1. Trang chủ
  2. » Công Nghệ Thông Tin

1619 networking assignment 1 fpt greenwich (Merit)

50 113 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 50
Dung lượng 4,72 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Điểm của bài asm còn tùy thuộc vào người chấm. Chỉ cần paraphase bài này là có thể pass. 1 trong nhưng tool paraphase mình recommend là quillbot.The submission is in the form of 1 document.● You must use the Times font with 12pt size, turn on page numbering; set line spacing to 1.3 andmargins to be as follows: left = 1.25cm, right = 1cm, top = 1cm, bottom = 1cm. Citation andreferences must follow the Harvard referencing style.

Trang 1

ASSIGNMENT 1 FRONT SHEET

Unit number and title Unit 2: Networking Infrastructure

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism I understand thatmaking a false declaration is a form of malpractice

Student’s signature Grading grid

Trang 2

Summative Feedback: Resubmission Feedback:

Lecturer Signature:

Trang 4

Table of Contents

I Network 5

1 Network definiton 5

2 Types of Network 5

 LAN 6

 MAN 7

 WAN 8

 P2P Network 9

3 Protocols and Standard 10

 Protocols 10

 Standard 11

II Network topology & communication and Bandwidth requirements 13

1) Network Topology 13

2) Some popular topologies 15

3) Compare common networking principles and how protocols enable the effectiveness of networked systems 21

4) communication and bandwidth 26

Communication: 26

 Bandwidth: 27

III The operating principles of networking devices and server types 30

1) Network devices: 30

Some networking devices: 31

2) NETWORKING Server: 33

IV Inter-dependence of workstation hardware with relevant networking software 39

Trang 5

1) Inter-dependence 39

2) Workstation software 39

3) Network Software 40

4) the interdependency of workstation hardware with relevant networking software 41

Bibliography 43

Figure 1 : Illustrated image of network 5

Figure 2:LAN image 6

Figure 3: MAN IMAGE 7

Figure 4: WAN illustration 8

Figure 5: P2P network 9

Figure 6: Physical network topology 13

Figure 7: Logical network topology 14

Figure 8: Difference physical and logical topology 14

Figure 9: Star Topology 15

Figure 10: Ring topology 16

Figure 11:Hybrid topology 17

Figure 12: Network communication 26

Figure 13: Bandwitdh 27

Figure 14: Networing devices 30

Figure 15: HUB 31

Figure 16: Networking devices 31

Figure 17: Moderm 32

Figure 18: Repeater 32

Figure 19: Network server ilustrated image 33

Figure 20: Workstation Hardware 39

Figure 21: Network Software 40

Trang 7

I Network

1 Network definiton

 First of all, network also known as computer networking, which can be understand as a group ofcomputers utilizing a principles of general communication protocols over digital connections for theintention of sharing resources located upon or accommodated by network nodes The operation ofnetwork transporting and exchanging data between nodes over a shared medium in an informationsystem, depend on material wireless, optical and wired radio frequency methods which may be regulated

in a variety of network frames[ CITATION Tec \l 1033 ]

Figure 1 : Illustrated image of network

 Advantages of networking: File sharing – you'll easily share data between different users, or access it

remotely if you keep it on other connected devices Resource sharing – using network-connected peripheral devices like printers, scanners and copiers, or sharing software between multiple users, saves money Sharing one internet connection – it's cost-efficient and might help protect your systems if you properly secure the network Increasing storage capacity – you'll be able to access files and multimedia, like images and music, which you store remotely on other machines or network-attached storage devices[ CITATION Tec \l

1033 ].

2 Types of Network

Trang 8

¥ LAN(Local Area Network) is a network which is confined to a relatively tiny area It is commonly limited to a

geographic area collection of devices connected together in one physical location, such as a building,office, or home[ CITATION CIS \l 1033 ]

¥ Objects connected to a network are broadly categorized as servers or workstations Servers are practically

utilized by humans indirectly, but rather run continuously to provide "services" to the other computers (andtheir users) on the computer networking

¥ Available services can consist printing and

faxing,hosting of software, file storage and

sharing, messaging, data storage and retrieval,

complete access control (security) for the

network's resources, and many others[ CITATION

CIS \l 1033 ].

¥ Advantages and disadvantages:

 Resource Sharing

 Software ApplicationSharing: single licensed

software can be used by any people

 Easy and Cheap Communication

 Centralized Data

 Data Security

 Internet Sharing: LAN provides the facility for

sharing a single networking connection among all

the LAN devices

 High Setup Cost

 Privacy Violations: The LAN administrators areable to overview and check personal data files ofeach or every LAN user

 Data Security Threat

 LAN Maintenance Job: software installations,program faults or hardware failures or cabledisturbances in Local Area Network

 Covers Limited Area

 MAN

¥ Definition: MAN(Metropolitan area network) is a high-speed network model which commonly spans a city

or a large campus and has wider network coverage than LAN It is formed by the connection from multipleLANs mutually through cables, transmission, … It perhaps also refer to public utilize networkinginfrastructure in different regions[ CITATION Din17 \l 1033 ]

Figure 2:LAN image

Trang 9

¥ Characteristic:

 It has data rates are moderate to high

 the average bandwidth but the range of connections is

relatively large

 A MAN generally is refered as a private data computer

networking uses for single organization in several

buildings or some organizations interconnected in the

similar geographic neighborhood[ CITATION Din17 \l 1033 ]

¥ Benefits and drawbacks:

o Sending local emails

fast and free on MAN

o MAN’s has a

o Need More wires

¥ Definition: WAN also known as wide area network, is a large networking information which is not tied to a

sole location, which combines between LAN and MAN network connected together through satellite, fiberoptic cable or wire cable[ CITATION RFW12 \l 1033 ]

Figure 3: MAN IMAGE

Trang 10

 WANs can facilitate communication, infomation sharing and much more between devices fromaround the world via a WAN provider.

 WAN not only be connected to a private network, but it also can create big connections, whichcovers an total country or the global The protocol utilized mainly in the WAN is TCP / IP protocol.The connecting WAN networking path is usually available by changing based on each installationplace

[CITATION RFW12 \l 1033 ]

¥ Benefits and drawbacks:

o The Wan controls

over user access

o The network security

is quite good

o Wan can store and

share large tons of

o It is hard to maintain thenetwork It requests proficient technicians and network

administrators

o Lower security compare

to LAN and MAN due towider coverage and use

of more technologies

o Quite many errors and trouble

 P2P Network

¥ A peer-to-peer (P2P) network is a distributed communication models between two peers or nodes, which

helps each user is capable to share any types of datas on any peer over this network without the

Figure 4: WAN illustration

Trang 11

requirement to a central server Unlike the server-client model, once a P2P network is established viaInternet, a central server can be used to index datas, or establishing a shared network where thedistribution of files is split between all peers in the network that are storing a given file This also meansthat the network, once established, user can utilized it to share and store files without the help of anintermediary

¥ Benefits and drawbacks

• There is no need for

high-skill staff like a network

technician because each

user can sets their own

• Datas cannot be centrallybacked up

• Files and resources are disorganized centrally in ashared area They are stored on individualcomputers and can be difficult to identify if the

3 Protocols and Standard

 Protocols

Figure 5: P2P network

Trang 12

A network protocol is an established set of rules that decide how data is transmitted between devices in the same network Primally, it permits connected devices to communicate with other, no matter what any

differences in their internal processes, structure or design Network protocols is answer for question why youcan easily communicate with people all through the world, and thus play a extremely vital role in modern digital communications[ CITATION Com18 \l 1033 ]

¥ TCP/IP protocol : is a set of communication protocols that implement the protocol stack on which the

Internet and most commercial computer networks run This set of protocols is named after its two main protocols, TCP and IP Like many other protocol suites, the TCP / IP protocol suite can be thought of as

a set of layers, each solving a set of problems related to data transmission, and providing layer

protocols a service's upper level is clearly defined based on the use of the lower layer services

Logically, the upper layers are closer to the user and work with more abstract data or forms that can eventually be physically transmitted[ CITATION Fis19 \l 1033 ]

¥ DNS protocol: is a system that allows converting easy-to-remember human domain names to their respective IP addresses DNS supports to associate with network equipment for the intentions of

locating and addressing Internet devices The domain link resolution system shares the responsibility of assigning domain names and mapping names to IP addresses by specifying the authoritative servers foreach domain name Servers with powered names are assigned to be responsible for their own domain name, and in turn can assign their own exclusive hostnames to subdomains

¥ ICMP protocol: also know as Internet Control Message Protocol is a protocol of the Internet Protocol packet This protocol commomly be used by network devices like routers to transmit error messages indicating whether or not a service, a host or router address exists ICMP can also be used to fore querymessages Unlike other protocols such as TCP and UDP, ICMP in that it is not generally used for

transmitting data between systems, nor is it frequently used by end-user network applications[ CITATION EDU20 \l 1033 ].

¥ DHCP: is not only a client server application,but it also is a network management protocol Whenever any device connects to a network, client of DHCP requires an IP address and other network

configuration data from a DHCP server The client and server communicate utilizing the DHCP protocol

to provive the end user device accordingly [ CITATION EDU20 \l 1033 ]

 Standard

Trang 13

Network standards define ground rules for data transmitions that are set by commissions in order to hardware is compatible computers and assures interoperability This is done to ensure that backwards compatibility and compatibility It is essensial for having standards since standards support to make and maintain opening markets and permit different vendors to compete on the basis of the quality of their products if they are compatible to existing market products[ CITATION Ant00 \l 1033 ]

Trang 14

International standard organizations :

 International Standards Organization (ISO): The International Organization for Standardization (ISO)

is understood as an international nongovernmental organization created of national standards bodies;

it expands and brings out a large range of proprietary, industrial, and commercial standards and iscomprised of representatives from various national standards organizations[ CITATION WIL20 \l 1033 ]

 International Telecommunication Union (ITU): International Telecommunication Union (ITU), alsoknow as specialized branch of the United Nations, which was made up to promote internationalcollaboration in most formations of telecommunication Its activities consist maintaining ordinal in theallocation of radio frequencies, setting standards on technical and operational matters, and aidingcountries in development telecommunication systems[ CITATION Enc \l 1033 ]

 Institute of Electronics and Electrical Engineers (IEEE): The Institute of Electrical and ElectronicsEngineers (IEEE) - the world's biggest technical association with quite 350,000 members in 150countries, which is a non-profit organization that's dedicated to advancing the speculation andapplication of electrical and electronics engineering and engineering[ CITATION enc19 \l 1033 ]

 American National Standards Institute (ANSI): The United States standards organization that sets upprocedures for the development and organized matter of voluntary American national standards

 Internet Research Task Force (IRTF): The Internet Research Task Force is chartered by theArchitectureBoard to think about long-term Internet issues from a theoretical point of view it'sResearch Groups, the same as Internet Engineering Task Force Working Groups, which are eachtasked to debate different research topics Multi-cast audio/video conferencing and privacy enhancedmail are samples of IRTF output

 Electronic Industries Association (EIA): Electronic Industries Association is that the abbreviationElectronic Industries Association EIA is that the us national association of electronic manufacturers.EIA has developed various industry standards for the interference between processing machines anddigital communication equipment[ CITATION mus12 \l 1033 ]

Trang 15

Names of the standards used in networking:

 10 Gigabit Ethernet – 10GbE(IEEE 802.3ae)

Physical network topology: is the set of the different components of the network and connectors

commomly represent physical network cables and nodes typically represent physical network

Trang 16

devices It refers to the pratical connections to arrange the network Setup, maintenance, andprovisioning tasks require insight into the physical network[ CITATION Sta19 \l 1033 ].

Logical network topology: The logical network topology illustrates a higher-level of how the

network is built up, consisting such nodes connect to other and in which ways, as well as howtransmitting nodes via the network Logical network topology includes any virtual and cloudresources[ CITATION Sta19 \l 1033 ]

The difference between physical topology and logical topology:

Figure 7: Logical network topology

Trang 17

Figure 8: Difference physical and logical topology

2) Some popular topologies

¥ Star Topology : There is a cable on each end points that have a determinator Star is made by

connecting each node to a main network device like a switch , hub or etc Cabling and installation ofstar topology is easy It is laid out all nodes and directly connected to one central hub through twisted-pair, or fiber cable [ CITATION Ehu16 \l 1033 ]

Benefits and flaws of star:

Figure 9: Star Topology

Trang 18

Benefits Flaws

 Allow to conveniently manage entire network

from a single location

 Independently connected to the central hub

 continue functioning unaffected

 Stable and secure layouts

 If the central hub goes down, the rest of the network can’t function

 Have some issues

 The overall bandwidth and performance of the network are also limited

¥ Bus Topology: Bus topology is one of the first topology type of the ethernet Connecting to a PC or

interface to a linear bus that is easy, this topology requests less cable than star topology but if the chiefcable is broke, all networking will down too Bus topology needs terminal cable end points.Troubleshoot is difficult because of all network is down if main cable is borke It is not suggest on largescale[ CITATION Sta19 \l 1033 ]

Benefits and drawbacks of bus topology:

 Cost-effective choice is smaller

 The layout is simple

 Allowing all devices to be connected via a

single coaxial or RJ45 cable

 Easily added to the network by joining

additional cables

 Vulnerable

 The cable experiences a failure, the whole network goes down

 Time-consuming and expensive to restore

 every additional node will slow transmissionspeeds

Trang 19

¥ Ring Topology: is created by connecting each network device in a circle(like a ring), The data can

travel via the ring network in either one direction or both directions, with each device having exactly twoneighbors [ CITATION Sta19 \l 1033 ]

 Packets arriving correctly and without data

loss

 Permitted to send data at a time

 Greatly reduces the risk of packet collisions

Trang 20

¥ Hybrid topology: Hybrid topology a type of network topology which also is a combination of two or

more network topologies It also is know as a Special Topology This topology is useful for corporateoffices to link their internal LANs together while adding external networks through Wide Area Networks(WANs)[ CITATION Kno11 \l 1033 ]

Benefits Drawbacks

Offers the easiest method for error detecting and

troubleshooting.

Highly effective and flexible networking topology

It is scalable so you can increase your network size

 The design of hybrid topology is complex

 The design of hybrid topology is complex

Figure 11:Hybrid topology

Trang 21

 Ipv4: IPv4 also know as Internet Protocol Version 4 which is a 32-bit IP address that is formatted as fourthree-digit numbers separated by a dot For instance, 69.69.69.69 This permit any digit from 0 to 255 whichpresumably contributes 4 billion unique directions Since computing devices are about to be moreaffordable, it had lead to it becoming more generall day by day office and companies[ CITATION Hil20 \l 1033 ]

¥ IPv4 is set in thelimitation by digit of unique addresses it can regulate, it means that is prospect,

running out of unique addresses is possible in future To be able to solve this major problem, using anew strategy of unique address as a replacement to the IPv4 system This is called IPv6[ CITATION Jam16

\l 1033 ].

¥ Disadvantages and advantages

Trang 22

 Device Connectivity is good

 Great measures to deliver data packets right to

¥ IPV6 is based on a 128-bit addressing system Thus, creating about 269 unique IP addresses using theIPV6 address scheme is possible Writing IPV6 as a group of 8 hexadecimal digits separated with a

Trang 23

colon 1001:ab8:0:1244:0:527:8:1 is an illustration of IPV6 address When assigning IP addresses to thecomputers or any other network devices, are converted to computer-readable binary values with thesehuman-friendly decimal values[ CITATION Jam16 \l 1033 ].

¥ Benefits and drawbacks of Ipv6[ CITATION Wis14 \l 1033 ]:

 The expansion is limit of routing tables and makes

them more efficient

 Multicast addressing simplifies the delivery process

 Effictive data flow

 Avoids triangular routing

 IP addresses are very long, which include letters and numbers

 Complexity in the Network Topology Drawings

 New IP addresses is assigned manually that quite complicated task

 FTP: FTP is File Transfer Protocol and using it to transferr files among a customer computer and a server.This protocol uses the client-server network while communicating between the server and the client FTPalso uses two ports, one for trasmitting data and the other port to server for listening income customers FTPare able to be useful for a user because this permits them to simply upload and download files remotely viathe connection that farther deletes the needs for the user to utilize a removable media to upgrate the files onserver[ CITATION Noi \l 1033 ]

Trang 24

¥ Basing on the configuration, this also intents that it may also be remotely accessed from differentgeography areas FTP is generallly used while someone using a office as a hosting server catereralmost times to not physical access the user[ CITATION Noi \l 1033 ].

 HTTP: HTTP - HyperText Transfer Protocol, which is employed for transfering digital media for illustrateHTML This protocol is employed when transmitting requires from a browser to a internet server This kind ofprotocol is statusless which is defined as not recording any data (BBC, n.d 2)

This kind of transmission protocol has been superseded by HTTPS which is a secure version of theHTTP protocol (BBC, n.d 2) HTTPS is a secure version of HTTP which utilises encryption methods toensure any data transmitted or received by the user cannot be intercepted

3) Compare common networking principles and how protocols enable the effectiveness ofnetworked systems

Trang 25

IEE 802.3

10Base-T: 10Base-T is that Ethernet standard established by the The Institute of Electrical and ElectronicsEngineers[ CITATION tec \l 1033 ] Designing 10Base-T as “10BASE-T is that the IEEE standard that defines the needfor sending information at 10 Mbps on unshielded twisted-pair cabling” This means that when employing a10Base-T wire for connecting devices together will only allow a transmission speed of 10 Mbps[ CITATION Kat19 \l

1033 ].

100Base-TX: 100Base-TX may be a modified version of 100Base-T which helps the transmitting speeds of

100 Mbps among devices employing two pairs of type 5 cables when the 100Base-TX uses the Catalogue 6cables[ CITATION tec \l 1033 ]

1000Base-T: 1000Base-T is an upgraded standard by the IEE which is identified by as “sendinginformation at 1000 Mbps on unshielded twisted-pair cabling” This kind of Ethernet which is an upgraded version

Ngày đăng: 15/04/2022, 20:12

TỪ KHÓA LIÊN QUAN

w