You are on page 1of 31

ASSIGNMENT FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking Infrastructure

Submission date 21/5/2021 Date Received 1st submission 21/5/2021

Re-submission Date Date Received 2nd submission

Student Name Dang Huynh Xuan Khang Student ID BSAF200020

Class PBIT16101-CNTT1 Assessor name Đỗ Phi Hưng

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand
that making a false declaration is a form of malpractice.

Student’s signature
Grading grid
P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3

What is Computer Network ?


Computer networks are digital telecommunications networks that allow network nodes to share resources. In computer
networks, computer devices exchange data with connections (data links) between nodes. These data links are established over a
network cable such as a cable or an optical cable, or a wireless medium such as Wi-Fi.

1
The network computer devices that start, route, and terminate data are called network nodes. [1] Nodes are typically identified
by a network address and can include network servers such as PCs, phones, and servers, as well as network hardware such as
routers and switches. Two such devices can be said to be interconnected when one device can exchange information with the other,
whether they are directly connected or not. In most cases, application-specific communication protocols are layered (i.e. carry
payload) compared to other general communication protocols. This formidable collection of IT requires skilled network
administrators to keep all the networks running.
Computer networks support a large number of applications and services such as access to the World Wide Web, digital video,
digital audio, shared hosting and application servers, printers and machines. fax, and the use of email and instant messaging
applications, as well as many other applications. Computer networks differ in the communication method used to carry signals,
communication protocols to organize network traffic, the size of the network, topology, traffic control mechanisms, and
organizational intent. network. The most famous computer network is the Internet.
ASSESMENT CRITERIA 
Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine networking principles and their protocols


LO1 & 2
P1 Discuss the benefits and M1 Compare common networking principles D1 Considering a given scenario, identify
constraints of different network types and how protocols enable the effectiveness of the topology protocol selected for the
and standards. networked systems. efficient utilization of a networking
system.
 
P2 Explain the impact of network
topology, communication and
bandwidth requirements.

LO2 Explain networking devices and operations

2
P3 Discuss the operating principles of M2 Explore a range of server types and justify
networking devices and server types. the selection of a server, considering a given
scenario regarding cost and performance
optimisation.
P4 Discuss the inter-dependence of
workstation hardware with relevant
networking software.

LO3 Design efficient networked systems

P5 Provide a logical/physical design of M3 Install and configure network services and D2 Design a maintenance schedule to
the networked system with clear applications on your choice. support the networked system.
explanation and addressing table.

P6 Evaluate  the design to meet the


requirements.

LO4 Implement and diagnose networked systems

P7 Implement a networked system M4 Recommend potential enhancements for D3 Use critical reflection to evaluate
based on a prepared design. the networked systems. own work and justify valid conclusions.

P8 Document and analyse test results


against expected results.

3
Table of contents
P1 Discuss the benefits and constraints of different network types and standards......................................................................................5
What is Network?.......................................................................................................................................................................................5
1. Network type (MAN, WAN,LAN etc.)..............................................................................................................................................................5
2. Main benefits of networks include:................................................................................................................................................................9
3. A constraint network:..................................................................................................................................................................................... 9
4. Protocols and standards................................................................................................................................................................................ 10
5. Network protocols........................................................................................................................................................................................ 10
P2 Explain the impact of network topology, communication and bandwidth requirements......................................................................11
1. A physical topology and a logical topology...................................................................................................................................................11
2. Examples of topology with diagrams (Mesh, Star, Bus, Ring, Tree, Hybrid)................................................................................................11
3. Communication and Bandwidth:.................................................................................................................................................................. 17
4. Network communication, or internetworking:.............................................................................................................................................17
5. Rules of communication................................................................................................................................................................................ 17
6. Bandwidth:.................................................................................................................................................................................................... 18
P3 Discuss the operating principles of networking devices and server types..............................................................................................18
I. Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter).......................................................................................18
II. Network type:............................................................................................................................................................................................... 23
P4 Discuss the inter-dependence of workstation hardware with relevant networking software................................................................25
M1 Compare common networking principles and how protocols enable the effectiveness of networked systems....................................26
Conclusion................................................................................................................................................................................................26
Evaluation.................................................................................................................................................................................................26
Link Prefer.................................................................................................................................................................................................27

4
Introduction
In this exercise, you must complete the definitions and explanations of the eight P-parts given by your supervisor. More specifically,
the ASSESSMENT Criteria table above
I will talk about network related things like LAN, WAN, MAN, ...
Define a physical topology and a logical topology
Introduce network devices, their benefits of and their appearance
Network type form, workstation hardware with relevant networking software.

P1 Discuss the benefits and constraints of different network types and standards.
What is Network?
A network consists of 2 or more computers linked together to share resources (eg printers and CDs), exchange files, communicate
with each other. Computers on the network can be linked via cables, telephone lines, radio waves, satellites or via infrared.
Two popular types of networks include:
- Local Area Network (LAN)
- Wide Area Network (WAN)
There are also the following types: Metropolitan Area Networks (MAN), Wireless LAN (WLAN), Wireless WAN (WWAN).
1. Network type (MAN, WAN,LAN etc.)
A network is a collection of computer or hardware devices that are connected together, either physically or logically using special
hardware and software to allow them to exchange information and cooperate.

5
A computer network can be categorized by their size. A computer network is mainly of four types:

• LAN(Local Area Network)

If more than one computer is to be connected to a network, this usually takes the form of a Local Area Network (LAN).
Networks like these can include two computers in a private household or several thousand devices in a company. Networks in public
institutions such as those used by public authorities, schools, or universities, are also implemented as LANs. A widely-used standard
for wired Local Area Networks is Ethernet. Networking technologies such as ARCNET, FDDI, and Token Ring are less common and
widely outdated. Data transmission is either electronically based on copper cables or via fibre optic cables.
If more than two computers are to be connected in one LAN, additional network components such as hubs, bridges, and
switches are needed, which act as coupling elements and distribution nodes. The network type LAN was developed to enable fast
transmission of large amounts of data. Depending on the structure of the network and the transmission medium used, a data
throughput of 10 to 1,000 Mbit/s is normal. LANs enable convenient information exchange between the various devices connected
to the network. In a business context, it’s common to share files, network printers, and applications via LAN with several computers.

6
If a local network is implemented via radio, it is referred to as a Wireless Local Area Network (WLAN). The WLAN
standard’s technical basis is defined by the IEEE 802.11 family of standards. Wireless local networks offer the ability to easily
integrate devices into home or corporate networks, and are compatible with wired Ethernet LANs. However, the data throughput is
lower than for an Ethernet connection.
The range of a LAN depends on the standard and the transmission medium, but can be increased by signal amplifiers,
known as repeaters. Regarding gigabit Ethernet via glass fibres, a signal range of several miles is possible. However, Local Area
Networks rarely stretch across more than one building complex. Multiple LANs can be connected to a superior Metropolitan Area
Network (MAN) or Wide Area Network (WAN).

• PAN(Personal Area Network)

To enable data exchange, modern devices such as smartphones, tablets, laptops, and desktop computers can be integrated
into a network. This can be wired in the form of a Personal Area Network (PAN).  Common transfer techniques
include USB or FireWire. The wireless variety is known as Wireless Personal Area Network (WPAN) and is based on technologies
such as Bluetooth, Wireless USB, Insteon, IrDA, ZigBee, and Z-Wave. A wireless Personal Area Network, which can be achieved via
Bluetooth, is called Piconet. PANs and WPANs usually only stretch over a few metres, and are therefore not suitable for connecting
devices in different rooms or even buildings.
In addition to the communication between individual devices, a Personal Area Network also makes it possible to establish a
connection to other networks, usually larger ones. This is known as an uplink. Due to the limited range and a comparatively low data
transfer rate, PANs are primarily used to connect peripheral devices in the hobby and entertainment sector. Typical examples
7
include wireless headphones, game consoles, and digital cameras. Within the Internet of Things (IoT)’s framework, WPANs are
responsible for the communication of control and monitoring applications with a low data rates. Protocols such as Insteon, Z-Wave,
and ZigBee have been specifically designed for smart homes and home automation.

• MAN(Metropolitan Area Network)

Metropolitan Area Network (MAN) is a broadband telecommunication network that connects several LANs in close
proximity. As a rule, these are individual establishments in a company that are connected to a MAN via leased lines. High-
performance routers and high-performance fibre-based connections are used, which enable a significantly higher data throughput
than the internet. The transfer speed between two remote nodes is comparable to that of communication within a LAN.
The infrastructure for MANs is provided by international network operators. As a Metropolitan Area Network, wired cities
can be integrated nationally into Wide Area Networks (WAN) and internationally in Global Area Networks (GAN).
With Metro Ethernet, a special transmission technology is available for MANs, which can be used to build powerful Metro
Ethernet networks (MEN) based on Carrier Ethernet (CE 1.0) or Carrier Ethernet 2.0 (CE 2.0).

8
A standard for larger regional radio networks, known as Wireless Metropolitan Area Networks (WMAN), was developed
with IEEE 802.16. This technology known as WiMAX (Worldwide Interoperability for Microwave Access) makes it possible to set up
WiFi hotspots. These are several WiFi access points working together in different locations. The current transmission standard DSL is
technically only available where copper cables have been laid.

• WAN(Wide Area Network)

While Metropolitan Area Networks connect areas that are near each other in rural or urban areas, Wide Area Networks
(WANs) extend across large geographic areas, such as countries or continents. The number of local networks or individual
computers connected in a WAN is unlimited, in principle.
While LANs and MANs can be implemented because of their geographical proximity to the computers and networks
based on Ethernet that are to be connected, technologies such as IP/MPLS (Multiprotocol Label Switching), PDH (Plesiochronous

9
Digital Hierarchy), SDH (Synchronous Digital Hierarchy), SONET (Synchronous Optical Network), ATM (Asynchronous Transfer Mode)
and sometimes the outdated X.25 are used.
Wide Area Networks are usually owned by an organisation or company, and are operated privately or rented. In addition,
internet service providers use WANs to connect local company networks and consumers to the internet.

2. Main benefits of networks include:


File sharing - you can easily share data between different users, or access it remotely if you keep it on other connected devices.
Resource sharing - using network-connected peripheral devices like printers, scanners and copiers, or sharing software between
multiple users, saves money.
3. A constraint network:
Represents a mathematical relationship between several variables, and is able to compute the value of any one of these variables
given the values of all the others. There are two types of nodes in a constraint network: cells and constraints. ... A number can be
saved to or erased from a cell.
4. Protocols and standards
Make networks work together. Protocols make it possible for the various components of a network to communicate with each
other, and standards make it possible for different manufacturers' network components to work together.
5. Network protocols
Are a set of rules, conventions, and data structures that dictate how devices exchange data across networks. In other words,
network protocols can be equated to languages that two devices must understand for seamless communication of information,
regardless of their infrastructure and design disparities.
+ DNS: Domain Name System protocol
The DNS protocol helps in translating or mapping host names to IP addresses. DNS works on a client-server model, and uses a
distributed database over a hierarchy of name servers.
Hosts are identified based on their IP addresses, but memorizing an IP address is difficult due to its complexity. IPs are also dynamic,
making it all the more necessary to map domain names to IP addresses. DNS helps resolve this issue by converting the domain
names of websites into numerical IP addresses.
+ HTTP: Hyper Text Transfer Protocol

10
HTTP is an application layer protocol used for distributed, collaborative, and hypermedia information systems. It works on a client-
server model, where the web browser acts as the client. Data such as text, images, and other multimedia files are shared over the
World Wide Web using HTTP. As a request and response type protocol, the client sends a request to the server, which is then
processed by the server before sending a response back to the client.
HTTP is a stateless protocol, meaning the client and server are only aware of each other while the connection between them is
intact. After that, both the client and server forget about each other's existence. Due to this phenomenon, the client and server can't
both retain information between requests.
+ TCP: Transmission Control Protocol
TCP is a transport layer protocol that provides a reliable stream delivery and virtual connection service to applications through the
use of sequenced acknowledgement. TCP is a connection-oriented protocol, as it requires a connection to be established between
applications before data transfer. Through flow control and acknowledgement of data, TCP provides extensive error checking. TCP
ensures sequencing of data, meaning the data packets arrive in order at the receiving end. Retransmission of lost data packets is also
feasible with TCP.
+ IP: Internet Protocol (IPv4)
IPv4 is a network layer protocol that contains addressing and control information, which helps packets be routed in a network. IP
works in tandem with TCP to deliver data packets across the network. Under IP, each host is assigned a 32-bit address comprised of
two major parts: the network number and host number. The network number identifies a network and is assigned by the internet,
while the host number identifies a host on the network and is assigned by a network admin. The IP is only responsible for delivering
the packets, and TCP helps puts them back in the right order.
IPv6: Internet Protocol version 6
IPv6 is the latest version of the Internet Protocol, a network layer protocol that possesses addressing and control information for
enabling packets to be routed in the network. IPv6 was created to deal with IPv4 exhaustion. It increases the IP address size from 32
bits to 128 bits to support more levels of addressing.
+ ICMP: Internet Control Message Protocol
ICMP is a network layer supporting protocol used by network devices to send error messages and operational information. ICMP
messages delivered in IP packets are used for out-of-band messages related to network operation or misoperation. ICMP is used to
announce network errors, congestion, and timeouts, as well assist in troubleshooting.
- Standards Organizations: ISO, IEC, ITU, JEDEC, ANSI, ACM, NIST, Ecma International, CENELEC, JEITA, Learning More, Karen Bartleson

P2 Explain the impact of network topology, communication and bandwidth requirements.


11
1. A physical topology and a logical topology 
A physical topology describes how network devices are physically connected - in other words, how devices are actually plugged into
each other. We're talking about cables, wireless connectivity, and more.
A logical topology describes how network devices appear to be connected to each other.
2. Examples of topology with diagrams (Mesh, Star, Bus, Ring, Tree, Hybrid)
• Client Server

This type of relationship is between two systems. One is the client (user), and the other is a server. The client will make a service
request to the other system (Server) which will send back information to the client. Within this type of relationship, the client
requires the information given from the server for it to function correctly; therefore, it must be managed correctly. Furthermore, the
server controls the security of the network which can be beneficial as this means that the user does not need to have security
measures on their side. With this type of topology, the bandwidth between the client and the server is limited by the hardware that
is used either by the server or the client. (BBC, n.d.) For example, a server may have hardware supporting 1000 mb/s transfer speed
but is limited to 30 mb/s due to the bandwidth allocated by the ISP (Internet Server Provider). This scenario can also be applied to
the client as their hardware configuration may support higher bandwidth than their ISP (Internet Service Provider) has allocated for
them.

12
• Cloud

The cloud network topology refers to a collection of servers and data centers which are used to create a collection of resources that
could be accessed from anywhere in the world as long as the user has an Internet connection. Cloud networks can be beneficial for
small or large organisations as they can accompany expansion which only requires an adjustment to their current contract with the
provider (Microsoft, n.d.). As a result of cloud technology, this has led to the popularisation of cloud software. Cloud software is a
type of software that can be accessed through browsers. For example, Google cloud suite allows users to use a variety of software
such as Docs, Slides, Sheets or Drive. These will enable users to create and edit documents, upload files and also share these
documents with other users through email. This can be advantageous for organisations as this can be used to improve
communication and also allows employees to continue working on documents outside of business hours.

• Virtualised
13
Virtualised networks can be presented in a variety of different forms that work in a variety of ways and for a different purpose. VLAN
stands for Virtual Local Area Network. Cisco (URL, n.d.) summarises a VLAN as a “group of devices on one or more LANs that are
configured to communicate as if they were attached to the same wire”. Within an organisation this can be beneficial as the
connecting LANs could allow for increased communication between departments or branches, therefore. Another type of Virtual
network is a VPN. This stands for a virtual private network which according to Cisco (n.d. 2) is defined as “an encrypted connection
over the Internet from a device to a network”. This can also be known as remote access. Within an organisation that allows
employees to connect to the network securely. This can be beneficial as it can enable the work from home approach which could
prevent demotivation.

Logical Topology
• Ethernet

14
The Ethernet typology is the most typical type of logical topology used. This topology can use two physical topologies that are the
bus and the star topology. The bus topology connects all devices on the network through the same medium, also known as a
physical channel. Some examples of this physical channel are coaxial Cables, twisted pair or fibre optic. When using this topology,
any communication that occurs can be heard by all other devices connected . Ethernet also utilises CSMA/CD which stands for
Carrier Sense Multiple Access with Collision Detection. Carrier Sense refers to the prevention of transmission from other devices if
one is already transmitting . Multiple Access refers to the ability for multiple devices to communicate using the same medium .
Collision Detection refers to a check that occurs to detect if more than one transmission signal is occurring, jamming the signal and
then waiting for a random interval before retransmission.

• Star

15
BBC defines the star network topology as “each device on the network has its own cable that connects to a switch or hub”. This
means that visually the switch/hub is located at the centre of and the computers are connected to the hub/switch rather than being
connected to two different computers. This can be essential for network management as all the traffic will be directed through the
switch/hub which it can be easily managed. Similar to other types of topologies it is also easy to add devices to the network as it will
only require a cable connected to the switch/hub. If a device other than the hub/switch fails, then the rest of the network will still be
accessible. However, if the hub/switch fails, then the entire network will not be accessible by the other devices. This also has
additional cost due to the requirement of a networking device to be used.

• Ring

16
The ring topology is defined as “A ring topology is a network configuration in which device connections create a circular data path.
Each networked device is connected to two others, like points on a circle”. From this, it can be assumed that in the event of an error
occurring at one part of the ring this will cause the chain to break and the network to fail. The ring topology also only allows
transmission in a certain direction at a certain time within the circle while other topologies such as the star allows the data to flow in
either direction. Unlike the star topology, it does not require a networking device for it to function correctly as each device will
connect to two other devices. This also allows the network to be flexible. It can expand the ring as long as the new device can
connect to two other devices to continue the ring. Furthermore, as the data is travelling in one direction, this can reduce collisions
that occur when transmissions are sent. However, this topology can be slow. For example, if a device has to transmit data to a device
that is “behind” it on the ring, it will have to go to every other device before it reaches its destination.
3. Communication and Bandwidth:
Bandwidth is a key concept in many telecommunications applications. In radio communications, for example, bandwidth is the
frequency range occupied by a modulated carrier signal. ... One definition of bandwidth, for a system, could be the range of
frequencies over which the system produces a specified level of performance.
4. Network communication, or internetworking:
Defines a set of protocols (that is, rules and standards) that allow application programs to talk with each other without regard to the
hardware and operating systems where they are run.

5. Rules of communication
OSPF: It is a steering protocol for the most part utilized for bigger organizations either a solitary organization or a gathering
network. It is planned by Internet Engineering Task Force. It can likewise use as a Gateway Protocol.
FTP: File Transfer Protocol (FTP) is primarily a standard protocol of Network which is utilized to transfer
17
information from a customer to host or one worker to another worker. If a client or administrator needs to transfer a file on a site
the person needs a username, secret phrase, and host address.
SMTP: Simple mail transfer protocol resembles a media which transfers email. SMTP consistently work with
POP3 administration.
TCP/IP: Transmission Control Protocol and Internet Protocol is a bunch of a protocol stack. Essentially it
is two distinctive protocols. TCP/IP is firmly related to FTP, SMTP, HTTP.

6. Bandwidth:
Measured as the amount of data that can be transferred from one point to another within a network in a specific amount of time.
Typically, bandwidth is expressed as a bitrate and measured in bits per second (bps).

P3 Discuss the operating principles of networking devices and server types


I. Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)
1. Repeater:
A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too
weak or corrupted so as to extend the length to which the signal can be transmitted over the same network. An important point to
be noted about repeaters is that they do not amplify the signal. When the signal becomes weak, they copy the signal bit by bit and
regenerate it at the original strength. It is a 2 port device.

18
2. Hub:
A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector
in star topology which connects different stations. Hubs cannot filter data, so data packets are sent to all connected devices. In
other words, collision domain of all hosts connected through Hub remains one. Also, they do not have the intelligence to find out
best path for data packets which leads to inefficiencies and wastage.

3. Bridge:
A bridge operates at data link layer. A bridge is a repeater, with add on the functionality of filtering content by reading the MAC
addresses of source and destination. It is also used for interconnecting two LANs working on the same protocol. It has a single
input and single output port, thus making it a 2 port device.

19
4. Switch:
A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large number of ports imply less traffic) and
performance. A switch is a data link layer device. The switch can perform error checking before forwarding data, that makes it
very efficient as it does not forward packets that have errors and forward good packets selectively to correct port only. In other
words, switch divides collision domain of hosts, but broadcast domain remains same.

5. Routers:
A router is a device like a switch that routes data packets based on their IP addresses. Router is mainly a Network Layer device.
Routers normally connect LANs and WANs together and have a dynamically updating routing table based on which they make
decisions on routing the data packets. Router divide broadcast domains of hosts connected through it.

20
6. Gateway:
A gateway, as the name suggests, is a passage to connect two networks together that may work upon different networking
models. They basically work as the messenger agents that take data from one system, interpret it, and transfer it to another
system. Gateways are also called protocol converters and can operate at any network layer. Gateways are generally more
complex than switch or router.

21
7. Brouter:

22
It is also known as bridging router is a device which combines features of both bridge and router. It can work either at data link
layer or at network layer. Working as router, it is capable of routing packets across networks and working as bridge, it is capable
of filtering local area network traffic.

II. Network type:


There are many types of servers that all perform different functions. Many networks contain one or more of the common server
types:
1. File servers: store and distribute files. Multiple clients or users may share files stored on a server. In addition, centrally storing files
offers easier backup or fault tolerance solutions than attempting to provide security and integrity for files on every device in an
organization. File server hardware can be designed to maximize read and write speeds to improve performance.

23
2. Print servers: allow for the management and distribution of printing functionality. Rather than attaching a printer to every
workstation, a single print server can respond to printing requests from numerous clients. Today, some larger and higher-end
printers come with their own built-in print server, which removes the need for an additional computer-based print server. This
internal print server also functions by responding to print requests from a client.
3. Application servers: run applications in lieu of client computers running applications locally. Application servers often run resource-
intensive applications that are shared by a large number of users. Doing so removes the need for each client to have sufficient
resources to run the applications. It also removes the need to install and maintain software on many machines as opposed to only
one.
4. DNS servers: Domain Name System (DNS) servers are application servers that provide name resolution to client computers by
converting names easily understood by humans into machine-readable IP addresses. The DNS system is a widely distributed
database of names and other DNS servers, each of which can be used to request an otherwise unknown computer name. When a
client needs the address of a system, it sends a DNS request with the name of the desired resource to a DNS server. The DNS server
responds with the necessary IP address from its table of names.
5. Mail servers: are a very common type of application server. Mail servers receive emails sent to a user and store them until
requested by a client on behalf of said user. Having an email server allows for a single machine to be properly configured and
attached to the network at all times. It is then ready to send and receive messages rather than requiring every client machine to
have its own email subsystem continuously running.
6. Web servers: One of the most abundant types of servers in today’s market is a web server. A web server is a special kind of
application server that hosts programs and data requested by users across the Internet or an intranet. Web servers respond to
requests from browsers running on client computers for web pages, or other web-based services. Common web servers include
Apache web servers, Microsoft Internet Information Services (IIS) servers and Nginx servers.
7. Database servers: The amount of data used by companies, users, and other services is staggering. Much of that data is stored in
databases. Databases need to be accessible to multiple clients at any given time and can require extraordinary amounts of disk
space. Both of these needs lend themselves well to locating such databases on servers. Database servers run database applications
and respond to numerous requests from clients. Common database server applications include Oracle, Microsoft SQL Server, DB2,
and Informix.
8. Virtual servers: are taking the server world by storm. Unlike traditional servers that are installed as an operating system on machine hardware,
virtual servers exist only as defined within specialized software called hypervisor. Each hypervisor can run hundreds, or even thousands, of
virtual servers all at once. The hypervisor presents virtual hardware to the server as if it were real physical hardware. The virtual server uses the

24
virtual hardware as usual, and the hypervisor passes the actual computation and storage needs onto the real hardware beneath, which is shared
among all the other virtual servers.
9. Proxy servers: A proxy server acts as an intermediary between a client and a server. Often used to isolate either the clients or servers for
security purposes, a proxy server takes the request from the client. Instead of responding to the client, it passes the request on to another server
or process. The proxy server receives the response from the second server and then replies to the original client as if it were replying on its own.
In this way, neither the client nor the responding server needs to directly connect to each other.
10. Monitoring and management servers: Some servers exist to monitor or manage other systems and clients. There are many types of
monitoring servers. Several of them listen to the network and receive every client request and server response, but some do not
request or respond to data themselves. In this way, the monitoring server can keep track of all the traffic on the network, as well as
the requests and replies of clients and servers, without interfering with those operations. A monitoring server will respond to
requests from monitoring clients such as those run by network administrators watching the health of the network.

25
P4 Discuss the inter-dependence of workstation hardware with relevant networking software.
- The definition of interdependency is a situation where two or more people or things are dependent upon each other. And that
inter-dependence will make a system
- It is a relationship in which changes or events in any single part of a system will produce some reaction or have some significant
consequences in other parts of the system. An example of interdependency is a relationship where a company depends on someone
to provide a part and the supplier who provides the part depends on the company for its business.
- In networking, the workstation hardware is dependent upon the networking software and so is the networking software. If either
the hardwałe or the software has issues, the whole system will not function properly.
- A work station is a computer designed for individual use that is more capable than a personal computer. As they are PCs, they can
be used independently of the mainframe assuming that they have their own apps installed and their own hard disk storage.
- Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse,
keyboard, computer data storage, graphics card, sound card, speakers and motherboard.
- Network hardware contains physical parts of network such as routers, switches, hubs, modems,..

26
M1 Compare common networking principles and how protocols enable the effectiveness of networked systems.
Compare common networking principles and how protocols enable the effectiveness of networked systems explore a range of
server types and justify the selection of a server, considering a given scenario regarding cost and performance optimisation install
and configure network services and applications on your choice recommend potential enhancements for the networked systems
considering a given scenario, identify the topology protocol selected for the efficient utilisation of a networking system design a
maintenance schedule to support the networked system use critical reflection to evaluate own work and justify valid conclusion.
Conclusion
The theories I gave above are not complete, but they bring the report to a perfect conclusion.
Evaluation
My theory is unlikely to be correct and may be completely wrong but I have tried my best in this matter.

27
Link Prefer
All picture copyright by google

A constraint network, không ngày tháng [Trực tuyến]


Available at: https://www.google.com/search?
q=Constraint+of+the+network&oq=Constraint+of+the+network&aqs=chrome..69i57j0i22i30l4j69i60l3.1281j0j4&sourceid=chrome&ie=UTF-8

28
Bandwidth, không ngày tháng [Trực tuyến]
Available at: https://www.paessler.com/it-explained/bandwidth

Benefit of the network, không ngày tháng [Trực tuyến]


Available at: https://www.bing.com/search?
q=Benefit+of+the+network&cvid=8b08707e47814e559a7a41b3fe564089&aqs=edge..69i57.314j0j4&FORM=ANAB01&PC=ACTS

Communication and Bandwidth, không ngày tháng [Trực tuyến]


Available at: https://www.google.com/search?q=Communication+and+Bandwidth&sxsrf=ALeKk03cTAVUeVNcSt-
GpIKGsVVZ_A6Nuw:1620610332779&ei=HI2YYKaLL4vM-Qbxr7H4AQ&start=0&sa=N&ved=2ahUKEwimidH5-
73wAhULZt4KHfFXDB84ChDy0wN6BAgBEDo&biw=1920&bih=979

Definition: Physical & Logical Topology, không ngày tháng [Trực tuyến]
Available at: https://www.google.com/search?q=Definition%3A+Physical+%26+Logical+Topology&oq=Definition%3A+Physical+
%26+Logical+Topology&aqs=chrome.0.69i59j69i58j69i60l3.638j0j7&sourceid=chrome&ie=UTF-8

Ebook, không ngày tháng [Trực tuyến]


Available at: https://drive.google.com/drive/u/1/folders/1vDtCCuzrRWFw6349O-EzzkGgq7CHux6L

Network protocol definition, không ngày tháng [Trực tuyến]


Available at: https://www.manageengine.com/network-monitoring/network-protocols.html

P1, không ngày tháng [Trực tuyến]


Available at: https://www.ukessays.com/essays/computer-science/benefits-and-constraints-of-different-networking-computer-science-
essay.php

P2, không ngày tháng [Trực tuyến]


Available at: https://www.ukessays.com/essays/information-systems/explain-the-impact-of-network-topology-communication-and-bandwidth-
requirements.php

P3, không ngày tháng [Trực tuyến]


Available at: https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-gateways/

29
Protocols and standards, không ngày tháng [Trực tuyến]
Available at: https://www.google.com/search?
q=protocol+and+standards+of+networking&oq=Protocol+and+Standards+&aqs=chrome.2.69i57j0i19l4j69i60l3.3754j0j4&sourceid=chrome&ie=
UTF-8

Rules communication, không ngày tháng [Trực tuyến]


Available at: https://www.computernetworkingnotes.com/networking-tutorials/types-of-network-protocols-explained-with-functions.html

Standards Organizations, không ngày tháng [Trực tuyến]


Available at: https://www.electronicdesign.com/technologies/communications/article/21796419/10-standards-organizations-that-affect-you-
whether-you-know-it-or-not

What is Network:, không ngày tháng [Trực tuyến]


Available at: https://bizflycloud.vn/tin-tuc/network-la-gi-loi-ich-va-cac-loai-network-20200608111724276.htm

[CITATION Wha1 \l 1033 ]


[ CITATION P1 \l 1033 ]
[ CITATION P2 \l 1033 ]
[ CITATION P31 \l 1033 ]
[ CITATION Aco1 \l 1033 ]
[ CITATION Pro1 \l 1033 ]
[ CITATION Net1 \l 1033 ]
[ CITATION Ben1 \l 1033 ]
[ CITATION Sta1 \l 1033 ]
[ CITATION Def1 \l 1033 ]
30
[ CITATION Com \l 1033 ]
[ CITATION Rul \l 1033 ]
[ CITATION Ban \l 1033 ]
[ CITATION Ebo \l 1033 ]

31

You might also like