Bài tập 1 môn mạng (1619) Đại học Greenwich năm 2021, tiêu chuẩn Pass. Có các trích dẫn tiêu chuẩn của harvard, nguồn học thuật từ học giả google scholar, books. P1 Discuss the benefits and constraints of different network types and standards, P2 Explain the impact of network topology, communication and bandwidth requirements, P3 Discuss the operating principles of networking devices and server types, P4 Discuss the interdependence of workstation hardware with relevant networking software. Note: Nếu muốn support C, C#, Networking, Database, project web, 1633, security_zalo 0962.986.805 or fb https://www.facebook.com/profile.php?id=100080073517431
Trang 1ASSIGNMENT 1 FRONT SHEETQualification BTEC Level 5 HND Diploma in Computing
Unit number and title Unit 2: Networking Infrastructure
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism I understand thatmaking a false declaration is a form of malpractice002E
Student’s signature Grading grid
Trang 3Introduction 1
P1 Discuss the benefits and constraints of different network types and standards 2
1 Type of networks. 2
1.1 LAN. 2
1.2 MAN 3
1.3 WAN 4
2 Protocols: 5
Network standards: 5
Networking Standards Organizations: Around the world, to set standards for the Internet, many organizations have emerged. 9
P2 Explain the impact of network topology, communication and bandwidth requirements. 9
1 Network Topology 9
2 Communication and bandwidth requirements: 17
P3 Discuss the operating principles of networking devices and server types. 18
1 Network devices. 18
2 Server types 21
P4 Discuss the inter-dependence of workstation hardware with relevant networking software 24 1 Workstation hardware 24
2 Networking Software 25
3 Interdependence between workstation hardware and networking software 25
Conclusion 26
Reference list 27
Trang 4Figure 9: Physical topology
Figure 10: Bus topology
Figure 11: Ring topology
Figure 12: Start topology
Figure 13: Tree topology
Figure 14: Mesh topology (Singh and Ramola, 2014)
Figure 15: Star-Ring topology (Hybrid)
Figure 16: (a) is Simplex, (b) is Half-duplex, (c) is Full-duplex
Figure 17: Bandwidth Figure 18: Repeater
Figure 19: Operating principles of a Hub
Figure 20: Switch
Figure 21: MAC address and Port
Figure 22: 3 layers of Router in the OSI
Figure 23: Gateway
Figure 24: Web Server
Figure 25: Operating principles of Email Server
Figure 26: DNS server and operating principles
Figure 27: DHCP Server and operating principles
Figure 28: Workstation
Figure 29: Illustration of networking software
4.1
Trang 5List of Table
Table 1: Advantage and disadvantage of TCP/IP
Table 2: Compare Physical topology and Logical topology
Table 3: Advantages and Disadvantages of Bus
Table 4: Advantages and Disadvantages of Ring
Table 5: Advantages and Disadvantages of Star
Table 6: Advantages and Disadvantages of Tree
Table 7: Advantages and Disadvantages of Mesh
Table 8: Table: Advantages and Disadvantages of Hybrid
5.1
Trang 6Currently, the network is a common utility in life It has a long history of developmentwith diverse models and complex modes of operation In this assignment, the benefitsand limitations of network types will be discussed, the concepts of network types,protocols, and network standards will also be introduced and analyzed The impact ofnetwork topology will be explained in the next section Here, the concepts, how thenetwork topology works is the main issue, in addition, communication and bandwidthare also explored Part three, the operating principles of network equipment andservers is an important issue Common network devices and some types of Server will
be introduced to the concept and how it works The last part will be discussed with themain issue being the interdependence of workstation hardware with network software.They will be introduced and analyze the dependence of these two factors
Trang 7P1 Discuss the benefits and constraints of different network types and standards
Currently, the network has grown and popularized globally It is estimated that thereare about 5 billion people using it, which is a huge number It shows the benefits ofnetworking, we have many devices that can connect to the network: PC, laptop,mobile phone, etc These are called terminals or servers (Kurose and Ross, 2017)
of computers that are connected to the
internet Servers are typically not used
by humans directly, but instead run in
the background to provide "services" to
other computers (and their users) on the
network Workstations are so named
because they are frequently used by
users to interact with the network A
workstation was once thought to be a
desktop computer that included a
computer, keyboard, monitor, and
mouse (Winkelman,2013)
Figure 1: Local area networkThe nature of a LAN is determined by three factors:
Topology: Includes Bus, Tree, Ring, Start, etc.
Medium Access control (MAC): MAC depends on 2 key parameters, they are Where
and How (Pavani, Chandrika and Krishna, 2012) Whether control is centralized ordistributed is referred to as Where The topology determines How, which is a trade-offbetween conflicting criteria such as cost, performance, and complexity
Transmission Media: Twisted pair, coax, and fiber optic are the most commonly used
types today
Advantages: It has the basic benefits of sharing resources, sharing application
software, increasing productivity (Pavani, Chandrika and Krishna, 2012)
Resource sharing: With network peripherals such as computers, printers are shared withworkstations with no hardware requirements This helps businesses reduce costs and atthe same time improve productivity at work Standard computer hardware is used
Trang 8for workstations as well as network servers This gives you flexible, easy-to-maintaindesigns that are efficient Common applications are in transit time for users to variousenvironments The benefit of this is lower costs than the possibility of independentlicensing The LAN system allows centralized data storage, providing the ability toshare data from a single server system LAN also helps us to support some faulttolerance features It is this that has improved the reliability of users with LAN more Italso reduces downtime for businesses The LAN system also provides users with acentralized security, allowing control access to their network systems and resources.Depending on user requirements, there are separate data protection policies Inaddition, the cost of the low conductors also saves money.
Disadvantages: The biggest disadvantage of this network is that the transmission line is
short, can only operate in a certain area, cannot apply the range of kilometers or more.Privacy Violations: Each LAN user's personal data files are visible and accessible to theLAN administrator In addition, he has access to the LAN user's computer and internetactivity Data Security Threat also is an important problem Maintenance or repair is alsovery complicated because it requires an administrator of the LAN
1.2 MAN
As LAN networks are proving more and more effective, users require a network withgreater network speed and range to overcome the disadvantages of LAN MANnetwork has appeared, it is applied the advancement of fiber optic technology toimprove transmission speed (Conti, Gregori and Lenzini, 1997) It’s is a combination ofmultiple LANs The scope of a MAN can cover an entire province/city and the wholecountry Alternatively, a large university or company can have such a large networkthat it can be classified as a MAN And MAN networks often exist to provideconnectivity for large corporations
Figure 2: MAN
Trang 9Advantages: Service integration is the most prominent feature of MAN networks
(Conti, Gregori and Lenzini, 1997) Low cost package transportation service isprovided with many different types of traffic, as diverse as calls, videos, etc Thefacilities are high enough and not too expensive to ensure the quality of the service.The ability to connect at high speeds is also a great aspect of this network The speedcan be up to 100-155 Mpbs and a large range of 100km, which can serve thedirection, state administrative management, information exchange, provision of publicadministrative services, and commercial development e-commerce, etc
Disadvantages: Having an average bandwidth to run applications, e-commerce
services, applications in the banking system The wide range of connectivity is also adifficulty of this network The issue of information security is also difficult because of itslarge scope Along with that is the high cost to build transmission facilities andfacilities Compared to LAN, the administration of MAN is also much more complicatedbecause it is basically the aggregation of many LANs
1.3 WAN
Individual protocols were split into distinct,
"traffic-based" networks in most
multi-protocol network settings before to 1980
These networks are wasteful in terms of
bandwidth use and inflexible in terms of
their ability to be changed in response to
changing end-system needs The WAN
was created to connect all of the networks,
it is the premise of the Internet (Cole and
Ramaswamy, 1999)
The main protocol used in WAN is
TCP/IP protocol The connection line of
the WAN network has a bandwidth that
varies according to each installation
location For example, if installed in a
particular area or in a country, the
bandwidth of the transmission line varies
greatly from 56Kbps to T1 with 1,544
Mbps or E1 with 2,048 Mbps, … and to
Gigabit-Gbps, it is the backbone
connecting countries or continents
Figure 3: WAN
Advantages: Scope of connection: Can both connect into a private network and can
create large connections, covering an entire country or globally, this is the biggest
Trang 10advantage of WAN that other networks do not have, it helps the entire country to belinked together with the ability to transmit a very wide and unlimited connection signal.The ability to control user access of this network is also appreciated, IP is often used
in this Good security: it's what everyone wants While this is not perfect, it is betterthan other networks Easy and fast information sharing: We use the same "bigsystem", with a large scale, information and knowledge are shared quickly andeffectively We can call it the common human brain
Disadvantages: Security: Wide area networks are more vulnerable to security threats
than LANs and MANs One of the most significant drawbacks of WANs is security, asvarious persons can access data from other machines Viruses are a major contributorsince they are simple to propagate and infect the user's device High setup costs:Initially, setting up a WAN that covers a broad geographic region is costly It mightinclude the acquisition of routers, switches, and additional security software, amongother things Troubleshooting: A WAN spans such a vast geographical region, networktroubleshooting is a challenging task The majority of WAN wires are in the water, and
if they are broken, the network would be disrupted Repairing the underwater pipes willtake a lot of effort WAN maintenance: It is a full-time task that needs significanttechnical expertise on the part of network supervisors and technicians after it is set up
2 Protocols:
A set of standards for exchanging information between two computer systems or twocomputer devices is called a protocol Protocols are the rules or standards that governcommunication (Blank,2002) The main components of a protocol include: data format,encryption method and signal
levels
The main purpose of the
protocol is to communicate
between machines, in addition it
has several functions such as:
Encapsulation, Segmentation
and Aggregation, Link Control,
Monitoring, Flow Control, Error
Trang 11TCP/IP: Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of
communication protocols that are used to link network devices on the internet TCP/IPdefines how data is exchanged over the internet by defining how packets are split up,addressed, sent, routed, received at the destination (Kurose and Ross, 2017)
IP regulates how each packet is addressed and routed to ensure that it reaches itsintended destination A computer or other network device uses the subnet mask todetermine which portion of an IP address represents the network and which partrepresents hosts or other computers on the network
Figure 5: TCP/IPCommon TCP/IP protocols include: Hypertext Transfer Protocol (HTTP), HTTPSecure, Protocol TCP/IP functionality is divided into four layers, each of whichincludes specific protocols: Application, Transport, network, and physical layers
It aids in the establishment of It's difficult to set up and manage; the
connections between computers, transport layer doesn't guaranteeoperates independently of the operating packet delivery; it's difficult to replace
system, supports different routing protocols in TCP/IP; it doesn't clearly
protocols, has a highly scalable client- separate service, interface, andserver architecture, is small, and does protocol; it's not appropriate for
not cause the network or computer to be describing new technology in new
overworked networks; and it's particularly vulnerable
to synchronization attacks
Table 1: Advantage and disadvantage of TCP/IP
Trang 12OSI: The network architecture in the OSI model is characterized as a hierarchy of
independent layers comprising modules that execute specific functions This translates
to a set of guidelines that specify how network nodes must interact in order tocommunicate and share data In today's sophisticated computer systems, the OSImodel specifies the conventional connections between hardware and software(Burgess, 2004)
This model has 7 layers: Application, presentation, session, transport, network control,data link, physical
Figure 6: 7 layers of OSI (https://www.bmc.com/blogs/osi-model-7-layers/)
A Layer 2 device, for example, or a Layer 3 device, are terms used to describe
network devices The OSI layer on which the device functions are described below In general, the higher up on the network layer a device works, the more complicated it is
HTTP: At the heart of the Web is the Hypertext Transfer Protocol (HTTP), the Web's
application layer protocol (Kurose and Ross, 2017) These two programs are executed
on different system terminals, communicating with each other by exchanging HTTPmessages The structure of these messages and how the client and server exchangemessages are determined by HTTP HTTP operates at layer 7 (Application) of the OSImodel
A base HTML file and some referenced objects appear on most Web pages (Kuroseand Ross, 2017) The URLs of the other items on the page are referenced in the basicHTML file Each URL contains two parts: the hostname of the server hosting the itemand the path name of the object
Trang 13Figure 7: URL of a web
Advantage and benefit: HTTP Connection is Intermittent: HTTP Connection is
Intermittent The typical procedure for handling and responding to HTTP requests is asfollows: the Client initiates the request, the Client disconnects from the Server to await aresponse, the Server processes the request, the Server reconnects to the Client anddelivers the response Independence is the second fundamental characteristic of HTTP.You can transfer any form of data via HTTP as long as the contents of the data are underthe control of both the machine and the client HTTP is stateless: The third property ofHTTP is that it is connectionless The server and client only know each other for theduration of the current request; they will quickly forget each other Furthermore, both theclient and the server may keep track of requests for web pages Absolute security: Thewebsite's data is protected by encryption Hackers cannot access and steal website data.This creates absolute safety and security for the website
DNS: A distributed database is the Domain Name System (DNS) This enables for
local control of the segments of the overall database, but data in each segment isaccessible across the network via a client server scheme (Liu, Albitz and Loukides,1998) Like HTTP, DNS also operates at layer 7 (Application) of the OSI model
DNS functions as an "interpreter" and "communicator." DNS will translate the domainname into an IP address, which is made up of four sets of digits
When "translate," the browser will recognize you and you can log in When users join
in to a website, instead of having to memorize and type in a sequence of IPaddresses, they may simply type in the website's name, which the browser will identifyautomatically
A unique IP address is assigned to each computer connected to the Internet To begin aconnection, this IP address is used to create a connection between the server and theclient When you visit a random website or send an email, DNS plays a critical role
Nobody will be able to recall every sequence of IP address in each login from theworld's numerous websites As a result, the notion of domain names was created,which allowed each website to be identified by a distinct name
Trang 14Figure 8: DNS
Benefits: DNS helps users save a lot of time when accessing previously visitedwebsites by remembering the domain names that have been "translated" andprioritizing use for next visits Users may utilize DNS to access a variety of networkservices, including searching for information, viewing movies, playing games, andlogin onto websites Without it, users would be unable to access the Internet as swiftlyand simply as they can now
Networking Standards Organizations: Around the world, to set standards for the
Internet, many organizations have emerged
ISO: The ISO (International Organization for Standardization), based in Geneva,
Switzerland, is a collection of 157 nations' standards bodies Their objective is todevelop international technical standards that will allow for the free flow of informationand trade throughout the world (StudyMoose,2016)
ISOC: The Internet Society (ISOC) is a professional membership organization that
assists in the development of internet technological standards With the internet's fastexpansion, they are concerned about maintaining accessibility, information security,and the stability of addressing services and open standards throughout the internet.They are made up of thousands of online workers and businesses from 90 chaptersthroughout the world (StudyMoose,2016)
Trang 15The word “topology” in a communication network refers to the method in which the
network's end points, or stations, are connected (Singh and Ramola, 2014) It has 2 types: Physical and Logical topology
Physical topology: The hardware
connected with the system, such as
workstations, remote terminals, servers,
and the related wiring between assets, is
referred to as Physical Network Topology
The physical topology of the systems
determines how they are physically
connected (Singh and Ramola, 2014)
The shape of the cabling layout used to
link devices is called the physical
topology of the network This refers to the
layout of cabling, the locations of nodes,
and the interconnections between the
nodes and the cabling
Figure 9: Physical topology
Logical topology: The depiction of data flow between nodes is important to logical
network topology The primary function of logical topology is to allow various systems
to communicate across physical topologies (Singh and Ramola, 2014)
Figure 9: Logical topologyShared media topology and token-based topology are the two types of logicaltopologies
Trang 16Physical topology Logical topology
The network's physical configuration is The logistics of a network concerned
with data transmission are depicted
depicted
The layout may be changed to suit your There isn't any interfering or
manipulating going on here
needs
It's possible to organize it in a star, ring, It may be found in both bus and ring
topologies
mesh, or bus topology
Based on device selection and This has a significant influence on data
packet delivery and speed It alsoavailability, this has a significant
controls data flow and ensures that datainfluence on network cost, scalability,
packets are delivered in a timelyand bandwidth capacity
manner
It is the transmission path in its true It's a simplified depiction of data flow.
form
The network's physical link The network's data route was followed.
Table 2: Compare Physical topology and Logical topology
16.1
I will analyze some common network topologies:
Bus: The sent message is carried over the cable via the bus topology As the
message arrives at each device (node), it is checked to determine if the message'sdestination address matches its own (Singh and Ramola, 2014) In this architecture, asingle network cable runs throughout the
building or campus, and all nodes
are connected to it through two
ends known as the bus
For the bus, all stations are
connected to the linear
transmission medium or bus via
appropriate hardware interfaces
called TAP (Pavani, Chandrika
and Krishna, 2012) Full-duplex
operation (sending and receiving
between the station and the tap
allows data to be transmitted onto
the bus and retrieved from the
bus To eliminate reflection, there
is a terminator at each end of the
bus.
Figure 10: Bus topology
Trang 17Advantages DisadvantagesGreat reliability, easy to use and
This type of connection has a slowunderstand
speed, especially when there is aThe number of wires to connect is problem on the cable line, the whole
small, simple system immediately stops working
Moreover, when there is a problem, it isEasy setup also difficult to find the error that causes
network congestion when transferring
A repeater can also be used to large amounts of data
extend the bus configuration
Table 3: Advantages and Disadvantages of Bus
Ring: All messages go in the same way across a ring in a ring topology, and there is a
direct point-to-point link between two nearby nodes (the Next and the Previous) (Singhand Ramola, 2014)
These links are one-way, they
ensure that a node's path will go
through the entire ring and back
to the node Faulty nodes can be
detached from the rest of the ring
When the workstation is turned
on, it will automatically join the
circle It disconnects from the ring
when turned off, allowing
information to pass through the
node The token ring
is the most frequent
implementation of this topology
The entire network will be down
by a single error in the ring The
individual nodes in the ring can
be separated by themselves
Figure 11: Ring topology