You are on page 1of 53

BTEC FPT INTERNATIONAL COLLEGE

INFORMATIONTECHNOLOGY

ASSIGNMENT 1
UNIT:NETWORKING

STUDENT : NGUYEN TRINH ANH TUAN

CLASS : IT 05102

STUDENT ID : BD00096

SUPERVISOR : TRUONG DANG HIEU

Da Nang, July 2022

1
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
ASSIGNMENT 1 FRONT SHEET
Qualification BTEC Level HND Diploma in Computing

Unit number and title Unit 2 : Networking

Submission date 30/06/2022 Date received 30/06/2022


(1st
submission)

Re-submission date Date received


(2nd
submission)

Student name NGUYEN TRINH ANH Student ID BD00096


TUAN

Class IT 05102 Assessor name TRUONG DANG HIEU

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of malpractice.

Student’s signature:
TUAN
NGUYEN TRINH ANH TUAN

Grading grid
P1 P2 P3 P4 M1 M2 D1 D2

2
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Performed by …..

❒Summative Feedbacks: ❒Resubmission Feedbacks:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

3
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
TABLES OF CONTENT

Contents
TABLES OF CONTENT............................................................................................................................................................4

LIST OF THE ACRONYM.......................................................................................................................9

...............................................................................................................................................................10

INTRODUCTION...............................................................................................................................10

I. (P1) Discuss the benefits and constraints of different network types and standards. 11

1.......................................................................................................................................What is network?
.............................................................................................................................................................................. 11

1.1......................................................................................................................................Define network.
.............................................................................................................................................................................. 11

1.2 Network type (MAN, WAN,LAN etc.)................................................................................................... 12

LAN......................................................................................................................................................................... 12

 Man...................................................................................................................................................................... 12

Wan....................................................................................................................................................................... 13

WAN (Wide Area Network), also known as wide area network, is a combination of urban networks
including MAN and LAN through satellite equipment, optical cables, and power cables..................................13

Wide area network was created to connect on a large scale across the country. The protocol used in the
.............................................................................................................................................................................. 13

WAN is TCP/IP, the bandwidth varies depending on the installation location.........................................13

1.3 Benefit of the network............................................................................................................................... 14

1.4 Constraint of the network........................................................................................................................ 14

1.5 Protocol and Standards............................................................................................................................. 15

Protocol................................................................................................................................................................ 16

 Standard............................................................................................................................................................. 16

4
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
 Network protocol definition........................................................................................................................ 17

1.6List some protocols : TCP/IP, HTTP,DNS,ICMP..................................................................................17

Internet Protocol (IP)....................................................................................................................................... 17

 Hypertext Transfer Protocol (HTTP)......................................................................................................... 18

DNS( Domain Name System)....................................................................................................................... 18

 ICMP( Internet Control Message Protocol)........................................................................................... 19

1.6 List some standard organnizations and standard names............................................................19

II. (P2)Network topology & communication and Bandwidth requirements............................20

1.Network topology definition....................................................................................................................... 20

2.Discuss the Impact of topology.................................................................................................................. 21

3.Examples of topology with diagrams (Bus, Ring, Star, Tree, Hybrid, Mesh).....................21

Bus Topology...................................................................................................................................................... 21

Star topology...................................................................................................................................................... 22

Ring topology..................................................................................................................................................... 22

 Mesh Topology................................................................................................................................................. 23

Tree Topology.................................................................................................................................................... 24

Hybrid topology................................................................................................................................................. 24

4.Communication and Bandwidth.................................................................................................25

5.Define Communications In Terms Of Networking...................................................................25

6.Rules of communication...............................................................................................................25

4.Bandwidth.......................................................................................................................................26

III. (P3) Discuss the operating principles of networking devices and server types..............26

1.Switch.................................................................................................................................................................. 26

2.Router.................................................................................................................................................................. 27
Switching principles in a network:................................................................................................................................................ 28

3.Other commonly used networking devices........................................................................................... 28

4.List server types (web server, mail server, DB Serve, DNS Server, DHCP Server)....................32
5
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
IV. (P4) Discuss the inter-dependence of workstation hardware with relevant networking
software................................................................................................................................................................................ 36

1.Explain What Is Meant By Interdependencies.....................................................................................36

2.Define networking software....................................................................................................................... 37

3.Discuss and explain the interdepencies of workstation hardware with networking software.
Derive an example form your discussion.................................................................................................................. 38

V. (M1) Compare common networking principles and how protocols enable the effectiveness of
networked systems.........................................................................................................................................39

1.Compare LAN, CAN, MAN, WAN............................................................................................................... 39

2.Compare physical topologies and logical topologies........................................................................40

3.Compare between OSI reference model and TCP/IP reference model.......................................41

4.Compare TCP between UDP........................................................................................................................ 42

CONCLUSION.......................................................................................................................................43

Evaluation...........................................................................................................................................43

REFERENCES.....................................................................................................................................45

LIST OF TABLES AND FIGURES

Table 1Compare LAN,WAN,MAN..............................................................................................................................40


Table 2 Compare physical topologies and logical topologies....................................................................................40
6
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Table 3 Compare between OSI reference model and TCP/IP reference model.........................................................41
Table 4 Compare TCP between UDP ………….………………………………………………………………………………………………38

Figure1- 1 Network.................................................................................................................................. 11
Figure1- 2 LAN......................................................................................................................................... 12
Figure1- 3 MAN........................................................................................................................................ 13
Figure1- 4 WAN....................................................................................................................................... 13
Figure1- 5 Networking Benefits................................................................................................................ 14
Figure1- 6 Constraint of the network........................................................................................................15
Figure1- 7 Network protocol denfinition....................................................................................................15
Figure1- 8 Protocol.................................................................................................................................. 16
Figure1- 9 Standards............................................................................................................................... 16
Figure1- 10 Netwrok Protocols.................................................................................................................17
Figure1- 11 Internet Protocol................................................................................................................... 17
Figure1- 12 HTTP.................................................................................................................................... 18
Figure1- 13 DNS...................................................................................................................................... 18
Figure1- 14 ICMP..................................................................................................................................... 19
Figure1- 15.............................................................................................................................................. 20
Figure1- 16 Network topology definition...................................................................................................20
Figure1- 17 Logical and Physical............................................................................................................. 21
Figure1- 18 Bus....................................................................................................................................... 22
Figure1- 19 Star....................................................................................................................................... 22
Figure1- 20 Ring...................................................................................................................................... 23
Figure1- 21 Mesh..................................................................................................................................... 23
Figure1- 22 Tree...................................................................................................................................... 24
Figure1- 23 Hybird................................................................................................................................... 24
Figure1- 24 Bandwidth............................................................................................................................. 25
Figure1- 25 Swith..................................................................................................................................... 26
Figure1- 26 Router................................................................................................................................... 27
Figure1- 27 Hub....................................................................................................................................... 28
Figure1- 28 Swith..................................................................................................................................... 29
Figure1- 29 Router................................................................................................................................... 29
Figure1- 30.............................................................................................................................................. 30
Figure1- 31 Gateway................................................................................................................................ 30
Figure1- 32 Modem.................................................................................................................................. 31
Figure1- 33 Repeater............................................................................................................................... 31
Figure1- 34 Access Point......................................................................................................................... 32
Figure1- 35 List server types.................................................................................................................... 33
Figure1- 36 Web server........................................................................................................................... 33
Figure1- 37 Mail server............................................................................................................................ 34
Figure1- 38 DB Server............................................................................................................................. 34
Figure1- 39 DNS Server........................................................................................................................... 35
Figure1- 40 DHCP Server........................................................................................................................ 35
Figure1- 41 Define Workstation Hardware...............................................................................................37
Figure1- 42 Software................................................................................................................................ 38

7
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
LIST OF THE ACRONYM

ACL Access Control List


8
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
ADSL Asymmetric Digital Subscriber Line.

ARCNET Attached Resource Computer Network‹

ARP. Address Resolution Protocol

Bit Binary Digit

DHCP. Dynamic Host Configuration Protocol

DHCS Dynamic Host Configuration Server

DNS Domain Name System

9
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
INTRODUCTION
Networking piles important role in life. Coming to this report, we will learn about networks, types of
networks, network devices,....
It will help us understand more deeply what is a network, how is a network defined? The process of
building a network and how it works let's learn this article!
The report includes the following:
Chapter 1. Examine networking principles and their protocols. (LO1)
1 Discuss the benefits and constraints of different network types and standards. (P1)
2 Network topology & communication and Bandwidth requirements. (P2)
CHAPTER 2: Explain networking devices and operations. (LO2)
3 Discuss the operating principles of networking devices and server types. (P3)
4 Discuss the inter-dependence of workstation hardware with relevant networking software. (P4)
5 Compare common networking principles and how protocols enable the effectiveness of networked
systems. (M1)

10
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
CHAPTER 1: BASIC KNOWLEDGE
LO1: Examine networking principles and their protocols

I. (P1) Discuss the benefits and constraints of different network types


and standards.

1. What is network?

1.1 Define network.


A network is a system of connected elements that work together. Computer networks connect PCs,
printers, servers, phones, cameras, and other types of devices. Computer networks connect devices,
allow them to exchange data, and facilitate sharing of information and resources.

A network consisting of 2 or more


computers linked together to share
resources (e.g., internal machines
and CDs), exchange files and
communicate. Computers can be
connected via wires, phone lines,
radio
waves, satellites, or infrared rays.
There are three popular networks
today:
- Metropolitan Area Network
(MAN Network)
11
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
- Wide Area Network (WAN
Network)
- Local Area Network (LAN
Network)
A network consisting of 2 or more
computers linked together to share
resources (e.g., internal machines
and CDs), exchange files and
communicate. Computers can be
connected via wires, phone lines,
radio
waves, satellites, or infrared rays.
There are three popular networks
today:
- Metropolitan Area Network
(MAN Network)

12
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
- Wide Area Network (WAN
Network)
- Local Area Network (LAN
Netwo A network consisting of 2 or more computers linked together to share resources
(e.g.. internal machinesand CDs), exchange files and communicate. Computers can be connected via
wires, phone lines, radiowaves, satellites, or infrared rays.
There are three popular networks today:

-Metropolitan Area Network (MAN Network}

-Wide Area Network (WAN Network)

-Local Area Network (LAN Network)

Figure1- 1 Network

13
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
1.2 Network type (MAN, WAN,LAN etc.)

LAN
LAN (Local Area Network), also known as a local area network, is used in a limited area with high
transmission speed.

Devices using LAN can share resources with each other, typically sharing files, printers, ... and some
other devices.

- Advantages of LAN

High transmission speed, support to connect many devices quickly. Although limited in connection
range, it costs less, uses less wires, and is easy to administer.

Figure1- 2 LAN

 Man
MAN (Metropolitan Area Network), also known as urban network, links from many LANs via cables,
other transmission means,... The ability to connect in a large range such as in a town or city , conscious.

14
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
The MAN network model is often used mainly for organizations and businesses with many branches and
departments connected to each other.

Man network is often used for businesses because this model provides many types of services such as
connecting lines via voice (voice), data (data), video (image), deploying applications easily. .

- Advantages of MAN network network. The large connection range makes interaction between business
parts easy, efficient, low cost, stable transmission speed, information security, simple management.

Figure1- 3 MAN

Wan

WAN (Wide Area Network), also known as wide area network, is a combination of urban networks

including MAN and LAN through satellite equipment, optical cables, and power cables.

Wide area network was created to connect on a large scale across the country. The protocol used in the

WAN is TCP/IP, the bandwidth varies depending on the installation location.

15
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
- Advantages of WAN

Figure1- 4 WAN
Large connectivity, no signal limitation, easy information sharing, data storage. Relative transmission
speed varies by region or transmission device.

1.3 Benefit of the network


The Internet is extremely important and brings a lot of benefits to the entire global humanity. The
Internet makes information transfer quickly, you can access information on the internet at almost
any location on the globe. For the sake of simplicity, to summarize the internet has the following
benefits:

 High speed.

 Can run large online applications thanks to strong bandwidth

 Cheap and easy to manage

Look up and learn a huge store of information online

Help people do business, sell online, make money and increase jobs

Linking friends and relatives through social networks like Facebook, vegetable garden Zalo

Send and receive mail, read online news

Watch movies, listen to music online, play games

Using social networking apps…

16
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Figure1- 5 Networking Benefits

1.4 Constraint of the network


A constraint network represents a mathematical relationship between several variables and is able to
compute the value of any one of these variables given the values of all the others.

There are two types of nodes in a constraint network: cells and constraints. Cells represent variables
(read-only cells represent constants) and constraints represent primitive mathematical relationships
such as z = x + y and z = x * y. The neighbors of a constraint are the cells that it constrains. The neighbors
of a cell are the constraints that constrain it.

Figure1- 6 Constraint of the network

1.5 Protocol and Standards


Network Protocol Definition

17
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
2. The protocol is a rule file that
defines how to format, transmit,
and receive data so that network
3. computers - from servers and
routers to endpoints - can
communicate with each other,
regardless of any
4. differences in the base layer,
design, or standard facilities.
5.
6. To send and receive data
successfully, devices on both
sides of a communication
exchange must accept
7. and follow protocol
conventions. Network protocol

18
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
support can be built into the
software, hardware, or
8. both.
9.
10. Standardized network
protocols provide network
devices with a common
language. Without them,
11. computers would be unable to
communicate with one another.
As a result, except for networks
explicitly
12. designed for a specific
architecture, only a few networks
can function, and the internet as
we know it

19
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
13. today would not exist. To
communicate with one another,
almost all end-users rely on
network
14. protocols.
15. The protocol is a rule file that
defines how to format, transmit,
and receive data so that network
16. computers - from servers and
routers to endpoints - can
communicate with each other,
regardless of any
17. differences in the base layer,
design, or standard facilities.
18.
19. To send and receive data
successfully, devices on both
20
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
sides of a communication
exchange must accept
20. and follow protocol
conventions. Network protocol
support can be built into the
software, hardware, or
21. both.
22.
23. Standardized network
protocols provide network
devices with a common
language. Without them,
24. computers would be unable to
communicate with one another.
As a result, except for networks
explicitly

21
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
25. designed for a specific
architecture, only a few networks
can function, and the internet as
we know it
26. today would not exist. To
communicate with one another,
almost all end-users rely on
network
27. protocols.
The protocol is a rule file that defines how to format, transmit, and receive data so that network
computers - from servers and routers to endpoints - can communicate with each other, regardless of any
differences in the base layer, design, or standard facilities. To send and receive data successfully, devices
on both sides of a communication exchange must accept and follow protocol conventions. Network
protocol support can be built into the software, hardware, or both. Standardized network protocols
provide network devices with a common language. Without them, computers would be unable to
communicate with one another. As a result, except for networks explicitly designed for a specific
architecture, only a few networks can function, and the internet as we know it today would not exist. To
communicate with one another, almost all end-users rely on network protocols.

Figure1- 7 Network protocol denfinition

22
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Protocol
A protocol is a set of established rules that define how to format, transmit, and receive data so that
computer network devices - from servers and routers to endpoints - can communicate with each other. ,
regardless of the differences in infrastructure, design, or basic standards between them.

Figure1- 8 Protocol

 Standard
An Internet standard is a specification that is very beneficial to the Internet, has proven to be
mature, and is supported by the general public. This title is awarded by the Internet Architecture
Council on the recommendation of the Internet. Engineering Task Force (IETF). Standardized
procedures were introduced in late 1988. The whole process takes at least a few months and often
takes several years. In many cases, it is postponed indefinitely. Each Internet standard is either a
selected Request for Comments, or a set of multiple RFCs.

Figure1- 9 Standards

23
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
 Network protocol definition

A network protocol is a set of rules that a network must follow. Network protocols are formal standards
and policies made up of rules, procedures, and formats that define communication between two or
more devices over a network.

Figure1- 10 Netwrok Protocols

1.6List some protocols : TCP/IP, HTTP,DNS,ICMP

Internet Protocol (IP)

Internet Protocol Suite

The Internet Protocol Suite is a collection of protocols that implement the protocol stack on which the
Internet runs. The Internet Protocol Suite is sometimes referred to as the TCP/IP protocol suite. TCP and
IP are important protocols in the Internet Protocol Suite - Transmission Control Protocol (TCP) and
Internet Protocol (IP). The Internet Protocol Suite is similar to the OSI model, but with some differences.
Also, not all layers correspond well.

Figure1- 11 Internet Protocol

24
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
 Hypertext Transfer Protocol (HTTP)
HTTP is the data communication platform for the World Wide Web. Hypertext is structured text that
uses hyperlinks between nodes containing the text. HTTP is an application protocol for distributed and
hybrid hypermedia information systems.
HTTP's default port is 80 and 443. Both of these ports are secure.

Figure1- 12 HTTP

DNS( Domain Name System)

DNS (Domain Name System) or domain name resolution system, can be explained as a system that helps
humans and computers "communicate" with each other more easily (Because of their communication
language). We are names and letters, and computers can only understand sequences of numbers!) The
system helps to translate domain names (hostnames) into strings of numbers, so that computers can

Figure1- 13 DNS
understand.
 ICMP( Internet Control Message Protocol)
ICMP stands for Internet Control Message Protocol. Readers can understand simply a protocol of the
Internet Protocol packet, also known as the control protocol on the network.
ICMP is used to report errors that occur during the transmission of data packets on the network. Or used
to probe and manage the operation of the network.
25
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Figure1- 14 ICMP

1.6 List some standard organnizations and standard names


ITU - International Telecommunication Union. is an association of national unions, based in
Switzerland, founded in 1947, whose members include major government and telecommunications
companies.
IEEE: Institute of Electrical and Electronics Engineers): is a non-profit organization, op erating
since 1963, with more than 360,000 members (in 2010) including engineers, scientists, students
worldwide.
IETF: Internet Engineering Task Force) is also an organization that develops standards related to
wireless technology
IOS ( International Standard Organization)
EIA ( Electronic Industry Association)
TIA ( Telecom Industry Association )

Figure1- 15

26
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
II. (P2)Network topology & communication and Bandwidth requirements

1.Network topology definition


Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network.
Primarily, it is the topological structure of a computer network, and can be described in terms of physics and logic.
The physical topology (physical topology) is the arrangement of the various network elements, including
equipment storage and cabling settings, while the logical topology (logical topology) specifies how the data flow in
the network works. Node distances, physical intersections, transmission rates, and/or signal types can vary
between two networks even though their topologies may be identical.

Figure1- 16 Network topology definition

2.Discuss the Impact of topology


Definition: Physical & Logical Topology.
➢Physical Topology: Physical topology is Physical topology. The interconnected topology of a local area
network is physical topology (LAN). Connecting physical devices on a network using cables and cables
forms the physical topology.
➢ Logical Topology: Logical Topology is Logical Topology... The logical topology can be automatically
maintained and reconfigured by using network devices such as routers and switches. The topology is
opposed to physical topology, which refers to the physical interconnection of all network devices.
A logical topology is a concept in a network that defines the architecture of the communication
mechanism for all nodes in a network. Using network devices such as routers and switches, the logical
topology of a network can be automatically maintained and reconfigured. The topology is anti-logical
with the physical topology, which refers to the physical interconnection of all devices in the network.

27
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Figure1- 17 Logical and Physical

3.Examples of topology with diagrams (Bus, Ring, Star, Tree, Hybrid, Mesh)

Bus Topology
Bus topology using a single cable connecting all nodes is included. The main cable acts as a backbone for
the entire network. One of the computers in the network acts as a server. When it has 2 endpoints, it is
called a linear BUS topology.

Figure1- 18 Bus

Star topology
In a star topology, all computers connect with the help of a hub. This cable is called the hub node and all
other nodes are connected using this hub. It is most popular on LANs because they are cheap and easy to
set up.

28
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Figure1- 19 Star

Ring topology
In a Ring network, every device has exactly 2 neighbors for communication purposes. It is called a ring
structure, because its formation resembles a ring. In this topology, every computer is connected to
another computer. Here, the last node is combined with the first node.
This topology uses tokens to transfer information from one computer to another. In this topology, all
messages go through a ring in the same direction.

Figure1- 20 Ring

 Mesh Topology
Mesh topology has a unique network design in which each computer on the network connects to each
other. It is developed a P2P connection between all network devices. It provides a high degree of
redundancy, so even if one network cable fails, data has an alternate path to its destination.
Types of mesh topology:
Partial Mesh Topology: In this type of topology, most of the connected devices are almost similar to a full
topology. The only difference is that at least the device is connected to only 2 or 3 devices.
29
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Figure1- 21 Mesh

Tree Topology

A tree topology has a root node and all other nodes connected together forming a hierarchy. So it is also
known as hierarchical topology. This topology integrates different star topologies in a single bus, so it is
called star topology. Tree topology is a very common network similar to star and bus topology.

Figure1- 22 Tree

30
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Hybrid topology

Hybrid topology combines 2 or more topologies. As shown in the figure, you can see in an office that
uses two links: Start and P2P. Hybrid topologies are always created when 2 different underlying network
topologies are connected.

Figure1- 23 Hybird

4.Communication and Bandwidth


5.Define Communications In Terms Of Networking.
Network communication, also known as internetworking, refers to a collection of protocols (rules and
standards) that allow application programs to communicate with one another regardless of the
hardware and operating systems on which they are executed. Internetworking enables application
programs to interact with one another regardless of their physical network connectivity.

Figure1- 24 Bandwidth

6.Rules of communication
 Protect your data, do not rely on the network.
Recognize the danger.
31
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Design service protection as close to the service as possible.
Publish routes by default.
Encrypt without compromising performance.
Protect your networks.
Layer your security.
 Design for interworking and flexibility.
Use open standards.
Maximize the use of commoditized services.
Consolidate the use of data networks and migrate to IP-based technologies.
Publish DNS names.
Join up to provide resilience.
 Understand the user
Understand your basic network requirements.
Design networks for a roaming user base.
Design services to be accessed broader than your department
Design for organizations who share a site to share the site's network.
Be able to support your users.
4.Bandwidth

➢ Bandwidth requirements for


the networks.
The term "bandwidth" is now
widely used in technology and
human life in general. In the
Website
field, bandwidth refers to the
maximum amount of data
exchanged between a website or a
32
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
server and a user in a given unit of
time, usually a second. The higher
the bandwidth limit, the
more data can be transferred
(download/upload). Web access
requests will be denied if
bandwidth is exhausted.
Bits per second are the most
commonly used unit of
measurement for bandwidth.
Modern
networks are frequently measured
in millions of bits per second
(Mbps) or billions of bits per
second (bps) due to their high
capacity (gigabits per second -
Gbps).
➢ Bandwidth requirements for the networks. The term "bandwidth" is now widely used in technology
and human life in general. In the Website field, bandwidth refers to the maximum amount of data
33
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
exchanged between a website or a server and a user in a given unit of time, usually a second. The higher
the bandwidth limit, the more data can be transferred (download/upload). Web access requests will be
denied if bandwidth is exhausted. Bits per second are the most commonly used unit of measurement for
bandwidth. Modern networks are frequently measured in millions of bits per second (Mbps) or billions
of bits per second (bps) due to their high capacity (gigabits per second - Gbps).

III. Discuss the


operating
principles of
networking
devices and
server types. (P3)
III. (P3) Discuss the operating principles of networking devices and
server types.

1.Switch
Switch is an important switching device in the network, used to connect network segments together in a
star model. In this model, the switch plays a central role and all other satellite devices including

34
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
computers are connected here, thereby creating a temporary connection for data transfer. In addition,
the Switch supports Full Duplex technology to expand the bandwidth of the transmission line, which
other devices cannot do.

In simple terms, a Switch can be understood as a traffic policeman that routes the data of a local area
network. It has the ability to choose the path to decide to forward frames (units of the data link layer) so
the LAN works more efficiently. The switch is able to identify the machine it is connected to by reading
the source MAC address in the frame it receives. When two machines in the network communicate with
each other, the switch itself creates a virtual circuit between the two respective ports without affecting
traffic on other ports.

Figure1- 25 Swith

Switching principles in a network:


Step 1: PC-HN sends a packet to PC-SG via its own channel when connected to the switch.
Step 2: They will convert the data into a data frame, validate the MAC address in the data frame's source
MAC field, and save the MAC address in the MAC address database alongside the incoming port number.
Step 3: Toggle checks the MAC address in the frame's destination mac field and the MACaddress-table to
see if it is already in the table.
Step 4: If the destination mac address is already in the mac table, the switch looks for the corresponding
outgoing port and forwards the unicast frame to that port.
Step 5: If the destination MAC address entry is not found in the MAC table, the switch will broadcast the
frame data to all other connected ports.
Step 6: PC-NA, PC-DN, and PC-SG receive the frame as a packet and compare their IP addresses to the
packet's destination IP address.
Step 7: PC-B and PC-C will reject the packet because their IP addresses do not match the packet's
destination IP address. PC-IP D's address, on the other hand, corresponds to the packet's destination IP
address.
Step 8: PC-SG will send an acknowledgement packet to PC-HN.
Step 9: Convert to receive an acknowledgement frame from PC-SG on port 4, validate the MAC address
in the source MAC field, and store the MAC address along with the incoming port number in the MAC
address database.
Step 10: Validate the destination MAC address from the frame, check the MAC address table to confirm
the MAC address entry. The switch has learned and cached the MAC address of PC-HN, and now unicasts
acknowledge the incoming packet to PC-A.
Step 11: When the switch learns the MAC addresses of all the PCs or nodes, it always sends unicast
frames to the network's connected nodes.

35
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
2.Router
Router (router or router) is a network device used to deliver data packets to end devices. In a word,
Router is a device to share the Internet to many other devices in the same network layer.

Figure1- 26 Router

Switching principles in a network:

If the router cannot locate the configuration file, it enters setup mode. The setting will be saved in the
NV-Ram when done in setup mode.

Step 1: Start the network router by loading bootstrap.. The following are the three steps in the process
of starting the IOS software: - Hardware testing -> IOS software download -> Locate and execute the
startup configuration file. Following the POST procedure, the router will perform the following actions:
To begin, use the bootstrap loader from Rom. gzip.

Step 2: Locate the IOS on flash drives or networks.

Step 3: Download and install the operating system.

Step 4: The configuration file in the NV-Ram is copied to the main memory and executed line by line. Set
network communication port addresses and use the routing command...

Step 5: If the configuration file does not exist in the NV-Ram, the operating system will attempt to
connect to the TFTP server. If no TFTP is found, the installation mode will begin

3.Other commonly used networking devices


Hub.

36
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Hub is the central point of connection for devices in the network. They are used to connect LANs, they
have a lot of ports to do that. When a packet arrives at one port, it is copied to other ports so that other
ports can recognize the packet.

Figure1- 27 Hub

Switch.
Switch is the central device and all other devices will connect to this device to transfer data. In addition,
more modern Switch devices that support Full Duplex technology are also used to expand the bandwidth
of the transmission line.

Figure1- 28 Swith

Router.
Router (router or router) is a network device used to deliver data packets to end devices. In a word,
Router is a device to share the Internet to many other devices in the same network layer.

37
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Figure1- 29 Router

Bridge.
A bridge, also known as a bridge, is a networking device that connects multiple LANs (local area
networks) together to form a larger LAN. The process of aggregating networks is called networking.

Figure1- 30

Gateway.
Gateway is a specialized term for telecommunications, information technology, used in the process of
running data. Gateway has many benefits, so it is widely used in the market today.

38
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Figure1- 31 Gateway

Modem.
Modem is an acronym for Modulator and Demodulator which means a modulator and demodulator to
convert digital signals into analog signals and vice versa on a telephone network. The modulated signal
here can be any current communication electrical signal, regardless of the standard.

Figure1- 32 Modem

Repeater.
39
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
WiFi Repeater is an indispensable device when you want to expand Internet coverage in your home or
office

Figure1- 33 Repeater

Access Point.
An access point (AP) is a device that creates a wireless local area network, or WLAN, usually in an office
or large building. An access point is a station that transmits and receives data. You can call them wifi
transceivers.

Figure1- 34 Access Point

4.List server types (web server, mail server, DB Serve, DNS Server, DHCP Server)
Server also known as server is a computer (hardware and software) connected to a computer network or
the internet. On the server install additional software or a dedicated computer. Or multiple networked
computers with storage capacity to serve and provide
40
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Figure1- 35 List server types

Wed server
Web server means a web server, which is a mainframe computer connected to an extended set of
computer networks. The server contains all the data it is authorized to manage. Each server has its own
IP and can read a variety of languages such as HTML, HTM, File, etc. The server has a large capacity and
very high speed to be able to store and operate well the data warehouse on the internet. Through the
separate communication port of each server, the computer system is able to operate more smoothly.
The server must ensure continuous operation to be able to provide data to its computer network.

Figure1- 36 Web server

Mail server

The basic Mail Server is still a Dedicated Server (individual Server) or Cloud Server (cloud
computing server) configured to turn into a machine to send and receive email. It also has all the
same parameters as a normal Server such as Ram, CPU, Storage, etc. In addition, it also has other
parameters related to Email factors such as the number of Email accounts, Email forwarder, Mail
list, etc. …

41
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Figure1- 37 Mail server

DB Server

A database server is a computer system that provides other computers with services related to
accessing and retrieving information from databases. Access to the database server can take place
through a front end running locally on the user's machine (for example, phpMyAdmin) or a back
end running on the database server itself, accessed using a remote shell. After the information in
the database is retrieved, it is exported to the person requesting the data.

Figure1- 38 DB Server

DNS Server

DNS Server, also known as Domain Name System, is an ordered naming system for computers and
services participating in the Internet. It associates a variety of information with the domain names
assigned to them so that users can use that domain to find out the information they need to know.

42
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
It is important to choose a domain name that makes sense to the user, which is linked to other
network devices to locate and provide information to users around the world.

Figure1- 39 DNS Server

DHCP Server

DHCP server - DHCP server: is a device connected to the network that returns the necessary
information to the DHCP client when requested. BOOTP relay agents - A BOOTP relay device: is a
workstation or a router capable of forwarding DHCP messages between the DHCP server and the DHCP
client.

Figure1- 40 DHCP Server

43
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
IV. (P4) Discuss the inter-dependence of workstation hardware with relevant
networking software.

1.Explain What Is Meant By Interdependencies.


Network interface card (NIC) Establishes and manages the computer’s network connection.
Translates digital computer data into signals (appropriate for the networking medium) for outgoing
messages and translates signals into digital computer data for incoming messages.
Device driver: a small, specialized program that represents a device to an OS and manages
communications between the OS and NIC.
EX: The web browser communicates with the webserver to retrieve web page data using the hypertext
transfer protocol (HTTP). It is a TCP / IP-based communication protocol that provides data on the World
Wide Web. It provides standards for computers to communicate with each other.
HTTP determines how the client requests to build and send data to the server; and how the server
responds to these requests.
HTTP client: is a program (Web browser or another client) used to establish a connection to the server
to send one or more HTTP request messages. HTTP server: is a program (Apache webserver or Network
Information Service - IIS) used to accept connections to the server from HTTP requests by sending HTTP
feedback. Moreover, a web client wants to get information from a web server. They start with the web
interface on the client's pc to take the command request. Then the web client communicates with the
webserver through a NIC card to take HTTP packets from the webserver. The web client takes the HTTP
from the web server and shows it on applications to the users.
Conclusion: workstation hardware with relevant networking software is dependent on each other, as
they must communicate with each other but achieve that, they need support from some hardware
components. Additionally, the hardware requires a driver to manage communications between the os
and the hardware.
Define Workstation Hardware
Computer hardware is the physical components that computer systems require in order for it to
function. It covers everything with a circuit board that works in a PC or laptop; includes 1 motherboard,
graphics cards, CPU (Central Processing Unit), ventilation fan, webcam, power supply, and so on.
Workstations have input/output devices such as keyboards, mice, etc. like regular computers, but they
are equipped with quality components, durable, professional, and more durable than regular computers.
. A server is a type of computer that does not have input/output devices like workstations and ordinary
computers.
- Configuration and performance
Equipped with the latest generation configuration, there is a dedicated graphics card that is rarely found
in regular PC models. Quickly handle heavy tasks such as complex graphics processing. The processing
ability of computers and servers is slow and often takes a long time.
- Microprocessor
The workstation uses extremely powerful CPU performance with high frequency, the workstation is
equipped with an Intel Core i7 or Intel Xeon processor instead of a CORE I CPU like a regular computer.
The workstation is capable of multi-threading, has a high cache, and fast CPU speed of up to 4.0Ghz.
- RAM

44
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
The workstation's RAM is usually 16GB, has the highest clock speed at the moment, can be upgraded to
a maximum of 4 RAM slots, and speed up image rendering in seconds. And especially the memory has
the function of self-checking and correcting errors ECC Memory that computers usually do not have.
- GraphicsWorkstation GPUs are different from regular PCs. The state machine is equipped with the most
dedicated graphics card. It should be used specifically for graphics applications while conventional
computers are limited in graphics, so they are often used for office applications.
- Hard Drive The workstation's hard drive is designed as a hybrid between HDD, with the highest
rotational speed of 7200rpm, so it is very safe, and the computer's rotation speed usually falls to
5400rpm, very few machines have a speed of 7200rpm. SSD PCle uses the latest technology to provide
fast access speed while ensuring a large capacity for data storage.
- Screen
A high-end anti-glare IPS technology screen is integrated into the machine, with screens from 15.6inch to
17.3inch and Full HD resolution up to 4K. The most accurate color and contrast, the screen has a wider
viewing angle, and the image is not distorted,...

Figure1- 41 Define Workstation Hardware

2.Define networking software


Networking software is applications that help you connect computers to each other, VPN connections,
firewall software, or IP changing software. Some typical network software include: TeamViewer,
Connectify Hotspot, Hamachi or Hotspot Shield Free VPN...

45
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Figure1- 42 Software

3.Discuss and explain the interdepencies of workstation hardware with networking software. Derive
an example form your discussion

A network is formed when more than one computer is joined together for communication. There are
additional servers in a network that provide many data storage sites. For servers to handle so many
computers, an operating system is necessary. When a laptop submits an internet request to a server,
many scheduling algorithms decide which request receives which resource. That is how a piece of
software communicates with the hardware of a workstation.

A network is more capable than a single computer designed for individual use. Because they are PCs
with their software and storage, they may be used independently of the mainframe.

A network interface card (NIC) is a piece of computer hardware that enables computers to connect to a
network, most often a local area network.

A network interface card is a piece of computer hardware that allows computers to connect to a
network, most often a local area network.

V. (M1) Compare common networking principles and how protocols enable


the effectiveness of networked systems.
Make a comparison of network principles and explain how network protocol enable effective
use of the network system

46
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
1.Compare LAN, CAN, MAN, WAN

Networking allows computers to connect and communicate with others through any medium. LAN,
MAN, and WAN are three types of networks designed to work over the area they cover. There are
some similarities and differences between them.

One of the significant differences is in the geographical area they cover. The LAN covers the
smallest area; MAN has a larger area than LAN and WAN has the largest range.

In addition, LANs depend on their own communication hardware and devices to transmit signals. In
contrast, this cannot happen in the case of MAN and WAN, 2 networks that are required to use
shared, private or leased communication hardware.
Table 1Compare LAN,WAN,MAN

Comparison Base LAN MAN Wan

Full name Local Area Network Metropolitan Area Wide Area Network
Network
Meaningful A network connects a The network covers It spans large areas
group of computers in a relatively large areas and connects
small geographical such as cities and countries. Internet
area. towns example
Network Ownership Private Private or public Private or public

Design and maintenance Easily Difficult Difficult

Delay on transmission Short Medium Long

Speed Tall Medium Short

Fault Tolerance (ability to Better Worse Worse


continue working when
one or more components
fail)
Jam Infrequent Happens more Happens more

Used for School, hospital. Small Town, City. Country/Continent.

Allow A single device pair Multiple computers A large number of


communicates. can simultaneously computers
interact. communicate at the
same time.

47
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
2.Compare physical topologies and logical topologies.
Table 2 Compare physical topologies and logical topologies

3.Compare between OSI reference model and TCP/IP reference model


OSI and TCP/IP model comparison table
– Similarities: The OSI and TCP/IP models have some things in common as follows:
OSI and TCP/IP both have layered architectures.
OSI and TCP/IP both have a Network layer and a Transport layer.
OSI and TCP/IP both use Packet transfer technology.
– Difference: The tcp/ip vs osi comparison table below will help you understand the basic differences
between these two network protocols.
Table 3

Content OSI . model TCP/IP model

Reliability and popularity Many people think that Standardized, trusted


this is an old model, just by many people and
for reference, the number used globally
of users is more limited
than TCP/IP
Approach Vertical approach Horizontal approach

Combination of floors Each different floor will In the application


perform a different task, layer, the
there is no combination of presentation layer and
48
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
any floor the session layer are
combined
Design Develop the model first, Protocols are
then develop the protocol designed first, then
models are developed
Number of layers (floors) 7 4

The media Supports both routed and Supports


wireless connections connectionless
communication from
the network layer
Dependency Protocol independent Depends on the
protocol

4.Compare TCP between UDP


As we know, both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are the most
widely used Internet protocols.
Among them, TCP is a connection-oriented protocol. That is, once a connection is established, data can
be sent bidirectionally. Meanwhile, UDP is a simpler connectionless Internet protocol. Many messages
are sent as packet in chunks using UDP. On the basis of the characteristics and properties of the two
protocols, we can distinguish between UDP and TCP.
Numerical Characteristics TCP (Transmission Control Protocol) UDP (User Datagram
order Protocol)
1 Define Define Similar to TCP protocol. But
An information transfer protocol that error checking and data
uses data to be transferred between recovery are not guaranteed.
systems over a network. In it, the data If you use this protocol, data
is transmitted in the form of packets. It will be sent continuously,
includes error checking, ensuring the regardless of the problem at
delivery and maintaining the order of the receiving end.
the packets.
2 Design TCP is a connection oriented protocol. UDP is a connectionless
protocol.
3 Reliability Because TCP provides error checking On the other hand, UDP only
support and also ensures delivery of provides basic error checking
data to the destination. This makes it support using checksums. So
more reliable than UDP. delivery of data to the
destination cannot be
guaranteed in UDP compared
to TCP.
4 Data In TCP, data is transmitted in a specific In UDP there is no sequence
transmission sequence. This means that the packets of data. To do the ordering it
arrive at the receiver in order. must be managed by the
application layer.
5 Performance TCP is slower and less efficient in UDP is faster and more

49
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
terms of performance than UDP. In efficient than TCP.
addition, TCP is also heavier than UDP.
6 Retransmission It is possible to retransmit the packet Unable to retransmit packets
in TCP in case the packet is lost or in UDP.
needs to be resend.

50
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
CONCLUSION

After completing this report, I understood what an algorithm is, its properties, its characteristics, how it
is represented inside the algorithm, how to make a good algorithm, Network server language What is
LAN, Server Matters and Protocols and Standards of Computer Networks. Through that, I learned a lot
more basic knowledge as well as new extended knowledge

51
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
Evaluation
After this Assignment, I have mostly completed the content I have learned about networks, bandwidth,
and computer network devices. I know how to build a computer network on a small scale, know the
rules and understand which servers should businesses use for work, so in Assignment, I deserve an M.

52
PERFOMED STUDENT: Nguyen Trinh Anh Tuan
REFERENCES
1.https://www.electronicdesign.com/technologies/communications/article/21796419/10-standards-
organizations-that-affect-you-whether-you-know-it-or-not [online] 1.6 list some standard organizations
and standard names are
2.http://www.cs.sjsu.edu/~pearce/modules/patterns/events/ConstraintNetworks.htm#:~:text=A
%20constraint%20network%20represents%20a,constraint%20network%3A%20cells%20and
%20constraints. [online] 1.4 Constraint of the network
3.

53
PERFOMED STUDENT: Nguyen Trinh Anh Tuan

You might also like