You are on page 1of 18

PROGRAM TITLE: BTEC Higher National Diploma in Computing

UNIT TITLE: Unit 02 Networking

ASSIGNMENT NUMBER: 1

ASSIGNMENT NAME: Consulting and Designing networking systems for Gold Star

SUBMISSION DATE: 06/09/2021

DATE RECEIVED: 25/09/2021

TUTORIAL LECTURER: Nguyen The Duc

WORD COUNT: 4476

STUDENT NAME: Luong Hoang Hai

STUDENT ID: BKC12049

MOBILE NUMBER: 0942603115

1
Summative Feedback:

Internal verification:

2
Assignment 1
Contents

Introduction ................................................................................................................. 4

LO1 Examine networking principles and their protocols ................................................................. 4

LO1.1 Types of Networks. .........................................................................................................4

LO1.2 Network protocols..........................................................................................................5

LO1.3 Networking Topologies ...................................................................................................6

LO1.4 OSI model and TCP/IP ....................................................................................................8

LO1.5 The impact of current network technology, communication and standards: .....................10

LO2 Explain networking devices and operations........................................................................10

LO2.1 Networking devices ........................................................................................................10

LO2.2 The operating principles of server types: .........................................................................12

LO2.3 The inter-dependence or workstation of hardware with relevant networking software ....13

LO3 Design efficient networked systems ...................................................................................13

LO4 Implement and diagnose networked systems ....................................................................17

3
4
Introduction

The design and installation of a computer network is a very difficult step, to be able to design a complete network
system at the same time scientifically, requiring the designer to think as well as knowledge about it. Whether the
network runs well or not, maintains it for a long time or not, often malfunctions or is few, it is largely derived
from whether the network design is scientific or not. The installation of devices also requires science, the network
system can run evenly thanks to connected devices (Modem, Router, Switch, Hub,…), and thus placing the devices
where it is reasonable to be able to distribute network signals evenly to all devices used, It's also a small request.
In addition, the installation of cables and wires is also a requirement for the designer, installation of network
wiring, network splints must be neat, not entangled while moving, traveling, and easy to replace and repair when
problems occur. Installing a network system is easy to manage, easy to upgrade and limit problems to the lowest
level, while ensuring high security, which is a problem that requires the designer to pay great attention.
LO1 Examine networking principles and their protocols

LO1.1 Types of Networks.

1. LAN (Local Area Network)


A LAN is a group of computers and network communication devices connected to each other in a
small area such as a high-rise building, university campus, entertainment district, etc.
LAN Networks often have the following characteristics:
- Large bandwidth, capable of running online applications such as watching movies, seminars
online.
- Network size is limited by devices.
- The cost of LAN equipment is relatively cheap.
- Simple administration.
2. MAN (Metropolitan Area Network)
The MAN network is almost like a LAN but its limit is a city or a country. MAN networks connect LAN
networks together through different media (fiber optic cables, copper cables, waves...) and different
modes of communication.
Characteristics of the MAN network:
- Average bandwidth, enough to serve city or country applications such as e-government, e-
commerce, applications of banks ...
- Because MAN connects many LAN's together, the complexity also increases and the
management will be more difficult.
- The cost of MAN network equipment is relatively expensive
3. WAN (Wide Area Network)
The WAN Network covers a large geographic area that can be a country, a continent or a global one.
Wan networks are usually the networks of multinational or global companies, typically the Internet.
Due to the large scope of the WAN network, it is common for WAN networks to be a collection of
LAN and MAN networks connected by means such as satellites, microwaves, fiber optic cables,
telephone cables.
Characteristics of the WAN network:
- Low bandwidth, easy to lose connection, usually only suitable for offline applications such as
e-mail, web, ftp
- The range of operations is unlimited.
- Due to the connection of many LAN and MAN networks together, the network is very complex
and global, so it is often organized internationally to manage.
- The cost of WAN networking equipment and technologies is very expensive.
4. Internet
Internet is a global information system that can be accessed publicly by interconnected computer
networks. This system transmits information in packet-switched fashion based on a standardized network

5
protocol (IP protocol). The system consists of thousands of smaller computer networks of businesses,
research institutes and universities, individual users and governments around the globe.

LO1.2 Network protocols.


1. Definition of Network protocol
A network protocol is a set of conventions about the format and meaning of notifications sent
between computers through a computer network.
2. Some popular Network protocols
a. Internet Protocol Suite
- The Internet Protocol Suite is also known as an inter-network protocol suite. This
protocol is the set of protocol stack execution protocols on which the Internet runs.
- It can also be called the TCP/IP protocol. They are all important protocols in the
Internet Protocol Suite. TCP- Transmission Control Protocol and IP - Internet Protocol.
And it is also possible to understand that the Internet Protocol Suite is similar to the
OSI model but there are still differences between them, not exactly the same. In
layers, not all classes correspond well.
b. Protocol Stack
- Protocol Stack is a form of software installation for a set of computer network
protocols. They are a full set of protocol layers and they work together to provide
network connectivity to other devices.
c. Transmission Control Protocol (TCP)
- Transmission Control Protocol (TCP) is a transmission control protocol. They are the
core protocol of the Internet Protocol Suite. With the task of network execution,
complement the Internet Protocol. This protocol ensures the transfer of data to the
receiving place in a reliable and orderly manner.
- TCP also provides a reliable distribution method for an octet flow. As an 8-bit data
block stream, TCP also distinguishes between data from many different applications.
d. Internet Protocol (IP)
- Internet Protocol (IP) is the main protocol in the Internet protocol suite. With the
ability to relay data over the network and help set up the internet through the routing
of the Internet Protocol.
- IP provides an unsecured data sending service so the data plan can arrive where it is
not intact, it can arrive in no order. IP is very common in the internet today. The most
common network layer protocol today is Ipv4 or Ipv6.
e. Hypertext Transfer Protocol (HTTP)
- Hypertext Transfer Protocol (HTTP) is one of the five standard protocols of the Internet.
This protocol is used to communicate information between the web server and the Web
client. They work in the Client/Server model for the World Wide Web(www)
f. File Transfer Protocol (FTP)
- Transfer Protocol (FTP) is often used to exchange files over a communication network
using the TCP/IP protocol.
- The default port of FTP is 20/21.
g. Secured Sell (SSH)
- Secured Shell (SSH) is a network protocol used to securely establish a network
connection. SSH works in the upper layer in the TCP/IP classification model. It can be
said that SSH is the main method used to manage network devices securely at the
command level. It was replaced by Telnet because of its more secure security.
- The default port of SSH is 22.
h. Telnet

6
- Telnet (Terminal Network) is the main method used to manage network devices at the
command level. Or they are used on connections to the internet or connections at the
LAN local computer network.
- Telnet's default port is 23.
i. Simple Mail Transfer Protocol (SMTP)
- Simple Mail Transfer Protocol (SMTP) is a standard for transmitting email over the
internet. They have the main function of transferring email from the source mail server
to the destination mail server and transferring email from the end user to the mail
system.
- Smtp's default port is 25 and SMTPS port (secured) is 465
j. Domain Name System (DNS)
- Domain Name System (DNS) is a system that allows the corresponding setup between
IP addresses and domains on the internet. Thanks to this protocol, it is possible to
convert a domain name to an IP address.
- default port of DNS is 53.
k. Post Office Protocol version 3 (POP3)
- Post Office Protocol version 3 (POP3) is an application tier protocol, used to obtain
email from a mail server, via a TCP/IP connection. In version 3, the client takes
complete content from the server's mailbox and deletes the content from it.
- default port is 110 and the secure POP3 port is 995.
l. Internet Message Access Protocol (IMAP)
- The Internet Message Access Protocol (IMAP) is the internet standard protocol used by
email applications to retrieve email messages from a mail server via a TCP/IP
connection. IMAP does not delete content from the server mailbox.
- The default IMAP port is 143 and the secure IMAP port is 993.
m. Simple Network Management Protocol (SNMP)
- Simple Network Management Protocol (SNMP) is a set of protocols that not only allow
the testing of network devices such as routers, switches, servers, etc. Operate but also
support the operation of these devices optimally. The SNMP function is to monitor,
configure and control network devices remotely. SNMP trap can also be configured on
network devices to notify when there is a specific activity.
n. Hypertext Transfer Protocol over SSL/TLS (HTTPS)
- Hypertext Transfer Protocol over SSL/TLS (HTTPS) is a combination of http protocol
and SSL security protocol or TLS that allows the exchange of information securely on
the Internet.
- default https port is 443.
LO1.3 Networking Topologies
Network Topology is the arrangement of the various elements (links, nodes, etc.) of a computer network.
Primarily, it is the topology of a computer network, and can be described in terms of physics and logic. The
physics and logic. The physical topology (physical topology) is the arrangement of the various network elements,
including equipment storage and cabling setting while the logical topology specifies how the data flow in the
network works. Node distances, physical intersections, transmission rates, and/or signal types can vary between
two networks even though their topologies may be identical.
1) Star topology
In this network, each and every node maintains a totally individual connection to a switch, where all
other nodes are connected. It has a direct connection with a switch to the node. the weakness is
needed more wire to set up a network
Benefits of Star topology:
• When an error occurs in a workstation, the whole system is working normally. This is
because the star-shaped network works on the principle of parallel connectivity.
• The speed is quite fast.

7
• The network structure is quite simple to make it easy to check and repair when there is
a problem in the system. This also makes control algorithms more stable.
• This network can be narrowed or expanded at the user's will.
• Helps to limit network stagnation factors because this type of link allows direct
connection of computers to the Hub (focuser) by twisted cable without going through
the BUS axis.

Disadvantages of Star Topology


• As mentioned above, the central equipment is a key element of the whole system. So
once it crashes, it all won't work. All devices are affected by this central machine.
• The star topology requires workstations to connect each device individually to the
center, but the connection distance is quite limited to only about 100 meters.
• Cost of network wires and intermediate equipment.
2) Bus topology
A bus topology is a network setup where each computer and network device is connected to a single
cable or backbone. Depending on the type of computer network card, a coaxial cable or an RJ-45
network cable is used to connect them together.
Benefits of bus topology:
• Easy to install.
• There is no limit to the length of the cable.
• It is comfortable a small and temporary network.
Disadvantages of bus topology:
• When there is a problem at a certain station, it will be difficult for you to determine
where the error occurred so it is necessary to suspend the system-wide operation to
check and fix it.
• When data is transmitted in large traffic, it is easy to lead to congestion on the
transmission line
3) Ring topology
A ring topology is a network configuration in which device connections create a circular data path.
Each networked device is connected to two others, like points on a circle. Together, devices in a ring
topology are referred to as a ring network.
Benefits of ring topology:
• It’s easier to expand the LAN system further.
• Save cable length by not requiring as many conductors as the two types of links
above.
• Network speeds are faster than bus topology.
Disadvantages of bus topology:
• The biggest disadvantage of this Topology is that the devices are connected in a
closed line. When there is any problem on that line, the whole system stops working.
• It's hard to check for errors when there's a problem.
4) Mesh topology
Mesh topology is a type of topology in which each computer is linked to all the remaining machines
on the system without having to connect via hub or switch. It's like the structure of the internet today.
Benefits of Mesh topology:
• The computers in this system operate independently, will not be affected when other
computers malfunction.
• It is similar to a star topology but expanded to a larger range.
Disadvantages of Mesh topology:
• Managing the network will be quite complicated.
• It costs memory and the processing of workstations in the system.
5) Hierarchical topology

8
This type of topology is almost like an extended star topology, but the network is linked to a device
that checks traffic on the network instead of linking to a Hub or Switch. The workstations in the
system are arranged in layers depending on their functionality.
Benefits of Hierarchical topology:
• The advantage of Hierarchical topology is the ability to manage centralized
equipment, increasing system security.
Disadvantages of Hierarchical topology:
• Its disadvantage is that it is expensive due to having to use multiple focus sets.
LO1.4 OSI model and TCP/IP
A. OSI model

The Open System Interconnection (OSI) model is a model proposed by ISO in 1977 and first published in 1984. In
order for computers and network devices to communicate with each other, there must be rules of
communication that are acceptable to the parties. The OSI model is a template that helps us understand how
data travels through the network while also helping us understand the network functions that take place in each
layer.
In the OSI model there are seven layers, each describing a partial function independently. The layer separation of
this model offers the following benefits:
• Divide network information activities into smaller, simpler parts that make it easier for
us to survey and learn.
• Standardize network components to enable network development from multiple
product vendors.
• Preventing the change of one layer from affecting the other, thus enabling each layer
to grow independently and more quickly.
OSI reference model is divided into seven layers with the following functions:
• Application Layer: the interface between the application and the network.
• Presentation Layer: agreement on data exchange format.
• Session Layer: allows users to set up connections.
• Transport Layer: ensures communication between the two systems.

9
• Network Layer: directs data transmission in an inter-network environment.
• Data link Layer: determines access to devices
• Physical layer: converts data into bits and transmits it.
B. TCP/IP
U.S. government departments and offices have been aware of the importance and potential of
Internet engineering for many years, as well as have financed research, to truly acquire a global
Internet. The formation of Internet engineering is the result of research under funding from the
Defense/Advanced Research Projects Agency ARPA/DARPA. The ARPA technique consists of a set of
network standards, detailing how information computers communicate with each other, as well as
conventions for interconnecting and traffic routing networks. The official name is TCP/IP Internet
Protocol Suite and is often referred to as TCP/IP, which can be used to communicate through a set of
interconnected networks. It can be used to link networks within a company, not necessarily to other
external networks.
Layers of the TCP/IP reference model:

The TCP/IP reference model is similar to the OSI architecture, the following are some of the properties of the
layers in the TCP/IP reference model:
• Application class: manages protocols, such as supporting presentation, encryption, and call
management. The Application class also supports many applications, such as FTP (File Transfer
Protocol), HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail Transfer Protocol), DNS
(Domain Name System), TFTP (Trivial File Transfer Protocol).
• Transport class: take charge of transport from source to destination. The Transport Tier is
responsible for data transmission through two rituals: TCP (Transmission Control Protocol) and
UDP (User Datagram Protocol
• Internet class: Take charge of choosing the best route for packets. The main ritual used on this
floor is the IP (Internet Protocol).
• Network Interface layer: similar to the data link and physical layers of OSI architecture
C. Compare the OSI and TCP/IP models
Similarities:

10
• Both have layered architectures.
• There is an application class, although the services in each class are different.
• There are transport and network classes.
• Use packet transfer techniques packet (packet-switched)
• Professional network managers need to know the above two models.

Different points:
• TCP/IP model combines presentation and session class into application class.
• The TCP/IP model combines the Data Link and Physical layers into one class.
• The TCP/IP model is simpler because there are fewer layers.
• TCP/IP etiquette is standardized and is commonly used throughout the world.

LO1.5 The impact of current network technology, communication and standards:

• OSPF: It is a routing protocol that is commonly used in bigger networks, either single or group
networks. The Internet Engineering Task Force created it. It's also possible to use it as a gateway
protocol.
• FTP: File Transfer Protocol (FTP) is a network standard protocol for transferring data from a client to a
server or from one server to another. A username, password, and host address are required for a user
or administrator to upload a file to a website.
• SMTP: The Simple Mail Transfer Protocol (SMTP) acts as a medium for transferring e-mail. SMTP is
always used in conjunction with the POP3 service.
• TCP/IP: Transmission Control Protocol and Internet Protocol is a set of protocol stacks. Basically, it is
two different protocols. TCP/IP is closely related to FTP, SMTP, HTTP.
• Bandwidth: Bandwidth is the capacity of a wired or wireless network communications link to transmit
the maximum amount of data from one point to another over a computer network or internet
connection in a given amount of time -- usually one second. Synonymous with capacity, bandwidth
describes the data transfer rate. Bandwidth is not a measure of network speed -- a common
misconception.

The impact of network bandwidth requirements:

• The length of time it takes to download or upload data over the Internet is determined by
bandwidth. A connection with sufficient bandwidth ensures a smooth and responsive user
experience. The more bandwidth available, the faster data may be transmitted; nevertheless, the
law of diminishing returns applies in this case. The performance of the Internet is unaffected once
you have enough bandwidth.

LO2 Explain networking devices and operations

LO2.1 Networking devices

• Hubs
A hub, sometimes called a concentrator, is a device that connects a number of network
cables coming from client computers to a network. Hubs come in many different sizes, supporting
from as few as 2 computers up to 60 or more computers. (The most common hub size supports 24
network connections.) All the network connections on a hub share a single collision domain, which
is a fancy way of saying all the connections to a hub “talk” over a single logical wire and are subject
to interference from other computers connected to the same hub.

11
• Switch
like a hub, a switch also works at the layer of LAN (Local Area Network) but you can say that a
switch is more intelligent than a hub. While the hub just does the work of data forwarding, a
switch does 'filter and forwarding' which is a more intelligent way of dealing with the data packets.
So, when a packet is received at one of the interfaces of the switch, it filters the packet and sends
it only to the interface of the intended receiver

• Repeaters
A repeater operates at the physical layer. Its job is to regenerate the signal over the same
network before the signal becomes too weak or corrupted so as to extend the length to which the
signal can be transmitted over the same network. An important point to be noted about repeaters
is that they do not amplify the signal. When the signal becomes weak, they copy the signal bit by
bit and regenerate it at the original strength. It is a two port device.

• Bridge
Bridge is in the second layer of the OSI model. The function of this network device is to connect
two Ethernet networks together to form a large network. This means that Bridge will help copy
packets and transfer data to the computer to be received even if the two computers use two
different networks.
• Router
In the OSI model, the router is in the third layer. Also known as a router or router, this device is
used to pack and transfer data packets from a network to the terminal.

12
• However, when it is compared in terms of speed, the router's ability to connect two networks is
slower than bridge. Because before transmitting the router will perform the calculation to find the
most accurate path for the packets. In particular, if these transmissions have different transmission
speeds, the router has to work even more.
Gateway
• main function of gateway network devices is to connect computers to each other easily even if
these devices do not use the same protocol. For example, Gateway can connect a computer using
the IP protocol to a computer using the SNA, IPX, etc.

• In addition, this device is capable of distinguishing protocols. Therefore, it is often used in the
transfer of email from one network to another including long distances.
LO2.2 The operating principles of server types:
1. Server Platform
Server platform is the fundamental hardware or software for a system which acts as an engine that
drives the server. It is often used synonymously with an operating system.

13
2. Mail Server
It transfers and stores mails over corporate networks through LANs, WANs and across the Internet.
3. Application Server
Also known as a type of middleware, it occupies a substantial amount of computing region between
database servers and the end user, and is commonly used to connect the two
4. FTP Server
It works on one of the oldest of the Internet services, the file transfer protocol. It provides a secure file
transfer between computers while ensuring file security and transfer control.
5. Proxy Server
It acts as a mediator between a client program and an external server to filter requests, improve
performance and share connections
6. Telnet Server
It enables the users to log on to a host computer and execute tasks as if they are working on a remote
computer.
7. Web Server
It provides static content to a web browser by loading a file from a disk and transferring it across the
network to the user's web browser. This exchange is intermediated by the browser and the server,
communicating using HTTP
8. Fax Server
It is one of the best options for organizations that seek minimum incoming and outgoing telephone
resources, but require to fax actual documents.
LO2.3 The inter-dependence or workstation of hardware with relevant networking software
• A workstation is a computer intended for individual use that is faster and more capable than a
personal computer. Since they are PCs, they can also be used independently of the mainframe
assuming they have their own applications installed and their own hard disk storage. We are
going to discuss the interdependence of workstation hardware with relevant networking software.
A network interface card is a computer hardware part that enables computers to be combined
together in a network usually a local area network. Computers that are networked always
communicate with each other using a specified protocol for transferring data packets. Network
Interface Card acts as a translator letting machines mutually send and obtain data on a LAN.
Specialists in information systems frequently use these cards to set up wireless or wired
connections networks.
LO3 Design efficient networked systems
The Gold Star Company is a newly formed company and employs more than 70 people and the company
has rented a floor in one of a building. The area of this area is 150m2 divided into 5 rooms and 1 reception.
I. computer network installation design for the system
Diagram showing how to install a machine for a room, with an area of 150m2 divided into rooms such
as employees with 40 people, directors with 1 person, Deputy director with 1 person, server 2 devices,
technicians 8 people, HR 10 people.

1. Staff room
• It is estimated that each computer will occupy about 1m in length at 90cm in width, divided into 4
rows each with 5 pairs of computers, there are 10 machines.

14
• The pair of computers closest to the Switch (in the first row, close to the Switch) each machine
needs 3 m of wire, both machines need 6m of wire, the distance between the pairs in each row is
90 cm, but for the convenience of moving, moving the machine, then from the second pair of
machines we add 1.5 m of network wire for each machine, that means 3m wires per pair of
machines. In the second row it is the same, the first pair of machines need 6m of wire per
machine, two machines will be 12m, and from the second pair to the 5th pair each adds 3m of
network wire.
• The number of wires required for this room is: 300m
2. HR Room:
• As well as the Staff room, each computer will take up 1 m in length and 90 cm in width, divided
into 1 row each with 5 pairs of computers and a total of 10 computers.
• The number of wires required for this room is: 60 m

3. Director's District
• There are two rooms on a front desk outside.

• The number of wires needed for this area is about 18m.

4. Technician's Room

15
• The total number of wires from the server room to the switches in the rooms is: 40m

5. Overall network diagram:

• The total number of wires from the server room to the switches in the rooms is: 40m
• Since the company is located on one floor, it only uses one wi-fi router to allow wireless devices to
connect.
6. the cost of equipment, network wires
• Router: 1
• Switch 8 ports :1
• Switch 16 ports: 2
• Switch 48 ports 1
• Network wire: 465
• In addition, we also have to use the network press to be able to connect the network to
devices as well as computers, the type of network press we can use is the type of RJ45
network adapter, it is sold in boxes, the number of 100 units / box. We have about 70
computers, so we need 140 heads of network, among other devices we need about 40. So, we
need to buy two boxes of the top.

• The total cost of network equipment is $541.

II. Split IP address


I will set the IP address for each floor as follows:
• Server Room: 192.168.1.0/24

16
• Technician's Office: 192.168.2.0/24
• Staff Room: 192.168.3.0/24
• HR Room: 192.168.4.0/24
• Office: 192.168.5.0/24

LO4 Implement and diagnose networked systems


• Strengths of the network model:
- Root model easily installed and repaired
- The cost of the model is quite cheap
• Weaknesses of network models
- The model does not upgrade the machine further
- The model is pretty bad.
- System security is poor.

17
18

You might also like