LIST OF THE ACRONYM Hyper Text Transfer Protocol Secure The Internet Architecture Board Institute of Electronics and Electrical Engineers Internet Research Task Force Internet Protocol I
BASIC KNOWLEDGE Q.21 H11 1111111111111112111 1111111 11H re, 2 1 Examine networking princiIples and therr protocols (LÕ Í) 222v sesre 2
Discuss the benefits and constraints of different network types and standards (P1) 2
Explain the impact of network topology, communication and bandwidth require
1.3 Compare common networking principles and how protocols enable the effectiveness of networked systems (M1)
Chapter 2: Basic components of network
2 Explain networking devices and operations (LO2)
2.1 Discuss the operating principles of networking devices and server types (P3)
2.2 Discuss the inter-dependence of workstation hardware with relevant networking software (P4)
Performed by: Nguyen Cao Dong Huy
1 Examine networking principles and their protocols (LO1)
1.1 Discuss the benefits and constraints of different network types and standards (P1)
1.1.1 The benefits and constraints of different network types:
- A computer network is an organized collection of computers connected through network devices and media (network protocol, transmission environment), and these computers communicate with each other et
+ Local Area Network (LAN) + Wide Area Network (WAN)
- The following are examples of othertypes of networks:
+ Metropolitan Area Network (MAN) —*# i+ Wireless LAN (WLAN) = at Ae vàn t + Storage Area Network (SAN) "can
+ Private are networks (PAN) + Campus Area Network (CAN) + Virtual private network (VPN) a ¡6n Kĩ
Campus Area Network(CAN) Home Area Network(HAN)
+ Generative adversarial network (GAN) Figure 1-2: Types of networks + Passive Optical Local Area Network (POLAN) o Types of servers:
Performed by: Nguyen Cao Dong Huy me
- The client-server model is a distributed application structure that divides tasks or labor between servers, who offer a resource or service, and clients, who request that service
- When a client computer submits a data request to the server via the internet, the server acknowledges the request and returns the data packets requested to the client
- Clients do not share any of their assets with one another
A client refers to an individual or organization that utilizes a specific service, functioning as a computer (Host) in the digital realm This entity is capable of receiving information or accessing services provided by servers.
Servers are essential components in the digital landscape, acting as distant computers that provide access to data and various online services They play a crucial role in delivering information efficiently and effectively to users.
- Email, the World Wide Web, and other client-server models are examples
- So, the Client requests something, and the Server fulfills the request as long as it is stored in the database
LI Peer-to-peer model (P2P model)
- Anon-hierarchical system of trade, transfer, or transmission is the peer-to-peer model (P2P model)
Performed by: Nguyen Cao Dong Huy 3
- The P2P model may be used to replace a traditional top-down hierarchical system or to help build a new one
- Any party can start a session, and any computing device on the network can act as a server or a client
- Peer-to-peer education is a collaborative paradigm in which students act as both students and instructors, exchanging information and assisting one another in mastering specific areas of difficulty
A Local Area Network (LAN) is an internal network that connects computers, enabling them to share, send, and receive data quickly This efficient connection facilitates rapid information exchange within a limited scope, making it ideal for individuals, households, and educational institutions.
Performed by: Nguyen Cao Dong Huy
- The devices may exchange data, print to shared printers, and be accessed and controlled
- LANs are being used in restaurants, coffee shops, retailers, and even residences, in addition to companies and schools
Figure 1-4: Local area network The constraints:
- The range of an intemet or Wi-Fi signal is limited
- Invasion of privacy, The LAN administrator has access to each LAN user's personal data files and can inspect them
- Because there are issues with the local area network, a LAN Administrator is needed
To keep these concerns under check, a LAN Administrator is necessary
Performed by: Nguyen Cao Dong Huy
XO) Wide Area Network (WAN):
- A wide-area network (W AN) is a group of interconnected local-area networks
The Internet stands as the largest Wide Area Network (WAN), functioning as a network of networks Today, numerous WANs exist, each tailored for specific use cases that significantly impact various aspects of contemporary life.
- In general, the WAN spans enormous geographical areas (1000kms or more than that)
Users can quickly access updated files and data from servers through a Wide Area Network (WAN) Companies can efficiently manage file updates on these servers, ensuring that all connected devices receive the latest information almost instantaneously.
One of the key advantages of Wide Area Networks (WANs) is their guaranteed uptime, which is a crucial aspect of the Service Level Agreement (SLA) provided by WAN providers These providers typically offer uptime assurances on a weekly, quarterly, or annual basis, ensuring reliability across various industries This commitment to consistent performance makes WANs a dependable choice for businesses seeking uninterrupted connectivity.
Performed by: Nguyen Cao Dong Huy alee ‘BTEC
- Because of their geographic breadth, WANs are by default sophisticated
- There is no sufficient energy supply or line structure in certain regions, particularly in distant locales
- High installation cost and complicated network management
- The most difficult task of all is to keep a data center running 24 hours a day It isa full-time task that requires network administrators and technicians’ support
A metropolitan area network (MAN) is a type of computer network designed to connect multiple computers within a specific urban area, which can include large cities, several towns, or extensive regions with numerous buildings MANs are larger in scope than local area networks (LANs) but smaller than wide area networks (WANs).
A Metropolitan Area Network (MAN) links multiple local area networks (LANs) to form a network that is larger than a LAN but smaller than a wide area network (WAN) This type of network is established by connecting several LANs through point-to-point connections, facilitating communication and data sharing within a specific geographic area.
Performed by: Nguyen Cao Dong Huy 7
-To increase data transfer speed, MAN often includes the addition of fiber optic cables
- Cost-effective: Connecting MAN to WAN 1s less costly The data efficiency provided by MAN 1s excellent
- Sending emails to local recipients: Local emails may be sent quickly and for free on
- Faster than the WAN: Because MAN employs fiber optics, data speeds can often exceed 1000 Mbps Files and databases may be moved quickly
- It's simple to go from LAN to MAN: MAN is a quicker method of connecting two fast LANs
This is related to the speed with which links may be configured
- High Level of Security: MAN has a higher level of security than WAN ®% The constraints:
- Difficult to deal with: It gets more difficult to control MAN as it grows in size This is due to a security issue as well as additional settings
Hackers are more likely to target Metropolitan Area Networks (MAN) than Local Area Networks (LAN), increasing the risk of data exposure While data protection is possible, it requires highly skilled personnel and advanced security measures to effectively safeguard against such attacks.
To successfully set up the system, it is essential to have skilled technical professionals, including network administrators and debuggers, who can accurately configure the MAN for installation.
Li Protocols are a collection of established rules that dictate the formatting, transmission, and reception of data, enabling seamless communication between various computer network devices, including servers, routers, and endpoints These protocols ensure interoperability despite differences in infrastructure, design, or fundamental standards among the devices.
(| Here are some common protocols:
The Internet Protocol Suite, often known as the TCP/IP protocol suite, is a comprehensive collection of protocols that forms the foundational stack for Internet functionality.
- Protocol Stack: 1s a complete set of protocol layers that work together to provide networking capabilities
- Transmission Control Protocol (TCP): is the core protocol of the Internet Protocol
Performed by: Nguyen Cao Dong Huy
The Transmission Control Protocol (TCP) is a key component of the Internet Protocol Suite, commonly known as TCP/IP It enables the reliable delivery of octet streams (8-bit data blocks) over IP networks, with its primary feature being the capability to issue commands and check for errors.
- Internet Protocol (IP): is the main protocol in the Internet protocol suite for forwarding data over a network The routing function of Internet Protocol essentially helps establish the Internet
- Hypertext Transfer Protocol (HTTP): is the data communication platform for the
World Wide Web Hypertext is structured text that uses hyperlinks between nodes containing the text
- File Transfer Protocol (FTP): is the most common protocol used for file transfer purposes on the Internet and in private networks
Secure Shell (SSH) is the main method for securely managing network devices through command-line access It serves as a secure alternative to Telnet, which lacks support for secure connections.
- Domain Name System (DNS): used to convert domain names to IP addresses
The DNS hierarchy consists of a root server, a TLD, and an authoritative server
- Internet Message Access Protocol (IMAP): is another major protocol used to get mail from the server IMAP does not remove content from the server's mailbox
- POP3 protocol: is one of the two main protocols used to retrieve mail from the
Internet POP 3 is very simple because this protocol allows the client to get the complete content from the server's mailbox and delete the content from that server
- Hypertext Transfer Protocol over SSL/TLS (HTTPS): used with HTTP to provide similar services, but with a secure connection provided by SSL or TLS
- Networking standards provide the criteria for data communication that are required for networking technologies and processes to function together
Performed by: Nguyen Cao Dong Huy
- Standards assist in the creation and maintenance of open markets by allowing providers to compete on the basis of product quality while remaining compatible with existing market items
| The following are some of the well-known standard organizations:
- International Standards Organization (ISO): is an international standards-setting body that sets trade and industry standards worldwide ISO was established on 23
February 1947 The ISO Secretariat is located in Geneva, Switzerland As of 2018, ISO has 161 national members
The International Telecommunication Union (ITU) is a specialized agency of the United Nations focused on the standardization of global telecommunications Established on May 17, 1865, in Paris, France, ITU officially became a UN specialized organization on July 15, 1947.
- The Internet Society (ISOC): is an international, non-profit, non-governmental organization composed of professionally qualified members This organization focuses on: standards, education and policy issues
BASIC COMPONENTS OF NETWORK He 21
Discuss the inter-dependence of workstation hardware with relevant networking
Performed by: Nguyen Cao Dong Huy
1 Examine networking principles and their protocols (LO1)
1.1 Discuss the benefits and constraints of different network types and standards (P1)
1.1.1 The benefits and constraints of different network types:
- A computer network is an organized collection of computers connected through network devices and media (network protocol, transmission environment), and these computers communicate with each other et
+ Local Area Network (LAN) + Wide Area Network (WAN)
- The following are examples of othertypes of networks:
+ Metropolitan Area Network (MAN) —*# i+ Wireless LAN (WLAN) = at Ae vàn t + Storage Area Network (SAN) "can
+ Private are networks (PAN) + Campus Area Network (CAN) + Virtual private network (VPN) a ¡6n Kĩ
Campus Area Network(CAN) Home Area Network(HAN)
+ Generative adversarial network (GAN) Figure 1-2: Types of networks + Passive Optical Local Area Network (POLAN) o Types of servers:
Performed by: Nguyen Cao Dong Huy me
- The client-server model is a distributed application structure that divides tasks or labor between servers, who offer a resource or service, and clients, who request that service
- When a client computer submits a data request to the server via the internet, the server acknowledges the request and returns the data packets requested to the client
- Clients do not share any of their assets with one another
A client refers to an individual or organization that utilizes a particular service, acting as a computer (Host) in the digital realm This entity is capable of receiving information and accessing services provided by servers, highlighting the essential relationship between clients and service providers in the online environment.
Servers are essential components in the digital landscape, acting as remote computers that provide access to information and various services They play a crucial role in delivering data, ensuring seamless connectivity and functionality across the internet.
- Email, the World Wide Web, and other client-server models are examples
- So, the Client requests something, and the Server fulfills the request as long as it is stored in the database
LI Peer-to-peer model (P2P model)
- Anon-hierarchical system of trade, transfer, or transmission is the peer-to-peer model (P2P model)
Performed by: Nguyen Cao Dong Huy 3
- The P2P model may be used to replace a traditional top-down hierarchical system or to help build a new one
- Any party can start a session, and any computing device on the network can act as a server or a client
- Peer-to-peer education is a collaborative paradigm in which students act as both students and instructors, exchanging information and assisting one another in mastering specific areas of difficulty
A Local Area Network (LAN) is an internal network that connects computers, enabling rapid data sharing and communication This type of network is typically used in limited settings, such as homes, schools, and small businesses, to facilitate efficient information exchange.
Performed by: Nguyen Cao Dong Huy
- The devices may exchange data, print to shared printers, and be accessed and controlled
- LANs are being used in restaurants, coffee shops, retailers, and even residences, in addition to companies and schools
Figure 1-4: Local area network The constraints:
- The range of an intemet or Wi-Fi signal is limited
- Invasion of privacy, The LAN administrator has access to each LAN user's personal data files and can inspect them
- Because there are issues with the local area network, a LAN Administrator is needed
To keep these concerns under check, a LAN Administrator is necessary
Performed by: Nguyen Cao Dong Huy
XO) Wide Area Network (WAN):
- A wide-area network (W AN) is a group of interconnected local-area networks
The Internet stands as the largest Wide Area Network (WAN), functioning as a network of networks Today, a variety of WANs exist, each tailored for specific use cases that impact nearly every aspect of contemporary life.
- In general, the WAN spans enormous geographical areas (1000kms or more than that)
Users can quickly access updated files and data from servers through a Wide Area Network (WAN) This allows companies to efficiently update files on servers, ensuring that all connected devices receive the latest information almost instantaneously.
One of the key advantages of Wide Area Networks (WANs) is their ability to provide guaranteed uptime WAN providers typically offer Service Level Agreements (SLAs) that ensure uptime metrics are met on a weekly, quarterly, or annual basis This reliability is crucial across various industries, ensuring that businesses can operate smoothly without interruptions.
Performed by: Nguyen Cao Dong Huy alee ‘BTEC
- Because of their geographic breadth, WANs are by default sophisticated
- There is no sufficient energy supply or line structure in certain regions, particularly in distant locales
- High installation cost and complicated network management
- The most difficult task of all is to keep a data center running 24 hours a day It isa full-time task that requires network administrators and technicians’ support
A metropolitan area network (MAN) is a type of computer network that links computers across a large urban area, which can include a major city, multiple cities, or towns within a vast region containing numerous buildings It is designed to be larger than a local area network (LAN) but smaller than a wide area network (WAN).
A Metropolitan Area Network (MAN) links multiple local area networks (LANs) to create a network that is larger than a LAN but smaller than a wide area network (WAN) This is achieved by establishing point-to-point connections between various LANs, enabling efficient communication and resource sharing within a defined geographic area.
Performed by: Nguyen Cao Dong Huy 7
-To increase data transfer speed, MAN often includes the addition of fiber optic cables
- Cost-effective: Connecting MAN to WAN 1s less costly The data efficiency provided by MAN 1s excellent
- Sending emails to local recipients: Local emails may be sent quickly and for free on
- Faster than the WAN: Because MAN employs fiber optics, data speeds can often exceed 1000 Mbps Files and databases may be moved quickly
- It's simple to go from LAN to MAN: MAN is a quicker method of connecting two fast LANs
This is related to the speed with which links may be configured
- High Level of Security: MAN has a higher level of security than WAN ®% The constraints:
- Difficult to deal with: It gets more difficult to control MAN as it grows in size This is due to a security issue as well as additional settings
Hackers pose a greater threat to Metropolitan Area Networks (MAN) compared to Local Area Networks (LAN), increasing the risk of data exposure To safeguard sensitive information, organizations must employ advanced security measures and rely on highly skilled personnel for effective protection.
To successfully set up the system, it's essential to have skilled technical professionals, including network administrators and debuggers, who are capable of properly configuring the MAN for installation.
Li Protocols are a comprehensive set of rules that dictate the formatting, transmission, and reception of data, enabling seamless communication between various computer network devices, including servers, routers, and endpoints These protocols ensure compatibility despite differences in infrastructure, design, or foundational standards, facilitating efficient data exchange across diverse systems.
(| Here are some common protocols:
The Internet Protocol Suite, commonly known as the TCP/IP protocol suite, comprises a set of protocols that form the foundational stack for Internet functionality.
- Protocol Stack: 1s a complete set of protocol layers that work together to provide networking capabilities
- Transmission Control Protocol (TCP): is the core protocol of the Internet Protocol
Performed by: Nguyen Cao Dong Huy
The Transmission Control Protocol (TCP) is an essential component of the Internet Protocol Suite, commonly known as TCP/IP It ensures the reliable delivery of octet streams (8-bit data blocks) across IP networks A key feature of TCP is its capability to issue commands and perform error checking, enhancing data transmission reliability.
- Internet Protocol (IP): is the main protocol in the Internet protocol suite for forwarding data over a network The routing function of Internet Protocol essentially helps establish the Internet
- Hypertext Transfer Protocol (HTTP): is the data communication platform for the
World Wide Web Hypertext is structured text that uses hyperlinks between nodes containing the text
- File Transfer Protocol (FTP): is the most common protocol used for file transfer purposes on the Internet and in private networks
Secure Shell (SSH) is the main protocol utilized for securely managing network devices through command-line access It serves as a secure alternative to Telnet, which lacks support for encrypted connections, ensuring safer communication and management of network resources.
- Domain Name System (DNS): used to convert domain names to IP addresses
The DNS hierarchy consists of a root server, a TLD, and an authoritative server
- Internet Message Access Protocol (IMAP): is another major protocol used to get mail from the server IMAP does not remove content from the server's mailbox
- POP3 protocol: is one of the two main protocols used to retrieve mail from the
Internet POP 3 is very simple because this protocol allows the client to get the complete content from the server's mailbox and delete the content from that server
- Hypertext Transfer Protocol over SSL/TLS (HTTPS): used with HTTP to provide similar services, but with a secure connection provided by SSL or TLS
- Networking standards provide the criteria for data communication that are required for networking technologies and processes to function together
Performed by: Nguyen Cao Dong Huy
- Standards assist in the creation and maintenance of open markets by allowing providers to compete on the basis of product quality while remaining compatible with existing market items
| The following are some of the well-known standard organizations:
- International Standards Organization (ISO): is an international standards-setting body that sets trade and industry standards worldwide ISO was established on 23
February 1947 The ISO Secretariat is located in Geneva, Switzerland As of 2018, ISO has 161 national members
The International Telecommunication Union (ITU) is a specialized agency of the United Nations focused on the standardization of international telecommunications Established on May 17, 1865, in Paris, France, the ITU officially became a UN specialized organization on July 15, 1947.
- The Internet Society (ISOC): is an international, non-profit, non-governmental organization composed of professionally qualified members This organization focuses on: standards, education and policy issues