Professional Documents
Culture Documents
Networking - FPT
Computer Networks
FPT University
36 pag.
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 M1 M2 D1
Unit Assessor:
Submission Date:
Date:
Submission Format:
Format:
● The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs
and subsections as appropriate, and all work must be supported with research and referenced using the
Harvard referencing system. Please also provide a bibliography using the Harvard referencing system.
Submission
● Students are compulsory to submit the assignment in due date and in a way requested by the Tutor.
● The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/.
● Remember to convert the word file into PDF file before the submission on CMS.
Note:
● The individual Assignment must be your own work, and not copied by or from another student.
● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you must
reference your sources, using the Harvard style.
● Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply this
requirement will result in a failed assignment.
Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Assignment scenario
You are employed as a network engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which has branches in Ho Chi Minh City, Hanoi, Da Nang and Can Tho. The company has
been contracted to implement a networking project from a local educational institute. The specification of the
project is given below:
• People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the
academic heads and the programme managers, and 3 computer network administrators.
• Resources: 50 student lab computers, 35 staff computers, and 3 printers.
• Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab
located on the first floor and another located on the second floor.
Task 1
The CEO of the company, Mr. Nguyen, has asked you to investigate and explain networking principles, protocols
and devices and submit a report.
Table of figures
Figure 1: What is network (Learn Networking) ............................................................................................................ 8
Figure 2: Local Area Network..................................................................................................................................... 10
Figure 3: What is MAN? ............................................................................................................................................. 10
Figure 4: What is WAN............................................................................................................................................... 11
Figure 5: What is PAN ................................................................................................................................................ 11
Figure 6: What is SAN ................................................................................................................................................ 11
Figure 7: TCP/IP ......................................................................................................................................................... 12
Figure 8: HTTP ........................................................................................................................................................... 13
Figure 9: DNS ............................................................................................................................................................. 13
Figure 10: DHCP ......................................................................................................................................................... 14
Figure 11: Network Standards ..................................................................................................................................... 15
Figure 12: Physical topology ....................................................................................................................................... 16
Figure 13: Logical Topology ....................................................................................................................................... 16
Figure 14: Difference between physical topology and logical
Document topology ..................................................................... 17
shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Figure 15: Star Topology............................................................................................................................................. 18
Figure 16: Bus Topology ............................................................................................................................................. 18
Figure 17: Ring Topology ........................................................................................................................................... 19
Figure 18: Dual Ring Topology .................................................................................................................................. 19
Figure 19: Tree Topology............................................................................................................................................ 20
Figure 20: Mesh Topology .......................................................................................................................................... 20
Figure 21: Hybrid Topology........................................................................................................................................ 21
Figure 22: Network communication ............................................................................................................................ 23
Figure 23: Message Encoding ..................................................................................................................................... 24
Figure 24: Message Delivery Options ......................................................................................................................... 25
Figure 25: Switch ........................................................................................................................................................ 26
Figure 26: Switch operation diagram .......................................................................................................................... 26
Figure 27: Firewall ...................................................................................................................................................... 27
Figure 7: TCP/IP
Figure 8: HTTP
- The domain name system (DNS) is a naming database in which internet domain names are located
and translated into Internet Protocol (IP) addresses. The domain name system maps the name
people use to locate a website to the IP address that a computer uses to locate that website.
Figure 9: DNS
- The Internet Control Message Protocol (ICMP) is a network layer protocol used by network
devices to diagnose network communication issues. ICMP is mainly used to determine whether or
not data is reaching its intended destination in a timely manner. Commonly, the ICMP protocol is
used on network devices, such as routers. ICMP is crucial for error reporting and testing, but it can
also be used in distributed denial-of-service (DDoS) attacks.
WiFi 802.11
IEEE 802.3
FTP 959
TCP 793
ICMP 792
IMAP4 2060
Table of RFCs
Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
P2. Network topology & communication and Bandwidth
requirements
1. Network topology definition
- Network topology is the arrangement of the elements (links, nodes, etc.) of a communication
network. Network topology can be used to define or describe the arrangement of various types of
telecommunication networks, including command and control radio networks, industrial
fieldbuses, and computer networks
- A logical topology is a concept in networking that defines the architecture of the communication
mechanism for all nodes in a network. Using network equipment such as routers and switches, the
logical topology of a network can be dynamically maintained and reconfigured.
- Bus Topology
- Ring Topology
- Tree Topology
- Mesh Topology
Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
- Hybrid Topology
Figure 15: Star Topology
Star topology - Easy to manage from one point - Requires specialist network
– the switch hardware (the switch)
- Easy to add and remove nodes - Makes the network reliant on
- Durable the switch’s performance
- Low cable usage - A finite number of switch ports
- Good for small businesses limits the network’s size
Bus topology - Easy installation - Backbone performance is
- Fewer cables required than critical
Mesh and star topology - Easily congested on busy
- Good for small businesses periods
- Low cost - Efficiency decreases rapidly
- Easy to manage and expand with each added node
- Data can only travel in one
direction at any point in time
Ring topology - Low incidence of collision - One faulty node will bring the
- Low cost entire network down
- Suitable for small businesses - Requires extensive
- Dual ring option provides preventative maintenance and
continuity through redundancy monitoring
Document shared on www.docsity.com
- Performance declines rapidly
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com) with each additional node
- Reorganizing the network
requires a full system shutdown
Dual Ring Topology - Risk of packet collisions is - The failure of one node can
very low take the entire network out of
- Data can move through operation
network nodes at high speeds - Could be knocked offline by a
- More resistant to failures transmission line failure
- Low cost to install - The more devices that are
added to a network the more
communication delay
- Need to shut down the network
to make changes
Tree Topology - Blends bus and star topologies - The network is dependent on
- Easy to manage the health of the root node
- Easy to expand - Requires networking expertise
- Suitable for middle-sized - Involves a lot of cable
businesses - Larger implementations require
monitoring software
- Can get expensive
Mesh Topology - High speeds data transfers - Requires a very large amount
- Durable network that isn’t of cable
dependent on any one node - Can be difficult to secrete all
- Very secure the cable
- Suitable for high-value - Takes a long time to set up
networks for small to middle- - Requires meticulous planning
sized networks - There is a limit to the number
- Easy to identify faulty of cables each computer can
equipment accommodate
Hybrid Topology - Very flexible - Requires professional
- Suitable for middle-sized and management
large organizations - Needs monitoring software
- Infinitely extendible - Equipment costs are high
- Adaptable to optimize
equipment use
- Summary: Before choosing a topology, we will want to closely consider the following:
• Length of cable needed
• Cable type
• Cost
• Scalability
Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
4. The communication and bandwidth
4.1. What’s network communication
- In my opinion, network communication is the exchange of information between the transmitter and
the receiver through computers and computer networks.
- Firewalls are a type of barrier or protection that businesses, organizations, individuals, and the
kingdom use to protect their information. Its purpose is to prevent unauthorized access to requests
from outside or intranet security, so preventing data in the inner community from leaving. The
firewall's primary function is to manage the flow of data transferred between the two zones; the
relied-on areas are local area networks (or private networks of a corporate company, agency, etc.)
that are approved for use by that employer or agency.
Document shared on www.docsity.com
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
• Print servers allow for the management and distribution of printing functionality. Rather than
attaching a printer to every workstation, a single print server can respond to printing requests
from numerous clients. Today, some larger and higher-end printers come with their own
built-in print server, which removes the need for an additional computer-based print server.
This internal print server also functions by responding to print requests from a client.
- Application servers
• Application servers run applications in lieu of client computers running applications locally.
Application servers often run resource-intensive applications that are shared by many users.
Doing so removes the need for each client to have enough resources to run the applications.
It also removes the need to install and maintain software on many machines as opposed to
only one.
- DNS servers
• Domain Name System (DNS) servers are application servers that provide name resolution to
client computers by converting names easily understood by humans into machine-readable
IP addresses. The DNS system is a widely distributed database of names and other DNS
servers, each of which can be used to request an otherwise unknown computer name. When
a client needs the address of a system, it sends a DNS request with the name of the desired
resource to a DNS server. The DNS server responds with the necessary IP address from its
table of names.
- Mail servers
• Mail servers are a very common type of application server. Mail servers receive emails sent
to a user and store them until requested by a client on behalf of said user. Having an email
server always allows for a single machine to be properly configured and attached to the
network. It is then ready to send and receive messages rather than requiring every client
machine to have its own email subsystem continuously running.
- Web servers
• One of the most abundant types of servers in today’s market is a web server. A web server is
a special kind of application server that hosts programs and data requested by users across
the Internet or an intranet. Web servers respond to requests from browsers running on client
computers for web pages, or other web-based services. Common web servers include Apache
web servers, Microsoft Downloaded
Internet Information
Document Services (IIS) servers and Nginx servers.
shared on www.docsity.com
by: thang-vu-4 (vuanhthang478@gmail.com)
- Database servers
• The amount of data used by companies, users, and other services is staggering. Much of that
data is stored in databases. Databases need to be accessible to multiple clients at any given
time and can require extraordinary amounts of disk space. Both needs lend themselves well
to locating such databases on servers. Database servers run database applications and respond
to numerous requests from clients. Common database server applications include Oracle,
Microsoft SQL Server, DB2, and Informix.
- Proxy servers
• A proxy server acts as an intermediary between a client and a server. Often used to isolate
either the clients or servers for security purposes, a proxy server takes the request from the
client. Instead of responding to the client, it passes the request on to another server or process.
The proxy server receives the response from the second server and then replies to the original
client as if it were replying on its own. In this way, neither the client nor the responding
server needs to directly connect to each other.
2. Workstation hardware
- A typical workstation is a computer that is configured with a network interface card, networking
software, and the appropriate cables. Workstations do not necessarily need large storage hard
drives, because files can be saved on the file server. Almost any computer can serve as a network
workstation.
3. Networking software
- Network software is an extremely broad term for a range of software aimed at the design and
implementation of modern networks. Various types of network software support the creation,
calibration and operation of networks.
1.2. Compare The namely circuit switching principle and the packet
switching principle:
The circuit switching The packet switching
Advantages - Decreases the delay the user - More efficient than circuit
experiences before and during a switching
call - Data packets are able to find the
- The call will be done with a destination without the use of a
steady bandwidth, dedicated dedicated channel
channel, and consistent data rate - Reduces lost data packets because
- Packets are always delivered in packet switching allows for
the correct order resending of packets
- More cost-effective since there is
no need for a dedicated channel
for voice or data traffic
Disadvantages - Great for only voice - Not ideal for applications that are
communicationDocument shared on www.docsity.com in constant use, such as high
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
- Doesn’t use resources efficiently volume voice calls
- High-volume networks can lose
data packets during high-traffic
- Dedicated channels for circuit times; those data packets cannot
switching are unavailable for any be recovered or resent during
other use transmission
- There is a higher cost to dedicate - There is a lack of security
one channel per use protocols for data packets during
transmission
- Simple Network Management Protocol (SNMP): Used to monitor, configure, and operate network
devices, as well as to send notifications to the server when certain events occur.
- POP3 (Post Office Protocol Version 3): A protocol for downloading email messages from the Mail
Server to a computer over a TCP/IP connection.
- Internet Protocol (IP): Through Internet Protocol routing, it sends data throughout the network and
contributes to the establishment of the internet.
1.2. Bandwidth
- The quantity of data that may be transported at any one moment is determined by bandwidth. As a
result, websites with high graphic quality or multimedia Web pages will use more bandwidth than
standard ones.
https://www.computerhope.com/jargon/n/network.htm
Jahejo, A. (2020b, September 17). Local Area Network | Advantages and Disadvantages of LAN.
Jahejo, A. (2021, February 7). Metropolitan Area Network | MAN Network. Computer Network Topology.
Jahejo, A. (2020c, September 17). Wide Area Network | Advantages and Disadvantages of WANs.
Banger, E. R. S. (2021, August 27). Advantages and Disadvantages of SAN (Storage Area Network).
C. (2021, September 9). What Are Network Protocols and How Are They Used? CISO MAG | Cyber
Shacklett, M. E., Novotny, A., & Gerwig, K. (2021, July 13). TCP/IP. SearchNetworking. Retrieved April 1, 2022, from
https://www.techtarget.com/searchnetworking/definition/TCP-IP
Lutkevich, B., & Burke, J. (2021, August 26). domain name system (DNS). SearchNetworking. Retrieved
system#:%7E:text=The%20domain%20name%20system%20(DNS,uses%20to%20locate%20that%20website.
Please Wait. . . | Cloudflare. (n.d.). ICMP. Retrieved April 1, 2022, from https://www.cloudflare.com/learning/ddos/glossary/internet-control-
message-protocol-icmp/
Network Standardization. (n.d.). Networking Standard. Retrieved April 1, 2022, from https://www.tutorialspoint.com/Network-
Standardization#:%7E:text=Standards%20help%20in%20creating%20and,compatible%20with%20existing%20market%20products.
Wikipedia contributors. (2022, March 27). Network topology. Wikipedia. Retrieved April 1, 2022, from
https://en.wikipedia.org/wiki/Network_topology#:%7E:text=Network%20topology%20is%20the%20arrangement,industrial%20fieldbusses%
20and%20computer%20networks.
Techopedia. (2012, March 1). Logical Topology. Techopedia.Com. Retrieved April 1, 2022, from
https://www.techopedia.com/definition/25890/logical-
Document shared on www.docsity.com
topology#:%7E:text=A%20logical%20topology%20is%20a,be%20dynamically%20maintained%20and%20reconfigured.
Downloaded by: thang-vu-4 (vuanhthang478@gmail.com)
Keary, T. (2021, May 17). Network Topology: 6 Network Topologies Explained & Compared.
network-
protocol/#:%7E:text=Network%20communication%20protocol%20requires%20following,message%20is%20passed%20to%20destination.
Froehlich, A., & Ferguson, K. (2021, May 24). bandwidth (network bandwidth). SearchNetworking. Retrieved April 6, 2022, from
https://www.techtarget.com/searchnetworking/definition/bandwidth
How Does a Switch Work? (2021, July 28). Cisco. Retrieved April 7, 2022, from https://www.cisco.com/c/en/us/solutions/small-
business/resource-center/networking/network-switch-how.html
B. (2021, February 4). Type of Servers | Definition & Details from SIfuWeb. Web Design Company.
servers/#:%7E:text=File%20servers&text=In%20addition%2C%20centrally%20storing%20files,write%20speeds%20to%20improve%20perf
ormance.
https://fcit.usf.edu/network/chap3/chap3.htm#:%7E:text=A%20typical%20workstation%20is%20a,serve%20as%20a%20network%20workst
ation.
Network principles. (2020, September 18). GOV.UK. Retrieved April 8, 2022, from https://www.gov.uk/government/publications/network-
principles/network-principles#principle-1-understand-the-user-need
Brunau, C. (2022, January 26). What’s The Difference Between Circuit Switching vs Packet Switching.
How to Configure a Firewall in 5 Steps. (n.d.). SecurityMetrics. Retrieved April 1, 2022, from https://www.securitymetrics.com/blog/how-
configure-firewall-5-steps
Editor. (2021, July 8). Request for Comments (RFC). Network Encyclopedia. Retrieved April 1, 2022, from
https://networkencyclopedia.com/request-for-comments-rfc/
Techopedia. (2014, June 16). Network Software. Techopedia.Com. Retrieved April 1, 2022, from
https://www.techopedia.com/definition/4317/network-software