Introduction...3 Contents...3 LO1 Examine networking principles and their protocols...3 P1 Discuss the benefits and constraints of different network types and standards...3 P2 Explain th
Trang 1PROGRAM TITLE: NETWORK INFORMATION
UNIT TITLE: NETWORKING
Trang 2Introduction 3
Contents 3
LO1 Examine networking principles and their protocols 3
P1 Discuss the benefits and constraints of different network types and standards 3
P2 Explain the impact of network topology, communication and bandwidth requirements 10
LO2 Explain networking devices and operations 19
P3 Discuss the operating principles of networking devices and server types 19
P4 Discuss the interdependence of workstation hardware with relevant networking software 21
Performance evaluation 22
Conclusion 22
Critical evaluation 22
Trang 3ASSIGNMENT 1
In my report, I am going a detailed guide that outlines the principles, models, and networkequipment for network training purposes and outlines the sections of the manual that arerelevant to Brick Lane My main content is inside part II (Contents) I will show aboutcommunication skills, problem-solving skills, time management skills and critical reasoningand the importance of them are In part III is my conclusion in this report, parts I finished Inpart IV, I will show what I did and not, I will evaluate the point of my report Finally, in part V
is references that are sources I refer on
B Contents
LO1 Examine networking principles and their protocols
P1 Discuss the benefits and constraints of different network types and standards
What is a network?
In information technology, a network is defined as the connection of at least two computersystems, either by a cable or a wireless connection The simplest network is a combination oftwo computers connected by a cable This type of network is called a peer-to-peer network.There is no hierarchy in this network; both participants have equal privileges Each computerhas access to the data of the other device and can share resources such as disk space,applications or peripheral devices (printers, etc.)
Computer network
Computer networks are the basis of communication in IT They are used in a huge variety ofways and can include many different types of network A computer network is a set ofcomputers that are connected together so that they can share information
Benefits of networks
There are various benefits that are achieved in a networked environment they include:
Strengthening Relationships: Networking is about sharing, not taking It is about
forming trust and helping one another toward goals
Trang 4 Fresh Ideas: Your network can be an excellent source of new perspectives and ideas
to help you in your role
Raised Profile: Being visible and getting noticed is a benefit of networking that’s
essential in career building Regularly attending professional and social events willhelp to get your face known
Access to Opportunities: Expanding your contacts can open doors to new
opportunities for business, career advancement, personal growth, or simply newknowledge
New Information: Networking is a great opportunity to exchange best practice
knowledge, learn about the business techniques of your peers and stay abreast of thelatest industry developments
Advice and Support: Gaining the advice of experienced peers is an important benefit
Trang 5System types:
1) Peer-based network
This is a network in which the computers are managed independently of one anotherand have equal rights for initiating communication with each other, sharingresources, and validating users
2) Client-server network
A client server network is defined as specific type of online network comprised of asingle central computer acting as a server that directs multiple other computers,which are referred to as the clients
3) Cloud network
Cloud networking is a type of IT infrastructure in which some or all of anorganization’s network capabilities and resources are hosted in a public or privatecloud platform, managed in-house or by a service provider, and available on demand
6) Virtualized network
Network virtualization in computing is the procedure that separates the managementplane from the control plane by combining hardware (such as switches and routers)
Trang 6and software network resources into a single, software-based administrative entitycalled a virtual network.
Network standards
Conceptual models: OSI model, TCP/IP model
OSI model: The OSI Model (Open Systems Interconnection Model) is a conceptualframework used to describe the functions of a networking system The OSI modelcharacterizes computing functions into a universal set of rules and requirements
in order to support interoperability between different products and software Inthe OSI reference model, the communications between a computing system aresplit into seven different abstraction layers: Physical, Data Link, Network,Transport, Session, Presentation, and Application
TCP/IP model: TCP/IP, or the Transmission Control Protocol/Internet Protocol, is asuite of communication protocols used to interconnect network devices on theinternet TCP/IP can also be used as a communications protocol in a privatecomputer network(an intranet or an extranet)
- The following are the similarities between the OSI and TCP/IP model:
Both the reference models are based upon layered architecture
Trang 7 The layers in the models are compared with each other The physical layer and thedata link layer of the OSI model correspond to the link layer of the TCP/IP model.The network layers and the transport layers are the same in both the models Thesession layer, the presentation layer and the application layer of the OSI modeltogether form the application layer of the TCP/IP model.
In both the models, protocols are defined in a layer-wise manner
In both models, data is divided into packets and each packet may take theindividual route from the source to the destination
- Differences between OSI and TCP / IP Reference Models:
Standards: IEEE 802
Trang 8IEEE 802 is a collection of networking standards that cover the physical and data-linklayer specifications for technologies such as Ethernet and wireless Thesespecifications apply to local area networks (LAN) and metropolitan area networks(MAN) IEEE 802 also aids in ensuring multi-vendor interoperability by promotingstandards for vendors to follow.
Three most common types of networks:
1 Local Area Network (LAN) – is a computer network that interconnects computers
within a limited area such as a residence, school, laboratory, university campus oroffice building
Trang 9Four characteristics of LANs:
Local area network is a group of computers connected with each other in asmall place such as school, hospital, apartment etc
LAN is secure because there is no outside connection with the local areanetwork thus the data which is shared is safe on the local area network andcan’t be accessed outside
LAN due to their small size are considerably faster, their speed can rangeanywhere from 100 to 100Mbps
LANs are not limited to wire connection, there is a new evolution to the LANsthat allows local area network to work on a wireless connection
2 Metropolitan Area Network (MAN) – is a computer network that interconnects users
with computer resources in a geographic region of the size of a metropolitan area
Trang 10Three characteristics of MANs:
Wireless MAN — Single Carrier (SCa) uses single carrier modulation
Wireless MAN — OFDM uses a 256-carrier OFDM This air interface providesmultiple access to different stations through time-division-multiple access
Wireless MAN — OFDM uses a 2048-carrier OFDM scheme The interfaceprovides multiple access by assigning a subset of the carriers to an individualreceiver
3 Wide area network (WAN)– is a telecommunications network that extends over alarge geographic area for the primary purpose of computer networking Wide areanetworks are often established with leased telecommunication circuits
Trang 11Three characteristics of WANs:
WANs have a large capacity, connecting a large number of computers over alarge area, and are inherently scalable
They facilitate the sharing of regional resources
They provide uplinks for connecting LANs and MANs to the Internet
*Other types of networks:
Wireless LAN (WLAN)
Storage Area Network (SAN)
P2 Explain the impact of network topology, communication and bandwidth requirements.
Network Topologies
Network topology refers to how various nodes, devices, and connections on your networkare physically or logically arranged in relation to each other Think of your network as a city,and the topology as the road map Just as there are many ways to arrange and maintain acity—such as making sure the avenues and boulevards can facilitate passage between theparts of town getting the most traffic—there are several ways to arrange a network Each hasadvantages and disadvantages and depending on the needs of your company, certainarrangements can give you a greater degree of connectivity and security
Trang 12 Physical – The physical network topology refers to the actual connections
(wires, cables, etc.) of how the network is arranged Setup, maintenance, andprovisioning tasks require insight into the physical network
Logical – The logical network topology is a higher-level idea of how the
network is set up, including which nodes connect to each other and in whichways, as well as how data is transmitted through the network
Also, the way in which computers are connected together to form a network has a largeeffect on its speed and efficiency There are a number of different ways to connectcomputers in a network - but these are the most common:
Star Topology
In this type of topology all the computers are connected to a single hub through a cable Thishub is the central node and all others nodes are connected to the central node
Features:
o Every node has its own dedicated connection to the hub
o Hub acts as a repeater for data flow
Trang 13o Fast performance with few nodes and low network traffic
o Hub can be upgraded easily
o Easy to troubleshoot
o Easy to setup and modify
o Only that node is affected which has failed, rest of the nodes can work smoothly
o It transmits data only in one direction
o Every device is connected to a single cable
Trang 14o It is cost effective
o Cable required is least compared to another network topology
o Used in small networks
o It is easy to understand
o Easy to expand joining two cables together
Disadvantages:
o Cables fails then whole network fails
o If network traffic is heavy or nodes are more the performance of the networkdecreases
o Cable has a limited length
o It is slower than the ring topology
Trang 15o The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology.
o In Dual Ring Topology, two ring networks are formed, and data flow is in oppositedirection in them Also, if one ring fails, the second ring can act as a backup, tokeep the network up
o Data is transferred in a sequential manner that is bit by bit Data transmitted, has
to pass through each node of the network, till the destination node
o Troubleshooting is difficult in ring topology
o Adding or deleting the computers disturbs the network activity
o Failure of one computer disturbs the whole network
Tree Topology
It has a root node and all other nodes are connected to it forming a hierarchy It is also calledhierarchical topology It should at least have three levels to the hierarchy
Trang 16o Ideal if workstations are located in groups
o Used in Wide Area Network
Advantages:
o Extension of bus and star topologies
o Expansion of nodes is possible and easy
o Easily managed and maintained
o Error detection is easily done
Disadvantages:
o Heavily cabled
o Costly
o If more nodes are added maintenance is difficult
o Central hub fails, network fails
Trang 17MESH Topology: Routing
In routing, the nodes have a routing logic, as per the network requirements Like routing logic
to direct the data to reach the destination using the shortest distance Or, routing logic whichhas information about the broken links, and it avoids this node etc We can even have routinglogic, to re-configure the failed nodes
MESH Topology: Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing logic isrequired The network is robust, and the its very unlikely to lose the data But it leads tounwanted load over the network
Types:
o Partial Mesh Topology: In this topology some of the systems are connected in the
same fashion as mesh topology but some devices are only connected to two orthree devices
Trang 18o Full Mesh Topology: Each and every nodes or devices are connected to each
o Fault is diagnosed easily
o Provides security and privacy
Disadvantages:
o Installation and configuration are difficult
o Cabling cost is more
o Bulk wiring is required
Hybrid Topology
It is two different types of topologies which is a mixture of two or more topologies Forexample, if in an office in one department ring topology is used and another star topology isused, connecting these topologies will result in Hybrid Topology (ring topology and startopology)
Trang 19o It is a combination of two or topologies
o Inherits the advantages and disadvantages of the topologies included
The network layer itself relies on the following principles:
1 Each network layer entity is identified by a network layer address This address isindependent of the datalink layer addresses that it may use
Trang 202 The service provided by the network layer does not depend on the service or theinternal organization of the underlying datalink layers 3 The network layer isconceptually divided into two planes: the data plane and the control plane The dataplane contains the protocols and mechanisms that allow hosts and routers toexchange packets carrying user data.
Internet Protocol
The Internet Protocol (IP) is the network layer protocol of the TCP/IP protocol suite IP allowsthe applications running above the transport layer (UDP/TCP) to use a wide range ofheterogeneous datalink layers IP was designed when most point-to-point links weretelephone lines with modems Since then, IP has been able to use Local Area Networks(Ethernet, Token Ring, FDDI, .), new wide area data link layer technologies (X.25, ATM,Frame Relay, ) and more recently wireless networks (802.11, 802.15, UMTS, GPRS, )
LO2 Explain networking devices and operations
P3 Discuss the operating principles of networking devices and server types.
1 Network Operating Principles
Rules that Govern Communications
Protocol suites are implemented by hosts and networking devices in software, hardware or both
The protocols are viewed in terms of layers, with each higher level service depending on the functionality defined by the protocols shown in the lower levels.