0% found this document useful (0 votes)
47 views52 pages

Asm1 Part1 Networking Pham Minh Hieu Bh01671

Uploaded by

phamhieu0977
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views52 pages

Asm1 Part1 Networking Pham Minh Hieu Bh01671

Uploaded by

phamhieu0977
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

ASSIGNMENT 1 FRONT SHEET

Qualification TEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking

Submission date Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name PHAM MINH HIEU Student ID BH01671

Class SEO07203 Assessor name NGUYEN THI HONG HANH

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Grading grid

P1 P2 P3 P4 M1 M2 D1

Page | 1
 Summative Feedback:  Resubmission Feedback:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:

TABLE OF CONTENTS
INTRODUCTION ............................................................................................. 3

TABLE OF CONTENTS.................................................................................. 4
Page | 2
CHAPTER 1. EXAMINE NETWORKING PRINCIPLES AND THEIR
PROTOCOLS (LO1) ....................................................................................... 9

1.1 Discuss the benefits and constraints of different network types and
standards.(P1) .................................................................................................. 9

1.1.1 Role of networks ................................................................................. 9

1.1.3 Peer-to-peer Networks: ..................................................................... 11

1.2 Network Types ................................................................................................ 12

1.2.1 Local Area Networks (LAN)............................................................... 12

1.2.2 Wide Area Networks (WAN).............................................................. 13

1.2.3 Metropolitan Area Network (MAN) .................................................... 14

1.3 Protocol And Standards ................................................................................. 15

1.3.1 Network protocol definition ................................................................ 15

1.3.2 Some common Network Protocols: ................................................... 16


1.3.2.1 TCP/IP ........................................................................................... 16
1.3.2.2 DNS (Domain Name System) ........................................................ 16
1.3.2.3 HTTP (Hypertext Transfer Protocol) .............................................. 16
1.3.2.4 ICMP (Internet Control Message Protocol) .................................... 17

1.3.3 Some Common Network Standards .................................................. 17

1.3.4 Explain the impact network topologies have on communication and


bandwidth requirements(P2) .............................................................. 18

1.3.5 Bus Topology: ................................................................................... 18

2.1.2. Ring Topology:................................................................................ 19

2.1.3 Star Topology: .................................................................................. 19

2.1.2.4 Tree Topology................................................................................ 20

2.1.2.5 Mesh Topology .............................................................................. 21

2. 2 Communication and Bandwidth.................................................................... 22

2.2.1 Define commutations in terms of networking ..................................... 22

2.2.2 Rules of Communication ................................................................... 23

2.3 Bandwidth ....................................................................................................... 23


2.3.1 Bandwidth Requirements for the Networks ....................................... 23

Page | 3
2.3.2 Assess common networking principles and how protocols enable
the effectiveness of networked systems(M1) LAN, CAN, MAN, WAN 24

2.1 Compare physical topologies and logical topologies................................... 24

2.2 Compare between OSI reference model and TCP/IP reference model......... 25

2.3 Compare TCP between UDP........................................................................... 26

CHAPTER 2. Explain networking devices and operations. (LO2) ............ 27

1. Discuss the operating principles of networking devices and


server types. (P3) ................................................................................................... 27

1.1 Network devices ................................................................................ 27

1.1.1 Hub ................................................................................................... 27

1.1.2 Switch ............................................................................................... 27

1.1.3. Router.............................................................................................. 28

1.1.4 Firewall: ............................................................................................ 29

1.1.5 Bridge ............................................................................................... 30

1.1.6 Repeater ........................................................................................... 31

1.1.7 Content filter ..................................................................................... 31

1.2 Server types ....................................................................................... 32

1.2.1 File Server ........................................................................................ 32

1.2.2. Web Server...................................................................................... 32

1.2.3. Mail Server ...................................................................................... 33

1.2.4. Database Server.............................................................................. 33

2. Discuss the interdependence of workstation hardware with relevant


networking software.(P4)....................................................................................... 33

2.1 Explain what is meant by interdependencies ................................................ 34

2.2 Give examples of interdependency ............................................................... 34

2.3 Define workstation hardware ......................................................................... 34

2.4 Define networking software ........................................................................... 35

2.5 Discuss and explain the interdepencies of workstation hardware with


networking software............................................................................................. 35

3. Explore a range of server types and justify the selection of a server,


Page | 4
considering a given scenario regarding cost and performance
optimization(M2)..................................................................................................... 36

4. Considering a given scenario, identify the topology protocol selected


for the efficient utilization of a networking system.(D1) ...................................... 36

CRITICAL EVALUATION ............................................................................. 37

CONCLUSION .............................................................................................. 38

REFERENCE ................................................................................................ 39

LIST OF TABLE AND FIGURE


Figure 1.Computer network[2] ...................................................................................... 9
Figure 2 Client and server .......................................................................................... 11
Figure 3. Peer-to-peer................................................................................................ 11
Figure 4. Local Area Networks (LAN)[3] ..................................................................... 13
Figure 5. Wide Area Networks (WAN)[4].................................................................... 14
Figure 6. Metropolitan Area Network (MAN)[5] .......................................................... 15
Figure 7. Definition network protocol[6] ...................................................................... 15
Figure 8. TCP/IP [7] ................................................................................................... 16
Figure 9. DNS [8] ....................................................................................................... 16
Figure 10. HTTP [9] ................................................................................................... 16
Figure 11. ICMP......................................................................................................... 17
Figure 12. Network topology ...................................................................................... 18
Figure 13. Bus topology[10] ....................................................................................... 19
Figure 14. Ring topology [11] ..................................................................................... 19
Figure 15. Star topology [12] ...................................................................................... 20
Figure 16. Tree topology [13] ..................................................................................... 21
Figure 17. Mesh topology[14]..................................................................................... 22
Figure 18.HUB ........................................................................................................... 27
Figure 19. Switch ....................................................................................................... 28
Page | 5
Figure 20. Router ....................................................................................................... 29
Figure 21. Firewall ..................................................................................................... 30
Figure 22. Bridge ....................................................................................................... 30
Figure 23. File server ................................................................................................. 32
Figure 24. Web server ............................................................................................... 33
Figure 25. Mail Server................................................................................................ 33
Figure 26. Database server ....................................................................................... 33

Page | 6
CHAPTER 1. EXAMINE NETWORKING PRINCIPLES AND THEIR
PROTOCOLS (LO1)

1. Discuss the benefits and constraints of different network types


and standards. (P1)
1.1 Define Network.
A computer network is a system that connects two or more computing devices for
transmitting and sharing information. Computing devices include everything from a
mobile phone to a server. These devices are connected using physical wires such as
copper cable, and fiber optics, but they can also be wireless.[1]

Figure 1.Computer network

1.1.1 Role of networks


Networks serve a variety of purposes and offer numerous benefits in various aspects
of work. Here is an overview of the role of networks in terms of purpose, benefits,
communications, and information sharing:
❖ Purpose:
− Facilitating communication and collaboration among individuals or entities.
− Sharing and exchanging information, knowledge, and resources.
− Enabling cooperation and coordination for mutual benefit.

9
− Supporting innovation, learning, and problem-solving.
− Enhancing efficiency and productivity through the pooling of resources and
expertise.
❖ Benefits:
− Access to a broader range of knowledge, ideas, and perspectives.
− Opportunities for professional or business growth, and networking.
− Increased visibility, reputation, and influence within a specific industry or
community.
− Potential for finding new customers, partners, or suppliers.
− Enhanced problem-solving capabilities through collective intelligence and
diverse expertise.
❖ Communications:
− Networks facilitate communication through various channels, including online
platforms, email, video conferencing, or social media.
− Communication within networks often involves sharing ideas, updates,
feedback, and seeking advice or assistance.
− Networks enable real-time or asynchronous communication, allowing for flexible
and convenient interactions.
❖ Information sharing:
− Networks enable the sharing of industry-specific insights, news, trends, and
best practices among members.
− They can serve as a platform for disseminating information, research, or
educational resources to a broader audience.
❖ A computer network consists of three main parts:
− End Devices (Computer, Printer, Phone, Camera, ...)
− Intermediate Devices (Routers, Switches, Hub, ...)
− Connection Cables
1.1.2 Clients and Servers:
Client-server is a computer network model consisting of two main components: the
client (client) and the server (server). The server is the place to help store resources
as well as install service programs according to the client's requirements. In contrast,
the Client includes computers as well as general electronic devices that will send
requests to the server.[16]

10
Figure 2 Client and server

Advantage
− Server is not required.
− Management users are assigned individually to all computing devices.
− Anyone can use it without the need for advanced technical skills.
− Suitable for small businesses and home environments, existing P2P networks.
− The transport network is reduced.
Disadvantage
− Centralized backup cannot be performed with the given data on the machine.
− Performance is affected when multiple computing devices are accessed at the
same time.
− All users are responsible for the security of the network.
− No advanced security features are provided, only limited permissions.
1.1.3 Peer-to-peer Networks:
Peer - to – Peer Networks are a form of peer-to-peer network and computing devices
will have a similar role. Each individual device is allowed to provide resources directly
to other machines on the same system.

Figure 3. Peer-to-peer

11
▪ Advantage
− Server is not required.
− Management users are assigned individually to all computing devices.
− Anyone can use it without the need for advanced technical skills.
− Suitable for small businesses and home environments, existing P2P networks.
− The transport network is reduced.
▪ Disadvantage
− Centralized backup cannot be performed with the given data on the machine.
− Performance is affected when multiple computing devices are accessed at the
same time.
− Locating files can be quite a challenge as they are not organized in any
particular way; instead, they are stored on personal computers at random.
− All users are responsible for the security of the network.
− No advanced security features are provided, only limited permissions.
1.2 Network Types.
1.2.1 Local Area Networks (LAN)
Benefits:
− LANs are suitable for small networks spread across a small geographic area.
− They are cost-effective and easy to set up.
− LANs offer high-speed connectivity with low latency, making them ideal for
real-time applications like video conferencing.
− LANs provide a high level of security, with firewalls and other security
measures readily available for implementation.
Constraints:
− LANs can’t connect networks over long distances, and their range is limited to
the physical location they cover.
− They can’t handle a high volume of traffic and are not scalable beyond a
particular size.
− LANs require hardware and software maintenance, which could financially
burden small businesses.

12
Figure 4. Local Area Networks (LAN)[3]
1.2.2 Wide Area Networks (WAN):
Benefits:
− WAN connect businesses and organizations across different geographic
locations, making them ideal for large enterprises.
− WAN can handle a significantly higher volume of traffic and can connect to
the internet.
− WAN provides enhanced security features through the use of VPNs and
other security protocols.
− WANs offer scalability, and businesses can easily expand their network’s
capacity as they grow.
Constraints:
− WANs are more expensive to set up than LANs and require specialized
equipment.
− They are more complex to manage and require dedicated staff to handle
issues.
− WANs have higher latency and slower connectivity rates than LANs due to
their geographic distances and increased security risks due to the increased
number of access points.

13
Figure 5. Wide Area Networks (WAN)[4]
1.2.3 Metropolitan Area Network (MAN):
Benefits:
− Coverage of an entire city or metropolitan area.
− High-speed data transfer rates.
− Facilitates communication between locations in the same city.
− Enables cost-efficient sharing of network resources.
Constraints:
− Limited coverage area as compared to WAN.
− Costly to set up the infrastructure.
− Requires complex network management.

14
Figure 6. Metropolitan Area Network (MAN)[5]

1.3 Protocol And Standards.


1.3.1 Network protocol definition:
A network protocol can be defined as a set of rules and standards that govern the
communication between devices or computers over a network. These protocols define
the format, sequence, and error control of data transmission over the network, allowing
devices to communicate with each other and share resources.
The protocols establish how data should be packaged for transmission, how it should
be sent over the network, how devices should recognize and connect, and how errors
should be handled if they occur.

Figure 7. Definition network protocol[6]

15
1.3.2 Some common Network Protocols:
1.3.2.1 TCP/IP:
A protocol suite that governs how data is transmitted, routed, and received over the
internet

Figure 8. TCP/IP [7]

1.3.2.2 DNS (Domain Name System):


A standard that translates domain names into IP addresses, allowing users to access
websites by typing in a domain name rather than a numerical IP address.

Figure 9. DNS [8]

1.3.2.3 HTTP (Hypertext Transfer Protocol):


A standard protocol that governs how web pages are transferred and viewed in a
web browser.

Figure 10. HTTP [9]

16
17
1.3.2.4 ICMP (Internet Control Message Protocol):
A protocol used for sending error messages and operational information about
network conditions. ICMP is used by network devices such as routers and firewalls to
communicate with each other.

Figure 11. ICMP

1.3.3 Some Common Network Standards:


− American National Standards Institute (ANSI): The American National
Standards Institute (ANSI) is the official requirements corporation withinside the
United States, coordinating and publishing laptop and statistics era requirements.
− The International Organization for Standardization (ISO): is the world's largest
standards organization, and it is a federation of over 100 standards organizations
from dozens of countries. The OSI Reference Model is the ISO's maximum famous
networking product.
− Institute of Electrical and Electronics Engineers (IEEE): An international
organization that publishes numerous essential networking standards, inclusive of the
professionals well-known for the Ethernet networking system.
− OSI Model (Open Systems Interconnection Model): The OSI model is a
conceptual framework that defines seven layers for network communication. Each
layer has specific responsibilities and interactions with neighboring layers, providing a
systematic approach to network design and troubleshooting.
− TCP/IP Model (Transmission Control Protocol/Internet Protocol Model): The
TCP/IP model is a concise and widely used networking model. It combines several
layers of the OSI model, condensing it into four layers: Network Interface, Internet,
Transport, and Application. TCP/IP forms the foundation of the modern internet.

18
2. Explain the impact of network topology, communication, and
bandwidth requirements. (P2)
2.1 Network topology definition.
A network topology (network model) is a way of organizing connections between
devices in a computer network. It defines how computers in a network are connected
so that data can be transmitted and received. Common types of network models
include the star model, ring model, lattice model, and tree model. Each model type
has its advantages and disadvantages, and depending on the network tool
requirements, the administrator can use one network model or combine several types
of network models to design the most suitable network.

Figure 12. Network topology


• Physical topology is the arrangement of nodes and cables in a network. It refers to
how the physical components of a network are connected and how data is
transmitted through the network.
• Logical topology is the way that data is transmitted between nodes in a network.
It refers to how the nodes appear to be connected, rather than how they are
physically connected. Logical topology is determined by the network's
communication protocol.
2.1.1 Bus Topology:
In a bus topology, every device on the network is connected to a single cable
called a trunk or backbone. Communication occurs over this shared communication
line. A bus topology is simple and inexpensive to install and maintain. However, a
single point of failure may bring down the entire network.

19
Figure 13. Bus topology[10]

20
2.1.2. Ring Topology:
In a ring topology, each device is connected to two neighboring devices, forming a
loop. Data flows around the ring in only one direction, and each device acts as a
repeater to amplify the signal and send it to the next device. A ring topology provides
high bandwidth and fewer data collisions. However, if a device fails, the entire
network can go down

Figure 14. Ring topology [11]

2.1.3 Star Topology:


In a star topology, every device is connected to a central hub or switch. All
devices communicate through the hub or switch. A star topology is easy to set up and
modify, and if one device fails, other devices continue to function. However, a failure
in the hub or switch can bring down the entire network.

21
Figure 15. Star topology [12]

22
2.1.2.4 Tree Topology:
A tree topology is a combination of bus and star topologies. It has a central
root node, to which other nodes are connected. The network can grow horizontally by
adding more branches and vertically by adding more levels. A tree topology provides
high scalability and fault tolerance. However, it is complex to install and maintain.
• Advantage:
− Easy to deploy and manage with a clear and understandable network structure.
− Allows easy expansion of the network by adding new nodes.
− If a large node fails, only the nodes directly related to it are affected, the other
nodes are not affected.
• Disadvantages:
− The network is structured in a tree, so the transmission of data between nodes
that are not directly related to each other will have to go through many
intermediate nodes, resulting in reduced transmission speed and higher latency.
− If the root node or intermediate nodes are down, the entire network will be
affected and become inoperable.

23
Figure 16. Tree topology [13]

2.1.2.5 Mesh Topology:


A mesh topology establishes a full-mesh network, in which every device is connected
to every other device. Mesh topology provides great redundancy and fault tolerance
since there are multiple paths to any given destination. Mesh topology creates multiple
connections, which increases the cost of installation and maintenance.
• Advantage:
− High reliability because each device can connect to many other devices,
allowing data to travel through many different routes in the event that one route
is disrupted.
− There is great flexibility because devices can be added or changed without
affecting the entire network.
− Higher fault tolerance than some other types of networks due to redundancy of
routes.
• Disadvantages:
− The cost of deploying and managing mesh network topology is quite high due
to the requirements of many devices and the complexity of configuration and
maintenance.
− Latency times can be higher than with some other types of networks when data
has to travel across different routes.
− Network throughput can decrease as the number of devices connected in the
mesh topology increases due to competition for network resources.

24
Figure 17. Mesh topology[14]

2. 2 Communication and Bandwidth


2.2.1 Define commutations in terms of networking
Network communication, or internetworking, defines a fixed of protocols (that is,
regulations and standards) that permit software programs to speak with every different
without regard to the hardware and running structures wherein they may be run.
Internetworking allows application programs to communicate independently of their
physical network connections. In networking, communications refer to the exchange of
information or data between two or more devices or nodes in a network. This can
include various forms of communication, such as messages, files, images, audio, and
video.
Communications in networking are typically facilitated through protocols, which are
sets of rules or standards that govern how devices in a network communicate with
each other. These protocols may define the format and content of messages, as well
as the methods used to transmit and receive data.
Common examples of communication protocols used in networking include Ethernet,
TCP/IP, HTTP, FTP, and SMTP. These protocols enable devices in a network to
communicate with each other, regardless of their location or the specific technologies
they use.
2.2.2 Rules of Communication
The rules of communication in networking are defined by protocols. Protocols are a set
25
of rules and guidelines that govern communication between devices on a network.
They define how data is transmitted and how devices on the network can communicate
with each other.
There are three elements to any communication:
• There will be a source (sender).

• There will be a destination (receiver).


• There will be a channel (media) that provides for the path of communications to occur.
2.3 Bandwidth
Bandwidth is the maximum rate at which data can be transmitted over a network. It is
usually measured in bits per second (bps). Bandwidth determines how quickly data
can be transmitted from one device to another. It is important to have sufficient
bandwidth to ensure that the network operates efficiently

Figure 18. Bandwidth

2.3.1 Bandwidth Requirements for the Networks


Bandwidth requirements for networks depend on the type and amount of traffic
that the network is expected to handle. For example, a network that is used for video
conferencing requires a higher bandwidth compared to a network that is used for
sending emails or browsing the web. Bandwidth can be increased by upgrading
hardware or by optimizing the network infrastructure.

26
3. Compare common networking principles and how protocols enable
the effectiveness of networked systems. (M1)
3.1 Compare LAN, CAN, MAN, WAN
Full form Local Area Campus Metropolitan Wide Area
Network (LAN) Area Area Network Network (WAN)
Network (MAN)
(CAN)
Coverage area Within a small Covers Covers a Covers a large
geographical area, multiple metropolitan area geographic area
e.g. a building or buildings such as a city or a such as a
a campus within a county country or
campus or a multiple
city countries
Scope of Small scope - in a Shared range a Shared range up Unlimited
tethering room, office, school or a to 50 km sharing scope
campus. hospital

Data transfer Typically ranges Ranges Ranges from 100 Ranges from 1
speed from 10 from 100 Mbps to 1 Gbps Mbps to 100 Gbps
Mbps to 10 Mbps to 1
Gbps Gbps
Ethernet, Wi-Fi, Ethernet, Ethernet, Leased lines,
Technologies Bluetooth Wi-Fi, SONET, DWDM, satellite links,
used SONET, MPLS microwave links,
ATM fiber optic
cables
Expense Short High High Very high
Table 1. Compare LAN, CAN, MAN, WAN

3.2 Compare physical topologies and logical topologies.

27
Physical Topology Logical Topology

The physical layout of devices and How data flows in a network


Definition connections in a network

Examples Bus, Star, Ring, Mesh Client-Server, Peer-to-Peer

Focus Hardware Software


Simple, reliable, easy to troubleshoot Efficient use of resources,
Pros
easier to scale
Limited scalability, high maintenance cost, Complexity, potential security

Cons susceptible to a single point of failure vulnerabilities, slower speeds

Impacted Cabling, hubs, switches, routers Protocols, addressing, routing,


by switching
Table 2. Compare physical topologies and logical topologies

3.3 Compare between OSI reference model and TCP/IP reference model

OSI Reference Model TCP/IP Reference Model

Consists of seven layers Consists of four layers

Primarily used for theoretical and Primarily used in practical applications


educational purposes
Divides the entire communication Has an integrated approach that does
process into different layers not sharply distinguish between the layers

Follows the vertical approach, where each Follows a horizontal approach, where each
layer interacts only with its layer interacts with multiple layers
adjacent layer
Layers in the OSI model are Physical, Layers in TCP/IP model are Network
Data Link, Network, Transport, Session, Interface Layer, Internet Layer, Transport
Presentation, Application Layer, Application Layer
Provides better interoperability between Provides better performance and simplicity
different systems in communication between
systems
Slower than TCP/IP model Faster than the OSI model

28
Appears after the Internet. Appeared before the Internet.

The minimum header is 5 bytes. The minimum header is 20 bytes.

Table 3. Compare between OSI reference model and TCP/IP reference model

1.1 Compare TCP between UDP

Factor TCP UDP


(Transmission Control Protocol) (User Datagram Protocol)
Connection Requires an established No connection is needed to
type connection before transmitting start and end a data transfer
data
Data Can sequence data (send in a Cannot sequence or arrange
sequence specific order) data
Data Can retransmit data if packets fail No data retransmitting. Lost
retransmission to arrive data can’t be retrieved
Delivery Delivery is guaranteed Delivery is not guaranteed
Check for errors Thorough error-checking Minimal error-checking
guarantees data arrives in its covers the basics but may not
intended state prevent all errors
Broadcasting Not supported Supported
Speed Slow, but complete data delivery Fast, but at risk of
incomplete data delivery
Protocols TCP is used by HTTP, FPT, UDP is used by DNS, DHCP
SMTP
and Telnet

Table 4. Compare TCP with UDP

CHAPTER 2. Explain networking devices and operations. (LO2)

1. Discuss the operating principles of networking devices and server types. (P3)
1.1 Network devices
Network devices refer to the hardware components that are used to enable
communication and data exchange between different devices in a computer
network. These devices are responsible for facilitating the transfer of data and
information across the network, allowing users to communicate with each other
29
or access shared resources.
It's a physical device that connects other physical devices on a network Other
times, it functions as a translator or prevents suspicious network traffic.
1.1.1 Hub:
A hub is a network device used to connect multiple devices to a network. It operates
on the physical layer of the OSI model by forwarding signals to all connected devices.

Figure 18.HUB

• Advantage:
− Simple, easy to use and low price.
− Allows to connect multiple devices together on one network.
• Disadvantages:
− Inability to process multiple signals at once, resulting in reduced data transfer
rates when multiple devices attempt to transmit at the same time.
− Inability to categorize and control data packets, leading to data conflicts and
transmission errors.
− The inability to intelligently route the network leads to reduced network traffic
and slows down as the number of devices in the network increases.
− Security features and resource sharing are not supported, resulting in an
insecure and difficult network to manage.
1.1.2 Switch:
A switch is a network device that operates on the data link layer of the OSI model.

30
It is used to connect multiple devices to a network and selectively forward packets
only to the appropriate destination.

Figure 19. Switch

• Advantage:
− Capable of handling multiple signals at the same time, making the data transfer
rate higher than the hub.
− Capable of classifying and controlling data packets, helping to avoid data
conflicts and transmission errors.
− Has intelligent routing capability, which reduces network traffic and increases
transmission speed as the number of devices in the network increases.
− Supports security features such as VLANs, Access Control Lists (ACLs), and
Network Address Translation (NAT).
− Allows sharing of resources such as printers and hard drives.
• Disadvantages:
− More expensive than hubs and have more technical requirements in
configuration and operation.
− May lead to overload in some situations, resulting in reduced network
performance.
− Inability to connect networks of different structures, therefore not suitable for
complex network environments.
1.1.3. Router:
A router is a network device that operates on the network layer of the OSI model.
It is used to connect multiple networks and route data between them.

31
Figure 20. Router

• Advantage:
− Capable of connecting networks of different architecture and working between
different network protocols.
− Capable of intelligent routing based on information about IP address, protocol
type and other requirements to deliver packets to the correct destination.
− More security compared to switches and hubs, such as VPN connections and
firewall features.
− Enables sharing of resources between networks, such as printers, hard drives
and Internet connections.
• Disadvantages:
− More expensive than switches and hubs, and have higher technical
requirements in configuration and operation.
− Requires high network knowledge, difficult to use for beginners or no experience
in the field.
− May lead to overload in some situations, resulting in reduced performance of
the network.
− Data transfer speed may be slower than switch due to packet routing.
1.1.4 Firewall:
A firewall is a device that filters inbound and outbound traffic according to
established security policies. It helps protect networks from unauthorized access,
malware, and other threats.
• Advantage:
− Provides security features for the network, helping to prevent attacks
from outside, such as viruses, malicious code, DDOS attacks, etc.
− Capable of controlling traffic entering and leaving the network, helping
network administrators monitor and control attacks.
− Allows users to set up flexible access rules to protect information and

32
prevent unauthorized employees from accessing important documents.
− There are many types of firewalls that have different features, allowing
users to customize and choose according to their needs.
• Disadvantages:
− Sometimes the firewall can block the wrong amount of traffic to some
legitimate websites or applications.
− Can reduce network speed if overloaded, requiring administrators to pay
attention to the configuration and performance of the firewall.
− Firewalls cannot prevent attacks from within the network, so it needs to
be combined with other safety measures to ensure network integrity.

Figure 21. Firewall

1.1.5 Bridge
Devices that connect two different networks, analyzing incoming network traffic
and forwarding it only to the necessary segments.

Figure 22. Bridge

− Structure: Bridge has 2 or more ports, each port is used to connect with other
devices on the network.
− Function: Connect two networks together and allow data transfer between them.
• Advantage
− Improves network performance by blocking unnecessary traffic and increasing
security.

33
− Connects two networks together and allows data transmission between them.
• Disadvantages:
− The cost is higher than the repeater and can not connect multiple networks
together.
− The protocol cannot be switched between two different networks.
1.1.6 Repeater
• Features: Repeater is a device that connects two segments of the network and
enhances the signal for further transmission. It receives the signal from the input and
outputs it with more power.
• Structure: Repeater has 2 or more ports, each port is used to connect to other
devices on the network.
• Function: Enhance the signal and range of network.
• Advantage:
− Simple, easy to use and cheap.
− Enhances Wi-Fi range and helps connect multiple devices at once.
• Disadvantages:
− Multiple signals cannot be processed at the same time and the signals degrade
when going through many repeaters.
− Inability to switch protocols between two different networks.

Figure 23. Repeater


1.1.7 Content filter
• Features: A content filter is a separate type of software or device used to monitor and
monitor content accessed on the network.
• Structure: Content filters can be installed on computers or routers, and are often
managed by network administrators.
• Functions: Control online content by blocking access to inappropriate or dangerous
websites, limiting access to social media apps, or monitoring online activities to
prevent acts of infringing upon network security.

34
• Advantage:
− Help protect network security and prevent threats from accessing unsafe
websites or apps.
− Reduces network load by blocking unnecessary traffic.
• Disadvantages:
− Requires quite high cost to deploy and maintain.
− Content filtering software can cause problems with complicated or unknown
websites or applications, and can cause discomfort for users with limited access
to content.

Figure 24. Content filter

1.2 Server types:


A server is a device that stores and processes data, connecting computers or
software systems in a network. It allows sharing and storage of information. In the
past, servers were small machines that transmitted data to larger computers.
However, they have evolved to become larger and capable of performing more
complex tasks. The rise of cloud computing has introduced virtual servers, which are
accessed online from remote locations, revolutionizing the way we work.
1.2.1 File Server:
A file server is a type of server that stores and manages files for clients on a network.
It provides a central location for users to access shared files.

Figure 25. File server

1.2.2. Web Server:


A web server is a type of server that hosts websites and web applications. It
35
responds to client requests for web pages by providing them with HTML files,
images, and other content.

Figure 26. Web server

1.2.3. Mail Server:


A mail server is a type of server that handles email traffic for a network. It
receives an incoming email and sends outgoing emails to other mail servers or
clients.

Figure 27. Mail Server

1.2.4. Database Server:


A database server is a type of server that stores and manages data for
applications and users. It provides a central location for users to access and modify
data.

Figure 28. Database server

36
2. Discuss the interdependence of workstation hardware with relevant

networking software.(P4)

2.1 Explain what is meant by interdependencies


Interdependencies refer to the relationships between different elements or
components of a system, in which each element relies on one or more other elements
for its operation or performance. Interdependencies can exist within a single system or
between multiple systems, and can take many forms, such as physical connections,
data sharing, or functional dependencies.
In complex systems, interdependencies are often numerous and intricate, and
a change or failure in one component may have ripple effects throughout the entire
system. Understanding these interdependencies is crucial for effective system design,
management, and risk assessment, as it allows for the identification of critical
components and potential vulnerabilities. It also helps to ensure that changes made to
one part of a system do not unintentionally impact other parts of the system. As such,
identifying, analyzing, and managing interdependencies is an essential aspect of
systems engineering and risk management.

2.2 Give examples of interdependency.


- In a supply chain, the production of a product depends on the timely delivery of raw
materials.
- In a team project, the completion of one person's task relies on the input or output of
another person's task.
- In an ecosystem, the survival of one species may be interconnected with the
availability of resources provided by another species.

2.3 Define workstation hardware


Workstation hardware refers to the physical components of a computer system that
are used by an individual user, typically including the computer itself, peripherals
(such as monitors, keyboards, and mice), and any associated hardware devices.
Some common examples of workstation hardware components include:
− Processors: Workstations typically feature faster and more powerful
processors than standard desktops, with multiple cores and higher clock
speeds.
− Memory (RAM): Workstations have larger amounts of RAM than standard
desktops, allowing for faster data access and processing.
37
− Graphics cards: Workstations often include high-end graphics cards designed
for 3D rendering, animation, and video editing tasks.
− Storage: Workstations may have larger or faster hard drives, solid-state drives

38
(SSDs), or other storage devices for efficient data management.
− Input devices: Workstations may come with specialized input devices such as
graphic tablets, high-precision mice, or keyboards designed for specific tasks.
− Networking: Workstations may have specialized networking hardware such as
network interface cards (NICs) for faster and more reliable networking
performance.
2.4 Define networking software
• Define networking software
Networking software refers to a category of computer programs and
applications that facilitate communication and data exchange between multiple
devices or computer systems within a network infrastructure. It enables devices
to connect, share, and transfer information, resources, and services over a
network. Networking software includes various components such as protocols,
drivers, servers, and applications that help manage network connections, data
transmission, security, and overall network operations. It plays a crucial role in
establishing and maintaining efficient and reliable communication between
devices or systems in a networked environment.
• Network software functions
− User management allows administrators to add or remove network users.
− This is particularly useful when hiring or relieving
− File management allows administrators to decide where data is stored and to
control user access to that data.
− Access allows users to enjoy uninterrupted access to network resources.
− Network security systems help administrators to secure and prevent violations.
2.5 Discuss and explain the interdepencies of workstation hardware with networking
software.
❖ The interdependence between client hardware and network software is critical to
the efficient operation of a computer network.
− Hardware Capabilities: Workstation hardware, such as network interface cards
(NICs), routers, switches, and cables, provides the physical infrastructure required for
the network. The capabilities of these hardware components, such as data transfer
speeds, connectivity options (e.g., Ethernet, Wi-Fi), and supported network protocols,
directly affect performance and compatibility of network software.
− Drivers and Firmware: Client hardware relies on drivers and firmware to

39
communicate with network software. Drivers act as an intermediary between software
and hardware, allowing them to work seamlessly together. It is important to have up-
to-date drivers to ensure optimal performance and compatibility with networking
software.
− Network configuration: Network software, such as operating system network
stacks, firewalls, and virtual private network (VPN) clients, depends on the underlying
hardware configuration. Software must be able to detect and use available hardware
resources efficiently. This includes the ability to discover network interfaces, configure
IP addresses, manage network devices and establish network connections.
− Performance optimization: Performance of network software can be affected by
the capabilities of workstation hardware. For example, high-speed NICs and powerful
processors can enhance network throughput and reduce latency, resulting in better
overall network performance. On the other hand, outdated or inadequate hardware can
limit the software's ability to handle large amounts of network traffic or provide
advanced network features.
− Compatibility and standards: Network hardware and software must adhere to
industry standards and protocols to ensure interoperability. Compatibility issues can
arise if hardware components do not support the necessary protocols or if the software
is not designed to work with specific hardware configurations. It's important to choose
hardware and software that are compatible with each other to avoid compatibility
issues.
❖ Example:
Suppose a workstation is equipped with a high-speed NIC. The networking software,
in this case, should be capable of utilizing the full potential of the NIC to establish and
maintain network connections efficiently. The NIC may have advanced features like
hardware acceleration or offloading capabilities, which require corresponding support
in the networking software. If the software lacks the necessary drivers or capabilities,
the workstation's hardware potential may not be fully utilized, resulting in decreased
network performance.

3. Explore a range of server types and justify the selection of a server, considering
a given scenario regarding cost and performance optimization(M2)

4. Considering a given scenario, identify the topology protocol selected for the efficient
utilization of a networking system.(D1)

CONCLUSION
After finishing this report, my understanding of networking improved significantly. I
now comprehend how to construct a fundamental algorithm, execute a program, and
understand the life cycle of an algorithm. Additionally, I have learned how to create a
flow chart to visually represent the functionality of an algorithm. Programming is truly
fascinating! Thanks to this knowledge, I have gained insights into the inner workings
of the devices in our surroundings. This subject is captivating and extraordinary. A
heartfelt thank you to my mentor for guiding me through this journey.
REFERENCE
[6] [8] ICT Sài Gòn. (2023a, May 11). Giao Thức Mạng Là Gì ? 14 Giao Thức Mạng Phổ Biến
Nhất. ICT-SAIGON. https://ictsaigon.vn/14-giao-thuc-mang-pho- bien-dang-su-
dung-hien-nay

[7] Menon, K. (2023a). The Best Guide To Understanding What Is TCP/IP Model.
Simplilearn.com. https://www.simplilearn.com/tutorials/cyber-security-
tutorial/what-is-tcp-ip-model
[5]Nhất D. (2020a). LAN, MAN, WAN là gì? Tổng quan về mạng LAN, MAN và WAN.
MesiDas. https://mesidas.com/lan-man-wan/
[2]Thuy, P. T. (n.d.-a). Truyền dữ liệu là gì, tốc độ truyền dữ liệu, giao thức truyền dữ liệu?
https://bkaii.com.vn/tin-tuc/301-truyen-du-lieu-la-gi-toc-do-truyen-du-lieu- giao-
thuc-truyen-du-lieu

[1]What Is a Computer Network? Definition, Objectives, Components, Types, and Best


Practices - Spiceworks. (2023a, May 17). Spiceworks.
https://www.spiceworks.com/tech/networking/articles/what-is-a-computer-
network/

[3] [4] Williams, L. (2023a). Types of Computer Network: What are LAN, MAN, and
WAN? Guru99. https://www.guru99.com/types-of-computer-network.html
[9] Đạt, Đ. (2023). Tìm hiểu về HTTP (HyperText Transfer Protocol). Viblo.
https://viblo.asia/p/tim-hieu-ve-http-hypertext-transfer-protocol-bJzKmgewl9N
[10] [11][12] [13] [14.]Network Topologies. Definition, Types, Examples and Importance -
zenarmor.com. (n.d.).

https://www.zenarmor.com/docs/network-basics/what-is-network-topology
[15] Rahman, M. (2022, September 23). Network Devices : Hub | Switch | Router | Bridge |
Gateway. EduPointBD. https://www.edupointbd.com/network-devices- ev/
[16] Cloud F. (2023, March 9). Client Server là gì? Tìm hiểu mô hình Client Server từ A - Z.
FPT Smart Cloud. https://fptcloud.com/client-server/
The Most Common Types of Network Devices. (n.d.). Retrieved June 15, 2023, from
https://www.lepide.com/blog/the-most-common-types-of-network-devices/
Indeed Editorial Team. (2023). Types of Computer Servers and How They Function.
Indeed.com. https://www.indeed.com/career-advice/career-
development/types-of-servers

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy