You are on page 1of 26

Assignment Brief 1 (RQF)

Higher National Certificate/Diploma in Computing

Student Name/ID
Ngo Hoang Luyen / GCS200757
Number:
Unit Number and
Unit 2: Networking
Title:
Academic Year: 2021 – 2022
Unit Assessor: Van Ho
Assignment Title: Networking Infrastructure
Issue Date: April 1st, 2021
Submission Date:
Internal Verifier
Name:
Date:

Submission Format:
Format:

● The submission is in the form of an individual written report. This should be


written in a concise, formal business style using single spacing and font size 12.
You are required to make use of headings, paragraphs and subsections as
appropriate, and all work must be supported with research and referenced using the
Harvard referencing system. Please also provide a bibliography using the Harvard
referencing system.

Submission

● Students are compulsory to submit the assignment in due date and in a way
requested by the Tutor.
● The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/.
● Remember to convert the word file into PDF file before the submission on CMS.

Note:

● The individual Assignment must be your own work, and not copied by or from
another student.
● If you use ideas, quotes or data (such as diagrams) from books, journals or other
sources, you must reference your sources, using the Harvard style.
● Make sure that you understand and follow the guidelines to avoid plagiarism.
Failure to comply this requirement will result in a failed assignment.

Unit Learning Outcomes:


LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

Assignment Brief and Guidance:


Assignment scenario

You are employed as a network engineer by Nguyen Networking Limited, a high-tech


networking solution development company, which has branches in Ho Chi Minh City,
Hanoi, Da Nang and Can Tho. The company has been contracted to implement a
networking project from a local educational institute. The specification of the project is
given below:

● People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher


managers including the academic heads and the programme managers, and 3
computer network administrators.
● Resources: 50 student lab computers, 35 staff computers, and 3 printers.
● Building: 3 floors, all computers and printers are on the ground floor apart from
the IT labs – one lab located on the first floor and another located on the second
floor.

Task 1

The CEO of the company, Mr. Nguyen, has asked you to investigate and explain
networking principles, protocols and devices and submit a report.

You will need to produce a report that includes the following:


● An introduction to provide an overview of your report.
● Benefits and constraints of different types of networks and networking standards.
● The impact of network topology, speed of communication and bandwidth
requirements.
● Effectiveness of networking systems.
● Discussion on operating principles of networking devices and server types and
networking software.
● Discuss the relationship of workstation hardware with networking software.
● Explore a range of server types and justify the selection of a server, considering a
given scenario regarding cost and performance optimization.
● For the given specification, identify the topology protocol for the efficient
utilization of a networking system.

Learning Outcomes and Assessment Criteria (Assignment 1):

Learning
Pass Merit Distinction
Outcome

P1 Discuss the benefits


and constraints of
different network types M1 Compare
and standards. common D1 Considering a given
networking scenario, identify the
LO1 principles and how topology protocol selected
protocols enable the for the efficient utilization
P2 Explain the impact effectiveness of of a networking system.
of network topology, networked systems.
communication and
bandwidth requirements.

LO2 P3 Discuss the M2 Explore a range


operating principles of of server types and
networking devices and justify the selection
server types. of a server,
considering a given
scenario regarding
P4 Discuss the inter- cost and
dependence of performance
workstation hardware
with relevant optimisation.
networking software.

P1. Discuss the benefits and constraints of different network types and standards.

NETWORK Define Benefits Constraints

- Central server which is


- Data is stored on a local present on the LAN
- There are two primary LAN types: server, it can be guaranteed architecture manages all the
wired LANs and wireless LANs to be secure attached computers. If in
(WLANs). A wired LAN uses case the server encounters
switches and Ethernet cabling to - A single computer with the
any faults all the connected
connect endpoints, servers and licensed software can be
computers are affected too
internet of things (IoT) devices to the shared among other users in
corporate network the network - Appearance of virus in a
LAN based infrastructure is
- Connects network devices in such a - Easy to design and
maintain. highly dangerous. If one the
way that personal computer and
attached computers are
workstations can share data, tools and
affected with a virus, it can
LAN programs.
- The devices can use a easily spread to the
- remaining computers present
single Internet connection,
on the network.
- The group of computers and devices share files with one another,
are connected together by a switch, or print to shared printers, and - Even though LAN saves
stack of switches, using a private be accessed and even lots of money in terms of
addressing scheme as defined by the controlled by one another resource sharing, the initial
TCP/IP protocol. cost involved in setting up
- Private addresses are unique in - speeds of LAN are the network is quite high.
relation to other computers on the normally 100 or 1000 Mbps. This is mainly due to the
local network. requirement of a special
software that is needed to
make a server

- It similar to a local area network - It is very difficult to


(LAN) but spans an entire city or The connection range is manage if the size and
MAN
campus, or some other municipal or relatively large. number of LANs network
organizational territory increase. This is due to
This service also allows the
- MAN network is a network model deployment of professional security and extra
that is connected from many LAN applications with ease. configuration problems
together through cables, transmission
- According to their design, - Medium bandwidth
facilities, ... The connection range is
may deliver some benefits,
in a wide area like in a city. - Highly technical people
such as firewall
- It covers a large geographical area require to setup MAN. The
centralization. Having a
and may serve as an ISP (Internet technical people are network
more central gatekeeping
Service Provider). administrators and
point for the Internet can cut
troubleshooters
down on malware and other
- MANs are formed by connecting - Installation costs
threats. A MAN may also
multiple LANs are higher than
provide more efficient forms
of administration and data LAN
entry.

- Setting up WAN for the


- Its simplest form, a wide-area
first time in office costs
network (WAN) is a collection of
- WAN provides a direct, higher money. It may
local-area networks (LANs) or other
dedicated connection involve purchasing routers,
networks that communicate with one
another. A WAN is essentially a through which your data can switches, and extra security
pass. This limits software.
network of networks, with the
Internet the world's largest WAN opportunities for others to
- It’s hard to design and
- The sites they connect could be a intercept your data as it is in
maintain a Metropolitan
few miles apart or halfway around the transit between locations
WAN Area Network.
globe. In an enterprise, the purposes - Wan covers a large
of a WAN could include connecting geographical area of 1000 - In some areas, ISP faces
branch offices or even individual km or more problems due to electricity
remote workers with headquarters or supply or bad lines structure.
the data center in order to share - Can connect branches Customers often face
corporate resources and through wan Ability to store connectivity issues or slow
communications. and share information. Internet speed issues. The
solution to this is to purchase
a dedicated line from ISP.

In the today world, Two devices are in network if a process in one device is able to exchange information
with a process in another device. Networks are known as a medium of connections between nodes (set of
devices) or computers. A network consists of group of computer systems, servers, networking devices are
linked together to share resources, including a printer or a file server. The connections is established by
using either cable media or wireless media.

Type of network including:

- LAN (Local Area Network)


- MAN (Metropolitan Area Networks)
- WAN (Wide Area Networks)

LANS NETWORK CHART

What are the benefits and constraints of different network types and standards?

LAN MAN WAN

Metropolitan Area Wide Area


Name Local Area Network
Network Network

Small range - in a room, The sharing range is The share range


Range
office, campus. up to 50 km unlimited

bigger than LAN and 256Kbps to


data rates 10 to 100 Mbps
smaller than WAN 2Mbps

Bandwidth Large medium small

Transmission line and ATM, Frame


Topology DQDB
round structure Relay, Sonnet

Network
Normal Complex Complex
administration

Cost Cheap Expensive V.Expensive


1. P2 Explain the impact of network topology, communication and bandwidth requirements.
● the impact of network topology
Network topology refers to how various nodes, devices, and connections on your network are
physically or logically arranged in relation to each other. Think of your network as a city, and the
topology as the road map. Just as there are many ways to arrange and maintain a city—such as
making sure the avenues and boulevards can facilitate passage between the parts of town getting
the most traffic—there are several ways to arrange a network. Each has advantages and
disadvantages and depending on the needs of your company, certain arrangements can give you a
greater degree of connectivity and security.

There are two approaches to network topology: physical and logical. Physical network topology, as
the name suggests, refers to the physical connections and interconnections between nodes and the
network—the wires, cables, and so forth. Logical network topology is a little more abstract and
strategic, referring to the conceptual understanding of how and why the network is arranged the
way it is, and how data moves through it.

What’s the Most Common Type of Network Topology?

Building a local area network (LAN) topology can be make-or-break for your business, as you
want to set up a resilient, secure, and easy-to-maintain topology. There are several different types
of network topology and all are suitable for different purposes, depending on the overall network
size and your objectives.
❖ Star Topology

A star topology, the most common network topology, is laid out so every node in the network is directly
connected to one central hub via coaxial, twisted-pair, or fiber-optic cable. Acting as a server, this central
node manages data transmission—as information sent from any node on the network has to pass through
the central one to reach its destination—and functions as a repeater, which helps prevent data loss.

● Advantages of Star Topology

Star topologies are common since they allow you to conveniently manage your entire network from a
single location. Because each of the nodes is independently connected to the central hub, should one go
down, the rest of the network will continue functioning unaffected, making the star topology a stable and
secure network layout.

Additionally, devices can be added, removed, and modified without taking the entire network offline.

On the physical side of things, the structure of the star topology uses relatively little cabling to fully
connect the network, which allows for both straightforward setup and management over time as the
network expands or contracts. The simplicity of the network design makes life easier for administrators,
too, because it’s easy to identify where errors or performance issues are occurring.;

● Disadvantages of Star Topology

On the flipside, if the central hub goes down, the rest of the network can’t function. But if the central hub
is properly managed and kept in good health, administrators shouldn’t have too many issues.

The overall bandwidth and performance of the network are also limited by the central node’s
configurations and technical specifications, making star topologies expensive to set up and operate.

❖ Bus Topology
A bus topology orients all the devices on a network along a single cable running in a single direction from
one end of the network to the other—which is why it’s sometimes called a “line topology” or “backbone
topology.” Data flow on the network also follows the route of the cable, moving in one direction.

Advantages of Bus Topology

Bus topologies are a good, cost-effective choice for smaller networks because the layout is simple,
allowing all devices to be connected via a single coaxial or RJ45 cable. If needed, more nodes can be
easily added to the network by joining additional cables.

Disadvantages of Bus Topology

However, because bus topologies use a single cable to transmit data, they’re somewhat vulnerable. If the
cable experiences a failure, the whole network goes down, which can be time-consuming and expensive to
restore, which can be less of an issue with smaller networks.

Bus topologies are best suited for small networks because there’s only so much bandwidth, and every
additional node will slow transmission speeds.

Furthermore, data is “half-duplex,” which means it can’t be sent in two opposite directions at the same
time, so this layout is not the ideal choice for networks with huge amounts of traffic.

❖ Dual-Ring Topology

Advantages of ring Topology

● ery orderly network where every device has access to the token and the opportunity to transmit
● Performs better than a bus topology under heavy network load
● Does not require a central node to manage the connectivity between the computers
● Due to the point to point line configuration of devices with a device on either side (each device is
connected to its immediate neighbor), it is quite easy to install and reconfigure since adding or
removing a device requires moving just two connections.
● Point to point line configuration makes it easy to identify and isolate faults.
● Reconfiguration for line faults of bidirectional rings can be very fast, as switching happens at a
high level, and thus the traffic does not require individual rerouting.

Disadvantages of Ring Topology


● One malfunctioning workstation can create problems for the entire network. This can be solved by
using a dual ring or a switch that closes off the break.
● Moving, adding and changing the devices can affect the network
● Communication delay is directly proportional to number of nodes in the network
● Bandwidth is shared on all links between devices
● More difficult to configure than a Star: node adjunction = Ring shutdown and reconfiguration
❖ Tree Topology

Pros of Tree Topology

Combining elements of the star and bus topologies allows for the easy addition of nodes and
network expansion. Troubleshooting errors on the network is also a straightforward process, as
each of the branches can be individually assessed for performance issues.

Cons of Tree Topology

As with the star topology, the entire network depends on the health of the root node in a tree
topology structure. Should the central hub fail, the various node branches will become
disconnected, though connectivity within—but not between—branch systems will remain.

Because of the hierarchical complexity and linear structure of the network layout, adding more
nodes to a tree topology can quickly make proper management an unwieldy, not to mention costly,
experience. Tree topologies are expensive because of the sheer amount of cabling required to
connect each device to the next within the hierarchical layout.

❖ Mesh Topology
A mesh network is a network topology in which each node relays data for the network. All mesh nodes
cooperate in the distribution of data in the network. It can be applied to both wired and wireless networks.

Advantages of Mesh topology

● Data can be transmitted from different devices simultaneously. This topology can withstand high
traffic.
● Even if one of the components fails there is always an alternative present. So data transfer doesn’t
get affected.
● Expansion and modification in topology can be done without disrupting other nodes.

Disadvantages of Mesh topology


● There are high chances of redundancy in many of the network connections.
● Overall cost of this network is way too high as compared to other network topologies. 3) Set-up
and maintenance of this topology is very difficult. Even administration of the network is tough.

● What is data communication?

Data communication refers to the exchange of data between a source and a receiver via form of
transmission media such as a wire cable. Data communication is said to be local if communicating devices
are in the same building or a similarly restricted geographical area. The meanings of source and receiver
are very simple. The device that transmits the data is known as source and the device that receives the
transmitted data is known as receiver. Data communication aims at the transfer of data and maintenance of
the data during the process but not the actual generation of the information at the source and receiver.

What is bandwidth?

Bandwidth is the difference between the upper and lower frequencies in a continuous set of frequencies. It
is typically measured in hertz, and may sometimes refer to passband bandwidth, sometimes to baseband
bandwidth, depending on context. Passband bandwidth is the difference between the upper and lower
cutoff frequencies of, for example, a bandpass filter, a communication channel, or a signal spectrum. In
case of a low-pass filter or baseband signal, the bandwidth is equal to its upper cutoff frequency.
Bandwidth in hertz is a central concept in many fields, including electronics, information theory, digital
communications, radio communications, signal processing, and spectroscopy. A key characteristic of
bandwidth is that any band of a given width can carry the same amount of information, regardless of
where that band is located in the frequency spectrum. For example, a 3 kHz band can carry a telephone
conversation whether that band is at baseband or modulated to some higher frequency.

● Types of Bandwidth:
Symmetric Bandwidth

Symmetric bandwidth refers to the same volume and speeds the amount of data is communicated or
travels between two given points. Uploading and downloading of files will have the same capacity –
symmetrical. Symmetric communication can be seen in the different cities in the world through fiber
optics and cable internet. The best example of symmetric bandwidth connection application is video
conferencing. You can enjoy buffer-free transfer of video files with this type of connection.
Asymmetric Bandwidth

In this type, unlike symmetrical, both directions do not have the same amount of data communicated per
second. The upstream data transfer is lower than the downstream data flow. This is called the
Asymmetrical Digital Subscriber Line (ADSL) and is the perfect example of this type of bandwidth. The
download speed of an ADSL is much higher than upload speed mainly because downloading files and
media are the most used than uploading which only needs to send a request to access the URLs.

2. P3 Discuss the operating principles of networking devices and server types.

A. networking devices
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal
over the same network before the signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the same network. An important point to
be noted about repeaters is that they do not amplify the signal. When the signal becomes
weak, they copy the signal bit by bit and regenerate it at the original strength. It is a 2 port
device.

2. Hub – A hub is basically a multiport repeater. A hub connects multiple wires coming
from different branches, for example, the connector in star topology which connects
different stations. Hubs cannot filter data, so data packets are sent to all connected devices.
In other words, the collision domain of all hosts connected through Hub remains one. Also,
they do not have the intelligence to find out the best path for data packets which leads to
inefficiencies and wastage.
❖ Types of Hub
● Active Hub:- These are the hubs that have their own power supply and can clean,
boost, and relay the signal along with the network. It serves both as a repeater as well as
a wiring center. These are used to extend the maximum distance between nodes.
● Passive Hub :- These are the hubs that collect wiring from nodes and power supply
from the active hub. These hubs relay signals onto the network without cleaning and
boosting them and can’t be used to extend the distance between nodes.
● Intelligent Hub :- It works like active hubs and includes remote management
capabilities. They also provide flexible data rates to network devices. It also enables an
administrator to monitor the traffic passing through the hub and to configure each port
in the hub.

3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add on the
functionality of filtering content by reading the MAC addresses of source and destination.
It is also used for interconnecting two LANs working on the same protocol. It has a single
input and single output port, thus making it a 2 port device.
❖ Types of Bridges
● Transparent Bridges:- These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e. whether or not a bridge is added or deleted
from the network, reconfiguration of the stations is unnecessary. These bridges
make use of two processes i.e. bridge forwarding and bridge learning.
● Source Routing Bridges:- In these bridges, routing operation is performed by the
source station and the frame specifies which route to follow. The host can discover
the frame by sending a special frame called the discovery frame, which spreads
through the entire network using all possible paths to the destination.

4. Switch – A switch is a multiport bridge with a buffer and a design that can boost its
efficiency(a large number of ports imply less traffic) and performance. A switch is a data link layer
device. The switch can perform error checking before forwarding data, which makes it very
efficient as it does not forward packets that have errors and forward good packets selectively to the
correct port only. In other words, the switch divides the collision domain of hosts, but broadcast
domain remains the same.

5. Routers – A router is a device like a switch that routes data packets based on their IP addresses.
The router is mainly a Network Layer device. Routers normally connect LANs and WANs
together and have a dynamically updating routing table based on which they make decisions on
routing the data packets. Router divide broadcast domains of hosts connected through it
6. Gateway – A gateway, as the name suggests, is a passage to connect two networks together that may
work upon different networking models. They basically work as the messenger agents that take data from
one system, interpret it, and transfer it to another system. Gateways are also called protocol converters and
can operate at any network layer. Gateways are generally more complex than switches or routers. Gateway
is also called a protocol converter.

7. Brouter – It is also known as the bridging router is a device that combines features of both bridge and
router. It can work either at the data link layer or a network layer. Working as a router, it is capable of
routing packets across networks, and working as the bridge, it is capable of filtering local area network
traffic.
8. NIC – NIC or network interface card is a network adapter that is used to connect the computer to the
network. It is installed in the computer to establish a LAN. It has a unique id that is written on the chip,
and it has a connector to connect the cable to it. The cable acts as an interface between the computer and
router or modem. NIC card is a layer 2 device which means that it works on both physical and data link
layer of the network model.

B. server types

1. Application Servers

Sometimes referred to as a type of middleware, application servers occupy a large chunk of computing

territory between database servers and the end user, and they often connect the two.

2. Client Servers

In the client/server programming model, a server is a program that awaits and fulfills requests from client

programs in the same or other computers. A given application in a computer may function as a client with

requests for services from other programs and also as a server of requests from other programs.

3. Collaboration Servers

In many ways, collaboration software, once called ‘groupware,’ demonstrates the original power of the

Web. Collaboration software designed to enable users to collaborate, regardless of location, via the

Internet or a corporate intranet and to work together in a virtual atmosphere.

4. FTP Servers
One of the oldest of the Internet services, File Transfer Protocol, makes it possible to move one or more

files securely between computers while providing file security and organization as well as transfer control.

5. List Servers

List servers offer a way to better manage mailing lists, whether they be interactive discussions open to the

public or one-way lists that deliver announcements, newsletters or advertising.

6. Mail Servers

Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate

networks (via LANs and WANs) and across the Internet.

7. Open Source Servers

From your underlying open source server operating system to the server software that help you get your

job done, open source software is a critical part of many IT infrastructures.

8. Proxy Servers

Proxy servers sit between a client program (typically a Web browser) and an external server (typically

another server on the Web) to filter requests, improve performance, and share connections.

9. Real-Time Communication Servers

Real-time communication servers, formerly known as chat servers or IRC Servers, and still sometimes

referred to as instant messaging (IM) servers, enable large numbers users to exchange information near

instantaneously.
10. Server Platforms

A term often used synonymously with operating system, a platform is the underlying hardware or software

for a system and is thus the engine that drives the server.

11. Telnet Servers

A Telnet server enables users to log on to a host computer and perform tasks as if they’re working on the

remote computer itself.

12. Virtual Servers

In 2009, the number of virtual servers deployed exceeded the number of physical servers. Today, server

virtualization has become near ubiquitous in the data center. From hypervisors to hybrid clouds,

ServerWatch looks at the latest virtualization technology trends.

13. Web Servers

At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving

it across the network to a user’s Web browser. This entire exchange is mediated by the browser and server

talking to each other using HTTP.

3. P4 Discuss the inter-dependence of workstation hardware with relevant networking software.

Workstation hardware:
- This is a computer devoted to a user or group of users involved in business or professional work. It
contains one or more high resolution displays and a faster processor than a personal computer. A
workstation also has greater multitasking capability because of additional random access memory
(RAM), drives and drive capacity. A workstation may also have a higher speed graphics adapters
and more connected peripherals (plug).

Operating System:
- An operating system (OS) is system software that manages computer hardware, software
resources.It manages the computer's memory and processes, allows you to communicate with the
computer hardware.

Traditional Network:
- Is formed, when more than one computer is connected among each other, for the purpose of
communication among them. There are servers also present in a network, which provides many
data storage places. Servers in order to manage so many computers need an operating system.
When a request is received from computer, over the internet to the server, there are some
scheduling algorithms, which determines what or resource is to be given to which request. In this
way a software interacts, with the workstation hardware
Networking Sofware
- Networking software is a foundational element for any network. It helps administrators deploy,
manage, and monitor a network. Traditional networks are made up of specialized hardware, such as
routers and switches, that bundle the networking software into the solution. Software-defined networking
(SDN) separates that software from the hardware, making it easier to innovate and adapt the network to
quickly meet changing network demands. The separation of functions from hardware, such as firewalls or
load balancing, is called network functions virtualization (NFV).

- Network software allows multiple devices, such as desktops, laptops, mobile phones, tablets, and
other systems to connect to one another, as well as other networks. The internet is a prime example of a
globally connected system of servers and computers that relies on networking software to ensure
accessibility by end users.
S.No. SDN TRADITIONAL NETWORK

01 Software Defined Network is virtual Traditional network is the old


. networking approach. conventional networking approach.

02 Software Defined Network is Traditional Network is distributed


. centralized control. control.

03
. This network is programmable. This network is non programmable.

04 Software Defined Network is open


. interface. Traditional network is closed interface.

In Software Defined Network data


05 plane and control plane are decoupled In traditional network data plane and
. by software. control plane are mounted on same plane.

06 It supports automatic configuration so It supports static/manual configuration so


. it takes less time. it takes more time.

- Mob
07 It can prioritize and block specific It leads all packets in the same way no ile
. network packets. prioritization support.

08 It is difficult to program again and to


. It is easy to program as per need. replace existing program as per use.

09 Cost of Software Defined Network is


. low. Cost of Traditional Network is high.

10 Structural complexity is low in Structural complexity is high in


. Software Defined Network. Traditional Network.

11 Extensibility is high in Software Extensibility is low in Traditional


. Defined Network. Network.

In SDN it is easy to troubleshooting In Traditional network it is difficult to


12 and reporting as it is centralized troubleshoot and report as it is distributed
. controlled. controlled.
technology- Mobile technology is a technology which is used for cellular communication. Before
there was no mobile technology to help people communicate easily but nowadays people can
easily communicate with one another there are various mobile technologies. For example there is
apple, Samsung. With the technology nowadays you are able to connect to wireless internet and
Bluetooth you can communicate with people easily on social media once you're connected to
wireless internet and you can easily share information over Bluetooth. There is 3G and 4G 3G
stands for the third generation and 4G stands for the fourth generation and 4G connection is much
faster than a 3G connection.

Difference between SDN and Traditional Network :

4. M1 Compare common networking principles and how protocols enable the effectiveness of
networked systems.

5. M2 Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimisation.

A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to help the files that form Web
pages to users, in reply to their requests, which are promoted by their computers' HTTP clients. Devoted
computers and appliances may be referred to as Web servers as well.
File server is a device that panels access to separately stored files, as part of a multiplier system, a file
server is a computer attached to a network that has the primary purpose of providing a location for shared
disk access.
Database server It is similar to data ware house where the website stores or keeps their data and
information. A Database Server is a computer in a LAN that is devoted to database storage and
recovery.The data base server holds the Database Management System (DBMS) and the databases. Upon
requests from the client machines, it searches the database for selected records and pases them back over
the network.
Virtualization server is a virtualization method that includes dividing a physical server into a number of
small, virtual servers with the help of virtualization software. In server virtualization, each virtual server
runs multiple operating system instances at the same time.
Terminal service server also occasionally called a communication server, is a hardware device or server
that provides terminals, such as PCs, printers, and other devices, with a mutual connection point to a local
or wide area network (WAN)

Terminal services server a hardware device or server that allows one or more terminals to
Connect to a local area network (LAN) or the Internet without the need for each terminal to
Have a net
work interface card(NIC) or modem. Terminals can be PCs, printers, IBM 3270 emulators ot
Her devices with a RS-232 / RS-423 serial port interface.
I would choose the database server for the chosen scenario because Database Server gives new
Meaning to the word performance in the client/server world. Performance developments are
achieved primarily by reducing network traffic, intelligently maintaining database files, and
providing intelligent lock management. When associated to other leading server solutions,
Advantage Database Server offers exceptional performance without the overhead associated with
other SQL-based database management systems. The cost will be it will cost around $499 dollars
and the reason why I choose a database server is because for the given scenario being a college
having a
Database server will be helpful for looking for student records. The Operating system requirement
for the database server is;
a) English Windows 2003
b) English Windows 2008
c) English Windows 2008 R2
d) English Windows Server 2012 R2
e) Linux
Supported Database management systems
Microsoft SQLServer2012SP2
Microsoft SQLServer2008R2SP2
Microsoft SQL Server 2005 R2SP2
32- bit and 64-bit English Microsoft SQL Server 2008, standard and enterprise editions
32-bit and 64-bit Oracle™ 10g Release 2 (10.2.0.2 and higher),standard and enterprise editions
32-bit and 64-bit Oracle 11g Release1 and Release 2,standard and enterprise edition Protocolo

6. D1 Considering a given scenario, identify the topology protocol selected for the efficient
utilization of a networking system.
A protocol is a set of rules and procedures for communicating data. Rules are defined for each step and
process during communication between two or more computers. Networks have to follow these rules to
successfully transmit data. The Ethernet is a local area network (LAN) set of protocols which serves the
physical and data 1 ink layers. Ethernet utilizes a linear bus or star topology. Ethernet served as the basis
for the IEEE 802.3 standard. The Ethernet deals with the low level Physical and Data Link Layers. The
Data Link Layer is divided into two sublayers: Logical Link Control (LLC). This sublayer establishes the
transmission paths between computers or devices on a network.

Media Access Control (MAC). On a network, the network interface card (NIC) has a unique hardware
address which identifies a computer or peripheral device. The hardware address is used for the MAC
sublayer addressing. Ethernet uses the MAC hardware addresses for the source and destination for each
packet transmitted. Ethernet uses CSMA/CD when transmitting packets. The Carrier Sense Multiple
Access with Collision Detection (CSMA/CD) is an algorithm for transmitting and receiving packets over a
common network hardware medium, by aiding in avoiding transmission collisions. The network is
checked for other transmissions; when the way is clear, the computer transmissions can begin. If a
collision is detected the packet is retransmitted later. The topology that I will use in the scenario will be
bus topology.

Reference

GraduateWay. 2021. Benefits And Constraints Of Different Networking Computer Science Example | GraduateWay.
[online] Available at: <https://graduateway.com/benefits-and-constraints-of-different-networking-computer-
science-essay/> [Accessed 26 August 2021].

Software Reviews, Opinions, and Tips - DNSstuff. 2021. What is Network Topology? Best Guide to Types &
Diagrams - DNSstuff. [online] Available at: <https://www.dnsstuff.com/what-is-network-topology> [Accessed 26
August 2021].

Jones IT | Managed IT Services, IT Support, IT Consulting. 2021. How To Design A Network Topology | Jones IT.
[online] Available at: <https://www.itjones.com/blogs/2020/11/22/a-guide-to-network-topology> [Accessed 26
August 2021].

Devices, N., 2021. Networking Devices | List of Top Networking Devices To Know. [online] EDUCBA. Available at:
<https://www.educba.com/networking-devices/> [Accessed 26 August 2021].

Techopedia.com. 2021. What is a Workstation (WS)? - Definition from Techopedia. [online] Available at:
<https://www.techopedia.com/definition/5140/workstation-ws> [Accessed 26 August 2021].

Igi-global.com. 2021. What is Mobile Technology | IGI Global. [online] Available at: <https://www.igi-
global.com/dictionary/mobile-strategy-business-solution/18956> [Accessed 26 August 2021].

Thakur, M., 2021. ESP8266 Web Server | Circuits4you.com. [online] Circuits4you.com. Available at:
<https://circuits4you.com/2016/12/16/esp8266-web-server/> [Accessed 26 August 2021].
High Performance Browser Networking. 2021. Networking 101: Transport Layer Security (TLS) - High Performance
Browser Networking (O'Reilly). [online] Available at: <https://hpbn.co/transport-layer-security-tls/> [Accessed 26
August 2021].

You might also like