You are on page 1of 40

ASSIGNMENT BRIEF 1 SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 2: Networking

Assignment title Networking Infrastructure

Academic Year

Unit Tutor Ho Hai Van

Issue date Submission date

IV name and date Khoa Canh Nguyen, Nhung, Michael Omar 9th/01/2020
Submission format

Part 1
The submission is in the form of an individual written report. This should be written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide a bibliography using the Harvard referencing system. The recommended word limit is 2,000–
2,500 words, although you will not be penalized for exceeding the total word limit.

Part 2
The submission is in the form of an individual evidence portfolio.

 A LAN design plan and blueprint and justification document.


 A fully completed test plan including an evaluation of results and recommendations for improvements to
LAN.
 A proposed and justified maintenance schedule.

Part 3
 Evidence of an implemented network.

You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work
must be supported with research and referenced using the Harvard referencing system.

Unit Learning Outcomes


LO1: Examine networking principles and their protocols.
LO 2: Explain networking devices and operations.

LO3: Design efficient networked systems.

LO4: Implement and diagnose networked systems.


Assignment Brief
You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution development company, which
have branches in Ho Chi Minh City, Hanoi, Da Nang and Can Tho.

The company has been contracted to implement a networking project from a local educational institute. The specification of the project
is given below:

People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the head of academics and the
programme manager, 3 computer network administrators.

Resources: 50 student lab computers, 35 staff computers, 3 printers


Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located on the first floor and
another located on the second floor

As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain networking principles, protocols and devices
and submit a report.

Part 1
You will need to produce a report that includes the following:

1. An introduction to provide an overview of your report.


2. Benefits and constraints of different types of networks and networking standards.
3. The impact of network topology, speed of communication and bandwidth requirements.

4. Effectiveness of networking systems.


5. Discussion on operating principles of networking devices and server types and networking software.
6. Discuss the relationship of workstation hardware with networking software.
7. Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance
optimization.
8. For the given specification, identify the topology protocol for the efficient utilization of a networking system.


The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification from the institution, as given
earlier.

You need to design and implement the networking project within a given timeframe:

Part 2 Design efficient networked systems


1. Prepare a written step-by-step plan of how you are going to design a Local Area Network including a blueprint of your LAN.
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per user specifications.
4. Justify the security requirements and quality of services needed for selection of accessories.
5. Suggest a maintenance schedule to support the networked system.

Part 3 Implement test and diagnose networked systems


1. Implement a networked system based on your prepared design.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device growth and the addition of communication devices.
5. Discuss the significance of upgrades and security requirements in your recommendations.

ASSESMENT CRITERIA
Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine networking principles and their protocols

P1 Discuss the benefits and constraints of M1 Compare common


different network types and standards. networking principles and how LO1 & 2
protocols enable the
P2 Explain the impact of network topology, effectiveness of networked D1 Considering a given scenario,
communication and bandwidth systems. identify the topology protocol
requirements. selected for the efficient
utilization of a networking
LO2 Explain networking devices and operations system.

P3 Discuss the operating principles of M2 Explore a range of server


networking devices and server types. types and justify the selection of a
server, considering a given
P4 Discuss the inter-dependence of scenario regarding cost and
workstation hardware with relevant performance optimisation.
networking software.
Contents

P1 Discuss the benefits and constraints of different network types and standards.................................................................................................................................7
1. The benefits and constraints of different network types............................................................................................................................................................ 7
1.1. LAN (Local Area Network)........................................................................................................................................................................................... 7
1.2. PAN (Personal Area Network)....................................................................................................................................................................................... 8
1.3. MAN (Metropolitan Area Network)............................................................................................................................................................................ 10
1.4. WAN (Wide Area Network)........................................................................................................................................................................................ 11
1.5. Internet Connectivity.................................................................................................................................................................................................... 14
2. Networking standards...............................................................................................................................................................................................................15
P2 Explain the impact of network topology, communication and bandwidth requirements................................................................................................................ 17
1. Client Server.............................................................................................................................................................................................................................17
2. Cloud........................................................................................................................................................................................................................................ 18
3. Virtualized................................................................................................................................................................................................................................ 19
4. Logical Topology ( Ethernet)................................................................................................................................................................................................... 20
5. Physical Topology....................................................................................................................................................................................................................21
6. IPv4.......................................................................................................................................................................................................................................... 23
7. IPv6.......................................................................................................................................................................................................................................... 24
8. FTP........................................................................................................................................................................................................................................... 25
9. HTTP........................................................................................................................................................................................................................................ 26
10. OSI Model.............................................................................................................................................................................................................................. 27
11. Layer 1 tp Layer 7.................................................................................................................................................................................................................. 27
P3 Discuss the operating principles of networking devices and server types.......................................................................................................................................28
1. Types of network equipment....................................................................................................................................................................................................28
1.1. Hub............................................................................................................................................................................................................................... 28
1.2. Switch........................................................................................................................................................................................................................... 29
1.3. Router........................................................................................................................................................................................................................... 30
1.4. Bridge........................................................................................................................................................................................................................... 31
1.5. Gateway........................................................................................................................................................................................................................ 32
1.6. Modem..........................................................................................................................................................................................................................33
2. Types of network server........................................................................................................................................................................................................... 34
2.1. Web server....................................................................................................................................................................................................................34
2.2. File server..................................................................................................................................................................................................................... 34
2.3. Database server.............................................................................................................................................................................................................35
2.4. DNS server................................................................................................................................................................................................................... 36
2.5. Mail server....................................................................................................................................................................................................................36
2.6. Virtual server................................................................................................................................................................................................................ 37
P4 Discuss the inter-dependence of workstation hardware with relevant networking software...........................................................................................................38
P1 Discuss the benefits and constraints of different network types and standards.

1. The benefits and constraints of different network types.

A computer network is a group of computers linked to each other that enables the computer to communicate with another
computer and share their resources, data, and applications.

A computer network can be categorized by their size. A computer network is mainly of five types:

- LAN (Local Area Network).

- PAN (Personal Area Network).

- MAN (Metropolitan Area Network).

- WAN (Wide Area Network).

- Internet Connectivity

1.1. LAN (Local Area Network).

Local Area Network is a group of computers connected to each other in a small area such as building, office.

There are three types of LAN connections available: BUS, RING and STAR. In which the STAR type is widely used in practice
because of many outstanding features.

Advantages:
- Star formation network (STAR) for the fastest speed.

- When the network cable is broken, normally it only damages the connection of one machine, the other computers can still
work.

- When there is a network error, it is easy to check and repair.

Disadvantages: This type of network markers costs more wires and intermediates costs.

1.2. PAN (Personal Area Network).

Personal Area Network is a network arranged within an individual person, typically within a range of 10 meters.

Personal Area Network is used for connecting the computer devices of personal use is known as Personal Area Network.

Personal computer devices that are used to develop the personal area network are the laptop, mobile phones, media player and play
stations.

Advantages:
- PAN is relatively flexible and offers high efficiency for a short network range.

- It's easy to set up and relatively low cost.

- It doesn't require regular installation and maintenance

- PAN is highly portable.

- Less technical ability is required to use.

Disadvantages:

- Low network coverage / area.

- The limit is at relatively low data rates.

- The devices are not compatible with each other.

- The available WPAN devices are a bit expensive.


1.3. MAN (Metropolitan Area Network).

A metropolitan area network is a network that covers a larger geographic area by interconnecting a different LAN to form a
larger network.

Government agencies use MAN to connect to the citizens and private industries.

In MAN, various LANs are connected to each other through a telephone exchange line.

The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL, etc.

It has a higher range than Local Area Network(LAN).

Advantages:

- Optimize bandwidth on available IT and telecommunications network infrastructure to exploit multimedia services.

- Flexibility in deploying new services thanks to integrating new IT and telecommunications network infrastructure on
existing IT and telecommunications network infrastructure.

Disadvantages: High investment costs.


1.4. WAN (Wide Area Network).

A Wide Area Network is a network that extends over a large geographical area such as states or countries.

A Wide Area Network is quite bigger network than the LAN.

A Wide Area Network is not limited to a single location, but it spans over a large geographical area through a telephone line,
fibre optic cable or satellite links.

The internet is one of the biggest WAN in the world.

A Wide Area Network is widely used in the field of Business, government, and education.
Advantages:

- Geographical area: A Wide Area Network provides a large geographical area. Suppose if the branch of our office is in a
different city then we can connect with them through WAN. The internet provides a leased line through which we can connect
with another branch.

- Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to buy the emails, files or back
up servers.

- Get updated files: Software companies work on the live server. Therefore, the programmers get the updated files within
seconds.

- Exchange messages: In a WAN network, messages are transmitted fast. The web application like Facebook, Whatsapp,
Skype allows you to communicate with friends.

- Sharing of software and resources: In WAN network, we can share the software and other resources like a hard drive,
RAM.

- Global business: We can do the business over the internet globally.

- High bandwidth: If we use the leased lines for our company then this gives the high bandwidth. The high bandwidth
increases the data transfer rate which in turn increases the productivity of our company.
Disadvantages:

- Security issue: A WAN network has more security issues as compared to LAN and MAN network as all the technologies are
combined together that creates the security problem.

- Needs Firewall & antivirus software: The data is transferred on the internet which can be changed or hacked by the hackers, so
the firewall needs to be used. Some people can inject the virus in our system so antivirus is needed to protect from such a virus.

- High Setup cost: An installation cost of the WAN network is high as it involves the purchasing of routers, switches.

- Troubleshooting problems: It covers a large area so fixing the problem is difficult.


1.5. Internet Connectivity.

The Internet is a global system that uses a set of protocols TCP / IP to link all kinds of electrical equipment around the world.
The Internet is a collection of interconnected devices spanning the globe. It is a network of public, private, sales, financial,
academic, business, and government networks. The Internet is basically a type of WAN, meaning it will connect all kinds of
smaller networks like local area LAN or WLAN around the world.

Advantages:

- convenient communication

- quick information and communication

- lots of entertainment and services

- easy education and learning

Disadvantages:

- Information security issue

- Viruses and spam folders.

- A lot of wrong information.

- interfere with communication in practice.

- Addictive and sedentary in life.


2. Networking standards.
- Networking standards define the rules for data communications that are needed for interoperability of networking
technologies and processes. Standards help in creating and maintaining open markets and allow different vendors to compete
on the basis of the quality of their products while being compatible with existing market products.

- During data communication, a number of standards may be used simultaneously at the different layers. The commonly used
standards at each layer are:

- Application layer − HTTP, HTML, POP, H.323, IMAP.

- Transport layer − TCP, SPX.

- Network layer −IP, IPX.

- Data link layer − Ethernet IEEE 802.3, X.25, Frame Relay.

- Physical layer −RS-232C (cable), V.92 (modem).

- Standards are of two types:

+ De facto − These are the standards that are followed without any formal plan or approval by any organization. They have
come into existence due to traditions or facts. For example, the HTTP had started as a de facto standard.

+ De jure − These standards are the ones which have been adopted through legislation by any officially recognized standards
organization. Most of the communication standards that are used today are de jure standards.
- Some of the noted standards organizations are:

+ International Standards Organization (ISO).

+ International Telecommunication Union (ITU).

+ Institute of Electronics and Electrical Engineers (IEEE).

+ American National Standards Institute (ANSI).

+ Internet Research Task Force (IETF).

+ Electronic Industries Association (EIA).


P2 Explain the impact of network topology, communication and bandwidth requirements.

1. Client Server.

This type of relationship is between two systems. One is the client (user), and the other is a server. The client will make a service
request to the other system (Server) which will send back information to the client. Within this type of relationship, the client
requires the information given from the server for it to function correctly; therefore, it must be managed correctly. Furthermore, the
server controls the security of the network which can be beneficial as this means that the user does not need to have security
measures on their side. With this type of topology, the bandwidth between the client and the server is limited by the hardware that
is used either by the server or the client. (BBC, n.d.) For example, a server may have hardware supporting 1000 mb/s transfer speed
but is limited to 30 mb/s due to the bandwidth allocated by the ISP (Internet Server Provider). This scenario can also be applied to
the client as their hardware configuration may support higher bandwidth than their ISP (Internet Service Provider) has allocated for
them.
2. Cloud.

The cloud network topology refers to a collection of servers and data centers which are used to create a collection of resources
that could be accessed from anywhere in the world as long as the user has an Internet connection. Cloud networks can be beneficial
for small or large organisations as they can accompany expansion which only requires an adjustment to their current contract with
the provider (Microsoft, n.d.). As a result of cloud technology, this has led to the popularisation of cloud software. Cloud software is
a type of software that can be accessed through browsers. For example, Google cloud suite allows users to use a variety of software
such as Docs, Slides, Sheets or Drive. These will enable users to create and edit documents, upload files and also share these
documents with other users through email. This can be advantageous for organisations as this can be used to improve
communication and also allows employees to continue working on documents outside of business hours.
3. Virtualized.

Virtualized networks can be presented in a variety of different forms that work in a variety of ways and for a different purpose.
VLAN stands for Virtual Local Area Network. Cisco (URL, n.d.) summarises a VLAN as a “group of devices on one or more LANs that
are configured to communicate as if they were attached to the same wire”. Within an organisation this can be beneficial as the
connecting LANs could allow for increased communication between departments or branches, therefore. Another type of Virtual
network is a VPN. This stands for a virtual private network which according to Cisco (n.d. 2) is defined as “an encrypted connection
over the Internet from a device to a network”. This can also be known as remote access. Within an organisation that allows
employees to connect to the network securely. This can be beneficial as it can enable the work from home approach which could
prevent demotivation.
4. Logical Topology ( Ethernet).

The Ethernet typology is the most typical type of logical topology used. This topology can use two physical topologies that are the
bus and the star topology. The bus topology connects all devices on the network through the same medium, also known as a
physical channel. Some examples of this physical channel are coaxial Cables, twisted pair or fibre optic. When using this topology,
any communication that occurs can be heard by all other devices connected (Blackbox, n.d.). Ethernet also utilises CSMA/CD which
stands for Carrier Sense Multiple Access with Collision Detection. Carrier Sense refers to the prevention of transmission from other
devices if one is already transmitting (Blackbox, n.d.). Multiple Access refers to the ability for multiple devices to communicate using
the same medium (Blackbox, n.d.). Collision Detection refers to a check that occurs to detect if more than one transmission signal is
occurring, jamming the signal and then waiting for a random interval before retransmission. (Blackbox, n.d.)
5. Physical Topology.

5.1. Start.

BBC (n.d. 3) defines the star network topology as “each device on the network has its own cable that connects to a switch or
hub”. This means that visually the switch/hub is located at the centre of and the computers are connected to the hub/switch
rather than being connected to two different computers. This can be essential for network management as all the traffic will be
directed through the switch/hub which it can be easily managed. Similar to other types of topologies it is also easy to add devices
to the network as it will only require a cable connected to the switch/hub. If a device other than the hub/switch fails, then the rest
of the network will still be accessible. However, if the hub/switch fails, then the entire network will not be accessible by the other
devices. This also has additional cost due to the requirement of a networking device to be used. (BBC, n.d. 3).

5.2. Ring.
According to ComputerHope (2018), the ring topology is defined as “A ring topology is a network configuration in which device
connections create a circular data path. Each networked device is connected to two others, like points on a circle”. From this, it
can be assumed that in the event of an error occurring at one part of the ring this will cause the chain to break and the network to
fail. The ring topology also only allows transmission in a certain direction at a certain time within the circle while other topologies
such as the star allows the data to flow in either direction. Unlike the star topology, it does not require a networking device for it
to function correctly as each device will connect to two other devices. This also allows the network to be flexible. It can expand the
ring as long as the new device can connect to two other devices to continue the ring. Furthermore, as the data is travelling in one
direction, this can reduce collisions that occur when transmissions are sent. However, this topology can be slow. For example, if a
device has to transmit data to a device that is “behind” it on the ring, it will have to go to every other device before it reaches its
destination. (Computerhope, 2018).
6. IPv4.

IPv4 stands for Internet Protocol Version 4 which is a 32-bit IP address that is formatted as four three-digit numbers separated by
a dot. For example, 111.111.111.111. This can allow any number from 0 to 255 which roughly provides 4 billion unique addresses. As
computing devices have become more affordable, it had led to it becoming more common in everyday houses and organisations. As
IPv4 has a set limitation on the number of unique addresses it can allocate, it will mean that at in the future we will run out of
unique addresses. To solve this major issue, a new type of unique address will be used as a replacement to the IPv4 system. This is
called IPv6. (PC, 2009).
7. IPv6.

IPv6 is the 6th version of the Internet Protocol which is an increasingly complex version from an earlier version. This is because it
uses a 128-bit address which is four hexadecimal (0-9 and A-F) numbers laid out in the following pattern
‘aaaa:bbbb:cccc:dddd:eeee:ffff:gggg:hhhh’. As this follows hexadecimal, this can be easily perceived as being more secure as
attempting to guess the IP would take significantly more time than what it would for an IPv4 address. This type of Internet Protocol
has not been fully adopted yet. This is due to a wide range of systems using IPv4, and the immediate switch could be financially
expensive. However, as of the 22d November 2018, there is a 22.77% IPv6 adoption with 21.85% of the amount being in the United
Kingdom. (Google, n.d.).
8. FTP.

FTP stands for File Transfer Protocol and it is used for transferring files between a client and a server. This type of protocol utilises
the client-server network topology when communicating between the server and the client. FTP also uses two ports, one for sending
data (port 20) and another port for the server to listen for incoming clients (port 21) (Gibson Research Corporation, 2008). FTP can
also be handy for a user as this allows them to easily upload and download files remotely through the connection which further
eliminates the requirements for the user to use a removable media to merely update the files on their server. Depending on the
configuration this also means that it can also be remotely accessed from different geolocations. FTP is commonly used when using a
company as a server hosting provider as most times the servers are not physically accessible the user. (BBC, n.d. 2).
9. HTTP.

HTTP stands for HyperText Transfer Protocol which is used for transmitting digital media for example HTML. This protocol is used
when sending requests from a browser to a web server. This type of protocol is stateless which is defined as not recording any data.
This type of transmission protocol has been superseded by HTTPS which is a secure version of the HTTP protocol. HTTPS is a secure
version of HTTP which utilises encryption methods to ensure any data transmitted or received by the user cannot be intercepted.
(BBC, n.d. 2).
10. OSI Model.

OSI stands for Open Systems Interconnection. According to (CloudFlare, n.d.) the OSI provides “Standardization which enables
diverse communication systems to communicate using standard protocols.”

11. Layer 1 tp Layer 7.


P3 Discuss the operating principles of networking devices and server types.

1. Types of network equipment.

1.1. Hub.

Hubs connect multiple computer networking devices together. A hub also acts as a repeater in that it amplifies signals that deteriorate after
traveling long distances over connecting cables. A hub is the simplest in the family of network connecting devices because it connects LAN
components with identical protocols.

A hub can be used with both digital and analog data, provided its settings have been configured to prepare for the formatting of the
incoming data. For example, if the incoming data is in digital format, the hub must pass it on as packets; however, if the incoming data is
analog, then the hub passes it on in signal form.

Hubs do not perform packet filtering or addressing functions; they just send data packets to all connected devices. Hubs operate at the
Physical layer of the Open Systems Interconnection (OSI) model. There are two types of hubs: simple and multiple port.
1.2. Switch.

Switches generally have a more intelligent role than hubs. A switch is a multiport device that improves network efficiency. The switch
maintains limited routing information about nodes in the internal network, and it allows connections to systems like hubs or routers. Strands
of LANs are usually connected using switches. Generally, switches can read the hardware addresses of incoming packets to transmit them to
the appropriate destination.

Using switches improves network efficiency over hubs or routers because of the virtual circuit capability. Switches also improve network
security because the virtual circuits are more difficult to examine with network monitors. You can think of a switch as a device that has some
of the best capabilities of routers and hubs combined. A switch can work at either the Data Link layer or the Network layer of the OSI model. A
multilayer switch is one that can operate at both layers, which means that it can operate as both a switch and a router. A multilayer switch is a
high-performance device that supports the same routing protocols as routers.

Switches can be subject to distributed denial of service (DDoS) attacks; flood guards are used to prevent malicious traffic from bringing the
switch to a halt. Switch port security is important so be sure to secure switches: Disable all unused ports and use DHCP snooping, ARP
inspection and MAC address filtering.
1.3. Router.

Routers are general-purpose devices that interconnect two or more heterogeneous networks. They are usually dedicated to special-
purpose computers, with separate input and output network interfaces for each connected network. Because routers and gateways are the
backbone of large computer networks like the internet, they have special features that give them the flexibility and the ability to cope with
varying network addressing schemes and frame sizes through segmentation of big packets into smaller sizes that fit the new network
components. Each router interface has its own Address Resolution Protocol (ARP) module, its own LAN address (network card address) and its
own Internet Protocol (IP) address. The router, with the help of a routing table, has knowledge of routes a packet could take from its source to
its destination. The routing table, like in the bridge and switch, grows dynamically. Upon receipt of a packet, the router removes the packet
headers and trailers and analyzes the IP header by determining the source and destination addresses and data type, and noting the arrival
time. It also updates the router table with new addresses not already in the table. The IP header and arrival time information is entered in the
routing table. Routers normally work at the Network layer of the OSI model.
1.4. Bridge.

Bridges are used to connect two or more hosts or network segments together. The basic role of bridges in network architecture
is storing and forwarding frames between the different segments that the bridge connects. They use hardware Media Access
Control (MAC) addresses for transferring frames. By looking at the MAC address of the devices connected to each segment,
bridges can forward the data or block it from crossing. Bridges can also be used to connect two physical LANs into a larger logical
LAN.

Bridges work only at the Physical and Data Link layers of the OSI model. Bridges are used to divide larger networks into smaller
sections by sitting between two physical network segments and managing the flow of data between the two.

Bridges are like hubs in many respects, including the fact that they connect LAN components with identical protocols. However,
bridges filter incoming data packets, known as frames, for addresses before they are forwarded. As it filters the data packets, the
bridge makes no modifications to the format or content of the incoming data. The bridge filters and forwards frames on the
network with the help of a dynamic bridge table. The bridge table, which is initially empty, maintains the LAN addresses for each
computer in the LAN and the addresses of each bridge interface that connects the LAN to other LANs. Bridges, like hubs, can be
either simple or multiple port.
1.5. Gateway.

Gateways normally work at the Transport and Session layers of the OSI model. At the Transport layer and above, there are
numerous protocols and standards from different vendors; gateways are used to deal with them. Gateways provide translation
between networking technologies such as Open System Interconnection (OSI) and Transmission Control Protocol/Internet
Protocol (TCP/IP). Because of this, gateways connect two or more autonomous networks, each with its own routing algorithms,
protocols, topology, domain name service, and network administration procedures and policies.

Gateways perform all of the functions of routers and more. In fact, a router with added translation functionality is a gateway.
The function that does the translation between different network technologies is called a protocol converter.
1.6. Modem.

Modems (modulators-demodulators) are used to transmit digital signals over analog telephone lines. Thus, digital signals are
converted by the modem into analog signals of different frequencies and transmitted to a modem at the receiving location. The
receiving modem performs the reverse transformation and provides a digital output to a device connected to a modem, usually a
computer. The digital data is usually transferred to or from the modem over a serial line through an industry standard interface,
RS-232. Many telephone companies offer DSL services, and many cable operators use modems as end terminals for identification
and recognition of home and personal users. Modems work on both the Physical and Data Link layers.
2. Types of network server.

2.1. Web server.

A web server is a server that runs on websites. It is also called a computer program. The main function of web servers is to store,
process, and deliver.

Whenever we search on the internet through web browsers like chrome, Mozilla, internet explorer, etc, receives the request for
the URL and then web server sends the data according to the need of the user. These types of servers mainly show the data in
format like images, text, video, etc.

A web server program uses HTTP (Hypertext Transfer Protocol), which serves files for users that create web pages. Dedicated
computers and applications are also known as web servers.

2.2. File server.


A file server is a network that helps to transfer stored files. The file server stores and manages all the files in a computer and
sends a copy of the file to the other computer on the request of the users. It shares the storage of computer files such as
documents, sound files, photographs, images, databases, etc. These types of servers is used mainly on the local network.
2.3. Database server.

A database server is a computer system that provides services related to accessing and retrieving data from databases to other
computers. Database server access can be from the “front end” running on the user’s machine or “back end” running on the
database server accessed from the remote shell.

After accessing the information inside the database, it gives the output of data requested by the user.

These types of servers are similar to a warehouse, where the website’s data and information are stored and maintained. Many
companies use a database server for the storage of their data. Users access the data using query labels related to the database.
SQL is an example of a query language.
2.4. DNS server.

Domain Name System (DNS) servers are application servers that provide name resolution to client computers by converting
names easily understood by humans into machine-readable IP addresses. The DNS system is a widely distributed database of
names and other DNS servers, each of which can be used to request an otherwise unknown computer name. When a client needs
the address of a system, it sends a DNS request with the name of the desired resource to a DNS server. The DNS server responds
with the necessary IP address from its table of names.

2.5. Mail server.

Mail servers are a very common type of application server. Mail servers receive emails sent to a user and store them until
requested by a client on behalf of said user. Having an email server allows for a single machine to be properly configured and
attached to the network at all times. It is then ready to send and receive messages rather than requiring every client machine to
have its own email subsystem continuously running.
2.6. Virtual server.

Virtual Servers still require hardware, but that hardware now runs a different process known as a hypervisor. In some cases,
such as Microsoft’s Hyper-V, a full operating system continues to run on the hardware itself. In other cases, so-called bare-metal
hypervisors can be installed directly onto server hardware. In both instances, the hardware itself is often spread across an array of
blade servers, networked storage, and power supply, resulting in an environment where it is impossible to tell where any
individual server ends and another begins.
P4 Discuss the inter-dependence of workstation hardware with relevant networking software.
Inter-dependence of workstation hardware with relevant networking software:

- A network file server is a computer system used for the purpose of managing the file system, the network printer, handling
network communication, and other functions. A server may be dedicated is such case all of its processing power is allocated to
network function, or it may be non- dedicated which means that a part of server functions allocated as a work stations or DOS based
system.

- Network operating system: it is loaded into the servers’ hard disk along with the system management tools and user utilities.
When the system is started, NOS boots and other server come under its control.

- Workstations: workstations or nodes are attached to the server through the network interfaces card and the cable;
workstations are normally intelligence systems, such as the IBM pc. But DUMV terminals are used in mainframe computers. The
concept of distributed process depends on the fact that personal computer are attached to the network performed their own
processing after loading programs and data from servers. Due to this a work station is called an active device on the network. After
processing, files are stored back on the server where they can be used by others workstation.

- Network interface card-every device connected to a LAN needs network interface card to plug into the LAN. For example, a PC
needs to have an Ethernet card installed in it to connect to an Ethernet LAN.

- Network cabling: once the server, workstations, and network interface cards are in place, network cabling is used to network
everything together. The most popular type of network cables: Twisted pair wiring, Co-axial cable, Fiber optics cable.
References
[1] Unit 2 - Networking 2019, Chapter 1 - Role of Networks, University of Greenwich (Alliance with Vietnam FPT Education), United
Kingdom.
[2] Unit 2 - Networking 2019, Chapter 2 - System Types - Network Devices, University of Greenwich (Alliance with Vietnam FPT
Education), United Kingdom.
[3] Unit 2 - Networking 2019, Chapter 3 - Broadband Solutions, University of Greenwich (Alliance with Vietnam FPT Education),
United Kingdom.
[4] Unit 2 - Networking 2019, Chapter 4 - Networking Standards, University of Greenwich (Alliance with Vietnam FPT Education),
United Kingdom.
[5] Unit 2 - Networking 2019, Chapter 5 - Network Maintenance, University of Greenwich (Alliance with Vietnam FPT Education),
United Kingdom.
[6] Unit 2 - Networking 2019, Chapter 6 - TCP-IP, University of Greenwich (Alliance with Vietnam FPT Education), United Kingdom.
[7] Unit 2 - Networking 2019, Chapter 7 - Scalable, User Requirement, University of Greenwich (Alliance with Vietnam FPT
Education), United Kingdom.
[8] Unit 2 - Networking 2019, Chapter 8 - Sending and Recieving Infomation, University of Greenwich (Alliance with Vietnam FPT
Education), United Kingdom.
[9] Unit 2 - Networking 2019, Chapter 9 - The working OSI Model, University of Greenwich (Alliance with Vietnam FPT Education),
United Kingdom.
[10] Unit 2 - Networking 2019, Chapter 10 - Network Topologies, University of Greenwich (Alliance with Vietnam FPT Education),
United Kingdom.
[11] Unit 2 - Networking 2019, Chapter 11 - Nework Protocols, University of Greenwich (Alliance with Vietnam FPT Education),
United Kingdom.
[12] Unit 2 - Networking 2019, Chapter 12 - Nework Cards, University of Greenwich (Alliance with Vietnam FPT Education), United
Kingdom.
[13] Unit 2 - Networking 2019, Chapter 13 - The cable, University of Greenwich (Alliance with Vietnam FPT Education), United
Kingdom.
[14] Unit 2 - Networking 2019, Chapter 14 - Servers_Request, University of Greenwich (Alliance with Vietnam FPT Education),
United Kingdom.
[15] JavaTPoint (2019) “ Computer Network Types “. [Online] Availabe at: https://www.javatpoint.com/types-of-computer-network
[Accessed April 17, 2021]
[16] Quantrimang (2020) “ Computer Network TypesLearn about Personal Area Network (PAN) “. [Online] Availabe at:
https://quantrimang.com/personal-area-network-pan-
174792#:~:text=%C4%90%C3%A2y%20l%C3%A0%20m%E1%BB%99t%20s%E1%BB%91%20nh%C6%B0%E1%BB%A3c,kh%C3%B4ng%20t%C
6%B0%C6%A1ng%20th%C3%ADch%20v%E1%BB%9Bi%20nhau. [Accessed April 17, 2021]
[17] UKEYSSAYS (2020) “ Explain the Impact of Network Topology, Communication and Bandwidth Requirements “. [Online]
Availabe at: https://www.ukessays.com/essays/information-systems/explain-the-impact-of-network-topology-communication-and-
bandwidth-requirements.php [Accessed April 19, 2021]
[18] Netwrix (2019) “ Network Devices Explained “. [Online] Availabe at: https://blog.netwrix.com/2019/01/08/network-devices-
explained/ [Accessed April 19, 2021]
[19] PAESSLER (2018) “ IT Explained: Server “. [Online] Availabe at: https://www.paessler.com/it-explained/server [Accessed April 19,
2021]
[20] DigitalWorld839 (2020) “ Top 14 Types of Servers “. [Online] Availabe at: https://digitalworld839.com/types-of-servers/ [Accessed
April 19, 2021]
[21] Course Hero (2019) “ III implement a network design topology “. [Online] Availabe at:
https://www.coursehero.com/file/p5gbqh1/Inter-dependence-of-workstation-hardware-with-relevant-networking-software-A/
[Accessed April 19, 2021]

You might also like