ASSIGNMENT 1 FRONT SHEET Qualification BTEC Level 5 HND Diploma in Computing Unit number and title Unit 2: Networking Infrastructure Submission date Date Received 1st submission Re-submission Date Date Received 2nd submission Student Name Student ID Class Assessor name Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice002E Student’s signature Grading grid P1 P2 P3 P4 M1 M2 D1 Summative Feedback: Resubmission Feedback: 2.1 Grade: Lecturer Signature: Assessor Signature: Date: Contents Introduction.......................................................................................................................................................................... 1 P1 Discuss the benefits and constraints of different network types and standards .............................. 2 1. Type of networks...................................................................................................................................................... 2 1.1. LAN....................................................................................................................................................................... 2 1.2. MAN...................................................................................................................................................................... 3 1.3. WAN...................................................................................................................................................................... 4 2. Protocols:................................................................................................................................................................ 5 Network standards:.................................................................................................................................................. 5 Networking Standards Organizations: Around the world, to set standards for the Internet, many organizations have emerged................................................................................................................... 9 P2 Explain the impact of network topology, communication and bandwidth requirements. ..............9 1. Network Topology.................................................................................................................................................... 9 2. Communication and bandwidth requirements:......................................................................................... 17 P3. Discuss the operating principles of networking devices and server types. .................................... 18 1. Network devices.................................................................................................................................................... 18 2. Server types............................................................................................................................................................ 21 P4. Discuss the inter-dependence of workstation hardware with relevant networking software . 24 1. Workstation hardware......................................................................................................................................... 24 2. Networking Software............................................................................................................................................ 25 3. Interdependence between workstation hardware and networking software ................................ 25 Conclusion......................................................................................................................................................................... 26 Reference list................................................................................................................................................................... 27 Table of Figure Figure 1: Local area network Figure 2: MAN Figure 3: WAN Figure 4: Protocols Figure 5: TCP/IP Figure 6: 7 layers of OSI (https://www.bmc.com/blogs/osi-model-7-layers/) Figure 7: URL of a web Figure 8: DNS Figure 9: Physical topology Figure 10: Bus topology Figure 11: Ring topology Figure 12: Start topology Figure 13: Tree topology Figure 14: Mesh topology (Singh and Ramola, 2014). Figure 15: Star-Ring topology (Hybrid) Figure 16: (a) is Simplex, (b) is Half-duplex, (c) is Full-duplex Figure 17: Bandwidth Figure 18: Repeater Figure 19: Operating principles of a Hub Figure 20: Switch Figure 21: MAC address and Port Figure 22: 3 layers of Router in the OSI Figure 23: Gateway Figure 24: Web Server Figure 25: Operating principles of Email Server Figure 26: DNS server and operating principles Figure 27: DHCP Server and operating principles Figure 28: Workstation Figure 29: Illustration of networking software 4.1 List of Table Table 1: Advantage and disadvantage of TCP/IP Table 2: Compare Physical topology and Logical topology Table 3: Advantages and Disadvantages of Bus Table 4: Advantages and Disadvantages of Ring Table 5: Advantages and Disadvantages of Star Table 6: Advantages and Disadvantages of Tree Table 7: Advantages and Disadvantages of Mesh Table 8: Table: Advantages and Disadvantages of Hybrid 5.1 Introduction Currently, the network is a common utility in life. It has a long history of development with diverse models and complex modes of operation. In this assignment, the benefits and limitations of network types will be discussed, the concepts of network types, protocols, and network standards will also be introduced and analyzed. The impact of network topology will be explained in the next section. Here, the concepts, how the network topology works is the main issue, in addition, communication and bandwidth are also explored. Part three, the operating principles of network equipment and servers is an important issue. Common network devices and some types of Server will be introduced to the concept and how it works. The last part will be discussed with the main issue being the interdependence of workstation hardware with network software. They will be introduced and analyze the dependence of these two factors. 1 P1 Discuss the benefits and constraints of different network types and standards Currently, the network has grown and popularized globally. It is estimated that there are about 5 billion people using it, which is a huge number. It shows the benefits of networking, we have many devices that can connect to the network: PC, laptop, mobile phone, etc. These are called terminals or servers (Kurose and Ross, 2017). 1. Type of networks. We have a lot of different networks and network standards, I will analyze each of them. 1.1. LAN. A local area network (LAN) is a network with a relatively small area of coverage. It is usually contained within a physical space such as a writing lab, school, or structure. Servers and workstations are two types of computers that are connected to the internet. Servers are typically not used by humans directly, but instead run in the background to provide "services" to other computers (and their users) on the network. Workstations are so named because they are frequently used by users to interact with the network. A workstation was once thought to be a desktop computer that included a computer, keyboard, monitor, and mouse (Winkelman,2013). Figure 1: Local area network The nature of a LAN is determined by three factors: Topology: Includes Bus, Tree, Ring, Start, etc. Medium Access control (MAC): MAC depends on 2 key parameters, they are Where and How (Pavani, Chandrika and Krishna, 2012). Whether control is centralized or distributed is referred to as Where. The topology determines How, which is a trade-off between conflicting criteria such as cost, performance, and complexity. Transmission Media: Twisted pair, coax, and fiber optic are the most commonly used types today. Advantages: It has the basic benefits of sharing resources, sharing application software, increasing productivity (Pavani, Chandrika and Krishna, 2012). Resource sharing: With network peripherals such as computers, printers are shared with workstations with no hardware requirements. This helps businesses reduce costs and at the same time improve productivity at work. Standard computer hardware is used 2 for workstations as well as network servers. This gives you flexible, easy-to-maintain designs that are efficient. Common applications are in transit time for users to various environments. The benefit of this is lower costs than the possibility of independent licensing. The LAN system allows centralized data storage, providing the ability to share data from a single server system. LAN also helps us to support some fault tolerance features. It is this that has improved the reliability of users with LAN more. It also reduces downtime for businesses. The LAN system also provides users with a centralized security, allowing control access to their network systems and resources. Depending on user requirements, there are separate data protection policies. In addition, the cost of the low conductors also saves money. Disadvantages: The biggest disadvantage of this network is that the transmission line is short, can only operate in a certain area, cannot apply the range of kilometers or more. Privacy Violations: Each LAN user's personal data files are visible and accessible to the LAN administrator. In addition, he has access to the LAN user's computer and internet activity. Data Security Threat also is an important problem. Maintenance or repair is also very complicated because it requires an administrator of the LAN. 1.2. MAN As LAN networks are proving more and more effective, users require a network with greater network speed and range to overcome the disadvantages of LAN. MAN network has appeared, it is applied the advancement of fiber optic technology to improve transmission speed (Conti, Gregori and Lenzini, 1997). It’s is a combination of multiple LANs. The scope of a MAN can cover an entire province/city and the whole country. Alternatively, a large university or company can have such a large network that it can be classified as a MAN. And MAN networks often exist to provide connectivity for large corporations. Figure 2: MAN 3 Advantages: Service integration is the most prominent feature of MAN networks (Conti, Gregori and Lenzini, 1997). Low cost package transportation service is provided with many different types of traffic, as diverse as calls, videos, etc. The facilities are high enough and not too expensive to ensure the quality of the service. The ability to connect at high speeds is also a great aspect of this network. The speed can be up to 100-155 Mpbs and a large range of 100km, which can serve the direction, state administrative management, information exchange, provision of public administrative services, and commercial development. e-commerce, etc. Disadvantages: Having an average bandwidth to run applications, e-commerce services, applications in the banking system. The wide range of connectivity is also a difficulty of this network. The issue of information security is also difficult because of its large scope. Along with that is the high cost to build transmission facilities and facilities. Compared to LAN, the administration of MAN is also much more complicated because it is basically the aggregation of many LANs. 1.3. WAN Individual protocols were split into distinct, "traffic-based" networks in most multiprotocol network settings before to 1980. These networks are wasteful in terms of bandwidth use and inflexible in terms of their ability to be changed in response to changing end-system needs. The WAN was created to connect all of the networks, it is the premise of the Internet (Cole and Ramaswamy, 1999). The main protocol used in WAN is TCP/IP protocol. The connection line of the WAN network has a bandwidth that varies according to each installation location. For example, if installed in a particular area or in a country, the bandwidth of the transmission line varies greatly from 56Kbps to T1 with 1,544 Mbps or E1 with 2,048 Mbps, … and to Gigabit-Gbps, it is the backbone connecting countries or continents. Figure 3: WAN Advantages: Scope of connection: Can both connect into a private network and can create large connections, covering an entire country or globally, this is the biggest 4 advantage of WAN that other networks do not have, it helps the entire country to be linked together with the ability to transmit a very wide and unlimited connection signal. The ability to control user access of this network is also appreciated, IP is often used in this. Good security: it's what everyone wants. While this is not perfect, it is better than other networks. Easy and fast information sharing: We use the same "big system", with a large scale, information and knowledge are shared quickly and effectively. We can call it the common human brain. Disadvantages: Security: Wide area networks are more vulnerable to security threats than LANs and MANs. One of the most significant drawbacks of WANs is security, as various persons can access data from other machines. Viruses are a major contributor since they are simple to propagate and infect the user's device. High setup costs: Initially, setting up a WAN that covers a broad geographic region is costly. It might include the acquisition of routers, switches, and additional security software, among other things. Troubleshooting: A WAN spans such a vast geographical region, network troubleshooting is a challenging task. The majority of WAN wires are in the water, and if they are broken, the network would be disrupted. Repairing the underwater pipes will take a lot of effort. WAN maintenance: It is a full-time task that needs significant technical expertise on the part of network supervisors and technicians after it is set up. 2. Protocols: A set of standards for exchanging information between two computer systems or two computer devices is called a protocol. Protocols are the rules or standards that govern communication (Blank,2002). The main components of a protocol include: data format, encryption method. and signal levels. The main purpose of the protocol is to communicate between machines, in addition it has several functions such as: Encapsulation, Segmentation and Aggregation, Link Control, Monitoring, Flow Control, Error Control, Synchronize. Figure 4: Protocols Network standards: According to Hunt (1998), When computers communicate, a set of rules must be defined to govern their interactions. These set of rules are commonly known as protocols in data communication, they must be unified around the world. To solve that problem, standard protocols emerged (Hunt, 1998). 5 TCP/IP: Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of communication protocols that are used to link network devices on the internet. TCP/IP defines how data is exchanged over the internet by defining how packets are split up, addressed, sent, routed, received at the destination (Kurose and Ross, 2017). IP regulates how each packet is addressed and routed to ensure that it reaches its intended destination. A computer or other network device uses the subnet mask to determine which portion of an IP address represents the network and which part represents hosts or other computers on the network. Figure 5: TCP/IP Common TCP/IP protocols include: Hypertext Transfer Protocol (HTTP), HTTP Secure, Protocol. TCP/IP functionality is divided into four layers, each of which includes specific protocols: Application, Transport, network, and physical layers. Advantage It aids in the establishment of connections between computers, operates independently of the operating system, supports different routing protocols, has a highly scalable clientserver architecture, is small, and does not cause the network or computer to be overworked. Disadvantage It's difficult to set up and manage; the transport layer doesn't guarantee packet delivery; it's difficult to replace protocols in TCP/IP; it doesn't clearly separate service, interface, and protocol; it's not appropriate for describing new technology in new networks; and it's particularly vulnerable to synchronization attacks. Table 1: Advantage and disadvantage of TCP/IP 6 OSI: The network architecture in the OSI model is characterized as a hierarchy of independent layers comprising modules that execute specific functions. This translates to a set of guidelines that specify how network nodes must interact in order to communicate and share data. In today's sophisticated computer systems, the OSI model specifies the conventional connections between hardware and software (Burgess, 2004). This model has 7 layers: Application, presentation, session, transport, network control, data link, physical. Figure 6: 7 layers of OSI (https://www.bmc.com/blogs/osi-model-7-layers/) A Layer 2 device, for example, or a Layer 3 device, are terms used to describe network devices. The OSI layer on which the device functions are described below. In general, the higher up on the network layer a device works, the more complicated it is. HTTP: At the heart of the Web is the Hypertext Transfer Protocol (HTTP), the Web's application layer protocol (Kurose and Ross, 2017). These two programs are executed on different system terminals, communicating with each other by exchanging HTTP messages. The structure of these messages and how the client and server exchange messages are determined by HTTP. HTTP operates at layer 7 (Application) of the OSI model. A base HTML file and some referenced objects appear on most Web pages (Kurose and Ross, 2017). The URLs of the other items on the page are referenced in the basic HTML file. Each URL contains two parts: the hostname of the server hosting the item and the path name of the object. 7 Figure 7: URL of a web Advantage and benefit: HTTP Connection is Intermittent: HTTP Connection is Intermittent. The typical procedure for handling and responding to HTTP requests is as follows: the Client initiates the request, the Client disconnects from the Server to await a response, the Server processes the request, the Server reconnects to the Client and delivers the response. Independence is the second fundamental characteristic of HTTP. You can transfer any form of data via HTTP as long as the contents of the data are under the control of both the machine and the client. HTTP is stateless: The third property of HTTP is that it is connectionless. The server and client only know each other for the duration of the current request; they will quickly forget each other. Furthermore, both the client and the server may keep track of requests for web pages. Absolute security: The website's data is protected by encryption. Hackers cannot access and steal website data. This creates absolute safety and security for the website. DNS: A distributed database is the Domain Name System (DNS). This enables for local control of the segments of the overall database, but data in each segment is accessible across the network via a client server scheme (Liu, Albitz and Loukides, 1998). Like HTTP, DNS also operates at layer 7 (Application) of the OSI model. DNS functions as an "interpreter" and "communicator." DNS will translate the domain name into an IP address, which is made up of four sets of digits. When "translate," the browser will recognize you and you can log in. When users join in to a website, instead of having to memorize and type in a sequence of IP addresses, they may simply type in the website's name, which the browser will identify automatically. A unique IP address is assigned to each computer connected to the Internet. To begin a connection, this IP address is used to create a connection between the server and the client. When you visit a random website or send an email, DNS plays a critical role. Nobody will be able to recall every sequence of IP address in each login from the world's numerous websites. As a result, the notion of domain names was created, which allowed each website to be identified by a distinct name. 8 Figure 8: DNS Benefits: DNS helps users save a lot of time when accessing previously visited websites by remembering the domain names that have been "translated" and prioritizing use for next visits. Users may utilize DNS to access a variety of network services, including searching for information, viewing movies, playing games, and login onto websites. Without it, users would be unable to access the Internet as swiftly and simply as they can now. Networking Standards Organizations: Around the world, to set standards for the Internet, many organizations have emerged. ISO: The ISO (International Organization for Standardization), based in Geneva, Switzerland, is a collection of 157 nations' standards bodies. Their objective is to develop international technical standards that will allow for the free flow of information and trade throughout the world (StudyMoose,2016). ISOC: The Internet Society (ISOC) is a professional membership organization that assists in the development of internet technological standards. With the internet's fast expansion, they are concerned about maintaining accessibility, information security, and the stability of addressing services and open standards throughout the internet. They are made up of thousands of online workers and businesses from 90 chapters throughout the world (StudyMoose,2016). Network standards: ISO/IEC 23093-2 ISO/IEC 23093-3 ISO/IEC 23093 P2 Explain the impact of network topology, communication and bandwidth requirements. 1. Network Topology 9 The word “topology” in a communication network refers to the method in which the network's end points, or stations, are connected (Singh and Ramola, 2014). It has 2 types: Physical and Logical topology. Physical topology: The hardware connected with the system, such as workstations, remote terminals, servers, and the related wiring between assets, is referred to as Physical Network Topology. The physical topology of the systems determines how they are physically connected (Singh and Ramola, 2014). The shape of the cabling layout used to link devices is called the physical topology of the network. This refers to the layout of cabling, the locations of nodes, and the interconnections between the nodes and the cabling. Figure 9: Physical topology Logical topology: The depiction of data flow between nodes is important to logical network topology. The primary function of logical topology is to allow various systems to communicate across physical topologies (Singh and Ramola, 2014). Figure 9: Logical topology Shared media topology and token-based topology are the two types of logical topologies. 10 Physical topology Logical topology The network's physical configuration is depicted. The logistics of a network concerned with data transmission are depicted. The layout may be changed to suit your needs. There isn't any interfering manipulating going on here. It's possible to organize it in a star, ring, mesh, or bus topology. It may be found in both bus and ring topologies. Based on device selection and or This has a significant influence on data a significant packet delivery and speed. It also influence on network cost, and bandwidth capacity. scalability, controls data flow and ensures that data packets are delivered in a timely manner. availability, this has It is the transmission path in its true form. The network's physical link. It's a simplified depiction of data flow. The network's data route was followed. Table 2: Compare Physical topology and Logical topology 16.1 I will analyze some common network topologies: Bus: The sent message is carried over the cable via the bus topology. As the message arrives at each device (node), it is checked to determine if the message's destination address matches its own (Singh and Ramola, 2014). In this architecture, a single network cable runs throughout the building or campus, and all nodes are connected to it through two ends known as the bus. For the bus, all stations are connected to the linear transmission medium or bus via appropriate hardware interfaces called TAP (Pavani, Chandrika and Krishna, 2012). Full-duplex operation (sending and receiving between the station and the tap allows data to be transmitted onto the bus and retrieved from the bus. To eliminate reflection, there is a terminator at each end of the bus. Figure 10: Bus topology 11 Advantages Great reliability, easy to use and understand. The number of wires to connect is small, simple. Easy setup. A repeater can also be used to extend the bus configuration. Disadvantages This type of connection has a slow speed, especially when there is a problem on the cable line, the whole system immediately stops working. Moreover, when there is a problem, it is also difficult to find the error that causes network congestion when transferring large amounts of data. Table 3: Advantages and Disadvantages of Bus Ring: All messages go in the same way across a ring in a ring topology, and there is a direct point-to-point link between two nearby nodes (the Next and the Previous) (Singh and Ramola, 2014). These links are one-way, they ensure that a node's path will go through the entire ring and back to the node. Faulty nodes can be detached from the rest of the ring. When the workstation is turned on, it will automatically join the circle. It disconnects from the ring when turned off, allowing information to pass through the node. The token ring is the most frequent implementation of this topology. The entire network will be down by a single error in the ring. The individual nodes in the ring can be separated by themselves. Figure 11: Ring topology 12 Disadvantages Advantages When compared to other forms of networks, ring networks traverse greater distances. Ring networks provide performance for small may great groups of This type of network connection has the cost of network wiring and expensive intermediate equipment. The failure of a single workstations or for larger networks computer on a network can with similar workloads at station. have a significant impact on the entire network. each There is no signal loss in Ring topology, unlike Bus topology, In a ring network, finding bug is challenging. because The the tokens packets that are each node. are data re-generated at Ring networks are simple to expand. distance from the machine to the center is very limited (100 m). The ability to expand the network completely depends on the capacity of the center. Table 4: Advantages and Disadvantages of Ring Star: All components are connected by a central hub in a star topology. The host computer serves as the central hub in a Star architecture, with a node at the end of each connection. Data is sent through the hub by nodes to communicate throughout the network (Singh and Ramola, 2014). Each node is wired back to the hub, the two are next to each other but can be quite far from the server. The central hub makes all the routing decisions so that other workstations can simplify. This is a typical architecture for connecting terminals to a big timeshared host machine. Figure 12: Start topology 13 Advantages Disadvantages - If one machine fails, the rest will not be affected. - The hub can detect the faulty machine and isolate it. - Maintenance and new additions are not difficult and do not affect other machines. - Cables can be used by many different types in the same network, hub. - In addition, good performance is also a plus. - Because the machines must be connected to the center, the number of wires needed is very large. - Hub plays the most important role, if Hub fails, the whole machine can't connect. - Some star networks require a device at a central point to convert or replay network traffic. Table 5: Advantages and Disadvantages of Star Tree: The most popular topology is Tree topology, which is a LAN topology in which any two nodes on the network have just one path (Singh and Ramola, 2014). The tree topology is a structure similar to the star topology, however the nodes are connected to the secondary hub, only it is connected to the central hub. The bus and star topology can be called the foundation of the Tree because it is a collection of many Buses or Stars. In the Tree, Start is connected to the Mainline Bus backbone. - Figure 13: Tree topology 14 Advantages Disadvantages Setup and configuration of the network is simple. The installation of a second hub When the central hub fails, the entire network comes to standstill. a - expands the number of devices Because is that may be connected to the hub. When compared to mesh topology, it is less costly. It is possible to track down network errors. connected to the central hub, more cabling is necessary than in a bus architecture. each node Table 6: Advantages and Disadvantages of Tree Mesh: Every node in a well-connected topology is connected to every other node in the network. Many redundant links between network nodes connect devices (Singh and Ramola, 2014). Mesh topologies are utilized in crucial host computer connections. By employing more than one of the connection pathways available, alternate paths allow each computer to balance the load on other computer systems in the network. A fully linked mesh network has no (n-1) /2 physical channels to connect the n devices. Every device on the network must have (n-1) input/output ports to accommodate these (Singh and Ramola, 2014). Figure 14: Mesh topology (Singh and Ramola, 2014). 15 Advantages The network traffic can be routed Disadvantages The amount of cabling needed is to another node if the one fails. considerable. Fault isolation is simple with It is necessary to have a high point-to-point connections. number of I/O (input/output) As messages move through a designated lane, privacy between computers is preserved. It's a lot easier to figure out what's wrong with your network. ports. Table 7: Advantages and Disadvantages of Mesh Hybrid: A hybrid topology is a network configuration that combines two or more different network topologies. Bus topology, mesh topology, ring topology, star topology, and tree topology are examples of these topologies (Kurose and Ross, 2017). I would recommend the Star-Ring topology: A hybrid topology that combines star and ring topologies is known as a star-ring hybrid topology. A ring topology is used to link two or more stars topologies together. Figure 15: Star-Ring topology (Hybrid) 16 Advantages If a node fails in the midst of the Disadvantages High complexity due to the need network, it is conceivable that the to combine many topologies. damaged node will be disconnected from the remainder of the network and the network processing will be unaffected. Apply the advantages of many topologies. Easily expandable. High flexibility. Large construction costs. Table 8: Table: Advantages and Disadvantages of Hybrid 2. Communication and bandwidth requirements: Communication: The sending and receiving of data from sending and receiving sources using transmission protocols is referred to as communication. There are three basic types of communication: Simplex, Half-duplex, and full-duplex. Simplex is a one-way communication with all time intervals. Information can be transmitted from device A to device B at all times but B can only receive and cannot communicate back. Halfduplex is the basic form of 2-way communication, both devices can communicate with each other on a channel, but in a certain period of time, only one device will share information. Full-duplex is a form of communication on two different channels, both devices can send and receive information at any time (Alani, 2014). Figure 16: (a) is Simplex, (b) is Half-duplex, (c) is Full-duplex It has a few requirements: Sending device, this device initiates the transmission of data and information. Receiving device Accepts information or data transmitted to Communication device helps to connect the incoming communication channel to the receiving device. Communication equipment is responsible for connecting the sending 17 device to the communication channel. Communication channel that plays the main role as a means of transmitting information and data . Bandwidth: The ability of a wired or wireless network communication link to transport the most amount of data from one point to another via a network in a given period of time (maybe second) is known as bandwidth. The data transfer rate is described by bandwidth, which is synonymous with capacity. In general, it is the maximum possible rate of data transmission over a decent channel (Alani, 2014). Figure 17: Bandwidth Requirements: Local internet availability. Throughput. Expected average load. Anticipated peak load. Cost constraints. P3. Discuss the operating principles of networking devices and server types. I will discuss the working principle of network devices (Router, Switch, etc.) and servers (Web, email, DNS, etc.). 1. Network devices. Repeater: Network repeaters are tiny devices that accept electrical, wireless, and optical signals and retransmit them to locations where Ethernet and Wi-Fi data transmission are not possible (Burgess, 2004). Figure 18: Repeater 18 Operating principles of a Repeater: They copy, amplify, and recover the informationcarrying signal on the transmission line with the condition that the two parts of the network must be the same in terms of protocol and transmission. Hub: A hub is a compact, rectangular, low-cost device that connects many networked devices together. The goal of a hub is to create a single network segment where all devices may connect with one another directly (Burgess, 2004). Operating principles of a Hub: Machine A transmits data to Hub, which will distribute it to all machines in the network. Figure 19: Operating principles of a Hub Switch: A switch is a hardware device that filters and forwards network packets. It accepts and resends packets delivered by devices connected to its physical ports, but only through ports to devices to whom the project has packet access (Burgess, 2004). It doesn't like Hub, Switch only transfers data to specific port. Operating principles of a Switch: When a device is connected to a switch, the switch saves its media access control (MAC) address, which is a code injected into the device's network interface card (NIC) through an ethernet connection, Figure 20: Switch connected to the switch The MAC address is used by the switch to determine where the associated device's outgoing packets originate and where they are sent. When one device sends a packet to another, it goes into the switch, and the switch reads its headers to determine what to do. 19 Figure 21: MAC address and Port For example: A device A with a MAC of M1 when participating will be matched with the number M1 to enter the corresponding port, which is Port P1. Router: A router is a device which connects physical or virtual network device, analyzes, and forwards data packets between computer networks. A router looks at a data packet's destination IP address and utilizes headers and forwarding tables to figure out the best method to send the packets (Burgess, 2004). It works up to the 3rd layer of OSI: Physical, Data link and Network layer Operating principles of a router: The destination IP address of a packet's header is parsed by a router and compared to the routing table to determine the packet's next path. A collection of routing tables that describe how to send data to a given network destination. They use a set of criteria to determine the most efficient way to transmit traffic to a specific IP address. Figure 22: 3 layers of Router in the OSI Gateway: A gateway is a computer network node that serves as a critical stopover point for data on its way to or from other networks (gate). It can operate at all layer of OSI model (Kurose and Ross, 2017). Operating principles of a gateway: A gateway is simply a physical place where data stops being transported or read/used. It connects the terminal to the server. 20 Figure 23: Gateway 2. Server types A server is simply understood as a device that provides services to other users and computers. Web Server: Web server is a computer whose main function is to manage one or many webs, it has all the data of that web and is capable of reading many types of files. Web server is connected to all user's network, the size of Web server will depend on the website it is managing, it can include hardware and software or either (Yeager and McGrath, 1996). Figure 24: Web Server Operating principles: Its main role is to store and distribute data to users. Whenever a user needs a file stored on the server, that computer sends a request for that file via HTTP. When the request reaches the correct server, HTTP sends the requested document back through HTTP. 21 Email Server: Email Server is a server of email, it is used to send and receive mail. Businesses often use it to send and receive mail internally because of its high security and good performance. It also solves many other problems (Eads, 1999). Figure 25: Operating principles of Email Server Operating principles: Email Server has the right to manage the entire account of the system to perform the function of sending and distributing mail. The basic process is done through 4 steps: • Connect to SMTP server: Provide information to SMTP Server • Handling the recipient's domain: SMTP determines the recipient's domain (IP) and decides the next course of action. • Identify the recipient's IP: Find the recipient's IP. • Email transfer. 22 DNS Server: As we all know, each device has an IP address, to skip remembering the IP, we use the domain name. DNS Server has the function of translating domain names into IPs (Kurose and Ross, 2017). Figure 26: DNS server and operating principles Operating principles: There are 4 servers involved in the translation of a domain: • • • • Recursive DNS: a server that receives requests from clients via programs like web browsers. Root Name Servers: Resolves servers that are used as a pointer to more specific destinations. Nameservers TLD: Specifies the hostname. For example: assignment.com, the TLD is "com". Authoritative Name Server: This is the final step, it will return the IP to the requested (accessed) server. DHCP Server: The DHCP Server has the main function of assigning an IP address to each new connection joining the network, in addition, it also configures other network information automatically (Droms, 1993). Operating principles: DHCP Server uses a client and server model, when a client sends a join request, the server obtains an IP address from its repository and grants it to the client so that this client can communicate. 23 Figure 27: DHCP Server and operating principles P4. Discuss the inter-dependence of workstation hardware with relevant networking software First of all, I will explain the phrase "Interdependence". It means: There are 2 parts, both of these parts are important but they must work together to create a success, if one of them is missing, the process will fail. For example, I have 1 manufacturing company (B) and one company selling products (C). B produces and sells to C, which buys and sells products to the market. These two companies have a partnership. If they separate, B will not be able to sell products, C will have no products to sell. Only when they cooperate will they benefit, if they separate, they will be disadvantaged. It is interdependence. Workstation hardware and network software are also interdependent. I will introduce and analyze each part. 1. Workstation hardware A workstation is a computer designed for a larger use than a personal computer, which is like a combination of a personal computer and a server. RAM is a secondary storage device, it appears in all types of computers. The system will temporarily store information on it, information here can be transferred, saved or deleted. CPU is the processor, for the network, it has the function of input and output data, perform logic. Figure 28: Workstation 24 ROM is fixed memory, it remembers the stored and available data of the workstation. Acting as an interface at the TCP/IP layer, the NIC card can transmit signals at the physical layer and deliver data packets at the network layer. Regardless of which layer the network interface controller is located, it acts as a middleman between the computer/server and the data network. To develop workstations, these hardware must be supported by network software to make full use of them. Without network software, the hardware can only function in the workstation, which wastes resources. 2. Networking Software Network software is the basic foundation of any network, it's based on devices like routers, switches, etc. The basic function is data management, distribution, and data access. Figure 29: Illustration of networking software OS is a piece of software, it monitors all hardware and network activities of the computer. It is built as an automatic administrator, it is like a camera to monitor network activity, ensuring the security of the system. Web server and Client are a special link. Network software will play the role of communication between these two objects. For the Client, through the protocol, its data access request will be routed to the Web Server which will return access or data to the Client. This path must pass through many layers such as the physical layer. For network software to work and provide services to users, workstation hardware is a must-have device to process, transmit, and store data. 3. Interdependence between workstation hardware and networking software Workstation hardware and network software have been explained above. So how are they interdependent? - As for the workstation hardware, they cannot work independently, they must work under the supervision of the network software to give the next target. 25 For networking software, the data must be passed through the processors as well as stored to be transmitted to the correct destination address. For example, RAM will be the place where buffer memory is allocated to store information, data is about to be transferred, without it, the data will not have a storage location, if using ROM, it will waste resources, The CPU will help process and choose the path for information. On the other hand, the devices of the network software will do the job of helping the data to be delivered to the correct destination by means of a protocol. Conclusion In this assignment, four main parts have been clearly analyzed. In P1, network types (LAN, WAN, LAN) were introduced and pointed out their advantages and disadvantages, the protocol is also good if the concept, network standards such as TCP/IP or OSI is an important thing. already mentioned, in addition, standards organizations also appear. Physical and logical topologies are introduced and compared in P2. Here, protocol types such as Bus, Start, Ring, Mesh, Tree and Hybrid have been pointed out and clearly analyzed advantages and disadvantages for users and networks. Several types of communication are also introduced along with bandwidth. In the next section, Network devices (repeater, hub, switch, router, gateway) are clarified how they work and how they work. The same goes for Server types (Web, Email, DHCP, DNS Server). Finally, the workstation hardware and network software were introduced and the dependencies between them clarified. This assignment has clarified some basic and important issues in networking, they have been introduced, analyzed, evaluated and compared visually. 26 Reference list 1. Kurose, J. and Ross, K., 2017. Computer Networking: A Top-Down Approach. 7th ed. Pearson Education, Inc, p.23-130. 2. Winkelman, R., 2013. What is a network. [online] Fcit. Available at: <https://fcit.usf.edu/network/chap1/chap1.htm#LocalAreaNetwork> [Accessed 11 August 2021]. 3. Pavani, V., Chandrika, I. and Krishna, A., 2012. Local Area Network (LAN) Technologies. IJITEE, 1(6), pp.70-71. 4. Conti, M., Gregori, E. and Lenzini, L., 1997. 1st ed. Springer-Verlag London, p.1. 5. Cole, R. and Ramaswamy, R., 1999. Wide-Area Data Network Performance Engineering. 1st ed. Artech House, pp.1,2. 6. Hunt, C., 1998. TCP/IP Network Administration. 2nd ed. O'Reilly Media, p.5. 7. Liu, C., Albitz, P. and Loukides, M., 1998. DNS and BIND. 3rd ed. O'Reilly Media, p.82. 8. StudyMoose. (2016). Networking Standard Organizations. [Online]. Available at: https://studymoose.com/networking-standard-organizations-essay [Accessed: 15 Aug. 2021] 9. Singh, V. and Ramola, J., 2014. Computer Network Topology. International Journal for Research in Applied Science & Engineering Technology, 2(XI), pp.384-388. 10. Blank, A., 2002. TCP/IP JumpStart: Internet Protocol Basics. 2nd ed. Sybex, p.5. 11. Burgess, M., 2004. Principles of network and system administration. 2nd ed. Wiley, pp.12,46,50. 12. Alani, M., 2014. Guide to OSI and TCP/IP Models. Cham: Springer International Publishing, pp.2-3. 13. Yeager, N. and McGrath, R., 1996. Web Server Technology. Morgan Kaufmann, p.22. 14. Droms, R., 1993. Interoperation between DHCP and BOOTP. Request For Comments 1534, p.1. 15. Eads, B., 1999. Developing a High Assurance Multilevel Mail Server. Monterey, California. Naval Postgraduate School, pp.20-25. 27 Powered by TCPDF (www.tcpdf.org) Index of comments 2.1 General academic report structure is recognized Headings, paragraphs, subsections, and illustrations are ok. P1: Discuss the benefits and constraints of different network types and standards. You wrote the concept of computer network. You discussed the benefits and constraints of LAN, MAN, WAN. You introduced network standard including TCP/IP, OSI model. You listed networking organizations: ITU-T, IEEE, EIA. P2 Explain the impact of network topology, communication and bandwidth requirements. You presented the concept of network topology. You discussed network topology including Bus, Ring, Star, Tree, Mesh, and Hybrid. Your introduced communication and bandwidth requirements. P3: Discuss the operating principles of networking devices and server types. You described network devices: Hub, Switch, Router, Gateway. You mentioned different server types such as Web server, Email server, DNS server, FTP server. P4 Discuss the inter-dependence of workstation hardware with relevant networking software. You mentioned workstation hardware, networking software. You did discuss the interdependence of workstation hardware with networking software. M1 Compare common networking principles and how protocols enable the effectiveness of networked systems. You did not answer this learning outcome. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimisation. You did not respond to the criteria. D1 Considering a given scenario, identify the topology protocol selected for the efficient utilisation of a networking system. You did not write about these criteria. Recommendation: Many references come from Internet websites. References should come from books and scientific papers. Different fonts or font sizes were used. Conclusion: P1, P2, P3, P4 - Pass M1, M2 - Failed D1 - Failed Overall : Pass 4.1 Table of figures must include page numbers. 5.1 List of table must include page numbers. 16.1 Try to write in academic way. Powered by TCPDF (www.tcpdf.org)