Uploaded by Dangkhoacraftvn1661

Assignment 1 (1)

advertisement
ASSIGNMENT 1
Networking
ASSIGNMENT 1 FRONT SHEET
Qualification
BTEC Level 5 HND Diploma in Computing
Unit number and title
Unit 2: Networking Infrastructure
Submission date
27/8/2022
Date Received 1st submission
Re-submission Date
Date Received 2nd submission
Student Name
Truong Dang Khoa
Student ID
Class
GCS1101
Assessor name
Khoatdgcs220573
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1
P2
P3
P4
M1
M2
D1
Khoa
❒ Summative Feedback:
Grade:
Lecturer Signature:
❒ Resubmission Feedback:
Assessor Signature:
Date:
Student Name/ID Number:
Unit Number and Title:
Unit 2: Networking
Academic Year:
2021 – 2022
Unit Assessor:
Van Ho
Assignment Title:
Networking Infrastructure
Issue Date:
April 1st, 2021
Submission Date:
Internal Verifier Name:
Date:
Submission Format:
Format:
●
The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and referenced
using the Harvard referencing system. Please also provide a bibliography using the Harvard referencing
system.
Submission
●
Students are compulsory to submit the assignment in due date and in a way requested by the Tutor.
●
The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/.
●
Remember to convert the word file into PDF file before the submission on CMS.
Note:
●
The individual Assignment must be your own work, and not copied by or from another student.
●
If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you must
reference your sources, using the Harvard style.
Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply this
●
requirement will result in a failed assignment.
Unit Learning Outcomes:
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
Assignment Brief and Guidance:
Assignment scenario
You are employed as a network engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which has branches in Ho Chi Minh City, Hanoi, Da Nang and Can Tho. The company has
been contracted to implement a networking project from a local educational institute. The specification of the
project is given below:
•
People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers
including the academic heads and the programme managers, and 3 computer network
administrators.
•
Resources: 50 student lab computers, 35 staff computers, and 3 printers.
•
Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one
lab located on the first floor and another located on the second floor.
Task 1
The CEO of the company, Mr. Nguyen, has asked you to investigate and explain networking principles, protocols
and devices and submit a report.
You will need to produce a report that includes the following:
•
An introduction to provide an overview of your report.
•
Benefits and constraints of different types of networks and networking standards.
•
The impact of network topology, speed of communication and bandwidth requirements.
•
Effectiveness of networking systems.
•
Discussion on operating principles of networking devices and server types and networking
software.
•
Discuss the relationship of workstation hardware with networking software.
•
Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization.
•
For the given specification, identify the topology protocol for the efficient utilization of a
networking system.
Assignment Brief 1 (RQF)
Higher National Certificate/Diploma in Computing
Student Name/ID Number:
Unit Number and Title:
Unit 2: Networking
Academic Year:
2021 – 2022
Unit Assessor:
Van Ho
Assignment Title:
Networking Infrastructure
Issue Date:
April 1st, 2021
Submission Date:
Internal Verifier Name:
Date:
Submission Format:
Format:
●
The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and referenced
using the Harvard referencing system. Please also provide a bibliography using the Harvard referencing
system.
Submission
●
Students are compulsory to submit the assignment in due date and in a way requested by the Tutor.
●
The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/.
●
Remember to convert the word file into PDF file before the submission on CMS.
Note:
●
The individual Assignment must be your own work, and not copied by or from another student.
●
If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you must
reference your sources, using the Harvard style.
●
Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply this
requirement will result in a failed assignment.
Unit Learning Outcomes:
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
Assignment Brief and Guidance:
Assignment scenario
You are employed as a network engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which has branches in Ho Chi Minh City, Hanoi, Da Nang and Can Tho. The company has
been contracted to implement a networking project from a local educational institute. The specification of the
project is given below:
•
People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers
including the academic heads and the programme managers, and 3 computer network
administrators.
•
Resources: 50 student lab computers, 35 staff computers, and 3 printers.
•
Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one
lab located on the first floor and another located on the second floor.
Task 1
The CEO of the company, Mr. Nguyen, has asked you to investigate and explain networking principles, protocols
and devices and submit a report.
You will need to produce a report that includes the following:
•
An introduction to provide an overview of your report.
•
Benefits and constraints of different types of networks and networking standards.
•
The impact of network topology, speed of communication and bandwidth requirements.
•
Effectiveness of networking systems.
•
Discussion on operating principles of networking devices and server types and networking
software.
•
Discuss the relationship of workstation hardware with networking software.
•
Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization.
•
For the given specification, identify the topology protocol for the efficient utilization of a
networking system.
Learning Outcomes and Assessment Criteria (Assignment 1):
Learning Outcome
Pass
Merit
Distinction
LO1
P1 Discuss the benefits
and constraints of
different network types
and standards.
M1 Compare common
networking principles
and how protocols
enable the effectiveness
of networked systems.
D1 Considering a given
scenario, identify the
topology protocol
selected for the efficient
utilization of a
networking system.
P2 Explain the impact
of network topology,
communication and
bandwidth requirements.
LO2
P3 Discuss the
operating principles of
networking devices and
server types.
P4 Discuss the interdependence of
workstation hardware
with relevant
networking software.
M2 Explore a range of
server types and justify
the selection of a server,
considering a given
scenario regarding cost
and performance
optimisation.
Table of Contents
Assignment Brief 1 (RQF) ............................................................................................................................................ 4
Higher National Certificate/Diploma in Computing ................................................................................................. 4
I. Introduction.............................................................................................................................................................. 11
II. Benefits and constraints of different types of networks and networking standards. ............................................... 11
1.Computer Network. .............................................................................................................................................. 11
1.1 Definition ...................................................................................................................................................................................... 11
1.2 A few type of Computer Network: ....................................................................................................................................... 12
1.3. The benefits and constrains of different network types. ............................................................................................... 14
2. Network Protocol. ............................................................................................................................................... 16
2.1. Definition. .................................................................................................................................................................................... 16
2.2. A few types of the protocol.................................................................................................................................................... 16
3. Network standards. .............................................................................................................................................. 19
3.1. Definition. .................................................................................................................................................................................... 19
3.2. A few commonly known internet standards. .................................................................................................................... 20
III. The impact of network topology, speed of communication and bandwidth requirements. .................................... 20
1. Network topology. ............................................................................................................................................... 20
1.1. A few commonly known types of network topology. ................................................................................................... 21
1.2. Advantages and Disadvantages of types of network topology. .................................................................................. 22
2. Network communication. .................................................................................................................................... 24
3. Rule of Communication. ..................................................................................................................................... 24
3.1 Communication Fundamentals: ............................................................................................................................................. 24
3.2 Rule Establishment: ................................................................................................................................................................... 25
3.3. Message Encoding: ................................................................................................................................................................... 25
3.4 Message Formatting and Encapsulation: ............................................................................................................................ 26
3.5 Message Size. .............................................................................................................................................................................. 26
3.6 Message Timing.......................................................................................................................................................................... 26
3.7 Message Delivery Options. ..................................................................................................................................................... 27
4. Bandwidth requirement. ...................................................................................................................................... 27
4.1. Definition. -................................................................................................................................................................................ 27
IV. Some common networking devices and some types of servers ............................................................................. 28
1. Network devices: ................................................................................................................................................. 28
1.1. Switch:.......................................................................................................................................................................................... 28
1.2. Router: .......................................................................................................................................................................................... 28
1.3. Hub: ............................................................................................................................................................................................... 29
1.4. Bridge: .......................................................................................................................................................................................... 29
1.5 Gateway: ....................................................................................................................................................................................... 29
1.6. Modem .......................................................................................................................................................................................... 29
1.7. Repeater........................................................................................................................................................................................ 30
2. Network server .................................................................................................................................................... 30
2.1 DHCP ............................................................................................................................................................................................. 30
2.2. DNS ............................................................................................................................................................................................... 30
2.3 FTP.................................................................................................................................................................................................. 30
2.4 Client .............................................................................................................................................................................................. 31
2.5 Mail ................................................................................................................................................................................................. 31
2.6. Web................................................................................................................................................................................................ 31
2.7 Proxy .............................................................................................................................................................................................. 31
2.8 Print................................................................................................................................................................................................. 31
2.9 Application ................................................................................................................................................................................... 32
V. The interdependence of workstation hardware with networking software. ............................................................ 32
1. Definition............................................................................................................................................................. 32
2. Workstation hardware ......................................................................................................................................... 32
2.1. CPU ............................................................................................................................................................................................... 32
2.2 RAM ............................................................................................................................................................................................... 33
2.3. ROM .............................................................................................................................................................................................. 33
3.Networking software ............................................................................................................................................ 34
3.1 OS .................................................................................................................................................................................................... 34
3.2 Web server .................................................................................................................................................................................... 34
3.3. Mail Server .................................................................................................................................................................................. 34
4. The interdependency of workstation hardware with networking software. ........................................................ 34
VI. Common Networking Principles ands Compare circuit switching and packet switching ..................................... 35
1. Common Networking Principles: ........................................................................................................................ 35
2. Compare circuit switching and packet switching. ............................................................................................... 35
3.Practical application for each principle. ............................................................................................................... 36
VII. Explore a range of server types and justify the selection of a server, considering a given scenario regarding
cost and performance optimization. ............................................................................................................................ 36
1. Server types. ........................................................................................................................................................ 36
1.1 Client server ................................................................................................................................................................................. 36
1.2 Mail Server ................................................................................................................................................................................... 37
1.3 Web Server ................................................................................................................................................................................... 37
1.4 Proxy server ................................................................................................................................................................................. 37
1.5 Print server.................................................................................................................................................................................... 37
1.6 Application server ...................................................................................................................................................................... 37
2. Server chosen for the given scenario. .................................................................................................................. 38
3. Hardware requirement and cost. ........................................................................................................................ 38
VIII. Considering a given scenario, identify the topology protocol selected for the efficient utilization of a
networking system. ..................................................................................................................................................... 39
IX. Reference ................................................................................................................................................................ 39
I. Introduction.
Through this report, we are looking toward the following goal :
-
Understand the basic fundamentals about networks and networks protocol.
Understand the benefit and constrain of each types of network and protocol.
Understand the impact of Network topology, communication and bandwidth requirement.
Understand the pros and cons of each type of network topology.
Understand about the operating principle of networking devices and server types.
Understand the interpendence of workstation hardware with relevant networking software.
Create an efficient network for the given scenario.
II. Benefits and constraints of different types of networks and
networking standards.
1.Computer Network.
1.1 Definition
“A computer network is a set of computer sharing resources located or provided by
network nodes. The other. These interconnections are made of telecommunication
technologies, based on physically wired, optical, and wireless radio frequency methods.”
Source: Corbató, F. J.; et al. (1963). The Compatible Time-Sharing System A
Programmer's Guide] (PDF). MIT Press. ISBN 978-0-262-03008-3.
An Easier way to understand is that the network itself works similarly to a social animal,
for example, ants. You could see them always parade in lines, that’s because they follow a
typical scent that the ants in the front row made which act as a link to connect the ant and
they leave behind a trail too, so the other could follow the shared information and execute
the exact same chain of action which is comparable to computer protocol and network link.
1.2 A few type of Computer Network:
- Metropolitan area network ( MAN ):
+ Metropolitan area network ( MAN ) is a network in which multiple digital devices and multiple LAN (
local area network ) in a specific region ( Single/Multiple Cities, Town etc ) connect to a single network to
provide a more efficient way to transfer data over the word.
- Wide area network ( WAN ):
+ Wide area network ( WAN ) is a network in which multiple digital devices, LAN, and MAN are
connected to a worldwide system in order to provide the ease of transferring data over large geometric
distances. The Internet itself could be considered a type of WAN.
- Local area network ( LAN ):
+ Local area network ( LAN ) is a network in which multiple digital devices connect to each other in order
to share information directly with each other.
- Wireless Network (Wi-Fi ):
+ Wi-Fi is a type of network in which multiple digital devices in a very small geometry distance, most
likely a single building could connect and share data with each other through radio waves, this is the most
commonly used network around the world.
1.3. The benefits and constrains of different network types.
Pros
LAN
- Significantly
reduced rate of
data compromise.
It is- Cheap and
easy to set up and
maintenance.
- Greatly reduce
the risk of security
problems.
- Able to identify
every participant
since every
computer on LAN
is given a MAC
Address.
- Outstanding
MAN
- Having every
benefit of LAN
network without
suffering too
much from range
issues.
- Extremely
budget effective
compared to
LAN.
It- Easy to set up.
- Decent speed
due to wired
connection.
WAN
- One of the most
efficient types of
network.
- Ease of
communication
and data transfer.
- Worldwide
network cover
- Extremely
flexible for
business, medical,
and education
services due to its
worldwide range
and the ease of
Wi-FI
- Very flexible
due to not having
relied on wire
which could
support multiple
devices with
different types of
ports.
- Very cheap to
set up and require
almost no
maintenance.
- Space saving
since wires are no
Cons
speed due to wired
connection and
small geometric
range.
- Efficient data
transfering
data transfer.
longer a
necessity.
- Struggle to
transfer data
through a great
distance.
- Required greatly
more wire
compared to LAN
create more
problem with cost
and maintenance.
- More likely to
suffer from attack
from hackers.
It- Very hard to
manage a network
of city size.
- Very slow
compared to LAN
and MAN
- Very costly to
setup and
maintain.
- Require
experienced crew
to maintain which
lead to training
cost overrun.
- Require very
high performance
device in order to
store and transfer
data.
- Uncontrollable
data which could
lead to major
security problem.
- Slow speed
compared to
wired connection.
- Not very
reliable since Wifi is very likely to
suffer from signal
interference
elements which
make it
impossible to run
at full speed.
- Almost having
no defense
against cyber
criminal’s
attacks,
combining with a
wired network is
recommended.
2. Network Protocol.
2.1. Definition.
“Network protocols are a collection of rules that regulate how computer network devices – from servers
and routers to endpoints – format, send and receive data. For device networks, standardized protocol
networks provide a common language. Computers would be unable to interact with one another without
them. A network protocol links one device’s layer to another device’s layer, with each layer adding
control information to the communication.”
Source: https://fcit.usf.edu/network/chap2/chap2.htm
This can be understood as a type of language that the computers use to interact with each other
similarly to humans, but if we don’t have a language we could still interact with each other through body
language but if computers don’t have a protocol, it would be as good as nothing.
2.2. A few types of the protocol.
Transmission Control Protocol (TCP):
“ The Transmission Control Protocol (TCP) is one of the main protocols of the Internet
protocol suite. It originated in the initial network implementation in which it complemented
the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP. TCP
provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between
applications running on hosts communicating via an IP network. Major internet applications such
as the World Wide Web, email, remote administration, and file transfer rely on TCP”
Source: “RFC 675 - Specification of Internet Transmission Control Program, December 1974
Version”
The Internet Protocol is the most important protocol in the Internet Protocol Suite for transferring
data over networks. The Internet Protocol's routing capabilities fundamentally help build the
Internet. This protocol was formerly called Transmission Control Program’s connectionless datagram
service (TCP). As a result, TCP/IP is another name for the Internet protocol suite.
Hypertext Transfer Protocol (HTTP):
“The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the Internet protocol
suite model for distributed, collaborative, hypermedia information systems.[1] HTTP is the
foundation of data communication for the World Wide Web, where hypertext documents
include hyperlinks to other resources that the user can easily access, for example by a mouse click
or by tapping the screen in a web browser.”
Source: Fielding, Roy T.; Gettys, James; Mogul, Jeffrey C.; Nielsen, Henrik Frystyk; Masinter,
Larry; Leach, Paul J.; Berners-Lee, Tim (June 1999). Hypertext Transfer Protocol –
HTTP/1.1. IETF. doi:10.17487/RFC2616. RFC 2616.
Domain Name System (DNS):
“The Domain Name System (DNS) is the hierarchical and decentralized naming system used to
identify computers reachable through the Internet or other Internet Protocol (IP) networks.
The resource records contained in the DNS associate domain names with other forms of
information. These are most commonly used to map human-friendly domain names to the
numerical IP addresses computers need to locate services and devices using the
underlying network protocols, but have been extended over time to perform many other functions
as well. The Domain Name System has been an essential component of the functionality of the
Internet since 1985.”
Source: Evans, Claire L. (2018). Broad Band: The Untold Story of the Women Who Made the
Internet. New York: Portfolio/Penguin. ISBN 9780735211759
Internet Control Message Protocol (ICMP):
The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol
suite. It is used by network devices, including routers, to send error messages and operational
information indicating success or failure when communicating with another IP address, for
example, an error is indicated when a requested service is not available or that a host or router
could not be reached. ICMP differs from transport protocols such as TCP and UDP in that it is not
typically used to exchange data between systems, nor is it regularly employed by end-user network
applications (with the exception of some diagnostic tools like ping and traceroute).
Source: RFC 792, Internet Control Message Protocol
Dynamic Host Configuration Protocol (DHCP):
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on
Internet Protocol (IP) networks for automatically assigning IP addresses and other communication
parameters to devices connected to the network using a client–server architecture.
The technology eliminates the need for individually configuring network devices manually, and
consists of two network components, a centrally installed network DHCP server and client
instances of the protocol stack on each computer or device. When connected to the network, and
periodically thereafter, a client requests a set of parameters from the DHCP server using the DHCP
protocol.
Source: RFC 2131, Dynamic Host Configuration Protocol
Simple Network Management Protocol (SNMP):
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and
organizing information about managed devices on IP networks and for modifying that information
to change device behaviour. Devices that typically support SNMP include cable modems, routers,
switches, servers, workstations, printers, and more
SNMP is widely used in network management for network monitoring. SNMP exposes
management data in the form of variables on the managed systems organized in a management
information base (MIB) which describe the system status and configuration. These variables can
then be remotely queried (and, in some circumstances, manipulated) by managing applications
Source : RFC 1157 (Historic) — A Simple Network Management Protocol (SNMP)
Hypertext Transfer Protocol over SSL/TLS (HTTPS):
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol
(HTTP). It is used for secure communication over a computer network, and is widely used on the
Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security
(TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also referred to as
HTTP over TLS, or HTTP over SSL.
Sources: "Secure your site with HTTPS". Google Support. Google Inc.
- Secured Shell (SSH):
The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network
services securely over an unsecured network.[1] Its most notable applications are remote login and
command-line execution.
SSH applications are based on a client–server architecture, connecting an SSH client instance with an SSH
server.[2] SSH operates as a layered protocol suite comprising three principal hierarchical components:
the transport layer provides server authentication, confidentiality, and integrity; the user authentication
protocol validates the user to the server; and the connection protocol multiplexes the encrypted tunnel into
multiple logical communication channels.
Source: RFC 4250 – The Secure Shell (SSH) Protocol Assigned Numbers
3. Network standards.
3.1. Definition.
- In computer network engineering, an Internet Standard is a normative specification of a technology or
methodology applicable to the Internet. Internet Standards are created and published by the Internet
Engineering Task Force (IETF). They allow interoperation of hardware and software from different
sources which allows internets to function. As the Internet became global, Internet Standards became the
lingua franca of worldwide communications.
Engineering contributions to the IETF start as an Internet Draft, may be promoted to a Request for
Comments, and may eventually become an Internet Standard.
Source: Leiba, Barry (January 2008). "An Introduction to Internet Standards". IEEE Internet Computing.
12 (1): 71–74. doi:10.1109/MIC.2008.2. ISSN 1089-7801. S2CID 26168365.
3.2. A few commonly known internet standards.
- International Standards Organization (ISO)
- International Telecommunication Union (ITU)
- Institute of Electronics and Electrical Engineers (IEEE)
- American National Standards Institute (ANSI)
- Internet Research Task Force (IETF)
- Electronic Industries Association (EIA)
III. The impact of network topology, speed of communication and
bandwidth requirements.
1. Network topology.
Network topology refers to the geometric arrangement of links and nodes in a computing network.
Alternately, network topology may describe how the data is transferred between these nodes.
There are two types of network topologies: physical and logical. Physical topology emphasizes the
physical layout of the connected devices and nodes, while the logical topology focuses on the pattern of
data transfer between network nodes.
.”
1.1. A few commonly known types of network topology.
- Star topology:
Star topology is a network topology in which each network component is physically connected to a central
node such as a router, hub or switch.
In a star topology, the central hub acts like a server and the connecting nodes act like clients. When the
central node receives a packet from a connecting node, it can pass the packet on to other nodes in the
network. A star topology is also known as a star network.
- Bus topology:
A bus network is a local area network (LAN) topology in which all the nodes are connected to a shared bus. Bus
networks are the simplest way to connect multiple clients, but issues can occur when two clients want to transmit on
the same bus at the same time. A true bus network is passive.
- Tree topology:
Tree topology is a type of network topology where a root node is connected to two or more sub-level nodes, which
themselves are connected hierarchically to sub-level nodes. Physically, the tree topology is similar to bus and star
topologies; the network backbone may have a bus topology, while the low-level nodes connect using star topology.
- Mesh topology:
Mesh topology is a type of network consist of each node is directly connected to some or all the other nodes
present in the network. This redundancy makes the network highly fault-tolerant but the escalated costs may limit
this topology to highly critical networks.
- Ring topology:
Ring topology refers to a specific kind of network setup in which devices are connected in a ring and pass
information to or from each other according to their adjacent proximity in the ring structure. This type of
topology is highly efficient and handles heavier loads better than bus topology.
A ring topology may also be called an active topology because messages are passed to each device in the
ring..
- Hybrid topology:
Hybrid topology is also known as hybrid network. Hybrid networks combine two or more topologies in
such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring,
etc.). For example, a tree network (or star-bus network) is a hybrid topology in which star networks are
interconnected via bus networks. However, a tree network connected to another tree network is still
topologically a tree network, not a distinct network type. A hybrid topology is always produced when two
different basic network topologies are connected.Source:
https://en.wikipedia.org/wiki/Network_topology#cite_ref-Inc,_S._2002_5-0
1.2. Advantages and Disadvantages of types of network topology.
Star topology
Bus topology
Tree
topology
Mesh
topology
Ring
topology
Hybrid topology
Advantages
-Easy to
setup and
maintain
-No
disruptions
to the
network
when
connecting
or removing
devices.
-Easy to
detect and fix
compromised
data.
-Easy to
setup and
maintain.
-Extremely
cost
effective.
- Compared
to a star
topology, the
required
cable length
is less.
-No
disruptions
to the
network
when
connecting
or removing
devices.
-If a single
device fail,
the entire
system will
still keep
working.
- Easy to
expand.
-Easy to
detect and fix
compromised
data.
-Low cable
requirement.
-Extremely
cost
effective.
- Easy to
expand.
- Near
impossible to
be taken
down by
cyber
criminal.
-No
disruptions to
the network
when
connecting or
removing
devices.
- Consistent
data
transmission.
- Cheap to
setup.
- Significantly
reduced
latency.
- Easy to
maintain.
-Easy to
detect and fix
compromised
data.
- Extremely flexible
- Meet the requirement
for multiple purpose
from a vast amount of
customers
- Very reliable
Disadvantages
-Requires
more cable
length than a
bus topology.
-If the central
node fail the
entire system
will
completely
collapse
- No practical use
for large
networks.
- Harder to
detect and fix.
compromised
data.
- High packet
lost rate.
- The more
device
connected, the
slower the
network
become.
-If the top
node fail the
entire system
will
completely
collapse.
- Vunerable
to attack
from hackers.
- Extremely
troublesome
to maintain.
- Very
expensive
compared to
other
topology.
- High
latency.
- Extremely
hard to
maintain
which led to
more training
cost.
- If one device
fails, the
entire network
will dies along
with it.
-
- Extremely expensive
to setup and maintain
- Design is very
complex, require
experienced personel to
expand, maintain.
Disruptions
to the
network
when
connecting
or removing
devices.
- All device
must remain
active at all
time with
lead to
significantly
higher power
consumption
than other
topology
2. Network communication.
- Network communication, or internetworking, defines a set of protocols (that is, rules and standards) that allow
application programs to talk with each other without regard to the hardware and operating systems where they are
run. Internetworking allows application programs to communicate independently of their physical network
connections.
3. Rule of Communication.
3.1 Communication Fundamentals:
- All communication methods have three elements in common:
• Source or sender.
• Destination or receiver.
• Channel or media.
- Rules or protocols govern all methods of communication.
3.2 Rule Establishment:
- Protocols are necessary for effective communication and include:
• An identified sender and receiver.
• Common language and grammar.
• Speed and timing of delivery.
• Confirmation or acknowledgment requirements.
- Protocols used in network communications also define:
• Message encoding.
• Message delivery options.
• Message Formatting and Encapsulation.
• Message Timing.
• Message Size.
3.3. Message Encoding:
- Encoding between hosts must be in appropriate format for the medium.
- Messages are first converted into bits by the sending host.
- Each bit is encoded into a pattern of sounds, light waves, or electrical impulses depending on the network media.
- The destination host receives and decodes the signals in order to interpret the message.
3.4 Message Formatting and Encapsulation:
- There is an agreed format for letters and addressing letters which is required for proper delivery.
- Putting the letter into the addressed envelope is called encapsulation.
- Each computer message is encapsulated in a specific format, called a frame, before it is sent over the network.
- A frame acts like an envelope providing destination address and source address.
3.5 Message Size.
Long messages must also be broken into smaller pieces to travel across a network.
- Each piece is sent in a separate frame.
- Each frame has its own addressing information.
- A receiving host will reconstruct multiple frames into the original message.
3.6 Message Timing
- Access Method:
+ Hosts on a network need to know when to begin sending messages and how to respond when collisions occur.
- Flow Control :
+ Source and destination hosts use flow control to negotiate correct timing to avoid overwhelming the destination
and ensure information is received.
- Response Timeout:
+ Hosts on the network have rules that specify how long to wait for responses and what action to take if a response
timeout occurs.
3.7 Message Delivery Options.
One-to-one delivery One-to-many delivery One-to-all delivery
4. Bandwidth requirement.
4.1. Definition.
Bandwidth is a broad term defined as the bit-rate measure of the transmission capacity over a network
communication system. Bandwidth is also described as the carrying capacity of a channel or the data
transfer speed of that channel. However, broadly defined, bandwidth is the capacity of a network.
Bandwidth exists in physical or wireless communication networks.
* The importance of bandwidth :
Why bandwidth is important:The amount of bandwidth available is restricted. There is only so much capacity
available at any particular deployment area, such as a house or company. This is sometimes due to the network
device’s physical restrictions,such as the router or modem, cabling, or the wireless frequencies being utilized. Other
times, a network administratoror an internet or wide area network (WAN) provider will limit bandwidth on purpose.
IV. Some common networking devices and some types of servers
1. Network devices:
1.1. Switch:
A switch, in the context of networking, is a high-speed device that receives incoming data packets and
redirects them to their destination on a local area network (LAN).
A LAN switch operates at the data link layer (Layer 2) or the network layer of the OSI Model and, as such
it can support all types of packet protocols. The layer 2 switch is also sometimes called a bridge: its
function is to send frames containing data packets between nodes or segments of a network.
Essentially, switches are the traffic cops of a simple local area network. Switching establishes the
trajectory for the frames as the data units, and how the data moves from one area of a network to another.
By contrast, routing takes place at layer 3, there data gets sent between networks or from one network to
another.
1.2. Router:
A router is a device that analyzes the contents of data packets transmitted within a network or to another
network. Routers determine whether the source and destination are on the same network or whether data
must be transferred from one network type to another, which requires encapsulating the data packet with
routing protocol header information for the new network type.
1.3. Hub:
A hub, in the context of networking, is a hardware device that relays communication data. A hub sends
data packets (frames) to all devices on a network, regardless of any MAC addresses contained in the data
packet.
1.4. Bridge:
A bridge is a type of computer network device that provides interconnection with other bridge networks
that use the same protocol.
Bridge devices work at the data link layer of the Open System Interconnect (OSI) model, connecting two
different networks together and providing communication between them. Bridges are similar to repeaters
and hubs in that they broadcast data to every node. However, bridges maintain the media access control
(MAC) address table as soon as they discover new segments, so subsequent transmissions are sent to only
to the desired recipient.
Bridges are also known as Layer 2 switches.
1.5 Gateway:
A gateway is a data communication device that provides a remote network with connectivity to a host
network.
A gateway device provides communication to a remote network or an autonomous system that is out of
bounds for the host network nodes. Gateways serve as the entry and exit point of a network; all data routed
inward or outward must first pass through and communicate with the gateway in order to use routing
paths. Generally, a router is configured to work as a gateway device in computer networks.
1.6. Modem
A modem is a network device that both modulates and demodulates analog carrier signals (called sine
waves) for encoding and decoding digital information for processing. Modems accomplish both of these
tasks simultaneously and, for this reason, the term modem is a combination of "modulate" and
"demodulate."
1.7. Repeater
A repeater is a network device that retransmits a received signal with more power and to an extended
geographical or topological network boundary than what would be capable with the original signal.
A repeater is implemented in computer networks to expand the coverage area of the network, repropagate
a weak or broken signal and or service remote nodes. Repeaters amplify the received/input signal to a
higher frequency domain so that it is reusable, scalable and available.
2. Network server
2.1 DHCP
Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to dynamically assign an IP
address to any new node entering the network. DHCP permits a node to be configured automatically, thereby
avoiding the necessity of involvement by a network administrator.
2.2. DNS
Domain name system (DNS) is a hierarchical naming system built on a distributed database. This system transforms
domain names to IP addresses and makes it possible to assign domain names to groups of Internet resources and
users, regardless of the entities' physical location.
2.3 FTP
File Transfer Protocol (FTP) is a client/server protocol used for transferring files to or from a host
computer. FTP may be authenticated with user names and passwords.
Anonymous FTP allows users to access files, programs and other data from the Internet without the need
for a user ID or password. Web sites are sometimes designed to allow users to use "anonymous" or "guest"
as a user ID, and an email address for a password. Publicly available files are often found in a specified
directory and can be easily transferred to a user’s computer.
FTP is the Internet standard for moving or transferring files from one computer to another using TCP or IP
networks. File Transfer Protocol is also known as RFC 959.
2.4 Client
Client/server architecture is a computing model in which multiple components work in strictly defined
roles to communicate. The server hosts, delivers and manages most of the resources and services to be
consumed by the client. This type of shared resources architecture has one or more client computers
connected to a central server over a network or internet connection.
Client/server architecture is also known as a networking computing model or client/server network
because all the requests and services are delivered over a network. It’s considered a form of distributed
computing system because the components are doing their work independently of one another.
2.5 Mail
A mail server, often referred to as an email server, is a site where all incoming emails are stored, optimizatio, and
sorted before being sent over the internet.
Although you can send and receive emails in a fraction of a second, the email will go through a number of complex
transition steps (other than the recipient’s email address) before reaching the recipient’s mailbox.
2.6. Web
A powerful computer that connects to the user’s network is referred to as a web server. This computer stores all of
the information that it is allowed to handle from one or more websites. Each web server has its own IP address and
is capable of reading a wide range of files, including HTML, HTM,… Web servers with large storage capacity and
rapid processing speeds are widely used to secure the ability to store and execute data warehouses via the internet.
The web server is always sending data across the network of machines to which it is linked.
2.7 Proxy
A proxy server acts as a mediator between station users and the Internet by installing a proxy. The proxy server will
prohibit any connections between the sender and the recipient that are not made directly. Data is accepted at one
port before being sent to the rest of the network via the entrance gate at a second port. Proxy servers will make it
much more difficult for hackers to get the internal address and details of a private server system because of this
indirect link.
2.8 Print
A print server is a computer that can process print-related jobs on a network of computers. Print servers are
connected to a computer network in order to serve the need for printing jobs in a network that may contain more
than one printer. A print server usually allows users in a computer network to perform a printing job without having
to move files to the computer connected directly to the printer.Also known as printer server or network printer,
(although the latter is actually one of the properties of the print server)
2.9 Application
An application server is a type of server designed to install, operate and host applications andassociated
services for end users, IT services and organizations. It facilitates the hosting anddelivery of high-end
consumer or business applications, which are used by multiple andsimultaneously connected local or
remote users.
V. The interdependence of workstation hardware with networking
software.
1. Definition
Interdependence is a relationship where the parties involved are equally dependent on each other so much
that if one of the parties got taken down, the other parties got greatly restricted or complete disabled.
For example: We can’t write code without keyboard, We can’t interact with computer without an OS etc.
2. Workstation hardware
Hardware (H/W), in the context of technology, refers to the physical elements that make up a computer or
electronic system and everything else involved that is physically tangible. This includes the monitor, hard drive,
memory and the CPU. Hardware works hand-in-hand with firmware and software to make a computer function.
Although the same core components are shared between desktop computers and laptops, their characteristics
and design differ for a multitude of reasons (size, heat dissipation capabilities, power requirements, etc.).
However, hardware is always necessary to run the critical software that makes computers work.
2.1. CPU
The central processing unit (CPU) or processor, is the unit which performs most of the processing inside a
computer. It processes all instructions received by software running on the PC and by other hardware
components, and acts as a powerful calculator.
The CPU is placed into a specific square-shaped socket found on all motherboards by inserting its metallic
connectors or pins found on the underside. Each socket is built with a specific pin layout to support only a
specific type of processor.
Since modern CPUs produce a lot of heat and are prone to overheating, they must be kept cool with
appropriate fans or ventilation systems, and covered with heat sinks and thermal paste.
To control instructions and data flow to and from other parts of the computer, the CPU relies heavily on a
chipset, which is a group of microchips located on the motherboard.
This term is also known as a central processor, microprocessor or chip.
.
2.2 RAM
Random access memory (RAM) is a type of data storage used in computers that is generally located on the
motherboard. It is the main memory used by a computer for quick access since is much faster to read and
write than other forms of storage—between 20-100 times faster than hard disks.
Each storage location inside the memory can be accessed independently of the address, meaning that every
location can be reached easily at the same time (hence the term “random”). RAM is a volatile type of
memory, meaning that all information that was stored in RAM is lost when the computer is turned off.
Volatile memory is temporary memory while ROM (read-only memory) is non-volatile and holds data
permanently when the power is turned off.
2.3. ROM
Read-only memory (ROM) is a type of storage medium that permanently stores data on personal
computers (PCs) and other electronic devices.
It contains the programming needed to start a PC, which is essential for boot-up; it performs major
input/output tasks and holds programs or software instructions. This type of memory is often referred to as
“firmware”—how it is altered has been a source of design consideration throughout the evolution of the
modern computer.
3.Networking software
Network software is an extremely broad term for a range of software aimed at the design and
implementation of modern networks. Various types of network software support the creation,
calibration and operation of networks.
3.1 OS
An operating system (OS) is a piece of software that connects the user to the hardware. In order to execute
additional programs, every computer system must have at least one operating system. Browsers, Microsoft Office,
Notepad Games, and other programs all require a certain environment to run and accomplish their tasks. You can
connect with your computer without knowing how to speak its language thanks to operating systems. Users are
unable to run any computer or mobile device without an operating system.
3.2 Web server
A Web server is a piece of software or hardware that processes user requests using HTTP and other protocols.
3.3. Mail Server
An email server is a computer program that serves as a virtual post office. Incoming mail is stored on the server for
delivery to local users, as well as outgoing mail.
4. The interdependency of workstation hardware with networking
software.
Essentially, Network Software allows us to control how components like the CPU, RAM, and other Workstation
Hardware components are used. These are two features that complement each other. The other will be unable to flee
if one of them goes missing. To successfully process data and give meaningful results, a computer’s hardware and
software must function together. Without Network Software, workstation hardware is pointless. Workstation
Hardware, on the other hand, is required for the usage of computer software. Before programs can be set up to
operate, Network Software must be loaded and installed in Workstation Hardware. Here is an examples of hardware
and software interdependencies:
To send an email to someone, you must use Networking Software (Gmail) to send the email to the Mail Server
using Workstation hardware (key broad), and the Mail Server will deliver the email to the stated address. If you
choose to write a letter instead of sending an email, the Networking Software will act as a piece of paper and
provide you with a blank page on which to write. The workstation hardware will be the pen. Your mail will either be
blank or will not be sent at all if either is missing.
VI. Common Networking Principles ands Compare circuit switching and
packet switching
1. Common Networking Principles:
-Circuit Switching:
Circuit switching, the oldest method, a link has to be set up along all the nodes forming a path between
the two hosts. This link has to be maintained for the whole duration of the transmission. If one node
between the two hosts crashes or is removed, the connection is broken. A typical use of this type of
switching is using the phone. After dialing, one cable is reserved. It does not matter if one speaks or
not.
-Packet Switching:
In Packet Switching, the original data is split into very small fixed length packets. These packets again
need some information about the destination. The advantage of these small packets is that they can be
forwarded very fast. The amount of storage needed is decreased. This allows much higher throughput
of data than message passing. At the endpoint the packets are reassembled.
2. Compare circuit switching and packet switching.
Circus switch
-Packet is moved throght a single dedicated route for
the entire network.
Packet switch
- Packet is moved throught multiple different route
based on the destination of the packet.
- Extremely slow due to all packet got transfer through
a single cable.
- A lot faster than Circus switching since data are
transfered throught multiple different route.
- Used mostly by telephone
- Used by most network in the world
3.Practical application for each principle.
- Circus switch: Circuit switching is used for connections that must be continuous for long periods of time,
such as long-distance communication i.e traditional telephone system, optical mesh network etc
- Packet switch : Packet switching is most commonly seen on data networks such as LAN and WAN as it allowed
for more efficient transfering. Also, when one packet is loss while trying to reach the destination, you only have to
resend that loss packet again without having sending the entire data which potentally could took a lot more time and
resources.
VII. Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and performance
optimization.
1. Server types.
1.1 Client server
Client/server architecture is a computing model in which multiple components work in strictly defined
roles to communicate. The server hosts, delivers and manages most of the resources and services to be
consumed by the client. This type of shared resources architecture has one or more client computers
connected to a central server over a network or internet connection.
Client/server architecture is also known as a networking computing model or client/server network
because all the requests and services are delivered over a network. It’s considered a form of distributed
computing system because the components are doing their work independently of one another.
1.2 Mail Server
A mail server, often referred to as an email server, is a site where all incoming emails are stored, optimizatio, and
sorted before being sent over the internet.
Although you can send and receive emails in a fraction of a second, the email will go through a number of complex
transition steps (other than the recipient’s email address) before reaching the recipient’s mailbox.
1.3 Web Server
A powerful computer that connects to the user’s network is referred to as a web server. This computer stores all of
the information that it is allowed to handle from one or more websites. Each web server has its own IP address and
is capable of reading a wide range of files, including HTML, HTM,… Web servers with large storage capacity and
rapid processing speeds are widely used to secure the ability to store and execute data warehouses via the internet.
The web server is always sending data across the network of machines to which it is linked.
1.4 Proxy server
A proxy server acts as a mediator between station users and the Internet by installing a proxy. The proxy server will
prohibit any connections between the sender and the recipient that are not made directly. Data is accepted at one
port before being sent to the rest of the network via the entrance gate at a second port. Proxy servers will make it
much more difficult for hackers to get the internal address and details of a private server system because of this
indirect link.
1.5 Print server
A print server is a computer that can process print-related jobs on a network of computers. Print servers are
connected to a computer network in order to serve the need for printing jobs in a network that may contain more
than one printer. A print server usually allows users in a computer network to perform a printing job without having
to move files to the computer connected directly to the printer.Also known as printer server or network printer,
(although the latter is actually one of the properties of the print server)
1.6 Application server
An application server is a type of server designed to install, operate and host applications andassociated
services for end users, IT services and organizations. It facilitates the hosting anddelivery of high-end
consumer or business applications, which are used by multiple andsimultaneously connected local or
remote users.
2. Server chosen for the given scenario.
Given scenario:
People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the academic
heads and the programme managers, and 3 computer network administrators.
Resources: 50 student lab computers, 35 staff computers, and 3 printers.
Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located on the
first floor and another located on the second floor.
Considered the given scenario, the web server will be use for this project because :
- Easy to setup and maintain.
- Easy to use.
- Easy to share resources.
- Download resource faster since web server suffer less from bandwidth restriction.
3. Hardware requirement and cost.
- Server : Rented for 7.550.000 / month
+ Processor (CPU): 2x Intel Xeon Gold 6138
+ Operating system: Linux Ubuntu 64 bit
+ Memory: 64GB of RAM
+ Network Adapter
- Website : 1.900.000Đ + 3.000.000 đ/ month ( for maintainance )
- Computer:
Processor (CPU): Intel Core i5 (or equivalent) and above
Operating system: Microsoft Windows 10 (64-bit)
Memory: 8GB RAM or more
Monitor/Display: 21.5″ wide screen or larger monitor – about 2.300.000 đ each
Network Adapter: Wired network connection with Internet acces
Estimated cost : 8.300.000 đ/ per computer
- Printer : Already available
- Cable ( 500m ): 1.650.000 đ
- Wifi: FPT Super 400 pack : 1.282.000 đ/ month
- Wi-fi Modem (3) : 1st modem free – 770.000 đ for each extra modem
Overall: 914.922.000 đ of imediate cost and 11.830.000 đ per month of extra fee
VIII. Considering a given scenario, identify the topology protocol
selected for the efficient utilization of a networking system.
For the most efficiency, the tree topology will be used because:
- Easy to setup
- Easy to detect malfuncion hardware which led to ease of maintainance
- Highly secure
- Does not disrupt the entire network if a devices malfuncion
- Easy to expand for future plan
IX. Reference
Techopedia.com. (2019). What is Network Topology? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/5538/network-topology.
Techopedia.com. (2021). What is Star Topology? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/13335/startopology#:~:text=Star%20topology%20is%20a%20network.
Techopedia.com. (n.d.). What is Bus Network? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/14789/bus-network.
Leiba, Barry (January 2008). "An Introduction to Internet Standards". IEEE Internet Computing. 12 (1): 71–
74. doi:10.1109/MIC.2008.2. ISSN 1089-7801. S2CID 26168365.
Leiba, Barry (January 2008). "An Introduction to Internet Standards". IEEE Internet Computing. 12 (1): 71–
74. doi:10.1109/MIC.2008.2. ISSN 1089-7801. S2CID 26168365.
Techopedia.com. (n.d.). What is Ring Topology? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/17262/ringtopology#:~:text=Ring%20topology%20refers%20to%20a.
www.ibm.com. (2021). IBM Docs. [online] Available at:
https://www.ibm.com/docs/en/zos/2.2.0?topic=services-basics-network-communication.
Techopedia.com. (n.d.). What is Bandwidth? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/5245/bandwidth#:~:text=Bandwidth%20is%20a%20broad%20ter
m [Accessed 27 Aug. 2022].
Coursehero.com. (2022). [online] Available at: https://www.coursehero.com/file/p2t3i9tu/Whybandwidth-is-important-The-amount-of-bandwidth-available-is-restricted-There/ [Accessed 27 Aug. 2022].
Techopedia.com. (2019). What is a Switch? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/2306/switch-networking.
Techopedia.com. (2019). What is a Router? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/2277/router.
Techopedia.com. (2019). What is Hub (Networking)? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/26350/hub-networking.
Techopedia.com. (2019). What is a Bridge? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/3160/bridge.
Techopedia.com. (n.d.). What is a Gateway? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/5358/gateway.
Techopedia.com. (2019). What is Repeater? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/3176/repeater.
Techopedia.com. (2019). What is DHCP? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/11337/dynamic-host-configuration-protocol-dhcp.
Techopedia.com. (n.d.). What is the Domain Name System (DNS)? - Definition from Techopedia. [online]
Available at: https://www.techopedia.com/definition/24201/domain-name-system-dns.
Techopedia.com. (2019). What is File Transfer Protocol (FTP)? - Definition from Techopedia. [online]
Available at: https://www.techopedia.com/definition/1872/file-transfer-protocol-ftp.
Techopedia.com. (2019). What is Client/Server Architecture? - Definition from Techopedia. [online]
Available at: https://www.techopedia.com/definition/438/clientserver-architecture.
Bogan, C. (2019). The Ping: Email Security. [online] UniVista. Available at: https://univista.com/posts/theping-email-security/.
Bogan, C. (2019). The Ping: Email Security. [online] UniVista. Available at: https://univista.com/posts/theping-email-security/.
Anon, (n.d.). Proxy là gì? Giải nghĩa chi tiết nhất về proxy server - Blog BizCloud. [online] Available at:
https://bizcloud.vn/blog/proxy-la-gi-giai-nghia-chi-tiet-nhat-ve-proxy-server.html [Accessed 27 Aug. 2022].
Techopedia.com. (n.d.). What is a Print Server (PSERVER)? - Definition from Techopedia. [online] Available
at: https://www.techopedia.com/definition/3619/print-server-pserver.
Coursehero.com. (2022). [online] Available at: https://www.coursehero.com/file/78984623/What-is-anApplication-Server-Definition-from-Techopediapdf/ [Accessed 27 Aug. 2022].
Techopedia.com. (2019). What is Hardware (H/W)? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/2210/hardware-hw.
Techopedia.com. (n.d.). What is a Central Processing Unit (CPU)? - Definition from Techopedia. [online]
Available at: https://www.techopedia.com/definition/2851/central-processing-unitcpu#:~:text=The%20central%20processing%20unit%20(CPU.
Techopedia.com. (2019). What is Random Access Memory (RAM)? - Definition from Techopedia. [online]
Available at: https://www.techopedia.com/definition/24491/random-access-memory-ram.
Techopedia.com. (2019). What is Read-Only Memory (ROM)? - Definition from Techopedia. [online]
Available at: https://www.techopedia.com/definition/2804/read-only-memory-rom.
Download
Study collections