Professional Documents
Culture Documents
Assignment 1 - 1619
Assignment 1 - 1619
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 M1 M2 D1
1
Summative Feedback: Resubmission Feedback:
1
Table of Contents
I. The benefits and constraints of different network types and standards……………………………………….4
1. What is Network?..............................................................................................................................4
1.1. Metropolitan Area Network (MAN)…………………………………………………………………………………..5
1.2. Wide Area Network (WAN)……………………………………………………………………………………………….6
1.3. Local Area Network (LAN)………………………………………………………………………………………………….6
2. Protocol and Standards…………………………………………………………………………………………………………………7
2.1. Network Protocol Definition……………………………………………………………………………………………..7
2.2. Some Protocols………………………………………………………………………………………………………………….8
2.3. Standards Organizations………………………………………………………………………………………………….10
II. Network topology, communication and bandwidth requirements………………………………………………11
1. Network Topology Definition………………………………………………………………………………………………………11
2. Discuss the impact of topology……………………………………………………………………………………………………12
3. Example of Topology with Diagrams (Mesh, Star, Bus, Ring, Tree, Hybrid)………………………………….12
4. Communication and Bandwidth………………………………………………………………………………………………….15
4.1. Defines Communication in Term of Networking………………………………………………………………15
4.2. Rules of Communication………………………………………………………………………………………………….15
4.3. Bandwidth……………………………………………………………………………………………………………………….16
III. Discuss the operating principles of networking devices and server types……………………………………17
1. Switch…………………………………………………………………………………………………………………………………………17
2. Router…………………………………………………………………………………………………………………………………………18
3. Other Commonly used Networking Devices………………………………………………………………………………..19
4. Other Types of Servers………………………………………………………………………………………………………………..20
IV. Discuss the inter-dependence of workstation hardware with relevant networking software………23
1. Explain What Is Meant By Interdependencies……………………………………………………………………………..23
2. Define Workstation Hardware…………………………………………………………………………………………………….24
3. Define Networking Software……………………………………………………………………………………………………….26
4. Discuss And Explain The Interdepencies Of Workstation Hardware With Networking Software….27
References……………………………………………………………………………………………………………………………………………..28
2
Figure 1: Definition Network
Figure 6: TCP/IP
Figure 7: HTTP
Figure 8: DNS
Figure 9: ICMP
3
I. The benefits and constraints of different network types and standards
1. What is Network?
A network consisting of 2 or more computers linked together to share resources (e.g., internal
machines and CDs), exchange files and communicate. Computers can be connected via wires,
phone lines, radio waves, satellites, or infrared rays.
Advantage:
- Sharing: Computer networks allow us to share information and data across an extensive
network of devices. We can communicate and work remotely using chat apps such as Google
Meet and Zoom.
- Storage: Data from the user or organization will be stored remotely, allowing users to access
it from anywhere, at any time, as long as the device is connected to the internet.
4
- Security: Nowadays, protected computer networks are pretty safe. They employ various
methods to keep users secure from malicious elements in the network environment. If the
customer disagrees, no one or institution can reveal and remove the data.
Disadvantage:
- Security flaw: Once a network is established, it introduces new methods for accessing remote
computers, particularly those connected to the internet. Unknown risks to computers, users,
and data on the network may arise due to these potential new means of computer access.
- Independence: Because networks are based on a centralized server, most decisions are made
by the network itself. This restricts users' freedom to use the computer as they see fit.
- Maintenance: A computer network must be maintained regularly to function correctly. The
issue is that this cannot be accomplished with basic skills, and it necessitates complex
configurations and installations. As a result, an experienced network manager must be
deployed.
The MAN network model is often used for organizations and businesses connected with many
branches and departments. Man network is often used for businesses because this model
provides many types of services such as voice connection (voice), data (data), video (image),
easy deployment of applications.
5
1.2. Wide Area Network (WAN)
Wide area networks (WANs) connect networks in larger areas, such as Florida, the United
States, or the limit. Undersea cables or satellite uplinks can connect the entire network of this
connection type.
Schools in Florida can link to Tokyo in seconds without paying for discounted phone units
using a WAN. Half a world separates the two users with micro-equipped workstations and
webcams that transmit remote images in real-time. WANs are pretty complex, and it uses
multiplexing, bridges, and routers to connect local networks and global communication
channels such as the Internet. However, a WAN will not differ from a LAN for users.
Computers connected to the network are classified as servers or workstations. Servers are not
usually used directly by humans, but servers will run continuously to provide "services" to
other computers (and their users) on the network. Services provided may include: printing,
faxing, software hosting, file storage and sharing, messaging, data storage and retrieval,
access control (security) for network resources, and many other services.
6
Figure 4: Local Area Network
To send and receive data successfully, devices on both sides of a communication exchange
must accept and follow protocol conventions. Network protocol support can be built into the
software, hardware, or both.
Standardized network protocols provide network devices with a common language. Without
them, computers would be unable to communicate with one another. As a result, except for
networks explicitly designed for a specific architecture, only a few networks can function, and
the internet as we know it today would not exist. To communicate with one another, almost
all end-users rely on network protocols.
7
Figure 5: Network Protocols
Figure 6: TCP/IP
8
HTTP: The acronym HTTP stands for Hypertext Transfer Protocol. The Hypertext Transfer
Protocol (HTTP) used in www. HTTP is a resource-seeking protocol, unlike HTML doc.
Figure 7: HTTP
DNS: Domain Name System (DNS) is separate from the cluster and has the whole meaning of
domain name system analysis. To put it simply, DNS is a system for converting websites to
domain names that we use, in the form, http://www.tenmien.com sang an IP address format
corresponding to the domain name that and backup.
Figure 8: DNS
9
ICMP: ICMP (Internet Control Message Protocol) is an error reporting protocol that notifies
the sender when there is a problem sending data, similar to how routers generate error
messages to the source IP address when issues occur. The network prevents the distribution
of IP packages, and ICMP generates and sends a letter to the source IP address indicating that
a gateway to the Internet is unavailable. Every IP network device can send, receive, or process
ICMP messages.
Figure 9: ICMP
American National Standards Institute (ANSI): The American National Standards Institute
(ANSI) is the official standards organization in the United States, coordinating and publishing
computer and information technology standards.
The International Organization for Standardization (ISO): is the world's largest standards
organization, and it is a federation of over 100 standards organizations from dozens of
countries. The OSI Reference Model is the ISO's most well-known networking product.
Institute of Electrical and Electronics Engineers (IEEE): An international organization that
publishes several necessary networking standards, including the official standard for the
Ethernet networking system.
10
Figure 10: Standards Organizations
11
2. Discuss The Impact Of Topology
Physical Topology: Physical topology is Physical topology. The interconnected topology of a
local area network is physical topology (LAN). Connecting physical devices on a network using
cables and cables forms the physical topology.
Logical Topology: Logical Topology is Logical Topology... The logical topology can be
automatically maintained and reconfigured by using network devices such as routers and
switches. The topology is opposed to physical topology, which refers to the physical
interconnection of all network devices.
3. Examples Of Topology With Diagrams (Mesh, Star, Bus, Ring, Tree, Hybrid)
Mesh Topology: The network format is the type of topology in which each computer is linked
to all the hosts and back on the system without a Hub or Switch.
Star Topology: is a network model that consists of a central device and information nodes
controlled by that device. The information nodes, in this case, can be workstations, terminals,
or other LAN system devices.
12
Figure 13: Star Topology
Bus Topology: All devices, such as servers, workstations, and information nodes, are linked
together on a single main cable to transmit data in this Topology. Two terminator devices
secure the cable ends. The specific address of the destination is carried by the data and
signals transmitted over the cable.
13
Ring Topology: Cables connect devices in a closed circle in this Topology. The transmitted
signal will be sent in a single direction. Only one device (one node) can communicate with
another node at any given time. When data is transmitted in this network system, it must be
accompanied by the specific address of the receiving station.
Tree Topology: This topology is similar to an extended star network, but the network is
associated with a device that checks network traffic rather than a hub or switch. The system's
workstations are organized in layers based on their function.
14
Hybrid Topology: A hybrid topology is a network topology that combines two or more
different network topologies. These topologies can be a combination of bus topology, mesh
topology, ring topology, star topology, and tree topology.
15
Figure 18: Communication In Terms Of Networking
16
4.3. Bandwidth
The term "bandwidth" is now widely used in technology and human life in general. In the
Website field, bandwidth refers to the maximum amount of data exchanged between a
website or a server and a user in a given unit of time, usually a second. The higher the
bandwidth limit, the more data can be transferred (download/upload). Web access requests
will be denied if bandwidth is exhausted.
Bits per second are the most commonly used unit of measurement for bandwidth. Modern
networks are frequently measured in millions of bits per second (Mbps) or billions of bits per
second (bps) due to their high capacity (gigabits per second - Gbps).
III. Discuss the operating principles of networking devices and server types
1. Switch
A switch is a critical network switch used to connect network segments in a star topology. In this
model, the switch is the central device connected to all other satellite devices, including the
computer. The router then establishes a temporary connection to send data.
17
Step 5: If the destination MAC address entry is not found in the MAC table, the switch will
broadcast the frame data to all other connected ports.
Step 6: PC-NA, PC-DN, and PC-SG receive the frame as a packet and compare their IP addresses to
the packet's destination IP address.
Step 7: PC-B and PC-C will reject the packet because their IP addresses do not match the packet's
destination IP address. PC-IP D's address, on the other hand, corresponds to the packet's
destination IP address.
Step 8: PC-SG will send an acknowledgement packet to PC-HN.
Step 9: Convert to receive an acknowledgement frame from PC-SG on port 4, validate the MAC
address in the source MAC field, and store the MAC address along with the incoming port
number in the MAC address database.
Step 10: Validate the destination MAC address from the frame, check the MAC address table to
confirm the MAC address entry. The switch has learned and cached the MAC address of PC-HN,
and now unicasts acknowledge the incoming packet to PC-A.
Step 11: When the switch learns the MAC addresses of all the PCs or nodes, it always sends
unicast frames to the network's connected nodes.
2. Router
A router is a network device that connects computers by sending data packets from one to
another. A router, in a nutshell, is a device that allows multiple devices in the same network layer
to share Internet access.
The Wi-Fi router converts a wired network to a wireless network, allowing mobile devices to be
connected more easily. Allow multiple people in the house to connect to the Internet
simultaneously without being restricted by a wired network.
18
Switching principles in a network:
If the router cannot locate the configuration file, it enters setup mode. The setting will be saved
in the NV-Ram when done in setup mode.
Step 1: Start the router by loading the bootstrap.
The following are the three steps in the process of starting the IOS software: - Hardware testing
-> IOS software download -> Locate and execute the startup configuration file.
Following the POST procedure, the router will perform the following actions:
To begin, use the bootstrap loader from Rom. gzip.
Step 2: Locate IOS on the flash drive or the network.
Step 3: Download and install the operating system.
Step 4: The configuration file in the NV-Ram is copied to the main memory and executed line by
line. Set network communication port addresses and use the routing command...
Step 5: If the configuration file does not exist in the NV-Ram, the operating system will attempt to
connect to the TFTP server. If no TFTP is found, the installation mode will begin
19
Firewall: A firewall is a network security system that employs rules to regulate traffic entering
and exiting the system. It can be either hardware or software. Firewalls act as a barrier
between the secure network and the unsecured network. Firewalls aid in the control of
information flow between the intranet and the Internet by detecting and judging behaviours
that are and are not accessed within the system, ensuring maximum information security.
20
Database server: The database server is the server that contains the Database Management
System software.
Example: Microsoft SQL Server, Oracle Database, MySQL, PostgreSQL.
DNS server: DNS Server, also known as Domain Name System, is an ordered naming system
used by computers and services connected to the Internet. It associates various pieces of
information with the domain names assigned to them, allowing users to use that domain to
find the information they require. It is critical to select a domain name that is meaningful to
the user and is linked to other network devices to locate and provide information to users
worldwide.
21
Figure 25: DNS server
For example: Google DNS Server: 8.8. 8.8 and 8.8. 4.4 or Cloudflare: 1.1. 1.1 & 1.0. 0.1.
FTP server: FTP, which stands for File Move Protocol, is a protocol that allows you to
transfer files from one computer to another via a TCP network or the Internet. This
protocol will enable users to effortlessly upload material such as photographs,
documents, audio files, movies, and so on from their computer to a remote server or
download downloaded items from the server to their computer. FTP is another protocol
used to transport web data to a web server, even if the server is situated a long-distance
away.
22
For example: gene6 FTP, BulletProof FTP, Core FTP pro, TurboFTP, WinSCP.
DHCP server: DHCP (Dynamic Host Configuration Protocol or Dynamic Host Configuration
Protocol) is a protocol used to control the allocation of IP addresses in a network in a
rapid, automated, and centralized manner. DHCP is also utilized to set the correct subnet
mask, default gateway, and DNS server information.
IV. Discuss the inter-dependence of workstation hardware with relevant networking software
Device driver: a small, specialized program that represents a device to an OS and manages
communications between the OS and NIC.
23
EX: The web browser communicates with the webserver to retrieve web pages data using the
hypertext transfer protocol (HTTP). It is a TCP / IP-based communication protocol provides data
on the World Wide Web. It provides standards for computers to communicate with each other.
HTTP determines how the client requests to build and send data to the server; and how the
server responds to these requests.
HTTP client: is a program (Web browser or another client) used to establish a connection to the
server to send one or more HTTP request messages.
HTTP server: is a program (Apache webserver or Network Information Service - IIS) used to
accept connections to the server from HTTP requests by sending HTTP feedback. Moreover, a
web client wants to get information from a web server. They start with the web interface on the
client pc to take the command request. Then the web client communicates with the webserver
through a NIC card to take HTTP packets from the webserver. The web client takes the HTTP from
the web server and shows it on applications to the users.
- The motherboard: The motherboard is at the heart of what makes a computer operator, and
it houses the CPU and serves as a hub for all other devices. The motherboard functions as a
brain, distributing power where it is required, connecting with and coordinating all other
components, making it one of the most critical pieces of hardware in a computer.
- CPU: The CPU (Central Processing Unit or processor) is in charge of processing all information
from your computer's programs. The processor's 'clock speed,' or the rate at which it
processes information, is measured in gigahertz (GHz). This means that a CPU with a high GHz
rating will almost certainly outperform a similarly stated processor of the same brand and
age.
24
- Ram: RAM, or Random Access Memory, is hardware present in the motherboard's memory
slots. RAM's job is to temporarily store on-the-fly information generated by programs and do
so in a fashion that allows this data to be accessed instantly. Rendering pictures for graphic
design, editing video or photography, and multi-tasking with many programs open are
examples of tasks that demand random memory (for example, running a game on one screen
and chatting via Discord on the other).
- Hard drive: The hard drive is a storage device that stores both permanent and temporary
data. This data can take numerous forms, but it essentially refers to everything saved or
placed on a computer, such as computer programs, family pictures, operating systems, word-
processing papers, and so on.
Storage devices are classified into two types: classic hard disk drives (HDDs) and newer solid
state drives (SSDs) (SSD). Hard disk drives store data by putting binary data onto spinning
magnetic disks called platters that rotate at high speeds, whereas solid-state drives use static
flash memory chips to store data. Graphics Processing Unit (GPU)
- Graphics Processing Unit (GPU): The GPU, which is especially vital for 3D rendering, performs
precisely what its name implies: it processes massive amounts of visual data. Your computer's
graphics card will have at least one GPU. Dedicated graphics cards, as opposed to the basic
onboard visual capabilities provided by PC motherboards, interact with the motherboard
through an expansion slot to work nearly entirely on graphic rendering. This also implies that
you may update your graphics card to get a little more performance out of your PC.
- Power Supply Unit (PSU): A power supply unit, abbreviated as PSU, does more than merely
provide electricity to your computer. It is the point at which electricity enters your system
from an external power source and is allotted to individual component hardware by the
motherboard. However, not all power supplies are created equal, and without the proper
wattage PSU, your system will fail to function.
25
Figure 28: Workstation Hardware
26
- Web server: A web server is a computer on which programs that serve web applications are
installed. The web server can accept requests from web browsers and respond to them using
HTTP or other protocols. There are several web servers available, including Apache, Nginx, IIS,
and others.
- File server: It is a networked computer that stores and distributes data such as text, photos,
audio, and video. Workstations can access this information. When these computers exchange
access via a computer network, this workstation can connect to the server.
- DNS server: DNS Server, also known as Domain Name System, is an ordered naming system
used by computers and services connected to the Internet. It connects various pieces of
information with the domain names allocated to them, allowing users to utilize that domain
to retrieve the information they want. It is critical to select a domain name that is meaningful
to the user and is linked to other network devices in order to locate and offer information to
people all over the world.
- DHCP server: DNS Server, also known as Domain Name System, is a naming system used by
computers and services linked to the Internet. It associates various bits of information with
the domain names assigned to them, allowing users to use that domain to access the
information they want. To locate and provide information to people worldwide, it is necessary
to choose a domain name that is significant to the user and is linked to other network devices.
4. Discuss And Explain The Interdepencies Of Workstation Hardware With Networking Software
A network is formed when more than one computer is joined together for communication. There
are additional servers in a network that provide many data storage sites. For servers to handle so
many computers, an operating system is necessary. When a laptop submits an internet request to
a server, many scheduling algorithms decide which request receives which resource. That is how
a piece of software communicates with the hardware of a workstation.
A network is more capable than a single computer designed for individual use. Because they are
PCs with their software and storage, they may be used independently of the mainframe. A
network interface card (NIC) is a piece of computer hardware that enables computers to connect
to a network, most often a local area network. A network interface card is a piece of computer
hardware that allows computers to connect to a network, most often a local area network.
27
References
Giang, 2020. bizflycloud. [Online]
Available at: https://bizflycloud.vn/
[Accessed 21 8 2022].
28