Network Infrastructure


Switch Network switch or switching hub, bridging hub switch, What is a switch? Switch is a device in a computer network, just like a Hub serves to connect other devices together in the system. It uses packet switching, which receives, processes, and forwards data to the destination. Just one or more ports is not broadcast to all ports like a Hub.

Network switch play a large role in Ethernet local area networks (LANs). From medium to large systems, A LAN consists of a number of switches that manage the network, for example Small office/home office (SOHO) may use a single switch to a small office or residence which in the end may be used to connect to the router to use to connect to the internet or make Voice over IP (VoIP)

Packet Switching is a technology used for transmitting information by dividing data into multiple packets to make them smaller and then spread out through the network in different routes with different speeds because Packet Switching will find the proper path from the end to the destination for each packet if any packet goes wrong or can’t be forwarded. The system will immediately retransmit the packet. And when all the information has reached the recipient the destination computer will sequence data from received packets correctly.


  • Flexibility This network allows multiple systems to be used simultaneously without each application system interfering with each other but used through the same exchange.
  • Robustness is strong If one of the routes is damaged then another route can be used. Source and destination devices can be transmitted at different speeds because the junction will convert the signal to the compatible speed.
  • Responsiveness The accuracy of the information transmitted is guaranteed. Make the system highly reliable can be used in systems that interact with speed, the Interface Message Processor (IMP) is able to perform some additional tasks, such as error checking before forwarding or maybe change the code first.


  • Sometimes if a large number of packets are coming in at the same time, IMP will not be able to work in time. May cause some packets to be lost.
  • Delay during transmission = length of package / size of overhead data rate Package size has uncertain size
  • Packages, each package may run in different directions, each route has different delays, which causes problems for packages sent later to arrive first. The receiving party must have a more complicated way of handling packages.
  • If there is a lot of delay, there will be congestion in the network.
  • An overhead occurs in a transmission where the overhead occurs is the address of the destination, sequence, which results in less transmission. Resulting in reduced transmission efficiency.

The benefits of packet switching are: There is very little transmission error. Able to manage the problem of network traffic congestion. And can share the network with many users with low cost Packet Switching technology is currently being used in ATM machines and GPRS systems on mobile phones.

In implementing the switch in the network we can design it to suit our business applications. Switches are usually divided according to the application, which are small series, medium series, high series and highest series.

And in addition to bringing the right equipment to help design networking for small, medium, large businesses or businesses with multiple storefronts. At present, there is also the ability to manage the network through the cloud system, which makes it easy to manage. And easy to track work It also supports the use of IoT devices as well.


The hottest wireless technology right now is Wi-Fi 6, also known as 802.11ax. The focus is on connecting multiple devices to your wireless network at the same time, not comparing speeds. Next it is a management for the Client to get the speed that is suitable for use.


Institute of Electrical and Electronics Engineers (IEEE) and Wi-Fi Alliance They worked together to identify the scope of improvements to the current standard (802.11ac). The conclusion is a focus on performance under “typical” conditions to enhance the performance of the entire network holistically. It focuses on the highest advanced data rates under “perfect” conditions. A new standard called 802.11ax was released in early 2018 and was recently renamed Wi-Fi 6 by the Wi-Fi Alliance. Optimization of the way access points handle devices simultaneously. It’s no longer about comparing Wi-Fi speeds.

Institute of Electrical and Electronics Engineers (IEEE) and Wi-Fi Alliance They worked together to identify the scope of improvements to the current standard (802.11ac). The conclusion is a focus on performance under “typical” conditions to enhance the performance of the entire network holistically. It focuses on the highest advanced data rates under “perfect” conditions. A new standard called 802.11ax was released in early 2018 and was recently renamed Wi-Fi 6 by the Wi-Fi Alliance. Optimization of the way access points handle devices simultaneously. It’s no longer about comparing Wi-Fi speeds.

This latest standard is not only provide higher speed but it also enables new business services and use cases, including:

  • IT/IoT Convergence and Smart Building Deployment.
  • Real-Time application support for collaboration with video collaboration and Virtual Reality Secure Wi-Fi in enterprise and open networks.

What are the advantages / Advantages of Wi-Fi6 over Wi-Fi5, Wi-Fi4 that are commonly used at home? Why use Wi-Fi 6?

  • If only one device is connected to the router the maximum speed that the device will be able to do is about 40% more than Wi-Fi 5 because of the efficiency of encoding data because it can compress more data into the same frequency band. So whether it’s 2.4 GHz or 5 GHz, Wi-Fi 6 performs better.
  • Save device battery with target wake time feature. This is the ability to allow Access Points (APs) to talk to connected devices to pause sending or receiving data, simply put, it’s sleep mode. It also supports the use of IoT devices.
  • The average per device is higher than before in crowded applications. Therefore, whether it is used in public or in homes with multiple devices It has increased speed as well.

The value of using Wi-Fi6 compared to Wi-Fi5, Wi-Fi4

  • Due to the success of the 802.11ac standard that exceeded expectations. And the arrival of the 802.11ax standard in the future, many people may doubt that. If we switched to 802.11ac Wave 2 wireless networking now, how much would it be worth the investment?
  • The challenges of today’s Wi-Fi systems are Setting up the system to support high-density areas such as hospitals, schools, stadiums, condos, etc., and in addition to having to be connected also need to work quickly Efficient as well, which the 802.11ax standard is designed to meet this point.
  • 802.11ax focuses on increasing user experience.
  • The pre-existing 802.11 standard focuses on maximizing throughput, ignoring user usage. Until the 802.11ac Wave 2 standard began to feature MU-MIMO. To allow each user to achieve slightly faster throughput, the 802.11ax standard focuses on delivering a truly great user experience. Performance in high-traffic areas including the impact on the battery power used in the case of a portable device, etc.
  • There is also the issue of outdoor Wi-Fi, which is now known to be growing rapidly. Wi-Fi systems are installed on the streets, public transportation systems. and public areas which must focus on the stability of the signal And avoid external interference, the 802.11ax standard also addresses this point.
  • 802.11 Wave 2 is 2x faster, while 802.11ax is 5 – 10x faster. In our demo test, 802.11ac Wave 2 provides approximately 2x better performance than 802.11ac Wave 1. However, 802.11ax benchmark tests show saw that has increased performance from the original up to 5-10 times (Huawei tested at a maximum speed of 10.53 Gbps and expected a theoretical maximum speed of 14 Gbps) would it be worth it to wait to upgrade the system at once?

In using wireless enterprise level, it is recommended to use the wireless controller to manage the wireless system. What are the advantages of having a wireless controller that is superior to using a general Access Point?

Highlights of the Wireless Controller:


Bandwidth on Access Points is Total Wireless, unlike switches that are 100Mbps 1Gbps per port, so for enterprise wireless products, we will find that the starting point is about 867Mbps, 1.7Gbps and reaches 2.6Gbps, which is different from the consumer group that will see advertisements for 100Mbps, 300Mbps, some people may think that it’s already 300Mbps, but think about 100 people using 300Mbps, it will run only 3 Mbps per person because nowadays streaming is done together as life Content VDO that looks like it’s playing, whether on Facebook, Youtube, LINE, not including Snapchat and Instagram Stories groups.

2. WIRELESS A single name can be created

For the use in the consumer group that we see in the market, it will be found that 1 AP 1 name will walk anywhere, you have to stick to the name indefinitely. But for the enterprise group, that’s not. It can work through a wireless controller, making it the only name for Wi-Fi. Just like when we go to the mall, we are on the island of AIS, DTAC, True. Connected once walking across the country no need to go to a new connect for example. This will enable organizations to manage wireless more efficiently.

3. CLIENTLINK helps manage different devices

For real use we will find that the devices that come to the wireless connect have a variety of speeds. Whether the old 11a/g or the new 11n/ac, so without a good management system. will reduce the efficiency of work.


4. Eliminate interference problems

As wireless becomes popular, we find that there are many. Devices that use such signals as well, whether microware, Bluetooth headphones and even the Internet of Thing, all emit wireless signals. If there is no technology to help It will make the use of Wireless inefficient. This allows us to find the missing or not receiving the requested information. by dodging the signal on the channel that is not out.

5. Easy management via WEB MANAGE or MOBILE APP

If talking about the past We will find that we have to plug in the console. Must be proficient. Do that and do a lot. Today’s work is easier. Just plug the POE into the Access Point, we will find that access point on our computer and start Setting. You can access settings on either computer, iPad or even mobile app.


Everything is virtual these days, wireless as well. Newer Access Point devices will find that there is no separate Wireless Controller box because the Access Point can act as a master or controller.

7. High performance security system

Wireless networking with built-in security, security functions include connecting to an authentication system, assigning and controlling user access rights to the wireless network, end-to-end encryption. State-aware firewall , There is a spectrum analysis system and protection against threats on wireless networks (Wireless IPS), etc.



Next Generation Firewall (NGFW) It is a highly effective firewall. and able to deal with complex threats by various functions Added is different from the general Firewall is that the application layer access can separate the use of the application Layer from using the LINE program, Facebook, YouTube or what type of program Makes it possible to set policies to control the use of those applications, for example within the organization setting the right not to use YouTube during working hours, etc. also have:

  • IPS (Intrusion Protection System) Intrusion detection and response system when it detects information of a nature that poses a risk to the network It will prevent that information from entering the network.
  • Antivirus To enhance the effectiveness of protection against common viruses such as Malware, Trojan, Spy Ware, etc., that will enter the network to damage data or computer systems.
  • Network security equipment (Firewall) is a need for more advanced network technology (Next Gen Firewall).
  • Get more traffic (High Performance)
  • Including durability in service (High Availability)

In addition, there must be a network security reporting system. for administrators and administrators get the right information Helping to analyze the work efficiency. Therefore, there must be an excellent network security system (Firewall) for effective information security as well as being able to provide computer networking services safely and with maximum efficiency.

Next generation firewall secure your network and more ability

(Software-Defined Wire-Area-Network)

Software-Defined Wide-Area Network (SD-WAN) It is a technology that connects the head office and branch offices that are scattered whether in or out of the country. With the strengths that increase the efficiency of connecting applications equal to that of MPLS connections at many times cheaper. It’s still stable. secure and easy to manage from the center As a result, many organizations around the world are starting to pay more attention to SD-WAN technology.

For organizations that are already connected between branches with MPLS or other connections, having a redundant link to be prepared for when the primary link fails or crashes can improve business continuity, but the MPLS investment is. Alternate links can be exorbitant. Plus, it doesn’t help benefit when the main link is still usable. SD-WAN is cheaper to help meet this point. By dividing the traffic of enterprise-critical business applications run on MPLS, while general traffic runs on SD-WAN instead, reducing the burden on the primary link. and make the most of the backup link at the same time.

Gartner defines four features of SD-WAN:

  • Must support multiple connections such as MPLS, LTE, Internet, etc.
  • Dynamic path selection, such as load sharing across the WAN
  • Has a very easy to use interface, supports Zero-touch Provision, can be used as easily as a home Wi-Fi.
  • Support for VPN or third-party services such as Wan Optimization Controller, Firewall, Web Gateway, etc.

SD-WAN (Software-Defined Wide-Area Network)

Solving the grievances of the SD-WAN:

1. Does SD-WAN require hardware to be purchased as well? Or is it just the software as its name suggests?

  • It is hardware managed by specific software that runs in the device.

2. Abbreviations such as MPLS should be noted what they are. Readers may not be 100% technical.

  • MPLS is a label-based Switching that can be used for multiple protocols, it’s similar to a local translation. But just literal translation probably doesn’t define the word MPLS. Generally, an MPLS provider is a Provider. A Provider router that provides MPLS services is called a PE (Provider Edge) or a router that is connected to a customer. As for the router that is in the core, we can’t continue. To disappear further MPLS cannot be used at that point because MPLS can only be used at the PE point. Which one is the direction of the input data is called Ingress Router and the output data is Egress Router.

3. SD-WAN Edge, SD-WAN Orchestrator is Hardware or Software? It’s not said.

  • SD-WAN Edge: Refers to SD-WAN at the destination address, e.g. by branch in each region.
  • SD-WAN Orchestrator: The design manages all SD-WAN from a central location. This makes it easy to maintain SW/HW.

Network Management

Network Management Act as the control center and watch the network have a warning system when any part of the network is malfunctioning or crashes Let administrators know immediately and go in to make corrections quickly. The main function of the NMS is to monitor the network at all times. Make a report on network usage statistics. For example, statistics of traffic, user volume, can be graphed for system administrators to analyze and plan network expansion. Administrators can also monitor and modify the system from a central point. Including software installation system configuration for distant network devices NMS is a large network device. Or a public network service provider with a large number of subscribers is required. Because it is a device that makes monitoring the system more efficient. Nowadays, even the Intranet has various devices. As the combination becomes more complex, NMS plays an important role in the administration and management of Intranet networks.

Network Management It is the process of maintaining and managing computer networks. Services provided in accordance with this regulation include fault analysis, performance management, network provisioning, and service quality maintenance. Software that allows network administrators to perform their functions is called network management software network management also discovers network devices and creates a network topology map. The network view is created this way and whenever you click a network device in this map you will be able to access the selected device. You can configure, manage and operate this device.

AI and Machine Learning, combined with additional resources, proactively optimize your network and provide a better user experience.

Network Management Benefits :

  • Save time: Noise and false positives are minimized while the issues that have the greatest impact on your network are correctly identified.
  • Reduce workload: AI-powered technology can proactively find the root cause of your biggest network problems quickly.
  • Fast Troubleshooting: Machine learning algorithms, automatic correction options for quick troubleshooting
  • Helping you excel: Your network’s performance increases while you spend less time running and troubleshooting.

SSL VPN (Secure Socket Layer Victual Private Network)

SSL VPN (Secure Sockets Layer + Virtual Private Network)

It is a feature of providing networking services only within the organization that can be used. By using public networks or the Internet as a medium for transmitting information between departments within the organization By using data encryption to create a virtual network. So that the information transmitted together remains secure. And still maintain the confidentiality of the information as if it was sent within the organization.

SSL VPN is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol, or often its successor, the Transport Layer Security (TLS) protocol in standard web browsers to provide security. Ability to access VPN remotely SSL VPN allows any Internet-connected device to establish a secure remote access VPN connection with a web browser. SSL VPN connections use end-to-end (E2EE) encryption to protect data transmitted between Endpoint client software with SSL VPN server through which clients connect securely to the Internet.

SSL VPN Basic Diagram

SSL VPN There are appliance box, Virtual Machine and could service both as SSL VPN only and feature on Next gen firewall.

SSL VPN Client Can download dynamically allows users to access the network and connect to enterprise applications. There is a helper that is easy to use. which makes deployment easier. And a powerful tool to monitor and manage sessions in real time is a single device VPN, security and routing solution.

In addition, we can bring Multi Factor Authentication to increase the security for users to use VPN in the corporate network.