1. Trang chủ
  2. » Luận Văn - Báo Cáo

Information technology assignment 1 unit 2 networking

64 0 0
Tài liệu được quét OCR, nội dung có thể không chính xác
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Network Implementation and Principles
Người hướng dẫn Truong Dang Hieu, Instructor
Trường học FPT International College
Chuyên ngành Information Technology
Thể loại Assignment
Năm xuất bản 2022
Thành phố Da Nang
Định dạng
Số trang 64
Dung lượng 12,29 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Wide Area Network Campus Area Network Metropolitan Area Network Transmission Control Protocol Internet Protocol Dynamic Host Configuration Server File Transfer Protocol Secured Shell Sim

Trang 1

STUDENT : NGUYEN DINH THAI CLASS : ITO5101

STUDENT ID — : BDO00123 SUPERVISOR : TRUONG DANG HIEU

Da Nang, June 2022

Trang 2

“BTEC ‘BTEC

Alliance with 8ø Education

ASSIGNMENT 1 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title | Unit 2: Networking

Date received (1st sub-

Student name Nguyen Dinh Thai Student ID BD00123

Class TT05101 Assessor name Truong Dang Hieu

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the con-

sequences of plagiarism I understand that making a false declaration is a form of malpractice

Trang 3

,BIEc ‘BTEC

C1 Summative Feedbacks: UO Resubmission Feedbacks:

Trang 4

00 {9)816 9019) 1

Chapter 1 Examine networking principles and their protocols (LOD) eee 2

1 Discuss the benefits and constraints of different network types and standards (P1) 2 IINNWPEði eo co innnggaaiii3öÖ5535ŸÝẢÝẢÝẢÝÝẢ 2 Won O4 4

1.2.1 Local Area Network (LAN) and 4 1.2.2 Metropolitan Area Network (MAN): ch HH HH HH Ho HH HH He 5

1.2.3 Wide Area Network (WANÌ cuc nh 10 1 1 H1 ch 6

1.2.4 Compare LAN-MAN-WANN ii cuc nh HH HH HH HH HH HT HH 1H ru 7

I W0 v00 900 1n 9

1.3.2 Listsome protocols:) s ccc 21 1111101111112 rà 19 1.3.3 List some standard organizations and standard names:Ở + sccscc se: 20

2 Network topology & communication and Bandwidth requiremnents (P2) 22 2.1 Network topology definition: 0? ooo 2 1t t1 1212121111121 811112 2n 12a 22 2.1.1 Deñmiton ofPhysical Topology and Logical Topology: £) -ce 22 2.2 Examples oftopology with dia0TaIS: ác ncnn n1 1110111111011 H1 ng 22

Vqx5adadiẳẳẳẳaiaiadiiiiẳiiảaảảÝÝ 22

"P»N nh ằa 23

i

Trang 5

3 Discuss the operating principles of networking devices and server types (P3) 31 3.2.1 The prineiple of operation of the router: Ế), cesteteeeeeeees 31 E0 ốc na e 31

E LASt SOIVer tYPeS! ốc 36

4 Discuss the inter-dependence of workstation hardware with relevant networking

Oy TNS Ce Cae.) 4Ÿ 39 4.2 Explain what is meant by interedpendencies: 0 ccceeeteteeteteeteneenens 39 4.3 Explarn the meaning ofinterdependen€ce: i1 SH re 39

4.4 Identfy workstation hardWar€: -.- 1 22211121111 1111222 1151181111182 Hà 39 4.5 Idenufy network SOÍ WAT€: Q0 T2 HH HH H1 1H x1 tre 40

4.6 Discuss and explain the differences between workstation hardware and network software Get an example of your discussion form: Š?), 5: c1 1 11212111111112121111111112 re 41

5 Compare common networking principles and how protocols enable the effectiveness

of networked systems (M1) oie .ố.ê¬áää 42 5.2 Make a comparison of network principles: oo ccc cccceetetteteeceteeteeenes 42

5.2.1 Compare LAN, CAN, MAN, WAN: 63) HH1 rau 42 5.2.2 Compare physical topologles and logical topologles: (6® sex, 43

1H

Trang 6

:BTEC

Absxe vìh (Ÿ] 7ƒ cassen “BT EC

5.2.3 Compare between OSI reference model and TCP/IP reference model 5.2.4 Compare 0á 0 08 45 5.3 Explains how network protocol enable effective use of the network system: 49

6 Explore a range of server types and justify the selection of a server, considering a given scenario reøarding cost and performanice OptITN1ZAfIOHI: ác 0.1 111111111111 11 1011110111121 50 CONCLUSION 2 2 122121 222121112122121 2221212212122 121112 1tr 5]

9 ⁄2200507.90I900 00 E CLE ELE EEL GEE Cte GE OE EeieE eee 52 I401001:650 ĐìchXỐaaaadđaadđadđaiiadadiiiiaiảảiảẳŸ4 53

IV

Trang 7

:BTEC 3

LIST OF TABLES AND FIGURES

Table 1 1 Compare LAN-MAN-WAN cc ccccccccetetetetenteteeteectetsctetecteneeersteeietestectsnssesesteereneeees 8

Table 1 2 Difference between software and hardware - HH HH HH HH HH HH cau 41

Table 1 3 Compare LAN, CAN, WAN, MAN of chapter Ì L1 1211212111111 0101122 43

Table 1 4 Compare Physical Topology and Logical Topology of chapter] 00 43

Table 1.5 Compare OSI and TCP/IP of chapter Ì c1 911 11111111111 14111 1111011110111 111 11x, 45 Table 1 6 Compare TCP and UDP of chapter Ì - c2 2111111 111111 1811111111111 11101 HH HH ng 49 Figure 1 1 ).-2)0 1.20 ) nh ố ố ố.ố 2

Figure 1, 2 Peer-to-Peer .e 3

Figure 1 3 Local Area Network oo ố e 4

Figure 1 4 Metropolitan Area Network eccentrics 5 Figure l 5 Wide Area NeLWOTK ch HH HH HH HH HH HH Hà HH TH HH 0 cán Hi 7 Figure 1 6 Layers and functions of each layer of the ST modelL - ác ccnn He 9 I0 0 2n 10

I0 0s o0 2n 11

l0 ) 2n n ốố ố ố ố 11

li 00000W0 vì an 12

Figure 1 11 Network layer 13

Figure 1, 12 Data link layer 13

I0 Ea i0 n6 .Ý 14 Figure 1 14 OSI divides network commmunication 1ntO 7 ÏaY€FS che 15

Trang 8

24 Partially Connected Mesh Topology of chapter Loo cece eee eteneneeeeneneesees 26

25 Full Connected Mesh Topology of chapter Lo cc ceeereeneetetetestsstenenesien 27

26 Hybrid Topology of chapter Ì ác 22c HH HH H11 n2 1121 HH kg 28

27 Block diagram of communication rules ce cece eects 29

36 Database Server of chapt€f 2 ị c1 1111211 1111 10H 37

37 Domain Name System of chapter 2 .- L1 1.111 1 101111112111121111 1110111101111 ru 37

38 Dynamic Host Configuration Protocol of elapter 2 ¿c1 11 SH 22x 38

vi

Trang 9

Wide Area Network

Campus Area Network

Metropolitan Area Network Transmission Control Protocol Internet Protocol

Dynamic Host Configuration Server File Transfer Protocol

Secured Shell Simple Mail Transfer Protocol

Docmain Name System

Post Office Protocol 3

Internet Message Access Protocol

Simple Network Manegement Protocol Hypertext Transfer Protocol over SSL/TLS International Organnization

American National Standards Institute Information Technology Industry Council Information Technology

Institute of Electrical and Electronics Engineer Electronic Industries Alliance

Televommunication Industries Association Telecommunication Standardization Sector European Telecommunications Standards Institute

vil

Trang 11

‘BTEC ‘BTEC

INTRODUCTION Networking piles important role in life Coming to this report, we will learn about networks, types

of networks, network devices.,

It will help us understand more deeply what is a network, how is a network defined? The process of building a network and how it works let's learn this article!

The report includes the following:

Chapter 1 Examine networking principles and their protocols (LO1)

1 Discuss the benefits and constraints of different network types and standards (P1)

2 Network topology & communication and Bandwidth requirements (P2)

CHAPTER 2: Explain networking devices and operations (LO2)

3 Discuss the operating principles of networking devices and server types (P3)

4 Discuss the inter-dependence of workstation hardware with relevant networking soft-

Trang 12

BIEC ‘BTEC

Alliance with 8ø Education _

Chapter 1 Examine networking principles and their protocols (LO1)

1 Discuss the benefits and constraints of different network types and standards

(P1)

1.1 Define network:

L1 A computer network is a group of computers and periphery- al bias connected to each other

through transmission mediums similar as crooked brace, optic fiber, electromagnetic swells,

infrared shafts, etc to partake data with each other Data is transmitted from one machine to

another in the form of double bits 0 and 1, which, after being converted into voltage or

electror magnetic swells, will be transmitted through the transmission medium be-low.tÐ L1 Client-Sever: is a computer network model that includes two main components: a client (client) and a server (server) In this model, the server is the place to store resources, install service programs, and perform client requests The client takes the role of sending the request

to the server Client includes computers and electronic devices in general

Trang 13

;BTE $

oO The Client server model allows the network to centralize applications and functions in one or more dedicated file services These machines become the heart of the system The operating system of the Client server allows users to share the same resources simultaneously, regardless of geographical location.©)

The client-server web model is a well-known model in computer networking, very widely applied, and is the model ofall existing websites An opposite model is the master-slave model, where the server (as the boss) sends data to the client (as the slave) regardless of whether the client needs it or not.)

The client/server model is as follows: Client/Server is the most general model, in fact, a server

can be connected to many other servers to work efficiently and faster When receiving a

request from a client, this server can send the request it has just received to another server such as a database server because it cannot handle this request by itself Servers can perform simple or complex tasks.)

A peer to peer (P2P) network is a distributed application architecture that partitions tasks or workloads among peers Peers are devices participating in the application with equal privileges They form a peer-to-peer network of nodes

i ¢—> F By F `

Figure 1 2 Peer-to-Peer

Performed Student: Nguyen Dinh Thai

Trang 14

SBTEC “BTEC

aioe wih fgg £00

Peers make a portion of their resources, such as processing power, disk storage, or network bandwidth, available to other participants without the need for central coordination of a stable server or host Peers are both providers and consumers of resources It differs from the traditional client-server model in that resource consumption and provision are split 1.2 Network type:

1.2.1 Local Area Network (LAN):

ñ LAN stands for Local Area Network, roughly translated as local computer network, this interface allows computers to connect to each other to work together and share data This connection is made via a LAN cable or Wifi (wireless) in a narrow space, so it can only be used in a limited range such as offices, homes, schools ®)

Figure 1 3 Local Area Network

Trang 15

‘BTEC $

12.11 Bemift:

Ol Highspeed

L1 Can run large online applications thanks to strong bandwidth

Oi Cheap and easy to manage

1.2.1.2 Constraint:

L1 Can only transmit in a certain space because the transmission line is short

1.2.2 Metropolitan Area Network (MAN):

Oo MAN (Metropolitan Area Network), also known as urban network, connects from many LANs

via cables, other transmission means The ability to connect in a large range such as in a town

or city, conscious.”

The MAN network model is often used mainly for organizations and businesses with many

branches and departments connected to each other

L1 Man network is often used for businesses because this model provides many types of services such as connecting lines via voice (voice), data (data), video (image), deploying applications easily, (1!)

Trang 16

L1 Popular with large bandwidth needs in big cities like Hanoi and Ho Chi Minh City

L1 There is a wide variety of services, maximized on modern bandwidth, service by providing ser- vice in the present and in the future, improving the broadband network service d=will be highly profitable network

1.2.2.2 Constaint:

L Complex management

LH Hiph cost

L1 The connection is quite large

L1 Have average bandwidth to run banking operations

1.2.3 Wide Area Network (WAN):

Oo WAN (Wide Area Network), also known as wide area network, is a combination of urban

networks including MAN and LAN through satellite equipment, optical cables, and power cables.12

L1 Wide area network was created to connect on a large scale across the country The protocol used in the WAN is TCP/IP, the bandwidth of the transmission varies depending on the installation location.“!9)

Trang 17

L1 It can both connect to private networks and create connections on a global scale

Ol ~—- Can transmit signal over long distances and unlimited

L1 User access rights can be controlled

Ol High security

LI Information can be shared easily and quickly

12.32 Constraint:

LI Weak connection because of low bandwidth

O High installation cost

L1 Difficult to manage

1.2.4 Compare LAN-MAN-WAN:

Criteri riteria LAN MAN WAN

Local Area Network | Metropolitan Area Wide Area Network Full name

Trang 18

‘BTEC $

Data transfer rate 10 to 100 Mbps larger than LAN and | 256Kbps to 2Mbps

smaller than WAN Bandwidth Great Medium Short

Cost Cheap Expensive Very expensive

Trang 19

SBTE 3

1.3 Network protocol definition:

1.3.1 Protocol:

H is anetwork protocol, a set of established rules whose primary task is to format, transmit, and receive data All these tasks will be done so that computer network devices (from server, router to end point) can communicate clearly with each other Regardless of the difference in infrastructure, design or basic standards, the Protocol protocol will still fully support so that communication can take place at its best

1.3.1.1 OST:

L1 Define: is an open systems interconnection reference model This model is created using the principle of layering, explaining the connection technique between computers and establishing the network protocol between those computers The OSI model is also known as the seven-tier model

LI The OSI model divides network communication into seven layers From layer 1 to layer 4 are

low-level layers, it performs the task of data movement Layers 5 to 7 are high-level layers, performing specific tasks and forwarding data.“©)

Trang 20

:BTEC 3

oO Layer 7 - Application Layer: The application layer is the top layer that defines the interface between the user and the OSI environment The application layer is used by end-user software such as web browsers and email clients It provides protocols that allow software to send, receive information, and present meaningful data to users.“!7)

Figure 1 7 Application layer

Layer 6 — Presentation Layer: ‘!®)

The presentation layer determines how the two devices will encode and compress the data so

that it is received correctly at the other end The presentation layer takes any data transmitted

by the application layer and prepares it for transmission across the session layer

This layer is primarily responsible for preparing the data so that it can be used by the application layer; In other words, layer 6 makes data visible to applications for use The presentation layer is responsible for translating, encoding, and compressing data

The two devices that are communicating may use different encoding methods, so layer 6 is responsible for translating the incoming data into a syntax that the receiving device's application layer can understand

If the devices are communicating over an encrypted connection, layer 6 is responsible for adding encryption at the sender end as well as decoding the encryption at the receiver end so that it can expose the application layer to possible data readable, unencrypted

Finally, the presentation layer is also responsible for compressing the data it receives from the application layer before delivering it to layer 5 This improves the speed and efficiency of communication by minimizing the amount of data that will be lost transmitted

Trang 21

avoid wasting resources.The session layer also synchronizes data transmission with

checkpoints.)

-= —=

Figure 1 9 Session layer

Trang 22

:BTEC 3

o Layer 4 — Transport Layer: 2°

Cl Layer 4 is responsible for end-to-end communication between two devices This includes taking data from the session layer and dividing it into pieces called segments before sending

it to layer 3 The transport layer on the receiving device is responsible for assembling the segments into data that layer session can be used

L1 The transport layer is also responsible for flow control and error control Flow control determines the optimal transfer rate to ensure that a sender with a fast connection does not overwhelm a receiver with a slow connection The transport layer performs error control at the receiving end by ensuring that the received data is complete and requesting

retransmission 1f not

Figure 1 10 Transport layer

o _Layer 3- Network Layer: The network layer is responsible for facilitating the transmission of

data between two different networks If two devices communicate on the same network, the network layer is unnecessary The network layer breaks down segments from the transport layer into smaller units, called packets, on the sender's device and reassembles these packets

on the receiving device The network layer also finds the best physical path for data to reach its destination; this is called routing (21)

Trang 23

:BTEC 3

Figure 1 11 Network layer

o Layer 2 — Data Link Layer: The data link layer is very similar to the network layer, except that

the data link layer facilitates the transfer of data between two devices on the SAME network The data link layer takes packets from the network layer and divides them into smaller pieces called frames Like the network layer, the data link layer is also responsible for flow control

and error control in intranet communication (the transport layer is only responsible for flow control and error control for communication between networks).?)

Trang 24

:BTEC 3

o Layer 1 — Physical Layer: This layer includes the physical devices involved in data transmission,

such as cables and switches This is also the layer where data is converted to a bit stream,

which is a sequence of 1s and 0s The physical layer of both devices must also agree on a signaling convention so that 1s can be distinguishable from zeros on both devices.??)

Figure 1 13 Physical layer

L1 Advantages:

o _ Divided into many small and simple floors

o Ease of development by standardizing network components

o Convert the interface between frequencies

o _ Data is transferred quickly and easily

Trang 25

7 Application a Ung dung 7

6 Presentation —+_—_—_——» | Biểu diễn dữ liệu 6

5 Session tt Kiểm soát nối 5

L1 Define: The TCP/IP model has a combination of distinct protocols The task of each protocol is

to help computers connect and transfer information back and forth TCP is a transmission control protocol and Internet Protoco (IP) is an internet protocol TCP/IP consists of four layers: the application layer, the network layer, the transport layer, and the physical layer.?”

Moving

up & Down Protocol Layers

Figure 1 15 TCP/IP Layered Model

Trang 27

BTEC ‘BTEC

Alliance with 8g Education

Transport Layer Functions

APPLICATION LAYER DATA The Transport layer

divides the data into Piece 1 Piece 2 Piece 3

pieces and adds a header

for delivery over the UDP Datagram Or TCP Segment

ea ee] | ea

Em] [Bi

(ports) * Flow control and congestion

management

Figure 1 17 Transport layer

o _Layer 2 - Network layer (Internet): Almost like the network layer of the OSI model Here, it is also defined as a protocol responsible for the logical transmission of data in the network The data segments will be packed (Packets) with the size of each packet appropriate to the

switching network it uses to transmit data At this time, the packets are inserted with a header containing information of the network layer and continue to be forwarded to the next layer The main protocols in the layer are IP, ICMP and ARP.2”)

Trang 28

SBTE 3

Encapsulation & De-encapsulation Receiving

Figure 1 18 Internet layer

o Layer 1 - Physical layer: It is a combination of the Physical layer and the data link layer of the OSI model Responsible for data transmission between two devices in the same network Here, data packets are encapsulated in a frame (called a Frame) and routed to the originally specified destination.2®)

CO ~—s- Popular protocols: FTP, HTTP, HTTPS are the three most used protocols of TCP/IP FTP is a protocol that allows computers to send unlimited data to one or more other computers HTTP has the function of insecure data transmission between the web user and the web server HTTPS is a protocol used for secure data transmission between web users and web servers.2”)

Trang 29

TCP/IP Core

Interface

Figure 1 19 The most common protocols of the TCP/IP model

Users can freely use it because it is not controlled by any organization

Has high adaptability

Can identify, extend and identify the best path

(30)

Internet Protocol Suite

Protocol Stack

Transmission Control Protocol (TCP)

Internet Protocol (IP)

Hypertext Transfer Protocol (HTTP)

File Transfer Protocol (FPT)

Secured Shell (SSH)

Telnet Protocol

Simple Mail Transfer Protocol (SMTP)

Domain Name System (DNS)

Post Office Protocol 3 (POP 3)

Internet Message Access Protocol (IMAP)

Trang 30

:BTEC ‘BTEC aaionce win 7ƒ cassen

Simple Nextwork Manegement Protocol (SNMP)

Hypertext Transfer Protocol over SSL/TLS (HTTPS)

List some standard organizations and standard names:Ở!

International Organnization (ISO): Probably the biggest standards organization in the world, the ISO is really a federation of standards organizations from dozens of nations In the net- working world, the ISO is best known for its OSI Reference Model

American National Standards Institute (ANSI): ANSI is the main organization responsible for coordinating and publishing computer and mformation technology standards in the United States While they are commonly thought of as developing and maintaining standards, they

do neither Instead, they oversee and accredit the organizations that actually create the stand-

ards, qualifying them as Standards Developing Organizations or SDOs ANSI also publishes the

standards documents created by the SDOs, and serves as the United States' representative to

the ISO

Information Technology Industry Council (ITIC): ITIC is a group of several dozen companies in the information technology (computer) industry ITIC is the SDO approved by ANSI to develop and process standards related to many computer-related topics It was formerly known as the Computer and Business Equipment Manufacturers Association (CBEMA)

National Committee for Information Technology (NCITS): A committee established by the ITIC

to develop and maintain standards related to the information technology world NCITS was formerly known by the name Accredited Standards Committee X3, Information Technology,

or more commonly, just X3 It maintains several sub-committees that develop and maintain standards for various technical subjects

Institute of Electrical and Electronics Engineer IEEE): The IEEE (pronounced “eye-triple-ee’’) is

a well-known professional organization for those in the electrical or electronics fields, including computers and networking IEEE's main claim to fame in the networking industry is the IEEE 802 Project, which encompasses many popular networking technologies including Ethernet

Electronic Industries Alliance (Electronic Industries Alliance) (EIA): The EIA is an international industry association that is best known for publishing electrical wiring and transmission

standards

Trang 31

:BTEC 3

L1 Televommunication Industries Association (TIA): The TIA is the communications sector of the EIA, and is responsible for developing communications standards Since communications, wiring and transmission are all related, and since the TIA and EIA organizations are also related, standards produced by the EJA or TIA are often labeled with the combined prefixes “EIA/TIA”

or “TIA/EIA”

L1 International Telecommunication Union-Telecommunication Standardization Sector (ITU-T): ITU-T is another large international body that develops standards for the telecommunications industry The ITU-T was formerly named the International Telephone and Telegraph

Consultative Committee or CCITT (the abbreviation was of the French version of the

organization's name, Comité consultatif international téléphonique et télégraphique.) L1 European Telecommunications Standards Institute (ETSD: An organization with members from dozens of countries both within and outside Europe that is dedicated to developing telecommunications standards for the European market (and elsewhere), ETSI is known for, among other things, regulating the use of radio bandwidth in Europe and developing standards such as HiperLAN

Trang 32

‘BTEC ‘BTEC

aaionce win 7ƒ cassen

2 Network topology & communication and Bandwidth requirements (P2)

2.1 Network topology definition: 8?

Oo is the arrangement of the various elements (links, nodes, etc.) of a computer network

Primarily, it is the topological structure of a computer network, and can be described in terms

of physics and logical

2.1.1 Definition of Physical Topology and Logical Topology: #3

L1 Physical Topology: is the arrangement of the various network elements, including equipment housing and cabling installation

Ll ~— Logical Topology: is dictates how data flows in the network Node distances, physical intersections, transmission rates, and/or signal types can vary between two networks even though their topologies may be identical

2.2 Examples of topology with diagrams:

Figure 1 20 Bus Topology

Li —_ Bus topology uses a single cable which connects all the included nodes The main cable acts

as a spine for the entire network One of the computers in the network acts as the computer server When it has two endpoints, it is known as a linear bus topology °”

Ngày đăng: 03/05/2025, 11:39