ASSIGNMENT 1 Networking ASSIGNMENT 1 FRONT SHEET Qualification BTEC Level 5 HND Diploma in Computing Unit number and title Unit 2: Networking Infrastructure Submission date 27/8/2022 Date Received 1st submission Re-submission Date Date Received 2nd submission Student Name Truong Dang Khoa Student ID Class GCS1101 Assessor name Khoatdgcs220573 Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student’s signature Grading grid P1 P2 P3 P4 M1 M2 D1 Khoa ❒ Summative Feedback: Grade: Lecturer Signature: ❒ Resubmission Feedback: Assessor Signature: Date: Student Name/ID Number: Unit Number and Title: Unit 2: Networking Academic Year: 2021 – 2022 Unit Assessor: Van Ho Assignment Title: Networking Infrastructure Issue Date: April 1st, 2021 Submission Date: Internal Verifier Name: Date: Submission Format: Format: ● The submission is in the form of an individual written report. This should be written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Please also provide a bibliography using the Harvard referencing system. Submission ● Students are compulsory to submit the assignment in due date and in a way requested by the Tutor. ● The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/. ● Remember to convert the word file into PDF file before the submission on CMS. Note: ● The individual Assignment must be your own work, and not copied by or from another student. ● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you must reference your sources, using the Harvard style. Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply this ● requirement will result in a failed assignment. Unit Learning Outcomes: LO1 Examine networking principles and their protocols. LO2 Explain networking devices and operations. Assignment Brief and Guidance: Assignment scenario You are employed as a network engineer by Nguyen Networking Limited, a high-tech networking solution development company, which has branches in Ho Chi Minh City, Hanoi, Da Nang and Can Tho. The company has been contracted to implement a networking project from a local educational institute. The specification of the project is given below: • People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the academic heads and the programme managers, and 3 computer network administrators. • Resources: 50 student lab computers, 35 staff computers, and 3 printers. • Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located on the first floor and another located on the second floor. Task 1 The CEO of the company, Mr. Nguyen, has asked you to investigate and explain networking principles, protocols and devices and submit a report. You will need to produce a report that includes the following: • An introduction to provide an overview of your report. • Benefits and constraints of different types of networks and networking standards. • The impact of network topology, speed of communication and bandwidth requirements. • Effectiveness of networking systems. • Discussion on operating principles of networking devices and server types and networking software. • Discuss the relationship of workstation hardware with networking software. • Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. • For the given specification, identify the topology protocol for the efficient utilization of a networking system. Assignment Brief 1 (RQF) Higher National Certificate/Diploma in Computing Student Name/ID Number: Unit Number and Title: Unit 2: Networking Academic Year: 2021 – 2022 Unit Assessor: Van Ho Assignment Title: Networking Infrastructure Issue Date: April 1st, 2021 Submission Date: Internal Verifier Name: Date: Submission Format: Format: ● The submission is in the form of an individual written report. This should be written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Please also provide a bibliography using the Harvard referencing system. Submission ● Students are compulsory to submit the assignment in due date and in a way requested by the Tutor. ● The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/. ● Remember to convert the word file into PDF file before the submission on CMS. Note: ● The individual Assignment must be your own work, and not copied by or from another student. ● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you must reference your sources, using the Harvard style. ● Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply this requirement will result in a failed assignment. Unit Learning Outcomes: LO1 Examine networking principles and their protocols. LO2 Explain networking devices and operations. Assignment Brief and Guidance: Assignment scenario You are employed as a network engineer by Nguyen Networking Limited, a high-tech networking solution development company, which has branches in Ho Chi Minh City, Hanoi, Da Nang and Can Tho. The company has been contracted to implement a networking project from a local educational institute. The specification of the project is given below: • People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the academic heads and the programme managers, and 3 computer network administrators. • Resources: 50 student lab computers, 35 staff computers, and 3 printers. • Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located on the first floor and another located on the second floor. Task 1 The CEO of the company, Mr. Nguyen, has asked you to investigate and explain networking principles, protocols and devices and submit a report. You will need to produce a report that includes the following: • An introduction to provide an overview of your report. • Benefits and constraints of different types of networks and networking standards. • The impact of network topology, speed of communication and bandwidth requirements. • Effectiveness of networking systems. • Discussion on operating principles of networking devices and server types and networking software. • Discuss the relationship of workstation hardware with networking software. • Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. • For the given specification, identify the topology protocol for the efficient utilization of a networking system. Learning Outcomes and Assessment Criteria (Assignment 1): Learning Outcome Pass Merit Distinction LO1 P1 Discuss the benefits and constraints of different network types and standards. M1 Compare common networking principles and how protocols enable the effectiveness of networked systems. D1 Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system. P2 Explain the impact of network topology, communication and bandwidth requirements. LO2 P3 Discuss the operating principles of networking devices and server types. P4 Discuss the interdependence of workstation hardware with relevant networking software. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimisation. Table of Contents Assignment Brief 1 (RQF) ............................................................................................................................................ 4 Higher National Certificate/Diploma in Computing ................................................................................................. 4 I. Introduction.............................................................................................................................................................. 11 II. Benefits and constraints of different types of networks and networking standards. ............................................... 11 1.Computer Network. .............................................................................................................................................. 11 1.1 Definition ...................................................................................................................................................................................... 11 1.2 A few type of Computer Network: ....................................................................................................................................... 12 1.3. The benefits and constrains of different network types. ............................................................................................... 14 2. Network Protocol. ............................................................................................................................................... 16 2.1. Definition. .................................................................................................................................................................................... 16 2.2. A few types of the protocol.................................................................................................................................................... 16 3. Network standards. .............................................................................................................................................. 19 3.1. Definition. .................................................................................................................................................................................... 19 3.2. A few commonly known internet standards. .................................................................................................................... 20 III. The impact of network topology, speed of communication and bandwidth requirements. .................................... 20 1. Network topology. ............................................................................................................................................... 20 1.1. A few commonly known types of network topology. ................................................................................................... 21 1.2. Advantages and Disadvantages of types of network topology. .................................................................................. 22 2. Network communication. .................................................................................................................................... 24 3. Rule of Communication. ..................................................................................................................................... 24 3.1 Communication Fundamentals: ............................................................................................................................................. 24 3.2 Rule Establishment: ................................................................................................................................................................... 25 3.3. Message Encoding: ................................................................................................................................................................... 25 3.4 Message Formatting and Encapsulation: ............................................................................................................................ 26 3.5 Message Size. .............................................................................................................................................................................. 26 3.6 Message Timing.......................................................................................................................................................................... 26 3.7 Message Delivery Options. ..................................................................................................................................................... 27 4. Bandwidth requirement. ...................................................................................................................................... 27 4.1. Definition. -................................................................................................................................................................................ 27 IV. Some common networking devices and some types of servers ............................................................................. 28 1. Network devices: ................................................................................................................................................. 28 1.1. Switch:.......................................................................................................................................................................................... 28 1.2. Router: .......................................................................................................................................................................................... 28 1.3. Hub: ............................................................................................................................................................................................... 29 1.4. Bridge: .......................................................................................................................................................................................... 29 1.5 Gateway: ....................................................................................................................................................................................... 29 1.6. Modem .......................................................................................................................................................................................... 29 1.7. Repeater........................................................................................................................................................................................ 30 2. Network server .................................................................................................................................................... 30 2.1 DHCP ............................................................................................................................................................................................. 30 2.2. DNS ............................................................................................................................................................................................... 30 2.3 FTP.................................................................................................................................................................................................. 30 2.4 Client .............................................................................................................................................................................................. 31 2.5 Mail ................................................................................................................................................................................................. 31 2.6. Web................................................................................................................................................................................................ 31 2.7 Proxy .............................................................................................................................................................................................. 31 2.8 Print................................................................................................................................................................................................. 31 2.9 Application ................................................................................................................................................................................... 32 V. The interdependence of workstation hardware with networking software. ............................................................ 32 1. Definition............................................................................................................................................................. 32 2. Workstation hardware ......................................................................................................................................... 32 2.1. CPU ............................................................................................................................................................................................... 32 2.2 RAM ............................................................................................................................................................................................... 33 2.3. ROM .............................................................................................................................................................................................. 33 3.Networking software ............................................................................................................................................ 34 3.1 OS .................................................................................................................................................................................................... 34 3.2 Web server .................................................................................................................................................................................... 34 3.3. Mail Server .................................................................................................................................................................................. 34 4. The interdependency of workstation hardware with networking software. ........................................................ 34 VI. Common Networking Principles ands Compare circuit switching and packet switching ..................................... 35 1. Common Networking Principles: ........................................................................................................................ 35 2. Compare circuit switching and packet switching. ............................................................................................... 35 3.Practical application for each principle. ............................................................................................................... 36 VII. Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. ............................................................................................................................ 36 1. Server types. ........................................................................................................................................................ 36 1.1 Client server ................................................................................................................................................................................. 36 1.2 Mail Server ................................................................................................................................................................................... 37 1.3 Web Server ................................................................................................................................................................................... 37 1.4 Proxy server ................................................................................................................................................................................. 37 1.5 Print server.................................................................................................................................................................................... 37 1.6 Application server ...................................................................................................................................................................... 37 2. Server chosen for the given scenario. .................................................................................................................. 38 3. Hardware requirement and cost. ........................................................................................................................ 38 VIII. Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system. ..................................................................................................................................................... 39 IX. Reference ................................................................................................................................................................ 39 I. Introduction. Through this report, we are looking toward the following goal : - Understand the basic fundamentals about networks and networks protocol. Understand the benefit and constrain of each types of network and protocol. Understand the impact of Network topology, communication and bandwidth requirement. Understand the pros and cons of each type of network topology. Understand about the operating principle of networking devices and server types. Understand the interpendence of workstation hardware with relevant networking software. Create an efficient network for the given scenario. II. Benefits and constraints of different types of networks and networking standards. 1.Computer Network. 1.1 Definition “A computer network is a set of computer sharing resources located or provided by network nodes. The other. These interconnections are made of telecommunication technologies, based on physically wired, optical, and wireless radio frequency methods.” Source: Corbató, F. J.; et al. (1963). The Compatible Time-Sharing System A Programmer's Guide] (PDF). MIT Press. ISBN 978-0-262-03008-3. An Easier way to understand is that the network itself works similarly to a social animal, for example, ants. You could see them always parade in lines, that’s because they follow a typical scent that the ants in the front row made which act as a link to connect the ant and they leave behind a trail too, so the other could follow the shared information and execute the exact same chain of action which is comparable to computer protocol and network link. 1.2 A few type of Computer Network: - Metropolitan area network ( MAN ): + Metropolitan area network ( MAN ) is a network in which multiple digital devices and multiple LAN ( local area network ) in a specific region ( Single/Multiple Cities, Town etc ) connect to a single network to provide a more efficient way to transfer data over the word. - Wide area network ( WAN ): + Wide area network ( WAN ) is a network in which multiple digital devices, LAN, and MAN are connected to a worldwide system in order to provide the ease of transferring data over large geometric distances. The Internet itself could be considered a type of WAN. - Local area network ( LAN ): + Local area network ( LAN ) is a network in which multiple digital devices connect to each other in order to share information directly with each other. - Wireless Network (Wi-Fi ): + Wi-Fi is a type of network in which multiple digital devices in a very small geometry distance, most likely a single building could connect and share data with each other through radio waves, this is the most commonly used network around the world. 1.3. The benefits and constrains of different network types. Pros LAN - Significantly reduced rate of data compromise. It is- Cheap and easy to set up and maintenance. - Greatly reduce the risk of security problems. - Able to identify every participant since every computer on LAN is given a MAC Address. - Outstanding MAN - Having every benefit of LAN network without suffering too much from range issues. - Extremely budget effective compared to LAN. It- Easy to set up. - Decent speed due to wired connection. WAN - One of the most efficient types of network. - Ease of communication and data transfer. - Worldwide network cover - Extremely flexible for business, medical, and education services due to its worldwide range and the ease of Wi-FI - Very flexible due to not having relied on wire which could support multiple devices with different types of ports. - Very cheap to set up and require almost no maintenance. - Space saving since wires are no Cons speed due to wired connection and small geometric range. - Efficient data transfering data transfer. longer a necessity. - Struggle to transfer data through a great distance. - Required greatly more wire compared to LAN create more problem with cost and maintenance. - More likely to suffer from attack from hackers. It- Very hard to manage a network of city size. - Very slow compared to LAN and MAN - Very costly to setup and maintain. - Require experienced crew to maintain which lead to training cost overrun. - Require very high performance device in order to store and transfer data. - Uncontrollable data which could lead to major security problem. - Slow speed compared to wired connection. - Not very reliable since Wifi is very likely to suffer from signal interference elements which make it impossible to run at full speed. - Almost having no defense against cyber criminal’s attacks, combining with a wired network is recommended. 2. Network Protocol. 2.1. Definition. “Network protocols are a collection of rules that regulate how computer network devices – from servers and routers to endpoints – format, send and receive data. For device networks, standardized protocol networks provide a common language. Computers would be unable to interact with one another without them. A network protocol links one device’s layer to another device’s layer, with each layer adding control information to the communication.” Source: https://fcit.usf.edu/network/chap2/chap2.htm This can be understood as a type of language that the computers use to interact with each other similarly to humans, but if we don’t have a language we could still interact with each other through body language but if computers don’t have a protocol, it would be as good as nothing. 2.2. A few types of the protocol. Transmission Control Protocol (TCP): “ The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network. Major internet applications such as the World Wide Web, email, remote administration, and file transfer rely on TCP” Source: “RFC 675 - Specification of Internet Transmission Control Program, December 1974 Version” The Internet Protocol is the most important protocol in the Internet Protocol Suite for transferring data over networks. The Internet Protocol's routing capabilities fundamentally help build the Internet. This protocol was formerly called Transmission Control Program’s connectionless datagram service (TCP). As a result, TCP/IP is another name for the Internet protocol suite. Hypertext Transfer Protocol (HTTP): “The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems.[1] HTTP is the foundation of data communication for the World Wide Web, where hypertext documents include hyperlinks to other resources that the user can easily access, for example by a mouse click or by tapping the screen in a web browser.” Source: Fielding, Roy T.; Gettys, James; Mogul, Jeffrey C.; Nielsen, Henrik Frystyk; Masinter, Larry; Leach, Paul J.; Berners-Lee, Tim (June 1999). Hypertext Transfer Protocol – HTTP/1.1. IETF. doi:10.17487/RFC2616. RFC 2616. Domain Name System (DNS): “The Domain Name System (DNS) is the hierarchical and decentralized naming system used to identify computers reachable through the Internet or other Internet Protocol (IP) networks. The resource records contained in the DNS associate domain names with other forms of information. These are most commonly used to map human-friendly domain names to the numerical IP addresses computers need to locate services and devices using the underlying network protocols, but have been extended over time to perform many other functions as well. The Domain Name System has been an essential component of the functionality of the Internet since 1985.” Source: Evans, Claire L. (2018). Broad Band: The Untold Story of the Women Who Made the Internet. New York: Portfolio/Penguin. ISBN 9780735211759 Internet Control Message Protocol (ICMP): The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information indicating success or failure when communicating with another IP address, for example, an error is indicated when a requested service is not available or that a host or router could not be reached. ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-user network applications (with the exception of some diagnostic tools like ping and traceroute). Source: RFC 792, Internet Control Message Protocol Dynamic Host Configuration Protocol (DHCP): The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture. The technology eliminates the need for individually configuring network devices manually, and consists of two network components, a centrally installed network DHCP server and client instances of the protocol stack on each computer or device. When connected to the network, and periodically thereafter, a client requests a set of parameters from the DHCP server using the DHCP protocol. Source: RFC 2131, Dynamic Host Configuration Protocol Simple Network Management Protocol (SNMP): Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behaviour. Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and more SNMP is widely used in network management for network monitoring. SNMP exposes management data in the form of variables on the managed systems organized in a management information base (MIB) which describe the system status and configuration. These variables can then be remotely queried (and, in some circumstances, manipulated) by managing applications Source : RFC 1157 (Historic) — A Simple Network Management Protocol (SNMP) Hypertext Transfer Protocol over SSL/TLS (HTTPS): Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also referred to as HTTP over TLS, or HTTP over SSL. Sources: "Secure your site with HTTPS". Google Support. Google Inc. - Secured Shell (SSH): The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.[1] Its most notable applications are remote login and command-line execution. SSH applications are based on a client–server architecture, connecting an SSH client instance with an SSH server.[2] SSH operates as a layered protocol suite comprising three principal hierarchical components: the transport layer provides server authentication, confidentiality, and integrity; the user authentication protocol validates the user to the server; and the connection protocol multiplexes the encrypted tunnel into multiple logical communication channels. Source: RFC 4250 – The Secure Shell (SSH) Protocol Assigned Numbers 3. Network standards. 3.1. Definition. - In computer network engineering, an Internet Standard is a normative specification of a technology or methodology applicable to the Internet. Internet Standards are created and published by the Internet Engineering Task Force (IETF). They allow interoperation of hardware and software from different sources which allows internets to function. As the Internet became global, Internet Standards became the lingua franca of worldwide communications. Engineering contributions to the IETF start as an Internet Draft, may be promoted to a Request for Comments, and may eventually become an Internet Standard. Source: Leiba, Barry (January 2008). "An Introduction to Internet Standards". IEEE Internet Computing. 12 (1): 71–74. doi:10.1109/MIC.2008.2. ISSN 1089-7801. S2CID 26168365. 3.2. A few commonly known internet standards. - International Standards Organization (ISO) - International Telecommunication Union (ITU) - Institute of Electronics and Electrical Engineers (IEEE) - American National Standards Institute (ANSI) - Internet Research Task Force (IETF) - Electronic Industries Association (EIA) III. The impact of network topology, speed of communication and bandwidth requirements. 1. Network topology. Network topology refers to the geometric arrangement of links and nodes in a computing network. Alternately, network topology may describe how the data is transferred between these nodes. There are two types of network topologies: physical and logical. Physical topology emphasizes the physical layout of the connected devices and nodes, while the logical topology focuses on the pattern of data transfer between network nodes. .” 1.1. A few commonly known types of network topology. - Star topology: Star topology is a network topology in which each network component is physically connected to a central node such as a router, hub or switch. In a star topology, the central hub acts like a server and the connecting nodes act like clients. When the central node receives a packet from a connecting node, it can pass the packet on to other nodes in the network. A star topology is also known as a star network. - Bus topology: A bus network is a local area network (LAN) topology in which all the nodes are connected to a shared bus. Bus networks are the simplest way to connect multiple clients, but issues can occur when two clients want to transmit on the same bus at the same time. A true bus network is passive. - Tree topology: Tree topology is a type of network topology where a root node is connected to two or more sub-level nodes, which themselves are connected hierarchically to sub-level nodes. Physically, the tree topology is similar to bus and star topologies; the network backbone may have a bus topology, while the low-level nodes connect using star topology. - Mesh topology: Mesh topology is a type of network consist of each node is directly connected to some or all the other nodes present in the network. This redundancy makes the network highly fault-tolerant but the escalated costs may limit this topology to highly critical networks. - Ring topology: Ring topology refers to a specific kind of network setup in which devices are connected in a ring and pass information to or from each other according to their adjacent proximity in the ring structure. This type of topology is highly efficient and handles heavier loads better than bus topology. A ring topology may also be called an active topology because messages are passed to each device in the ring.. - Hybrid topology: Hybrid topology is also known as hybrid network. Hybrid networks combine two or more topologies in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For example, a tree network (or star-bus network) is a hybrid topology in which star networks are interconnected via bus networks. However, a tree network connected to another tree network is still topologically a tree network, not a distinct network type. A hybrid topology is always produced when two different basic network topologies are connected.Source: https://en.wikipedia.org/wiki/Network_topology#cite_ref-Inc,_S._2002_5-0 1.2. Advantages and Disadvantages of types of network topology. Star topology Bus topology Tree topology Mesh topology Ring topology Hybrid topology Advantages -Easy to setup and maintain -No disruptions to the network when connecting or removing devices. -Easy to detect and fix compromised data. -Easy to setup and maintain. -Extremely cost effective. - Compared to a star topology, the required cable length is less. -No disruptions to the network when connecting or removing devices. -If a single device fail, the entire system will still keep working. - Easy to expand. -Easy to detect and fix compromised data. -Low cable requirement. -Extremely cost effective. - Easy to expand. - Near impossible to be taken down by cyber criminal. -No disruptions to the network when connecting or removing devices. - Consistent data transmission. - Cheap to setup. - Significantly reduced latency. - Easy to maintain. -Easy to detect and fix compromised data. - Extremely flexible - Meet the requirement for multiple purpose from a vast amount of customers - Very reliable Disadvantages -Requires more cable length than a bus topology. -If the central node fail the entire system will completely collapse - No practical use for large networks. - Harder to detect and fix. compromised data. - High packet lost rate. - The more device connected, the slower the network become. -If the top node fail the entire system will completely collapse. - Vunerable to attack from hackers. - Extremely troublesome to maintain. - Very expensive compared to other topology. - High latency. - Extremely hard to maintain which led to more training cost. - If one device fails, the entire network will dies along with it. - - Extremely expensive to setup and maintain - Design is very complex, require experienced personel to expand, maintain. Disruptions to the network when connecting or removing devices. - All device must remain active at all time with lead to significantly higher power consumption than other topology 2. Network communication. - Network communication, or internetworking, defines a set of protocols (that is, rules and standards) that allow application programs to talk with each other without regard to the hardware and operating systems where they are run. Internetworking allows application programs to communicate independently of their physical network connections. 3. Rule of Communication. 3.1 Communication Fundamentals: - All communication methods have three elements in common: • Source or sender. • Destination or receiver. • Channel or media. - Rules or protocols govern all methods of communication. 3.2 Rule Establishment: - Protocols are necessary for effective communication and include: • An identified sender and receiver. • Common language and grammar. • Speed and timing of delivery. • Confirmation or acknowledgment requirements. - Protocols used in network communications also define: • Message encoding. • Message delivery options. • Message Formatting and Encapsulation. • Message Timing. • Message Size. 3.3. Message Encoding: - Encoding between hosts must be in appropriate format for the medium. - Messages are first converted into bits by the sending host. - Each bit is encoded into a pattern of sounds, light waves, or electrical impulses depending on the network media. - The destination host receives and decodes the signals in order to interpret the message. 3.4 Message Formatting and Encapsulation: - There is an agreed format for letters and addressing letters which is required for proper delivery. - Putting the letter into the addressed envelope is called encapsulation. - Each computer message is encapsulated in a specific format, called a frame, before it is sent over the network. - A frame acts like an envelope providing destination address and source address. 3.5 Message Size. Long messages must also be broken into smaller pieces to travel across a network. - Each piece is sent in a separate frame. - Each frame has its own addressing information. - A receiving host will reconstruct multiple frames into the original message. 3.6 Message Timing - Access Method: + Hosts on a network need to know when to begin sending messages and how to respond when collisions occur. - Flow Control : + Source and destination hosts use flow control to negotiate correct timing to avoid overwhelming the destination and ensure information is received. - Response Timeout: + Hosts on the network have rules that specify how long to wait for responses and what action to take if a response timeout occurs. 3.7 Message Delivery Options. One-to-one delivery One-to-many delivery One-to-all delivery 4. Bandwidth requirement. 4.1. Definition. Bandwidth is a broad term defined as the bit-rate measure of the transmission capacity over a network communication system. Bandwidth is also described as the carrying capacity of a channel or the data transfer speed of that channel. However, broadly defined, bandwidth is the capacity of a network. Bandwidth exists in physical or wireless communication networks. * The importance of bandwidth : Why bandwidth is important:The amount of bandwidth available is restricted. There is only so much capacity available at any particular deployment area, such as a house or company. This is sometimes due to the network device’s physical restrictions,such as the router or modem, cabling, or the wireless frequencies being utilized. Other times, a network administratoror an internet or wide area network (WAN) provider will limit bandwidth on purpose. IV. Some common networking devices and some types of servers 1. Network devices: 1.1. Switch: A switch, in the context of networking, is a high-speed device that receives incoming data packets and redirects them to their destination on a local area network (LAN). A LAN switch operates at the data link layer (Layer 2) or the network layer of the OSI Model and, as such it can support all types of packet protocols. The layer 2 switch is also sometimes called a bridge: its function is to send frames containing data packets between nodes or segments of a network. Essentially, switches are the traffic cops of a simple local area network. Switching establishes the trajectory for the frames as the data units, and how the data moves from one area of a network to another. By contrast, routing takes place at layer 3, there data gets sent between networks or from one network to another. 1.2. Router: A router is a device that analyzes the contents of data packets transmitted within a network or to another network. Routers determine whether the source and destination are on the same network or whether data must be transferred from one network type to another, which requires encapsulating the data packet with routing protocol header information for the new network type. 1.3. Hub: A hub, in the context of networking, is a hardware device that relays communication data. A hub sends data packets (frames) to all devices on a network, regardless of any MAC addresses contained in the data packet. 1.4. Bridge: A bridge is a type of computer network device that provides interconnection with other bridge networks that use the same protocol. Bridge devices work at the data link layer of the Open System Interconnect (OSI) model, connecting two different networks together and providing communication between them. Bridges are similar to repeaters and hubs in that they broadcast data to every node. However, bridges maintain the media access control (MAC) address table as soon as they discover new segments, so subsequent transmissions are sent to only to the desired recipient. Bridges are also known as Layer 2 switches. 1.5 Gateway: A gateway is a data communication device that provides a remote network with connectivity to a host network. A gateway device provides communication to a remote network or an autonomous system that is out of bounds for the host network nodes. Gateways serve as the entry and exit point of a network; all data routed inward or outward must first pass through and communicate with the gateway in order to use routing paths. Generally, a router is configured to work as a gateway device in computer networks. 1.6. Modem A modem is a network device that both modulates and demodulates analog carrier signals (called sine waves) for encoding and decoding digital information for processing. Modems accomplish both of these tasks simultaneously and, for this reason, the term modem is a combination of "modulate" and "demodulate." 1.7. Repeater A repeater is a network device that retransmits a received signal with more power and to an extended geographical or topological network boundary than what would be capable with the original signal. A repeater is implemented in computer networks to expand the coverage area of the network, repropagate a weak or broken signal and or service remote nodes. Repeaters amplify the received/input signal to a higher frequency domain so that it is reusable, scalable and available. 2. Network server 2.1 DHCP Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to dynamically assign an IP address to any new node entering the network. DHCP permits a node to be configured automatically, thereby avoiding the necessity of involvement by a network administrator. 2.2. DNS Domain name system (DNS) is a hierarchical naming system built on a distributed database. This system transforms domain names to IP addresses and makes it possible to assign domain names to groups of Internet resources and users, regardless of the entities' physical location. 2.3 FTP File Transfer Protocol (FTP) is a client/server protocol used for transferring files to or from a host computer. FTP may be authenticated with user names and passwords. Anonymous FTP allows users to access files, programs and other data from the Internet without the need for a user ID or password. Web sites are sometimes designed to allow users to use "anonymous" or "guest" as a user ID, and an email address for a password. Publicly available files are often found in a specified directory and can be easily transferred to a user’s computer. FTP is the Internet standard for moving or transferring files from one computer to another using TCP or IP networks. File Transfer Protocol is also known as RFC 959. 2.4 Client Client/server architecture is a computing model in which multiple components work in strictly defined roles to communicate. The server hosts, delivers and manages most of the resources and services to be consumed by the client. This type of shared resources architecture has one or more client computers connected to a central server over a network or internet connection. Client/server architecture is also known as a networking computing model or client/server network because all the requests and services are delivered over a network. It’s considered a form of distributed computing system because the components are doing their work independently of one another. 2.5 Mail A mail server, often referred to as an email server, is a site where all incoming emails are stored, optimizatio, and sorted before being sent over the internet. Although you can send and receive emails in a fraction of a second, the email will go through a number of complex transition steps (other than the recipient’s email address) before reaching the recipient’s mailbox. 2.6. Web A powerful computer that connects to the user’s network is referred to as a web server. This computer stores all of the information that it is allowed to handle from one or more websites. Each web server has its own IP address and is capable of reading a wide range of files, including HTML, HTM,… Web servers with large storage capacity and rapid processing speeds are widely used to secure the ability to store and execute data warehouses via the internet. The web server is always sending data across the network of machines to which it is linked. 2.7 Proxy A proxy server acts as a mediator between station users and the Internet by installing a proxy. The proxy server will prohibit any connections between the sender and the recipient that are not made directly. Data is accepted at one port before being sent to the rest of the network via the entrance gate at a second port. Proxy servers will make it much more difficult for hackers to get the internal address and details of a private server system because of this indirect link. 2.8 Print A print server is a computer that can process print-related jobs on a network of computers. Print servers are connected to a computer network in order to serve the need for printing jobs in a network that may contain more than one printer. A print server usually allows users in a computer network to perform a printing job without having to move files to the computer connected directly to the printer.Also known as printer server or network printer, (although the latter is actually one of the properties of the print server) 2.9 Application An application server is a type of server designed to install, operate and host applications andassociated services for end users, IT services and organizations. It facilitates the hosting anddelivery of high-end consumer or business applications, which are used by multiple andsimultaneously connected local or remote users. V. The interdependence of workstation hardware with networking software. 1. Definition Interdependence is a relationship where the parties involved are equally dependent on each other so much that if one of the parties got taken down, the other parties got greatly restricted or complete disabled. For example: We can’t write code without keyboard, We can’t interact with computer without an OS etc. 2. Workstation hardware Hardware (H/W), in the context of technology, refers to the physical elements that make up a computer or electronic system and everything else involved that is physically tangible. This includes the monitor, hard drive, memory and the CPU. Hardware works hand-in-hand with firmware and software to make a computer function. Although the same core components are shared between desktop computers and laptops, their characteristics and design differ for a multitude of reasons (size, heat dissipation capabilities, power requirements, etc.). However, hardware is always necessary to run the critical software that makes computers work. 2.1. CPU The central processing unit (CPU) or processor, is the unit which performs most of the processing inside a computer. It processes all instructions received by software running on the PC and by other hardware components, and acts as a powerful calculator. The CPU is placed into a specific square-shaped socket found on all motherboards by inserting its metallic connectors or pins found on the underside. Each socket is built with a specific pin layout to support only a specific type of processor. Since modern CPUs produce a lot of heat and are prone to overheating, they must be kept cool with appropriate fans or ventilation systems, and covered with heat sinks and thermal paste. To control instructions and data flow to and from other parts of the computer, the CPU relies heavily on a chipset, which is a group of microchips located on the motherboard. This term is also known as a central processor, microprocessor or chip. . 2.2 RAM Random access memory (RAM) is a type of data storage used in computers that is generally located on the motherboard. It is the main memory used by a computer for quick access since is much faster to read and write than other forms of storage—between 20-100 times faster than hard disks. Each storage location inside the memory can be accessed independently of the address, meaning that every location can be reached easily at the same time (hence the term “random”). RAM is a volatile type of memory, meaning that all information that was stored in RAM is lost when the computer is turned off. Volatile memory is temporary memory while ROM (read-only memory) is non-volatile and holds data permanently when the power is turned off. 2.3. ROM Read-only memory (ROM) is a type of storage medium that permanently stores data on personal computers (PCs) and other electronic devices. It contains the programming needed to start a PC, which is essential for boot-up; it performs major input/output tasks and holds programs or software instructions. This type of memory is often referred to as “firmware”—how it is altered has been a source of design consideration throughout the evolution of the modern computer. 3.Networking software Network software is an extremely broad term for a range of software aimed at the design and implementation of modern networks. Various types of network software support the creation, calibration and operation of networks. 3.1 OS An operating system (OS) is a piece of software that connects the user to the hardware. In order to execute additional programs, every computer system must have at least one operating system. Browsers, Microsoft Office, Notepad Games, and other programs all require a certain environment to run and accomplish their tasks. You can connect with your computer without knowing how to speak its language thanks to operating systems. Users are unable to run any computer or mobile device without an operating system. 3.2 Web server A Web server is a piece of software or hardware that processes user requests using HTTP and other protocols. 3.3. Mail Server An email server is a computer program that serves as a virtual post office. Incoming mail is stored on the server for delivery to local users, as well as outgoing mail. 4. The interdependency of workstation hardware with networking software. Essentially, Network Software allows us to control how components like the CPU, RAM, and other Workstation Hardware components are used. These are two features that complement each other. The other will be unable to flee if one of them goes missing. To successfully process data and give meaningful results, a computer’s hardware and software must function together. Without Network Software, workstation hardware is pointless. Workstation Hardware, on the other hand, is required for the usage of computer software. Before programs can be set up to operate, Network Software must be loaded and installed in Workstation Hardware. Here is an examples of hardware and software interdependencies: To send an email to someone, you must use Networking Software (Gmail) to send the email to the Mail Server using Workstation hardware (key broad), and the Mail Server will deliver the email to the stated address. If you choose to write a letter instead of sending an email, the Networking Software will act as a piece of paper and provide you with a blank page on which to write. The workstation hardware will be the pen. Your mail will either be blank or will not be sent at all if either is missing. VI. Common Networking Principles ands Compare circuit switching and packet switching 1. Common Networking Principles: -Circuit Switching: Circuit switching, the oldest method, a link has to be set up along all the nodes forming a path between the two hosts. This link has to be maintained for the whole duration of the transmission. If one node between the two hosts crashes or is removed, the connection is broken. A typical use of this type of switching is using the phone. After dialing, one cable is reserved. It does not matter if one speaks or not. -Packet Switching: In Packet Switching, the original data is split into very small fixed length packets. These packets again need some information about the destination. The advantage of these small packets is that they can be forwarded very fast. The amount of storage needed is decreased. This allows much higher throughput of data than message passing. At the endpoint the packets are reassembled. 2. Compare circuit switching and packet switching. Circus switch -Packet is moved throght a single dedicated route for the entire network. Packet switch - Packet is moved throught multiple different route based on the destination of the packet. - Extremely slow due to all packet got transfer through a single cable. - A lot faster than Circus switching since data are transfered throught multiple different route. - Used mostly by telephone - Used by most network in the world 3.Practical application for each principle. - Circus switch: Circuit switching is used for connections that must be continuous for long periods of time, such as long-distance communication i.e traditional telephone system, optical mesh network etc - Packet switch : Packet switching is most commonly seen on data networks such as LAN and WAN as it allowed for more efficient transfering. Also, when one packet is loss while trying to reach the destination, you only have to resend that loss packet again without having sending the entire data which potentally could took a lot more time and resources. VII. Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. 1. Server types. 1.1 Client server Client/server architecture is a computing model in which multiple components work in strictly defined roles to communicate. The server hosts, delivers and manages most of the resources and services to be consumed by the client. This type of shared resources architecture has one or more client computers connected to a central server over a network or internet connection. Client/server architecture is also known as a networking computing model or client/server network because all the requests and services are delivered over a network. It’s considered a form of distributed computing system because the components are doing their work independently of one another. 1.2 Mail Server A mail server, often referred to as an email server, is a site where all incoming emails are stored, optimizatio, and sorted before being sent over the internet. Although you can send and receive emails in a fraction of a second, the email will go through a number of complex transition steps (other than the recipient’s email address) before reaching the recipient’s mailbox. 1.3 Web Server A powerful computer that connects to the user’s network is referred to as a web server. This computer stores all of the information that it is allowed to handle from one or more websites. Each web server has its own IP address and is capable of reading a wide range of files, including HTML, HTM,… Web servers with large storage capacity and rapid processing speeds are widely used to secure the ability to store and execute data warehouses via the internet. The web server is always sending data across the network of machines to which it is linked. 1.4 Proxy server A proxy server acts as a mediator between station users and the Internet by installing a proxy. The proxy server will prohibit any connections between the sender and the recipient that are not made directly. Data is accepted at one port before being sent to the rest of the network via the entrance gate at a second port. Proxy servers will make it much more difficult for hackers to get the internal address and details of a private server system because of this indirect link. 1.5 Print server A print server is a computer that can process print-related jobs on a network of computers. Print servers are connected to a computer network in order to serve the need for printing jobs in a network that may contain more than one printer. A print server usually allows users in a computer network to perform a printing job without having to move files to the computer connected directly to the printer.Also known as printer server or network printer, (although the latter is actually one of the properties of the print server) 1.6 Application server An application server is a type of server designed to install, operate and host applications andassociated services for end users, IT services and organizations. It facilitates the hosting anddelivery of high-end consumer or business applications, which are used by multiple andsimultaneously connected local or remote users. 2. Server chosen for the given scenario. Given scenario: People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the academic heads and the programme managers, and 3 computer network administrators. Resources: 50 student lab computers, 35 staff computers, and 3 printers. Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located on the first floor and another located on the second floor. Considered the given scenario, the web server will be use for this project because : - Easy to setup and maintain. - Easy to use. - Easy to share resources. - Download resource faster since web server suffer less from bandwidth restriction. 3. Hardware requirement and cost. - Server : Rented for 7.550.000 / month + Processor (CPU): 2x Intel Xeon Gold 6138 + Operating system: Linux Ubuntu 64 bit + Memory: 64GB of RAM + Network Adapter - Website : 1.900.000Đ + 3.000.000 đ/ month ( for maintainance ) - Computer: Processor (CPU): Intel Core i5 (or equivalent) and above Operating system: Microsoft Windows 10 (64-bit) Memory: 8GB RAM or more Monitor/Display: 21.5″ wide screen or larger monitor – about 2.300.000 đ each Network Adapter: Wired network connection with Internet acces Estimated cost : 8.300.000 đ/ per computer - Printer : Already available - Cable ( 500m ): 1.650.000 đ - Wifi: FPT Super 400 pack : 1.282.000 đ/ month - Wi-fi Modem (3) : 1st modem free – 770.000 đ for each extra modem Overall: 914.922.000 đ of imediate cost and 11.830.000 đ per month of extra fee VIII. Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system. For the most efficiency, the tree topology will be used because: - Easy to setup - Easy to detect malfuncion hardware which led to ease of maintainance - Highly secure - Does not disrupt the entire network if a devices malfuncion - Easy to expand for future plan IX. Reference Techopedia.com. (2019). What is Network Topology? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/5538/network-topology. Techopedia.com. (2021). What is Star Topology? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/13335/startopology#:~:text=Star%20topology%20is%20a%20network. Techopedia.com. (n.d.). What is Bus Network? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/14789/bus-network. Leiba, Barry (January 2008). "An Introduction to Internet Standards". IEEE Internet Computing. 12 (1): 71– 74. doi:10.1109/MIC.2008.2. ISSN 1089-7801. S2CID 26168365. Leiba, Barry (January 2008). "An Introduction to Internet Standards". IEEE Internet Computing. 12 (1): 71– 74. doi:10.1109/MIC.2008.2. ISSN 1089-7801. S2CID 26168365. Techopedia.com. (n.d.). What is Ring Topology? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/17262/ringtopology#:~:text=Ring%20topology%20refers%20to%20a. www.ibm.com. (2021). IBM Docs. [online] Available at: https://www.ibm.com/docs/en/zos/2.2.0?topic=services-basics-network-communication. Techopedia.com. (n.d.). What is Bandwidth? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/5245/bandwidth#:~:text=Bandwidth%20is%20a%20broad%20ter m [Accessed 27 Aug. 2022]. Coursehero.com. (2022). [online] Available at: https://www.coursehero.com/file/p2t3i9tu/Whybandwidth-is-important-The-amount-of-bandwidth-available-is-restricted-There/ [Accessed 27 Aug. 2022]. Techopedia.com. (2019). What is a Switch? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/2306/switch-networking. Techopedia.com. (2019). What is a Router? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/2277/router. Techopedia.com. (2019). What is Hub (Networking)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/26350/hub-networking. Techopedia.com. (2019). What is a Bridge? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/3160/bridge. Techopedia.com. (n.d.). What is a Gateway? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/5358/gateway. Techopedia.com. (2019). What is Repeater? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/3176/repeater. Techopedia.com. (2019). What is DHCP? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/11337/dynamic-host-configuration-protocol-dhcp. Techopedia.com. (n.d.). What is the Domain Name System (DNS)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/24201/domain-name-system-dns. Techopedia.com. (2019). What is File Transfer Protocol (FTP)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/1872/file-transfer-protocol-ftp. Techopedia.com. (2019). What is Client/Server Architecture? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/438/clientserver-architecture. Bogan, C. (2019). The Ping: Email Security. [online] UniVista. Available at: https://univista.com/posts/theping-email-security/. Bogan, C. (2019). The Ping: Email Security. [online] UniVista. Available at: https://univista.com/posts/theping-email-security/. Anon, (n.d.). Proxy là gì? Giải nghĩa chi tiết nhất về proxy server - Blog BizCloud. [online] Available at: https://bizcloud.vn/blog/proxy-la-gi-giai-nghia-chi-tiet-nhat-ve-proxy-server.html [Accessed 27 Aug. 2022]. Techopedia.com. (n.d.). What is a Print Server (PSERVER)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/3619/print-server-pserver. Coursehero.com. (2022). [online] Available at: https://www.coursehero.com/file/78984623/What-is-anApplication-Server-Definition-from-Techopediapdf/ [Accessed 27 Aug. 2022]. Techopedia.com. (2019). What is Hardware (H/W)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/2210/hardware-hw. Techopedia.com. (n.d.). What is a Central Processing Unit (CPU)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/2851/central-processing-unitcpu#:~:text=The%20central%20processing%20unit%20(CPU. Techopedia.com. (2019). What is Random Access Memory (RAM)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/24491/random-access-memory-ram. Techopedia.com. (2019). What is Read-Only Memory (ROM)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/2804/read-only-memory-rom.