You are on page 1of 37

Assignment 1- 1619

Networking - FPT
Computer Networks
FPT University
36 pag.

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
ASSIGNMENT 1 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking Infrastructure

Submission date Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name Student ID

Class Assessor name

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Grading grid

P1 P2 P3 P4 M1 M2 D1

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
❒ Summative Feedback: ❒ Resubmission Feedback:

Grade: Assessor Signature: Date:


Lecturer Signature:

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Student Name/ID Number:

Unit Number and Title: Unit 2: Networking

Academic Year: 2021 – 2022

Unit Assessor:

Assignment Title: Networking Infrastructure

Issue Date: April 1st, 2022

Submission Date:

Internal Verifier Name:

Date:

Submission Format:

Format:

● The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs
and subsections as appropriate, and all work must be supported with research and referenced using the
Harvard referencing system. Please also provide a bibliography using the Harvard referencing system.

Submission

● Students are compulsory to submit the assignment in due date and in a way requested by the Tutor.
● The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/.
● Remember to convert the word file into PDF file before the submission on CMS.

Note:

● The individual Assignment must be your own work, and not copied by or from another student.
● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you must
reference your sources, using the Harvard style.
● Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply this
requirement will result in a failed assignment.
Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)

Unit Learning Outcomes:


LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

Assignment Brief and Guidance:

Assignment scenario

You are employed as a network engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which has branches in Ho Chi Minh City, Hanoi, Da Nang and Can Tho. The company has
been contracted to implement a networking project from a local educational institute. The specification of the
project is given below:

• People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the
academic heads and the programme managers, and 3 computer network administrators.
• Resources: 50 student lab computers, 35 staff computers, and 3 printers.
• Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab
located on the first floor and another located on the second floor.
Task 1

The CEO of the company, Mr. Nguyen, has asked you to investigate and explain networking principles, protocols
and devices and submit a report.

You will need to produce a report that includes the following:

• An introduction to provide an overview of your report.


• Benefits and constraints of different types of networks and networking standards.
• The impact of network topology, speed of communication and bandwidth requirements.
• Effectiveness of networking systems.
• Discussion on operating principles of networking devices and server types and networking software.
• Discuss the relationship of workstation hardware with networking software.
• Explore a range of server types and justify the selection of a server, considering a given scenario regarding
cost and performance optimization.
• For the given specification, identify the topology protocol for the efficient utilization of a networking
system.

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Learning Outcomes and Assessment Criteria (Assignment 1):
Learning Outcome Pass Merit Distinction
LO1 P1 Discuss the benefits M1 Compare common D1 Considering a given
and constraints of networking principles scenario, identify the
different network types and how protocols topology protocol
and standards. enable the effectiveness selected for the efficient
of networked systems. utilization of a
P2 Explain the impact networking system.
of network topology,
communication and
bandwidth requirements.

LO2 P3 Discuss the M2 Explore a range of


operating principles of server types and justify
networking devices and the selection of a server,
server types. considering a given
scenario regarding cost
P4 Discuss the inter- and performance
dependence of optimisation.
workstation hardware
with relevant
networking software.

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Contents
P1. Discuss the benefits and constraints of different network types and standards....................................................... 8
1. What is network? ............................................................................................................................................... 8
2. Network type ..................................................................................................................................................... 9
3. Protocol ........................................................................................................................................................... 12
3.1. Network protocol definition .................................................................................................................... 12
3.2. List some common protocols................................................................................................................... 12
4. The international standard organizations and the names of the standards used in networking. ...................... 14
P2. Network topology & communication and Bandwidth requirements ..................................................................... 16
1. Network topology definition ........................................................................................................................... 16
2. The Impact of topology ................................................................................................................................... 16
2.1. Definition: Physical & Logical Topology ............................................................................................... 16
2.2. Difference between physical topology and logical topology .................................................................. 17
3. Types of network topologies ........................................................................................................................... 17
4. The communication and bandwidth ................................................................................................................ 23
4.1. What’s network communication .............................................................................................................. 23
4.2. The rules in the network .......................................................................................................................... 24
4.3. What’s bandwidth? .................................................................................................................................. 25
P3. Discuss the operating principles of networking devices and server types ............................................................ 26
1. Describe the operation of a network device .................................................................................................... 26
2. Other common network devices ...................................................................................................................... 27
3. Some common types of servers ....................................................................................................................... 27
P4. Discuss the inter-dependence of workstation hardware with relevant networking software ................................ 29
1. What is Interdependence?................................................................................................................................ 29
2. Workstation hardware ..................................................................................................................................... 29
3. Networking software .......................................................................................................................................
Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
29
4. The different of interdependence of the two ................................................................................................... 29
M1. Compare common networking principles and how protocols enable the effectiveness of networked systems ... 30
1. The common networking principles ................................................................................................................ 30
1.1. The common networking principles ........................................................................................................ 30
1.2. Compare The namely circuit switching principle and the packet switching principle: ........................... 31
2. The protocols enable networked systems to connect efficiently using these principles .................................. 32
2.1. The protocols ........................................................................................................................................... 32
2.2. Practical situations illustration................................................................................................................. 32
M2. Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost
and performance optimisation ..................................................................................................................................... 33
1. The common server types:............................................................................................................................... 33
1.1. CPU and RAM figures ............................................................................................................................ 33
1.2. Bandwidth................................................................................................................................................ 33
Reference ..................................................................................................................................................................... 34

Table of figures
Figure 1: What is network (Learn Networking) ............................................................................................................ 8
Figure 2: Local Area Network..................................................................................................................................... 10
Figure 3: What is MAN? ............................................................................................................................................. 10
Figure 4: What is WAN............................................................................................................................................... 11
Figure 5: What is PAN ................................................................................................................................................ 11
Figure 6: What is SAN ................................................................................................................................................ 11
Figure 7: TCP/IP ......................................................................................................................................................... 12
Figure 8: HTTP ........................................................................................................................................................... 13
Figure 9: DNS ............................................................................................................................................................. 13
Figure 10: DHCP ......................................................................................................................................................... 14
Figure 11: Network Standards ..................................................................................................................................... 15
Figure 12: Physical topology ....................................................................................................................................... 16
Figure 13: Logical Topology ....................................................................................................................................... 16
Figure 14: Difference between physical topology and logical
Document topology ..................................................................... 17
shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Figure 15: Star Topology............................................................................................................................................. 18
Figure 16: Bus Topology ............................................................................................................................................. 18
Figure 17: Ring Topology ........................................................................................................................................... 19
Figure 18: Dual Ring Topology .................................................................................................................................. 19
Figure 19: Tree Topology............................................................................................................................................ 20
Figure 20: Mesh Topology .......................................................................................................................................... 20
Figure 21: Hybrid Topology........................................................................................................................................ 21
Figure 22: Network communication ............................................................................................................................ 23
Figure 23: Message Encoding ..................................................................................................................................... 24
Figure 24: Message Delivery Options ......................................................................................................................... 25
Figure 25: Switch ........................................................................................................................................................ 26
Figure 26: Switch operation diagram .......................................................................................................................... 26
Figure 27: Firewall ...................................................................................................................................................... 27

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
P1. Discuss the benefits and constraints of different network types
and standards
1. What is network?

Figure 1: What is network (Learn Networking)

- A network is a collection of computers, servers, mainframes, network devices, peripherals, or


other devices connected to allow data sharing. An example of a network is the Internet, which
connects millions of people all over the world. To the right is an example image of a home
network with multiple computers and other network devices all connected.

- There are two very common types of networks include:

+ Local Area Network (LAN)

+ Wide Area Network (WAN)


Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
2. Network type
- Local-area networks (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN)
- There are other types of Computer Networks also, like :

▪ PAN (Personal Area Network)


▪ SAN (Storage Area Network)

Number Type Benefits Constraints


1 Local Area Network (LAN) - Easy and Cheap - High setup cost
Communication - Coverage area is limited
- Easy to share internet, - Privacy Violations
resources
- Data security
2 Wide Area Network (WAN) - Cover large - The setup cost is high
geographical area - Security problems than LAN
- Centralized data and MAN
- High bandwidth: - Maintenance Issues
3 Metropolitan Area Network - Less expensive than - Difficult to manage
(MAN) WAN - Internet Speed Difference
- Sending Local emails - Hacker Attack
fast
- High security than
WAN
4 Personal Area Network - Easy to install and use
- Low covverage, prone to
(PAN) interference
- Reliability and security
- Has mobility - Affect health
- Has a slow data transfer rate
5 Storage-Area Network (SAN) - Highly Protective Data - More Expensive
- Fastest Speed of Data - High Maintenance
Transmission - There get chance of data
- Having Fault Tolerance leakage

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Figure 2: Local Area Network

Figure 3: What is MAN?

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Figure 4: What is WAN

Figure 5: What is PAN

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)

Figure 6: What is SAN


3. Protocol
3.1. Network protocol definition
- A network protocol is an established set of rules that determine how data is transmitted between
different devices in the same network.

3.2. List some common protocols


- TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication
protocols used to interconnect network devices on the internet. TCP/IP is also used as a
communications protocol in a private computer network (an intranet or extranet).

Figure 7: TCP/IP

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
- HTTP (HyperText Transfer Protocol) is one of the standard protocols on the Internet, used to
communicate information between the service provider (Web server) and the service user (Web
server). client), is the Client/Server protocol used for the World Wide Web

Figure 8: HTTP
- The domain name system (DNS) is a naming database in which internet domain names are located
and translated into Internet Protocol (IP) addresses. The domain name system maps the name
people use to locate a website to the IP address that a computer uses to locate that website.

Figure 9: DNS

- DHCP (Dynamic Host Configuration Protocol


Document shared onorwww.docsity.com
Dynamic Host Configuration Protocol) is a
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
protocol used to provide fast, automatic, and centralized management of the distribution of IP
addresses in a network. DHCP is also used to configure the correct subnet mask, default gateway,
and DNS server information on the device.
Figure 10: DHCP

- The Internet Control Message Protocol (ICMP) is a network layer protocol used by network
devices to diagnose network communication issues. ICMP is mainly used to determine whether or
not data is reaching its intended destination in a timely manner. Commonly, the ICMP protocol is
used on network devices, such as routers. ICMP is crucial for error reporting and testing, but it can
also be used in distributed denial-of-service (DDoS) attacks.

4. The international standard organizations and the names of the standards


used in networking.
- International Standards Organization (ISO)
- Consultative Committee for International Telephony and Telegraphy (CCITT)
- International Telecommunication Union (ITU)
- Institute of Electronics and Electrical Engineers (IEEE)
- American National Standards Institute (ANSI)
- Internet Research Task Force (IETF)
- Electronic Industries Association (EIA)

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Figure 11: Network Standards
Protocol RFC(s)

DHCP 2131, 2132

WiFi 802.11

IEEE 802.3

DNS 1034, 1035

FTP 959

IP 791, 919, 922, 950

TCP 793

ICMP 792

IMAP4 2060

Table of RFCs
Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
P2. Network topology & communication and Bandwidth
requirements
1. Network topology definition
- Network topology is the arrangement of the elements (links, nodes, etc.) of a communication
network. Network topology can be used to define or describe the arrangement of various types of
telecommunication networks, including command and control radio networks, industrial
fieldbuses, and computer networks

2. The Impact of topology


2.1. Definition: Physical & Logical Topology
- Physical topology is the placement of the various components of a network (e.g., device location
and cable installation).

Figure 12: Physical topology

- A logical topology is a concept in networking that defines the architecture of the communication
mechanism for all nodes in a network. Using network equipment such as routers and switches, the
logical topology of a network can be dynamically maintained and reconfigured.

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)

Figure 13: Logical Topology


2.2. Difference between physical topology and logical topology

Figure 14: Difference between physical topology and logical topology

3. Types of network topologies


- Star Topology

- Bus Topology

- Ring Topology

- Dual Ring Topology

- Tree Topology

- Mesh Topology
Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)

- Hybrid Topology
Figure 15: Star Topology

Figure 16: Bus Topology

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Figure 17: Ring Topology

Figure 18: Dual Ring Topology

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Figure 19: Tree Topology

Figure 20: Mesh Topology

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Figure 21: Hybrid Topology
Each topology has its own advantages and disadvantages. We need to explain the good and bad sides of
topology. Here is a table of advantages and disadvantages of each topology:

Popular topologies Advantages Disadvantages

Star topology - Easy to manage from one point - Requires specialist network
– the switch hardware (the switch)
- Easy to add and remove nodes - Makes the network reliant on
- Durable the switch’s performance
- Low cable usage - A finite number of switch ports
- Good for small businesses limits the network’s size
Bus topology - Easy installation - Backbone performance is
- Fewer cables required than critical
Mesh and star topology - Easily congested on busy
- Good for small businesses periods
- Low cost - Efficiency decreases rapidly
- Easy to manage and expand with each added node
- Data can only travel in one
direction at any point in time
Ring topology - Low incidence of collision - One faulty node will bring the
- Low cost entire network down
- Suitable for small businesses - Requires extensive
- Dual ring option provides preventative maintenance and
continuity through redundancy monitoring
Document shared on www.docsity.com
- Performance declines rapidly
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com) with each additional node
- Reorganizing the network
requires a full system shutdown
Dual Ring Topology - Risk of packet collisions is - The failure of one node can
very low take the entire network out of
- Data can move through operation
network nodes at high speeds - Could be knocked offline by a
- More resistant to failures transmission line failure
- Low cost to install - The more devices that are
added to a network the more
communication delay
- Need to shut down the network
to make changes
Tree Topology - Blends bus and star topologies - The network is dependent on
- Easy to manage the health of the root node
- Easy to expand - Requires networking expertise
- Suitable for middle-sized - Involves a lot of cable
businesses - Larger implementations require
monitoring software
- Can get expensive
Mesh Topology - High speeds data transfers - Requires a very large amount
- Durable network that isn’t of cable
dependent on any one node - Can be difficult to secrete all
- Very secure the cable
- Suitable for high-value - Takes a long time to set up
networks for small to middle- - Requires meticulous planning
sized networks - There is a limit to the number
- Easy to identify faulty of cables each computer can
equipment accommodate
Hybrid Topology - Very flexible - Requires professional
- Suitable for middle-sized and management
large organizations - Needs monitoring software
- Infinitely extendible - Equipment costs are high
- Adaptable to optimize
equipment use

- Summary: Before choosing a topology, we will want to closely consider the following:
• Length of cable needed
• Cable type
• Cost
• Scalability
Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
4. The communication and bandwidth
4.1. What’s network communication
- In my opinion, network communication is the exchange of information between the transmitter and
the receiver through computers and computer networks.

Figure 22: Network communication

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
4.2. The rules in the network

Figure 23: Message Encoding

- Message formatting and encapsulation :


• There is an agreed format by sender and receiver. It encapsulates information to identify
sender and receiver rightly.
• A message format will depend on the type of message and the medium through which the
message is delivered.
• Message encapsulation is a process that is used to place one message inside another
message for transfer from the source to the destination.
- Message size :
• Here long messages must break into small pieces to travel across a network or The process
of breaking up a long message into individual pieces before being sent over the network.
- Message timing :
• It manages flow control. Acknowledgments response time out. This requires certain timing
control information. It checks for any delays in data passing. It includes rules like Access
method, flow control, response timeout.

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Figure 24: Message Delivery Options

4.3. What’s bandwidth?


- Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless
communications link to transmit data over a network connection in a given amount of time.
Typically, bandwidth is represented in the number of bits, kilobits, megabits or gigabits that can be
transmitted in 1 second. Synonymous with capacity, bandwidth describes data transfer rate.
Bandwidth is not a measure of network speed -- a common misconception.

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
P3. Discuss the operating principles of networking devices and
server types
1. Describe the operation of a network device
- The network has a large number of active devices, such as switch. And this is how the network
operates.
• When the switch gets data from one of the linked devices, it transfers it exclusively to the
port connected to the destination system. (For instance, in Figure 24, the switch transmits
data from host A to host C without broadcasting it to hosts B and D.)
• Determines the right port based on the Media Access Control (MAC) address of the
devices.
• This term refers to the MAC table, which holds the MAC address together with the
matching port number.
- Switch function:
• Control the flow of signals
• As a Data Link Layer device, the MAC address is used to transport data.
• Data transfer to specific port

Figure 25: Switch

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)

Figure 26: Switch operation diagram


2. Other common network devices
- Hub: Connect computers and transmit sachet.
- Bridge: Connect two networks together into one large network.
- Repeater: Connect remote devices.
- Router: Direct sachet.
- Firewalls: Protect the home network from violence Web sites and access hackers.
- Gateway: utilized for data sharing across all existing communication technologies It is a piece of
software used to translate protocols.

Figure 27: Firewall

- How set up firewall


• Step 1: Secure your firewall
• Step 2: Architect your firewall zones and IP addresses
• Step 3: Configure access control lists
• Step 4: Configure your other firewall services and logging
• Step 5: Test your firewall configuration

- Firewalls are a type of barrier or protection that businesses, organizations, individuals, and the
kingdom use to protect their information. Its purpose is to prevent unauthorized access to requests
from outside or intranet security, so preventing data in the inner community from leaving. The
firewall's primary function is to manage the flow of data transferred between the two zones; the
relied-on areas are local area networks (or private networks of a corporate company, agency, etc.)
that are approved for use by that employer or agency.
Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)

3. Some common types of servers


- File servers
• File servers store and distribute files. Multiple clients or users may share files stored on a
server. In addition, centrally storing files offers easier backup or fault tolerance solutions
than attempting to provide security and integrity for files on every device in an
organization. File server hardware can be designed to maximize read and write speeds to
improve performance.
- Print servers

• Print servers allow for the management and distribution of printing functionality. Rather than
attaching a printer to every workstation, a single print server can respond to printing requests
from numerous clients. Today, some larger and higher-end printers come with their own
built-in print server, which removes the need for an additional computer-based print server.
This internal print server also functions by responding to print requests from a client.
- Application servers

• Application servers run applications in lieu of client computers running applications locally.
Application servers often run resource-intensive applications that are shared by many users.
Doing so removes the need for each client to have enough resources to run the applications.
It also removes the need to install and maintain software on many machines as opposed to
only one.
- DNS servers
• Domain Name System (DNS) servers are application servers that provide name resolution to
client computers by converting names easily understood by humans into machine-readable
IP addresses. The DNS system is a widely distributed database of names and other DNS
servers, each of which can be used to request an otherwise unknown computer name. When
a client needs the address of a system, it sends a DNS request with the name of the desired
resource to a DNS server. The DNS server responds with the necessary IP address from its
table of names.
- Mail servers
• Mail servers are a very common type of application server. Mail servers receive emails sent
to a user and store them until requested by a client on behalf of said user. Having an email
server always allows for a single machine to be properly configured and attached to the
network. It is then ready to send and receive messages rather than requiring every client
machine to have its own email subsystem continuously running.
- Web servers
• One of the most abundant types of servers in today’s market is a web server. A web server is
a special kind of application server that hosts programs and data requested by users across
the Internet or an intranet. Web servers respond to requests from browsers running on client
computers for web pages, or other web-based services. Common web servers include Apache
web servers, Microsoft Downloaded
Internet Information
Document Services (IIS) servers and Nginx servers.
shared on www.docsity.com
by: thang-vu-4 (vuanhthang478@gmail.com)
- Database servers
• The amount of data used by companies, users, and other services is staggering. Much of that
data is stored in databases. Databases need to be accessible to multiple clients at any given
time and can require extraordinary amounts of disk space. Both needs lend themselves well
to locating such databases on servers. Database servers run database applications and respond
to numerous requests from clients. Common database server applications include Oracle,
Microsoft SQL Server, DB2, and Informix.
- Proxy servers
• A proxy server acts as an intermediary between a client and a server. Often used to isolate
either the clients or servers for security purposes, a proxy server takes the request from the
client. Instead of responding to the client, it passes the request on to another server or process.
The proxy server receives the response from the second server and then replies to the original
client as if it were replying on its own. In this way, neither the client nor the responding
server needs to directly connect to each other.

P4. Discuss the inter-dependence of workstation hardware with


relevant networking software
1. What is Interdependence?
- Interdependence is a connection in which when two people cease cooperating or lessen their
collaboration, the relationship becomes detrimental or non-existent. For instance, without one of
the two, one will be unable to accomplish or do even the most difficult tasks.

2. Workstation hardware
- A typical workstation is a computer that is configured with a network interface card, networking
software, and the appropriate cables. Workstations do not necessarily need large storage hard
drives, because files can be saved on the file server. Almost any computer can serve as a network
workstation.

3. Networking software
- Network software is an extremely broad term for a range of software aimed at the design and
implementation of modern networks. Various types of network software support the creation,
calibration and operation of networks.

4. The different of interdependence of the two


- In my opinion, the workstation's hardware and software are inseparable, since the software cannot
function without the hardware and the hardware cannot function without the program. Just as
achieving your objectives involves planning and taking action, so does this. Think of software as a
stream of ideas, concepts, and directives.
DocumentA computer's
shared hardware is the action of pictures that aid in
on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
the implementation of your aims. You must think and act in order to reach your objectives.
Workstation hardware and software are also required to execute a task in the network. Having both
of these tools at your disposal will help you get the job done. Both the hardware and the software
are continually being built and improved as a result of the continuous improvements made possible
by hardware.

M1. Compare common networking principles and how protocols


enable the effectiveness of networked systems
1. The common networking principles
1.1. The common networking principles
- Principle 1: Understand the user need:
• Understand your basic network requirements: We need to know what business services
your users depend on. what network services they rely on to access them
• Design networks for a roaming user base
• Design services to be accessed wider than your own department
• Design for organisations who share a site to share the site’s network
• Consider mobile data (3G,4G) as an alternative data transport mechanism
• Be able to support your users
- Principle 2: Use services to protect your data, don’t rely on the network
• Understand the threat
• Design protection of services as near to the service as possible
• Publish routes by default
• Encrypt without compromising performance
• Protect your networks
• Layer your security
- Principle 3: Design for interworking and flexibility
• Use open standards
• Maximise use of commoditised services
• Consolidate use of data networks and migrate to IP based technologies
• Publish DNS names
• Remove technical barriers to cross-government access
• Join up to provide resilience
- Principle 4: The circuit switching:
• Circuit switching was designed specifically for voice communication and is not ideal for
data transmission. In circuit Document
switching, shared onawww.docsity.com
dedicated channel must be created between the
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
sender and receiver before they can speak to one another.
• Circuit switching is most often seen in telephone systems that require a dedicated, physical
path.
• Circuit switching, which is set up at the physical layer, sends the entire message through
the dedicated channel. This type of switching isn’t ideal for data transmission because data
is sent and received in streams, meaning the line would remain idle in between
transmission spurts. That would be a waste of bandwidth.
- Principle 5: The packet switching:
• Unlike circuit switching, packet switching does not require the use of a dedicated channel.
Packet-based networks break down a message into smaller data packets which then look for
the most efficient route available. For efficiency’s sake, each data packet could go a
different route. The header address contains the source and destination nodes. Once all of
the data packets reach the correct destination, the packets are extracted and reassembled to
create the sender’s original message.
• Packet switching is most often used for data and voice applications that aren’t time-
sensitive.

1.2. Compare The namely circuit switching principle and the packet
switching principle:
The circuit switching The packet switching

Advantages - Decreases the delay the user - More efficient than circuit
experiences before and during a switching
call - Data packets are able to find the
- The call will be done with a destination without the use of a
steady bandwidth, dedicated dedicated channel
channel, and consistent data rate - Reduces lost data packets because
- Packets are always delivered in packet switching allows for
the correct order resending of packets
- More cost-effective since there is
no need for a dedicated channel
for voice or data traffic

Disadvantages - Great for only voice - Not ideal for applications that are
communicationDocument shared on www.docsity.com in constant use, such as high
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
- Doesn’t use resources efficiently volume voice calls
- High-volume networks can lose
data packets during high-traffic
- Dedicated channels for circuit times; those data packets cannot
switching are unavailable for any be recovered or resent during
other use transmission
- There is a higher cost to dedicate - There is a lack of security
one channel per use protocols for data packets during
transmission

2. The protocols enable networked systems to connect efficiently using


these principles
2.1. The protocols
- Transmission Control Protocol (TCP): The heart of the Internet Protocol Suite, it ensures that data
is delivered reliably across IP, issues commands, and checks for problems.

- Simple Network Management Protocol (SNMP): Used to monitor, configure, and operate network
devices, as well as to send notifications to the server when certain events occur.

- POP3 (Post Office Protocol Version 3): A protocol for downloading email messages from the Mail
Server to a computer over a TCP/IP connection.

- Internet Protocol (IP): Through Internet Protocol routing, it sends data throughout the network and
contributes to the establishment of the internet.

2.2. Practical situations illustration


- Scenario: During the covid-19 epidemic, my team and I were unable to collaborate, but we wanted
to complete a pre-existing assignment of creating a group cartoon film. In the following scenario,
we employ two principles: packet switching and circuit switching:
• Circuit Switching: We talk and discuss through phone conversations to ensure that
our thoughts are harmonized.
• Packet Switching: Through dialogue. We have divided the work among the team
Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
members. When everyone has finished their work, we mail the packets to each other
and put the pieces together to make a finished product. The packets are ordered
alphabetically. If we come into the circumstance of a packet during the fusion
process, we do not need to worry since it will be transmitted by the sender.
M2. Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimisation
1. The common server types:
- Both Linux and Windows are widely utilized operating systems in today's server systems. As a
result, selecting the appropriate operating system for the corporate server is always a major
problem.
- Linux is a less expensive operating system, although Windows is better suited for websites that use
ASP or ASP.NET applications.
- Linux is well-known for its fast speed and security. Window, on the other hand, stands out in terms
of strength and flexibility. If your website is developed using PHP and Perl, go with Linux as your
server operating system.

1.1. CPU and RAM figures


- When selecting a vendor, take into account the CPU and RAM specifications. These settings are
quite demanding if your server is utilized to host high-traffic, high-interaction Web sites.

1.2. Bandwidth
- The quantity of data that may be transported at any one moment is determined by bandwidth. As a
result, websites with high graphic quality or multimedia Web pages will use more bandwidth than
standard ones.

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Reference
Computer Hope. (2021, July 6). What is a Network? What Is Network. Retrieved March 31, 2022, from

https://www.computerhope.com/jargon/n/network.htm

Jahejo, A. (2020b, September 17). Local Area Network | Advantages and Disadvantages of LAN.

Computer Network Topology. Retrieved April 1, 2022, from https://computernetworktopology.com/local-area-network/

Jahejo, A. (2021, February 7). Metropolitan Area Network | MAN Network. Computer Network Topology.

Retrieved April 1, 2022, from https://computernetworktopology.com/metropolitan-area-network/

Jahejo, A. (2020c, September 17). Wide Area Network | Advantages and Disadvantages of WANs.

Computer Network Topology. Retrieved April 1, 2022, from https://computernetworktopology.com/wide-area-network/

Banger, E. R. S. (2021, August 27). Advantages and Disadvantages of SAN (Storage Area Network).

DigitalThinkerHelp. Retrieved April 1, 2022, from https://digitalthinkerhelp.com/advantages-and-disadvantages-of-san-storage-area-network/

C. (2021, September 9). What Are Network Protocols and How Are They Used? CISO MAG | Cyber

Shacklett, M. E., Novotny, A., & Gerwig, K. (2021, July 13). TCP/IP. SearchNetworking. Retrieved April 1, 2022, from

https://www.techtarget.com/searchnetworking/definition/TCP-IP

Lutkevich, B., & Burke, J. (2021, August 26). domain name system (DNS). SearchNetworking. Retrieved

April 1, 2022, from https://www.techtarget.com/searchnetworking/definition/domain-name-

system#:%7E:text=The%20domain%20name%20system%20(DNS,uses%20to%20locate%20that%20website.

Please Wait. . . | Cloudflare. (n.d.). ICMP. Retrieved April 1, 2022, from https://www.cloudflare.com/learning/ddos/glossary/internet-control-

message-protocol-icmp/

Network Standardization. (n.d.). Networking Standard. Retrieved April 1, 2022, from https://www.tutorialspoint.com/Network-

Standardization#:%7E:text=Standards%20help%20in%20creating%20and,compatible%20with%20existing%20market%20products.

Wikipedia contributors. (2022, March 27). Network topology. Wikipedia. Retrieved April 1, 2022, from

https://en.wikipedia.org/wiki/Network_topology#:%7E:text=Network%20topology%20is%20the%20arrangement,industrial%20fieldbusses%

20and%20computer%20networks.

Techopedia. (2012, March 1). Logical Topology. Techopedia.Com. Retrieved April 1, 2022, from

https://www.techopedia.com/definition/25890/logical-
Document shared on www.docsity.com
topology#:%7E:text=A%20logical%20topology%20is%20a,be%20dynamically%20maintained%20and%20reconfigured.
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)

Keary, T. (2021, May 17). Network Topology: 6 Network Topologies Explained & Compared.

Comparitech. Retrieved April 1, 2022, from https://www.comparitech.com/net-admin/network-topologies-advantages-disadvantages/


GeeksforGeeks. (2020, August 24). Elements of Network protocol. Retrieved April 1, 2022, from https://www.geeksforgeeks.org/elements-of-

network-

protocol/#:%7E:text=Network%20communication%20protocol%20requires%20following,message%20is%20passed%20to%20destination.

Froehlich, A., & Ferguson, K. (2021, May 24). bandwidth (network bandwidth). SearchNetworking. Retrieved April 6, 2022, from

https://www.techtarget.com/searchnetworking/definition/bandwidth

How Does a Switch Work? (2021, July 28). Cisco. Retrieved April 7, 2022, from https://www.cisco.com/c/en/us/solutions/small-

business/resource-center/networking/network-switch-how.html

B. (2021, February 4). Type of Servers | Definition & Details from SIfuWeb. Web Design Company.

Retrieved April 7, 2022, from https://sifuweb.com/types-of-

servers/#:%7E:text=File%20servers&text=In%20addition%2C%20centrally%20storing%20files,write%20speeds%20to%20improve%20perf

ormance.

Chapter 3: Hardware. (n.d.). Hardware. Retrieved April 7, 2022, from

https://fcit.usf.edu/network/chap3/chap3.htm#:%7E:text=A%20typical%20workstation%20is%20a,serve%20as%20a%20network%20workst

ation.

Network principles. (2020, September 18). GOV.UK. Retrieved April 8, 2022, from https://www.gov.uk/government/publications/network-

principles/network-principles#principle-1-understand-the-user-need

Brunau, C. (2022, January 26). What’s The Difference Between Circuit Switching vs Packet Switching.

Datto. Retrieved April 8, 2022, from https://www.datto.com/blog/whats-the-difference-between-circuit-vs-packet-switching

How to Configure a Firewall in 5 Steps. (n.d.). SecurityMetrics. Retrieved April 1, 2022, from https://www.securitymetrics.com/blog/how-

configure-firewall-5-steps

Editor. (2021, July 8). Request for Comments (RFC). Network Encyclopedia. Retrieved April 1, 2022, from

https://networkencyclopedia.com/request-for-comments-rfc/

Techopedia. (2014, June 16). Network Software. Techopedia.Com. Retrieved April 1, 2022, from

https://www.techopedia.com/definition/4317/network-software

Document shared on www.docsity.com


Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)

You might also like