Uploaded by Huynh Tuan Kiet (FGW HCM)

Huỳnh TUấn Kiệt-am1-vananh2

advertisement
ASSIGNMENT 1 FRONT SHEET
Qualification
Unit number and
title
Submission date
Re-submission
Date
Student Name
Class
BTEC Level 5 HND Diploma in Computing
Unit 2: Networking Infrastructure
Date Received 1st
submission
Date Received 2nd
submission
Huỳnh Tuấn Kiệt
GCS1102
Student ID
Assessor name
GCS210886
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
kiet
Student’s signature
Grading grid
P1
P2
P3
P4
M1
M2
 Summative Feedback:
Grade:
Lecturer Signature:
Assessor Signature:
D1
 Resubmission Feedback:
Date:
Assignment Brief 1 (RQF)
Higher National Certificate/Diploma in Computing
Student Name/ID
Number:
Unit Number and Title:
Academic Year:
Unit Assessor:
Assignment Title:
Issue Date:
Submission Date:
Internal Verifier Name:
Date:
Huỳnh Tuấn Kiệt - GCS210886
Unit 2: Networking
2022
Networking Infrastructure
Submission Format:
Format:
•
The submission is in the form of an individual written report. This should be written
in a concise, formal business style using single spacing and font size 12. You are
required to make use of headings, paragraphs and subsections as appropriate, and all
work must be supported with research and referenced using the Harvard referencing
system. Please also provide a bibliography using the Harvard referencing system.
Submission
•
Students are compulsory to submit the assignment in due date and in a way
requested by the Tutor.
•
The form of submission will be a soft copy posted on HYPERLINK
"http://cms.greenwich.edu.vn/"http://cms.greenwich.edu.vn/. HYPERLINK
"http://cms.greenwich.edu.vn/"
•
Remember to convert the word file into PDF file before the submission on CMS.
Note:
•
•
•
The individual Assignment must be your own work, and not copied by or from
another student.
If you use ideas, quotes or data (such as diagrams) from books, journals or other
sources, you must reference your sources, using the Harvard style.
Make sure that you understand and follow the guidelines to avoid plagiarism.
Failure to comply
this requirement will result in a failed assignment.
Unit Learning Outcomes:
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
Assignment Brief and Guidance:
Assignment scenario
You are employed as a network engineer by Nguyen Networking Limited, a high-tech
networking solution development company, which has branches in Ho Chi Minh City,
Hanoi, Da Nang and Can Tho. The company has been contracted to implement a
networking project from a local educational institute. The specification of the project is
given below:
•
People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher
managers including the academic heads and the programme managers, and 3
computer network administrators.
•
•
Resources: 50 student lab computers, 35 staff computers, and 3 printers.
Building: 3 floors, all computers and printers are on the ground floor apart from the
IT labs – one lab located on the first floor and another located on the second floor.
Task 1
The CEO of the company, Mr. Nguyen, has asked you to investigate and explain
networking principles, protocols and devices and submit a report.
You will need to produce a report that includes the following:
•
•
•
•
•
An introduction to provide an overview of your report.
Benefits and constraints of different types of networks and networking standards.
The impact of network topology, speed of communication and bandwidth
requirements.
Effectiveness of networking systems.
Discussion on operating principles of networking devices and server types and
networking software.
•
•
Discuss the relationship of workstation hardware with networking software.
Explore a range of server types and justify the selection of a server, considering a
given scenario regarding cost and performance optimization.
•
For the given specification, identify the topology protocol for the efficient
utilization of a networking system.
Learning Outcomes and Assessment Criteria (Assignment 1):
Learning Outcome Pass
Merit
P1 Discuss the M1 Compare
LO1
benefits
and common networking
constraints
of principles and how
different
network protocols enable the
Distinction
D1 Considering a
given scenario,
identify the
topology protocol
types and standards.
P2 Explain the
impact of network
topology,
communication and
bandwidth
requirements.
P3 Discuss the
operating principles
of
networking
devices and server
types.
LO2
P4 Discuss the
inter- dependence
of
workstation
hardware
with
relevant
networking
software.
effectiveness of
networked systems.
selected for the
efficient utilization
of a networking
system.
M2 Explore a range
of server types and
justify the selection
of
a
server,
considering a given
scenario regarding
cost
and
performance
optimisation.
Table of Contents
P1 Discuss the benefits and constraints of different network types and standards
.............................................. 3
•
Introduction to Network:
....................................................................................................................... 3
•
OSI Model
.........................................................................................................................................
.... 3
•
Types of common network
.................................................................................................................... 5
•
LAN
..................................................................................................................................
.............. 5
•
•
WAN
..................................................................................................................................
............ 6
Network protocols
................................................................................................................................. 9
•
Definition
..................................................................................................................................
........ 9
•
Purposes of network protocols
........................................................................................................... 9
•
Common network protocols
............................................................................................................. 10
•
Network standards
.............................................................................................................................. 13
•
International Standards Organization
........................................................................................... 13
•
Standards used in network
........................................................................................................... 14
P2 Explain the impact of network topology, communication and bandwidth requirements:
............................. 14
•
Introduction to network topology
........................................................................................................ 14
1.1
Definition
..................................................................................................................................... 14
1.2 Physical topology:
.................................................................................................................................. 15 1.3
Logical topology:
................................................................................................................................... 15
1.4
The difference between physical topology and logical topology
..................................................... 16
1.5
Popular topologies
....................................................................................................................... 17
2.
Network Communication
.............................................................................................................................. 23
2.1 Definition:
............................................................................................................................................... 23
2.2 The rules in the network communication:
........................................................................................... 24
3.
Network Bandwidth:
..................................................................................................................................... 25
3.1 Definition:
............................................................................................................................................... 25
3.2 Why bandwidth requirement is needed for networks:
....................................................................... 26
P3 Discuss the operating principles of networking devices and server types
....................................................... 26
•
Networking devices:
...................................................................................................................................... 26
•
Switches:
................................................................................................................................................. 26
•
Routers..............................................................................................................................................
...... 27
•
Gateways
.................................................................................................................................................... 27
P4 Discuss the inter-dependence of workstation hardware with relevant networking software:
...................... 29
•
Introduction to interdependence network
........................................................................................................ 29
•
Workstation hardware
.................................................................................................................................. 30
•
Definition:
............................................................................................................................................... 30
•
Example
.................................................................................................................................................. 31
• Networking Software
......................................................................................................................................... 34
P1 Discuss the benefits and constraints of different network
types and standards:
1. Introduction to Network:
Figure 1 - Network
A network consists of 2 or more computers linked together to share
resources (such as printers and CDs), exchange files, and communicate
with each other. Computers on a network can be linked via cables,
phone lines, radio waves, satellites, or infrared rays.
Two common types of networks include:
−
Local Area Network (LAN)
−
Wide Area Network (WAN)
There are also the following types: Metropolitan Area Networks
(MAN), Wireless WAN (WWAN).
2. OSI Model:
The Open Systems Interconnection model (OSI model) is a
conceptual model that characterizes and standardizes the
communication functions of a telecommunication or computing
system without regard to its underlying internal structure and
technology. Its goal is the interoperability of diverse communication
systems with standard communication protocols.
Figure 2 - Model
The model partitions the flow of data in a communication system into seven
abstraction layers, from the physical implementation of transmitting bits across a
communications medium to the highest-level representation of data of a distributed
application. Each intermediate layer serves a class of functionality to the layer above it
and is served by the layer below it. Classes of functionality are realized in software by
standardized communication protocols.
OSI divides the two-device communication into seven layers. A task or task group
is assigned to each of these 7 classes. All the layers are independent and the tasks
are assigned to them to implement the common networks independently.
•
Types of common network:
3.1 LAN:
Definition:
A local area network (LAN) is a collection of devices connected together in one
physical location, such as a building, office, or home. A LAN can be small or
large, ranging from a home network with one user to an enterprise network with
thousands of users and devices in an office or school.
Figure 3 - LAN
•
Characteristics:
•
LAN should be capable of providing high speed, and high capacity
communications.
•
•
•
Has large bandwidth, can run online applications connected through the
network such as conferences, movie screenings...
•
The connection range has a relatively small limit.
•
Low cost
•
Simple LAN administration
•
A minimum LAN requires a server (server), paired devices (Repeater, Hub,
Switch, Bridge), a client computer (client), a network card (Network Interface
Card - NIC), and cables (cable). to connect computers together .
Benefits of LAN:
•
The basic LAN implementation does not cost too much.
•
It is easy to control and manage the entire LAN as it is available in one small
region.
•
The LAN configuration is very easy due to the availability of required
protocols in the Operating System (OS) itself.
•
The systems or devices connected on LAN communicate at a very high speed
depending upon LAN type and Ethernet cables supported. The common
speeds supported are 10 Mbps, 100 Mbps, and 1000 Mbps. Gigabit Ethernet
versions are evolving very fast. Cheaper versions will be available once the
technology matures and mass production has been carried out.
•
With the help of file servers connected on the LAN, sharing of files and
folders among peers will become very easy and efficient.
•
It is easy to set up security protocols to protect LAN users from intruders or
hackers.
•
It is easy to share common resources such as printers and internet lines among
multiple LAN users.
•
LAN users do not require their own hard disk and CD-ROM drives. They can
save their work centrally on the network file server.
•
Application software such as MS Office, Anti-Virus, Adobe reader is stored
in one system and are shared for all the LAN users. This helps them install
application software with the click of a mouse.
Constraints of LAN:
•
LAN covers small geographical area.
•
Security issues are big concern as it is easy to have access to programs and
data of peers. Special security measures are needed to stop unauthorized
access.
•
It is difficult to setup and maintain LAN and requires skilled technicians and
network administrators.
•
In the server based LAN architecture, if server develops some fault, all the
users are affected.
•
Appearance of virus in one system can spread very fast to all the LAN users
very easily.
3.2 WAN:
•
Definition:
•
A wide area network (WAN) is a telecommunications network that extends
over a large geographic area for the primary purpose of computer networking.
Wide area networks are often established with leased telecommunication
circuits.
•
In its simplest form, a wide-area network (WAN) is a collection of local-area
networks (LANs) or other networks that communicate with one another. A
WAN is essentially a network of networks, with the Internet the world's
largest WAN.
Figure 4 - WAN
•
Characteristics:
•
It connect devices that are separated by a broader
geographical area than a LAN
•
It use Carriers such as phone companies or network providers
•
•
It use serial connection.
Benefits of WAN:
•
WAN covers larger geographical area. Hence business offices situated at
longer distances can easily communicate.5
•
Like LAN, it allows sharing of resources and application softwares among
distributed workstations or users.
•
The software files are shared among all the users. Hence all will have access
to latest files. This avoids use of previous versions by them.
•
Organizations can form their global integrated network through WAN.
Moreover it supports global markets and global businesses.
•
The emergence of IoT (Internet of Things) and advanced wireless
technologies such as LAN or LAN-Advanced have made it easy for the
growth of WAN based devices. Messages can be sent very quickly across the
globe with the help of applications such as whatsApp, facebook messenger
etc.
Constraints of WAN:
•
Initial investment costs are higher.
•
It is difficult to maintain the network. It requires skilled technicians and
network administrators.
•
There are more errors and issues due to wide coverage and use of different
technologies. Often it requires more time to resolve issues due to involvement
of multiple wired and wireless technologies.
•
It has lower security compare to LAN and MAN due to wider coverage and
use of more technologies.
•
Security is big concern and requires use of firewall and security
softwares/protocols at multiple points across the entire system. This will
avoid chances of hacking by intruders.
3.3 MAN:
•
Definition:
- A metropolitan area network (MAN) is a computer network that interconnects
users with computer resources in a geographic region of the size of a
metropolitan area. The term MAN is applied to the interconnection of local
area networks (LANs) in a city into a single larger network which may then
also offer efficient connection to a wide area network. The term is also used to
describe the interconnection of several local area networks in a metropolitan
area through the use of point-to-point connections between them.
Figure 5 - MAN
•
•
Characteristics:
•
average bandwidth but the connection range is relatively large.
•
installation cost is higher than LAN.
•
network administration is more complex.
Benefits of MAN:
•
It utilizes drawbacks of both LAN and WAN to provide larger and
controllable computer network.
•
MAN requires fewer resources compare to WAN. This saves the
implementation cost.
•
It helps people interface fast LANs together. This is due to easy
implementation of links.
•
•
It provides higher security compare to WAN.
•
It helps in cost effective sharing of common resources such as printers etc.
•
Like LAN and WAN, it also offers centralized management of data and files.
Constraints of MAN:
•
It is difficult to manage the network once it becomes large.
•
It is difficult to make the system secure from hackers and industrial
espionage.
•
Network installation requires skilled technicians and network administrators.
This increases overall installation and management costs.
•
It requires more cables for connection from one place to the other compare to
LAN.
4. Network protocols:
4.1 Definition:
- Network protocols are a set of rules, conventions, and data structures that
dictate how devices exchange data across networks. In other words, network
protocols can be equated to languages that two devices must understand for
seamless communication of information, regardless of their infrastructure,
design disparities, and can exchange information with each other.
4.2 Purposes of network protocols:
•
Without protocols, devices would lack the ability to understand the electronic
signals they send to each other over network connections. Network protocols
serve these basic functions:
•
Address data to the correct recipients.
•
Physically transmit data from source to destination, with security
protection if needed.
•
Receive messages and send responses appropriately.
•
Consider a comparison between network protocols with how a postal service
handles physical paper mail. Just as the postal service manages letters from
many sources and destinations, network protocols keep data flowing along
many paths continuously.
•
Unlike physical mail, however, network protocols provide advanced
capabilities. These include delivering a constant flow of messages to one
destination (called streaming) and automatically making copies of a message
for delivery to multiple destinations at once (called broadcasting).
4.3 Common network protocols:
TCP/IP:
•
Transmission Control Protocol/Internet Protocol (TCP/IP) is the language a
computer uses to access the internet. It consists of a suite of protocols
designed to establish a network of networks to provide a host with access to
the internet.
•
TCP/IP is responsible for full-fledged internet data connectivity and
transmitting the data end to end by providing other functions, including
addressing, mapping and acknowledgment. TCP/IP contains four layers,
which differ slightly from the OSI model.
Figure 6 - Transmission Control protocols
HTTP:
- The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the
Internet protocol suite model for distributed, collaborative, hypermedia
information systems. HTTP is the foundation of data communication for the
World Wide Web, where hypertext documents include hyperlinks to other
resources that the user can easily access, for example by a mouse click or by
tapping the screen in a web browser.
Figure 7 - Hypertext Transfer Protocol
DNS:
- Domain Name Server (DNS) is a standard protocol that helps Internet users
discover websites using human readable addresses. Like a phonebook which
lets you look up the name of a person and discover their number, DNS lets
you type the address of a website and automatically discover the Internet
Protocol (IP) address for that website.
Figure 8 - DNS
ICMP:
- The Internet Control Message Protocol (ICMP) is a network layer protocol used
by network devices to diagnose network communication issues. ICMP is
mainly used to determine whether or not data is reaching its intended
destination in a timely manner. Commonly, the ICMP protocol is used on
network devices, such as routers. ICMP is crucial for error reporting and
testing, but it can also be used in distributed denial-of-service (DDoS) attacks.
Figure 9 - ICMP
DHCP:
•
Dynamic Host Configuration Protocol (DHCP - dynamic server configuration
protocol) is a protocol that allows automatic IP address allocation along with
other related configurations such as subnet mask and default gateway. The
computer is configured automatically, thus reducing interference with the
network. It provides a central database to keep track of all the computers on
the network. The most important purpose is to avoid the situation where two
different computers have the same IP address.
•
Without DHCP, machines can configure IP manually (static IP configuration).
In addition to providing IP addresses, DHCP also provides other
configuration information, such as DNS. Currently, there are two versions of
DHCP: IPv4 and IPv6.
5. Network standards:
- Networking standards define the rules for data communications that are needed
for interoperability of networking technologies and processes. Standards help
in creating and maintaining open markets and allow different vendors to
compete on the basis of the quality of their products while being compatible
with existing market products.During data
communication, a number of standards may be used simultaneously at the
different layers. The commonly used standards at each layer are − - Application
layer − HTTP, HTML, POP, H.323, IMAP
-
Transport layer − TCP, SPX -
Network layer −IP, IPX
•
Data link layer − Ethernet IEEE 802.3, X.25, Frame Relay
•
Physical layer −RS-232C (cable), V.92 (modem)
•
Standards are the set of rules for data communication that are needed for
exchange of information among devices. It is important to follow Standards
which are created by various Standard Organization like IEEE , ISO , ANSI
etc.
Types of Standards :
•
De Facto Standard.
•
De Jure Standard.
5.1 International Standards Organization:
- The International Organization for Standardization is an independent, nongovernmental organization, the members of which are the standards
organizations of the 165 member countries. it is the world's largest developer
of voluntary international standards and it facilitates world trade by providing
common standards among nations. More than twenty thousand standards have
been set, covering everything from manufactured products and technology to
food safety, agriculture, and healthcare.
Figure 10 - ISO
5.2 Standards used in network:
Some of the noted standards organizations are:
•
International Standards Organization ( ISO)
•
International Telecommunication Union (ITU)
•
Institute of Electronics and Electrical Engineers (IEEE)
•
American National Standards Institute (ANSI)
•
Internet Research Task Force (IETF)
•
Electronic Industries Association (EIA)
P2 Explain the impact of network topology, communication and
bandwidth requirements:
1. Introduction to network topology
1.1 Definition:
- Network topology refers to the manner in which the links and nodes of a
network are arranged to relate to each other. Topologies are categorized as
either physical network topology, which is the physical signal transmission
medium, or logical network topology, which refers to the manner in which
data travels through the network between devices, independent of the physical
connection of the devices. Logical network topology examples include
twisted-pair Ethernet, which is categorized as a logical bus topology, and
token ring, which is categorized as a logical ring topology.
Figure 11 - Types of Network Topology
1.2 Physical topology:
- Physical topology refers to the interconnected structure of a local area network
(LAN). The method employed to connect the physical devices on the network
with the cables, and the type of cabling used, all constitute the physical
topology. This contrasts with logical topology, which describes a network's
media signal performance and how it exchanges device data.
Figure 12 - Physical Topology
1.3 Logical topology:
•
A logical topology is a concept in networking that defines the architecture of
the communication mechanism for all nodes in a network. Using network
equipment such as routers and switches, the logical topology of a network can
be dynamically maintained and reconfigured.
•
Logical topologies contrast with physical topologies, which refer to the
physical interconnections of all devices in the network.
Figure 13 - Logical Topology
1.4 The difference between physical topology and logical topology:
Comparison Chart:
BASIS FOR
COMPARISON
Basic
Types
PHYSICAL TOPOLOGY
LOGICAL TOPOLOGY
Refer to how a network look and
functions.
Fashion in which data travels
logistically.
Bus, star, ring and mesh
topologies.
Logical bus and the logical
ring.
Founded on
Physical connections of cables
and devices.
Cost, scalability, flexibility,
bandwidth capacity, etcetera.
Can affect
Path traveled by data in a
network.
Data delivery causing lost
packets or congestion.
1.5 Popular topologies:
Mesh topology:
• A mesh topology is a network setup where each computer and network
device is interconnected with one another. This topology setup allows for
most transmissions to be distributed even if one of the connections goes
down. It is a topology commonly used for wireless networks. Below is a
visual example of a simple computer set up on a network using a mesh
topology.
•
The mesh topology has a unique network designin which each computer
on the network connects to every other.It is develops a P2P (point-to
point) connection between all the devices of the network.It offers a high
level of redundancy, so even if one network cable fails, still data has an
alternative path to reach its destination.
Figure 14 - Mesh
•
Advantages:
•
The network can be expanded without disrupting current users.
•
Need extra capability compared with other LAN topologies.
•
A mesh topology is robust.
•
It has multiple links,so if any single route is blocked, then other
routers should be used for data communication.
•
No traffic problem as nodes has dedicated links.
•
Dedicated links help you to eliminate the traffic problem
•
It helps you to avoid the chances of network failuer by connecting all
systems to a central node.
P2P links make the fault identification isolation process easy.
•
•
•
Manages high amounts of traffic, because multiple devices can
transmit data simultaneously.
•
A failure of one device does not cause a break in the network or
transmission of data.
•
Adding additional devices does not disrupt data transmission between
other devices.
•
Every system has its privacy and security.
Disadvatages:
•
Its is expensive due to the use of more cables.No proper utilization of
systems.
•
Instation is complex because every node is connected to every node.
•
The cost to implement is higher than other network topologies,
making it a less desirable option.
•
Building and maintaining the topology is difficult and time
consuming.
•
The chance of redundant connections is high, which adds to the high
costs and potential for reduced efficiency.
•
Because of the amount of cabling and the number of input-outputs,it
is expensive to
impeplement.
•
It requires a large space to run the cables.
•
•
It requires more space for dedicated links.
Star topology:
 In the star topology, all the computers connect with the help of a hub. This
cable is called a central node, and all other nodes are connected using this
central node. It is most popular on LAN networks as they are inexpensive
and easy to install.
Figure 15 - Star
•
•
Advantages:
•
Easy to troubleshoot, set up, and modify.
•
Only those nodes are affected, that has failed. Other nodes still work.
•
Fast performance with few nodes and very low network traffic.
•
In Star topology, addition, deletion, and moving of the devices are
easy.
Disadvatages:
•
If the hub or concentrator fails, attached nodes are disabled.
•
Cost of installation of star topology is costly.
•
Heavy network traffic can sometimes slow the bus considerably.
•
Performance depends on the hub’s capacity
•
A damaged cable or lack of proper termination may bring the network
down.
Bus topology:
 Bus topology uses a single cable which connects all the included nodes.
The main cable acts as a spine for the entire network. One of the
computers in the network acts as the computer server. When it has two
endpoints, it is known as a linear bus topology.
Figure 16 - Bus
•
•
Advantages:
•
Cost of the cable is very less as compared to other topology, so it is
widely used to build small networks.
•
Famous for LAN network because they are inexpensive and easy to
install.
•
It is widely used when a network installation is small, simple, or
temporary.
•
It is one of the passive topologies. So computers on the bus only listen
for data being sent, that are not responsible for moving the data from
one computer to others.
Disadvatages:
•
In case if the common cable fails, then the entire system will crash
down.
•
When network traffic is heavy, it develops collisions in the network.
•
Whenever network traffic is heavy, or nodes are too many, the
performance time of the network significantly decreases.
•
Cables are always of a limited length.
Ring topology:
• In a ring network, every device has exactly two neighboring devices for
communication purpose. It is called a ring topology as its formation is like
a ring. In this topology, every computer is connected to another computer.
Here, the last node is combined with a first one.
•
This topology uses token to pass the information from one computer to
another. In this topology, all the messages travel through a ring in the
same direction.
Figure 17 - Ring
•
•
Advantages:
•
Easy to install and reconfigure.
•
Adding or deleting a device in-ring topology needs you to move only
two connections.
•
The troubleshooting process is difficult in a ring topology.
•
Failure of one computer can disturb the whole network.
•
Offers equal access to all the computers of the networks.
•
Faster error checking and acknowledgment.
Disadvatages:
•
Unidirectional traffic.
•
Break in a single ring can risk the breaking of the entire network 
Modern days high-speed LANs made this topology less popular.
•
In the ring, topology signals are circulating at all times, which
develops unwanted power consumption.
•
It is very difficult to troubleshoot the ring network.
•
Adding or removing the computers can disturb the network activity.
Tree topology:
 Tree topologies have a root node, and all other nodes are connected which
form a hierarchy. So it is also known as hierarchical topology. This
topology integrates various star topologies together in a single bus, so it is
known as a Star Bus topology. Tree topology is a very common network
which is similar to a bus and star topology.
Figure 18 - Tree
•
•
Advantages:
•
Failure of one node never affects the rest of the network.
•
Node expansion is fast and easy.
•
Detection of error is an easy process.
•
It is easy to manage and maintain.
Disadvatages:
•
It is heavily cabled topology.
•
If more nodes are added, then its maintenance is difficult.
•
If the hub or concentrator fails, attached nodes are also disabled.
Hybrid topology:
•
Hybrid topology combines two or more topologies. You can see in the
above architecture in such a manner that the resulting network does not
exhibit one of the standard topologies.
•
For example, as you can see in the above image that in an office in one
department, Star and P2P topology is used. A hybrid topology is always
produced when two different basic network topologies are connected.
Figure 19 - Hybrid Topology
•
•
Advantages:
•
Offers the easiest method for error detecting and troubleshooting.
•
Highly effective and flexible networking topology.
•
It is scalable so you can increase your network size.
Disadvatages:
•
The design of hybrid topology is complex.
•
It is one of the costliest processes.
2. Network Communication:
2.1 Definition:
•
A communication network is the pattern of directions in which
information flows in the organization. Channels of communication
(networks by which information flows) are either formal networks or
informal networks. Formal networks follow the authority chain and are
limited to task-related communications. The informal network
(grapevine) is free to move in any direction, skip authority levels, and is
as likely to satisfy group members' social needs as it is to facilitate task
accomplishments.
•
the act of substituting one thing for another; substitution; exchange. the
changing of a prison sentence or other penalty to another less severe.the
act of commuting, as to and from a place of work.the substitution of
one kind of payment for another.Electricity. the act or process of
commutating.Also called commutation test .Linguistics. the technique,
especially in phonological analysis, of substituting one linguistic item
for another while keeping the surrounding elements constant, used as a
means of determining the constituent units in a sequence and their
contrasts with other units.
2.2 The rules in the network communication:
•
Protocols are required for effective communication and include:
•
An identified sender
and receiver o
Common language
and grammar o
Speed and timing of
delivery
•
•
Confirmation or
acknowledgment
requirements
The protocols used in network communications also define:
•
Message encoding o
Message formatting
and encapsulation o
Message size o
Message timing o
Message delivery
options
The rules
message encoding:
•
•
Decoding reverses this process in order to interpret the information.
•
Encoding between hosts must be in an appropriate format for the medium.
•
Messages sent across the network are first converted into bits by the sending
host.
•
Each bit is encoded into a pattern of sounds, light waves, or electrical
impulses depending on the network media over which the bits are
transmitted.
•
The destination host receives and decodes the signals in order to interpret the
message.
The rules message formatting and encapsulation:
•
Putting the letter into the addressed envelope.
•
Each computer message is encapsulated in a specific format, called a frame,
before it is sent over the network.
•
There is an agreed fomat for letters and addressing letters which is required
for proper delivery. - A frame acts like an envelope providing destination
address and source address
The rules message size:
•
Humans break long messages into smaller parts or sentences.
•
Long messages must also be broken into smaller pieces to travel acreoss a
network.
•
•
Each piece is sent in a separate frame.
•
Each frame has its own addressing information.
•
A receiving host will reconstruct multiple frames into the original message
The rules message timing:
•
•
•
Access Method: that rule which determines when someone is able to send a
message.
•
Flow Control: Another timing rule which affects how much information can
be sent the speed that it can be delivered is Flow Control.
•
Response Timeout: If person A asks a question from person 8 and he does not
hear a response within an acceptable time frame.
The rules message delivery options:
•
Messages are delivered via different methods. Sometimes, it may be needful
to send information to a single person. This o referred to as one to one
delivery and is called unicast which implies that there is only one destination
jungle destination) for the message being sent.
•
It may be needful to communicate information to more than one person
perhaps a group of people (at the same time). This is referred to as one to
many and is called multicast which implies that one sender to multiple
destinations/ recipientsf or the same message being sent. Others times my
warrant the information to be communicated to every person in the same area.
This is referred to as one-to-all and is called broadcast which implies that one
sender sends a message to all connected recipients.
Network Bandwidth:
3.1 Definition:
- The term bandwidth has a number of technical meanings but since the
popularization of the internet, it has generally referred to the volume of
information per unit of time that a transmission medium (like an internet
connection) can handle.
Figure 20 - Network Bandwidth
•
An internet connection with a larger bandwidth can move a set amount of data
(say, a video file) much faster than an internet connection with a lower
bandwidth.
•
Bandwidth is typically expressed in bits per second, like 60 Mbps or 60 Mb/s,
to explain a data transfer rate of 60 million bits (megabits) every second.
3.2 Why bandwidth requirement is needed for networks:
•
A higher bandwidth allows you to use to upload and download larger amounts
of data to your site. Faster data transmission speed. A higher bandwidth
results in faster transfer speeds results in no frustration and greater customer
satisfaction.
•
As technology is developing day by day. Users Demand for high speed
internet, so to provide the highest data speed, higher bandwidth is required.
•
Bandwidth availability plays an important role when using VoIP or WebRTC
services. If you do not have enough bandwidth or available bandwidth when
making calls, you might experience voice quality problems that could result in
choppy voice, unexpected issues, and a poor user experience.
•
Bandwidth is highly significant for determining how quickly a web page
loads on a browser. The reason bandwidth is so important for determining
how fast a web page loads is because it is the measurement of how fast the
computer downloads data and determines the speed of the connection between
the internet and the computer. Downloading web pages from the internet is
one of the fastest ways to transfer data from a computer to the internet.
Bandwidth is important to companies that use social media to interact with
their clients. A computer system uses bandwidth when it sends a request to
the server that contains the application software, data, and other information.
P3 Discuss the operating principles of networking devices and server
types:
•
Networking devices:
1.1 Switches:
Definition:
Figure 21 - Switches
•
A switch is a multiport bridge with a buffer and a design that can boost is
efficiency(a large number of ports imply less traffic) and performance. A
switch is a data link layer device .The switch can perform error checking
before forwarding data, which makes it very efficient as it does not forward
packets that have errors and forward good packets selectively to the correct
•
port only .In other words, the switch divides the collision doinaio of hosts, but
broadcast domain remains the same.
The operating principles in a network:
•
A network switch is a multiport network bridge that uses MAC addresses to
forward data at the data link layer (layer 2) of the OSI model. Some switches
can also forward data at the network layer (layer 3) by additionally
incorporating routing functionality. Such switches are commonly known as
layer-3 switches or multilayer switches.
1.2 Routers:
Definition:
Figure 22 - Routers
- A router is a device like a switch that routes data packets based on their IP
addresses. The router is mainly a Network Layer device. Routers normally
connect LANs and WANs together and have a dynamically updating routing
table based on which they make decisions on routing the data packets. Router
divide broadcast domains of hosts connected through it.
•
The operating principles in a network:
- Routers work at the network layer (layer 3) of the Open Systems
Interconnection (OSI) reference model for networking to move packets
between networks using their logical addresses (which, in the case of TCP/IP,
are the IP addresses of destination hosts on the network) .Because routers
operate at a higher OSI level than bridges do, they have better packet-routing
and filtering capabilities and greater processing power, which results in
routers costing more than bridges.
1.3 Gateways:
•
Definition:
Figure 22 - Gateways
- A gateway, as the name suggests, is a passage to connect two networks together
that may work upon different networking models. They basically work as the
messenger agents that take data from one system, interpret it, and transfer it to
another system. Gateways are also called protocol converters and can operate
at any network layer. Gateways are generally more complex than switches or
routers. Gateway is also called a protocol converter.
•
•
The operating principles in a network:
•
A network gateway provides interoperability between networks and contains
devices, such as protocol translators, impedance matchers, rate converters,
fault isolators, or signal translators. A network gateway requires the
establishment of mutually acceptable administrative procedures between the
networks using the gateway. Network gateways, known as protocol
translation gateways or mapping gateways, can perform protocol conversions
to connect networks with different network protocol technologies.
•
and other network parameters to client devices. It relies on the standard
protocol known as Dynamic Host Configuration Protocol or DHCP to respond
to broadcast queries by clients.
Mail servers:
•
A mail server is the computerized equivalent of your friendly neighborhood
mailman. Every email that is sent passes through a series of mail servers
along its way to its intended recipient. Although it may seem like a message is
sent instantly – zipping from one PC to another in the blink of an eye – the
reality is that a complex series of transfers takes place. Without this series of
mail servers, you would only be able to send emails to people whose email
address domains matched your own – i.e., you could only send messages from
one example.com account to another example.com account.
•
•
Wed servers:
•
Web servers are software or hardware (or both together) that stores and
delivers content to a web browser at a basic level. The servers communicate
with browsers using Hypertext Transfer Protocol (HTTP). Web servers can
also support SMTP (Simple Mail Transfer Protocol) and FTP (File Transfer
Protocol).
•
Web servers are also used for hosting websites and data for web applications.
They can host single websites and multiple websites using virtualization.
Database servers:
•
A database server is a machine running database software dedicated to
providing database services. It is a crucial component in the client-server
computing environment where it provides business-critical information
requested by the client systems.
Figure 23 - Client Applications
P4 Discuss the inter-dependence of workstation hardware with relevant
networking software:
•
Introduction to interdependence network :
•
The study of interdependent networks is a subfield of network science dealing
with phenomena caused by the interactions between complex networks.
Though there may be a wide variety of interactions between networks,
dependency focuses on the scenario in which the nodes in one network
require support from nodes in another network. For an example of
infrastructure dependency see Fig.
o Example:
•
Infrastructure networks. The network of power stations depends on
instructions from the communications network which require power
themselves.[Another example is the interdependence between electric and
natural gas systems.
•
Transportation networks. The networks of airports and seaports are
interdependent in that in a given city, the ability of that city's airport to
function is dependent upon resources obtained from the seaport or vice versa.
•
Physiological networks. The nervous and cardiovascular system are each
composed of many connected parts which can be represented as a network. In
order to function, they require connectivity within their own network as well
as resources available only from the other network.
•
Economic/financial networks. Availability of credit from the banking network
and economic production by the network of commercial firms are
interdependent. In October 2012, a bipartite network model of banks and bank
assets was used to examine failure propagation in the economy at large.
•
•
Protein networks. A biological process regulated by a number of proteins is
often represented as a network. Since the same proteins participate in different
processes, the networks are interdependent.
•
Ecological networks. Food webs constructed from species which depend on
one another are interdependent when the same species participates in different
webs.
•
Climate networks. Spatial measurements of different climatological variables
define a network.
The networks defined by different sets of variables are interdependent.
Workstation hardware:
•
Definition:
- A workstation (workstation) is a computer that is used by an individual or
business to run scientific and technical applications. It has more powerful
configuration, runs faster and more features than an ordinary computer.
The peculiarity of workstations is that they are connected to each other
through a network and serve many users at the same time. Workstations
are built with outstanding components, mainly CPU, graphics, memory
and multitasking capabilities. It is optimized to handle complex data such
as drawings, math formulas, simulations .Workstations are commonly
used in the fields of mechanical engineering, graphics, architecture,
construction, and filmmaking. 3D, audio processing, image editing.
•
Example:
•
Network Card :
•
Cabling:
•
System bus:
•
Memory:
•
Processor:
Figure 25 - Processor
I/O devices
•
Networking Software:
•
Definition:
•
•
Networking software is a foundational element for any network. It helps
administrators deploy, manage, and monitor a network. Traditional
networks are made up of specialized hardware, such as routers and
switches, that bundle the networking software into the solution. Softwaredefined networking (SDN) separates that software from the hardware,
making it easier to innovate and adapt the network to quickly meet
changing network demands. The separation of functions from hardware,
such as firewalls or load balancing, is called network functions
virtualization (NFV).
Example:
•
Some of the more popular examples of networking software include Logic
Monitor, Datadog, Vallum Halo Manager and ConnectWise, among others.
As always, it is recommended that you take the time to explore all the
various options available and consult customer reviews before deciding on
a particular product.
REFERENCES
1/ Notes, S., Fundamentals, N., Notes, S. and Fundamentals, N., 2022. Part 1 - Introduction to
Networking - Network Direction. [online] Network Direction. Available at:
<https://networkdirection.net/study-notes/network- fundamentals/introduction-to-networking/>
[Accessed 25 April 2022].
2/En.wikipedia.org. 2022. OSI model - Wikipedia. [online] Available at:
<https://en.wikipedia.org/wiki/OSI_model> [Accessed 25 April 2022].
3/ Services, P., 2022. What is a LAN? Local Area Network. [online] Cisco. Available at:
<https://www.cisco.com/c/en_in/products/switches/what HYPERLINK
"http://www.cisco.com/c/en_in/products/switches/what-is-a-lan-local-area-network.html"HYPERLINK "http://www.cisco.com/c/en_in/products/switches/what-is-a-lan-local-areanetwork.html"is HYPERLINK "http://www.cisco.com/c/en_in/products/switches/what-is-a-lanlocal-area-network.html"- HYPERLINK "http://www.cisco.com/c/en_in/products/switches/whatis-a-lan-local-area-network.html"a HYPERLINK
"http://www.cisco.com/c/en_in/products/switches/what-is-a-lan-local-area-network.html"HYPERLINK "http://www.cisco.com/c/en_in/products/switches/what-is-a-lan-local-areanetwork.html"lan HYPERLINK "http://www.cisco.com/c/en_in/products/switches/what-is-a-lanlocal-area-network.html"- HYPERLINK "http://www.cisco.com/c/en_in/products/switches/whatis-a-lan-local-area-network.html"local HYPERLINK
"http://www.cisco.com/c/en_in/products/switches/what-is-a-lan-local-area-network.html"HYPERLINK "http://www.cisco.com/c/en_in/products/switches/what-is-a-lan-local-areanetwork.html"area HYPERLINK "http://www.cisco.com/c/en_in/products/switches/what-is-a-lanlocal-area-network.html"- HYPERLINK "http://www.cisco.com/c/en_in/products/switches/whatis-a-lan-local-area-network.html"network.html HYPERLINK
"http://www.cisco.com/c/en_in/products/switches/what-is-a-lan-local-area-network.html">
HYPERLINK "http://www.cisco.com/c/en_in/products/switches/what-is-a-lan-local-areanetwork.html" [Accessed 25 April 2022].
4/ Flylib.com. 2022. LAN Characteristics | Local Area Networking. [online] Available at:
<https://flylib.com/books/en/2.566.1/lan_characteristics.html> [Accessed 25 April 2022].
5/ 2022. [online] Available at: <https://www.invialgo.com/2012/characteristics HYPERLINK
"http://www.invialgo.com/2012/characteristics-of-wan/"- HYPERLINK
"http://www.invialgo.com/2012/characteristics-of-wan/"of HYPERLINK
"http://www.invialgo.com/2012/characteristics-of-wan/"- HYPERLINK
"http://www.invialgo.com/2012/characteristics-of-wan/"wan/ HYPERLINK
"http://www.invialgo.com/2012/characteristics-of-wan/"> [Accessed 25 April 2022].
6/ Purple. 2022. The Advantages and Disadvantages of WANs | Purple. [online] Available at:
<https://purple.ai/blogs/advantages-disadvantages-wans/> [Accessed 25 April 2022].
7/ (MAN), A., Rehman, J. and Rehman, J., 2022. Advantages and disadvantages of metropolitan
area network (MAN).
[online] IT Release. Available at: <https://www.itrelease.com/2018/09/advantages HYPERLINK
"http://www.itrelease.com/2018/09/advantages-and-disadvantages-of-"- HYPERLINK
"http://www.itrelease.com/2018/09/advantages-and-disadvantages-of-"and HYPERLINK
"http://www.itrelease.com/2018/09/advantages-and-disadvantages-of-"- HYPERLINK
"http://www.itrelease.com/2018/09/advantages-and-disadvantages-of-"disadvantages
HYPERLINK "http://www.itrelease.com/2018/09/advantages-and-disadvantages-of-"- HYPERLINK
"http://www.itrelease.com/2018/09/advantages-and-disadvantages-of-"of HYPERLINK
"http://www.itrelease.com/2018/09/advantages-and-disadvantages-of-"- metropolitan-areanetwork-man/> [Accessed 25 April 2022].
8/ 2022. [online] Available at: <https://www.cloudflare.com/lear HYPERLINK
"http://www.cloudflare.com/learning/network-layer/what-is-a-protocol/"ning/network
HYPERLINK "http://www.cloudflare.com/learning/network-layer/what-is-a-protocol/"- HYPERLINK
"http://www.cloudflare.com/learning/network-layer/what-is-a-protocol/"layer/what HYPERLINK
"http://www.cloudflare.com/learning/network-layer/what-is-a-protocol/"- HYPERLINK
"http://www.cloudflare.com/learning/network-layer/what-is-a-protocol/"is HYPERLINK
"http://www.cloudflare.com/learning/network-layer/what-is-a-protocol/"- HYPERLINK
"http://www.cloudflare.com/learning/network-layer/what-is-a-protocol/"a HYPERLINK
"http://www.cloudflare.com/learning/network-layer/what-is-a-protocol/"- HYPERLINK
"http://www.cloudflare.com/learning/network-layer/what-is-a-protocol/"protocol/ HYPERLINK
"http://www.cloudflare.com/learning/network-layer/what-is-a-protocol/"> [Accessed 25 April
2022].
9/ Protocols, T., 2022. Types of Networking Protocols | Top Four Major Protocols of Networking.
[online] EDUCBA. Available at: <https://www.educba.com/types HYPERLINK
"http://www.educba.com/types-of-networking-protocols/"- HYPERLINK
"http://www.educba.com/types-of-networking-protocols/"of HYPERLINK
"http://www.educba.com/types-of-networking-protocols/"- HYPERLINK
"http://www.educba.com/types-of-networking-protocols/"networking HYPERLINK
"http://www.educba.com/types-of-networking-protocols/"- HYPERLINK
"http://www.educba.com/types-of-networking-protocols/"protocols/ HYPERLINK
"http://www.educba.com/types-of-networking-protocols/"> [Accessed 25 April 2022].
10/ 2022. [online] Available at: <https://www.examcollection.com/certification HYPERLINK
"http://www.examcollection.com/certification-training/a-plus-network-ports-"- HYPERLINK
"http://www.examcollection.com/certification-training/a-plus-network-ports-"training/a
HYPERLINK "http://www.examcollection.com/certification-training/a-plus-network-ports-"HYPERLINK "http://www.examcollection.com/certification-training/a-plus-network-ports-"plus
HYPERLINK "http://www.examcollection.com/certification-training/a-plus-network-ports-"HYPERLINK "http://www.examcollection.com/certification-training/a-plus-network-ports"network HYPERLINK "http://www.examcollection.com/certification-training/a-plus-network-
ports-"- HYPERLINK "http://www.examcollection.com/certification-training/a-plus-network-ports"ports HYPERLINK "http://www.examcollection.com/certification-training/a-plus-network-ports-"protocols-purposes.html '> [Accessed 25 April 2022].
11/ GeeksforGeeks. 2022. 14 Most Common Network Protocols And Their Vulnerabilities GeeksforGeeks. [online] Available at: <https://www.geeksforgeeks.org/14 HYPERLINK
"http://www.geeksforgeeks.org/14-most-common-network-protocols-and-their-vulnerabilities/"HYPERLINK "http://www.geeksforgeeks.org/14-most-common-network-protocols-and-theirvulnerabilities/"most HYPERLINK "http://www.geeksforgeeks.org/14-most-common-networkprotocols-and-their-vulnerabilities/"- HYPERLINK "http://www.geeksforgeeks.org/14-mostcommon-network-protocols-and-their-vulnerabilities/"common HYPERLINK
"http://www.geeksforgeeks.org/14-most-common-network-protocols-and-their-vulnerabilities/"HYPERLINK "http://www.geeksforgeeks.org/14-most-common-network-protocols-and-theirvulnerabilities/"network HYPERLINK "http://www.geeksforgeeks.org/14-most-common-networkprotocols-and-their-vulnerabilities/"- HYPERLINK "http://www.geeksforgeeks.org/14-mostcommon-network-protocols-and-their-vulnerabilities/"protocols HYPERLINK
"http://www.geeksforgeeks.org/14-most-common-network-protocols-and-their-vulnerabilities/"HYPERLINK "http://www.geeksforgeeks.org/14-most-common-network-protocols-and-theirvulnerabilities/"and HYPERLINK "http://www.geeksforgeeks.org/14-most-common-networkprotocols-and-their-vulnerabilities/"- HYPERLINK "http://www.geeksforgeeks.org/14-mostcommon-network-protocols-and-their-vulnerabilities/"their HYPERLINK
"http://www.geeksforgeeks.org/14-most-common-network-protocols-and-their-vulnerabilities/"HYPERLINK "http://www.geeksforgeeks.org/14-most-common-network-protocols-and-theirvulnerabilities/"vulnera HYPERLINK "http://www.geeksforgeeks.org/14-most-common-networkprotocols-and-their-vulnerabilities/"bilities/ HYPERLINK "http://www.geeksforgeeks.org/14-mostcommon-network-protocols-and-their-vulnerabilities/"> [Accessed 25 April 2022].
12/ Tutorialspoint.com. 2022. Network Standardization. [online] Available at:
<https://www.tutorialspoint.com/Network HYPERLINK "http://www.tutorialspoint.com/NetworkStandardization"- HYPERLINK "http://www.tutorialspoint.com/NetworkStandardization"Standardization HYPERLINK "http://www.tutorialspoint.com/NetworkStandardization"> [Accessed 25 April 2022].
13/ Heavy.ai. 2022. What is Network Topology? Definition and FAQs | HEAVY.AI. [online] Available
at:
<https://www.heavy.ai/technical HYPERLINK "http://www.heavy.ai/technical-glossary/networktopology"- HYPERLINK "http://www.heavy.ai/technical-glossary/networktopology"glossary/network HYPERLINK "http://www.heavy.ai/technical-glossary/networktopology"- HYPERLINK "http://www.heavy.ai/technical-glossary/network-topology"topology
HYPERLINK "http://www.heavy.ai/technical-glossary/network-topology"> [Accessed 25 April
2022].
14/2022. [online] Available at: <https://www.learn2.com/team HYPERLINK
"http://www.learn2.com/team-building-"- HYPERLINK "http://www.learn2.com/team-building"building HYPERLINK "http://www.learn2.com/team-building-"organizations/#:~:text=The%20common%20goal%20gets%20placed,to%20fulfill%20the%20comp
any's%20vision.> [Accessed 25 April 2022].
15/Google.com. 2022. Vallum Halo Manager - Google Search. [online] Available at:
<https://www.google.com/search?tbm=isch HYPERLINK
"http://www.google.com/search?tbm=isch&q=Vallum%2BHalo%2BManager%2B&imgrc=65Rclre
UXNddQM"& HYPERLINK
"http://www.google.com/search?tbm=isch&q=Vallum%2BHalo%2BManager%2B&imgrc=65Rclre
UXNddQM"q=Vallum+Halo+Manager+#imgrc=65RclreUXNddQM HYPERLINK
"http://www.google.com/search?tbm=isch&q=Vallum%2BHalo%2BManager%2B&imgrc=65Rclre
UXNddQM"> HYPERLINK
"http://www.google.com/search?tbm=isch&q=Vallum%2BHalo%2BManager%2B&imgrc=65Rclre
UXNddQM" HYPERLINK
"http://www.google.com/search?tbm=isch&q=Vallum%2BHalo%2BManager%2B&imgrc=65Rclre
UXNddQM"[Accessed 25
April 2022].
Download