You are on page 1of 50

Higher Nationals in Computing

Unit 2: Networking Assignment

Learner’s name: ĐÀO VĂN VINH

ID: GCS190891

Class: GCS0805_PPT

Subject code: 1619

Assessor name: PHAN MINH TAM


Assignment due: Assignment submitted:
ASSIGNMENT FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking

Submission date Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name ĐÀO VĂN VINH Student ID GCS190891

Class GCS0805_PPT Assessor name Phan Minh Tam

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Grading grid

P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3
 Summative Feedback:  Resubmission Feedback:

Grade: Assessor Signature: Date:

Signature & Date:


ASSIGNMENT BRIEF

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 2: Networking

Assignment title Networking Infrastructure

Academic Year

Unit Tutor TamPM

Issue date Submission date

IV name and date Khoa Canh Nguyen, Nhung, Michael Omar 9th/01/2020

Submission format

Part 1

The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using the Harvard referencing system. Please also provide a bibliography using the Harvard
referencing system. The recommended word limit is 2,000–2,500 words, although you will not be
penalized for exceeding the total word limit.

Part 2
The submission is in the form of an individual evidence portfolio.

 A LAN design plan and blueprint and justification document.


 A fully completed test plan including an evaluation of results and recommendations for
improvements to LAN.
 A proposed and justified maintenance schedule.

Part 3
 Evidence of an implemented network.

You are required to make use of headings, paragraphs, subsections and illustrations as appropriate,
and all work must be supported with research and referenced using the Harvard referencing system.

Unit Learning Outcomes

LO1: Examine networking principles and their protocols.

LO 2: Explain networking devices and operations.

LO3: Design efficient networked systems.

LO4: Implement and diagnose networked systems.

Assignment Brief

You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking
solution development company, which have branches in Ho Chi Min City, Hanoi, Da Nang and Can
Tho.

The company has been contracted to implement a networking project from a local educational
institute. The specification of the project is given below:
People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers
including the head of academics and the programme manager, 3 computer network
administrators.

Resources: 50 student lab computers, 35 staff computers, 3 printers

Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one
lab located on the first floor and another located on the second floor

As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain
networking principles, protocols and devices and submit a report.

Part 1

You will need to produce a report that includes the following:

1. An introduction to provide an overview of your report.

2. Benefits and constraints of different types of networks and networking standards.

3. The impact of network topology, speed of communication and bandwidth requirements.

4. Effectiveness of networking systems.

5. Discussion on operating principles of networking devices and server types and networking
software.

6. Discuss the relationship of workstation hardware with networking software.

7. Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimization.

8. For the given specification, identify the topology protocol for the efficient utilization of a
networking system.

The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the
specification from the institution, as given earlier.

You need to design and implement the networking project within a given timeframe:
Part 2 Design efficient networked systems

1. Prepare a written step-by-step plan of how you are going to design a Local Area Network
including a blueprint of your LAN.

2. Justify your choice of devices for your network design.

3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost
constraints as per user specifications.

4. Justify the security requirements and quality of services needed for selection of accessories.

5. Suggest a maintenance schedule to support the networked system.

Part 3 Implement test and diagnose networked systems

1. Implement a networked system based on your prepared design.

2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.

3. Record the test results and analyze these against expected results.

4. Investigate what functionalities would allow the system to support device growth and the
addition of communication devices.

5. Discuss the significance of upgrades and security requirements in your recommendations.


ASSESMENT CRITERIA

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine networking principles and their protocols

P1 Discuss the benefits and constraints M1 Compare common


of different network types and networking principles and how LO1 & 2

standards. protocols enable the D1 Considering a given


effectiveness of networked scenario, identify the
P2 Explain the impact of network systems. topology protocol selected
topology, communication and for the efficient utilization
bandwidth requirements. of a networking system.

LO2 Explain networking devices and operations

P3 Discuss the operating principles of M2 Explore a range of server


networking devices and server types. types and justify the selection
of a server, considering a given

P4 Discuss the inter-dependence of scenario regarding cost and

workstation hardware with relevant performance optimisation.

networking software.

LO3 Design efficient networked systems

P5 Provide a logical/physical design of M3 Install and configure D2 Design a maintenance

the networked system with clear network services and schedule to support the

explanation and addressing table. applications on your choice. networked system.


P6 Evaluate the design to meet the
requirements.

LO4 Implement and diagnose networked systems

P7 Implement a networked system M4 Recommend potential D3 Use critical reflection


based on a prepared design. enhancements for the to evaluate own work and
networked systems. justify valid conclusions.

P8 Document and analyse test results


against expected results.
Table of Contents
P1. Discuss the benefits and constraints of different network types and standards ...................... 1
1. Define computer networking and role of network ..................................................................... 1
2. Network classification ................................................................................................................ 2
3. Networking Standards ............................................................................................................... 8

P2. Explain the impact of network topology, communication and bandwidth requirements ...... 11
1. Client Server ............................................................................................................................ 11
2. Cloud ....................................................................................................................................... 12
3. Virtualised ............................................................................................................................... 13
4. Logical Topology Ethernet ....................................................................................................... 13
5. Physical Topology Ethernet ...................................................................................................... 14
6. Ring ......................................................................................................................................... 15
7. IPv4 ......................................................................................................................................... 16
8. IPv6 ......................................................................................................................................... 17
9. FTP .......................................................................................................................................... 17
10. HTTP ........................................................................................................................................ 18
11. OSI MODEL .............................................................................................................................. 19
12. PLAYER 1 to PLAYER 7 .............................................................................................................. 19

P3. Discuss the operating principles of networking devices and server types ............................. 20
1. Type of network equipment .................................................................................................... 20
1.1. Repeater........................................................................................................... 20
1.2. Hub concept ..................................................................................................... 20
1.3. Bridge ............................................................................................................... 21
1.4. Switch............................................................................................................... 22
1.5. Router .............................................................................................................. 22
1.6. Gateway ........................................................................................................... 23
2. What is a server? ....................................................................................................................... 23
2.1.Virtual server (Virtual Private Server- VPS) ................................................................ 24
2.2.Cloud Server .............................................................................................................. 24
2.3.Web Server ............................................................................................................... 25
2.4.Email Server .............................................................................................................. 26
2.5.FTP Server ................................................................................................................. 26
2.6.Database Server ........................................................................................................ 27
2.7.DNS Server ................................................................................................................ 27
2.8.DHCP Server .............................................................................................................. 28

P4. Discuss the inter-dependence of workstation hardware with relevant networking software .............. 38

P5. Provide a logical/physical design of the networked system with clear explanation and
addressing table ........................................................................................................................... 30

P6. Evaluate the design to meet the requirements ...................................................................... 31

P7. Implement a networked system based on a prepared design ................................................ 32


1. Information of devices in the design ........................................................................................ 32
2. Ping from device to device in the design table ......................................................................... 33

P8. Document and analyse test results against expected results ............................................................... 36
ASSIGNMENT 1 ANSWERS

P1 Discuss the benefits and constraints of different network types and standards.

1. Define computer networking and role of network:


- A computer network is a set of connected computers. Computers on a network are
called nodes. The connection between computers can be done via cabling, most commonly the
Ethernet cable, or fiber optic cable. Connections can also be wireless; you'll hear the term wi-fi
to describe information sent via radio waves.
- Connected computers can share resources like access to the Internet, printers, file servers, and
others. A network is a multipurpose connection, which allows a single computer to do more
than it could without any connection.
- The way in which devices are interconnected to form a network is called network topology.
Some of the factors that affect choice of topology for a network are
 Cost − Installation cost is a very important factor in overall cost of setting up an
infrastructure. So cable lengths, distance between nodes, location of servers, etc. have to
be considered when designing a network.
 Flexibility − Topology of a network should be flexible enough to allow reconfiguration of
office set up, addition of new nodes and relocation of existing nodes.
 Reliability − Network should be designed in such a way that it has minimum down time.
Failure of one node or a segment of cabling should not render the whole network useless.
 Scalability − Network topology should be scalable, i.e. it can accommodate load of new
devices and nodes without perceptible drop in performance.
 Ease of installation − Network should be easy to install in terms of hardware, software and
technical personnel requirements.
 Ease of maintenance − Troubleshooting and maintenance of network should be easy.
- A data network (Data Network abbreviated as DN) is a collection of devices and circuits,
thereby providing the means to transfer information and data between computers, allowing
users to stay Different regions share resources on another machine somewhere.

P age |1
2. NETWORK CLASSIFICATION
A. Local area networks LAN:

Local area networks LANs: connect individual computers to local area networks, enabling information
exchange and sharing of resources in offices, enterprises ...There are two different LAN types: wired
LAN (using cables) and wireless LAN (using high frequency or infrared). Basic features of local area
network:

The size of the network is small, its operating range is a few kilometers. Machines in a building, an
agency or a factory. Connected together. Simple network management and maintenance.

The transmission technology used in LANs is usually broadcast, including a single cable connecting all
the machines. High data rate, from 10/100 Mbps to hundreds of Gbps, small delay time (size 10-6s),
high reliability, bit error rate from 10-8 to 1011.

The topology of the network is diverse. For example: the network BUS, ring (Ring), star (Star) and
other types of networks combined, combined...

 BUS network configuration


 The BUS network is broadcast-based. All nodes have a common access on a physical link with a
beginning and end (BUS). The IEEE 802.3 standard, called Ethernet, is a broadcast BUS network
with a distributed dynamic broadcast control mechanism, exchanging information at 10 Mbps
or 100 Mbps.
P age |2
 The medium access method is used in the BUS or TOKEN BUS network, or multiple access using
the carrier with the detection of information conflicts on the CSMA / CD (Carrier Sense
Multiple Access with Collision Detection).

BUS network configuration

 Ring-type network configuration (RING)


Ring network (RING) is a broadcast network (Broadcast), all nodes share the same access on a
physical line. The signal is circulated on the ring in a single direction, according to the point-to-
point link. Data is transferred sequentially bit by bit around the transmitters. The relay has
three functions: insert, receive and discard information. The relay will check the destination
address in the data packet when passing through it.

Ring-type network configuration

 Star-shaped network (STAR)

P age |3
Star network connected stations with a central device that controls the entire operation of the
network. Data is transmitted in point-to-point links. The central unit can be a switch, a path
selector, or simply a HUB.

Star-shaped network

 Infrared LAN:

Infrared LAN uses infrared waves to transmit data. The network coverage is limited in one
room, because the infrared signal does not go through the wall. There are two methods of
point-to-point connection and broadcast connection. Point-to-point networks work by relaying
infrared signals from one device to the next. Data rates reach about 100Kb/s to 16Mb/s.
Infrared broadcast networks have actual data transmission rates of less than 1Mb/s.

 LAN for narrowband:

Operating with microwave frequency but not spread spectrum. There are two traditional
forms: earthly and satellite. Terrestrial microwave systems typically operate in the frequency
bands of 4-6 GHz and 21- 23 GHz, with data rates of several tens of Mbps.

P age |4
B. Metropolitan Area Networks

Urban MAN Network operates in the form of broadcast, LAN to LAN. The network provides
voice and non-voice services and cable TV. In a MAN network, it is possible to use one or two physical
lines and do not contain the switched entity. Based on the DVDB standard (Distributed Queue Dual
Bus - IEEE 802.6) specifies 2 single cables connecting all computers together, the left machines
communicate with the right machines with transport information on the above BUS line. The
machines on the left contact the machines on the right, the information goes along the bottom BUS.

P age |5
C. Wide Area Networks (WANs)

Basic features of a WAN:

- Operate on a national or global scale.

- Low data transfer rate compared to local network.

- High transmission error.

D. Internet Connectivity
 The need for information exchange and sharing of common resources requires the
communication activities required to connect multiple networks into one large network, called
inter-network.
 Internet network is the network of subnets, is a set of independent LAN, WAN, MAN connected
together. Inter-network connectivity has a number of benefits:
 Reduced network traffic: Packets are often circulated on subnets and packets circulated on the
network when subnets communicate with each other.
 Optimize performance: Reducing network traffic is to optimize the performance of the
network, but the server (Server Load) will have to increase the load when it is used as a Router.

P age |6
 Simplify network administration: Can determine identify technical problems and isolate more
easily in a small network, usually in a local area network. More efficient than WANs with large
coverage, reduced costs, increased internetwork performance and smaller management
complexity.
 One of the major functions of interconnected devices is the routing function. There are three
basic methods of inter-network connection:
 Connecting the homogenous LANs at the physical layer creates a network with a wide range of
activities and increasing the number of nodes on the network, reducing traffic on each subnet.
, limit congestion and information collisions. The subnet works more effectively.
 Connecting the homogenous LANs at the physical layer creates a network with a wide range of
activities and increases the number of nodes on the network, reducing traffic on each subnet,
limiting congestion and information collisions. The subnet works more effectively.
 Connecting heterogeneous LANs at Level 2 (Data Link) creates an internet consisting of several
local LANs connected together by switches to isolated
Servers at high speed. Connecting different types of LANs at Level 3 (Network Layer) creates a
single WAN. The switching nodes connect to each other according to a grid structure. Each
switching node provides service to its set of terminals (DTE).

P age |7
3. Networking Standards:

In 1983, the International Standards Organization (ISO) developed a network model called Open
Systems Interconnection (OSI) Reference Model, which defined a framework of computer
communications. The ISO/OSI Reference Model (ISO/OSI model) has seven layers, each of which has a
different level of abstraction and performs a well-defined function. The ISO/OSI model requires that
the function of each layer define the international standardized network protocols. The seven layers
are physical, data link, network, transport, session, presentation, and application layers. The physical
layer physically transmits signals across a communication medium.

o The data link layer transforms a stream of raw bits (0s and 1s) from the physical layer into an
error-free data frame for the network layer.
o The network layer controls the operation of a packet transmitted from one network to
another, such as how to route a packet.
o The transport layer splits data from the session layer into smaller packets for delivery on the
network layer and ensures that the packets arrive correctly at the other end.
o The session layer establishes and manages sessions, conversions, or dialogues between two
computers.
o The presentation layer manages the syntax and semantics of the information transmitted
between two computers.
o The application layer, the highest layer, contains a variety of commonly used protocols, such as
file transfer, virtual terminal, and email.

The Institute of Electrical and Electronic Engineers (IEEE) developed a set of LAN standards, known as
IEEE Project 802, which the ISO accepted as international standards. The IEEE LAN standards
addressed only the lowest two layers, the physical and data link layers, of the ISO/OSI model.

The IEEE divided the data link layer into two sublayers, the Logical Link Control (LLC) and Medium
Access Control (MAC) sublayers. The LLC sublayer, known as the IEEE 802.2 standard, is responsible for
data link functions that are independent of the underlying medium. The MAC sublayer is responsible
for data link functions that depend on the medium of the LAN implementation. The LAN
implementation includes ARCnet, Ethernet, Fast Ethernet, Token Bus, Token Ring, and FDDI, which

P age |8
conform to IEEE 802.2. Microsoft's Network Device Interface Specification (NDIS) and Novell's Open
Data-Link Interface (ODI) are two good implementations of the LLC and MAC sublayers. The physical
layer in the IEEE LAN standards is a physical NIC, such as an Ethernet adapter. Every NIC has a unique
48-bit or 16-bit address, known as a hardware or MAC address, to identify itself or to be identified for
data transmission in the two lowest layers.

TCP/IP is a suite of protocols that the US Department of Defense developed on ARPANET beginning in
1969. TCP/IP has grown far beyond the initial project. It is the standard protocol on the Internet and is
the most widely used network protocol today.

P age |9
A TCP/IP application fits into the top three layers of the ISO/OSI model, the session, presentation, and
application layers. Commonly used TCP/IP applications include Telnet and ftp.

P a g e | 10
P2 Explain the impact of network topology, communication and bandwidth
requirements.

1. Client Server

This type of relationship is between two systems. One is the client (user), and the other is a server.
The client will make a service request to the other system (Server) which will send back information to
the client. Within this type of relationship, the client requires the information given from the server
for it to function correctly; therefore, it must be managed correctly. Furthermore, the server controls
the security of the network which can be beneficial as this means that the user does not need to have
security measures on their side. With this type of topology, the bandwidth between the client and the
server is limited by the hardware that is used either by the server or the client. (BBC, n.d.) For
example, a server may have hardware supporting 1000 mb/s transfer speed but is limited to 30 mb/s
due to the bandwidth allocated by the ISP (Internet Server Provider). This scenario can also be applied
to the client as their hardware configuration may support higher bandwidth than their ISP (Internet
Service Provider) has allocated for them.

P a g e | 11
2. Cloud

The cloud network topology refers to a collection of servers and data centers which are used to create
a collection of resources that could be accessed from anywhere in the world as long as the user has an
Internet connection. Cloud networks can be beneficial for small or large organisations as they can
accompany expansion which only requires an adjustment to their current contract with the provider
(Microsoft, n.d.). As a result of cloud technology, this has led to the popularisation of cloud software.
Cloud software is a type of software that can be accessed through browsers. For example, Google
cloud suite allows users to use a variety of software such as Docs, Slides, Sheets or Drive. These will
enable users to create and edit documents, upload files and also share these documents with other
users through email. This can be advantageous for organisations as this can be used to improve
communication and also allows employees to continue working on documents outside of business
hours.

P a g e | 12
3. Virtualised

Virtualised networks can be presented in a variety of different forms that work in a variety of ways
and for a different purpose. VLAN stands for Virtual Local Area Network. Cisco (URL, n.d.) summarises
a VLAN as a “group of devices on one or more LANs that are configured to communicate as if they
were attached to the same wire”. Within an organisation this can be beneficial as the connecting LANs
could allow for increased communication between departments or branches, therefore. Another type
of Virtual network is a VPN. This stands for a virtual private network which according to Cisco (n.d. 2)
is defined as “an encrypted connection over the Internet from a device to a network”. This can also be
known as remote access. Within an organisation that allows employees to connect to the network
securely. This can be beneficial as it can enable the work from home approach which could prevent
demotivation.

4. Logical Topology Ethernet

The Ethernet typology is the most typical type of logical topology used. This topology can use two
physical topologies that are the bus and the star topology. The bus topology connects all devices on
the network through the same medium, also known as a physical channel. Some examples of this
physical channel are coaxial Cables, twisted pair or fibre optic. When using this topology, any
communication that occurs can be heard by all other devices connected (Blackbox, n.d.). Ethernet also
P a g e | 13
utilises CSMA/CD which stands for Carrier Sense Multiple Access with Collision Detection. Carrier
Sense refers to the prevention of transmission from other devices if one is already transmitting
(Blackbox, n.d.). Multiple Access refers to the ability for multiple devices to communicate using the
same medium (Blackbox, n.d.). Collision Detection refers to a check that occurs to detect if more than
one transmission signal is occurring, jamming the signal and then waiting for a random interval before
retransmission. (Blackbox, n.d.)

5. Physical Topology Star

BBC (n.d. 3) defines the star network topology as “each device on the network has its own cable that
connects to a switch or hub”. This means that visually the switch/hub is located at the centre of and
the computers are connected to the hub/switch rather than being connected to two different
computers. This can be essential for network management as all the traffic will be directed through
the switch/hub which it can be easily managed. Similar to other types of topologies it is also easy to
add devices to the network as it will only require a cable connected to the switch/hub. If a device
other than the hub/switch fails, then the rest of the network will still be accessible. However, if the
hub/switch fails, then the entire network will not be accessible by the other devices. This also has
additional cost due to the requirement of a networking device to be used. (BBC, n.d. 3).

P a g e | 14
6. RING

According to ComputerHope (2018), the ring topology is defined as “A ring topology is a network
configuration in which device connections create a circular data path. Each networked device is
connected to two others, like points on a circle”. From this, it can be assumed that in the event of an
error occurring at one part of the ring this will cause the chain to break and the network to fail. The
ring topology also only allows transmission in a certain direction at a certain time within the circle
while other topologies such as the star allows the data to flow in either direction. Unlike the star
topology, it does not require a networking device for it to function correctly as each device will
connect to two other devices. This also allows the network to be flexible. It can expand the ring as long
as the new device can connect to two other devices to continue the ring. Furthermore, as the data is
travelling in one direction, this can reduce collisions that occur when transmissions are sent. However,
this topology can be slow. For example, if a device has to transmit data to a device that is “behind” it
on the ring, it will have to go to every other device before it reaches its destination. (Computerhope,
2018).

P a g e | 15
7. IPV4

IPv4 stands for Internet Protocol Version 4 which is a 32-bit IP address that is formatted as four three-
digit numbers separated by a dot. For example, 111.111.111.111. This can allow any number from 0 to
255 which roughly provides 4 billion unique addresses. As computing devices have become more
affordable, it had led to it becoming more common in everyday houses and organisations. As IPv4 has
a set limitation on the number of unique addresses it can allocate, it will mean that at in the future we
will run out of unique addresses. To solve this major issue, a new type of unique address will be used
as a replacement to the IPv4 system. This is called IPv6. (PC, 2009)

P a g e | 16
8. IPv6

IPv6 is the 6th version of the Internet Protocol which is an increasingly complex version from an earlier
version. This is because it uses a 128-bit address which is four hexadecimal (0-9 and A-F) numbers laid
out in the following pattern ‘aaaa:bbbb:cccc:dddd:eeee:ffff:gggg:hhhh’. As this follows hexadecimal,
this can be easily perceived as being more secure as attempting to guess the IP would take
significantly more time than what it would for an IPv4 address. This type of Internet Protocol has not
been fully adopted yet. This is due to a wide range of systems using IPv4, and the immediate switch
could be financially expensive. However, as of the 22d November 2018, there is a 22.77% IPv6
adoption with 21.85% of the amount being in the United Kingdom. (Google, n.d.)

9. FTP

FTP stands for File Transfer Protocol and it is used for transferring files between a client and a server.
This type of protocol utilises the client-server network topology when communicating between the
server and the client. FTP also uses two ports, one for sending data (port 20) and another port for the
server to listen for incoming clients (port 21) (Gibson Research Corporation, 2008). FTP can also be
handy for a user as this allows them to easily upload and download files remotely through the
connection which further eliminates the requirements for the user to use a removable media to
merely update the files on their server. Depending on the configuration this also means that it can also

P a g e | 17
be remotely accessed from different geolocations. FTP is commonly used when using a company as a
server hosting provider as most times the servers are not physically accessible the user. (BBC, n.d. 2)

10.HTTP

HTTP stands for HyperText Transfer Protocol which is used for transmitting digital media for example
HTML. This protocol is used when sending requests from a browser to a web server. This type of
protocol is stateless which is defined as not recording any data. This type of transmission protocol has
been superseded by HTTPS which is a secure version of the HTTP protocol. HTTPS is a secure version of
HTTP which utilises encryption methods to ensure any data transmitted or received by the user cannot
be intercepted. (BBC, n.d. 2)

P a g e | 18
11. OSI MODEL

OSI stands for Open Systems Interconnection. According to (CloudFlare, n.d.) the OSI provides
“Standardization which enables diverse communication systems to communicate using standard
protocols.”

12. LAYER 1 to LAYER 7

P a g e | 19
P3 Discuss the operating principles of networking devices and server types.

1. Types of network equipment

Names like Switch, Router or Hub will certainly not be unfamiliar to those with little knowledge of
technology. These are the network equipment necessary for us to connect the Internet connection to
computers in the home, office... And each of those devices has its own unique characteristics, playing
the roles. Different roles in transmitting Internet signals.

1.1. Repeater

In large spaces, the signal transmission between hearing aids will often decrease. Computers that are
far from the signal source will be weaker than nearby devices. Therefore, you need equipment capable
of amplifying the signal, so that you can transmit the signal further but stronger.

Repeater is the device layer 1 (Physic Layer) in the OSI model. When we use a repeater, the physical
signal at the input is amplified, thereby providing a more stable and stronger signal to the output, so
that it can reach further locations. If you want to ensure the transmission speed with large office
areas, or use in telegrams, transmit information via optical fibers... then you should choose Repeater.

1.2. Hub concept:

Hub has many ports from 4 to 24 ports, and is considered as a multi-port repeater. When information
is transmitted into one port of the Hub, the other ports will also receive the information immediately.

P a g e | 20
Currently, there are 2 popular types of Hubs: Active Hub and Smart Hub:

 Active Hub: This type of Hub is often used much more commonly, needs to be powered when
operating. Active Hub is used to amplify incoming signals and divide the remaining ports to
ensure the necessary signal speed when used.
 Smart Hub: also known as Intelligent Hub, also functions similar to Active Hub, but is integrated
with a chip capable of automatically detecting errors on the network.

1.3. What is a Bridge network device?

If the Repeater is the first layer in the OSI model, Bridge is the second layer in this model (Data Link
Layer). This tool is used to connect between two networks to form a large network, such as a bridge
between two Ethernet networks.

When one computer transmits a signal to another with two completely different networks, Bridge
copies the packet and sends it to the destination network.

P a g e | 21
If the Repeater is the first layer in the OSI model, Bridge is the second layer in this model (Data Link
Layer). This tool is used to connect between two networks to form a large network, such as a bridge
between two Ethernet networks.

When one computer transmits a signal to another with two completely different networks, Bridge
copies the packet and sends it to the destination network.

1.4. Switch

The switch is considered as a multi-port bridge. However, if the Bridge has only two ports to work
with, the Switch is able to connect more depending on the number of ports on the Switch. This tool
has two main functions: transferring data frames from source to destination, building Switch tables.

A switch is a network hardware device that allows communication between devices within a network,
such as your local home network. Most routers in small businesses and households have built-in
switches.

1.5. Router

Router is classified in 3rd layer of OSI model (Network Layer), is responsible for connecting two or
more IP networks together.

The router connects different types of networks, from high-speed local Ethernet to low-speed long-
distance phone lines. But the ability of the Router to work slower than Bridge, because it takes
computation to find the route for the signal packets, especially when connecting to networks that are
not the same speed, it needs more work.

P a g e | 22
1.6. Gateway

Gateway connects two networks with different protocols, such as a network using IP protocol with a
network using IPX, Novell, DECnet, SNA... easily connect with each other.

Gateway is able to differentiate protocols, applications when transferring email from one network to
another, converting a remote session.

2. What is a server?

Server is a computer that is connected to the network, has a static IP, and has high productivity. On
that computer installed operating systems or specialized software to serve the client machines
(clients) in the same network, the server system can access the request to provide services or access
resources. , the data is on the server.

P a g e | 23
2.1. Virtual server (Virtual Private Server - VPS)

Virtual server (VPS) is a type of server created and configured with the use of hardware virtualization
technology to divide a physical server into many different virtual servers (VPS) on the server itself.
That reason. Those virtual servers (VPS) have all the same features as a normal physical server, but
that virtual server (VPS) shares the hardware resources from the physical server.

2.2. Cloud Server

Cloud server is a server combined from many different physical servers with a SAN storage system
(Storage Area Network), with fast and outstanding access speed to help the server operate smoothly.
Determine and help minimize downtime.

P a g e | 24
2.3. Web Server

On this server is installed specialized software serving the administration and hosting of website. The
web server displays the pages and runs the application through a web browser. The server that your
browser is connected to right now a web server that provides this page and any images you see on it.

Web servers (web servers) are used for everything apart from providing simple text and images, such
as for uploading and backing up files, backing up files online via storage services. Cloud storage service
or an online backup service.

P a g e | 25
2.4. Email Server

Email server supports sending and receiving emails. If you have an email client (email client) on your
computer (eg Microsoft Outlook, Thunder Bird...), the software will connect to the IMAP server or POP
server to download the mail to your computer and the SMTP server will send mail back via email
server.

2.5. FTP server

FTP server supports moving files through a file transfer protocol (File Transfer Protocol). FTP servers
can be accessed remotely through specialized FTP software such as FileZilla, CuteFTP...

P a g e | 26
2.6. Database server

On this server will be installed database management software, helping to manage, process and
retrieve data. Popular and popular database management systems such as MySQL, Oracle, Microsoft
SQL Server...

2.7. DNS Server

DNS server is the server, the domain name resolution system. Each computer joining the Internet has
an IP address. To help remember and convenient to use, we use the names to identify that computer
on the network and that name is collectively known as Domain Name. DNS server is responsible for
resolving the IP address into a domain name (Domain Name) and vice versa.

P a g e | 27
2.8. DHCP Server

DHPC's full name is Dynamic Host Configuration Protocol, which is responsible for allocating IP
addresses for devices participating in the network.

P4 Discuss the inter-dependence of workstation hardware with relevant networking


software.

Inter-dependence of workstation hardware with relevant networking software:

 A network file server is a computer system used for the purpose of managing the file system,
the network printer, handling network communication, and other functions. A server may be
dedicated is such case all of its processing power is allocated to network function, or it may be
non- dedicated which means that a part of server functions allocated as a work stations or DOS
based system.
 Network operating system: it is loaded into the servers’ hard disk along with the system
management tools and user utilities. When the system is started, NOS boots and other server
come under its control.
 Workstations: workstations or nodes are attached to the server through the network interfaces
card and the cable; workstations are normally intelligence systems, such as the IBM pc. But
DUMV terminals are used in mainframe computers. The concept of distributed process
depends on the fact that personal computer are attached to the network performed their own
processing after loading programs and data from servers. Due to this a work station is called an

P a g e | 28
active device on the network. After processing, files are stored back on the server where they
can be used by others workstation.

 +Network interface card-every device connected to a LAN needs network interface card to plug
into the LAN. For example, a PC needs to have an Ethernet card installed in it to connect to an
Ethernet LAN.
 +Network cabling: once the server, workstations, and network interface cards are in place,
network cabling is used to network everything together. The most popular type of network
cables: Twisted pair wiring, Co-axial cable, Fiber optics cable.
 That is some interdependence of the workstation hardware with the relevant network
software to properly implement the network.

P a g e | 29
P5 Provide a logical/physical design of the networked system with clear explanation and addressing table.

P a g e | 30
- The student room connects to 50 computers, so I use three switches because one switch can
connect 24 computers.
- The management department needed to connect thirty-five computers, so I used two switches
to connect thirty-five computers.
- Put a server department in the management room to be able to manage students.
- Place a wifi department in the management room so that phones, printers, laptops and other
wireless devices can connect.

P6 Evaluate the design to meet the requirements.

The network designed in the P5 section is sufficient to meet the given requirements and may also
meet future requirements.

 Two student rooms require 50 computers, the P5 has designed three switches, one switch for
twenty-four computers and three switches for twenty-seven computers. Thus, the design has
met the requirements and in the future the student room can still increase the number of
computers in the student room in the future.
 The administration department requires thirty-five computers. The design board in P5 has
two switches equivalent to fourteen computers and can be controlled by students through a
server mounted in the administration room. In addition, the management room is attached to
a wifi department so that wireless devices such as phones, laptops, and printers can connect.

P a g e | 31
P7 Implement a networked system based on a prepared design.

1. Information of devices in the design

NAME IP DEFAULT GATEWAY


PC 0 168.192.0.3 168.192.0.1
PC 1 168.192.0.2 168.192.0.1
PC 23 168.192.0.4 168.192.0.1
PC 2 178.192.0.5 178.192.0.1
PC 3 178.192.0.6 178.192.0.1
PC4 178.192.0.7 178.192.0.1
PC5 178.192.0.2 178.192.0.1
PC6 178.192.0.3 178.192.0.1
PC7 178.192.0.4 178.192.0.1
PC20 178.192.0.10 178.192.0.1
PC21 178.192.0.9 178.192.0.1
PC22 178.192.0.8 178.192.0.1
PC14 156.172.0.2 156.172.0.1
PC15 156.172.0.3 156.172.0.1
PC16 156.172.0.4 156.172.0.1
PC8 192.168.0.2 192.168.0.1
PC9 192.168.0.3 192.168.0.1
PC10 192.168.0.4 192.168.0.1
PC11 192.168.0.5 192.168.0.1
PC12 192.168.0.6 192.168.0.1
...

PC 50 … …

Server 156.172.0.5 156.172.0.1

Home Router 192.168.0.1

P a g e | 32
2. Ping from device to device in the design table

P a g e | 33
P a g e | 34
As a result, ping between five computers was successful

P a g e | 35
P8 Document and analyse test results against expected results.

 I use three switches to connect fifty computers in the student room and in the future I can
connect twenty-two more computers.
 In the student administration office I use two switches to connect to thirty-five computers and
in the future maybe thirteen computers.
 I use the server department in the student administration room to better manage students. In
addition, the management room also uses a wi-fi router so that wireless devices can connect
and work effectively such as phones, laptops and printers.

P a g e | 36
REFERENCES
1. ‘Mang may tinh’ by slideshare. Available at: https://www.slideshare.net/maidiep2610/mng-my-
tnh?from_action=save&fbclid=IwAR0XZJ3qmjvLs5IWqxhjAPi-J0jdjyCz1jhtf-5o7G_hNdvzJotog5STgMk

2. ‘Explain the Impact of Network Topology, Communication and Bandwidth Requirements’ by


ukessays. Available at: https://www.ukessays.com/essays/information-systems/explain-the-impact-
of-network-topology-communication-and-bandwidth-
requirements.php?fbclid=IwAR3lRSFeaAFuhn9mzR8FmQ4bm0uHQicNcHW4L9WFwBfp1krtajf9BhAjxa
4

3. ‘hững thông tin cơ bản về thiết bị mạng’ by quantrimang. Available at:


https://quantrimang.com/khai-niem-can-ban-ve-thiet-bi-mang-modem-router-
19028?fbclid=IwAR0Cgu40zxXcrAZQg3UMTVUNVWPStMuQROmU1HKCMLVloHa8cBpIvvs8eA8

4. ‘Máy Chủ Là Gì?’ by maychuviet. Available at: https://maychuviet.vn/may-chu-la-gi-server-la-


gi/?fbclid=IwAR3Fc-7MyqNv0NjtSIHgd-1WoaWtSHjervkTv3FeOkaAwe8iAt5pfQT6R54

5. ‘Network Topologies’ by tutorialspoint. Available at:


https://www.tutorialspoint.com/communication_technologies/communication_technologies_netwo
rk_topologies.htm?fbclid=IwAR2FlfysDEe1UAAP6oT5n7VYNCmaLx7-Jjk3u2g8pDNsLT66D7GYkuIWIqE

6. ‘What is a Computer Network? - Types & Definition’ by study. Available at:


https://study.com/academy/lesson/what-is-a-computer-network-types-definition-
quiz.html?fbclid=IwAR2VnC3GqA5ftAIkJB94hodMcTRwtI7pdctgPuwwtq1I0p2zNTSy1IUWuRI#:~:text=
A%20computer%20network%20is%20a,be%20considered%20a%20computer%20network

7. ‘ISO/OSI, IEEE 802.2, and TCP/IP’ by itprotoday. Available at:

https://www.itprotoday.com/compute-engines/isoosi-ieee-8022-and-
tcpip?fbclid=IwAR37YH5rnRHvGO7DVs3mEuLEh9GwRuFDEb4ih33ZJ55b2yAi3cLKiXx3Dtg

8. ‘Inter dependence of workstation hardware with’ by coursehero. Available at:

https://www.coursehero.com/file/p5gbqh1/Inter-dependence-of-workstation-hardware-with-relevant-
networking-software-A/

P a g e | 37

You might also like