Friday, March 20, 2026

តើαž”αž…្αž…េαž€αžœិαž‘្αž™ា TRILL αž“ិαž„ SPB αž‡ួαž™αž’្វីខ្αž›ះαžŠαž›់ Spine-Leaf?

 αž“ៅαž€្αž“ុαž„αžŸ្ថាαž”αž្αž™αž€αž˜្αž˜αž”αžŽ្តាαž‰ Spine-and-Leaf αž”αž…្αž…េαž€αžœិαž‘្αž™ា TRILL (Transparent Interconnection of Lots of Links) αž“ិαž„ SPB (Shortest Path Bridging) ត្រូαžœαž”ាαž“αž”្រើαž”្រាស់ដើម្αž”ីαž‡ំαž“ួαžŸαž”្αžšαž–័αž“្αž’αž…ាស់ STP (Spanning Tree Protocol) ដែαž›αžែαž„αžែមាαž“αž”αž‰្ហាαž…្រើαž“

αž”αž…្αž…េαž€αžœិαž‘្αž™ាαž‘ាំαž„αž–ីαžšαž“េះαž‡ួαž™αžŠαž›់ Spine-Leaf តាαž˜αžšαž™ៈαž…ំណុαž…αžŸំខាαž“់αŸ—αžŠូαž…αžាαž„αž€្រោម៖
  • αž”αž„្αž€ើαž“αžŸαž˜αž្αžαž—ាαž– (Performance) αž“ិαž„αž”្αžšαž–័αž“្αž’αž”αž˜្រុαž„αž‘ុαž€ (Redundancy)៖ αž–ួαž€αžœាαž‘ាαž‰αž™αž€αž’αž្αžαž”្αžšαž™ោαž‡αž“៍αž–ីαž€ាαžšαžαž—្αž‡ាαž”់ខ្សែαž€ាαž”αž…្រើαž“αž្វែαž„αž‚្αž“ា (Redundant links) ដើម្αž”ីαž”αž„្αž€ើαž“αž›្αž”ឿαž“ αž“ិαž„αž—ាαž–αžšឹαž„αž˜ាំαžšαž”αžŸ់αž”្αžšαž–័αž“្αž’ ដោαž™αž˜ិαž“αž”αž„្αž€ើតឱ្αž™αž˜ាαž“αž”αž‰្ហាαž‡ាαž“់αž‚្αž“ា ឬ Switching loops αž“ោះទើαž™
  • αž”ើαž€αžŠំណើαžšαž€ាαžšαž‚្αžšαž”់αž•្αž›ូαžœαžαž—្αž‡ាαž”់αž‘ាំαž„αž’αžŸ់៖ αž‡ាαž€់ស្តែαž„ αž”αž…្αž…េαž€αžœិαž‘្αž™ា SPB ដំណើαžšαž€ារដោαž™αžšαž€្សាαž‘ុαž€αž‚្αžšαž”់αž•្αž›ូαžœαžαž—្αž‡ាαž”់αž‘ាំαž„αž’αžŸ់ (All potential paths) ឱ្αž™αž“ៅαžŸαž€αž˜្αž˜αž‡ាαž“ិαž…្αž… (Active) αž–្αžšαž˜αž‘ាំαž„αž‡ួαž™αžšៀαž”αž…ំαž›ំហូαžšαž‘ិαž“្αž“αž“័αž™αž€ាត់តាαž˜αž•្αž›ូαžœαž‘ាំαž„αž“ោះαž€ុំឱ្αž™αž˜ាαž“αž€ារវិαž›αž‡ុំ (Loops) ដែαž›αž“េះαž‡ួαž™αž’្វើឱ្αž™αž”្រសើរទើαž„αž™៉ាαž„αž្αž›ាំαž„αžŠαž›់ដំណើαžšαž€ាαžšαž“ៃαž”្αžšαž–័αž“្αž’αž”αžŽ្តាαž‰αž‘ាំαž„αž˜ូαž›
  • αž—ាαž–αž†αž”αž‚្αž“ាαž€αž˜្រិតខ្αž–αžŸ់៖ αž”αž…្αž…េαž€αžœិαž‘្αž™ាαž‘ាំαž„αž“េះ (ដូαž…αž‡ា SPB αž‡ាដើម) ដំណើαžšαž€ាαžšαž“ៅស្αžšαž‘ាαž”់αž‘ី៣ (Layer 3) αž‡ំαž“ួស αž¬αž”αž“្ថែαž˜αž–ីαž›ើស្αžšαž‘ាαž”់αž‘ី្ (Layer 2) ដែαž›αž’្វើឱ្αž™αž–ួαž€αžœាαž€ាαž“់តែមាαž“αž—ាαž–αž†αž”αž‚្αž“ាαž‘ៅαž“ឹαž„αž”αž…្αž…េαž€αžœិαž‘្αž™ាαž•្សេαž„αŸ— αž‡ាαž–ិសេαžŸαž–ិαž’ីαž€ាαžšαžαž—្αž‡ាαž”់ដែαž›αž្រូαžœαž”ាαž“αž”្រើαž”្រាស់αž“ៅαž›ើαž”្αžšαž–័αž“្αž’αž”αžŽ្តាαž‰αžšαž€្សាαž‘ុαž€αž‘ិαž“្αž“αž“័αž™ (Storage networks) តែម្αžαž„

តើ Spine-Leaf architecture ដំណើαžšαž€ាαžšαž™៉ាαž„αžŠូαž…αž˜្តេαž…?

αž™ោαž„αžាαž˜αž―αž€αžŸារ ស្ថាαž”αž្αž™αž€αž˜្ម Spine-and-Leaf (ដែαž›αž‚េស្αž‚ាαž›់ថាαž‡ា Collapsed core architecture ឬ CLOS network) αž‚ឺαž‡ាαž€ាαžšαžšαž…αž“ាαž”αžŽ្តាαž‰αž‡ំαž“ាαž“់ថ្មី ដែαž›αž្រូαžœαž”ាαž“αž”αž„្αž€ើតទើαž„αžŠើម្αž”ីαž‡ំαž“ួαžŸαžšαž…αž“ាសម្αž–័αž“្αž’αž”αžŽ្តាαž‰ ៣ ស្αžšαž‘ាαž”់αž”ែαž”αž”្αžšαž–ៃណី ដោαž™αž’្វើαž€ាαžšαž”αž„្រួមស្αžšαž‘ាαž”់ Core αž“ិαž„ Distribution αž”αž‰្αž…ូαž›αž‚្αž“ាαž‘ៅαž‡ាស្αžšαž‘ាαž”់តែមួαž™αž ៅថា Spine។ វាត្រូαžœαž”ាαž“αž‚េαž”្រើαž”្រាស់ស្αž‘ើរតែαž‘ាំαž„αžŸ្រុαž„αž“ៅαž€្αž“ុαž„αž”្αžšαž–័αž“្αž’ Data Center αž–្រោះវាαž•្αžαž›់αž“ូαžœαž›្αž”ឿαž“αž›ឿαž“αž€αž˜្រិតខ្αž–αžŸ់
ដំណើαžšαž€ាαžšαž“ៃαž€ាររៀαž”αž…ំ αž“ិαž„αž€ាαžšαž”αž‰្αž‡ូαž“αž‘ិαž“្αž“αž“័αž™αž€្αž“ុαž„αžŸ្ថាαž”αž្αž™αž€αž˜្αž˜αž“េះមាαž“αž›αž€្ខណៈដូαž…αžាαž„αž€្រោម៖

  • ស្αžšαž‘ាαž”់ Spine (αž†្ធឹαž„αž្αž“αž„)៖ ដើរតួαž‡ាαž”αžŽ្តាαž‰αž€αžŽ្តាαž› (Backbone) ដ៏αž›ឿαž“αž”ំαž•ុត αž“ិαž„αž˜ាαž“αžួαž“ាαž‘ីត្រឹមតែαžαž—្αž‡ាαž”់αž‘ៅαž€ាαž“់αž‚្αžšαž”់ម៉ាស៊ីαž“ Leaf switches αž‘ាំαž„αž’αžŸ់αž€្αž“ុαž„αž‘αž˜្αžšαž„់αž‡ាαž”αžŽ្តាαž‰ Mesh តែαž”៉ុណ្ណោះម៉ាស៊ីαž“ Spine switches មិαž“αž្រូαžœαž”ាαž“αž’αž“ុαž‰្αž‰ាតឱ្αž™αžαž—្αž‡ាαž”់αž‚្αž“ាαž―αž„αž“ោះαž‘េ ហើαž™αž‡ាαž‘ូαž‘ៅវាαž”្រើαž”្រាស់αž”αž…្αž…េαž€αžœិαž‘្αž™ា OSI layer 3 សម្រាαž”់រៀαž”αž…ំαž…αžšាαž…αžšαžŽ៍αž‘ិαž“្αž“αž“័αž™
  • ស្αžšαž‘ាαž”់ Leaf (ស្αž›ឹαž€)៖ មាαž“αžួαž“ាαž‘ីαžαž—្αž‡ាαž”់αž•្αž‘ាαž›់αž‘ៅαž€ាαž“់ម៉ាស៊ីαž“αž˜េ (Servers) αž¬αž§αž”αž€αžšαžŽ៍αž…ុαž„αž€្រោαž™αž“ាαž“ា ហើαž™αžœាធាαž…αž”្រើαž”្រាស់αž”αž…្αž…េαž€αžœិαž‘្αž™ា Layer 2 ឬ Layer 3 αž”ាαž“
  • αž›αž€្ខខណ្αžŒαž“ៃαž€ាαžšαžαž—្αž‡ាαž”់ αž“ិαž„αž›ំហូαžšαž‘ិαž“្αž“αž“័αž™៖ ម៉ាស៊ីαž“ Leaf switch មិαž“αž’ាαž…αž‘ាαž€់αž‘αž„ αž¬αžαž—្αž‡ាαž”់αž‘ៅαž€ាαž“់ Leaf switch មួαž™αž•្សេαž„αž‘ៀតដោαž™αž•្αž‘ាαž›់αž”ាαž“αž‘ើαž™ αž–ោαž›αž‚ឺរាαž›់αž‘ិαž“្αž“αž“័αž™αž‘ាំαž„αž’αžŸ់ត្រូវតែរត់αž€ាត់ស្αžšαž‘ាαž”់ Spine αž‡ាដាαž…់ខាត។ αž…ំណែαž€αž―αž˜៉ាស៊ីαž“αž˜េ (Servers) αž€៏មិαž“αž’ាαž…αž—្αž‡ាαž”់αž‘ៅαž€ាαž“់ Spine ដោαž™αž•្αž‘ាαž›់αž”ាαž“αžŠែរ αž‚ឺត្រូαžœαž†្αž›αž„αž€ាត់ Leaf αž‡ាαž“ិαž…្αž…។ αž€ាαžšαž’្វើαž”ែαž”αž“េះαž’ាαž“ាថា រាαž›់αž€ាαžšαž”αž‰្αž‡ូαž“αž‘ិαž“្αž“αž“័αž™αž–ី Leaf មួαž™αž‘ៅαž€ាαž“់ Leaf មួαž™αž‘ៀαžαž‚ឺត្រូαžœαž…ំណាαž™αž€ាαžšαž›ោតតែ ្ αžαž„់αž”៉ុណ្ណោះ (two hops) αž‘ោះαž”ីαž‡ាαž–ួαž€αžœាαž“ៅαž‘ីតាំαž„αžŽាαž€៏ដោαž™
ធត្αžαž”្αžšαž™ោαž‡αž“៍αž…αž˜្αž”αž„αŸ—αžšαž”αžŸ់ស្ថាαž”αž្αž™αž€αž˜្ម Spine-Leaf រួមមាαž“
  • αž€ាត់αž”αž“្αžαž™αž—ាαž–αž™ឺαžαž™៉ាវ (Decreased latency)៖ ដោαž™αžŸាαžšαž‚្αžšαž”់ Leaf αž—្αž‡ាαž”់αž‘ៅαž€ាαž“់αž‚្αžšαž”់ Spine αž’្វើឱ្αž™αž‘ិαž“្αž“αž“័αž™αž’្វើដំណើαžšαž†្αž›αž„αž€ាត់αž§αž”αž€αžšαžŽ៍តិαž…αžαž„់αž‡ាαž„αž˜ុαž“ (Fewer hops)។
  • αž”្αžšαž–័αž“្αž’αž”αž˜្រុαž„αž‘ុαž€αžŠ៏រឹαž„αž˜ាំ (Improved redundancy)៖ ដោαž™αžŸាαžšαž€ាαžšαžαž—្αž‡ាαž”់αž‡ាαž‘αž˜្αžšαž„់ Mesh αž”្រសិαž“αž”ើមាαž“αž្សែαž—្αž‡ាαž”់ណាមួαž™αžŠាαž…់ វាαž“ៅតែមាαž“αž”្αžšαž–័αž“្αž’αž”αž˜្រុαž„αž‘ុαž€αžŠើម្αž”ីαž”αž“្តដំណើαžšαž€ាαžšαž”ាαž“។
  • αž”αž„្αž€ើαž“αžŸαž˜αž្αžαž—ាαž– αž“ិαž„αž—ាαž–αž‘ូαž›ំαž‘ូαž›ាαž™ (Increased performance and scalability)៖ វាαž‡ំαž“ួαžŸαž”្αžšαž–័αž“្αž’ STP ដ៏មាαž“αž”αž‰្ហាαž…្រើαž“ αž˜αž€αž”្រើαž”αž…្αž…េαž€αžœិαž‘្αž™ាថ្មីαŸ—αžŠូαž…αž‡ា TRILL αž“ិαž„ SPB វិαž‰ αž–្αžšαž˜αž‘ាំαž„αž•្αžαž›់αž“ូαžœαž•្αž›ូαžœαž†្αž›αž„αž€ាត់αž…្រើαž“ αž’្វើឱ្αž™αž”្αžšαž–័αž“្αž’αž˜ិαž“αž„ាαž™αž€αž€αžŸ្αž‘ះαž“ៅαž–េαž›αž–αž„្រីαž€αž’ំ។
  • សុវត្ថិαž—ាαž–αž្αž–αžŸ់ αž“ិαž„αž…ំណាαž™αžិαž… (Increased security and Reduced expense)៖ αž’αž“ុαž‰្αž‰ាតឱ្αž™αž˜ាαž“αž€ារត្រួαžαž–ិαž“ិត្αž™αžŸុវត្ថិαž—ាαž–αž…αžšាαž…αžšαžŽ៍αž‘ិαž“្αž“αž“័αž™αž”ាαž“αž‚្αžšαž”់αž‘ិសដៅ រួαž˜αž‘ាំαž„αž…αžšាαž…αžšαžŽ៍រវាαž„αž˜៉ាស៊ីαž“αž“ិαž„αž˜៉ាស៊ីαž“αž€្αž“ុαž„αž”αžŽ្តាαž‰αž•្αž‘ៃαž€្αž“ុαž„ (East-west traffic) ហើαž™αž•្αž“ែαž€αžšឹαž„αžšαž”αžŸ់វាαž€៏មាαž“αžαž˜្αž›ៃថោαž€αž‡ាαž„αž˜៉ាស៊ីαž“αž€្αž“ុαž„αž‘αž˜្αžšαž„់ ៣ ស្αžšαž‘ាαž”់αž…ាស់αž•αž„αžŠែរ។

North-South traffic αž“ិαž„ East-West traffic

 αž“ៅαž€្αž“ុαž„αž”្αžšαž–័αž“្αž’αž”αžŽ្តាαž‰ (Networking) αž–ាαž€្αž™αžា North-South traffic αž“ិαž„ East-West traffic ត្រូαžœαž”ាαž“αž”្រើαž”្រាស់ដើម្αž”ីαž–ិαž–αžŽ៌αž“ាαž–ីαž‘ិសដៅαž“ៃαž…αžšាαž…αžšαžŽ៍αž‘ិαž“្αž“αž“័αž™៖

  • East-West Traffic (αž…αžšាαž…αžšαžŽ៍αž‘ិαž“្αž“αž“័αž™αž–ីαž€ើαžαž‘ៅαž›ិαž…)៖
    • សំដៅαž›ើαž›ំហូαžšαž…αžšាαž…αžšαžŽ៍αž‘ិαž“្αž“αž“័αž™αžšαžœាαž„αž§αž”αž€αžšαžŽ៍ឬម៉ាស៊ីαž“αžŠែαž›αžŸ្ថិαžαž“ៅαž€្αž“ុαž„αž”αžŽ្តាαž‰αž˜ូαž›αžŠ្αž‹ាαž“αžែមួαž™ (local segment) αž¬αž“ៅαž€្αž“ុαž„ Data Center αž‡ាមួαž™αž‚្αž“ា
    • αž§αž‘ាហរណ៍៖ αž€ាαžšαž”αž‰្αž‡ូαž“αž‘ិαž“្αž“αž“័αž™αžšαžœាαž„ Web server αž“ិαž„ Database server ដែαž›αžŸ្ថិαžαž“ៅαž€្αž“ុαž„ Data Center តែមួαž™, αž€ាαžšαžαžαž…αž˜្αž›αž„αž‘ិαž“្αž“αž“័αž™ (database replication), αž€ាαžšαž•្αž‘េαžšαž―αž€αžŸារ (file transfers), αž“ិαž„αž€ាαžšαž”្រាស្រ័αž™αž‘ាαž€់αž‘αž„αžšαžœាαž„αž€αž˜្មវិαž’ីαž€្αž“ុαž„αž˜៉ាស៊ីαž“ (interprocess communication) αž‡ាដើម
    • αž…αžšាαž…αžšαžŽ៍αž”្αžšαž—េαž‘αž“េះαž‡ាαž‘ូαž‘ៅមិαž“αž†្αž›αž„αž€ាត់αž…េαž‰αž‘ៅαž€្រៅαž”αžŽ្តាαž‰αž“ោះαž‘េ ដោαž™αžœាαž’្វើαž…αžšាαž…αžšαžŽ៍ត្រឹមតែαž€αž˜្រិត Access ឬ Distribution layers តែαž”៉ុណ្ណោះ។ វាαž€៏ត្រូαžœαž”ាαž“αž‚េហៅថាαž‡ាαž…αžšាαž…αžšαžŽ៍តាαž˜αž‘ិαžŸαž•្ដេαž€ (lateral traffic) αž•αž„αžŠែរ
  • North-South Traffic (αž…αžšាαž…αžšαžŽ៍αž‘ិαž“្αž“αž“័αž™αž–ីαž‡ើαž„αž‘ៅត្αž”ូαž„)៖
    • សំដៅαž›ើαž›ំហូαžšαž…αžšាαž…αžšαžŽ៍αž‘ិαž“្αž“αž“័αž™αžŠែαž›αž្រូαžœαž’្វើដំណើαžšαž…េαž‰αž–ីαž”αžŽ្តាαž‰αž˜ូαž›αžŠ្αž‹ាαž“ ដើម្αž”ីαž‘ៅαž€ាαž“់αž‚ោαž›αžŠៅខាαž„αž€្រៅ αž–ោαž›αž‚ឺαž…αžšាαž…αžšαžŽ៍ដែαž›αž…េαž‰αž…ូαž›αžšαžœាαž„αž”αžŽ្តាαž‰αž•្αž‘ៃαž€្αž“ុαž„ (internal network) αž“ិαž„αž’៊ីαž“αž’ឺណិត (Internet)
    • αž§αž‘ាហរណ៍៖ αž“ៅαž–េαž›αžŠែαž›αž’្αž“αž€αž”្រើαž”្រាស់ (Web clients) αž–ីធ៊ីαž“αž’ឺណិត ស្αž“ើសុំαž‘ាαž‰αž™αž€αž–័ត៌មាαž“αž–ី Web server ដែαž›αžŸ្ថិαžαž€្αž“ុαž„ Data Center αžšαž”αžŸ់ធ្αž“αž€។ αž‘ិαž“្αž“αž“័αž™αžŠែαž›αž…ូαž›αž˜αž€αž”αžŽ្តាαž‰αž•្αž‘ៃαž€្αž“ុαž„ (Southbound) αž“ិαž„αž…េαž‰αž‘ៅαž€្រៅαž”αžŽ្តាαž‰ (Northbound) ត្រូវរត់αž†្αž›αž„αž€ាត់αž§αž”αž€αžšαžŽ៍ Router αž“ិαž„ Firewall αž‡ាαž“ិαž…្αž…
    • αž…αžšាαž…αžšαžŽ៍αž”្αžšαž—េαž‘αž“េះត្រូαžœαž†្αž›αž„αž€ាត់αž§αž”αž€αžšαžŽ៍ Switch αž‡ាαž…្រើαž“αžαž„់ αž“ិαž„αžšαž់αž€ាត់αž‚្αžšαž”់ស្αžšαž‘ាαž”់αž“ៃαžšαž…αž“ាសម្αž–័αž“្αž’αž”្αžšαž–័αž“្αž’αž”αžŽ្តាαž‰ ហើαž™αžœាαž‚ឺαž‡ាαž…ំណុαž…αžŠ៏សំខាαž“់αž”ំαž•ុតមួαž™αžŠែαž›αž‘ាαž˜αž‘ាαžšαž€ាររឹαžαž”αž“្តឹαž„αžŸុវត្ថិαž—ាαž–αž™៉ាαž„αžឹαž„αžš៉ឹαž„αž”ំαž•ុត

Sunday, March 1, 2026

αž›αž˜្ធិαžαž‘ាαž€់αž‘ិαž“αž“ឹαž„ Disaster Recovery αž“ៅαž€្αž“ុαž„αž”αž“្αž‘αž”់ Server

αž“ៅαž€្αž“ុαž„αž“ាαž˜αž‡ាធ្αž“αž€αž‡ំαž“ាαž‰ IT ដែαž›αž‚្αžšαž”់αž‚្αžšαž„αž”αž“្αž‘αž”់ Server ដែαž›αž˜ាαž“ Dell Server ដំណើαžšαž€ារដោαž™ VMWare ESXi (មាαž“αž˜៉ាស៊ីαž“αž“ិម្មិតដូαž…αž‡ា AD, DNS, αž“ិαž„ File Server) αž€ាររៀαž”αž…ំ Disaster Recovery (DR) αž‚ឺαž‡ាដំណើαžšαž€ាαžšαž…ាំαž”ាαž…់αž”ំαž•ុតដើម្αž”ីαž’ាαž“ាថាαž”្αžšαž–័αž“្αž’αž េដ្αž‹ាαžšαž…αž“ាសម្αž–័αž“្αž’ IT αžšαž”αžŸ់ធ្αž“αž€αž’ាαž…αžŠំណើαžšαž€ារទើαž„αžœិαž‰αž”ាαž“αž™៉ាαž„αžšαž ័ស αž€្រោαž™αž–េαž›αž˜ាαž“αž‚្រោះαž˜αž αž“្តរាαž™ (ដូαž…αž‡ាαž‚្រោះαž’αž˜្αž˜αž‡ាតិ αž¬αž€ារវាαž™αž”្រហារតាមសាαž™αž”័រ)។

ខាαž„αž€្រោαž˜αž“េះαž‚ឺαž‡ាធ្វីដែαž›αž’្αž“αž€αž្រូαžœαž’្វើαž›αž˜្ធិαžαž‘ាαž€់αž‘αž„αž“ឹαž„ Disaster Recovery សម្រាαž”់αž”្αžšαž–័αž“្αž’αžšαž”αžŸ់ធ្αž“αž€៖

៑. αž€ាαžšαž€ំណត់αž‚ោαž›αžŠៅαž“ៃαž€ាαžšαžŸαž„្αž‚្រោះαž‘ិαž“្αž“αž“័αž™ (RPO αž“ិαž„ RTO) ធ្αž“αž€αž្រូαžœαž€ំណត់ឲ្αž™αž”ាαž“αž…្αž”ាស់αž›ាស់αž‡ាមួαž™αž្αž“ាαž€់αž‚្αžšαž”់αž‚្αžšαž„αž“ូវសូαž…αž“ាαž€αžšαž‘ាំαž„αž–ីαžšαž“េះ៖

RPO (Recovery Point Objective): តើαž‘ិαž“្αž“αž“័αž™αž”៉ុαž“្មាαž“αžŠែαž›αžŸ្ថាαž”័αž“αž’ាαž…αž‘αž‘ួαž›αž™αž€αž”ាαž“αž€្αž“ុαž„αž€ាαžšαž”ាត់αž”αž„់? αž§αž‘ាហរណ៍ សម្រាαž”់ File Server αž”្រសិαž“αž”ើ RPO αž‚ឺ ៑ម៉ោαž„ ធ្αž“αž€αž្រូαžœαž’្វើαž€ារ Backup αž‘ិαž“្αž“αž“័αž™αžšៀαž„αžšាαž›់ ៑ម៉ោαž„αž˜្αžαž„ ដើម្αž”ីαž’ាαž“ាថាαž‘ិαž“្αž“αž“័αž™αž˜ិαž“αž”ាត់αž”αž„់ហួαžŸαž–ីαž€αž˜្រិαžαž€ំណត់។

RTO (Recovery Time Objective): តើαž”្αžšαž–័αž“្αž’ (AD, DNS, File Server) ធាαž…αž‚ាំαž„αžŠំណើαžšαž€ារ (Downtime) αž”ាαž“αž™ូαžšαž”ំαž•ុαžαž”៉ុαž“្មាαž“αžŠោαž™αž˜ិαž“αž’្វើឲ្αž™αž”៉ះαž–ាαž›់αž’្αž„αž“់αž’្αž„αžšαžŠαž›់αž”្រតិαž”αž្តិαž€ាαžšαž€្រុមហ៊ុαž“? αž“េះαž‡ួαž™αž€ំណត់ថាតើធ្αž“αž€αž្រូαžœαž…ំណាαž™αž–េαž›αž›ឿαž“αž”៉ុណ្ណាដើម្αž”ី Restore ម៉ាស៊ីαž“αž“ិម្មិត (VMs) αž‘ាំαž„αž’αžŸ់αž“ោះឱ្αž™αžŠំណើαžšαž€ារវិαž‰។

្. αž€ាររៀαž”αž…ំαž‘ីតាំαž„αž”αž˜្រុαž„ αž“ិαž„αž”្αžšαž–័αž“្αž’ High Availability (HA) ដើម្αž”ីαž€ាត់αž”αž“្αžαž™αž–េαž›αžœេαž›ាαž‚ាំαž„αž”្αžšαž–័αž“្αž’ ធ្αž“αž€αž‚ួររៀαž”αž…ំαž™ុαž‘្αž’αžŸាស្ត្αžšαž•្αžαž›់សេវាαž€αž˜្αž˜αž‡ាαž”់αž›ាαž”់ (High Availability) αž“ិαž„αž‘ីតាំαž„αž”αž˜្រុαž„៖

Active-Active ឬ Active-Passive: សម្រាαž”់ AD αž“ិαž„ DNS ធ្αž“αž€αž‚ួរមាαž“ Server αž™៉ាαž„αž ោαž…αžŽាស់αž–ីរ ដើម្αž”ីαž’្វើαž€ាαžšαž…ែαž€αžšំαž›ែαž€αž”αž“្αž‘ុαž€ (Active-Active) ឬមួαž™αž’្វើαž€ាαžšαž“ិαž„αž˜ួαž™αž‘ៀαžαžšαž„់αž…ាំαž‡ំαž“ួαžŸαž–េαž›αž˜ាαž“αž”αž‰្ហា (Active-Passive)។ αž€ាαžšαž’្វើ Active-Active αž‚ឺαž›្αž’αž”ំαž•ុαžαž–្រោះវាαž‡ួαž™αžšαž€្សាαž”្αžšαž–័αž“្αž’αž±្αž™αžŠំណើαžšαž€ាαžšαž‡ាαž“ិαž…្αž… αž“ិαž„αž”αž„្αž€ើαž“αž›្αž”ឿαž“αžែαž˜αž‘ៀត។

Alternative Sites (αž‘ីតាំαž„αž‘ី្): αž€្αž“ុαž„αž€αžšαžŽីαž”αž“្αž‘αž”់ Server αž‘ី៑ αž†េះឬខូαž…αž‘ាំαž„αžŸ្រុαž„ ធ្αž“αž€αž្រូαžœαž–ិαž…ារណារៀαž”αž…ំ Hot site (αž‘ីតាំαž„αž˜ាαž“αž˜៉ាស៊ីαž“ Server ដើរស្រាαž”់ αž“ិαž„αž‘ិαž“្αž“αž“័αž™αžŠូαž…αž‚្αž“ា), Warm site (αž‘ីតាំαž„αžŠែαž›αž˜ាαž“αž§αž”αž€αžšαžŽ៍តិαž…αžួαž…αž‚្រាαž“់តែធាαž…αž±្αž™αž”្αžšαž–័αž“្αž’αžŠំណើαžšαž€ាαžšαž”ាαž“), ឬ Cold site (αž‘ីតាំαž„αžŠែαž›αž˜ាαž“αž្រឹមតែαž”αž“្αž‘αž”់αž‘αž‘េαžšαž„αž…ាំαž™αž€αž§αž”αž€αžšαžŽ៍αž‘ៅដាαž€់) ដោαž™αž•្ធែαž€αž›ើαž‘ំហំថវិαž€ាស្ថាαž”័αž“αžšαž”αžŸ់ធ្αž“αž€។

៣. αž€ាαžšαž€ាαžšαž–ាαžšαž”αžšិស្ថាαž“αž€្αž“ុαž„αž”αž“្αž‘αž”់ Server (Physical Protection) Disaster មិαž“αž˜ែαž“αž˜ាαž“αž្រឹមតែαž€ារវាαž™αž”្រហារតាមសាαž™αž”័αžšαž‘េ តែរួαž˜αž”αž‰្αž…ូαž›αž‘ាំαž„αž”αž‰្ហាαž’αž‚្αž‚ិαžŸαž“ី αž“ិαž„αž”αžšិស្ថាαž“αž€្αž“ុαž„αž”αž“្αž‘αž”់αž•αž„αžŠែរ៖

ថាαž˜αž–αž›αž’αž‚្αž‚ិαžŸαž“ីαž”αž˜្រុαž„ (UPS & PDU): ធ្αž“αž€αž្រូαžœαž”ំαž–ាαž€់ UPS αž“ៅαž€្αž“ុαž„αž‘ូ Rack ដើម្αž”ីαž‘αž”់αž—្αž›ើαž„αž“ៅαž–េαž›αžŠាαž…់αž’αž‚្αž‚ិαžŸαž“ី αž“ិαž„αž€ាαžšαž–ាαžšαž”αž‰្ហាαž—្αž›ើαž„αž›ោតខ្αž›ាំαž„ (Surges) ដែαž›αž’ាαž…αž”ំαž•្αž›ាαž‰ Dell Server។ ធ្αž“αž€αž€៏ត្រូαžœαž”្រើαž”្រាស់ PDU ដើម្αž”ីαž”ែαž„αž…ែαž€αž…αžšαž“្αžαž’αž‚្αž‚ិαžŸαž“ីαž‘ៅαž€ាαž“់αž§αž”αž€αžšαžŽ៍αž“ីមួαž™αŸ—αž€្αž“ុαž„ Rack ឱ្αž™αž˜ាαž“αžŸαžŽ្តាαž”់αž’្αž“ាαž”់αž•αž„αžŠែរ។

αž€ាαžšαž‚្αžšαž”់αž‚្αžšαž„αžŸីតុណ្αž αž—ាαž– αž“ិαž„αžŸំណើម: αž”αž“្αž‘αž”់ Server ត្រូαžœαžšαž€្សាសំណើម (Relative Humidity) αž…αž“្αž›ោះαž–ី 45% αž‘ៅ 55% (αž€ាαžšαž–ាαžšαž€ុំឲ្αž™αž˜ាαž“αž€αž˜្តៅαž’αž‚្αž‚ិαžŸαž“ីស្αž‘ាαž€់ αž¬αž…្រែះ) αž“ិαž„αžšαž€្សាសីតុណ្αž αž—ាαž–αž…αž“្αž›ោះαž–ី 64 αž‘ៅ 81 ដឺαž€្រេហ្វារិαž“αž ៃ (17-27°C) ដើម្αž”ីαž€ាαžšαž–ាαžšαž€ុំឲ្αž™αž˜៉ាស៊ីαž“αž‘ើαž„αž€αž˜្តៅខ្αž›ាំαž„ (Overheating)។

αž”្αžšαž–័αž“្αž’αž–αž“្αž›αž់αž’αž‚្αž‚ិαž—័αž™: ត្រូវដំទើαž„αž”្αžšαž–័αž“្αž’αž–αž“្αž›αž់αž’αž‚្αž‚ិαž—័αž™αž”្αžšαž—េαž‘αž§αžŸ្ម័αž“ (Gas-based) ដូαž…αž‡ា FM200 αž‡ាដើម αž–្រោះវាមិαž“αž…αž˜្αž›αž„αž…αžšαž“្αžαž’αž‚្αž‚ិαžŸαž“ី αž“ិαž„αž˜ិαž“αž”αž“្αžŸαž›់ស្αž“ាαž˜αž”្រទាαž€់ដែαž›αž’ាαž…αžូαž…αžាαžαžŠαž›់ Dell Server αž“ៅαž–េαž›αžœាαž”ាαž‰់αž–αž“្αž›αž់។

ៀ. αž€ារ Backup αž€ាαžšαž€ំណត់αžšαž…αž“ាសម្αž–័αž“្αž’ (Configuration Backups) αž€្រៅαž–ីαž€ារ Backup αž‘ិαž“្αž“αž“័αž™ File Server ធ្αž“αž€αž€៏ត្រូវតែ Backup Configuration αžšαž”αžŸ់αž§αž”αž€αžšαžŽ៍αž”αžŽ្តាαž‰ (Switches/Routers) αž“ិαž„αž˜៉ាស៊ីαž“ VMWare ESXi αž–្αžšαž˜αž‘ាំαž„ VMs αž‘ាំαž„αž’αžŸ់ (AD, DNS) αž•αž„αžŠែរ ដើម្αž”ីαž’ាαž“ាថាαž“ៅαž–េαž›αž˜ាαž“αž”αž‰្ហាខូαž…αžាត ធ្αž“αž€αž’ាαž…αž‘ាαž‰αž™αž€αž€ាαžšαž€ំណត់αž‘ាំαž„αž“ោះαž˜αž€αž”្រើវិαž‰αž”ាαž“αž—្αž›ាαž˜αŸ—αžŠោαž™αž˜ិαž“αž…ាំαž”ាαž…់αž…ំណាαž™αž–េαž› Setup αž–ីសូαž“្αž™αž‘ើαž„αžœិαž‰។

αŸ₯. αž€ាαžšαž’្វើតេស្αžαž•ែαž“αž€ាαžšαžŸαž„្αž‚្រោះ (Tabletop Exercises & Testing) αž€ារមាαž“αž្រឹមតែαž―αž€αžŸាαžšαž•ែαž“αž€ារ Disaster Recovery αž‚ឺមិαž“αž‚្αžšαž”់αž‚្រាαž“់αž‘េ។ αž€្αž“ុαž„αž“ាαž˜αž‡ា IT ធ្αž“αž€αž្រូαžœαž’្វើαž€ារសាαž€αž›្αž”αž„αž’αž“ុវត្αžαž“៍αž‡ាαž€់ស្តែαž„៖

រៀαž”αž…ំαž€ារសាαž€αž›្αž”αž„ Tabletop Exercises ដោαž™αž”្រមូαž›αž•្តុំαž€្រុαž˜αž€ាαžšαž„ាαžšαž˜αž€αž–ិαž—ាαž€្សាធំαž–ីសេណារីαž™៉ូαž‚្រោះធាαžŸαž“្αž“αž•្សេαž„αŸ— (αž§αž‘ាហរណ៍៖ αž…ុះαž”ើ Dell Server αžšαž›αž់ឈឹαž„? αž…ុះαž”ើមាαž“ Ransomware វាαž™αž”្រហារ File Server?) ដើម្αž”ីស្វែαž„αžšαž€αž…ំណុαž…αž្វះខាαžαž“ៅαž€្αž“ុαž„αž•ែαž“αž€ារ αž“ិαž„αž€ែαž›αž˜្ធវាឱ្αž™αž€ាαž“់តែαž”្រសើរ។

ត្រូវតែαž’្វើαž€ារសាαž€αž›្αž”αž„ Restore αž‘ិαž“្αž“αž“័αž™ αž“ិαž„αž”ើαž€αžŠំណើαžšαž€ារ VMs αž…េαž‰αž–ី Backup ឱ្αž™αž”ាαž“αž‡ាαž”្αžšαž…ាំ ដើម្αž”ីαž”្រាαž€αžŠαžាαž”្αžšαž–័αž“្αž’ Backup αž–ិαžαž‡ាដំណើαžšαž€ាαžšαž”ាαž“αž‡ោαž‚αž‡័αž™ αž“ិαž„αž’ាαž…αžŸαž„្αž‚្រោះαž”ាαž“αž‘ាαž“់αž–េαž›។ 

Sunday, May 4, 2025

What is Encapsulation in OSI?

 

What is Encapsulation in OSI?

Encapsulation in the OSI (Open Systems Interconnection) model refers to the process of adding headers and trailers to data as it moves down through the layers of the OSI model on the sender's side. This process ensures that data is properly packaged for transmission across a network and can be correctly interpreted by the receiving device.

The OSI model consists of seven layers, each with specific responsibilities. Encapsulation occurs as data passes from higher layers (closer to the user) to lower layers (closer to the physical transmission medium). Each layer adds its own specific information, such as addressing or error-checking details, which are necessary for successful communication.


Step-by-Step Explanation of Encapsulation in OSI

1. Application Layer (Layer 7)

  • At this highest layer, raw user data is generated by applications like email clients, web browsers, or file transfer programs.
  • No additional headers or trailers are added at this stage in the OSI model; instead, this layer provides services like file transfers or email composition.
  • The data is passed down to the Presentation Layer.

2. Presentation Layer (Layer 6)

  • The Presentation Layer ensures that data is in a format understandable by both sender and receiver systems.
  • It may perform encryption, decryption, compression, or translation tasks.
  • Once formatted appropriately, the data is sent to the Session Layer.

3. Session Layer (Layer 5)

  • This layer establishes and manages sessions between devices for ongoing communication.
  • It adds session-related information to ensure proper synchronization and flow control during communication.
  • After this step, encapsulated session-layer data is passed down to the Transport Layer.

4. Transport Layer (Layer 4)

  • The Transport Layer breaks down large chunks of data into smaller segments for efficient transmission.
  • It adds a header containing critical information such as:
    • Source port number
    • Destination port number
    • Sequence numbers for reordering packets at the destination
    • Error-checking mechanisms
  • Depending on whether TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) is used:
    • If TCP: The encapsulated unit is called a "Segment."
    • If UDP: The encapsulated unit is called a "Datagram."

The segment/datagram is then passed down to the Network Layer.

5. Network Layer (Layer 3)

  • The Network Layer handles logical addressing and routing of packets across networks.
  • A header containing source and destination IP addresses is added here.
  • After encapsulation at this layer:
    • The encapsulated unit becomes known as a "Packet."

The packet proceeds to the Data Link Layer.

6. Data Link Layer (Layer 2)

  • This layer prepares packets for delivery over physical media by adding both a header and a trailer:
    • Header: Contains source and destination MAC addresses for local delivery within a network segment.
    • Trailer: Includes error-checking information like CRC (Cyclic Redundancy Check).

After encapsulation at this stage:

  • The encapsulated unit becomes known as a "Frame."

The frame moves on to the Physical Layer.

7. Physical Layer (Layer 1)

  • At this lowest level of abstraction, frames are converted into electrical signals, light pulses, or radio waves depending on the medium used for transmission.
  • Encapsulation here involves converting frames into binary bits—0s and 1s—that represent electrical charges or other forms of signal encoding suitable for transmission over cables, fiber optics, or wireless mediums.

Key Characteristics of Encapsulation in OSI

  1. Protocol Data Units (PDUs): Each layer has its own name for its encapsulated data:

    • Application/Presentation/Session Layers: Data
    • Transport Layer: Segment/Datagram
    • Network Layer: Packet
    • Data Link Layer: Frame
    • Physical Layer: Bits
  2. Headers and Trailers: Headers are added at every layer except at Layers 7–5 in most implementations. Trailers are typically added only at the Data Link layer for error detection purposes.

  1. Purpose: Encapsulation ensures that each layer performs its specific function while maintaining compatibility with other devices using standardized protocols like TCP/IP.
  1. Reverse Process – De-encapsulation: On reaching its destination, de-encapsulation occurs as data travels upward through each OSI layer on the receiving device. Headers/trailers are stripped off one by one until only raw user data remains.

Example of Encapsulation

Consider sending an email:

  1. At the Application layer: You compose your email message using an application like Outlook.
  2. At subsequent layers:
    • Transport adds port numbers via TCP/UDP headers.
    • Network adds IP addresses via an IP header.
    • Data Link adds MAC addresses via Ethernet headers/trailers.
    • Physical converts all these into binary signals transmitted over cables/wireless media.

When received by another computer:

  1. De-encapsulation begins at Physical and works upward until your email client displays your message intact.

Importance of Encapsulation

Encapsulation plays several critical roles in networking:

  1. Data Integrity: Ensures that transmitted data reaches its intended recipient without corruption through error-checking mechanisms like CRCs.
  2. Addressing: Adds logical (IP) and physical (MAC) addresses so devices know where to send/receive packets within local/global networks.
  3. Interoperability: Allows devices from different manufacturers adhering to standard protocols like TCP/IP or Ethernet to communicate seamlessly.[1] [2] [3]


Authoritative Sources

  1. GeeksforGeeks article on how encapsulation works [GeeksforGeeks]
  2. TechTarget introduction to encapsulation [TechTarget]
  3. Study CCNA explanation on encapsulation [Study CCNA]
     

Thursday, April 25, 2024

Firewall

 A firewall is a physical device or software program that examines data packets on a network to determine whether to either forward them to their destination or block them. A firewall can be a one-way firewall, which protects against inbound threats only, or a two-way firewall, which protects against both unauthorized inbound and outbound traffic. Most third-party firewall programs, such as ZoneAlarm, are two-way firewalls. A software firewall can be configured to permit traffic between specified IP addresses and to block traffic to and from the Internet except when permitted on a per-program basis.


A corporate network can use a proxy server with a firewall as the sole direct connection between the Internet and the corporate network and then use a firewall in the proxy server to protect the corporate network against threats.


Physical firewalls are specialized computers whose software is designed to quickly analyze network traffic and make forwarding decisions based on rules set by the administrator. Over time, that task has been incorporated more into software on the computers and into the OS design. An example is Windows Defender Firewall in Windows, which is discussed in the section, “Microsoft Windows OS Security Settings.”

Tuesday, February 20, 2024

Some protocol port number you should know in Comptia A+

 Port numbers can be challenging to memorize, so you may want to consider making your own lab by adding some firewall rules in Windows Firewall or any third-party firewall front-end. Once you create firewall rules and work with some of the port numbers, you'll find they're much easier to remember.