Wide Area Network Campus Area Network Metropolitan Area Network Transmission Control Protocol Internet Protocol Dynamic Host Configuration Server File Transfer Protocol Secured Shell Sim
Trang 1STUDENT : NGUYEN DINH THAI CLASS : ITO5101
STUDENT ID — : BDO00123 SUPERVISOR : TRUONG DANG HIEU
Da Nang, June 2022
Trang 2
“BTEC ‘BTEC
Alliance with 8ø Education
ASSIGNMENT 1 FRONT SHEET
Qualification BTEC Level 5 HND Diploma in Computing
Unit number and title | Unit 2: Networking
Date received (1st sub-
Student name Nguyen Dinh Thai Student ID BD00123
Class TT05101 Assessor name Truong Dang Hieu
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the con-
sequences of plagiarism I understand that making a false declaration is a form of malpractice
Trang 3,BIEc ‘BTEC
C1 Summative Feedbacks: UO Resubmission Feedbacks:
Trang 400 {9)816 9019) 1
Chapter 1 Examine networking principles and their protocols (LOD) eee 2
1 Discuss the benefits and constraints of different network types and standards (P1) 2 IINNWPEði eo co innnggaaiii3öÖ5535ŸÝẢÝẢÝẢÝÝẢ 2 Won O4 4
1.2.1 Local Area Network (LAN) and 4 1.2.2 Metropolitan Area Network (MAN): ch HH HH HH Ho HH HH He 5
1.2.3 Wide Area Network (WANÌ cuc nh 10 1 1 H1 ch 6
1.2.4 Compare LAN-MAN-WANN ii cuc nh HH HH HH HH HH HT HH 1H ru 7
I W0 v00 900 1n 9
1.3.2 Listsome protocols:) s ccc 21 1111101111112 rà 19 1.3.3 List some standard organizations and standard names:Ở + sccscc se: 20
2 Network topology & communication and Bandwidth requiremnents (P2) 22 2.1 Network topology definition: 0? ooo 2 1t t1 1212121111121 811112 2n 12a 22 2.1.1 Deñmiton ofPhysical Topology and Logical Topology: £) -ce 22 2.2 Examples oftopology with dia0TaIS: ác ncnn n1 1110111111011 H1 ng 22
Vqx5adadiẳẳẳẳaiaiadiiiiẳiiảaảảÝÝ 22
"P»N nh ằa 23
i
Trang 53 Discuss the operating principles of networking devices and server types (P3) 31 3.2.1 The prineiple of operation of the router: Ế), cesteteeeeeeees 31 E0 ốc na e 31
E LASt SOIVer tYPeS! ốc 36
4 Discuss the inter-dependence of workstation hardware with relevant networking
Oy TNS Ce Cae.) 4Ÿ 39 4.2 Explain what is meant by interedpendencies: 0 ccceeeteteeteteeteneenens 39 4.3 Explarn the meaning ofinterdependen€ce: i1 SH re 39
4.4 Identfy workstation hardWar€: -.- 1 22211121111 1111222 1151181111182 Hà 39 4.5 Idenufy network SOÍ WAT€: Q0 T2 HH HH H1 1H x1 tre 40
4.6 Discuss and explain the differences between workstation hardware and network software Get an example of your discussion form: Š?), 5: c1 1 11212111111112121111111112 re 41
5 Compare common networking principles and how protocols enable the effectiveness
of networked systems (M1) oie .ố.ê¬áää 42 5.2 Make a comparison of network principles: oo ccc cccceetetteteeceteeteeenes 42
5.2.1 Compare LAN, CAN, MAN, WAN: 63) HH1 rau 42 5.2.2 Compare physical topologles and logical topologles: (6® sex, 43
1H
Trang 6:BTEC
Absxe vìh (Ÿ] 7ƒ cassen “BT EC
5.2.3 Compare between OSI reference model and TCP/IP reference model 5.2.4 Compare 0á 0 08 45 5.3 Explains how network protocol enable effective use of the network system: 49
6 Explore a range of server types and justify the selection of a server, considering a given scenario reøarding cost and performanice OptITN1ZAfIOHI: ác 0.1 111111111111 11 1011110111121 50 CONCLUSION 2 2 122121 222121112122121 2221212212122 121112 1tr 5]
9 ⁄2200507.90I900 00 E CLE ELE EEL GEE Cte GE OE EeieE eee 52 I401001:650 ĐìchXỐaaaadđaadđadđaiiadadiiiiaiảảiảẳŸ4 53
IV
Trang 7:BTEC 3
LIST OF TABLES AND FIGURES
Table 1 1 Compare LAN-MAN-WAN cc ccccccccetetetetenteteeteectetsctetecteneeersteeietestectsnssesesteereneeees 8
Table 1 2 Difference between software and hardware - HH HH HH HH HH HH cau 41
Table 1 3 Compare LAN, CAN, WAN, MAN of chapter Ì L1 1211212111111 0101122 43
Table 1 4 Compare Physical Topology and Logical Topology of chapter] 00 43
Table 1.5 Compare OSI and TCP/IP of chapter Ì c1 911 11111111111 14111 1111011110111 111 11x, 45 Table 1 6 Compare TCP and UDP of chapter Ì - c2 2111111 111111 1811111111111 11101 HH HH ng 49 Figure 1 1 ).-2)0 1.20 ) nh ố ố ố.ố 2
Figure 1, 2 Peer-to-Peer .e 3
Figure 1 3 Local Area Network oo ố e 4
Figure 1 4 Metropolitan Area Network eccentrics 5 Figure l 5 Wide Area NeLWOTK ch HH HH HH HH HH HH Hà HH TH HH 0 cán Hi 7 Figure 1 6 Layers and functions of each layer of the ST modelL - ác ccnn He 9 I0 0 2n 10
I0 0s o0 2n 11
l0 ) 2n n ốố ố ố ố 11
li 00000W0 vì an 12
Figure 1 11 Network layer 13
Figure 1, 12 Data link layer 13
I0 Ea i0 n6 .Ý 14 Figure 1 14 OSI divides network commmunication 1ntO 7 ÏaY€FS che 15
Trang 824 Partially Connected Mesh Topology of chapter Loo cece eee eteneneeeeneneesees 26
25 Full Connected Mesh Topology of chapter Lo cc ceeereeneetetetestsstenenesien 27
26 Hybrid Topology of chapter Ì ác 22c HH HH H11 n2 1121 HH kg 28
27 Block diagram of communication rules ce cece eects 29
36 Database Server of chapt€f 2 ị c1 1111211 1111 10H 37
37 Domain Name System of chapter 2 .- L1 1.111 1 101111112111121111 1110111101111 ru 37
38 Dynamic Host Configuration Protocol of elapter 2 ¿c1 11 SH 22x 38
vi
Trang 9Wide Area Network
Campus Area Network
Metropolitan Area Network Transmission Control Protocol Internet Protocol
Dynamic Host Configuration Server File Transfer Protocol
Secured Shell Simple Mail Transfer Protocol
Docmain Name System
Post Office Protocol 3
Internet Message Access Protocol
Simple Network Manegement Protocol Hypertext Transfer Protocol over SSL/TLS International Organnization
American National Standards Institute Information Technology Industry Council Information Technology
Institute of Electrical and Electronics Engineer Electronic Industries Alliance
Televommunication Industries Association Telecommunication Standardization Sector European Telecommunications Standards Institute
vil
Trang 11‘BTEC ‘BTEC
INTRODUCTION Networking piles important role in life Coming to this report, we will learn about networks, types
of networks, network devices.,
It will help us understand more deeply what is a network, how is a network defined? The process of building a network and how it works let's learn this article!
The report includes the following:
Chapter 1 Examine networking principles and their protocols (LO1)
1 Discuss the benefits and constraints of different network types and standards (P1)
2 Network topology & communication and Bandwidth requirements (P2)
CHAPTER 2: Explain networking devices and operations (LO2)
3 Discuss the operating principles of networking devices and server types (P3)
4 Discuss the inter-dependence of workstation hardware with relevant networking soft-
Trang 12BIEC ‘BTEC
Alliance with 8ø Education _
Chapter 1 Examine networking principles and their protocols (LO1)
1 Discuss the benefits and constraints of different network types and standards
(P1)
1.1 Define network:
L1 A computer network is a group of computers and periphery- al bias connected to each other
through transmission mediums similar as crooked brace, optic fiber, electromagnetic swells,
infrared shafts, etc to partake data with each other Data is transmitted from one machine to
another in the form of double bits 0 and 1, which, after being converted into voltage or
electror magnetic swells, will be transmitted through the transmission medium be-low.tÐ L1 Client-Sever: is a computer network model that includes two main components: a client (client) and a server (server) In this model, the server is the place to store resources, install service programs, and perform client requests The client takes the role of sending the request
to the server Client includes computers and electronic devices in general
Trang 13;BTE $
oO The Client server model allows the network to centralize applications and functions in one or more dedicated file services These machines become the heart of the system The operating system of the Client server allows users to share the same resources simultaneously, regardless of geographical location.©)
The client-server web model is a well-known model in computer networking, very widely applied, and is the model ofall existing websites An opposite model is the master-slave model, where the server (as the boss) sends data to the client (as the slave) regardless of whether the client needs it or not.)
The client/server model is as follows: Client/Server is the most general model, in fact, a server
can be connected to many other servers to work efficiently and faster When receiving a
request from a client, this server can send the request it has just received to another server such as a database server because it cannot handle this request by itself Servers can perform simple or complex tasks.)
A peer to peer (P2P) network is a distributed application architecture that partitions tasks or workloads among peers Peers are devices participating in the application with equal privileges They form a peer-to-peer network of nodes
i ¢—> F By F `
Figure 1 2 Peer-to-Peer
Performed Student: Nguyen Dinh Thai
Trang 14SBTEC “BTEC
aioe wih fgg £00
Peers make a portion of their resources, such as processing power, disk storage, or network bandwidth, available to other participants without the need for central coordination of a stable server or host Peers are both providers and consumers of resources It differs from the traditional client-server model in that resource consumption and provision are split 1.2 Network type:
1.2.1 Local Area Network (LAN):
ñ LAN stands for Local Area Network, roughly translated as local computer network, this interface allows computers to connect to each other to work together and share data This connection is made via a LAN cable or Wifi (wireless) in a narrow space, so it can only be used in a limited range such as offices, homes, schools ®)
Figure 1 3 Local Area Network
Trang 15‘BTEC $
12.11 Bemift:
Ol Highspeed
L1 Can run large online applications thanks to strong bandwidth
Oi Cheap and easy to manage
1.2.1.2 Constraint:
L1 Can only transmit in a certain space because the transmission line is short
1.2.2 Metropolitan Area Network (MAN):
Oo MAN (Metropolitan Area Network), also known as urban network, connects from many LANs
via cables, other transmission means The ability to connect in a large range such as in a town
or city, conscious.”
The MAN network model is often used mainly for organizations and businesses with many
branches and departments connected to each other
L1 Man network is often used for businesses because this model provides many types of services such as connecting lines via voice (voice), data (data), video (image), deploying applications easily, (1!)
Trang 16L1 Popular with large bandwidth needs in big cities like Hanoi and Ho Chi Minh City
L1 There is a wide variety of services, maximized on modern bandwidth, service by providing ser- vice in the present and in the future, improving the broadband network service d=will be highly profitable network
1.2.2.2 Constaint:
L Complex management
LH Hiph cost
L1 The connection is quite large
L1 Have average bandwidth to run banking operations
1.2.3 Wide Area Network (WAN):
Oo WAN (Wide Area Network), also known as wide area network, is a combination of urban
networks including MAN and LAN through satellite equipment, optical cables, and power cables.12
L1 Wide area network was created to connect on a large scale across the country The protocol used in the WAN is TCP/IP, the bandwidth of the transmission varies depending on the installation location.“!9)
Trang 17
L1 It can both connect to private networks and create connections on a global scale
Ol ~—- Can transmit signal over long distances and unlimited
L1 User access rights can be controlled
Ol High security
LI Information can be shared easily and quickly
12.32 Constraint:
LI Weak connection because of low bandwidth
O High installation cost
L1 Difficult to manage
1.2.4 Compare LAN-MAN-WAN:
Criteri riteria LAN MAN WAN
Local Area Network | Metropolitan Area Wide Area Network Full name
Trang 18‘BTEC $
Data transfer rate 10 to 100 Mbps larger than LAN and | 256Kbps to 2Mbps
smaller than WAN Bandwidth Great Medium Short
Cost Cheap Expensive Very expensive
Trang 19SBTE 3
1.3 Network protocol definition:
1.3.1 Protocol:
H is anetwork protocol, a set of established rules whose primary task is to format, transmit, and receive data All these tasks will be done so that computer network devices (from server, router to end point) can communicate clearly with each other Regardless of the difference in infrastructure, design or basic standards, the Protocol protocol will still fully support so that communication can take place at its best
1.3.1.1 OST:
L1 Define: is an open systems interconnection reference model This model is created using the principle of layering, explaining the connection technique between computers and establishing the network protocol between those computers The OSI model is also known as the seven-tier model
LI The OSI model divides network communication into seven layers From layer 1 to layer 4 are
low-level layers, it performs the task of data movement Layers 5 to 7 are high-level layers, performing specific tasks and forwarding data.“©)
Trang 20:BTEC 3
oO Layer 7 - Application Layer: The application layer is the top layer that defines the interface between the user and the OSI environment The application layer is used by end-user software such as web browsers and email clients It provides protocols that allow software to send, receive information, and present meaningful data to users.“!7)
Figure 1 7 Application layer
Layer 6 — Presentation Layer: ‘!®)
The presentation layer determines how the two devices will encode and compress the data so
that it is received correctly at the other end The presentation layer takes any data transmitted
by the application layer and prepares it for transmission across the session layer
This layer is primarily responsible for preparing the data so that it can be used by the application layer; In other words, layer 6 makes data visible to applications for use The presentation layer is responsible for translating, encoding, and compressing data
The two devices that are communicating may use different encoding methods, so layer 6 is responsible for translating the incoming data into a syntax that the receiving device's application layer can understand
If the devices are communicating over an encrypted connection, layer 6 is responsible for adding encryption at the sender end as well as decoding the encryption at the receiver end so that it can expose the application layer to possible data readable, unencrypted
Finally, the presentation layer is also responsible for compressing the data it receives from the application layer before delivering it to layer 5 This improves the speed and efficiency of communication by minimizing the amount of data that will be lost transmitted
Trang 21
avoid wasting resources.The session layer also synchronizes data transmission with
checkpoints.)
-= —=
Figure 1 9 Session layer
Trang 22:BTEC 3
o Layer 4 — Transport Layer: 2°
Cl Layer 4 is responsible for end-to-end communication between two devices This includes taking data from the session layer and dividing it into pieces called segments before sending
it to layer 3 The transport layer on the receiving device is responsible for assembling the segments into data that layer session can be used
L1 The transport layer is also responsible for flow control and error control Flow control determines the optimal transfer rate to ensure that a sender with a fast connection does not overwhelm a receiver with a slow connection The transport layer performs error control at the receiving end by ensuring that the received data is complete and requesting
retransmission 1f not
Figure 1 10 Transport layer
o _Layer 3- Network Layer: The network layer is responsible for facilitating the transmission of
data between two different networks If two devices communicate on the same network, the network layer is unnecessary The network layer breaks down segments from the transport layer into smaller units, called packets, on the sender's device and reassembles these packets
on the receiving device The network layer also finds the best physical path for data to reach its destination; this is called routing (21)
Trang 23:BTEC 3
Figure 1 11 Network layer
o Layer 2 — Data Link Layer: The data link layer is very similar to the network layer, except that
the data link layer facilitates the transfer of data between two devices on the SAME network The data link layer takes packets from the network layer and divides them into smaller pieces called frames Like the network layer, the data link layer is also responsible for flow control
and error control in intranet communication (the transport layer is only responsible for flow control and error control for communication between networks).?)
Trang 24:BTEC 3
o Layer 1 — Physical Layer: This layer includes the physical devices involved in data transmission,
such as cables and switches This is also the layer where data is converted to a bit stream,
which is a sequence of 1s and 0s The physical layer of both devices must also agree on a signaling convention so that 1s can be distinguishable from zeros on both devices.??)
Figure 1 13 Physical layer
L1 Advantages:
o _ Divided into many small and simple floors
o Ease of development by standardizing network components
o Convert the interface between frequencies
o _ Data is transferred quickly and easily
Trang 257 Application a Ung dung 7
6 Presentation —+_—_—_——» | Biểu diễn dữ liệu 6
5 Session tt Kiểm soát nối 5
L1 Define: The TCP/IP model has a combination of distinct protocols The task of each protocol is
to help computers connect and transfer information back and forth TCP is a transmission control protocol and Internet Protoco (IP) is an internet protocol TCP/IP consists of four layers: the application layer, the network layer, the transport layer, and the physical layer.?”
Moving
up & Down Protocol Layers
Figure 1 15 TCP/IP Layered Model
Trang 27
BTEC ‘BTEC
Alliance with 8g Education
Transport Layer Functions
APPLICATION LAYER DATA The Transport layer
divides the data into Piece 1 Piece 2 Piece 3
pieces and adds a header
for delivery over the UDP Datagram Or TCP Segment
ea ee] | ea
Em] [Bi
(ports) * Flow control and congestion
management
Figure 1 17 Transport layer
o _Layer 2 - Network layer (Internet): Almost like the network layer of the OSI model Here, it is also defined as a protocol responsible for the logical transmission of data in the network The data segments will be packed (Packets) with the size of each packet appropriate to the
switching network it uses to transmit data At this time, the packets are inserted with a header containing information of the network layer and continue to be forwarded to the next layer The main protocols in the layer are IP, ICMP and ARP.2”)
Trang 28SBTE 3
Encapsulation & De-encapsulation Receiving
Figure 1 18 Internet layer
o Layer 1 - Physical layer: It is a combination of the Physical layer and the data link layer of the OSI model Responsible for data transmission between two devices in the same network Here, data packets are encapsulated in a frame (called a Frame) and routed to the originally specified destination.2®)
CO ~—s- Popular protocols: FTP, HTTP, HTTPS are the three most used protocols of TCP/IP FTP is a protocol that allows computers to send unlimited data to one or more other computers HTTP has the function of insecure data transmission between the web user and the web server HTTPS is a protocol used for secure data transmission between web users and web servers.2”)
Trang 29
TCP/IP Core
Interface
Figure 1 19 The most common protocols of the TCP/IP model
Users can freely use it because it is not controlled by any organization
Has high adaptability
Can identify, extend and identify the best path
(30)
Internet Protocol Suite
Protocol Stack
Transmission Control Protocol (TCP)
Internet Protocol (IP)
Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FPT)
Secured Shell (SSH)
Telnet Protocol
Simple Mail Transfer Protocol (SMTP)
Domain Name System (DNS)
Post Office Protocol 3 (POP 3)
Internet Message Access Protocol (IMAP)
Trang 30
:BTEC ‘BTEC aaionce win 7ƒ cassen
Simple Nextwork Manegement Protocol (SNMP)
Hypertext Transfer Protocol over SSL/TLS (HTTPS)
List some standard organizations and standard names:Ở!
International Organnization (ISO): Probably the biggest standards organization in the world, the ISO is really a federation of standards organizations from dozens of nations In the net- working world, the ISO is best known for its OSI Reference Model
American National Standards Institute (ANSI): ANSI is the main organization responsible for coordinating and publishing computer and mformation technology standards in the United States While they are commonly thought of as developing and maintaining standards, they
do neither Instead, they oversee and accredit the organizations that actually create the stand-
ards, qualifying them as Standards Developing Organizations or SDOs ANSI also publishes the
standards documents created by the SDOs, and serves as the United States' representative to
the ISO
Information Technology Industry Council (ITIC): ITIC is a group of several dozen companies in the information technology (computer) industry ITIC is the SDO approved by ANSI to develop and process standards related to many computer-related topics It was formerly known as the Computer and Business Equipment Manufacturers Association (CBEMA)
National Committee for Information Technology (NCITS): A committee established by the ITIC
to develop and maintain standards related to the information technology world NCITS was formerly known by the name Accredited Standards Committee X3, Information Technology,
or more commonly, just X3 It maintains several sub-committees that develop and maintain standards for various technical subjects
Institute of Electrical and Electronics Engineer IEEE): The IEEE (pronounced “eye-triple-ee’’) is
a well-known professional organization for those in the electrical or electronics fields, including computers and networking IEEE's main claim to fame in the networking industry is the IEEE 802 Project, which encompasses many popular networking technologies including Ethernet
Electronic Industries Alliance (Electronic Industries Alliance) (EIA): The EIA is an international industry association that is best known for publishing electrical wiring and transmission
standards
Trang 31:BTEC 3
L1 Televommunication Industries Association (TIA): The TIA is the communications sector of the EIA, and is responsible for developing communications standards Since communications, wiring and transmission are all related, and since the TIA and EIA organizations are also related, standards produced by the EJA or TIA are often labeled with the combined prefixes “EIA/TIA”
or “TIA/EIA”
L1 International Telecommunication Union-Telecommunication Standardization Sector (ITU-T): ITU-T is another large international body that develops standards for the telecommunications industry The ITU-T was formerly named the International Telephone and Telegraph
Consultative Committee or CCITT (the abbreviation was of the French version of the
organization's name, Comité consultatif international téléphonique et télégraphique.) L1 European Telecommunications Standards Institute (ETSD: An organization with members from dozens of countries both within and outside Europe that is dedicated to developing telecommunications standards for the European market (and elsewhere), ETSI is known for, among other things, regulating the use of radio bandwidth in Europe and developing standards such as HiperLAN
Trang 32‘BTEC ‘BTEC
aaionce win 7ƒ cassen
2 Network topology & communication and Bandwidth requirements (P2)
2.1 Network topology definition: 8?
Oo is the arrangement of the various elements (links, nodes, etc.) of a computer network
Primarily, it is the topological structure of a computer network, and can be described in terms
of physics and logical
2.1.1 Definition of Physical Topology and Logical Topology: #3
L1 Physical Topology: is the arrangement of the various network elements, including equipment housing and cabling installation
Ll ~— Logical Topology: is dictates how data flows in the network Node distances, physical intersections, transmission rates, and/or signal types can vary between two networks even though their topologies may be identical
2.2 Examples of topology with diagrams:
Figure 1 20 Bus Topology
Li —_ Bus topology uses a single cable which connects all the included nodes The main cable acts
as a spine for the entire network One of the computers in the network acts as the computer server When it has two endpoints, it is known as a linear bus topology °”