Assignment final: unit 2 Networking Network Design FPT University 63 pag. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Assignment name: Networking Infrastructure Student name: Tran Van Tien Student ID: BHAF180025 Tutor: Le Van Thuan Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Table of Contents Introduce ............................................................................................................................... 4 1, Check the network rules and their protocols ...................................................................... 4 1.1, Discuss the benefits and constraints of different network types and standards. .......... 4 1.1.1, Discuss the benefits and constraints of different types of networks ...................... 4 1.1.2, Discuss various network standards. ................................................................... 10 1.2, Explain the impact of network structure, communication and bandwidth requirements. ........................................................................................................................................ 14 1.2.1, Impact of network structure requirements........................................................... 14 1.2.2, Impact of communication and bandwidth............................................................ 18 1.3, Compare common network principles and how efficient protocols allow networked systems. .......................................................................................................................... 18 1.3.1, Compare common network principles ................................................................ 18 1.3.2, How protocols allow the efficiency of networked systems. .................................. 20 2, Explain devices and network activity ............................................................................... 22 2.1, Discuss the operating principles of network devices and server types. ..................... 22 2.1.1, Discuss the operating principles of network devices. .......................................... 22 2.1.2. Discuss the operational principles of server types. ............................................. 27 2.2. Explore a variety of server types and demonstrate server selection, considering a certain scenario regarding cost optimization and performance. ....................................... 31 2.2.1. Factors to consider when choosing a server ...................................................... 31 2.2.2. Select server for business .................................................................................. 32 2.3. Discuss the interdependence of workstation hardware with related network software. ........................................................................................................................................ 33 3, Network system design. .................................................................................................. 34 3.1, Design a networked system to meet a certain specification. ..................................... 34 3.1.1, Request. ............................................................................................................ 34 3.1.2, Design plan and expected cost. ......................................................................... 34 3.2, Check and evaluate the design to meet the requirements and analyze user feedback. ........................................................................................................................................ 37 3.2.1, Check and evaluate the design for requirements................................................ 37 3.2.2. Check and evaluate costs. ................................................................................. 38 3.3, Installing and configuring network services and applications. ................................... 45 3.3.1, Basic configuration. ............................................................................................ 45 3.3.2, VLAN. ................................................................................................................ 45 3.3.3, DHCP................................................................................................................. 46 3.3.4, Static routing. ..................................................................................................... 48 Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) 3.3.5, NAT.................................................................................................................... 48 3.3.6, ACL. ................................................................................................................... 49 4, Deploy and diagnose networked systems. ...................................................................... 49 4.1, Implement a network based on a prepared design. .................................................. 49 4.1.1, Basic configuration. ............................................................................................ 49 4.1.2, VLAN ................................................................................................................. 52 4.1.3, DHCP................................................................................................................. 54 4.1.4, Static routing. ..................................................................................................... 54 4.1.5, NAT.................................................................................................................... 55 4.1.6, ACL .................................................................................................................... 55 4.2, Analysis of test results compared with expected results ........................................... 56 a, Basic configuration. .................................................................................................. 56 b, VLAN. ...................................................................................................................... 56 c, DHCP. ...................................................................................................................... 57 d, Static routing and NAT ............................................................................................. 58 e, ACL.......................................................................................................................... 61 4.3, Proposing potential improvements for networked systems........................................ 63 4.3.1, Scaling up schools. ............................................................................................ 63 4.3.2, Redundant configuration for LAN. ...................................................................... 63 Conclude............................................................................................................................. 63 Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Introduce In this report, I will explain network principles, protocols and devices, including the benefits and limitations of network solutions, the impact of network topology, communication requirements and bandwidth, network system efficiency, operating principle of network equipment and server type and network software. In addition, I will design network systems and deploy and diagnose networked systems. 1, Check the network rules and their protocols 1.1, Discuss the benefits and constraints of different network types and standards. 1.1.1, Discuss the benefits and constraints of different types of networks Computer networks include two or more computers that are linked to share resources (such as printers and CDs), exchange files, or allow electronic communications. Computers on the network can be linked via cables, telephone lines, radio waves, satellites or infrared light rays. There are two very popular networks now: Internal network (LAN) Wide area network (WAN) 1.1.1.1, Internal network (LAN) LANs are often used in a business to provide Internet connectivity to all those in the same space with a single Internet connection. All Internet devices are capable of being configured as nodes on a LAN and can be connected to the Internet via a separate computer. The computers in the LAN are also used to connect office workstations to grant access to the printer. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) LAN network a, Advantages Share resources: All resources are attached to a network and if any computer needs any resources, it can be shared with the computer needed. Types of resources are DVD drives, printers, scanners, modems and hard drives. Therefore, there is no need to purchase separate resources for each computer and it saves money. Relationship between client and server: All data from the attached computers can be stored in a server. If any computer (client) needs data, that computer user only needs to log in and access data from the server. For example: Movies and songs can be stored on the server and can be accessed by any authorized user (client). Share on the internet: In offices and network cafes, we can see that an internet connection is shared between all computers. This is also the type of LAN technology in which the main internet cable is attached to a server and the computers are distributed by the operating system. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Share the software program: Software programs can also be shared on the LAN. You can use only licensed software and any user can use this software in the network. It's costly to buy a license for each user in the network so it's easy and cost-effective to share software programs. Data security: Keep data on the server more secure. And if you want to change or delete any data, you can do it easily on a server computer and other computers can access the updated data. You can also grant access or revoke access to specific users so that only authorized users can access data in the network. Communicate easily, quickly and save time: LAN computers can exchange data and messages easily and quickly. It also saves time and makes our work fast. All users can share messages and data with any other user on the LAN. Users can log in from any computer on the network and access the same data placed on the server. Computer identification: Each computer is provided with a MAC address and stored temporarily in the switch or router during communication. All computers in the LAN are identified by the MAC addresses used to send and receive messages and data. Note that the MAC address is stored in the network adapter installed in the motherboard of each computer. In older computers, the network adapter is not integrated with the motherboard, but in modern computers, they are integrated with the motherboard. Centralized data: Data of all network users can be saved on the computer's hard disk. This will help users to use any network workstation to access their data. Because data is not stored on the local workstation. But it is stored on a server computer. Users will access their own data by logging into their account from any client in the network. Easy and cheap: The biggest advantage of a local area network is that it is easy to set up and also cheap compared to other options and therefore, if the company is trying to set up a network at a lower cost and easier than a local area network is the answer. Such companies. b, Disadvantages Limited area: The biggest drawback of LAN is that it can only be used in a limited area and once the computer goes out of the network, the local area network is not used. Therefore, Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) to put it simply, if the area of local area deployment is larger than setting up a LAN in that area, it cannot and is not feasible for the company. Share data from outside: Another limitation of LAN is that if a person wants to share data from outside the network, it is difficult because people cannot run mobile devices such as hard drives and CDs easily on all network computers. . Therefore, if you have done some work at home and want to bring that job to the office, you have to send that job by email and if the data is big, even the email option is not feasible and people will have problems carrying data from home to office. Data security issues: If the server computer is not properly set up and there is a leak of security, unauthorized users can also access the data. Therefore, a security policy and rules are set up correctly on the server. Server problems can affect all computers: If any files on the server are corrupted or the hard drive fails, all attached computers have problems with the operation. 1.1.1.2, Wide area network (WAN) When the LAN has coverage in a very small range in just one building, the WAN can cover a large geographic area, crossing national or international borders. A WAN is made using a subscriber line provided by a service provider or by using switching network packets for data transmission. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) WAN network a, Advantages Include a large geographic area: WAN has a geographical area of 1000 km or more. If your office is in different cities or countries, you can connect your branch offices through WAN. ISP (Internet Service Provider) can provide you with separate links so you can connect different branch offices together. Centralized data: Your company does not need to purchase email, files and backup servers, all of which can be located at the headquarters. All branch offices can share data through the headquarters server. You can back up, share other useful data from headquarters and all this data is synchronized with all other office branches. Receive files and updated data: Software companies work on servers directly to exchange updated files. Therefore, all programmers and office staff receive updated versions of files within seconds. Many applications for exchanging messages: With IOT (Internet of thing) and new LAN technologies, messages are being transmitted quickly. A lot of web apps are available like Facebook messenger, Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) WhatsApp, Skype that you can communicate with friends via text, voice and video chat. Share software and resources: Like LAN, we can share software applications and other resources such as hard drives and RAM with other users on the internet. In web hosting, we can share computer resources between multiple websites. Global business: Now everyone with computer skills can do business on the internet and expand their business globally. There are many types of businesses such as: E-commerce, Buy and sell stocks, etc. High frequency band: If you receive a leased line for your company, it gives higher bandwidth than a normal bandwidth connection. You can get high data transfer rates, which can increase your company productivity. Distribute workload and reduce travel costs: Another benefit of a wide area network is that you can distribute your work to other locations. For example, if you have an office in the US, you can hire people from any other country and contact them easily over the WAN. It also reduces your travel costs when you can track your group activities online. a, Disadvantages Security issue: WAN has more security issues than LAN. WANs with many technologies combined can create security holes. Requires firewall and antivirus software: Because data transmitted on the internet can be accessed and changed by hackers, the firewall needs to be turned on in the computer. Some people may also inject a virus into a computer to install antivirus software. Other security software also needs to be installed on different points in the WAN. High set up cost: Setting up the LAN for the first time at the office costs more. It may involve buying routers, switches and additional security software. Troubleshoot: Because LAN covers so many areas, it is very difficult to fix the problem. Most WAN wires go to the sea and sometimes the wires are broken. It involves a lot of Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) resources to repair the sea currents. In ISP headquarters, many internet connections, routers are mixed in the rooms and troubleshooting incidents on the internet requires a full-time employee. Server issue and disconnection: In some areas, ISPs face problems due to power supply or bad line structure. Customers often face connectivity problems or slow Internet speed problems. The solution to this problem is to buy a dedicated line from ISP. * Internet network or Computer network is a special case of WAN, it provides global services such as Mail, Web, Chat ... Free internet for everyone. Internet Other types of networks include: ▪ Urban area network (MAN) ▪ Wireless LAN (WLAN) ▪ Storage area network (SAN) 1.1.2, Discuss various network standards. 1.1.2.1, OSI Model Open System Interconnection - OSI model developed by International Standards Organization (ISO). Model of dividing network communication into 7 classes. Grades 1-4 are common low-level classes that perform data migration tasks. Grades 5-7 are high-level classes that contain application-level data. The way the network operates is in a general rule, that is to transfer data. Each class will perform specific tasks and then move the data to the next layer. OSI reference model is divided into seven classes with the following functions: Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) OSI model + Application: (application): interface between application and network (Level 7) + Presentation: (presentation): data exchange format agreement (6th floor) + Session: (session): allows users to set up connections (5th floor) + Transport: (transport): ensure communication between two systems. (4th floor) + NetWork: (network): oriented data transmission in inter-network (3rd floor) + Data Link: (data link): determines access to the device. (2nd Floor) + Physical: (physical): convert data into bits and transmit. (1st floor) a, Advantages Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) It is a general model. And it is considered a standard model in computer networks. Classes in the OSI model architecture are distinguished by services, interfaces, and protocols. Because protocols are hidden, any protocol can be implemented in this model. So it is a common model. It has all the flexibility to adapt to many protocols. It supports connection orientation as well as disconnected services. So we can use connection-oriented models when we need reliability and service without connection when we need to transfer data faster over the internet. It follows the division and conquest technique. All services are distinguished in different classes. Therefore, administration and maintenance for this OSI model architecture is simple and easy. This class architecture follows the principle of abstraction. Changes in a class do not have much impact on other classes. It is safer and more adaptable than having all the services wrapped in one class. It is a class model. It is possible to change a class without affecting other classes. It clearly distinguishes services, interfaces and protocols. Therefore, it is flexible in nature. The protocols in each layer can be conveniently replaced depending on the nature of the network. It supports both connection-oriented and disconnected services. b, Disadvantages It is purely a theoretical model that does not consider the availability of appropriate technology. This limits its practical implementation. The launch time of this model is not suitable. When OSI appeared, the TCP / IP protocols were deployed. So companies were initially reluctant to use it. OSI model is very complicated. The original implementation was bulky, slow and expensive. Although there are many layers, some classes such as Session Layer and Presentation Layer have very few functions when practically deployed. There are duplicates of services in different classes. Services such as addressing, flow control and error control are provided by multiple layers. The standards of the OSI model are theoretical and do not provide an appropriate solution for actual network deployment. 1.1.2.2, TCP / IP model TCP / IP stands for Transmission Control Protocol (TCP) and Internet Protocol (IP), a protocol known as the communication setup protocol, the protocol stack that most Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) computer networks today run on it. This set of protocols is named after two protocols, the transport control protocol and the inter-network protocol. These are the first two protocols in the world to be defined. TCP / IP model consists of 4 layers: TCP/IP model + Class / 4th floor: Application. + Class / 3rd floor: Transport. + Class / 2nd floor: Internet. + Class / 1st floor: Network Access. a, Advantages This is an industry standard model that can be effectively implemented in real network problems. It is interactive, that is, it allows cross-platform communication between heterogeneous networks. It is an open protocol suite. It is not owned by any particular institute and can therefore be used by any individual or organization. It is a client architecture - the server can expand. This allows networks to be added without disrupting existing services. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) It assigns an IP address to each computer on the network, thus making each device identifiable over the network. It assigns each site a domain name. It provides name and address resolution service. b, Disadvantages It is not general in nature. Therefore, it cannot represent any protocol stack other than TCP / IP. For example, it cannot describe Bluetooth connectivity. It does not clearly separate the concepts of services, interfaces and protocols. Therefore, it is not suitable to describe new technologies in new networks. It does not distinguish between data link and physical layers, which have very different functions. Data link layer should be concerned with frame transmission. On the other hand, the physical layer should lie down to the physical characteristics of the transmission. An appropriate model should separate the two classes. It was originally designed and deployed for wide area networks. It is not optimized for small networks like LAN (Local Area Network) and PAN (Personal Area Network). 1.2, Explain the impact of network structure, communication and bandwidth requirements. 1.2.1, Impact of network structure requirements Network topology refers to the physical layout or logic of the network. It defines how different nodes are placed and linked. Alternatively, the network topology may describe how data is transmitted between these nodes. There are two types of network topology: physics and logic. + Physical Topology refers to the topology of the Local Area Network (LAN). The method used to connect physical devices on the network to cables and cables is used, all forming the physical topology. + Logical Topology describes the communication signal performance of the network and how it exchanges distributed data. The logical topology determines how data is transmitted. 1.2.1.1, Physical Topology The network topology is a spatial geometrical structure that is in fact the element layout of the network as well as how to connect them. Common networks have three types of structures: Star Topology, Ring Topology and Linear Bus Topology. 1.2.1.1.1, Star Topology Star-shaped networks include a center and information nodes. Information nodes are terminal stations, computers and other network devices. The center of the network that coordinates all activities in the network with basic functions is: - Identify pairs of addresses to send and receive permission to occupy information lines and communicate with each other. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) -Allow to monitor and mishandle in the process of information exchange. -Notify the status of the network ... Star Topology a, Positive Network format is the fastest way o When the network cable is broken, it will reward you for disconnecting one machine, while others will still work normally. When an error occurs, it is easy to check and fix. The network can be expanded according to user needs. b, Negative Network scalability depends on the capabilities of the center. When the center encounters a problem, the whole network is down. The network requires independent connection of each device separately at information nodes to the center. The distance from the machine to the center is very limited (100 m). Costs of network and intermediate devices are costly In general, the image network allows to connect computers to a centralized unit (HUB) with a twisted cable, this solution allows to directly connect the computer to the HUB Need to go through the Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) BUS axis, avoid the factors causing the network stagnation. Recently, along with the development of switching hubs, this model has become increasingly popular and accounts for the majority of newly installed networks. 1.2.1.1.2, Ring Topology This form network, arranged in a circular form, is designed to be a closed loop, the signal running around in a certain direction. The buttons that communicate each other at a time are only one button. The transmitted data must be accompanied by the specific address of each receiving station. Ring Topology a, Positive The ring-type network has the advantage of being able to extend far away, the total line needed is less, thus saving the cable wire, the speed is faster than the type of BUS. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) b, Negative The downside of this network is that the speed is still slow When there is a problem on the cable road, the entire network will stop working When there is a problem, it is difficult to check error detection. Because this network has many disadvantages, it is rarely used 1.2.1.1.3, Bus topology According to the road corridor layout as shown, the server (host) as well as all other computers (workstations) or nodes (nodes) are connected together on a main cable line to convey signal. All nodes use this same main cable. The two ends of the cable are covered by a device called a terminator. Signals and packets when moving up or down in cables carry the address of the destination. Bus topology a, Positive This type of network uses the least cable, easy to install, thus saving installation costs b, Negative However, there are also disadvantages that there will be traffic congestion when moving data with large traffic. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) When there is a failure at some stage it is difficult to detect, a stop on the line to repair will stop the whole system. * In addition to the three types of configurations above, there are some other forms that can be modified from these three types of tree networks, star-shaped networks rings, mixed networks, etc. 1.2.1.2, Logical Topology Logical Topology of the network is the way that hosts communicate through the transmission environment with two common logical topologies, Broadcast and Token passing. -Broadcast: simply means that each host sends its data to all other hosts on the medium. There is no registration of the next station using the transmission medium, instead of first serving first. This logical topology uses a very popular CSMA / CD access method in Ethernet networks. -Token passing: controls network access with a sequential token to each host. When a host receives a token, it means that the host can transmit data to the network, if the host does not have data to transmit it will transfer the token to the next host and this process is repeated in the network. 1.2.2, Impact of communication and bandwidth. The bandwidth can be understood as the maximum speed that can be transmitted in 1 second. We often encounter fiber optic network speeds, copy speed of USB ... In this sense, Bandwidth is understood as Broadband. In the field of website hosting, the term "bandwidth" is often used to describe the maximum amount of data including upload and download back and forth between the website (or server) and users in a unit of time ( usually months). In short, bandwidth is the parameter that indicates the maximum amount of traffic your website can circulate each month. In this sense, we understand bandwidth is the sum of 1-month traffic. Another way of understanding Bandwidth is "Broadband" is the size of the transmission line. If the Broadband has a high index, it is possible to serve multiple people online at a time quickly. 1.3, Compare common network principles and how efficient protocols allow networked systems. 1.3.1, Compare common network principles Application Bus topology - Good for small networks and networks with low traffic and low data traffic. Ring Topology - Good for cases where the network has a few stations operating at high speed, not far apart or the network has Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Star Topology - Currently the star network is the best way for the case of data and signal integration. Public Complexity Efficiency Cost Defect Ability of extension unevenly distributed data. - Requiring relatively complex installation. networks have this structure. - Not complicated. - The complexity depends on the central device, which is generally easy. - Very good under - Effective in the case - Good for medium low load can reduce of high traffic volume load case however performance very and is quite stable size and ability, quickly when due to the increase deduce the network loading increases. of delay time and performance degradation depends directly on compared to other the power of the networks. central device. - Relatively low, - Must have doubled - The total cost is especially because the resources or very high when doing many devices have have an alternative the task of the central been fully developed method when a device, the central and sold in the button does not work device, although not market. Channel if you still want the used for other things. redundancy is network to operate The number of recommended to normally, very high private wires is also reduce the risk of cost high. network incidents. - A broken station - A faulty station can - The reliability of the does not affect the affect the whole system depends on whole network. system because the the central device, Except for incidents stations depend on the network only fails on the line. each other. Difficult when the central to find broken device fails. network button. - Adding and - Relatively easy to - Network expansion reshaping this add and subtract is quite easy network is easy. workstations without depending on the However, it is connecting much for capacity of the difficult to connect each change Cost for central device. between different change is relatively computers and low. devices because they must be able to receive the same address and data. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) 1.3.2, How protocols allow the efficiency of networked systems. 1.3.2.1, TCP TCP is the most commonly used protocol on the Internet. When you request a web page in the browser, the computer sends TCP packets to the web server's address, asking it to resend the site. The web server responded by sending a stream of TCP packets, which your web browser combined to form the web page. When you click on a link, log in, post a comment or do anything else, your web browser sends TCP packets to the server and the server sends the packets back to TCP. The TCP protocol is highly reliable, packets sent by TCP will be monitored so that data will not be lost or damaged during transport. That is why the download file is not corrupted even if the network has a problem. Of course, if the recipient is completely offline, your computer will give up and you will see a write error message that it cannot communicate with the remote host. The TCP protocol achieves this in two ways. First, it requests packets by numbering them. Second, it checks for errors by asking the recipient to send feedback received to the sender. If the sender does not receive the correct response, it can resend the packet to ensure the recipient receives them correctly. Process Explorer and other system utilities can display the connection type that the process creates. Here we can see the Chrome browser with TCP connections open to many different web servers: Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) TCP connections on chrome 1.3.2.2, UDP UDP stands for User Datagram Protocol - a packet similar to a packet of information. UDP protocol works similar to TCP, but it includes all the checked and error-free things. When using UDP, the packet is only sent to the receiver. The sender will not wait to make sure the receiver has received the packets - it will continue to send the next packet. If you are a recipient and you miss some UDP packets because it's too bad you can't request those packets again. There is nothing to guarantee you are getting all the packages and there is no way to request a package again if you miss it, but in return, the computers can communicate more quickly. . UDP is used when speed is desired and error correction is not required. For example, UDP is often used for live broadcasts and online games. For example, suppose you are viewing live video images. Broadcast Live Stream usually uses UDP instead of TCP. The server only needs to send a stream of UDP packets to the computer to view. If you lose the connection for a few seconds, the video will freeze for a moment and then move to the current bit of TV, ignoring the Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) bits you have missed. Video or audio may be distorted for a while and the video continues to play without data loss. This works similarly in online games - if you miss some UDP packets, the player character may appear shifted on the map when you receive newer UDP packets. There is no point in requesting old packages if you lose them, and the game is continued without you. All the problems are what's happening right now on the game server - not what happened a few seconds. 1.3.2.3, Other protocols POP3 and SMTP (simple mail transfer protocols) are protocols used for both sending and receiving email. Basically, SMTP is used to send mail while the protocol used to receive mail is called the postal protocol (POP) and because it uses its latest version of 3, the name is POP3; but both of these protocols have different server addresses and it uses TCP to send and receive mail over the internet including sending reports. Hypertext transfer protocol (HTTP) is used to open a page on the web built by the HTML language which is hypertext markup language. This protocol uses both IP and TCP to manage the transmission. FTP (file transfer protocol) is used to share or copy or even send files over the web from one computer to another. But now, this protocol not only manages sharing and transferring files, but also helps download and upload files on the web (Zhang 2011). 2, Explain devices and network activity 2.1, Discuss the operating principles of network devices and server types. 2.1.1, Discuss the operating principles of network devices. To connect Internet connection from home to home and office electronic devices, it is inevitable that network devices such as Repeater, Switch, Router, Bridge or Hub. These devices share the same function in connecting and transmitting internet signals, but they have different characteristics. a, Repeaters For a LAN, the cap usually has a limit of 100m because the signal will be reduced on the line so it cannot go further. Therefore, in order to connect to remote devices, the network needs to have devices to amplify and reset the signal, so that the signal can travel far beyond this limit. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Repeater And the repeater is a device designed to serve as an amplification of the physical signal at the input and provide power to the output signal to continue to the next route in the network. This is also an essential device in the use of telegrams and telephones because they need to traditionally travel far away through fiber optics. Repeater is a device in class 1 (Physic Layer) in OSI model. When we use Repeater, the physical signal at the input will be amplified, thereby providing a more stable and powerful signal for the output, to be able to reach further locations. b, Hubs Hub is a device used for signal amplification, and is considered as a multi-port repeater. When a port on the hub receives information, the other ports will receive the information immediately. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Hub There are 2 types of Hub lung that are Active Hub and smarthub - Active Hub, this type of Hub is often used much more commonly, it needs to be powered when operating. Active Hub is used to amplify the incoming signal and divide the remaining ports to ensure the necessary signal speed when using. - Smart Hub, also known as Intelligent Hub, also has the same function as Active Hub, but it has integrated chip that automatically detects errors on the network. c, Bridges If the Repeater is the first layer in the OSI model, the Bridge is the second layer in this model (Data Link Layer). This tool is used to connect between two networks to form a large network, such as a bridge between two Ethernet networks. When there is a computer that transmits signals to another machine with two completely different networks, Bridge will copy the packet and send it to the destination network. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Bridge Thus, although different network computers can still transmit signals to each other without knowing the appearance of Bridge, because it works transparently. A Bridge can handle multiple network traffic as well as IP addresses at the same time. However, Bridge only connects networks of the same type and uses them for highspeed networks that will be more difficult if they are located far away from each other. d, Switches Switches are sometimes described as a multi-port bridge. While a Bridge has only two ports to connect two network segments together, the Switch is able to connect multiple segments together depending on the number of ports on the Switch. Like Bridge, the Switch also "learns" the information of the network through the packets it receives from computers on the network. The switch uses this information to build up the Switch panel, which provides information to help the packets arrive at the correct address. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Switch e, Router Layer 1 Repeater, Layer 2 Bridge and Router are Layer 3 network devices of the OSI model, it is capable of connecting two or more IP networks together. The feature of this network is that every computer connected to the network can communicate with the Router, while other networks and computers must be aware of the existence and participation of the Router. Router Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) f. Gateways Gateway lets you join two types of protocols together. For example, if your network uses IP protocol and someone's network uses IPX, Novell, DECnet, SNA ... or a protocol, Gateway will switch from one protocol to another. Gateway Through Gateway, computers in networks using different protocols can easily "talk" to each other. Gateway not only distinguishes protocols but can also distinguish applications like how you send e-mail from one network to another, convert a remote session ... g. Other devices In addition to the 6 listed devices, some other network devices are used. 2.1.2. Discuss the operational principles of server types. Server is a computer program that provides services for other computer programs (and for users). In data centers, physical computers that run server programs are also often referred to as a server. This computer can be a dedicated server or can be used for other purposes. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Server ( illustration ) In the client / server programming model, a server program will wait to receive and respond to requests from the client program. This client can run on the same computer as the server or run on another computer. A specific application in a computer that can act as a client with service requests from other or similar programs can also run as a server. a. Web Server Web Server is a computer on which to install web server software, sometimes it is called the web server itself. All web servers understand and run *.htm and *.html files. However, each web server serves a number of specialized file types such as Microsoft llS for *.asp, *.aspx ...; Apache for *.php ...; Sun Java system web server of SUN for *.jsp ... At the core of the web server is a web service that serves static content to a browser by downloading a file from the disk and transferring it to the network, to a web browser user. This complete exchange is done indirectly through a browser and a server connects to another device using HTTP. Any computer can go into a web service by installing service software and connecting to the internet. There are a lot of web application software on the net, including domain name software from NCSA and Apache, and commercial software from Microsoft, Netscape and many others. b. Applications Server It is also known as AppServer. A program that controls all application activities between users and end-layer applications of a business organization or databases. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Typical application services are typically used for basic transaction-matching applications. To support high demand, an application service must have internal redundancy, control for high availability, high-level presentation, application service delivery, and support for link access. database. c. Printer Server Print service is installed on a network to route print requests from the network computers of that network. The control server prints the required file and sends the file to the requested printer - A print service that allows multiple users to use the same printer on the network. d. Proxy Server It is a server that stands between an application, as a web browser, and a real server. It blocks all requests to the real server if it is able to fully respond to requests, otherwise it will forward requests to the real server. Proxy servers have two main purposes: It is possible to increase the flexibility of user group activities, because it stores the results of all requests for a certain amount of time. Proxy servers also require filtering to lock or not allow a particular connection to request to or from the server. e. Database Server Database Server is a computer on which the Database Management System software is installed. We have database management system such as: SQL server, MySQL, Oracle ... A database service is a basic application on the server / workstation architecture model. The application is divided into two parts. a part runs on a workstation (where users accumulate and display database information) and the rest runs on the server, which is supposed to be a data connection and store - made show. f. FTP Server FTP server: FTP (short for File Transfer Protocol translated as "File Transfer Protocol") is often used to exchange files over TCP / IP communication network (such as Internet - network external - or intranet - intranet). Operation of FTP requires two computers, a server and a client). The FTP server, running software that provides FTP services, is called a server, listening to the service requests of other computers on the network. The client running the FTP software is for the user of the service, called the client, and initiates a link to the server. An FTP service is a software application that runs file transfer protocols, which exchange files over the internet. FTP works similarly to the way HTTP makes and transmits web pages from a server to a browser user, and SMTP for sending e-mail via the internet. Like these technologies, FTP uses the Internet's TCP / IP protocol to transfer data. FTP is widely used to download a file from a server using the internet or vice versa (eg uploading a website to the server). Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) g. DNS Server DNS Server is a domain resolution server. Every computer, network device connected to the Internet is connected to each other by IP address (Internet Protocol). To facilitate the use and easy to remember, we use the name (domain name) to identify the device. Domain Name System DNS (Domain Name System) is used to map domain names to IP addresses. h, DHCP Server DHCP server: DHCP (Dynamic Host Configuration Protocol) is an automatic configuration protocol for IP addresses. The computer is configured automatically, thus reducing interference in the network. DHCP server is a server with DHCP service installed, it functions to manage the allocation of dynamic IP addresses and TCP / IP configuration data. There is also an answering task when the DHCP Client has a subscription contract. i.Virtual Private Server - VPS VPS is a server type separated from the above physical server by using virtualization technology. From a separate server, it is possible to split into many different virtual servers that function as physical servers and share resources on the original physical server. Virtual Private Server - VPS k. Cloud Server Cloud Server is a server that combines a lot of different physical servers together with SAN storage system with outstanding access speed, which helps the server to operate quickly, stably and limit the downtime of downtime. Cloud server is built on Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) cloud computing technology so it is easy to upgrade each part of the device during use without disrupting the process of using the server. l. SMTP server SMTP server: SMTP (Simple Mail Transfer Protocol) is a standard for e-mail transmission over the Internet. SMTP server is a server that helps you send mail to other email addresses on the internet. Most web and mail services transfer and store mail on the network and send it over the internet. Today most people think that mail service is an abbreviation of the internet. However, mail services are developed primarily on the basis of the internet. (LANs and WANs). 2.2. Explore a variety of server types and demonstrate server selection, considering a certain scenario regarding cost optimization and performance. There are many factors to consider when choosing a server, including virtual machines (VMs) and unified containers. When choosing a server, pay attention to the importance of some features depending on the use case. Remember, security is also extremely important, in addition to the need for additional protection, detection, warning and recovery features, including encryption of the original data to protect data on the move and The data is stored, updating the event log continuously to prevent duplicates that cannot be deleted. If the server uses internal memory, selecting disk type and capacity is equally important as it may significantly affect input / output (I / O) and resilience. 2.2.1. Factors to consider when choosing a server Select the server that meets the main needs: If you want to improve email usage in your business, an email server is a priority. Or if your business needs to manage a large volume of documents, choose a dedicated server to share data immediately. Appropriate budget: You should set a budget right from the start and based on that budget to have an appropriate plan. The server market is quite diverse and you can have more than 3-4 options for a budget level. Select brand: After deciding which type of server to buy, you need to choose a provider that is known for that type of server. This ensures you will buy a server from a reputable, well-known brand and is fully supported during use. Select operating system: Just like when buying personal computers, the operating system plays a very important role in ensuring smooth operation of applications. Similarly, the server Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) needs an appropriate operating system as a platform to handle thousands of different user commands from the entire user of the system. Ability of extension: The server is invested for long-term use, so the level of expansion of the system should be considered. Usually the hard drive and memory will be concerned about how much can be extended. Using RAID settings will also ensure that the business does not lose data when any hard drive in the system fails Support and maintenance: Most small businesses have no IT department available, so they often have to outsource. But if you buy a server from a reputable provider, you will always be offered the maintenance package included. Virtualization capability: Using virtualization will increase operational efficiency for server systems and is often concerned by small and medium enterprises to save costs. This feature is also increasingly popular to help businesses create new servers based on available hardware based on software. So you need to consider whether the processor and the hard drive can meet the requirements or not. 2.2.2. Select server for business a. For small and medium enterprises The basic needs of a business such as enterprise information storage, website hosting, software running can be solved with simple technologies such as hosting. However, when the demand at maintaining a stable system, beautiful website, stable speed that meets a traffic of 100-700 times a day, the choice of server is enough to ensure the effective business capacity. fruit. Besides, for higher demands such as storing large amounts of information or needing to exchange data back and forth, server use can be considered mandatory. b.For big business The server for large businesses is a necessity because the demand for management capacity and operating speed are always top priorities. Some of the needs that server helps solve for this business object include: - Save and manage a large amount of business information, manage project information ... - Run the software: management, finance ... - Backup, data backup - Safe and secure data protection - Anti-local attack Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) - Managing and operating remote systems - Increase processing capability, enabling powerful processing capability during peak periods, the need for resources such as RAM, CPU, high speed transmission ... 2.3. Discuss the interdependence of workstation hardware with related network software. Network hardware - This is a single component of the data transfer network and facilitates computer functions. Although it contains many hardware components, there are many different types that make up the total functionality of the network. Router - it is a device that is connected to multiple channels for different networks. It works with the help of the interface. It is in the network's layers that create a path to transmit information to routers that act as processing units. It sets up some rules and uses protocols to identify information packets to its final destination. Gateway - it works with different protocols. It is in the network node and interfaces with another network. Switch contains more intelligent centers. It is capable of checking data, identifying sources and forwarding data. It performs better than the center. The switches are mainly active. Bridges - it allows a large network area into a smaller, more efficient segment. They make the data updated and create connections on both sides. It transmits information to the correct location. It maintains optimal work on both sides of the network. Modems - it converts data into between similar forms. It is capable of implementing some advanced network features. File server - network file server is a computer system used for the purpose of managing file systems, network printers, handling network communication and other functions. A server that can be reserved is such a case, its entire processing power is allocated to the network function or it may not be dedicated, which means that part of the server functions are Allocate as a workstation or DOS-based system. Network operating system - it is loaded into the server's hard disk along with system management tools and user utilities. When the system is started, the NOS starts and the other server is under its control. Workstations - workstations or nodes are attached to the server via network interface cards and cables; Workstations are usually smart systems, such as IBM computers. But the DUMV terminal is used in mainframe computers. The concept of distributed processes depends on the fact that the personal computer attached to the network performs its own processing after downloading the program and data from the server. Therefore, a workstation is called an active device on the network. After processing, the files are stored back on the server where other workstations can use them. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Network interface card - all devices connected to the LAN need a network interface card to plug into the LAN. For example, a PC needs to have an Ethernet card installed in it to connect to Ethernet LAN. Network cabling - when the server, workstation and network interface card are set, the network cable is used to connect everything together. The most common type of network cable: + Twisted twisted wire + Coaxial cable + Optical cable. These are interdependent to implement the network properly. This is the basic process of complete connection. This is a suitable system for insurance industries to apply this process to operate effectively and efficiently. 3, Network system design. 3.1, Design a networked system to meet a certain specification. 3.1.1, Request. I was recruited to be a network engineer by a high-tech network solution development organization and working on a project for a local educational institution (Specifically, I will act as a network engineer for BTEC FPT International College). I will need to analyze the specification from the organization below to complete this project within a certain time frame with the requirements set out as follows: People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including academic manager and program manager, 3 computer network administrators Resources: 50 student lab computers, 35 computer staff, 3 printers Building: 3 floors, all computers and printers are on the ground floor outside the IT lab - a laboratory is located on the first floor and another is on the second floor. 3.1.2, Design plan and expected cost. 3.1.2.1, Design plan. At the request of the lesson, the building consists of 3 floors: - On the ground floor, teachers and staff at the school will be designed here. Besides, there are rooms for network administrators and managers. The printer is also designed on the ground floor. In addition, I also propose to add some servers to use as File Server and Web Server. We can also use virtualization technology to save costs (Virtual Private Server). - Level 1 and 2 are labs. With 50 computers for students, we divided into 2 laboratories, 1 room on the 1st floor and 1 room on the 2nd floor. The number of computers for students per floor is 25 units. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Let's see the physical diagram illustrating the above proposal: Network physical diagram of the building 3.1.2.1.1. Design plan on ground floor. Network physical model on the ground floor Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) a, Management Department. In this room, we will have 5 computers for 5 senior managers, including the academic manager and program manager. b, Computer network administrator room. With 3 computers, 3 network administrators will manage the entire network in the school such as switch and router management, server management, security for the intranet, ... c, Teachers and staff rooms in the school. Teachers and staff will also be supported by the school and printers to work. These devices are arranged on the ground floor. d, Equipment department. This is the room used to place devices such as switches, routers and servers (as mentioned above, I would suggest installing one or more servers to work internally even though the threads are not required). 3.1.2.1.2. 1st and 2nd floor. Network physical model of LAB On these two floors there will be the same layout because they are all arranged in a lab for students. With 50 computers divided into 2 labs, each room will have 25 computers. Besides, each room will have 1 computer for teachers to use for teaching as well as to manage students. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) 3.2, Check and evaluate the design to meet the requirements and analyze user feedback. 3.2.1, Check and evaluate the design for requirements. Network system of British College BTEC FPT is a network system used for learning purposes and helps improve the quality of school teaching. Since the deployment network must meet some of the following requirements: Operability: The first criterion is that it must work, the network must meet the user's work requirements, must provide the ability to connect among users, between users and the application at a speed and Acceptable reliability. Can be managed: The network must be designed to be easy to monitor and administer to ensure smooth operation of the features. Exchange data quickly and safely: The exchange of information and data between teachers in the school, between the central office and schools is carried out quickly and safely, high speed of information transmission, meeting operational needs of school. Ability to manage centralized data information: Building a centralized management model, all data is gathered in one place to both keep information confidential and convenient for managing and backing up data. Simultaneously with centralized management from the central office can easily manage remote offices through the support of application programs. Remote administration and administration capabilities: The school can operate its operations remotely through the network. Therefore, saving travel costs and improving the effectiveness of teaching management of the school. Ability of extension: The network must be expanded, the original design must be expanded without causing a major change in the overall design. Compatibility: The network must be designed with a pair of faces that are always oriented towards new technology and must ensure that it does not prevent the introduction of new technologies in the future. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) 3.2.2. Check and evaluate costs. 3.2.2.1, Equipment cost. 3.2.2.1.1, 85 computers. a, Tower. Tower: is the main part of the computer. That is the part containing the necessary hardware. In this case I will choose Tower ACER ASPIRE ATC-780: Tower ACER ASPIRE ATC-780 Here are a few specifications: Model: Producer: Origin: ASPIRE ATC-780 DT.B59SV.002 Acer China Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) CPU: CPU type: CPU speed: Caching: RAM type: RAM capacity: Bus speed: Hard drive type: Hard disk capacity: Optical disc type: Graphics processor: Graphics card chipset: Graphics card capacity: Sound technology: Audio standard: WiFi standard: LAN Standard: OS Size: Weight (kg): Intel Core-i3 6100 3.70 GHz 3 MB Cache SDRAM DDR3 4 GB 1600 MHz SATA 1 TB SuperMulti DVD Integrated Intel HD Graphics Intel HD Graphics 530 Share High Definition High Definition Audio IEEE 802.11 b/g/n 10 / 100 / 1000 Mbps Windows 10 Home SL 175x426x382 mm 10 kg It sells for $ 350 (at the time the network is being designed). b, Monitor. Monitor: if there is no screen, you will not be able to view this website or any other program. I will propose a 21.5-inch HP N220 computer screen (Y6P09AA): Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Computer screen Some basic parameters: 21.5 inch FHD IPS screen 21.5-inch large screen size, 16: 9, N220 ratio allows easier handling of work. The screen's resolution is FHD (1920 x 1080p) and the wide viewing angle IPS 178º technology allows easy viewing of content at different angles while ensuring sharp quality. A common VGA and HDMI connection The screen is equipped with common connectors such as VGA and HDMI. Screen adjustment buttons are located on the right side on the back. Solid base with elegant silver color, can fold the screen to the front and back to suit the sitting posture. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) The back of the screen High-end display technology Optimized by HP's high-end display technology, the N220 screen gives a comfortable viewing experience, without eye fatigue even at night thanks to the extremely low level of blue light. The selected screen allows the blue light to be turned off if desired. N220 has extremely low power consumption, saving maximum cost of use. The screen meets ENERGY STAR 7.0 and EPEAT Silver standards, and uses environmentally friendly materials. With the above configuration, it will cost about 100 USD. c, Mouse and keyboard. Currently on the market there are many different types of mice and keyboards, which are diverse in types, so I will not recommend specific equipment. The cost for both the keyboard and the keyboard will be about 50 USD. So for a set of computers we will (including Tower, Monitor, mouse and keyboard) we will spend 500 USD. At the request of the lesson, the school will have 85 computers, so the expected cost is 42 500 USD (500 * 85 = 42 500 USD). Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) 3.2.2.1.2, Printer. At a cost of about 100 USD, we can choose LASER printer CANON IMAGECLASS LBP6230DN: Compact design Canon Laser ImageClass LBP6230DN laser printer in white color combined with black color gives an elegant, neat design with rounded edges that look a lot like the LBP6030W but slightly larger because the paper tray is upgraded to 250 sheets. Canon printer Fast printing speed Canon laser printer ImageClass LBP6230DN helps improve work efficiency. With a resolution of 600 x 600 dpi, fast printing capability of 25 pages / minute and automatic 2-sided printing, you can easily get quality prints in short time. 250-sheet paper tray The printer is equipped with a paper tray that can hold up to 250 sheets, you do not need to add paper regularly, which helps ensure continuous printing capability. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Canon printer Automatic shutdown mode In addition, Canon laser printers are programmed with sleep mode and automatic shutdown if not working for a certain period of time, saving you electricity costs. With 3 numbers, we will spend 300 USD to buy a printer. 3.2.2.1.3, Server Since this is a small LAN, I will choose the Server for about 1500 USD. The IBM System server x3500 M4 (7383C2A) will be the right choice in this case: Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) IBM server Some specifications: Type of CPU used Number of CPUs Caching Main memory RAM Memory type BUS speed of RAM Storage HDD communication type Optical drive PSU Intel Xeon E5-262 1 CPU 15MB 8GB DDR3 1333MHz SATA DVD-ROM 750W With 2 server machines, we will spend about 3000 USD. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) 3.2.2.1.4, Switch. With 3-storey building, we will use 3 Switch layer 2 and 1 Switch Core. Switch layer 2 will cost 500 USD / unit, Switch Core will be more expensive and cost about 1000 USD. Thus, we will spend 2500 USD to buy Switch. 3.2.2.1.5, Router. For a small network, I would suggest a Router device that costs $ 100 and just one device is enough. Thus, the cost for the device will be 48 400 USD. 3.2.2.2, Other costs. In addition to the cost to buy the equipment, we can also mention some other costs such as initial installation costs, operating costs, ... In order for the network to run smoothly, it will take about 50 000 USD. 3.3, Installing and configuring network services and applications. 3.3.1, Basic configuration. Set hostname for router and switch: Each device needs a name that is easy to manage. Set IP: Each device needs an IP to easily manage and identify. Set password: In order to improve security, switches and routers should use access passwords, as well as limit the number of visits for some authorized users. Besides setting a password, we can use SSH remote access method to improve security. SSH configuration: Besides improving security more than Telnet, SSH helps network administrators easily manage devices. 3.3.2, VLAN. VLAN stands for Virtual Local Area Network or virtual LAN. A VLAN is defined as a logical group of network devices and is set up based on factors such as functions, parts, applications ... of the company. Technically, VLANs are a broadcast domain created by switches. Normally, the router plays the role of creating the broadcast domain. For VLANs, switches can create broadcast domains. Benefits of VLANs: • Bandwidth savings of the network: VLAN divides the LAN into several small segments, each of which is a broadcast domain. When there is a broadcast, it is Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) transmitted only in the corresponding VLAN. Therefore, dividing VLANs saves network bandwidth. • Increased security: Because devices on different VLANs cannot access each other (unless you use a router that connects VLANs). As in the above example, computers in VLAN accounting can only communicate with each other. The machine in VLAN accounting cannot be connected to the computer at VLAN engineer (Engineering). • Easily add or remove computers to VLANs: Adding a computer to the VLAN is simple, just configure the port for that machine to the desired VLAN. • Great network flexibility: VLANs can easily move devices. Suppose in the above example, after a period of use the company decided to leave each part on a separate floor. With VLANs, you only need to reconfigure switch ports and place them on the required VLANs. VLANs can be configured static or dynamic. In a static configuration, the network administrator must configure each port of each switch. Then, assign it to a VLAN. In the dynamic configuration, each switch port can configure its VLAN based on the MAC address of the connected device. Trunk port: • When a link between two switches or between a router and a switch conveys the traffic of multiple VLANs, that port is called trunk port. • The trunk port must run special communication protocols. The protocol used may be Cisco's proprietary ISL protocol or IEEE 802.1q standard. 3.3.3, DHCP. DHCP is an acronym for Dynamic Host Configuration Protocol (Dynamic Host Configuration Protocol). It is a protocol for allocating IP addresses for devices on a network. DHCP is essential to determine the number of devices that can connect to a network. It ensures that all devices on the network have an IP address and no device has the same IP. Without DHCP, devices on the network may experience IP conflict errors, making network administration difficult. Manually assign IP addresses, IP conflict resolution is a tedious, time-consuming task even on small network systems. For larger networks, it is almost impossible. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) DHCP Server and DHCP on Router Basically, DHCP allows network administrators to automate the process of allocating IP addresses and because these addresses are dynamic addresses, you'll rarely see a device on the network. granted IP address. This allows an almost unlimited number of devices to connect to the network. There are three components within the DHCP architecture, including DHCP clients, DHCP servers, and DHCP relay agents. The DHCP client is any device that can connect to the network, and can communicate with the DHCP server. It could be a phone, a computer, but it could be a network printer, a server, etc. DHCP server is a device that allocates an IP address. DHCP relay agents are intermediate devices that relay requests between a DHCP client and a DHCP server. They are not an essential component of a normal network. However, when working with large, complex networks, they become very necessary. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) DHCP relay agents 3.3.4, Static routing. For static routing the route information must be entered by the network administrator for the router. When the network structure has any changes, it is the network administrator who has to delete or add path information to the router. Such types of routes are called fixed paths. For large networks, the maintenance of the routing network for the router like this takes a lot of time. Also for small networks, there is little change. This work is less costly. Because static routing requires network administrators to configure all route information for the router, it does not have the flexibility of dynamic routing. In large networks, Static routing is often used in conjunction with dynamic routing protocols for some special purposes. 3.3.5, NAT. Network Address Translation (NAT) is like a router, forwarding packets between different network layers on a large network. NAT translates or changes one or both addresses inside a packet when the packet goes through a Router, or some other device. Usually NAT usually changes the address is usually the private address (Private IP) of a network connection to a public address (IP Public). NAT can also be considered a basic firewall. NAT maintains a table of information about each packet sent. When a network computer connects to a website on the Internet header, the source IP address is replaced with a public address that is preconfigured on the NAT server, after having a packet returned to NAT based on the record it has saved. About packets, change the destination IP address to the PC's address in the network and forward it. Through that mechanism, network administrators can filter packets sent to or sent from an IP address and allow or prevent access to a specific port. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) 3.3.6, ACL. ACLs (Access control lists) are also known as access lists, which are a sequential list of statements called ACEs (Access control entries), applied on a certain Interface, and on input or output buffers, Router control rejects or forwards packets based on information in IP header or TCP / UDP header. Purpose of using ACL: Limit network traffic to increase network performance Provide control of communication flow by limiting delivery updates. Provides basic security level for network access. Terms of communication are allowed to be forwarded or rejected by the Router. Ability to control user access Activities of ACLs: When the packet arrives at the Router, the serial device checks against ACEs in the ACLs to decide whether to allow the packet to go through Interface or reject. The ACEs in the ACLs are checked sequentially from the first ACE to the last ACE. If certain ACE conditions are met, then ACEs need to be checked. At the end of the ACLs is an implicit ACE that refuses to allow the packet to pass. Therefore, if the packet does not meet the conditions for the above ACEs, the packet will be dropped. 4, Deploy and diagnose networked systems. 4.1, Implement a network based on a prepared design. 4.1.1, Basic configuration. a, Set hostname for devices. On the router, we proceed to configure terminal terminal and name it: Set hostname for Router Similar to Switch Core, Ground floor switch, 1st and 2nd floor: Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Set hostname for Switch Core b, Set IP. The outside of the router will have a public IP address of 200.200.1.1 and the inside surface will be the 172.17.0.0/16 network range Internet (demo) On the router, we will go to the gateway to connect to the network and the port connected to the Switch Core to set the IP: Set IP for interface s2/0 on Router Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Similarly on the Switch Core, at the port connected to the Route we will set the IP to 172.17.0.254 Set IP on Switch Core On the Switch on the ground floor, the first floor and the second floor we enter vlan 1 to set them IP to 172.17.1.1 (SW1), 172.17.1.2 (SW2), 172.17.1.3 (SW3) and their default gateway for 172.17.1.254 , point to Switch Core. c, Set password. Setting passwords on routers and switches is the same. We set up the password console one by one, enable password and encrypt all password types to MD7: Set password on Switch Core d, SSH configuration. Here, I create 3 usernames, u1, u2 and u3, respectively for 3 network administrators in the school: Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) SSH configuration on Switch Core Similarly, configure the router and other switches one after another. 4.1.2, VLAN a, Create VLANs. I will create the following VLANs in turn: VLAN 1 (172.17.1.0/24): Default for switches VLAN 10 (172.17.10.0/24): Management VLAN 21 (172.17.21.0/24): Employee VLAN 22 (172.17.22.0/24): Teacher VLAN 31 (172.17.31.0/24): Student in Lab 1 VLAN 32 (172.17.32.0/24): Student in Lab 2 VLAN 41 (172.17.41.0/24): Vlan is used when testing for Lab 1 VLAN 42 (172.17.42.0/24): Vlan is used when testing for Lab 2 VLAN 50 (172.17.50.0/24): Client network VLAN 97 (172.17.97.0/24): Printer VLAN 98 (172.17.98.0/24): Server VLAN 99 (172.17.99.0/24): IT b, VTP configuration. - Help synchronize information of VLANs on all Switches together. - Asynchronous port because the switch has different port numbers. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) - Conditions for obtaining VTP: • The lines between the Switches must be trunk: Configuring trunking Configure VTP mode server on switch core: Configure VTP mode server on switch core Configure VTP mode client on switch ground floor, 1st and 2nd floor: Configure VTP mode client on switch ground floor, 1st and 2nd floor c, Routing between VLANs After the created VLANs, there is a problem that other VLANs cannot communicate with. In order for them to communicate, we configure routing between VLANs. On SW-L3 configuring routing images between Vlans ensures that other VLAN PCs communicate with each other: Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) VLANs in the intranet system 4.1.3, DHCP. On Switch Core, DHCP configuration grants dynamic IP to VLANs: DHCP configuration on the switch core In addition to providing dynamic IP for VLAN 10, I also reserve the first 10 IPs of the range to use when needed. For the remaining VLANs, we perform the same configuration. 4.1.4, Static routing. Configuring on the router (200.200.1.2 is the IP gateway connected to the network): Static routing on router And on the switch: Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Static routing on switch core 4.1.5, NAT. Mechanism of 2-way NAT processing. • NAT processing packets from inside a LAN going outside the internet (outside) • NAT processes packets from outside the internet (outside) to the local network (LAN) Configure NAT on the router I created an ACL that banned IP ranges of VLAN 41 (172.17.41.0/24) and VLAN 42 (172.17.42.0/24) out of the internet for the purpose of using these two IP ranges for testing. In addition, I also allow machines from outside the Internet to access Web Server through ports 80 and 443 (172.17.98.80 is the IP of the Web Server). 4.1.6, ACL a, Prohibit VLAN test1 and VLAN test2 internet access. As mentioned in Section 4.1.5, I have created ACL 1 that prohibits these IP ranges from accessing the internet for exams at two labs. b, Only allow VLAN it ssh to switch and router. On the router, I do the following: Configure ACL to SSH Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Similar to switch. 4.2, Analysis of test results compared with expected results. a, Basic configuration. IT department machines can access switches and routers via SSH protocol: IT computer SSH to the Router b, VLAN. After creating VLANs, computers belonging to the same VLAN can communicate with each other. And after routing between VLANs on Switch Core, other VLAN devices can also ping each other. Example of a VLAN 22 computer (teacher) pings to VLAN 32 (student2 in Lab 2): Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) The teacher's computer pings to the student's computer All 4 packets were sent successfully. c, DHCP. After configuring DHCP on the core switch, the devices in the network are completely provided with a free IP corresponding to each VLAN, which reduces the effort for network administrators, no need to install manually. Example of automatic receipt of an IPv4 of a computer in VLAN 99 (IT): Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Computer under VLAN 99 receives dynamic IP We can also apply for a different IP address. d, Static routing and NAT Configuring static routing and NAT helps devices access the internet: Example of a computer in VLAN 31 (student1) that accesses Google DNS: DNS Google And access is completely successful: Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Successful Google DNS access But for VLAN 41 (test1) - VLAN for the exam, it is completely inaccessible. This avoids cheating of students: Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) The VLAN for the exam does not access the internet And when we try to ping Google DNS: Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) The VLAN for the exam does not access the internet e, ACL Configuring ACL only allows VLAN IT to access the router and switch, preventing any unauthorized access. On a VLAN IT computer we can use the SSH protocol: Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) IT computer SSH to Router successfully For other VLAN computers, it will not be possible to SSH into the router and switch: Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com) Computer does not belong to VLAN IT then it fails SSH to the router 4.3, Proposing potential improvements for networked systems. 4.3.1, Scaling up schools. We can completely open another Lab for students. With the target of 25 students and 1 student machine, the new Lab room will be invested 13,000 USD. There is also a lab management switch installed. 4.3.2, Redundant configuration for LAN. In case the network connection with ISP FPT has trouble, the whole LAN will not access the Internet. In this case, we will hire an additional line and a public IP to build a redundant network path. Conclude In the above reports, I have presented the following main ideas: Check their network rules and protocols. Explain devices and network activity. Effective network design. Deploy and diagnose networked systems. Document shared on www.docsity.com Downloaded by: King786 (deadlyshaz786@gmail.com)