Professional Documents
Culture Documents
luonghoanghai (BKC12049) - Networking - Asm 1 lần 1
luonghoanghai (BKC12049) - Networking - Asm 1 lần 1
ASSIGNMENT NUMBER: 1
ASSIGNMENT NAME: Consulting and Designing networking systems for Gold Star
1
Summative Feedback:
Internal verification:
2
Assignment 1
Contents
Introduction ................................................................................................................. 4
LO1.5 The impact of current network technology, communication and standards: .....................10
LO2.3 The inter-dependence or workstation of hardware with relevant networking software ....13
3
4
Introduction
The design and installation of a computer network is a very difficult step, to be able to design a complete network
system at the same time scientifically, requiring the designer to think as well as knowledge about it. Whether the
network runs well or not, maintains it for a long time or not, often malfunctions or is few, it is largely derived
from whether the network design is scientific or not. The installation of devices also requires science, the network
system can run evenly thanks to connected devices (Modem, Router, Switch, Hub,…), and thus placing the devices
where it is reasonable to be able to distribute network signals evenly to all devices used, It's also a small request.
In addition, the installation of cables and wires is also a requirement for the designer, installation of network
wiring, network splints must be neat, not entangled while moving, traveling, and easy to replace and repair when
problems occur. Installing a network system is easy to manage, easy to upgrade and limit problems to the lowest
level, while ensuring high security, which is a problem that requires the designer to pay great attention.
LO1 Examine networking principles and their protocols
5
protocol (IP protocol). The system consists of thousands of smaller computer networks of businesses,
research institutes and universities, individual users and governments around the globe.
6
- Telnet (Terminal Network) is the main method used to manage network devices at the
command level. Or they are used on connections to the internet or connections at the
LAN local computer network.
- Telnet's default port is 23.
i. Simple Mail Transfer Protocol (SMTP)
- Simple Mail Transfer Protocol (SMTP) is a standard for transmitting email over the
internet. They have the main function of transferring email from the source mail server
to the destination mail server and transferring email from the end user to the mail
system.
- Smtp's default port is 25 and SMTPS port (secured) is 465
j. Domain Name System (DNS)
- Domain Name System (DNS) is a system that allows the corresponding setup between
IP addresses and domains on the internet. Thanks to this protocol, it is possible to
convert a domain name to an IP address.
- default port of DNS is 53.
k. Post Office Protocol version 3 (POP3)
- Post Office Protocol version 3 (POP3) is an application tier protocol, used to obtain
email from a mail server, via a TCP/IP connection. In version 3, the client takes
complete content from the server's mailbox and deletes the content from it.
- default port is 110 and the secure POP3 port is 995.
l. Internet Message Access Protocol (IMAP)
- The Internet Message Access Protocol (IMAP) is the internet standard protocol used by
email applications to retrieve email messages from a mail server via a TCP/IP
connection. IMAP does not delete content from the server mailbox.
- The default IMAP port is 143 and the secure IMAP port is 993.
m. Simple Network Management Protocol (SNMP)
- Simple Network Management Protocol (SNMP) is a set of protocols that not only allow
the testing of network devices such as routers, switches, servers, etc. Operate but also
support the operation of these devices optimally. The SNMP function is to monitor,
configure and control network devices remotely. SNMP trap can also be configured on
network devices to notify when there is a specific activity.
n. Hypertext Transfer Protocol over SSL/TLS (HTTPS)
- Hypertext Transfer Protocol over SSL/TLS (HTTPS) is a combination of http protocol
and SSL security protocol or TLS that allows the exchange of information securely on
the Internet.
- default https port is 443.
LO1.3 Networking Topologies
Network Topology is the arrangement of the various elements (links, nodes, etc.) of a computer network.
Primarily, it is the topology of a computer network, and can be described in terms of physics and logic. The
physics and logic. The physical topology (physical topology) is the arrangement of the various network elements,
including equipment storage and cabling setting while the logical topology specifies how the data flow in the
network works. Node distances, physical intersections, transmission rates, and/or signal types can vary between
two networks even though their topologies may be identical.
1) Star topology
In this network, each and every node maintains a totally individual connection to a switch, where all
other nodes are connected. It has a direct connection with a switch to the node. the weakness is
needed more wire to set up a network
Benefits of Star topology:
• When an error occurs in a workstation, the whole system is working normally. This is
because the star-shaped network works on the principle of parallel connectivity.
• The speed is quite fast.
7
• The network structure is quite simple to make it easy to check and repair when there is
a problem in the system. This also makes control algorithms more stable.
• This network can be narrowed or expanded at the user's will.
• Helps to limit network stagnation factors because this type of link allows direct
connection of computers to the Hub (focuser) by twisted cable without going through
the BUS axis.
8
This type of topology is almost like an extended star topology, but the network is linked to a device
that checks traffic on the network instead of linking to a Hub or Switch. The workstations in the
system are arranged in layers depending on their functionality.
Benefits of Hierarchical topology:
• The advantage of Hierarchical topology is the ability to manage centralized
equipment, increasing system security.
Disadvantages of Hierarchical topology:
• Its disadvantage is that it is expensive due to having to use multiple focus sets.
LO1.4 OSI model and TCP/IP
A. OSI model
The Open System Interconnection (OSI) model is a model proposed by ISO in 1977 and first published in 1984. In
order for computers and network devices to communicate with each other, there must be rules of
communication that are acceptable to the parties. The OSI model is a template that helps us understand how
data travels through the network while also helping us understand the network functions that take place in each
layer.
In the OSI model there are seven layers, each describing a partial function independently. The layer separation of
this model offers the following benefits:
• Divide network information activities into smaller, simpler parts that make it easier for
us to survey and learn.
• Standardize network components to enable network development from multiple
product vendors.
• Preventing the change of one layer from affecting the other, thus enabling each layer
to grow independently and more quickly.
OSI reference model is divided into seven layers with the following functions:
• Application Layer: the interface between the application and the network.
• Presentation Layer: agreement on data exchange format.
• Session Layer: allows users to set up connections.
• Transport Layer: ensures communication between the two systems.
9
• Network Layer: directs data transmission in an inter-network environment.
• Data link Layer: determines access to devices
• Physical layer: converts data into bits and transmits it.
B. TCP/IP
U.S. government departments and offices have been aware of the importance and potential of
Internet engineering for many years, as well as have financed research, to truly acquire a global
Internet. The formation of Internet engineering is the result of research under funding from the
Defense/Advanced Research Projects Agency ARPA/DARPA. The ARPA technique consists of a set of
network standards, detailing how information computers communicate with each other, as well as
conventions for interconnecting and traffic routing networks. The official name is TCP/IP Internet
Protocol Suite and is often referred to as TCP/IP, which can be used to communicate through a set of
interconnected networks. It can be used to link networks within a company, not necessarily to other
external networks.
Layers of the TCP/IP reference model:
The TCP/IP reference model is similar to the OSI architecture, the following are some of the properties of the
layers in the TCP/IP reference model:
• Application class: manages protocols, such as supporting presentation, encryption, and call
management. The Application class also supports many applications, such as FTP (File Transfer
Protocol), HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail Transfer Protocol), DNS
(Domain Name System), TFTP (Trivial File Transfer Protocol).
• Transport class: take charge of transport from source to destination. The Transport Tier is
responsible for data transmission through two rituals: TCP (Transmission Control Protocol) and
UDP (User Datagram Protocol
• Internet class: Take charge of choosing the best route for packets. The main ritual used on this
floor is the IP (Internet Protocol).
• Network Interface layer: similar to the data link and physical layers of OSI architecture
C. Compare the OSI and TCP/IP models
Similarities:
10
• Both have layered architectures.
• There is an application class, although the services in each class are different.
• There are transport and network classes.
• Use packet transfer techniques packet (packet-switched)
• Professional network managers need to know the above two models.
Different points:
• TCP/IP model combines presentation and session class into application class.
• The TCP/IP model combines the Data Link and Physical layers into one class.
• The TCP/IP model is simpler because there are fewer layers.
• TCP/IP etiquette is standardized and is commonly used throughout the world.
• OSPF: It is a routing protocol that is commonly used in bigger networks, either single or group
networks. The Internet Engineering Task Force created it. It's also possible to use it as a gateway
protocol.
• FTP: File Transfer Protocol (FTP) is a network standard protocol for transferring data from a client to a
server or from one server to another. A username, password, and host address are required for a user
or administrator to upload a file to a website.
• SMTP: The Simple Mail Transfer Protocol (SMTP) acts as a medium for transferring e-mail. SMTP is
always used in conjunction with the POP3 service.
• TCP/IP: Transmission Control Protocol and Internet Protocol is a set of protocol stacks. Basically, it is
two different protocols. TCP/IP is closely related to FTP, SMTP, HTTP.
• Bandwidth: Bandwidth is the capacity of a wired or wireless network communications link to transmit
the maximum amount of data from one point to another over a computer network or internet
connection in a given amount of time -- usually one second. Synonymous with capacity, bandwidth
describes the data transfer rate. Bandwidth is not a measure of network speed -- a common
misconception.
• The length of time it takes to download or upload data over the Internet is determined by
bandwidth. A connection with sufficient bandwidth ensures a smooth and responsive user
experience. The more bandwidth available, the faster data may be transmitted; nevertheless, the
law of diminishing returns applies in this case. The performance of the Internet is unaffected once
you have enough bandwidth.
• Hubs
A hub, sometimes called a concentrator, is a device that connects a number of network
cables coming from client computers to a network. Hubs come in many different sizes, supporting
from as few as 2 computers up to 60 or more computers. (The most common hub size supports 24
network connections.) All the network connections on a hub share a single collision domain, which
is a fancy way of saying all the connections to a hub “talk” over a single logical wire and are subject
to interference from other computers connected to the same hub.
11
• Switch
like a hub, a switch also works at the layer of LAN (Local Area Network) but you can say that a
switch is more intelligent than a hub. While the hub just does the work of data forwarding, a
switch does 'filter and forwarding' which is a more intelligent way of dealing with the data packets.
So, when a packet is received at one of the interfaces of the switch, it filters the packet and sends
it only to the interface of the intended receiver
• Repeaters
A repeater operates at the physical layer. Its job is to regenerate the signal over the same
network before the signal becomes too weak or corrupted so as to extend the length to which the
signal can be transmitted over the same network. An important point to be noted about repeaters
is that they do not amplify the signal. When the signal becomes weak, they copy the signal bit by
bit and regenerate it at the original strength. It is a two port device.
• Bridge
Bridge is in the second layer of the OSI model. The function of this network device is to connect
two Ethernet networks together to form a large network. This means that Bridge will help copy
packets and transfer data to the computer to be received even if the two computers use two
different networks.
• Router
In the OSI model, the router is in the third layer. Also known as a router or router, this device is
used to pack and transfer data packets from a network to the terminal.
12
• However, when it is compared in terms of speed, the router's ability to connect two networks is
slower than bridge. Because before transmitting the router will perform the calculation to find the
most accurate path for the packets. In particular, if these transmissions have different transmission
speeds, the router has to work even more.
Gateway
• main function of gateway network devices is to connect computers to each other easily even if
these devices do not use the same protocol. For example, Gateway can connect a computer using
the IP protocol to a computer using the SNA, IPX, etc.
• In addition, this device is capable of distinguishing protocols. Therefore, it is often used in the
transfer of email from one network to another including long distances.
LO2.2 The operating principles of server types:
1. Server Platform
Server platform is the fundamental hardware or software for a system which acts as an engine that
drives the server. It is often used synonymously with an operating system.
13
2. Mail Server
It transfers and stores mails over corporate networks through LANs, WANs and across the Internet.
3. Application Server
Also known as a type of middleware, it occupies a substantial amount of computing region between
database servers and the end user, and is commonly used to connect the two
4. FTP Server
It works on one of the oldest of the Internet services, the file transfer protocol. It provides a secure file
transfer between computers while ensuring file security and transfer control.
5. Proxy Server
It acts as a mediator between a client program and an external server to filter requests, improve
performance and share connections
6. Telnet Server
It enables the users to log on to a host computer and execute tasks as if they are working on a remote
computer.
7. Web Server
It provides static content to a web browser by loading a file from a disk and transferring it across the
network to the user's web browser. This exchange is intermediated by the browser and the server,
communicating using HTTP
8. Fax Server
It is one of the best options for organizations that seek minimum incoming and outgoing telephone
resources, but require to fax actual documents.
LO2.3 The inter-dependence or workstation of hardware with relevant networking software
• A workstation is a computer intended for individual use that is faster and more capable than a
personal computer. Since they are PCs, they can also be used independently of the mainframe
assuming they have their own applications installed and their own hard disk storage. We are
going to discuss the interdependence of workstation hardware with relevant networking software.
A network interface card is a computer hardware part that enables computers to be combined
together in a network usually a local area network. Computers that are networked always
communicate with each other using a specified protocol for transferring data packets. Network
Interface Card acts as a translator letting machines mutually send and obtain data on a LAN.
Specialists in information systems frequently use these cards to set up wireless or wired
connections networks.
LO3 Design efficient networked systems
The Gold Star Company is a newly formed company and employs more than 70 people and the company
has rented a floor in one of a building. The area of this area is 150m2 divided into 5 rooms and 1 reception.
I. computer network installation design for the system
Diagram showing how to install a machine for a room, with an area of 150m2 divided into rooms such
as employees with 40 people, directors with 1 person, Deputy director with 1 person, server 2 devices,
technicians 8 people, HR 10 people.
1. Staff room
• It is estimated that each computer will occupy about 1m in length at 90cm in width, divided into 4
rows each with 5 pairs of computers, there are 10 machines.
14
• The pair of computers closest to the Switch (in the first row, close to the Switch) each machine
needs 3 m of wire, both machines need 6m of wire, the distance between the pairs in each row is
90 cm, but for the convenience of moving, moving the machine, then from the second pair of
machines we add 1.5 m of network wire for each machine, that means 3m wires per pair of
machines. In the second row it is the same, the first pair of machines need 6m of wire per
machine, two machines will be 12m, and from the second pair to the 5th pair each adds 3m of
network wire.
• The number of wires required for this room is: 300m
2. HR Room:
• As well as the Staff room, each computer will take up 1 m in length and 90 cm in width, divided
into 1 row each with 5 pairs of computers and a total of 10 computers.
• The number of wires required for this room is: 60 m
3. Director's District
• There are two rooms on a front desk outside.
4. Technician's Room
15
• The total number of wires from the server room to the switches in the rooms is: 40m
• The total number of wires from the server room to the switches in the rooms is: 40m
• Since the company is located on one floor, it only uses one wi-fi router to allow wireless devices to
connect.
6. the cost of equipment, network wires
• Router: 1
• Switch 8 ports :1
• Switch 16 ports: 2
• Switch 48 ports 1
• Network wire: 465
• In addition, we also have to use the network press to be able to connect the network to
devices as well as computers, the type of network press we can use is the type of RJ45
network adapter, it is sold in boxes, the number of 100 units / box. We have about 70
computers, so we need 140 heads of network, among other devices we need about 40. So, we
need to buy two boxes of the top.
16
• Technician's Office: 192.168.2.0/24
• Staff Room: 192.168.3.0/24
• HR Room: 192.168.4.0/24
• Office: 192.168.5.0/24
17
18