1. Trang chủ
  2. » Luận Văn - Báo Cáo

Assignment 1 networking 1619 greenwich

35 246 4
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 35
Dung lượng 1,28 MB
File đính kèm Assignment1_Networking_1619_Greenwich.rar (869 KB)

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Bài tập 1 môn mạng (1619) Đại học Greenwich năm 2021, tiêu chuẩn Pass. Có các trích dẫn tiêu chuẩn của harvard, nguồn học thuật từ học giả google scholar, books. P1 Discuss the benefits and constraints of different network types and standards, P2 Explain the impact of network topology, communication and bandwidth requirements, P3 Discuss the operating principles of networking devices and server types, P4 Discuss the interdependence of workstation hardware with relevant networking software. Note: Nếu muốn support C, C#, Networking, Database, project web, 1633, security_zalo 0962.986.805 or fb https://www.facebook.com/profile.php?id=100080073517431

Trang 1

ASSIGNMENT 1 FRONT SHEETQualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking Infrastructure

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism I understand thatmaking a false declaration is a form of malpractice002E

Student’s signature Grading grid

Trang 3

Introduction 1

P1 Discuss the benefits and constraints of different network types and standards 2

1 Type of networks. 2

1.1 LAN. 2

1.2 MAN 3

1.3 WAN 4

2 Protocols: 5

Network standards: 5

Networking Standards Organizations: Around the world, to set standards for the Internet, many organizations have emerged. 9

P2 Explain the impact of network topology, communication and bandwidth requirements. 9

1 Network Topology 9

2 Communication and bandwidth requirements: 17

P3 Discuss the operating principles of networking devices and server types. 18

1 Network devices. 18

2 Server types 21

P4 Discuss the inter-dependence of workstation hardware with relevant networking software 24 1 Workstation hardware 24

2 Networking Software 25

3 Interdependence between workstation hardware and networking software 25

Conclusion 26

Reference list 27

Trang 4

Figure 9: Physical topology

Figure 10: Bus topology

Figure 11: Ring topology

Figure 12: Start topology

Figure 13: Tree topology

Figure 14: Mesh topology (Singh and Ramola, 2014)

Figure 15: Star-Ring topology (Hybrid)

Figure 16: (a) is Simplex, (b) is Half-duplex, (c) is Full-duplex

Figure 17: Bandwidth Figure 18: Repeater

Figure 19: Operating principles of a Hub

Figure 20: Switch

Figure 21: MAC address and Port

Figure 22: 3 layers of Router in the OSI

Figure 23: Gateway

Figure 24: Web Server

Figure 25: Operating principles of Email Server

Figure 26: DNS server and operating principles

Figure 27: DHCP Server and operating principles

Figure 28: Workstation

Figure 29: Illustration of networking software

4.1

Trang 5

List of Table

Table 1: Advantage and disadvantage of TCP/IP

Table 2: Compare Physical topology and Logical topology

Table 3: Advantages and Disadvantages of Bus

Table 4: Advantages and Disadvantages of Ring

Table 5: Advantages and Disadvantages of Star

Table 6: Advantages and Disadvantages of Tree

Table 7: Advantages and Disadvantages of Mesh

Table 8: Table: Advantages and Disadvantages of Hybrid

5.1

Trang 6

Currently, the network is a common utility in life It has a long history of developmentwith diverse models and complex modes of operation In this assignment, the benefitsand limitations of network types will be discussed, the concepts of network types,protocols, and network standards will also be introduced and analyzed The impact ofnetwork topology will be explained in the next section Here, the concepts, how thenetwork topology works is the main issue, in addition, communication and bandwidthare also explored Part three, the operating principles of network equipment andservers is an important issue Common network devices and some types of Server will

be introduced to the concept and how it works The last part will be discussed with themain issue being the interdependence of workstation hardware with network software.They will be introduced and analyze the dependence of these two factors

Trang 7

P1 Discuss the benefits and constraints of different network types and standards

Currently, the network has grown and popularized globally It is estimated that thereare about 5 billion people using it, which is a huge number It shows the benefits ofnetworking, we have many devices that can connect to the network: PC, laptop,mobile phone, etc These are called terminals or servers (Kurose and Ross, 2017)

of computers that are connected to the

internet Servers are typically not used

by humans directly, but instead run in

the background to provide "services" to

other computers (and their users) on the

network Workstations are so named

because they are frequently used by

users to interact with the network A

workstation was once thought to be a

desktop computer that included a

computer, keyboard, monitor, and

mouse (Winkelman,2013)

Figure 1: Local area networkThe nature of a LAN is determined by three factors:

Topology: Includes Bus, Tree, Ring, Start, etc.

Medium Access control (MAC): MAC depends on 2 key parameters, they are Where

and How (Pavani, Chandrika and Krishna, 2012) Whether control is centralized ordistributed is referred to as Where The topology determines How, which is a trade-offbetween conflicting criteria such as cost, performance, and complexity

Transmission Media: Twisted pair, coax, and fiber optic are the most commonly used

types today

Advantages: It has the basic benefits of sharing resources, sharing application

software, increasing productivity (Pavani, Chandrika and Krishna, 2012)

Resource sharing: With network peripherals such as computers, printers are shared withworkstations with no hardware requirements This helps businesses reduce costs and atthe same time improve productivity at work Standard computer hardware is used

Trang 8

for workstations as well as network servers This gives you flexible, easy-to-maintaindesigns that are efficient Common applications are in transit time for users to variousenvironments The benefit of this is lower costs than the possibility of independentlicensing The LAN system allows centralized data storage, providing the ability toshare data from a single server system LAN also helps us to support some faulttolerance features It is this that has improved the reliability of users with LAN more Italso reduces downtime for businesses The LAN system also provides users with acentralized security, allowing control access to their network systems and resources.Depending on user requirements, there are separate data protection policies Inaddition, the cost of the low conductors also saves money.

Disadvantages: The biggest disadvantage of this network is that the transmission line is

short, can only operate in a certain area, cannot apply the range of kilometers or more.Privacy Violations: Each LAN user's personal data files are visible and accessible to theLAN administrator In addition, he has access to the LAN user's computer and internetactivity Data Security Threat also is an important problem Maintenance or repair is alsovery complicated because it requires an administrator of the LAN

1.2 MAN

As LAN networks are proving more and more effective, users require a network withgreater network speed and range to overcome the disadvantages of LAN MANnetwork has appeared, it is applied the advancement of fiber optic technology toimprove transmission speed (Conti, Gregori and Lenzini, 1997) It’s is a combination ofmultiple LANs The scope of a MAN can cover an entire province/city and the wholecountry Alternatively, a large university or company can have such a large networkthat it can be classified as a MAN And MAN networks often exist to provideconnectivity for large corporations

Figure 2: MAN

Trang 9

Advantages: Service integration is the most prominent feature of MAN networks

(Conti, Gregori and Lenzini, 1997) Low cost package transportation service isprovided with many different types of traffic, as diverse as calls, videos, etc Thefacilities are high enough and not too expensive to ensure the quality of the service.The ability to connect at high speeds is also a great aspect of this network The speedcan be up to 100-155 Mpbs and a large range of 100km, which can serve thedirection, state administrative management, information exchange, provision of publicadministrative services, and commercial development e-commerce, etc

Disadvantages: Having an average bandwidth to run applications, e-commerce

services, applications in the banking system The wide range of connectivity is also adifficulty of this network The issue of information security is also difficult because of itslarge scope Along with that is the high cost to build transmission facilities andfacilities Compared to LAN, the administration of MAN is also much more complicatedbecause it is basically the aggregation of many LANs

1.3 WAN

Individual protocols were split into distinct,

"traffic-based" networks in most

multi-protocol network settings before to 1980

These networks are wasteful in terms of

bandwidth use and inflexible in terms of

their ability to be changed in response to

changing end-system needs The WAN

was created to connect all of the networks,

it is the premise of the Internet (Cole and

Ramaswamy, 1999)

The main protocol used in WAN is

TCP/IP protocol The connection line of

the WAN network has a bandwidth that

varies according to each installation

location For example, if installed in a

particular area or in a country, the

bandwidth of the transmission line varies

greatly from 56Kbps to T1 with 1,544

Mbps or E1 with 2,048 Mbps, … and to

Gigabit-Gbps, it is the backbone

connecting countries or continents

Figure 3: WAN

Advantages: Scope of connection: Can both connect into a private network and can

create large connections, covering an entire country or globally, this is the biggest

Trang 10

advantage of WAN that other networks do not have, it helps the entire country to belinked together with the ability to transmit a very wide and unlimited connection signal.The ability to control user access of this network is also appreciated, IP is often used

in this Good security: it's what everyone wants While this is not perfect, it is betterthan other networks Easy and fast information sharing: We use the same "bigsystem", with a large scale, information and knowledge are shared quickly andeffectively We can call it the common human brain

Disadvantages: Security: Wide area networks are more vulnerable to security threats

than LANs and MANs One of the most significant drawbacks of WANs is security, asvarious persons can access data from other machines Viruses are a major contributorsince they are simple to propagate and infect the user's device High setup costs:Initially, setting up a WAN that covers a broad geographic region is costly It mightinclude the acquisition of routers, switches, and additional security software, amongother things Troubleshooting: A WAN spans such a vast geographical region, networktroubleshooting is a challenging task The majority of WAN wires are in the water, and

if they are broken, the network would be disrupted Repairing the underwater pipes willtake a lot of effort WAN maintenance: It is a full-time task that needs significanttechnical expertise on the part of network supervisors and technicians after it is set up

2 Protocols:

A set of standards for exchanging information between two computer systems or twocomputer devices is called a protocol Protocols are the rules or standards that governcommunication (Blank,2002) The main components of a protocol include: data format,encryption method and signal

levels

The main purpose of the

protocol is to communicate

between machines, in addition it

has several functions such as:

Encapsulation, Segmentation

and Aggregation, Link Control,

Monitoring, Flow Control, Error

Trang 11

TCP/IP: Transmission Control Protocol/Internet Protocol (TCP/IP) is a collection of

communication protocols that are used to link network devices on the internet TCP/IPdefines how data is exchanged over the internet by defining how packets are split up,addressed, sent, routed, received at the destination (Kurose and Ross, 2017)

IP regulates how each packet is addressed and routed to ensure that it reaches itsintended destination A computer or other network device uses the subnet mask todetermine which portion of an IP address represents the network and which partrepresents hosts or other computers on the network

Figure 5: TCP/IPCommon TCP/IP protocols include: Hypertext Transfer Protocol (HTTP), HTTPSecure, Protocol TCP/IP functionality is divided into four layers, each of whichincludes specific protocols: Application, Transport, network, and physical layers

It aids in the establishment of It's difficult to set up and manage; the

connections between computers, transport layer doesn't guaranteeoperates independently of the operating packet delivery; it's difficult to replace

system, supports different routing protocols in TCP/IP; it doesn't clearly

protocols, has a highly scalable client- separate service, interface, andserver architecture, is small, and does protocol; it's not appropriate for

not cause the network or computer to be describing new technology in new

overworked networks; and it's particularly vulnerable

to synchronization attacks

Table 1: Advantage and disadvantage of TCP/IP

Trang 12

OSI: The network architecture in the OSI model is characterized as a hierarchy of

independent layers comprising modules that execute specific functions This translates

to a set of guidelines that specify how network nodes must interact in order tocommunicate and share data In today's sophisticated computer systems, the OSImodel specifies the conventional connections between hardware and software(Burgess, 2004)

This model has 7 layers: Application, presentation, session, transport, network control,data link, physical

Figure 6: 7 layers of OSI (https://www.bmc.com/blogs/osi-model-7-layers/)

A Layer 2 device, for example, or a Layer 3 device, are terms used to describe

network devices The OSI layer on which the device functions are described below In general, the higher up on the network layer a device works, the more complicated it is

HTTP: At the heart of the Web is the Hypertext Transfer Protocol (HTTP), the Web's

application layer protocol (Kurose and Ross, 2017) These two programs are executed

on different system terminals, communicating with each other by exchanging HTTPmessages The structure of these messages and how the client and server exchangemessages are determined by HTTP HTTP operates at layer 7 (Application) of the OSImodel

A base HTML file and some referenced objects appear on most Web pages (Kuroseand Ross, 2017) The URLs of the other items on the page are referenced in the basicHTML file Each URL contains two parts: the hostname of the server hosting the itemand the path name of the object

Trang 13

Figure 7: URL of a web

Advantage and benefit: HTTP Connection is Intermittent: HTTP Connection is

Intermittent The typical procedure for handling and responding to HTTP requests is asfollows: the Client initiates the request, the Client disconnects from the Server to await aresponse, the Server processes the request, the Server reconnects to the Client anddelivers the response Independence is the second fundamental characteristic of HTTP.You can transfer any form of data via HTTP as long as the contents of the data are underthe control of both the machine and the client HTTP is stateless: The third property ofHTTP is that it is connectionless The server and client only know each other for theduration of the current request; they will quickly forget each other Furthermore, both theclient and the server may keep track of requests for web pages Absolute security: Thewebsite's data is protected by encryption Hackers cannot access and steal website data.This creates absolute safety and security for the website

DNS: A distributed database is the Domain Name System (DNS) This enables for

local control of the segments of the overall database, but data in each segment isaccessible across the network via a client server scheme (Liu, Albitz and Loukides,1998) Like HTTP, DNS also operates at layer 7 (Application) of the OSI model

DNS functions as an "interpreter" and "communicator." DNS will translate the domainname into an IP address, which is made up of four sets of digits

When "translate," the browser will recognize you and you can log in When users join

in to a website, instead of having to memorize and type in a sequence of IPaddresses, they may simply type in the website's name, which the browser will identifyautomatically

A unique IP address is assigned to each computer connected to the Internet To begin aconnection, this IP address is used to create a connection between the server and theclient When you visit a random website or send an email, DNS plays a critical role

Nobody will be able to recall every sequence of IP address in each login from theworld's numerous websites As a result, the notion of domain names was created,which allowed each website to be identified by a distinct name

Trang 14

Figure 8: DNS

Benefits: DNS helps users save a lot of time when accessing previously visitedwebsites by remembering the domain names that have been "translated" andprioritizing use for next visits Users may utilize DNS to access a variety of networkservices, including searching for information, viewing movies, playing games, andlogin onto websites Without it, users would be unable to access the Internet as swiftlyand simply as they can now

Networking Standards Organizations: Around the world, to set standards for the

Internet, many organizations have emerged

ISO: The ISO (International Organization for Standardization), based in Geneva,

Switzerland, is a collection of 157 nations' standards bodies Their objective is todevelop international technical standards that will allow for the free flow of informationand trade throughout the world (StudyMoose,2016)

ISOC: The Internet Society (ISOC) is a professional membership organization that

assists in the development of internet technological standards With the internet's fastexpansion, they are concerned about maintaining accessibility, information security,and the stability of addressing services and open standards throughout the internet.They are made up of thousands of online workers and businesses from 90 chaptersthroughout the world (StudyMoose,2016)

Trang 15

The word “topology” in a communication network refers to the method in which the

network's end points, or stations, are connected (Singh and Ramola, 2014) It has 2 types: Physical and Logical topology

Physical topology: The hardware

connected with the system, such as

workstations, remote terminals, servers,

and the related wiring between assets, is

referred to as Physical Network Topology

The physical topology of the systems

determines how they are physically

connected (Singh and Ramola, 2014)

The shape of the cabling layout used to

link devices is called the physical

topology of the network This refers to the

layout of cabling, the locations of nodes,

and the interconnections between the

nodes and the cabling

Figure 9: Physical topology

Logical topology: The depiction of data flow between nodes is important to logical

network topology The primary function of logical topology is to allow various systems

to communicate across physical topologies (Singh and Ramola, 2014)

Figure 9: Logical topologyShared media topology and token-based topology are the two types of logicaltopologies

Trang 16

Physical topology Logical topology

The network's physical configuration is The logistics of a network concerned

with data transmission are depicted

depicted

The layout may be changed to suit your There isn't any interfering or

manipulating going on here

needs

It's possible to organize it in a star, ring, It may be found in both bus and ring

topologies

mesh, or bus topology

Based on device selection and This has a significant influence on data

packet delivery and speed It alsoavailability, this has a significant

controls data flow and ensures that datainfluence on network cost, scalability,

packets are delivered in a timelyand bandwidth capacity

manner

It is the transmission path in its true It's a simplified depiction of data flow.

form

The network's physical link The network's data route was followed.

Table 2: Compare Physical topology and Logical topology

16.1

I will analyze some common network topologies:

Bus: The sent message is carried over the cable via the bus topology As the

message arrives at each device (node), it is checked to determine if the message'sdestination address matches its own (Singh and Ramola, 2014) In this architecture, asingle network cable runs throughout the

building or campus, and all nodes

are connected to it through two

ends known as the bus

For the bus, all stations are

connected to the linear

transmission medium or bus via

appropriate hardware interfaces

called TAP (Pavani, Chandrika

and Krishna, 2012) Full-duplex

operation (sending and receiving

between the station and the tap

allows data to be transmitted onto

the bus and retrieved from the

bus To eliminate reflection, there

is a terminator at each end of the

bus.

Figure 10: Bus topology

Trang 17

Advantages DisadvantagesGreat reliability, easy to use and

This type of connection has a slowunderstand

speed, especially when there is aThe number of wires to connect is problem on the cable line, the whole

small, simple system immediately stops working

Moreover, when there is a problem, it isEasy setup also difficult to find the error that causes

network congestion when transferring

A repeater can also be used to large amounts of data

extend the bus configuration

Table 3: Advantages and Disadvantages of Bus

Ring: All messages go in the same way across a ring in a ring topology, and there is a

direct point-to-point link between two nearby nodes (the Next and the Previous) (Singhand Ramola, 2014)

These links are one-way, they

ensure that a node's path will go

through the entire ring and back

to the node Faulty nodes can be

detached from the rest of the ring

When the workstation is turned

on, it will automatically join the

circle It disconnects from the ring

when turned off, allowing

information to pass through the

node The token ring

is the most frequent

implementation of this topology

The entire network will be down

by a single error in the ring The

individual nodes in the ring can

be separated by themselves

Figure 11: Ring topology

Ngày đăng: 22/03/2022, 00:31

TỪ KHÓA LIÊN QUAN

w