You are on page 1of 44

PROGRAM TITLE: BTEC Higher National Diploman in Computing

UNIT TITLE: Unit2: Networking

ASSIGNMENT NUMBER: 1

ASSIGNMENT NAME: Networking

SUBMISSION DATE:15/7/2022

DATE RECEIVED: 30/7/2022

TUTORIAL LECTURER: DAO VIET PHUONG

WORD COUNT: 9045

STUDENT NAME: DO DINH VIET

STUDENT ID: BKC12031

MOBILE NUMBER: 0961717920

1
2
Summative Feedback:

Internal verification:

3
CONTENT

Introduce 6
A. PART 1 6
I. Compare common networking principles and explain how protocols enable the
effectiveness of networked systems 6
1. Transmission Control Protocol(TCP) 6
2.Internet Protocol(IP) 8
3.Hypertext Transfer Protocol(HTTP) 11
4.Domain Name System(DNS) 12
5.Dynamic Host Configuration Protocol(DHCP)--------------------------------------------15
6.Mail 17
7.WEB 18
8.OSI model 19
II. A discussion of the various benefits and constraints relating to different network types
and standards. 23
1. PAN(Personal Area Network) 23
2.Local Area Network (LAN) 24
3. Wide Area Network(WAN) 25
4. Metropolitan Area Network(MAN) 26
5.Internet 27
III. An explanation of the impact different network topologies has on communication and
bandwidth requirements. 28
1. Bandwidth Requirements 29
2.Topologies 31
IV. Explore the range of available server types and explain the difference regarding cost and
performance optimisation. 35
1,Network card 35
2,Router 36
3,Modem 36
4,Switch 37
5.firewall 38
6.PATCH Cable, PATCH CORD, LAN Cable-----------------------------------------------39
B. PART 2: Practical part 40

4
I. Requirement of Company 40
II. Structure chart 40
III. Se
tup 41 Reference 44

5
Introduce

I am an employee in the network training industry, consulting network design for


partners.Invited by Gold Star company to build a network environment for this company.Gold
star company is an industrial park with 2 buildings located close to each other to facilitate the
establishment of an effective network environment.The first court is the working area of
programmers, HR room, General manager's room. Second Court is the area for server room, IT
room and technical room. With such division of floors will work management becomes more
convenient. I hope this model will lead to efficiency for the company and help the company have
many advantages in terms of transmission speed as well as speed data transmission. With the
rapid development of information technology today, the company must carefully consider what
needs to be implemented, where is the right place to not be behind the trend. Must do the
company becomes complete and satisfied with what we have done.

A. PART 1

I. Compare common networking principles and explain how protocols enable the
effectiveness of networked systems

1. Transmission Control Protocol(TCP)


TCP (Transmission Control Protocol) is one of the main protocols of the Internet protocol suite.
It lies between the Application and Network Layers which are used in providing reliable delivery
services. It is a connection-oriented protocol for communications that helps in the exchange of
messages between the different devices over a network.

Working of TCP

To make sure that each message reaches its target location intact, the TCP/IP model breaks down
the data into small bundles and afterward reassembles the bundles into the original message on
the opposite end. Sending the information in little bundles of information makes it simpler to
maintain efficiency as opposed to sending everything in one go.

After a particular message is broken down into bundles, these bundles may travel along multiple
routes if one route is jammed but the destination remains the same.

6
For example, When a user requests a web page on the internet, somewhere in the world, the
server processes that request and sends back an HTML Page to that user. The server makes use
of a protocol called the HTTP Protocol. The HTTP then requests the TCP layer to set the
required connection and send the HTML file.

Now, the TCP breaks the data into small packets and forwards it towards the Internet Protocol
(IP) layer. The packets are then sent to the destination through different routes.

The TCP layer in the user’s system waits for the transmission to get finished and acknowledges
once all packets have been received.

Features of TCP/IP

Some of the most prominent features of Transmission control protocol are

Segment Numbering System


- TCP keeps track of the segments being transmitted or being received by assigning numbers to
each and every single one of them.
- A specific Byte Number is assigned to data bytes that are to be transferred while segments are
assigned sequence numbers.
- Acknowledgment Numbers are assigned to received segments.
Flow Control
- Flow control limits the rate at which a sender transfers data. This is done to ensure reliable
delivery.
- The receiver continually hints the sender on how much data can be received (using a sliding
window)
Error Control
7
- TCP implements an error control mechanism for reliable data transfer
- Error control is byte-oriented
- Segments are checked for error detection
- Error Control includes – Corrupted Segment & Lost Segment Management, Out-of-order
segments, Duplicate segments, etc.
Congestion Control
- TCP takes into account the level of congestion in the network
- Congestion level is determined by the amount of data sent by a sender

Advantages

- It is a reliable protocol
- It provides an error-checking mechanism as well as one for recovery
- It gives flow control
- It makes sure that the data reaches the proper destination in the exact order that it was sent
- Open Protocol, not owned by any organization or individual
- It assigns an IP address to each computer on the network and a domain name to each site thus
making each device site to be distinguishable over the network.

Disadvantages

- TCP is made for Wide Area Networks, thus its size can become an issue for small networks
with low resources
- TCP runs several layers so it can slow down the speed of the network
- It is not generic in nature. Meaning, it cannot represent any protocol stack other than the
TCP/IP suite. E.g., it cannot work with a Bluetooth connection.
- No modifications since their development around 30 years ago.
2. Internet Protocol(IP)

The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data
so that they can travel across networks and arrive at the correct destination. Data traversing the
Internet is divided into smaller pieces, called packets. IP information is attached to each packet,
and this information helps routers to send packets to the right place. Every device or domain that
connects to the Internet is assigned an IP address, and as packets are directed to the IP address
attached to them, data arrives where it is needed.

8
Once the packets arrive at their destination, they are handled differently depending on which
transport protocol is used in combination with IP. The most common transport protocols are TCP
and UDP.

IP address and how it works

An IP address is a unique identifier assigned to a device or domain that connects to the Internet.
Each IP address is a series of characters, such as '192.168.1.1'. Via DNS resolvers, which
translate human-readable domain names into IP addresses, users are able to access websites
without memorizing this complex series of characters. Each IP packet will contain both the IP
address of the device or domain sending the packet and the IP address of the intended recipient,
much like how both the destination address and the return address are included on a piece of mail.

IPv4 vs IPv6

The fourth version of IP (IPv4 for short) was introduced in 1983. However, just as there are only
so many possible permutations for automobile license plate numbers and they have to be
reformatted periodically, the supply of available IPv4 addresses has become depleted. IPv6
addresses have many more characters and thus more permutations; however, IPv6 is not yet
completely adopted, and most domains and devices still have IPv4 addresses. For more on IPv4
and IPv6, see What is my IP address?

IP packet

IP packets are created by adding an IP header to each packet of data before it is sent on its way.
An IP header is just a series of bits (ones and zeros), and it records several pieces of information
about the packet, including the sending and receiving IP address. IP headers also report:

- Header length

9
- Packet length

- Time To Live (TTL), or the number of network hops a packet can make before it is discarded

- Which transport protocol is being used (TCP, UDP, etc.)

In total there are 14 fields for information in IPv4 headers, although one of them is optional.

IP routing

The Internet is made up of interconnected large networks that are each responsible for certain
blocks of IP addresses; these large networks are known as autonomous systems (AS). A variety
of routing protocols, including BGP, help route packets across ASes based on their destination IP
addresses. Routers have routing tables that indicate which ASes the packets should travel
through in order to reach the desired destination as quickly as possible. Packets travel from AS to
AS until they reach one that claims responsibility for the targeted IP address. That AS then
internally routes the packets to the destination.

Protocols attach packet headers at different layers of the OSI model:

10
Packets can take different routes to the same place if necessary, just as a group of people driving
to an agreed-upon destination can take different roads to get there.

3. Hypertext Transfer Protocol(HTTP)

HTTP is an application layer protocol built on top of TCP that uses a client-server
communication model. HTTP clients and servers communicate through request and response
messages. The three main HTTP message types are GET, POST, and HEAD.

HTTP GET: Messages sent to a server contain only a URL. Zero or more optional data
parameters may be appended to the end of the URL. The server processes the optional data
portion of the URL, if present, and returns the result (a web page or element of a web page) to
the browser.

HTTP POST: Messages place any optional data parameters in the body of the request message
rather than adding them to the end of the URL.

HTTP HEAD: Requests work the same as getting requests. Instead of replying with the full
contents of the URL, the server sends back only the header information (contained inside the
HTMLsection).

The browser initiates communication with an HTTP server by initiating a TCP connection to the
server. Web browsing sessions use server port 80 by default, although other ports such as 8080
are sometimes used instead.

After a session is established, you trigger the sending and receiving of HTTP messages by
visiting the web page.

HTTP is what's called a stateless system. This means that, unlike other file transfer protocols
such as FTP, the HTTP connection is dropped after the request completes. So, after your web
browser sends the request and the server responds with the page, the connection closes.
11
Troubleshooting HTTP

Messages transmitted over HTTP may fail for several reasons:

- User error.

- Malfunction of the web browser or web server.

- Errors in the creation of web pages.

- Temporary network glitches.

When these failures occur, the protocol captures the cause of the failure and reports an error code
to the browser called an HTTP status line/code. Errors begin with a certain number to indicate
what kind of error it is.

For example, errors with a failure code beginning with a four indicate that the request for the
page cannot be completed properly, or that the request contains incorrect syntax. As an example,
404 errors mean that a web page cannot be found; some websites even offer fun custom 404
error pages.

4. Domain Name System(DNS)

The Domain Name System (DNS) is the phonebook of the Internet. Humans access information
online through domain names, like nytimes.com or espn.com. Web browsers interact through
Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can
load Internet resources.

Each device connected to the Internet has a unique IP address which other machines use to find
the device. DNS servers eliminate

the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex
newer alphanumeric IP addresses such as 2200: cb00: 2048: 1 :: c724: d5a2 (in IPv6).

How does DNS work?

The process of DNS resolution involves converting a hostname (such as www.examplexxx.com)


into a computer-friendly IP address (such as 192.168.1.1).

An IP address is given to each device on the Internet, and that address is necessary to find the
appropriate Internet device - like a street address is

12
used to find a particular home. When a user wants to load a webpage, a translation must occur
between what a user types into their web browser (examplexxx.com) and the machine-friendly
address necessary to locate the example.com web page.

In order to understand the process behind the DNS resolution, it’s important to learn about the
different hardware components a DNS query must pass between.

For the web browser, the DNS lookup occurs "behind the scenes" and requires no interaction
from the user’s computer apart from the initial request.

Steps in DNS Lookup

For most situations, DNS is concerned with a domain name being translated into the appropriate
IP address. To learn how this process works, it helps to follow the path of a DNS lookup as it
travels from a web browser, through the DNS lookup process, and back again. Let's take a look
at the steps.

Note: Often DNS lookup information will be cached either locally inside the querying computer
or remotely in the DNS infrastructure. There are typically 8 steps in a DNS lookup. When DNS
information is cached, steps are skipped from the DNS lookup process which makes it quicker.
The example below outlines all 8 steps when nothing is cached.

The 8 steps in a DNS lookup:

1,A user types ‘example.com’ into a web browser and the query travels into the Internet and is
received by a DNS recursive resolver.

2,The resolver then queries a DNS root name server (.).

3,The root server then responds to the resolver with the address of a Top Level Domain (TLD)
DNS server (such as .com or .net), which stores the information for its domains.

When searching for example.com, our request is pointed toward the .com TLD.

4,The resolver then makes a request to the .com TLD.

5,The TLD server then responds with the IP address of the domain’s name server, example.com.

6,Lastly, the recursive resolver sends a query to the domain’s name server.

7,The IP address for example.com is then returned to the resolver from the name server.

13
8,The DNS resolver then responds to the web browser with the IP address of the domain
requested initially.

Types of DNS queries

In a typical DNS lookup three types of queries occur. By using a combination of these queries,
an optimized process for DNS resolution can result in a reduction of distance traveled.

In an ideal situation cached record data will be available, allowing a DNS name server to return a
non-recursive query.

3 types of DNS queries:

+Recursive query - In a recursive query, a DNS client requires that a DNS server (typically a
DNS recursive resolver) will respond to the client with either the requested resource record or an
error message if the resolver can't find the record.

14
+Iterative query - in this situation the DNS client will allow a DNS server to return the best
answer it can. If the queried DNS server does not have a match for the query name, it will return
a referral to a DNS server authoritative for a lower level of the domain namespace. The DNS
client will then make a query to the referral address. This process continues with additional DNS
servers down the query chain until either an error or timeout occurs.

+Non-recursive query - typically this will occur when a DNS resolver client queries a DNS
server for a record that it has access to either because it's authoritative for the record or the
record exists inside of its cache. Typically, a DNS server will cache DNS records to prevent
additional bandwidth consumption and load on upstream servers.

5. Dynamic Host Configuration Protocol(DHCP)

Dynamic Host Configuration Protocol (DHCP) is responsible for fast, automatic and centralized
management of IP address distribution within a network. In addition, DHCP also helps to bring
information to more reasonable devices as well as configure subnet mask or default gateway.

How DHCP works?

The most concise explanation of how DHCP works is that when a device requests an IP address
from a router, the router immediately assigns an available IP address that allows that device to
communicate. continue online.

As in homes or small businesses, the router will act as a DHCP server, but in larger networks,
DHCP is like a machine just as a computer.

How DHCP works is also explained in another way, when a device wants to connect to the
network, it sends a request to the server, this request is called DHCP DISCOVER. After this
request reaches the DHCP server, the server will immediately find an IP address that can be used
on that device and provide the device with the address along with the DHCPOFFER packet.

When the IP is received, the device continues to respond to the DHCP server with a packet
named DHCPREQUEST. Now is the time to accept the request, the server will send an
acknowledgment (ACK) to determine that the device has an IP, and clearly determine the time to
use the newly granted IP until a new IP address is available.

Advantages and disadvantages of using DHCP

Advantages of DHCP

15
The computer or any device must be properly configured to be able to connect to the
network. DHCP allows automatic configuration so it is easy for computer devices, phones, other
smart devices...can connect to the network quickly.

Because DHCP works by assigning IP addresses, there will be no duplicate IP addresses, so


manually assigning a static IP will be easier and help the network always work stably.

DHCP makes network management more powerful because the default settings and auto-address
setup will make it possible for any device connected to the network to get an IP address.

DHCP manages both IP address and TCP/IP parameters on the same screen so it is easy to
monitor parameters and manage them across stations.

When typing automatically thanks to the DHCP server, it helps the manager to manage more
scientifically and not be confused.

In addition, administrators can change the configuration and parameters of IP addresses to make
infrastructure upgrades easier.

Another advantage is that devices can move freely from one network to another and get new IP
addresses automatically because these devices can get IPs themselves.

Disadvantages of DHCP

DHCP brings many advantages, but there are also limitations. For example, we should not use
dynamic IP addresses, IP addresses change for fixed devices and need constant access. For
example, dynamic IP should not be used for printer devices in offices.

Although there are many benefits to using DHCP, there are still some limitations that we need to
be aware of. Dynamic, variable IP addresses should not be used for fixed devices that require
constant access such as printers and file servers.

By DHCP used mainly with households or offices. For devices used in the office, like printers, it
is not practical to assign them with variable IP addresses. At that time, every time you connect to
another computer, that printer will have to regularly update its settings so that the computer can
connect to the printer.

16
6. Mail

POP3 ( Post Office Protocol version 3 ) is used to connect to the email server and email
downloads to a personal computer through an email client such as Outlook , Thunderbird,
Windows Mail, Mac Mail , yeah yeah.
Usually, email clients will have the option of whether you want to keep the mail on the server
after downloading. If you are accessing an account on multiple devices, we recommend that you
choose to keep a copy on the server or else the 2nd device will not be able to download the mail
as it was deleted after downloading on the 1st device. It's also worth noting that POP3 is a one-
way protocol , which means that email is "pulled" from the email server down to the email client.
By default, the POP3 port is:

 Port 110 – unencrypted port

 Port 995 – SSL/TLS port, also known as POP3S

IMAP ( Internet Message Access Protocol), POP3 are also used to pull emails about emails
client, however, is different from it only last POP3 email headers, content remains on the server
email. This is a 2-way communication channel , changes on the mail client will be transferred to
the server. Later, this protocol became popular thanks to the world's largest mail provider, Gmail,
recommending it instead of POP3.
Default IMAP port:

 Port 143 – unencrypted port

 Port 993 – SSL/TLS port, also known as IMAPS

SMTP ( Simple Mail Transfer Protocol) is the standard protocol TCP / IP is used to transmit
electronic mail (e-mail) on the internet.
It establishes the connection channel between the mail client and the mail server, and establishes
the communication channel between the sending mail server and the receiving mail server. Email
17
will be pushed from the mail client to the mail server and from the mail server it will be sent by
this server to the receiving mail server. Looking at the picture below you will see how sending
mail works:
How SMTP and POP3/IMAP protocols work

SMTP default ports:

 Port 25 – unencrypted port

 Port 465/587 – SSL/TLS port, also known as SMTPS

7.WEB

What is a Port?

Port is a number assigned to a specific protocol. It is a virtual communication endpoint used for
network connection. Ports live in software designed to operate on devices and connects over the
web. Computers received a vast amount of data, and port helps them distinguish different types
of traffic and make a computer understand what it should do with the received or sent data over
the same network connection. There are different numbers assigned to different ports like port
80,433,21,32,43, 223,679, etc.

-About Port 80:

Port 80 is assigned to HTTP, which is for connecting different users to an insecure network. The
web traffic that passes through the port remains in plain text. However, with the introduction of
HTTPS, most browsers, search engines now prefer port 443- a default port for HTTPS protocol.
Port 80 uses to send and receive page requests from an HTTP server. When you open any web
page, it simply sends a request as examplesite.com:80 to which browser is connecting to. Port 80
usually connects to WWW (world wide web). Cyber thieves always target HTTP enabled web
pages as they have no security, and the information passes remain in plain text.

-About Port 443:

Port 443 refers to HTTPS, a secure protocol that enables encrypted communication between the
server and the browser. Due to rising cybercrime, security is a paramount requirement for any
website. Port 443 directs the traffic to the right path and helps the device to identify the type of
service that is being requested. When a browser makes a secured connection, a TCP request is
sent via port 443. Before the connection is made, the browser and the server agree on cipher suite

18
and connection parameters. HTTPS works on the public and private key to prove that the
information passing between two ends remains encrypted.

A user can share online information without worrying about data sniffing. Once HTTPS enabled
on the browser, there will be security indicators like a padlock, HTTPS before the domain name.
Moreover, the server’s identity will be authenticated on which the domain is running. In the
absence of port 443, the site loads over port 80 with a secure connection.

-Port 80 (HTTP) vs Port 443 (HTTPS)

+ Port 80 is assigned to HTTP while Port 443 is assigned to HTTPS

+ Port 80 allows HTTP protocol means the information remains in plain text between the
browser and the server, while Port 443 allows HTTPS protocol means all the information travels
between the server and the browser remains encrypted.

+ HTTP is now becoming obsolete as almost all browsers have moved to HTTPS due to security
reasons. Google has started “HTTPS Everywhere” to boost online security over the web.

+ Attackers can easily sniff ongoing communication on port 80 while it is hard to sniff the
information on port 443.

+ Port 80 came into force in 1991 and published in the HTTP 0.9 document while HTTPS was
published in 1994 RFC 1700.

+ Users will face browser warning if they access the HTTP webpage, while HTTPS enabled
webpage will not give any warning to users.

8.OSI model

The Open Systems Interconnection (OSI) model describes seven layers that computer systems
use to communicate over a network. It was the first standard model for network communications,
adopted by all major computer and telecommunication companies in the early 1980s

The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the OSI 7-
layer model is still widely used, as it helps visualize and communicate how networks operate,
and helps isolate and troubleshoot networking problems.

19
OSI was introduced in 1983 by representatives of the major computer and telecom companies,
and was adopted by ISO as an international standard in 1984.

OSI Model Explained: The OSI 7 Layers

We’ll describe OSI layers “top down” from the application layer that directly serves the end user,
down to the physical layer.

Application Layer

The application layer is used by end-user software such as web browsers and email clients. It
provides protocols that allow software to send and receive information and present meaningful
data to users. A few examples of application layer protocols are the Hypertext Transfer
Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol (POP), Simple Mail
Transfer Protocol (SMTP), and Domain Name System (DNS).

Presentation Layer

The presentation layer prepares data for the application layer. It defines how two devices should
encode, encrypt, and compress data so it is received correctly on the other end. The presentation

20
layer takes any data transmitted by the application layer and prepares it for transmission over the
session layer.

Session Layer

The session layer creates communication channels, called sessions, between devices. It is
responsible for opening sessions, ensuring they remain open and functional while data is being
transferred, and closing them when communication ends. The session layer can also set
checkpoints during a data transfer—if the session is interrupted, devices can resume data transfer
from the last checkpoint.

Transport Layer

The transport layer takes data transferred in the session layer and breaks it into “segments” on
the transmitting end. It is responsible for reassembling the segments on the receiving end,
turning it back into data that can be used by the session layer. The transport layer carries out flow
control, sending data at a rate that matches the connection speed of the receiving device, and
error control, checking if data was received incorrectly and if not, requesting it again.

Network Layer

The network layer has two main functions. One is breaking up segments into network packets,
and reassembling the packets on the receiving end. The other is routing packets by discovering
the best path across a physical network. The network layer uses network addresses (typically
Internet Protocol addresses) to route packets to a destination node.

Data Link Layer

The data link layer establishes and terminates a connection between two physically-connected
nodes on a network. It breaks up packets into frames and sends them from source to destination.
This layer is composed of two parts—Logical Link Control (LLC), which identifies network
protocols, performs error checking and synchronizes frames, and Media Access Control (MAC)
which uses MAC addresses to connect devices and define permissions to transmit and receive
data.

Physical Layer

21
The physical layer is responsible for the physical cable or wireless connection between network
nodes. It defines the connector, the electrical cable or wireless technology connecting the devices,
and is responsible for transmission of the raw data, which is simply a series of 0s and 1s, while
taking care of bit rate control.

Advantages of OSI Model

The OSI model helps users and operators of computer networks:

- Determine the required hardware and software to build their network.

- Understand and communicate the process followed by components communicating across a


network.

- Perform troubleshooting, by identifying which network layer is causing an issue and focusing
efforts on that layer.

The OSI model helps network device manufacturers and networking software vendors:

- Create devices and software that can communicate with products from any other vendor,
allowing open interoperability

- Define which parts of the network their products should work with.

-Communicate to users at which network layers their product operates – for example, only at the
application layer, or across the stack.

OSI vs TCP/IP Model

22
The Transfer Control Protocol/Internet Protocol (TCP/IP) is older than the OSI model and was
created by the US Department of Defense (DoD). A key difference between the models is that
TCP/IP is simpler, collapsing several OSI layers into one:

- OSI layers 5, 6, 7 are combined into one Application Layer in TCP/IP

- OSI layers 1, 2 are combined into one Network Access Layer in TCP/IP – however TCP/IP
does not take responsibility for sequencing and acknowledgement functions, leaving these to the
underlying transport layer.

II. A discussion of the various benefits and constraints relating to different network types
and standards.

1. PAN(Personal Area Network)

A PAN is a computer network formed around a person. It usually includes a computer, mobile
device, or personal digital assistant. The PAN can be used to establish communication between
these personal devices to connect to digital networks and the internet.

Features of PAN:

23
- It is mainly a network of personal devices equipped in a limited area

- Allows you to handle connectivity between IT devices around a single user.

- PAN includes mobile devices, tablets, and laptops.

- It can be connected wirelessly to the internet called WPAN.

- Devices used for PAN: wireless mouse, keyboard and Bluetooth

Advantages of PAN:

- The PAN network is relatively safe and secure

- It only provides short-range solutions up to 10m

- Strict restrictions in 1 small area

Disadvantages of PAN:

- It may establish a poor connection with other networks in the same radio band

- Limit distance

2.Local Area Network (LAN)

A Local Area Network (LAN) is a group of computers and peripherals connected in a limited
area such as schools, laboratories, homes, and office buildings. It is a widely useful network for
sharing resources such as files, printers, games, and other applications. The simplest type of
LAN is the connection of computers and printers in the home or office. In general, the LAN will
be used as a type of transmission medium.

It is a network consisting of less than 5000 devices connected to several buildings.

Features of LAN:

- It is a private network, so an outside regulator never controls it

- Dynamic LAN network with relatively higher speed compared to other WAN systems.

- There are different types of media access control methods such as system code loops and
ethernet.

Advantages of LAN:

24
- Computer resources such as hard disks, DVD-ROMs, and printers can share the local area
network. This greatly reduces the cost of purchasing hardware.

- You can use the same software over the network instead of buying licensed software for each
client in the network.

- Data of all network users can be stored on a single hard disk of the computer.

- You can easily transfer data and messages across networked computers.

- It will be easy to manage data in a single place, making it more secure.

- Local area network provides the facility to share a single internet connection among all LAN
users.

Disadvantages of LAN:

- The LAN network will save money because of the shared computer resources, but the initial
installation cost of Local Area Networks is quite high.

- The LAN administrator can check the personal data files of every user on the LAN, so it doesn't
provide good privacy.

- Unauthorized users can access important data of the organization in case the LAN
administrator cannot secure the centralized data warehouse.

- Local area networks require constant LAN administration because of problems related to
software setup and hardware failure.

3. Wide Area Network(WAN)

WAN (Wide Area Network) is another important computer network spread over a large
geographical area. A WAN system can be a connection of one LAN connected to another LAN
by telephone lines and radio waves. It is mainly limited to a business or an organization.

Features of WAN:

- Software files will be shared among all users: thus all can access the latest files.

- Any organization can form its globally integrated network using WAN.

Advantages of WAN:

25
- WAN helps you to cover a larger geographical area. Therefore, business offices located at a
distance can easily communicate.

- Contains devices such as mobile phones, laptops, tablets, computers, game consoles, etc.

Disadvantages of WAN:

- Initial setup cost is very high

- It is difficult to maintain the WAN. You need skilled network administrators and technicians.

- There are many errors and because of the wide range the use of different technologies.

- It requires more time to solve problems because of the involvement of many wired and wireless
technologies.

- Provides lower security than other types of networks.

4. Metropolitan Area Network(MAN)

The Metropolitan Area Network (MAN) covers a computer network across an entire city,
university campus, or a small area. This type is larger than LAN.

Features of MAN:

- It mainly includes towns and cities within a maximum range of 50km

- The medium used is mainly optical fiber and cable.

Data rates are suitable for distributed computing applications.

Advantages of MAN:

- It provides fast communication using high-speed service providers, such as fiber optic cable.

- It provides excellent support for wide network size and more access to WANs.

- Dual bus in MAN provides support for data transmission in both directions simultaneously.

- The MAN network mainly covers some areas of the city or the whole city.

Disadvantages of MAN :

- You need an extra cable to establish a connection from the MAN from one place to another

- In the MAN network, making safe from hackers.


26
5.Internet

The Internet is a global, publicly accessible information system consisting of many


interconnected computer networks. This system will transmit information in a packet-switching
fashion based on a standardized internet protocol (IP protocol). This system includes thousands
of small computer networks of businesses, research institutes and universities or of individual
users.

In addition, the concept of the internet is also understood as a global system of computer
networks that are interconnected, through the use of the Internet protocol suite (TCP/IP) to link
devices across the globe. world.

The Internet is considered a "giant network", a bridge between millions of smaller computer
networks around the globe. These networks are connected to each other through terrestrial cables,
underground cables, satellite links, etc.

Origin of the internet

The Internet was invented by the US government's Advanced Research Project Agency (ARPA)
in 1969 with the original name ARPANet. The original goal was to create a network that would
allow university computer users to connect and communicate with each other. In addition, it also
helps to ensure that operations continue despite being attacked by military operations or disasters.

With the current strong development, the internet has become a public facility that allows
hundreds of millions of people around the world to access at the same time. When using the web
you can access a lot of different information. Depending on the browser you use, the appearance
of the website is also different. In new browser versions, it will be possible to display more
"extra components" such as animations, sounds, etc.

Difference between Internet and Network

27
Internet is an indispensable part of modern life today, but there are still quite a few people who
still confuse between Internet and Network. So the information below we will show the
difference between them.

Network is a computer network model consisting of basic components such as computers,


routers, etc. Network will be used to affect the information transmission of computers within a
certain range; They are divided into LAN and WAN.

Internet and Network have the following basic differences:

Internet requires routing while Network is not required Internet requires 2 or more computers to
exchange and communicate Internet uses public IP address, while Network uses private IP
Internet requires server and Network is not required yes. The computer can exist in the case of a
100% virtual machine. The Internet is not affected by geography, you can communicate with
friends in many different countries and continents. Meanwhile, LAN or WAN only exist in a
certain area within a certain range

Hopefully, the above article will help you better understand the concept of internet. If you have
any questions or comments, please comment below the article or contact us for advice.

III. An explanation of the impact different network topologies has on communication


and bandwidth requirements.

28
1. Bandwidth Requirements

Data is to available bandwidth as water is to the size of the pipe.

In other words, as the bandwidth increases so does the amount of data that can flow through in a
given amount of time, just like as the diameter of the pipe increases, so does the amount of water
that can flow through during a period.

Bandwidth is measured as the amount of data that can be transferred from one point to another
within a network in a specific amount of time. Typically, bandwidth is expressed as a bitrate
and measured in bits per second (bps). The term bandwidth refers to the transmission capacity
of a connection and is an important factor when determining the quality and speed of a network
or the internet connection.

Kilobit = 1.000 bits

Megabit = 1,000 kilo = 1.000.000 bits

Gigabit = 1.000 mega = 1.000.000.000 bits

Terabit = 1.000 giga = 1.000.000.000.000 bits

For example, if a speed test identifies my download speed as 7.85 Mbps, it means that given no
interruptions or other bandwidth-hogging applications, I could download a 7.85 megabit (or 0.98
megabytes) file in one second. A little math would tell you that at this allowed bandwidth, I
could download about 60 MB of information in one minute, or 3,528 MB in an hour, which is
equivalent to a 3.5 GB file...pretty close to a full-length, DVD-quality movie.

So, while I could theoretically download a 3.5 GB video file in an hour if someone else on my
network tries to download a similar file at the same time, it would now take two hours to
complete the download because, again, the network only permits x amount of data to be
downloaded at any given time, so it now must allow the other download to use some of that
bandwidth, too.

Technically, the network would now see 3.5 GB + 3.5 GB, for 7 GB of total data that needs to be
downloaded. The bandwidth capacity doesn't change because that's a level you pay your ISP for,
so the same concept applies: a 7.85 Mbps network is going to now take two hours to download
the 7 GB file just like it would take just one hour to download half that amount.

The Difference in Mbps and MBps

29
It's important to understand that bandwidth can be expressed in any unit (bytes, kilobytes,
megabytes, gigabits, etc.). Your ISP might use one term, a testing service another, and a video
streaming service yet another. You'll need to understand how these terms are all related and how
to convert between them if you want to avoid paying for too much internet service or, maybe
worse, ordering too little for what you want to do with it.

For example, 15 MBs is not the same as 15 Mbs. The first reads as 15 mega BYTES while the
second is 15 megaBITS. These two values are different by a factor of 8 since there are 8 bits in a
byte.

If these two bandwidth readings were written in megabytes (MB), they'd be 15 MBs and 1.875
MBs (since 15/8 is 1.875). However, when written in megabits (Mb), the first would be 120 Mbs
(15x8 is 120) and the second 15 Mbps.

Bandwidth Control

Some software lets you limit the amount of bandwidth that the program is allowed to use, which
is helpful if you still want the program to function but it doesn't necessarily need to be running at
full speed. This intentional bandwidth limitation is often called bandwidth control.

Some download managers, like Free Download Manager, for example, support bandwidth
control, as do numerous online backup services, cloud storage services, torrenting programs, and
routers. These are all services and programs that tend to deal with massive amounts of bandwidth,
so it makes sense to have options that limit their access.

Screenshot of the Free Download Manager download priority option

As an example, say you want to download a really large 10 GB file. Instead of having it
download for hours, sucking away all the available bandwidth, you could use a download
manager and instruct the program to limit the download to use only 10 percent of the available
bandwidth.

This would, of course, drastically add time to the total download time but it would also free up a
lot more bandwidth for other tisensitive activities like live video streams.

Something similar to bandwidth control is bandwidth throttling. This is also a deliberate


bandwidth control that's sometimes set by internet service providers to either limit certain types
of traffic (like Netflix streaming or file sharing) or to limit all traffic during particular periods
during the day to reduce congestion.
30
Network performance is determined by more than just how much bandwidth you have available.
There are also factors like latency, jitter, and packet loss that could be contributing to less-than-
desirable performance in any given network. Some other elements at play that can cause sluggish
internet include old hardware, viruses, browser add-ons, and a weak Wi-Fi connection.

2. Topologies

a. Bus Topology
Bus topology is the kind of network topology where every node, i.e. every device on the network,
is connected to a solo main cable line. Data is transmitted in a single route, from one point to the
other. We cannot transmit data in both ways. When this topology has precisely two endpoints, it
is known as Linear Bus Topology. It is mostly used for small networks.

Benefits of Bus Topology

 It is cost-effective.
 The Cable length required is the least in comparison to other topologies.
 The working of this topology is easy to understand.
 Expansion can be done easily by linking the cables together.

Drawbacks of Bus Topology

 If the main cable collapses, the complete network collapses.


 The network performance is at stake and reduces if there are numerous nodes and heavy
network traffic.
 The main cable can only be so long. The length of the cable is limited.
 Bus Topology is not as fast as Ring Topology.

b. Ring Topology

31
Ring Topology is a topology type in which every computer is connected to another computer on
each side. The last computer is connected to the first, thus forming a ring shape. This topology
allows for each computer to have exactly two neighboring computers.

In this topology, the main computer is known as the monitor station, which is responsible for all
the operations. Data transmission amongst devices is done with the help of tokens. For
transmitting data, the computer station has to hold the token. The token is released only when the
transmission is complete, following which other computer stations can use the token to transmit
data.

Data transmission is done in a sequential method, i.e. bit by bit. Therefore, data has to route its
way through each node in the network to reach the destination node. We use repeaters in a Ring
topology to prevent loss of data during transmission. These repeaters are especially helpful when
the topology has a vast number of nodes, and the data is to reach the very last node in the
network.

The data transmission is unidirectional in a Ring topology, but it can be created to be


bidirectional by connecting each node with another set of connecting lines. This is known as
Dual Ring Topology. Here, two ring networks are created, with the data in each flowing in
opposite directions.

Benefits of Ring Topology

 The network is not affected by numerous nodes or heavy traffic, as only the nodes
possessing tokens can transfer data.
 Ring topology has cheap installation and expansion.
32
Drawbacks of Ring Topology

 It is a tedious task to troubleshoot in a Ring topology.


 It is difficult to add or delete nodes, as it interrupts the network activity.
 If one computer crashes, the entire network activity is disrupted.

c. Star Topology
Star Topology is the kind of network topology in which all the nodes are connected via cables to
a single node called a hub, which is the central node. The hub can be active or passive in nature.
Active hubs contain repeaters, while passive hubs are considered non-intelligent nodes. Each
node contains a reserved connection to the central node, which the central node acts as a repeater
during data transmission.

Benefits of Star Topology

 Star topology boasts fast performance due to low network traffic.


 It is easy to upgrade the Hub as and when required.
 Setup can be done easily and can be easily modified as well.
 Star Topology is easy to troubleshoot.
 In case a node has failed, it can easily be replaced without affecting the working of the
rest of the network.

Drawbacks of Star Topology

 The installation cost is extreme, and it is costly to use.


 All the nodes are dependent on the hub.

33
d. Mesh Topology
Mesh topology is the kind of topology in which all the nodes are connected with all the other
nodes via a network channel. Mesh topology is a point-to-point connection. It has n(n-
1)/2 network channels to connect n nodes.

Mesh topology has two techniques for transmission of data, i.e. routing and flooding. In the
routing technique, the nodes possess a routing logic, like the logic for the shortest distance to the
destination node or the logic to avoid routes with broken connections. In the flooding technique,
all the network nodes receive the same data. This leaves us no need for routing logic. This
technique makes the network robust but results in unwanted load on the network.

Benefits of Mesh Topology

 Every connection has the ability to carry its particular data load.
 Mesh Topology is very robust.
 It is easy to diagnose faults.
 Mesh Topology provides privacy and security.

Drawbacks of Mesh Topology

 Mesh Topology is challenging to install and configure.


 As all the nodes are connected with each other, cabling is costly.
 Bulk wiring is essential.

34
IV. Explore the range of available server types and explain the difference regarding cost
and performance optimisation.

1,Network card

A network card (also called a network adapter, network interface card, or NIC for short) acts as
the interface between a computer and a network cable. The purpose of the network card is to
prepare, send, and control data on the network. In this article we will introduce this component.

A network card usually has two indicator lights (LEDs):

- The green LED shows that the card is receiving electricity.


- The orange (10 Mb/s) or red (100 Mb/s) LED indicates network activity (sending or receiving
data).

How does it work and compatibility

To prepare data to be sent the network card uses a transceiver, which transforms parallel data
into serial data. Each card has a unique address, called a MAC address, assigned by the
manufacturer, which lets it be uniquely identified among all the network cards in the world.

Network cards have settings which can be configured. Among them are hardware interrupts
(IRQ), the I/O address and the memory address (DMA).

To ensure that the computer and network are compatible, the card must be suitable for the
computer's data bus architecture, and have the appropriate type of socket for the cable. Each card
is designed to work with a certain kind of cable. Some cards include multiple interface
35
connectors (which can be configured using jumpers, DIP switches, or software). The most
commonly used are RJ-45 connectors.

2,Router

Routers guide and direct network data, using packets that contain various kinds of data—such as
files, communications, and simple transmissions like web interactions.

The data packets have several layers, or sections, one of which carries identifying information
such as sender, data type, size, and most importantly, the destination IP (Internet protocol)
address. The router reads this layer, prioritizes the data, and chooses the best route to use for
each transmission.

A common tool for modern network computing, routers connect employees to networks, both
local and the Internet, where just about every essential business activity takes place. Without
routers, we wouldn't be able to use the Internet to collaborate, communicate, or gather
information and learn.

Routers can also provide security. Embedded firewall and content filtering software provide an
additional protection from unwanted content and malicious websites without affecting your
online experience.

A router isn't just for data transmission or Internet connections, though. Most routers allow you
to connect hard drives and use them as file-sharing servers, or printers that can then be accessed
by anyone on the network.

3,Modem

36
A modem, which stands for modulator-demodulator, is a network hardware component that
helps your computer and other devices connect to the internet. This device converts digital data
that is understood by a computer into analog data that is transmitted over a cable.

The modems you usually see are most likely cable modems that support DOCSIS (Data Cable
Service Interface Specification), which is used to transmit the internet over hybrid fiber
coax. This way you can get TV, cable internet, digital phone line over the same cable.

With the increasing use of fiber optic connections, modems are becoming increasingly
obsolete. Fiber optic cables can transmit higher bandwidths over longer distances. Since you
require high data transfer rates in your office, you will most likely use a fiber optic
connection. In this case, you won't require the modem to be part of your network.

4,Switch

Switches are an important foundational element of your office network. It is a network device
that allows other devices on the network to communicate and share information. You will have
PCs, printers, NAS devices (network attached storage), servers, VoIP (Voice over Internet
Protocol), … on your network, and switches that connect these devices to the network. your.

37
In your home, you don't see a switch because the wireless router you use is a combination of a
wireless router, an access point, and a switch. We will talk about access points in the following
section. So it can be a bit confusing if you compare your home network with your office
network. You just need to remember that the function of a switch is different from that of a
router, it connects different networks together. For most businesses, a router connects your
network to the internet. While the switch connects different devices in your network.

5. firewall

A firewall is a security system for your computer network. It monitors and controls incoming
and outgoing network traffic based on security rules set up by you. In other words, a firewall is a
filter, between your internal network and an external network, such as the internet, that protects
your business network from unauthorized outside access.

38
Even though the computer has a built-in software firewall, your business is not secure with that
fragile safety net. Network infrastructure devices are a typical target for cyber attackers, and
without a dedicated firewall, your network and all connected devices are vulnerable to hackers.

Dedicated hardware firewalls provide your network with a much-needed extra layer of
protection. Hardware Firewall comes with advanced features like VPN, Remote Access, and
Advanced Web Filtering. It is similar to a router in that it can handle a limited number of
users. Therefore, make sure to get a firewall with enough capacity for future growth.

A commercial-grade router usually comes with built-in firewall capabilities, so you may not
need to purchase separate firewall hardware. Just make sure you double check this as it is very
important for your network security.

6. PATCH Cable, PATCH CORD, LAN Cable

A solid basic wired network helps ensure a fast wireless network. Your cable is responsible for
providing enough bandwidth to your access points, otherwise your WiFi network will become
sluggish. Therefore, using recent cabling standards like CAT6 for your LAN wiring would be a
good investment. This also allows you to connect certain devices like printers, IP cameras, etc. to
39
a wired network, thus freeing up spectrum from wireless dependent devices like laptops and
mobile devices. motion. There are also plans to run two cables per wireless access point as
current and future standards will require additional wired bandwidth.

B. PART 2: Practical part

I. Requirement of Company

- Gold Star is a start-up company with less than 100 people divided into departments: General
Manager, Administration, IT Operations, Software Engineers, HR.

- Each room need to have a private network, have servers for storing information, running mail,
DNS, DHCP services and need to access outside the internet.

II. Structure chart

40
Devices used in this model:

- 5 Switches

- 2 Routers

- 6 PCs

- 1 DHCP Server

- 1 DNS Server

- 1 Mail Server

- 1 Web Serve

III.Setup

- Basic setup:

+ Router>

+ Router>enable

+ Router#

+ Router#conf t

- Console password:

+ R1(config)#line con 0

41
+ R1(config-line)#password cisco

+ R1(config-line)#login

+ R1(config-line)#exit

+ R1(config)#interface g0/0

+ R1(config-if)#ip add 192.168.6.1 255.255.255.0

+ R1(config-if)#no sh

+ R1(config-if)#exit

+ R1(config)#interface g0/1

+ R1(config-if)#ip add 192.168.5.1 255.255.255.0

+ R1(config-if)#no sh

+ R1(config-if)#exit

+ R1(config)#interface G0/2

+ R1(config-if)#ip add 192.168.4.2 255.255.255.0

+ R1(config-if)#no sh

+ R1(config-if)#exit

42
+ R2(config)#interface g0/0

+ R2(config-if)#ip add 192.168.4.2 255.255.255.0

+ R2(config-if)#no sh

+ R2(config-if)#exit

+ R2(config)#interface g0/1

+ R2(config-if)#ip add 192.168.1.1 255.255.255.0

+ R2(config-if)#no sh

+ R2(config-if)#exit

+ R2(config)#interface G0/2

+ R2(config-if)#ip add 192.168.2.1 255.255.255.0

+ R2(config-if)#no sh

+ R2(config-if)#exit

43
+ R2(config)#interface G0/2

+ R2(config-if)#ip add 192.168.3.1 255.255.255.0

+ R2(config-if)#no sh

+ R2(config-if)#exit

Reference

https://www.educba.com/types-of-network-topology/

https://www.lifewire.com/what-is-bandwidth-2625809

https://ting3s.com/post/cac-loai-mang-may-tinh-lan-man-wan-vpn-830

https://www.lifewire.com/hypertext-transfer-protocol-817944

https://www.cloudflare.com/learning/network-layer/internet-protocol/

https://www.geeksforgeeks.org/what-is-transmission-control-protocol-tcp/

https://www.imperva.com/learn/application-security/osi-model/

44

You might also like