Asm1 Part1 Networking Pham Minh Hieu Bh01671
Asm1 Part1 Networking Pham Minh Hieu Bh01671
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 M1 M2 D1
Page | 1
Summative Feedback: Resubmission Feedback:
TABLE OF CONTENTS
INTRODUCTION ............................................................................................. 3
TABLE OF CONTENTS.................................................................................. 4
Page | 2
CHAPTER 1. EXAMINE NETWORKING PRINCIPLES AND THEIR
PROTOCOLS (LO1) ....................................................................................... 9
1.1 Discuss the benefits and constraints of different network types and
standards.(P1) .................................................................................................. 9
Page | 3
2.3.2 Assess common networking principles and how protocols enable
the effectiveness of networked systems(M1) LAN, CAN, MAN, WAN 24
2.2 Compare between OSI reference model and TCP/IP reference model......... 25
1.1.3. Router.............................................................................................. 28
CONCLUSION .............................................................................................. 38
REFERENCE ................................................................................................ 39
Page | 6
CHAPTER 1. EXAMINE NETWORKING PRINCIPLES AND THEIR
PROTOCOLS (LO1)
9
− Supporting innovation, learning, and problem-solving.
− Enhancing efficiency and productivity through the pooling of resources and
expertise.
❖ Benefits:
− Access to a broader range of knowledge, ideas, and perspectives.
− Opportunities for professional or business growth, and networking.
− Increased visibility, reputation, and influence within a specific industry or
community.
− Potential for finding new customers, partners, or suppliers.
− Enhanced problem-solving capabilities through collective intelligence and
diverse expertise.
❖ Communications:
− Networks facilitate communication through various channels, including online
platforms, email, video conferencing, or social media.
− Communication within networks often involves sharing ideas, updates,
feedback, and seeking advice or assistance.
− Networks enable real-time or asynchronous communication, allowing for flexible
and convenient interactions.
❖ Information sharing:
− Networks enable the sharing of industry-specific insights, news, trends, and
best practices among members.
− They can serve as a platform for disseminating information, research, or
educational resources to a broader audience.
❖ A computer network consists of three main parts:
− End Devices (Computer, Printer, Phone, Camera, ...)
− Intermediate Devices (Routers, Switches, Hub, ...)
− Connection Cables
1.1.2 Clients and Servers:
Client-server is a computer network model consisting of two main components: the
client (client) and the server (server). The server is the place to help store resources
as well as install service programs according to the client's requirements. In contrast,
the Client includes computers as well as general electronic devices that will send
requests to the server.[16]
10
Figure 2 Client and server
Advantage
− Server is not required.
− Management users are assigned individually to all computing devices.
− Anyone can use it without the need for advanced technical skills.
− Suitable for small businesses and home environments, existing P2P networks.
− The transport network is reduced.
Disadvantage
− Centralized backup cannot be performed with the given data on the machine.
− Performance is affected when multiple computing devices are accessed at the
same time.
− All users are responsible for the security of the network.
− No advanced security features are provided, only limited permissions.
1.1.3 Peer-to-peer Networks:
Peer - to – Peer Networks are a form of peer-to-peer network and computing devices
will have a similar role. Each individual device is allowed to provide resources directly
to other machines on the same system.
Figure 3. Peer-to-peer
11
▪ Advantage
− Server is not required.
− Management users are assigned individually to all computing devices.
− Anyone can use it without the need for advanced technical skills.
− Suitable for small businesses and home environments, existing P2P networks.
− The transport network is reduced.
▪ Disadvantage
− Centralized backup cannot be performed with the given data on the machine.
− Performance is affected when multiple computing devices are accessed at the
same time.
− Locating files can be quite a challenge as they are not organized in any
particular way; instead, they are stored on personal computers at random.
− All users are responsible for the security of the network.
− No advanced security features are provided, only limited permissions.
1.2 Network Types.
1.2.1 Local Area Networks (LAN)
Benefits:
− LANs are suitable for small networks spread across a small geographic area.
− They are cost-effective and easy to set up.
− LANs offer high-speed connectivity with low latency, making them ideal for
real-time applications like video conferencing.
− LANs provide a high level of security, with firewalls and other security
measures readily available for implementation.
Constraints:
− LANs can’t connect networks over long distances, and their range is limited to
the physical location they cover.
− They can’t handle a high volume of traffic and are not scalable beyond a
particular size.
− LANs require hardware and software maintenance, which could financially
burden small businesses.
12
Figure 4. Local Area Networks (LAN)[3]
1.2.2 Wide Area Networks (WAN):
Benefits:
− WAN connect businesses and organizations across different geographic
locations, making them ideal for large enterprises.
− WAN can handle a significantly higher volume of traffic and can connect to
the internet.
− WAN provides enhanced security features through the use of VPNs and
other security protocols.
− WANs offer scalability, and businesses can easily expand their network’s
capacity as they grow.
Constraints:
− WANs are more expensive to set up than LANs and require specialized
equipment.
− They are more complex to manage and require dedicated staff to handle
issues.
− WANs have higher latency and slower connectivity rates than LANs due to
their geographic distances and increased security risks due to the increased
number of access points.
13
Figure 5. Wide Area Networks (WAN)[4]
1.2.3 Metropolitan Area Network (MAN):
Benefits:
− Coverage of an entire city or metropolitan area.
− High-speed data transfer rates.
− Facilitates communication between locations in the same city.
− Enables cost-efficient sharing of network resources.
Constraints:
− Limited coverage area as compared to WAN.
− Costly to set up the infrastructure.
− Requires complex network management.
14
Figure 6. Metropolitan Area Network (MAN)[5]
15
1.3.2 Some common Network Protocols:
1.3.2.1 TCP/IP:
A protocol suite that governs how data is transmitted, routed, and received over the
internet
16
17
1.3.2.4 ICMP (Internet Control Message Protocol):
A protocol used for sending error messages and operational information about
network conditions. ICMP is used by network devices such as routers and firewalls to
communicate with each other.
18
2. Explain the impact of network topology, communication, and
bandwidth requirements. (P2)
2.1 Network topology definition.
A network topology (network model) is a way of organizing connections between
devices in a computer network. It defines how computers in a network are connected
so that data can be transmitted and received. Common types of network models
include the star model, ring model, lattice model, and tree model. Each model type
has its advantages and disadvantages, and depending on the network tool
requirements, the administrator can use one network model or combine several types
of network models to design the most suitable network.
19
Figure 13. Bus topology[10]
20
2.1.2. Ring Topology:
In a ring topology, each device is connected to two neighboring devices, forming a
loop. Data flows around the ring in only one direction, and each device acts as a
repeater to amplify the signal and send it to the next device. A ring topology provides
high bandwidth and fewer data collisions. However, if a device fails, the entire
network can go down
21
Figure 15. Star topology [12]
22
2.1.2.4 Tree Topology:
A tree topology is a combination of bus and star topologies. It has a central
root node, to which other nodes are connected. The network can grow horizontally by
adding more branches and vertically by adding more levels. A tree topology provides
high scalability and fault tolerance. However, it is complex to install and maintain.
• Advantage:
− Easy to deploy and manage with a clear and understandable network structure.
− Allows easy expansion of the network by adding new nodes.
− If a large node fails, only the nodes directly related to it are affected, the other
nodes are not affected.
• Disadvantages:
− The network is structured in a tree, so the transmission of data between nodes
that are not directly related to each other will have to go through many
intermediate nodes, resulting in reduced transmission speed and higher latency.
− If the root node or intermediate nodes are down, the entire network will be
affected and become inoperable.
23
Figure 16. Tree topology [13]
24
Figure 17. Mesh topology[14]
26
3. Compare common networking principles and how protocols enable
the effectiveness of networked systems. (M1)
3.1 Compare LAN, CAN, MAN, WAN
Full form Local Area Campus Metropolitan Wide Area
Network (LAN) Area Area Network Network (WAN)
Network (MAN)
(CAN)
Coverage area Within a small Covers Covers a Covers a large
geographical area, multiple metropolitan area geographic area
e.g. a building or buildings such as a city or a such as a
a campus within a county country or
campus or a multiple
city countries
Scope of Small scope - in a Shared range a Shared range up Unlimited
tethering room, office, school or a to 50 km sharing scope
campus. hospital
Data transfer Typically ranges Ranges Ranges from 100 Ranges from 1
speed from 10 from 100 Mbps to 1 Gbps Mbps to 100 Gbps
Mbps to 10 Mbps to 1
Gbps Gbps
Ethernet, Wi-Fi, Ethernet, Ethernet, Leased lines,
Technologies Bluetooth Wi-Fi, SONET, DWDM, satellite links,
used SONET, MPLS microwave links,
ATM fiber optic
cables
Expense Short High High Very high
Table 1. Compare LAN, CAN, MAN, WAN
27
Physical Topology Logical Topology
3.3 Compare between OSI reference model and TCP/IP reference model
Follows the vertical approach, where each Follows a horizontal approach, where each
layer interacts only with its layer interacts with multiple layers
adjacent layer
Layers in the OSI model are Physical, Layers in TCP/IP model are Network
Data Link, Network, Transport, Session, Interface Layer, Internet Layer, Transport
Presentation, Application Layer, Application Layer
Provides better interoperability between Provides better performance and simplicity
different systems in communication between
systems
Slower than TCP/IP model Faster than the OSI model
28
Appears after the Internet. Appeared before the Internet.
Table 3. Compare between OSI reference model and TCP/IP reference model
1. Discuss the operating principles of networking devices and server types. (P3)
1.1 Network devices
Network devices refer to the hardware components that are used to enable
communication and data exchange between different devices in a computer
network. These devices are responsible for facilitating the transfer of data and
information across the network, allowing users to communicate with each other
29
or access shared resources.
It's a physical device that connects other physical devices on a network Other
times, it functions as a translator or prevents suspicious network traffic.
1.1.1 Hub:
A hub is a network device used to connect multiple devices to a network. It operates
on the physical layer of the OSI model by forwarding signals to all connected devices.
Figure 18.HUB
• Advantage:
− Simple, easy to use and low price.
− Allows to connect multiple devices together on one network.
• Disadvantages:
− Inability to process multiple signals at once, resulting in reduced data transfer
rates when multiple devices attempt to transmit at the same time.
− Inability to categorize and control data packets, leading to data conflicts and
transmission errors.
− The inability to intelligently route the network leads to reduced network traffic
and slows down as the number of devices in the network increases.
− Security features and resource sharing are not supported, resulting in an
insecure and difficult network to manage.
1.1.2 Switch:
A switch is a network device that operates on the data link layer of the OSI model.
30
It is used to connect multiple devices to a network and selectively forward packets
only to the appropriate destination.
• Advantage:
− Capable of handling multiple signals at the same time, making the data transfer
rate higher than the hub.
− Capable of classifying and controlling data packets, helping to avoid data
conflicts and transmission errors.
− Has intelligent routing capability, which reduces network traffic and increases
transmission speed as the number of devices in the network increases.
− Supports security features such as VLANs, Access Control Lists (ACLs), and
Network Address Translation (NAT).
− Allows sharing of resources such as printers and hard drives.
• Disadvantages:
− More expensive than hubs and have more technical requirements in
configuration and operation.
− May lead to overload in some situations, resulting in reduced network
performance.
− Inability to connect networks of different structures, therefore not suitable for
complex network environments.
1.1.3. Router:
A router is a network device that operates on the network layer of the OSI model.
It is used to connect multiple networks and route data between them.
31
Figure 20. Router
• Advantage:
− Capable of connecting networks of different architecture and working between
different network protocols.
− Capable of intelligent routing based on information about IP address, protocol
type and other requirements to deliver packets to the correct destination.
− More security compared to switches and hubs, such as VPN connections and
firewall features.
− Enables sharing of resources between networks, such as printers, hard drives
and Internet connections.
• Disadvantages:
− More expensive than switches and hubs, and have higher technical
requirements in configuration and operation.
− Requires high network knowledge, difficult to use for beginners or no experience
in the field.
− May lead to overload in some situations, resulting in reduced performance of
the network.
− Data transfer speed may be slower than switch due to packet routing.
1.1.4 Firewall:
A firewall is a device that filters inbound and outbound traffic according to
established security policies. It helps protect networks from unauthorized access,
malware, and other threats.
• Advantage:
− Provides security features for the network, helping to prevent attacks
from outside, such as viruses, malicious code, DDOS attacks, etc.
− Capable of controlling traffic entering and leaving the network, helping
network administrators monitor and control attacks.
− Allows users to set up flexible access rules to protect information and
32
prevent unauthorized employees from accessing important documents.
− There are many types of firewalls that have different features, allowing
users to customize and choose according to their needs.
• Disadvantages:
− Sometimes the firewall can block the wrong amount of traffic to some
legitimate websites or applications.
− Can reduce network speed if overloaded, requiring administrators to pay
attention to the configuration and performance of the firewall.
− Firewalls cannot prevent attacks from within the network, so it needs to
be combined with other safety measures to ensure network integrity.
1.1.5 Bridge
Devices that connect two different networks, analyzing incoming network traffic
and forwarding it only to the necessary segments.
− Structure: Bridge has 2 or more ports, each port is used to connect with other
devices on the network.
− Function: Connect two networks together and allow data transfer between them.
• Advantage
− Improves network performance by blocking unnecessary traffic and increasing
security.
33
− Connects two networks together and allows data transmission between them.
• Disadvantages:
− The cost is higher than the repeater and can not connect multiple networks
together.
− The protocol cannot be switched between two different networks.
1.1.6 Repeater
• Features: Repeater is a device that connects two segments of the network and
enhances the signal for further transmission. It receives the signal from the input and
outputs it with more power.
• Structure: Repeater has 2 or more ports, each port is used to connect to other
devices on the network.
• Function: Enhance the signal and range of network.
• Advantage:
− Simple, easy to use and cheap.
− Enhances Wi-Fi range and helps connect multiple devices at once.
• Disadvantages:
− Multiple signals cannot be processed at the same time and the signals degrade
when going through many repeaters.
− Inability to switch protocols between two different networks.
34
• Advantage:
− Help protect network security and prevent threats from accessing unsafe
websites or apps.
− Reduces network load by blocking unnecessary traffic.
• Disadvantages:
− Requires quite high cost to deploy and maintain.
− Content filtering software can cause problems with complicated or unknown
websites or applications, and can cause discomfort for users with limited access
to content.
36
2. Discuss the interdependence of workstation hardware with relevant
networking software.(P4)
38
(SSDs), or other storage devices for efficient data management.
− Input devices: Workstations may come with specialized input devices such as
graphic tablets, high-precision mice, or keyboards designed for specific tasks.
− Networking: Workstations may have specialized networking hardware such as
network interface cards (NICs) for faster and more reliable networking
performance.
2.4 Define networking software
• Define networking software
Networking software refers to a category of computer programs and
applications that facilitate communication and data exchange between multiple
devices or computer systems within a network infrastructure. It enables devices
to connect, share, and transfer information, resources, and services over a
network. Networking software includes various components such as protocols,
drivers, servers, and applications that help manage network connections, data
transmission, security, and overall network operations. It plays a crucial role in
establishing and maintaining efficient and reliable communication between
devices or systems in a networked environment.
• Network software functions
− User management allows administrators to add or remove network users.
− This is particularly useful when hiring or relieving
− File management allows administrators to decide where data is stored and to
control user access to that data.
− Access allows users to enjoy uninterrupted access to network resources.
− Network security systems help administrators to secure and prevent violations.
2.5 Discuss and explain the interdepencies of workstation hardware with networking
software.
❖ The interdependence between client hardware and network software is critical to
the efficient operation of a computer network.
− Hardware Capabilities: Workstation hardware, such as network interface cards
(NICs), routers, switches, and cables, provides the physical infrastructure required for
the network. The capabilities of these hardware components, such as data transfer
speeds, connectivity options (e.g., Ethernet, Wi-Fi), and supported network protocols,
directly affect performance and compatibility of network software.
− Drivers and Firmware: Client hardware relies on drivers and firmware to
39
communicate with network software. Drivers act as an intermediary between software
and hardware, allowing them to work seamlessly together. It is important to have up-
to-date drivers to ensure optimal performance and compatibility with networking
software.
− Network configuration: Network software, such as operating system network
stacks, firewalls, and virtual private network (VPN) clients, depends on the underlying
hardware configuration. Software must be able to detect and use available hardware
resources efficiently. This includes the ability to discover network interfaces, configure
IP addresses, manage network devices and establish network connections.
− Performance optimization: Performance of network software can be affected by
the capabilities of workstation hardware. For example, high-speed NICs and powerful
processors can enhance network throughput and reduce latency, resulting in better
overall network performance. On the other hand, outdated or inadequate hardware can
limit the software's ability to handle large amounts of network traffic or provide
advanced network features.
− Compatibility and standards: Network hardware and software must adhere to
industry standards and protocols to ensure interoperability. Compatibility issues can
arise if hardware components do not support the necessary protocols or if the software
is not designed to work with specific hardware configurations. It's important to choose
hardware and software that are compatible with each other to avoid compatibility
issues.
❖ Example:
Suppose a workstation is equipped with a high-speed NIC. The networking software,
in this case, should be capable of utilizing the full potential of the NIC to establish and
maintain network connections efficiently. The NIC may have advanced features like
hardware acceleration or offloading capabilities, which require corresponding support
in the networking software. If the software lacks the necessary drivers or capabilities,
the workstation's hardware potential may not be fully utilized, resulting in decreased
network performance.
3. Explore a range of server types and justify the selection of a server, considering
a given scenario regarding cost and performance optimization(M2)
4. Considering a given scenario, identify the topology protocol selected for the efficient
utilization of a networking system.(D1)
CONCLUSION
After finishing this report, my understanding of networking improved significantly. I
now comprehend how to construct a fundamental algorithm, execute a program, and
understand the life cycle of an algorithm. Additionally, I have learned how to create a
flow chart to visually represent the functionality of an algorithm. Programming is truly
fascinating! Thanks to this knowledge, I have gained insights into the inner workings
of the devices in our surroundings. This subject is captivating and extraordinary. A
heartfelt thank you to my mentor for guiding me through this journey.
REFERENCE
[6] [8] ICT Sài Gòn. (2023a, May 11). Giao Thức Mạng Là Gì ? 14 Giao Thức Mạng Phổ Biến
Nhất. ICT-SAIGON. https://ictsaigon.vn/14-giao-thuc-mang-pho- bien-dang-su-
dung-hien-nay
[7] Menon, K. (2023a). The Best Guide To Understanding What Is TCP/IP Model.
Simplilearn.com. https://www.simplilearn.com/tutorials/cyber-security-
tutorial/what-is-tcp-ip-model
[5]Nhất D. (2020a). LAN, MAN, WAN là gì? Tổng quan về mạng LAN, MAN và WAN.
MesiDas. https://mesidas.com/lan-man-wan/
[2]Thuy, P. T. (n.d.-a). Truyền dữ liệu là gì, tốc độ truyền dữ liệu, giao thức truyền dữ liệu?
https://bkaii.com.vn/tin-tuc/301-truyen-du-lieu-la-gi-toc-do-truyen-du-lieu- giao-
thuc-truyen-du-lieu
[3] [4] Williams, L. (2023a). Types of Computer Network: What are LAN, MAN, and
WAN? Guru99. https://www.guru99.com/types-of-computer-network.html
[9] Đạt, Đ. (2023). Tìm hiểu về HTTP (HyperText Transfer Protocol). Viblo.
https://viblo.asia/p/tim-hieu-ve-http-hypertext-transfer-protocol-bJzKmgewl9N
[10] [11][12] [13] [14.]Network Topologies. Definition, Types, Examples and Importance -
zenarmor.com. (n.d.).
https://www.zenarmor.com/docs/network-basics/what-is-network-topology
[15] Rahman, M. (2022, September 23). Network Devices : Hub | Switch | Router | Bridge |
Gateway. EduPointBD. https://www.edupointbd.com/network-devices- ev/
[16] Cloud F. (2023, March 9). Client Server là gì? Tìm hiểu mô hình Client Server từ A - Z.
FPT Smart Cloud. https://fptcloud.com/client-server/
The Most Common Types of Network Devices. (n.d.). Retrieved June 15, 2023, from
https://www.lepide.com/blog/the-most-common-types-of-network-devices/
Indeed Editorial Team. (2023). Types of Computer Servers and How They Function.
Indeed.com. https://www.indeed.com/career-advice/career-
development/types-of-servers