You are on page 1of 29

ASSIGNMENT 1 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking Infrastructure

Submission date Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name Nguyen Chau Toan Student ID GCD210174

Class GCD1102 Assessor name Dang Quang Hien

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Grading grid

P1 P2 P3 P4 M1 M2 D1

1
 Summative Feedback:  Resubmission Feedback:

Grade: Assessor Signature: Date:


Lecturer Signature:

1
Table of Contents
I. The benefits and constraints of different network types and standards……………………………………….4
1. What is Network?..............................................................................................................................4
1.1. Metropolitan Area Network (MAN)…………………………………………………………………………………..5
1.2. Wide Area Network (WAN)……………………………………………………………………………………………….6
1.3. Local Area Network (LAN)………………………………………………………………………………………………….6
2. Protocol and Standards…………………………………………………………………………………………………………………7
2.1. Network Protocol Definition……………………………………………………………………………………………..7
2.2. Some Protocols………………………………………………………………………………………………………………….8
2.3. Standards Organizations………………………………………………………………………………………………….10
II. Network topology, communication and bandwidth requirements………………………………………………11
1. Network Topology Definition………………………………………………………………………………………………………11
2. Discuss the impact of topology……………………………………………………………………………………………………12
3. Example of Topology with Diagrams (Mesh, Star, Bus, Ring, Tree, Hybrid)………………………………….12
4. Communication and Bandwidth………………………………………………………………………………………………….15
4.1. Defines Communication in Term of Networking………………………………………………………………15
4.2. Rules of Communication………………………………………………………………………………………………….15
4.3. Bandwidth……………………………………………………………………………………………………………………….16
III. Discuss the operating principles of networking devices and server types……………………………………17
1. Switch…………………………………………………………………………………………………………………………………………17
2. Router…………………………………………………………………………………………………………………………………………18
3. Other Commonly used Networking Devices………………………………………………………………………………..19
4. Other Types of Servers………………………………………………………………………………………………………………..20
IV. Discuss the inter-dependence of workstation hardware with relevant networking software………23
1. Explain What Is Meant By Interdependencies……………………………………………………………………………..23
2. Define Workstation Hardware…………………………………………………………………………………………………….24
3. Define Networking Software……………………………………………………………………………………………………….26
4. Discuss And Explain The Interdepencies Of Workstation Hardware With Networking Software….27
References……………………………………………………………………………………………………………………………………………..28

2
Figure 1: Definition Network

Figure 2: MAN Network

Figure 3: WAN Network

Figure 4: Local Area Network

Figure 5: Network Protocols

Figure 6: TCP/IP

Figure 7: HTTP

Figure 8: DNS

Figure 9: ICMP

Figure 10: Standards Organization

Figure 11: Network Topology

Figure 12: Mesh Topology

Figure 13: Star Topology

Figure 14: Bus Topology

Figure 15: Ring Topology

Figure 16: Tree Topology

Figure 17: Hybrid Topology

Figure 18: Communication in Terms of Networking

Figure 19: Switch

Figure 20: Router

Figure 21: Gateway

Figure 22: Firewall

Figure 23: Web server

Figure 24: Database server

Figure 25: DNS server

Figure 26: FTP server

Figure 27: DHCP server

Figure 28: Workstation Hardware

Figure 29: Software Defined Networking (SDN)

3
I. The benefits and constraints of different network types and standards

1. What is Network?
A network consisting of 2 or more computers linked together to share resources (e.g., internal
machines and CDs), exchange files and communicate. Computers can be connected via wires,
phone lines, radio waves, satellites, or infrared rays.

 There are 3 popular networks today:


- Metropolitan Area Network (MAN)
- Wide Area Network (WAN)
- Local Area Network (LAN)

Figure 1: Definition Network

 Advantage:
- Sharing: Computer networks allow us to share information and data across an extensive
network of devices. We can communicate and work remotely using chat apps such as Google
Meet and Zoom.
- Storage: Data from the user or organization will be stored remotely, allowing users to access
it from anywhere, at any time, as long as the device is connected to the internet.

4
- Security: Nowadays, protected computer networks are pretty safe. They employ various
methods to keep users secure from malicious elements in the network environment. If the
customer disagrees, no one or institution can reveal and remove the data.

 Disadvantage:
- Security flaw: Once a network is established, it introduces new methods for accessing remote
computers, particularly those connected to the internet. Unknown risks to computers, users,
and data on the network may arise due to these potential new means of computer access.
- Independence: Because networks are based on a centralized server, most decisions are made
by the network itself. This restricts users' freedom to use the computer as they see fit.
- Maintenance: A computer network must be maintained regularly to function correctly. The
issue is that this cannot be accomplished with basic skills, and it necessitates complex
configurations and installations. As a result, an experienced network manager must be
deployed.

1.1. Metropolitan Area Network (MAN)


MAN (Metropolitan Area Network), also known as urban network, connects from many LANs
via cables, other transmission means,... The ability to communicate in an extensive range,
such as in a town or city, conscious.

The MAN network model is often used for organizations and businesses connected with many
branches and departments. Man network is often used for businesses because this model
provides many types of services such as voice connection (voice), data (data), video (image),
easy deployment of applications.

Figure 2: MAN Network

5
1.2. Wide Area Network (WAN)
Wide area networks (WANs) connect networks in larger areas, such as Florida, the United
States, or the limit. Undersea cables or satellite uplinks can connect the entire network of this
connection type.

Schools in Florida can link to Tokyo in seconds without paying for discounted phone units
using a WAN. Half a world separates the two users with micro-equipped workstations and
webcams that transmit remote images in real-time. WANs are pretty complex, and it uses
multiplexing, bridges, and routers to connect local networks and global communication
channels such as the Internet. However, a WAN will not differ from a LAN for users.

Figure 3: WAN Network

1.3. Local Area Network (LAN)


A Local Area Network (LAN) is a network confined to a relatively small area within a
geographic area such as a laboratory, school, or building.

Computers connected to the network are classified as servers or workstations. Servers are not
usually used directly by humans, but servers will run continuously to provide "services" to
other computers (and their users) on the network. Services provided may include: printing,
faxing, software hosting, file storage and sharing, messaging, data storage and retrieval,
access control (security) for network resources, and many other services.

6
Figure 4: Local Area Network

2. Protocol and Standards


2.1. Network Protocol Definition
The protocol is a rule file that defines how to format, transmit, and receive data so that
network computers - from servers and routers to endpoints - can communicate with each
other, regardless of any differences in the base layer, design, or standard facilities.

To send and receive data successfully, devices on both sides of a communication exchange
must accept and follow protocol conventions. Network protocol support can be built into the
software, hardware, or both.

Standardized network protocols provide network devices with a common language. Without
them, computers would be unable to communicate with one another. As a result, except for
networks explicitly designed for a specific architecture, only a few networks can function, and
the internet as we know it today would not exist. To communicate with one another, almost
all end-users rely on network protocols.

7
Figure 5: Network Protocols

2.2. Some Protocols


 TCP/IP: TCP/IP is a set of rules that computer networks on the internet follow. Most
adequately, TCP/IP instructs a computer on obtaining, receiving, or locating its destination on
a network system. Bob Fahn and Vint Cerf created it in 1978. TCP and IP are two distinct
protocols, and TCP transmits data over internet protocols, and IP governs all network packets.

Figure 6: TCP/IP

8
 HTTP: The acronym HTTP stands for Hypertext Transfer Protocol. The Hypertext Transfer
Protocol (HTTP) used in www. HTTP is a resource-seeking protocol, unlike HTML doc.

Figure 7: HTTP

 DNS: Domain Name System (DNS) is separate from the cluster and has the whole meaning of
domain name system analysis. To put it simply, DNS is a system for converting websites to
domain names that we use, in the form, http://www.tenmien.com sang an IP address format
corresponding to the domain name that and backup.

Figure 8: DNS

9
 ICMP: ICMP (Internet Control Message Protocol) is an error reporting protocol that notifies
the sender when there is a problem sending data, similar to how routers generate error
messages to the source IP address when issues occur. The network prevents the distribution
of IP packages, and ICMP generates and sends a letter to the source IP address indicating that
a gateway to the Internet is unavailable. Every IP network device can send, receive, or process
ICMP messages.

Figure 9: ICMP

2.3. Standards Organizations

 American National Standards Institute (ANSI): The American National Standards Institute
(ANSI) is the official standards organization in the United States, coordinating and publishing
computer and information technology standards.
 The International Organization for Standardization (ISO): is the world's largest standards
organization, and it is a federation of over 100 standards organizations from dozens of
countries. The OSI Reference Model is the ISO's most well-known networking product.
 Institute of Electrical and Electronics Engineers (IEEE): An international organization that
publishes several necessary networking standards, including the official standard for the
Ethernet networking system.

10
Figure 10: Standards Organizations

II. Network Topology & Communication And Bandwidth Requirements

1. Network Topology Definition


Network topology is a map used to express the type of sort, the layout of the computer, wire up,
and other components on the method's network.

Figure 11: Network Topology

11
2. Discuss The Impact Of Topology
 Physical Topology: Physical topology is Physical topology. The interconnected topology of a
local area network is physical topology (LAN). Connecting physical devices on a network using
cables and cables forms the physical topology.
 Logical Topology: Logical Topology is Logical Topology... The logical topology can be
automatically maintained and reconfigured by using network devices such as routers and
switches. The topology is opposed to physical topology, which refers to the physical
interconnection of all network devices.
3. Examples Of Topology With Diagrams (Mesh, Star, Bus, Ring, Tree, Hybrid)
 Mesh Topology: The network format is the type of topology in which each computer is linked
to all the hosts and back on the system without a Hub or Switch.

Figure 12: Mesh Topology

 Star Topology: is a network model that consists of a central device and information nodes
controlled by that device. The information nodes, in this case, can be workstations, terminals,
or other LAN system devices.

12
Figure 13: Star Topology

 Bus Topology: All devices, such as servers, workstations, and information nodes, are linked
together on a single main cable to transmit data in this Topology. Two terminator devices
secure the cable ends. The specific address of the destination is carried by the data and
signals transmitted over the cable.

Figure 14: Bus Topology

13
 Ring Topology: Cables connect devices in a closed circle in this Topology. The transmitted
signal will be sent in a single direction. Only one device (one node) can communicate with
another node at any given time. When data is transmitted in this network system, it must be
accompanied by the specific address of the receiving station.

Figure 15: Ring Topology

 Tree Topology: This topology is similar to an extended star network, but the network is
associated with a device that checks network traffic rather than a hub or switch. The system's
workstations are organized in layers based on their function.

Figure 16: Tree Topology

14
 Hybrid Topology: A hybrid topology is a network topology that combines two or more
different network topologies. These topologies can be a combination of bus topology, mesh
topology, ring topology, star topology, and tree topology.

Figure 17: Hybrid Topology

4. Communication and Bandwidth


4.1. Define Communications In Terms Of Networking
Network communication, also known as internetworking, refers to a collection of protocols
(rules and standards) that allow application programs to communicate with one another
regardless of the hardware and operating systems on which they are executed.
Internetworking enables application programs to interact with one another regardless of their
physical network connectivity.

15
Figure 18: Communication In Terms Of Networking

4.2. Rules of Communication


 Protect your data, do not rely on the network
- Recognize the danger.
- Design service protection as close to the service as possible.
- Publish routes by default.
- Encrypt without compromising performance.
- Protect your networks.
- Layer your security.
 Design for interworking and flexibility
- Use open standards.
- Maximize the use of commoditized services.
- Consolidate the use of data networks and migrate to IP-based technologies.
- Publish DNS names.
- Join up to provide resilience.
 Understand the user
- Understand your basic network requirements.
- Design networks for a roaming user base.
- Design services to be accessed broader than your department.
- Design for organizations who share a site to share the site's network.
- Be able to support your users.

16
4.3. Bandwidth
The term "bandwidth" is now widely used in technology and human life in general. In the
Website field, bandwidth refers to the maximum amount of data exchanged between a
website or a server and a user in a given unit of time, usually a second. The higher the
bandwidth limit, the more data can be transferred (download/upload). Web access requests
will be denied if bandwidth is exhausted.

Bits per second are the most commonly used unit of measurement for bandwidth. Modern
networks are frequently measured in millions of bits per second (Mbps) or billions of bits per
second (bps) due to their high capacity (gigabits per second - Gbps).

III. Discuss the operating principles of networking devices and server types

1. Switch
A switch is a critical network switch used to connect network segments in a star topology. In this
model, the switch is the central device connected to all other satellite devices, including the
computer. The router then establishes a temporary connection to send data.

Figure 19: Switch

Switching principles in a network:


Step 1: PC-HN sends a packet to PC-SG via its own channel when connected to the switch.
Step 2: They will convert the data into a data frame, validate the MAC address in the data frame's
source MAC field, and save the MAC address in the MAC address database alongside the
incoming port number.
Step 3: Toggle checks the MAC address in the frame's destination mac field and the MACaddress-
table to see if it is already in the table.
Step 4: If the destination mac address is already in the mac table, the switch looks for the
corresponding outgoing port and forwards the unicast frame to that port.

17
Step 5: If the destination MAC address entry is not found in the MAC table, the switch will
broadcast the frame data to all other connected ports.
Step 6: PC-NA, PC-DN, and PC-SG receive the frame as a packet and compare their IP addresses to
the packet's destination IP address.
Step 7: PC-B and PC-C will reject the packet because their IP addresses do not match the packet's
destination IP address. PC-IP D's address, on the other hand, corresponds to the packet's
destination IP address.
Step 8: PC-SG will send an acknowledgement packet to PC-HN.
Step 9: Convert to receive an acknowledgement frame from PC-SG on port 4, validate the MAC
address in the source MAC field, and store the MAC address along with the incoming port
number in the MAC address database.
Step 10: Validate the destination MAC address from the frame, check the MAC address table to
confirm the MAC address entry. The switch has learned and cached the MAC address of PC-HN,
and now unicasts acknowledge the incoming packet to PC-A.
Step 11: When the switch learns the MAC addresses of all the PCs or nodes, it always sends
unicast frames to the network's connected nodes.

2. Router
A router is a network device that connects computers by sending data packets from one to
another. A router, in a nutshell, is a device that allows multiple devices in the same network layer
to share Internet access.
The Wi-Fi router converts a wired network to a wireless network, allowing mobile devices to be
connected more easily. Allow multiple people in the house to connect to the Internet
simultaneously without being restricted by a wired network.

Figure 20: Router

18
 Switching principles in a network:
If the router cannot locate the configuration file, it enters setup mode. The setting will be saved
in the NV-Ram when done in setup mode.
Step 1: Start the router by loading the bootstrap.
The following are the three steps in the process of starting the IOS software: - Hardware testing
-> IOS software download -> Locate and execute the startup configuration file.
Following the POST procedure, the router will perform the following actions:
To begin, use the bootstrap loader from Rom. gzip.
Step 2: Locate IOS on the flash drive or the network.
Step 3: Download and install the operating system.
Step 4: The configuration file in the NV-Ram is copied to the main memory and executed line by
line. Set network communication port addresses and use the routing command...
Step 5: If the configuration file does not exist in the NV-Ram, the operating system will attempt to
connect to the TFTP server. If no TFTP is found, the installation mode will begin

3. Other commonly used networking devices


 Gateway: A gateway is a piece of hardware that serves as a "bridge" between two networks.
It could be a server, firewall, router, or another device that freely allows data to flow
throughout the network. Before being routed, all data must pass through or communicate
with the gateway; the gateway handles the network's input and output.

Figure 21: Gateway

19
 Firewall: A firewall is a network security system that employs rules to regulate traffic entering
and exiting the system. It can be either hardware or software. Firewalls act as a barrier
between the secure network and the unsecured network. Firewalls aid in the control of
information flow between the intranet and the Internet by detecting and judging behaviours
that are and are not accessed within the system, ensuring maximum information security.

Figure 22: Firewall

4. Other types of servers


 Web server: The web server is the server that handles the client's HTTP protocol requests. A
web server can be either software or hardware or both simultaneously.
For instance, Apache Web Server, NGINX, Apache Tomcat, Lighttpd, etc.

Figure 23: Web server

20
 Database server: The database server is the server that contains the Database Management
System software.
Example: Microsoft SQL Server, Oracle Database, MySQL, PostgreSQL.

Figure 24: Database server

 DNS server: DNS Server, also known as Domain Name System, is an ordered naming system
used by computers and services connected to the Internet. It associates various pieces of
information with the domain names assigned to them, allowing users to use that domain to
find the information they require. It is critical to select a domain name that is meaningful to
the user and is linked to other network devices to locate and provide information to users
worldwide.

21
Figure 25: DNS server

For example: Google DNS Server: 8.8. 8.8 and 8.8. 4.4 or Cloudflare: 1.1. 1.1 & 1.0. 0.1.
 FTP server: FTP, which stands for File Move Protocol, is a protocol that allows you to
transfer files from one computer to another via a TCP network or the Internet. This
protocol will enable users to effortlessly upload material such as photographs,
documents, audio files, movies, and so on from their computer to a remote server or
download downloaded items from the server to their computer. FTP is another protocol
used to transport web data to a web server, even if the server is situated a long-distance
away.

Figure 26: FTP server

22
For example: gene6 FTP, BulletProof FTP, Core FTP pro, TurboFTP, WinSCP.
 DHCP server: DHCP (Dynamic Host Configuration Protocol or Dynamic Host Configuration
Protocol) is a protocol used to control the allocation of IP addresses in a network in a
rapid, automated, and centralized manner. DHCP is also utilized to set the correct subnet
mask, default gateway, and DNS server information.

Figure 27: DHCP server

IV. Discuss the inter-dependence of workstation hardware with relevant networking software

1. Explain What Is Meant By Interdependencies


Network interface card (NIC): Establishes and manages the computer’s network connection.
Translates digital computer data into signals (appropriate for the networking medium) for
outgoing messages and translates signals into digital computer data for incoming messages.

Device driver: a small, specialized program that represents a device to an OS and manages
communications between the OS and NIC.

23
EX: The web browser communicates with the webserver to retrieve web pages data using the
hypertext transfer protocol (HTTP). It is a TCP / IP-based communication protocol provides data
on the World Wide Web. It provides standards for computers to communicate with each other.
HTTP determines how the client requests to build and send data to the server; and how the
server responds to these requests.

HTTP client: is a program (Web browser or another client) used to establish a connection to the
server to send one or more HTTP request messages.

HTTP server: is a program (Apache webserver or Network Information Service - IIS) used to
accept connections to the server from HTTP requests by sending HTTP feedback. Moreover, a
web client wants to get information from a web server. They start with the web interface on the
client pc to take the command request. Then the web client communicates with the webserver
through a NIC card to take HTTP packets from the webserver. The web client takes the HTTP from
the web server and shows it on applications to the users.

Conclusion: workstation hardware with relevant networking software is dependent on each


other, as they must communicate with the other but achieve that, they need support from some
hardware components. Additionally, the hardware requires a driver to manage communications
between the os and the hardware.

2. Define Workstation Hardware


Computer hardware is the physical components that a computer system requires to function. It
encompasses everything with a circuit board that operates within a PC or laptop; including the
motherboard, graphics card, CPU (Central Processing Unit), ventilation fans, webcam, power
supply, and so on.

- The motherboard: The motherboard is at the heart of what makes a computer operator, and
it houses the CPU and serves as a hub for all other devices. The motherboard functions as a
brain, distributing power where it is required, connecting with and coordinating all other
components, making it one of the most critical pieces of hardware in a computer.

- CPU: The CPU (Central Processing Unit or processor) is in charge of processing all information
from your computer's programs. The processor's 'clock speed,' or the rate at which it
processes information, is measured in gigahertz (GHz). This means that a CPU with a high GHz
rating will almost certainly outperform a similarly stated processor of the same brand and
age.

24
- Ram: RAM, or Random Access Memory, is hardware present in the motherboard's memory
slots. RAM's job is to temporarily store on-the-fly information generated by programs and do
so in a fashion that allows this data to be accessed instantly. Rendering pictures for graphic
design, editing video or photography, and multi-tasking with many programs open are
examples of tasks that demand random memory (for example, running a game on one screen
and chatting via Discord on the other).

- Hard drive: The hard drive is a storage device that stores both permanent and temporary
data. This data can take numerous forms, but it essentially refers to everything saved or
placed on a computer, such as computer programs, family pictures, operating systems, word-
processing papers, and so on.

 Storage devices are classified into two types: classic hard disk drives (HDDs) and newer solid
state drives (SSDs) (SSD). Hard disk drives store data by putting binary data onto spinning
magnetic disks called platters that rotate at high speeds, whereas solid-state drives use static
flash memory chips to store data. Graphics Processing Unit (GPU)
- Graphics Processing Unit (GPU): The GPU, which is especially vital for 3D rendering, performs
precisely what its name implies: it processes massive amounts of visual data. Your computer's
graphics card will have at least one GPU. Dedicated graphics cards, as opposed to the basic
onboard visual capabilities provided by PC motherboards, interact with the motherboard
through an expansion slot to work nearly entirely on graphic rendering. This also implies that
you may update your graphics card to get a little more performance out of your PC.

- Power Supply Unit (PSU): A power supply unit, abbreviated as PSU, does more than merely
provide electricity to your computer. It is the point at which electricity enters your system
from an external power source and is allotted to individual component hardware by the
motherboard. However, not all power supplies are created equal, and without the proper
wattage PSU, your system will fail to function.

25
Figure 28: Workstation Hardware

3. Define Networking Software


A set of statements or instructions written in one or more programming languages in a certain
order, as well as supporting data or documents, that are meant to do some action or function
automatically in order to solve a specific issue. Particular specific issue Software that
accomplishes its operations by directly delivering instructions to hardware or by supplying data to
other programs or software.

Figure 29: Software Defined Networking (SDN)

26
- Web server: A web server is a computer on which programs that serve web applications are
installed. The web server can accept requests from web browsers and respond to them using
HTTP or other protocols. There are several web servers available, including Apache, Nginx, IIS,
and others.
- File server: It is a networked computer that stores and distributes data such as text, photos,
audio, and video. Workstations can access this information. When these computers exchange
access via a computer network, this workstation can connect to the server.
- DNS server: DNS Server, also known as Domain Name System, is an ordered naming system
used by computers and services connected to the Internet. It connects various pieces of
information with the domain names allocated to them, allowing users to utilize that domain
to retrieve the information they want. It is critical to select a domain name that is meaningful
to the user and is linked to other network devices in order to locate and offer information to
people all over the world.
- DHCP server: DNS Server, also known as Domain Name System, is a naming system used by
computers and services linked to the Internet. It associates various bits of information with
the domain names assigned to them, allowing users to use that domain to access the
information they want. To locate and provide information to people worldwide, it is necessary
to choose a domain name that is significant to the user and is linked to other network devices.

4. Discuss And Explain The Interdepencies Of Workstation Hardware With Networking Software
A network is formed when more than one computer is joined together for communication. There
are additional servers in a network that provide many data storage sites. For servers to handle so
many computers, an operating system is necessary. When a laptop submits an internet request to
a server, many scheduling algorithms decide which request receives which resource. That is how
a piece of software communicates with the hardware of a workstation.

A network is more capable than a single computer designed for individual use. Because they are
PCs with their software and storage, they may be used independently of the mainframe. A
network interface card (NIC) is a piece of computer hardware that enables computers to connect
to a network, most often a local area network. A network interface card is a piece of computer
hardware that allows computers to connect to a network, most often a local area network.

27
References
Giang, 2020. bizflycloud. [Online]
Available at: https://bizflycloud.vn/
[Accessed 21 8 2022].

Kai, M., 2017. takisinews. [Online]


Available at: https://takisinews.com/
[Accessed 21 8 2022].

matbao, 2020. TOPDEV. [Online]


Available at: https://topdev.vn
[Accessed 22 8 2022].

Nguyen, K. P. N., 2020. Thegioididong. [Online]


Available at: https://www.thegioididong.com/
[Accessed 22 8 2022].

Oracle, 2020. docs.oracle. [Online]


Available at: https://docs.oracle.com/
[Accessed 23 8 2022].

Roor, M., 2020. hitechwhizz. [Online]


Available at: https://www.hitechwhizz.com/
[Accessed 24 8 2022].

unknow, 2021. snabaynetworking. [Online]


Available at: https://snabaynetworking.com/
[Accessed 24 8 2022].

28

You might also like