. Linux can also be used to get a variety of services on your office or network network. Let's see how such services are available from Linux.
Domain Name Service (DNS)
Any Linux machine can be easily configured and used as a network domain name server. The domain name server acts as a translator on any network. Domain name server is required for effective use of various services including network mail, database, web. [Let us give a small example to understand the work of the domain name server. For example, the IP (or introductory) addresses of the two machines in the network are 192.18.1.1 and 132.18.1.20 respectively and the two machines are named Machine 1 and Machine 2 respectively. If you do not have a DNS service on your network, you will need to use these four numbers repeatedly to send a message from the first machine to the second machine. For example- Ping command should be given in this way- Ping 192.18.1.2 now. If you want to identify a second machine by typing a name without typing the number repeatedly, you can do so with the help of DNS server. For example, with the Ping Machine 2 command, you can do the same thing if your machine has a DNS server or translator IP configured. This means that it must be configured on your machine. If you type any name, it will be converted to the appropriate IP with the help of a machine. It may be possible to remember the IP addresses of five to ten computers in the network, but it is impossible to work with IP addresses if the number of computers is large or the network is complex. In that case a DNS server will be able to do the job of converting you name to IP or IP to name. Information from around the world There are thousands of DNS servers on the World Wide Network or the Internet, so we can view the webpage of any machine without typing in the IP address.
Any network can have three types of DNS servers. Such as primary DNS server or master DNS server, secondary or slave DNS server and caching on DNS server. If the primary DNS server does not work for any reason, the DNS service works properly with the help of an alternative secondary DNS server. A third type of caching server can also be used to facilitate the work.
If there are 10-50 PCs in the network, there may be one or two or if there are more than 50, there may be two or more DNS servers. Again, even if a DNS server is primary for your network, it can act as a secondary for another network (e.g., ISP's network).
Each machine in Linux has a special file called / etc / hosts where the IP addresses and names of all the machines in the network are recorded. For this reason, you can get DNS service with the help of this Hosts file without making any machine a special DNS server.
Normally, if the number of computers in the network is more, it will not be convenient to write or edit the entry in the hosts file. So you need to configure a self-contained DNS server that will keep track of your network domain information and help you get information from other domains. This service is easily available by installing and configuring the Bind Berkel Internet Name Domain software on a Linux machine. Bind is a widely used tool. Which is able to give DNS service very reliably.
Mail service
Many of us are familiar with the Internet e-mail service. To get an e-mail account, we login to an ISP or website with a login name and password, which means you are then connected to a network. In order to provide e-mail or messaging services to the users of any network, a mail server is required. Its job is to keep the mail or messages sent by the users to its own and to deliver it to the recipient users when the machine is running or the path is clear. The whole system is compatible with the postal delivery system of the postal department. The Send mail tool has long been widely used to provide mail services in Linux. This tool has many configuration features. In addition to send mail, there are many other small mailing tools available on Linux. Any low configuration machine can be used as a mail server. Even a 48 model Pentium machine can act as a mail server in your network.
Web and database services
All the webpages we see on the internet are for the benefit of the web server. For example, if you enter www.yahoo.com into any browser software on your computer such as Netscape or Navigator or Internet Explorer, then the web page you will see will come from yahoo.com company's web server. The browser will find the web server and process the request for the desired page and send it to your browser. So you can put your company's website on a web server and present it to the world through the internet.
You can use the Apache web server software to configure a mission as a web server in Linux. Apache is a very popular web server tool. Currently, two-thirds of the world's web servers run on Apache. The reason behind this is that Apache is a web server developed by the combined efforts of many programmers which is able to support all types of web services well. Apache can be downloaded for free from the Internet (www. Apache.org). PHP and MySQL can be used effectively for web programming and database support in Apache, respectively. These will need to be used if you want to keep your webpage in a database form or something interactive.
Proxy and firewall services
It may be that the Internet connection is taken with the help of a modem in a single machine in a network. Now if you want to browse the internet from every machine in the network, you can configure this one connection for every user in the network. You can use a proxy server to do this. Again, you want to ensure that no machine on your network can access the Internet. In that case your network can't. In that case you can install a gatekeeper or gatekeeper machine in your network whose work is to check the data coming from outside before entering the network and filter out the harmful data. This doorman machine is called a firewall in terms of networking.
Firewalls act as the network's security guard to protect the network from harmful intrusions. If you wish, you can use the network's firewall machine as well as a proxy. Again, using a separate proxy server is quite effective.
Linux has built-in firewall and proxy support. In case of firewall, the machine can be configured as low, high or medium firewall.
Configuration server
Manually configuring many machines on your network at once can be a hassle. For example, you can use a configuration server to configure each machine with a lot more information, starting with the IP address. For example, if your network uses a Dhcp protocol, it will collect the IP address from the server and configure the network. This is how ISPs provide automatic IP addresses to your machine through dial-up networks or phone lines. If you have a large number of computers in your network, you may want to consider using such a server.
Another similar protocol similar to Dhcp can be used to configure a Bootp server using Bootp to do almost the same thing.
NIS is one of the configuration servers in Linux. With NIS or Network Information System, it is possible to configure different types of information including the required name, IP of each machine of your company. In this case one or two NIS servers are enough. The use of NIS in Linux is quite old and it is still used effectively.
File print and news server
There are different types of servers used for file sharing between two machines in the network. For example, if both machines run on Linux, files can be shared using the NFS file server. NFS or network file system is a system of file sharing in Unix or Linux. In this way, if you share a directory or drive of the server machine, it can be accessed from the client machine just like the local hard disk.
SAMBA Server is used for file and print sharing between Linux and Windows machines on a network. If this tool is installed and configured on a Linux machine, you can easily read and write files from a Windows machine to a Linux machine.
Configuring a machine as a print server means that the task of that mission will be to print from a machine on the network using a printer attached to it. Even if there is only one printer in a network, it can be connected to a print server and printed smoothly from all the machines.
The job of a news server is to download news from the Internet and make it accessible to other machines on the network. For example, if the e-mail or data that comes in the name news group is downloaded to your news server, it can be easily accessed from other machines in the network.
One or more servers can be configured as desired on any Linux machine. However, if the network load is high, it is better to install the servers on separate machines. In this case, you can download the source code of the servers from the Internet, compile and install it on a Linux machine, and also use the RPM package that comes with various Linux distributions. If the first method is a little difficult in the workplace, it is hassle-free and more reliable.
Last word
For those who want to know and understand real networking, this is our cover article. In addition to explaining the different terminology of professional networking, this year's cover essay we have tried to discuss the different steps of networking directly. How to do networking on operating systems like Windows and even Linux has come up in this report.
Hopefully technically this cover essay will benefit those interested in the network world. Interested parties are requested to keep an eye on our networking department in the future. If you have any other information about networking, you can contact us by letter or email.