Uploaded by luongvinhkien

1619 - Assignment 1 Full Võ Hoàng Hiển

advertisement
Higher Nationals in Computing
Unit 2: Networking
ASSIGNMENT 1
Learner’s name:
ID:
Class:
Subject code: 1619
Assessor name: PHAN MINH TAM
Assignment due:
Assignment submitted:
ASSIGNMENT 1 FRONT SHEET
Qualification
BTEC Level 5 HND Diploma in Computing
Unit number and title
Unit 2: Networking
Submission date
Date Received 1st submission
Re-submission Date
Date Received 2nd submission
Student Name
Student ID
Class
Assessor name
Tam Phan
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1
P2
P3
P4
M1
M2
D1
 Summative Feedback:
Grade:
Signature & Date:
 Resubmission Feedback:
Assessor Signature:
Date:
Assignment Brief 1 (RQF)
Higher National Certificate/Diploma in Computing
Student Name/ID Number:
Unit Number and Title:
Unit 2: Networking
Academic Year:
2021 – 2022
Unit Assessor:
Tam Phan
Assignment Title:
Networking Infrastructure
Issue Date:
November 17, 2021
Submission Date:
Internal Verifier Name:
Date:
Submission Format:
Format:
●
The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs
and subsections as appropriate, and all work must be supported with research and referenced using the
Harvard referencing system. Please also provide a bibliography using the Harvard referencing system.
Submission
●
Students are compulsory to submit the assignment in due date and in a way requested by the Tutor.
●
The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/.
●
Remember to convert the word file into PDF file before the submission on CMS.
Note:
●
The individual Assignment must be your own work, and not copied by or from another student.
●
If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you must
●
reference your sources, using the Harvard style.
Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply this
requirement will result in a failed assignment.
Unit Learning Outcomes:
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
Assignment Brief and Guidance:
Assignment scenario
You are employed as a network engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which has branches in Ho Chi Minh City, Hanoi, Da Nang and Can Tho. The company has
been contracted to implement a networking project from a local educational institute. The specification of the
project is given below:

People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the academic heads and the programme
managers, and 3 computer network administrators.

Resources: 50 student lab computers, 35 staff computers, and 3 printers.

Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located on the first floor and another located
on the second floor.
Task 1
The CEO of the company, Mr. Nguyen, has asked you to investigate and explain networking principles, protocols
and devices and submit a report.
You will need to produce a report that includes the following:

An introduction to provide an overview of your report.

Benefits and constraints of different types of networks and networking standards.

The impact of network topology, speed of communication and bandwidth requirements.

Effectiveness of networking systems.

Discussion on operating principles of networking devices and server types and networking software.

Discuss the relationship of workstation hardware with networking software.

Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization.

For the given specification, identify the topology protocol for the efficient utilization of a networking system.
Learning Outcomes and Assessment Criteria (Assignment 1):
Learning Outcome
Pass
Merit
Distinction
LO1
P1 Discuss the benefits
and constraints of
different network types
and standards.
M1 Compare common
networking principles
and how protocols
enable the effectiveness
of networked systems.
D1 Considering a given
scenario, identify the
topology protocol
selected for the efficient
utilization of a
networking system.
P2 Explain the impact
of network topology,
communication and
bandwidth requirements.
LO2
P3 Discuss the
operating principles of
networking devices and
server types.
P4 Discuss the interdependence of
workstation hardware
with relevant
networking software.
M2 Explore a range of
server types and justify
the selection of a server,
considering a given
scenario regarding cost
and performance
optimisation.
Table of Contents
Table of Contents
Unit 2: Networking Assignment ......................................................................................................................... 1
INTRODUCTION TO NETWORKING .................................................................................................................. 1
P1 Discuss the benefits and constraints of different network types and standards ............................... 1
1.
What is the network? .................................................................................................................................... 1
2.
Network type ( LAN,MAN, INTERNET, ect….) ..................................................................................2
2.1. LAN ( Local Area Network) ....................................................................................................................... 2
2.2. MAN ( Metropolitan Area Network) ........................................................................................................ 3
2.3. INTERNET ( International Network) ....................................................................................................... 4
2.4.
Benefit of networking ................................................................................................................... 4
2.4.1.
Advantages of LAN ....................................................................................................................... 4
2.4.2.
Advantages of MAN ...................................................................................................................... 5
2.4.3.
Advantages of WAN ...................................................................................................................... 5
2.5. Protocol and Standards ........................................................................................................................... 6
2.5.1.
Define Standards ........................................................................................................................... 6
2.5.2.
List some protocols .......................................................................................................................... 6
2.5.3.
List some standard organizations and standards names .................................................... 6
P2. Network topology & communication and Bandwidth requirements ................................................... 7
1.
What is Network topology ? ........................................................................................................................ 7
1.1. Network topology definition .................................................................................................................... 7
2.
Denifition of Physical & Logical Topology .............................................................................................. 8
2.1. Denifition of Physical Topology ............................................................................................................. 8
2.2. Denifition of Logical Topology ............................................................................................................... 9
2.3. Examples of topology with diagrams ( Mesh, Star, Bus, Ring, Tree, Hyprib) ...............................10
3.
2.3.1.
Mesh Topology ............................................................................................................................10
2.3.2.
Star Topology ...............................................................................................................................11
2.3.3.
Bus Topology ...................................................................................................................................... 12
2.3.4.
Ring Topology .................................................................................................................................... 13
2.3.5.
Hibrib Topology ...........................................................................................................................14
Comunication and Bandwidth..................................................................................................................15
3.1. Comunication ...........................................................................................................................................15
3.1.1.
Define commutations in terms of networking ......................................................................15
3.1.2.
Rules of communication .................................................................................................................................. 15
3.2. Bandwidth ......................................................................................................................................................... 16
M1 Compare common networking principles and how protocols enable the effectiveness of networked
systems
............................................................................................................................................................................................................. 1
6
1.
What is the TCP / IP protocol ? ........................................................................................................................... 16
1.1. The most popular TCP / Ip protocols ............................................................................................................. 17
2.
What is the OSI model? ....................................................................................................................................... 18
3.
Compare OSI model with TCP / IP model .......................................................................................................... 19
P3 Discuss the operating principles of networking devices and server types .............................................................. 20
1.
Discuss 1 or 2 operating principles of a selected network device .......................................................................... 20
1.1. Repeater ............................................................................................................................................................ 20
2.2. Hub .............................................................................................................................................................. 21
2.
List network devices ............................................................................................................................................................ 22
3.
List server types .................................................................................................................................................................... 22
P4 Discuss the inter-dependence of workstation hardware with relevant networking software .......................... 22
1.
Define workstation hardware ............................................................................................................................ 22
2.
Define networking software............................................................................................................................... 23
3. Discuss and explain the interdepencies of workstation hardware with networking software. Derive an
example form your discussion
23
M2 Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimization
............................................................................................................................................................................................................. 2
4
1.
Some types of server ....................................................................................................................................... 24
2. Determining Your Networking Requirements .......................................................................................................... 26
D1 Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system.
26
ASSIGNMENT 1 ANSWERS
INTRODUCTION TO NETWORKING
Networking is referred as connecting computers electronically for the purpose of sharing information
. Resources such as files , applications , printers and software are common information shared in a
networking . The advantage of networking can be seen clearly in terms of security , efficiency ,
manageability and cost effectiveness as it allows collaboration between users in a wide range .
Basically , network consists of hardware component such as computer , hubs , switches , routers and
other devices which form the network infrastructure . These are the devices that play an important
role in data transfer from one place to another using different technology such as radio waves and
wires . There are many types of network available in the networking industries and the most common
network are Local Area Network ( LAN ) and Wide Area Network ( WAN ) .LAN network is made up of
two or more computers connected together in a short distance usually at home , office buildings or
school . WAN is a network that covers wider area than LAN and usually covers cities , countries and the
whole world . Several major LAN can be connect together to form a WAN . As several devices are
connected to network , it is important to ensure data collision does not happened when this devices
attempt to use date channel simultaneously. A set of rules called Carrier Sense Multiple Access /
Collision detection are used to detect and prevent collision in networks.
P1 Discuss the benefits and constraints of different network types and standards.
1. What is the network?
- A computer network is a group of computers that use a set of common communication
protocols over digital interconnections for the purpose of sharing resources located on or
provided by the network nodes. The interconnections between nodes are formed from a
broad spectrum of telecommunication network technologies, based on physically wired,
optical, and wireless radio-frequency methods that may be arranged in a variety of network
topologies.
Figure 1 Network
2. Network type ( LAN,MAN, INTERNET, ect….)
-
There are three types of computer networks.
Figure 2 Network type
2.1.
LAN ( Local Area Network)
-
Local area network is a group of computers connected with each other in a small places
such as school, hospital, apartment etc.
-
LAN is secure because there is no outside connection with the local area network thus the
data which is shared is safe on the local area network and can’t be accessed outside.
-
LAN due to their small size are considerably faster, their speed can range anywhere from
100 to 100Mbps.
-
LANs are not limited to wire connection, there is a new evolution to the LANs that allows
local area network to work on a wireless connection.
Figure 3 LAN ( Local Area Network)
2.2.
-
MAN ( Metropolitan Area Network)
MAN network covers larger area by connections LANs to a larger network of computers. In
Metropolitan area network various Local area networks are connected with each other
through telephone lines. The size of the Metropolitan area network is larger than LANs and
smaller than WANs(wide area networks), a MANs covers the larger area of a city or town.
Figure 4 MAN (Metropolitan Area
Network)INTERNET ( International Network)
-
The Internet is the global system of interconnected computer networks that uses the
Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a
network of networks that consists of private, public, academic, business, and government
networks of local to global scope, linked by a broad array of electronic, wireless, and optical
networking technologies. The Internet carries a vast range of information resources and
services, such as the inter-linked hypertext documents and applications of the World Wide
Web (WWW), electronic mail, telephony, and file sharing.
Figure 5 INTERNET ( Internetnational Network)
2.3.
Benefit of networking
2.3.1.
Advantages of LAN
Data Security : Data security is easy in LAN because all the computers are connected to the server
system and all the data is stored at one place in the server so easy to maintain secured too.
Software Applications Sharing : As we know all computers are connected to the server so it can
also share application licensing software with them. It is not required to licensing each
computer individually. All worked on only one licensed system.
Internet Sharing : LANs also provided an advantage of cheaper cost on internet connection. As the
single interconnection is required for the server system and all the other computers are
worked with that connection.
Easy and Cheap Communication : All the data and files are shared easily in LAN because all the datahas
stored in a server so it is shared easily, fast and secured. Hence, also save a lot of time and money.
2.3.2.
Advantages of MAN
Less expensive: It is less expensive to attach MAN with WAN. MAN gives the good efficiency of data.
In MAN data is easily managed in a centralized way.
Sending local emails: On MAN you can send local emails fast and free.
High speed than WAN: MAN uses fiber optics so the speed of data can easily reach upon 1000
Mbps. Files and databases can be transferred fast.
Sharing of the internet: In some installation of MANs, users can share their internet
connection. So multiple users can get the same high-speed internet.
Conversion from LAN to MAN is easy: MAN is a faster way to connect two fast LANs together. This is
due to the fast configuration of links.
High Security: MAN has a high-security level than WAN.
2.3.3.
Advantages of WAN
 Sharing devices such as printers saves money.
 Site (software) licences are likely to be cheaper than buying several standalone licences.
 Files can easily be shared between users.
 Network users can communicate by email and instant messenger.
 Security is good - users cannot see other users' files unlike on stand-alone machines.
 Data is easy to backup as all the data is stored on the file server.
2.4.
Protocol and Standards
2.4.1.
Define Standards
- A standard is a set of specifications for hardware or software, agreed upon by academic and
industry contributors. A standard makes it possible for many manufacturers to create
products that are compatible with each other. Standards may be set by official
organizations, or unofficially set, established by common use. Common examples of
standards include multiple IEEE standards for electrical interfaces (computer cables), ANSI for
programming languages, and VESA for computer monitors and video adapters.
2.4.2.
-
List some protocols
There are various types of protocols that support a major and compassionate role in
communicating with different devices across the network. These are:
+
Transmission Control Protocol (TCP)
+
Internet Protocol (IP)
+
User Datagram Protocol (UDP)
+
Post office Protocol (POP)
+
Simple mail transport Protocol (SMTP)
+
File Transfer Protocol (FTP)
+
Hyper Text Transfer Protocol (HTTP)
+
Hyper Text Transfer Protocol Secure (HTTPS)
2.4.3.
List some standard organizations and standards names

3GPP – 3rd Generation Partnership Project

3GPP2 – 3rd Generation Partnership Project 2

ABYC – The American Boat & Yacht Council (ABYC is an international organization, despite its
name)

Accellera – Accellera Organization

A4L – Access for Learning Community (formerly known as the Schools Interoperability
Framework)

AES – Audio Engineering Society

AHRI - Air-conditioning, Heating, and Refrigeration Institute

AIIM – Association for Information and Image Management

ASAM – Association for Automation and Measuring Systems

ASHRAE – American Society of Heating, Refrigerating and Air-Conditioning Engineers
(ASHRAE is an international organization, despite its name)

ASME – American Society of Mechanical Engineers

ASTM International
P2. Network topology & communication and Bandwidth requirements
1. What is Network topology ?
1.1.
Network topology definition.
- Network topology is the arrangement of the elements (links, nodes, etc.) of a
communication network. Network topology can be used to define or describe the
arrangement of various types of telecommunication networks, including command and
control radio networks, industrial fieldbusses and computer networks.
- Network topology is the topological structure of a network and may be depicted
physically or logically. It is an application of graph theory wherein communicating devices are
modeled as nodes and the connections between the devices are modeled as links or lines
between the nodes.
Figure 6 Network Topology
2.
Denifition of Physical & Logical Topology
2.1.
-
Denifition of Physical Topology
Physical topology is the placement of the various components of a network (e.g., device
location and cable installation), while logical topology illustrates how data flows within a
network. Distances between nodes, physical interconnections, transmission rates, or signal types
may differ between two different networks, yet their logical topologies may be identical. A
network’s physical topology is a particular concern of the physical layer of the OSI model.
Figure 7 Physical Topologies Denifition of Logical
Topology
-
Logical topology is the arrangement of devices on a computer network and how they
communicate with one another.[1] Logical topologies describe how signals act on the network.
-
In contrast, a physical topology defines how nodes in a network are physically linked and
includes aspects such as geographic location of nodes and physical distances between nodes. The
logical topology defines how nodes in a network communicate across its physical topology. The
logical topology can be considered isomorphic to the physical topology, as vice versa.
-
Early twisted pair Ethernet with a single hub is a logical bus topology with a physical star
topology. While token ring is a logical ring topology with a physical star topology.
Figure 8 Logical Topology
2.2.
Examples of topology with diagrams ( Mesh, Star, Bus, Ring, Tree, Hyprib)
2.3.1.
-
Mesh Topology.
In mesh topology each device is connected to every other device on the network through a
dedicated point-to-point link. When we say dedicated it means that the link only carries data for
the two connected devices only. Lets say we have n devices in the network then each device
must be connected with (n-1) devices of the network. Number of links in a mesh topology of
n devices would be n(n-1)/2.
Figure 9 Mesh Topology
 Advantages of Mesh
topology
-
No data traffic issues as there is a dedicated link between two devices which means the link
is only available for those two devices.
-
Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the
communication between other devices on the network.
-
Mesh topology is secure because there is a point to point link thus unauthorized access is not
possible.
-
Fault detection is easy.
 Disadvantages of Mesh topology
-
Amount of wires required to connected each system is tedious and headache
-
Since each device needs to be connected with other devices, number of I/O ports required
must be huge.
-
Scalability issues because a device cannot be connected with large number of devices with a
dedicated point to point link.
2.3.2.
-
Star Topology
In star topology each device in the network is connected to a central device called hub. Unlike
Mesh topology, star topology doesn’t allow direct communication between devices, a device
must have to communicate through hub. If one device wants to send data to other device, it has
to first send the data to hub and then the hub transmit that data to the designated device.
Figure 10 Star Topology

-
Advantages of Star
topology
Less expensive because each device only need one I/O port and needs to be connected with hub
with one link.
-
Easier to install
-
Less amount of cables required because each device needs to be connected with the hub only.
-
Robust, if one link fails, other links will work just fine.
-
Easy fault detection because the link can be easily identified.
Disadvantages of Star topology

-
If hub goes down everything goes down, none of the devices can work without hub.
-
Hub requires more resources and regular maintenance because it is the central system of star
topology.
2.3.3.
-
Bus Topology
In bus topology there is a main cable and all the devices are connected to this main cable through
drop lines. There is a device called tap that connects the drop line to the main cable. Since all the data
is transmitted over the main cable, there is a limit of drop lines and the distance a main cable can
have.
Figure 11 Bus Topology
 Advantages of bus topology
-
Easy installation, each cable needs to be connected with backbone cable.
-
Less cables required than Mesh and star topology
 Disadvantages of bus topology
-
Difficultly in fault detection.
-
Notscalableasthere isalimitofhowmanynodesyoucanconnect withbackbone cable.
2.3.4.
Ring Topology
- In ring topology each device is connected with the two devices on either side of it. There
are two dedicated point to point links a device has with the devices on the either side of it.
This structure forms a ring thus it is known as ring topology. If a device wants to send data to
another device then it sends the data in one direction, each device in ring topology has a
repeater, if the received data is intended for other device then repeater forwards this data
until the intended device receives it.
Figure 12 Ring Topology
 Advantages of Ring Topology
-
Easy to install.
-
Managing is easier as to add or remove a device from the topology only two links are required
to be changed.
 Disadvantages of Ring Topology
-
A link failure can fail the entire network as the signal will not travel forward due to failure.
-
Data traffic issues, since all the data is circulating in a ring.
2.3.5.
-
Hibrib Topology
A combination oftwo ormore topology is known as hybrid topology. Forexample a
combination of star and mesh topology is known as hybrid topology.
Figure 13 Hibrib Topology
 Advantages of Hybrid topology
-
We can choose the topology based on the requirement for example, scalability is our
concern then we can use star topology instead of bus technology.
 Scalable as we can further connect other computer networks with the existing networks with
different topologies. Disadvantages of Hybrid topology
3.
-
Fault detection is difficult.Installation is difficult.
-
Design is complex so maintenance is high thus expensive.
Comunication and Bandwidth
3.1.
Comunication
3.1.1. Define commutations in terms ofnetworking
- Communications is the exchange of information between two or more things, such
as people, devices, governments, organizations, or businesses. In digital
communication, data is exchanged between two or more computing devices. This
data communication (datacom) occurs over a communication medium, such as a
telephone line, fiber optic cable, or wireless radio signal. The collection of digital
devices and their connection media is a computer network and is what allows
devices to "talk" to each other.
The following are examples of digital communications:

Transferring data from one computer to another over a network. With this form of
communication, data transmits as a packet over a network connection from a
sender to a receiver using a protocol.

Sending text messages between mobile devices.

Sending and receiving an e-mail.

Collaborating on shared documents and spreadsheets.

Voice chat or calls with other people over the Internet, using VoIP software.

Video call or conferencing with other people over the Internet, using VoIP software.
3.1.2. Rules of communication
 Access method
 Allowed physical topologies Types of cabling
 Speed of data transfer.
3.2.
-
Bandwidth
Bandwidth is the maximum rate of data transfer across a given path. Bandwidth may be
characterized as network bandwidth, data bandwidth,] or digital bandwidth.
-
This definition of bandwidth is in contrast to the field of signal processing, wireless
communications, modem data transmission, digital communications, and electronics, in which
bandwidth is used to refer to analog signal bandwidth measured in hertz, meaning the frequency
range between lowest and highest attainable frequency while meeting a well- defined
impairment level in signal power. The actual bit rate that can be achieved depends not only on the
signal bandwidth but also on the noise on the channel.
M1 Compare common networking principles and how protocols enable the effectiveness of
networked systems.
1. What is the TCP / IP protocol ?
- The TCP / IP protocol is divided into 4 network layers:
+ Application layer: The mission of this layer is to provide standardized data exchange and
applications. The application layer includes many specific protocols such as HTTP, FTP, POP3,
SMTP, and SNMP. Each of these protocols will have specific functions and tasks.
+ Network layer: This floor is also known as the internet layer. The task of the internet layer is to
process packets, then connect to independent networks to transport encrypted data packets
across network boundaries. The internet layer also includes many protocols such as IP and
ICMP.
+ Transport layer: The mission of the transport layer is to maintain end-to-end communication
throughout the network. The transport layer includes TCP and UDP protocols. In many cases the
UDP protocol will be replaced by TCP.
+ Physical layer: The protocols operating on this layer are Ethernet, ARP. For Ethernet often used for
LAN local area.
Figure 14 TCP/IP Model
1.1.
-
The most popular TCP / Ip protocols
Currently, TCP / IP has many protocols, but the three most commonly used are HTTP, HTTPS and FTP.
+ HTTP protocol: this protocol is used to transfer unsafe data between a web client and a web
server. How this protocol works is very simple. First, a web client will send a request to the web
server to view a website or news. Upon receiving the request, the server sends the answer
back to the web client.
+ HTTPS protocol: this protocol is used to transfer data securely between a web client and a web
server. This transaction is usually used to send credit card transaction data or personal
information from the web client to the web server.
+ FTP protocol : This protocol does not limit the number of computers. That is, a computer can
send data to one or many different computers directly.
Figure 15 the most popular TCP / Ip protocols
2. What is the OSI model?
-
The OSI model is also known as the reference model connecting open systems. This model
has been developed as part of the Open Systems Interconnection plan initiated by ISO and
IUT-T.
-
This model divides network interface into 7 layers. Grades 1 through 4 are lower-level classes
and only perform data migration tasks. Grades 5 through 7 belong to the advanced
classes. Each class will perform a specific task that will then forward data to the next layer.
Figure 16 OSI Basic Reference Model
3. Compare OSI model with TCP / IP model
-
Compared to the OSI model, the TCP / IP protocol is more trusted and used. Because
according to the concept, the OSI model is only an oldmodel, a tool for reference. The TCP
/ IP protocol, in contrast, allows loosening of rules
and provides general rules.
-
In terms of approach, TCP / IP approaches horizontally, while OSI approaches vertically.
-
The biggest difference between these two protocols is probably the combination of layers.
For TCP / IP protocols, the session layer and the presentation layer are combined in the application
layer. As for the OSI model, each different tier will perform a different task.
-
In terms of design, the protocols in TCP / IP were designed first and then developed. In contrast,
in OSI, the model is developed first and then the protocol developed.
Figure 17 Compare OSI & TCP/IP
P3 Discuss the operating principles of networking devices and server types.
1. Discuss 1 or 2 operating principles of a selected network device
1.1.
Repeater
– A repeater operates at the physical layer. Its job is to regenerate the signal over the same
network before the signal becomes too weak or corrupted so as to extend the length to which
the signal can be transmitted over the same network. An important point to be noted about
repeaters is that they do not amplify the signal. When the signal becomes weak, they copy the
signal bit by bit and regenerate it at the original strength. It is a 2 port device.
Figure 18 Repeater
2.2. Hub
–A hub is basically a multiport repeater. A hub connects multiple wires coming from different
branches, for example, the connector in star topology which connects different stations. Hubs
cannot filter data, so data packets are sent to all connected devices. In other words, collision
domain of all hosts connected through Hub remains one. Also, they do not have intelligence to
find out best path for data packets which leads to inefficiencies and wastage.
Figure 19 Hub
 Types of Hub

Active Hub:- These are the hubs which have their own power supply and can
clean, boost and relay the signal along with the network. It serves both as a repeater as well
as wiring centre. These are used to extend the maximum distance between nodes.

Passive Hub :- These are the hubs which collect wiring from nodes and power
supply from active hub. These hubs relay signals onto the network without cleaning and
boosting them and can’t be used to extend the distance between nodes.
List network devices.
2.
-
Here is the common network device list:

Hub

Switch

Router

Bridge

Gateway

Modem

Repeater

Access Point
3.
List server types

Application Servers

Client Servers

Collaboration Servers

FTP Servers

List Servers

Mail Servers

Open Source Servers

Proxy Servers

Real-Time Communication Servers
P4 Discuss the inter-dependence of workstation hardware with relevant networking software.
1. Define workstation hardware
A workstation is a special computer designed for technical or scientific applications.
Intended primarily to be used by one person at a time, they are commonly connected to a
local area network and run multi-user operating systems. The term workstation has also been
used loosely to refer to everything from a mainframe computer terminal to a PC connected
to a network, but the most common form refers to the class of hardware offered by several
current and defunct companies such as Sun Microsystems, Silicon Graphics, Apollo Computer,
DEC, HP, NeXT and IBM which opened the door for the 3D graphics animation revolution of the
late 1990s.
-
2.
Define networking software
-
Networking software is a foundational element for any network. It helps
administrators deploy, manage and monitor a network. Traditional networks
are made up of specialized hardware, such as routers and switches, that
bundle the networking software into the solution. Software-defined networking
(SDN) separates that software from the hardware, making it easier to innovate
and adapt the network to quickly meet changing network demands. The
separation of functions from hardware, such as firewalls or load balancing, is
called network functions virtualization (NFV).
-
Discuss and explain the interdepencies of workstation hardware with networking
software. Derive an example form your discussion Inter-dependence of
workstation hardware with relevant networking software:
+ A network file server is a computer system used for the purpose of managing
the file system, the network printer, handling network communication, and
other functions. A server may be dedicated is such case all of its processing power
is allocated to network function, or it may be non- dedicated which means
that a part of server functions allocated as a work stations or DOS based
system.
+ Network operating system: it is loaded into the servers’ hard disk along with the
system management tools and user utilities. When the system is started, NOS
boots and other server come under its control.
+ Workstations: workstations or nodes are attached to the server through the
network interfaces card and the cable; workstations are normally intelligence
systems, such as the IBM pc. But DUMV terminals are used in mainframe
computers. The concept of distributed process depends on the fact that
personal computer are attached to the network performed their own
processing after loading programs and data from servers.
-
Due to this a work station is called an active device on the network. After
processing, files are stored back on the server where they can be used by others
workstation.
+ Network interface card-every device connected to a LAN needs network interface
card to plug into the LAN. For example, a PC needs to have an Ethernet card
installed in it to connect to an Ethernet LAN.
+ Network cabling: once the server, workstations, and network interface cards
are in place, network cabling is used to network everything together. The most
popular type of network cables: Twisted pair wiring, Co-axial cable, Fiber optics
cable.
-
That is some interdependence of the workstation hardware with the relevant
network software to properly implement the network.
M2 Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimization
1.
-
Some types of server
Server: One of the most abundant types of servers in today’s market is a web server. A
webserver is a special kind of application server that hosts programs and data requested
by users across the Internet or an intranet. Web servers respond to requests from
browsers running on client computers for web pages, or other web-based services. Common
web servers include Apache web servers, Microsoft Internet Information Services (IIS)
servers and Nginx servers.
-
File server: File servers store and distribute files. Multiple clients or users may share
files stored on a server. In addition, centrally storing files offers easier backup or fault
tolerance solutions than attempting to provide security and integrity for files on
every device in an organization. Fileserver hardware can be designed to maximize
read and write speeds to improve performance.
-
Database server: The amount of data used by companies, users, and other services
is staggering. Much of that data is stored in databases. Databases need to be
accessible to multiple clients at any given time and can require extraordinary amounts of
disk space. Both of these needs lend themselves well to locating such databases on servers.
Database servers run database applications and respond to numerous requests from
clients. Common database server applications include Oracle, Microsoft SQL Server,
DB2, and Informix.
-
Combination server: Even before virtualization, servers were being extracted from
the standard model of a single server operating system installed on a hardware
machine. Technology, such as network-attached storage, removed the need for a server to
have its own storage. Other technologies, such as mirroring and clustering, enabled pieces
of hardware to be combined into larger, more powerful servers. Such a server might consist
of several blades, several attached storage devices, and an external power supply, and
each piece could be swapped out for another while the server was still running.
-
Virtualization server: Virtual servers are taking the server world by storm. Unlike
traditional servers that are installed as an operating system on machine hardware,
virtual servers exist onlyas defined within specialized software called hypervisor. Each
hypervisor can run hundreds, or even thousands, of virtual servers all at once. The
hypervisor presents virtual hardware to the server as if it were real physical hardware.
The virtual server uses the virtual hardware as usual, and the hypervisor passes the actual
computation and storage needs ontothe real hardware beneath, which is shared among
all the other virtual servers.
2.
-
Determining Your Networking Requirements
Designing a network can be a challenging task. Your first step is to understand your
networking requirements. The rest of this chapter explains how to determine these
requirements. After you have identified these requirements, refer to Chapter 2 for
information on selecting network capability and reliability options that meet these
requirements.
-
Networking devices must reflect the goals, characteristics, and policies of the
organizations in which they operate. Two primary goals drive networking design and
implementation:
+ Application availability—Networks carry application information between
computers. If the applications are not available to network users, the network is
not doing its job.
+ Cost of ownership—Information system (IS) budgets today often run in the millions of
dollars. As large organizations increasingly rely on electronic data for managing business
activities, the associated costs of computing resources will continue to rise.
-
A well-designed network can help balance these objectives. When properly implemented,
the network infrastructure can optimize application availability and allow the costeffective use of existing network resources.
D1 Considering a given scenario, identify the topology protocol selected for the efficient
utilization of a networking system.
-
The topologyprotocol selected for the efficient utilization of a networking system
is star topology. The devices are connected via switches and the switches are
interconnected internally. they are connected through routers.
REFERENCES
1. Wikipedia.Computer network.[ online] Available at:
https://en.wikipedia.org/wiki/Computer_network [Accessed 20 July.2020]
2. BeginnersBook.Types of Computer Network: Lan, Man and Wan.[Online] Available
at: https://beginnersbook.com/2019/03/types-of-computer-network-lan-man-andwan/ [Accessed 20 July.2020]
3. CompTIA. What Is a Network Protocol, and How Does It work?.[Online] Available at:
https://www.comptia.org/content/guides/what-is-a-networkprotocol#:~:text=A%20network%20protocol%20is%20an,internal%20processes%2C%20structure%20o
r%20 design. [Accessed 22 July.2020
4. Netwirx Bolg. Network Devices Explained.[Online] Available at:
https://blog.netwrix.com/2019/01/08/network-devices-explained/[Accessed
22 July.2020]
5. Sdxcentral.What’s Networking Software?[Online] Available at:
https://www.sdxcentral.com/networking/sdn/definitions/networking-software/
[Accessed 22 July.2020]
6. GeeksforGeeks.Network Devices ( Hub, Repeater, Bridge, Switch, Router, Gateways and
Brouter).[Online] Available at : https://www.geeksforgeeks.org/network-devices-hubrepeater-bridge-switch-router- gateways/ [Accessed 22 July.2020]
Download