Tải bản đầy đủ (.pdf) (35 trang)

UNIT TITLE network information

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (1.03 MB, 35 trang )

PROGRAM TITLE: ……………………………………………
UNIT TITLE: Network Information
ASSIGNMENT NUMBER: Assignment 1
ASSIGNMENT NAME: …………………………………….
SUBMISSION DATE: ……………………………………….
DATE RECEIVED: …………………………………………….
TUTORIAL LECTURER: ……………………………………
WORD COUNT: ……………………………………………..

STUDENT NAME: BUI THI HOAI
STUDENT ID: BKC18310
MOBILE NUMBER: 0964762045


Summative Feedback:

Internal verification:


Contents
A. INTRODUCTION..................................................................................................................4
B. CONTENT..............................................................................................................................5
I.

Definition networking:.......................................................................................................5
1.

Types of Networks in Use Today......................................................................................5

2.


Constraint Network...........................................................................................................8

II. Types of Topology...............................................................................................................11
1.

Mesh Topology................................................................................................................11

2.

Star Topology..................................................................................................................13

3.

The impact of current network technology, communication and standards:..................17

III. M1: Compare common networking principles and how protocols enable the
effectiveness of networked systems.........................................................................................21
IV. Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter). .23
1.

Repeater..........................................................................................................................23

2.

Hub..................................................................................................................................24

3.

Server Types....................................................................................................................27


V. (P4) Discuss the inter-dependence of workstation hardware with relevant networking
software.....................................................................................................................................29
1.

What is workstation hardware?.......................................................................................29

2.

What is networking software?.........................................................................................30

3.

What is the inter-dependence of workstation hardware with relevant networking

software?................................................................................................................................30


A. INTRODUCTION
Networking is referred as connecting computers electronically for the purpose of sharing
information. Resources such as files, applications, printers and software are common
information shared in a networking. The advantage of networking can be seen clearly in
terms of security, efficiency, manageability and cost effectiveness as it allows collaboration
between users in a wide range. Basically, network consists of hardware component such as
computer, hubs, switches, routers and other devices which form the network infrastructure.
These are the devices that play an important role in data transfer from one place to another
using different technology such as radio waves and wires. There are many types of network
available in the networking industries and the most common network are Local Area
Network (LAN) and Wide Area Network (WAN). LAN network is made up of two or more
computers connected together in a short distance usually at home, office buildings or school.
WAN is a network that covers wider area than LAN and usually covers cities, countries and

the whole world. Several major LAN can be connected together to form a WAN. As several
devices are connected to network, it is important to ensure data collision does not happen
when this devices attempt to use to detect and prevent collision in networks.


B. CONTENT
LO1 Examine networking principles and their protocols.
P1. Discuss the benefits and constraints of different network types and standards
I. Definition networking: Networking is the exchange of information and ideas among
people with a common profession or special interest, usually in an informal social setting.
Networking is used by professionals to expand their circles of acquaintances, to find out
about job opportunities in their fields, and to increase their awareness of news and trends
in their fields or in the greater world. The computers on a network may be linked through
cables, telephone lines, radio waves, satellites, or infrared light beams.
1. Types of Networks in Use Today



Personal Area Network (PAN)
The smallest and most basic type of network, a PAN is made up of a wireless modem,
a computer or two, phones, printers, tablets, etc., and revolves around one person in
one building. These types of networks are typically found in small offices or
residences, and are managed by one person or organization from a single device.



Local Area Network (LAN)
We’re confident that you’ve heard of these types of networks before– LANs are the
most frequently discussed networks, one of the most common, one of the most
original and one of the simplest types of networks. LANs connect groups of

computers and low-voltage devices together across short distances (within a building
or between a group of two or three buildings in close proximity to each other) to share
information and resources. Enterprises typically manage and maintain LANs. Using
routers, LANs can connect to wide area networks (WANs, explained below) to
rapidly and safely transfer data.
-



LAN works with TCP / IP protocol.

Wireless Local Area Network (WLAN)


Functioning like a LAN, WLANs make use of wireless network technology, such as
WiFi. Typically seen in the same types of applications as LANs, these types of
networks don’t require that devices rely on physical cables to connect to the network.



Campus Area Network (CAN)
Larger than LANs, but smaller than metropolitan area networks (MANs, explained
below), these types of networks are typically seen in universities, large K-12 school
districts or small businesses. They can be spread across several buildings that are
fairly close to each other so users can share resources.



Metropolitan Area Network (MAN)
These types of networks are larger than LANs but smaller than WANs – and

incorporate elements from both types of networks. MANs span an entire geographic
area (typically a town or city, but sometimes a campus). Owner ship and maintenance
is handled by either a single person or company (a local council, a large company,
etc.)



Wide Area Network (WAN)
Slightly more complex than a LAN, a WAN connects computers together across
longer physical distances. This allows computers and low-voltage devices to be
remotely connected to each other over one large network to communicate even when
they’re miles apart. The Internet is the most basic example of a WAN, connecting all
computers together around the world. Because of a WAN’s vast reach, it is typically
owned and maintained by multiple administrators or the public.
-



The protocol used mainly in the WAN is TCP / IP protocol.

Storage-Area Network (SAN)
As a dedicated high-speed network that connects shared pools of storage devices to
several servers, these types of networks don’t rely on a LAN or WAN. Instead, they
move storage resources away from the network and place them into their own highperformance network. SANs can be accessed in the same fashion as a drive attached


to a server. Types of storage-area networks include converged, virtual and unified
SANs.





Passive Optical Local Area Network (POLAN)
As an alternative to traditional switch-based Ethernet LANs, POLAN technology can
be integrated into structured cabling to overcome concerns about supporting
traditional Ethernet protocols and network applications such as PoE (Power over
Ethernet). A point-to-multipoint LAN architecture, POLAN uses optical splitters to
split an optical signal from one strand of single mode optical fiber into multiple
signals to serve users and devices.



Enterprise Private Network (EPN)
These types of networks are built and owned by businesses that want to securely
connect its various locations to share computer resources



Virtual Private Network (VPN)
By extending a private network across the Internet, a VPN lets its users send and
receive data as if their devices were connected to the private network – even if they’re
not. Through a virtual point to point connection, users can access a private network
remotely.


2. Constraint Network
A constraint network is a formulation of an instance of the constraint satisfaction

-


problem(CSP)which is at the core of constraint programming. In a discrete instance, the
domains, which are the sets of allowed values of variables, are finite. The discrete
constraint satisfaction problem is not known to admit polynomial running time
algorithms to solve its instances.
a) The Advantages of Networking



Information sharing
o The depth of knowledge and experience from a group of people can be staggering.
Networking will provide many opportunities to ask questions and receive
feedback. Discussing other points of view really expands your knowledge base,
and allows you to see things from a broader perspective. Learning from other’s
“best practices” saves time, energy and resources.



Connections
o When opportunity “knocks” you want to be in a position to take advantage of it.
Many times there is a need for information-sharing, joint ventures, partnerships,
and even needs for services. Having a wide network of individuals to contact may
be the difference in seizing the moment or missing it completely.



Promotion
o Whether promoting yourself or your organization, having a large network may
assist you in moving your career forward, promoting a new product launch, or
driving new members to your organization. “Word of mouth” is still one of the
best forms of advertising. Spreading good information about you or your

organization may provide leads for career advancement or organization growth.



Credibility
o Improving your reputation and finding support are also benefits of networking. If
you are successful at networking, you might get a reputation for being a person
people will want to talk to and get to know. A good reputation leads to support.
You may have valuable information, ideas, and resources those in your network
may need. Establishing your desire to assist a colleague increases your credibility.



-

Self Esteem
Making new friends and socializing is an important aspect of our human nature.
Developing new relationships leads to higher self esteem and confidence. By taking the
steps to improving yourself and connecting to people you are moving your career
forward. Your confidence will continue to grow as you become more comfortable with
networking. Confidence draws people to you and opens up the opportunity to gain more
information for yourself and share information with others.

a. Protocol
A protocol is a standard set of rules that allow electronic devices to communicate with each
other. These rules include what type of data may be transmitted, what commands are used to
send and receive data, and how data transfers are confirmed.

b. Internet Protocol Suite
The Internet protocol is to gather traffic protocols that perform a stack protocol which runs

on the Internet. The Internet protocol sometimes referred to as a TCP/IP protocol, after
TCP/IP, to mention the important protocols in which, Transmitting protocol (TCP) and
Internet protocol(IP). The Internet protocol can be described by the same description as the
OSI model, but there are some different, not all the corresponding layers.


Table1 Common Protocol Used and Their Ports:

Port
20, 21
22
23
25
50, 51
53
67, 68
69
80
110
119
123
135-139
143
161, 162
389
443
3389

Service name
File Transfer Protocol(FPT)


Transport protocol
TCP

Secure Shell (SSH)
Telnet
Simple Mail Transfer Protocol (SMTP)
IP Sec
Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
Trivial File Transfer Protocol (TFTP)
Hyper Text Transfer Protocol (HTTP)
Post Office Protocol (POP3)
Network News Transport Protocol (NNTP)
Network Time Protocol (NTP)
NetBIOS
Internet Message Access Protocol (IMAP4)
Simple Network Management Protocol (SNMP)
Lightweight Directory Access Protocol
HTTP with Secure Sockets Layer (SSL)
Remote Desktop Protocol

TCP and UDP

TCP
TCP
TCP and UDP
UDP
UDP


TCP
TCP
TCP
UDP
TCP and UDP
TCP and UDP
TCP and UDP
TCP and UDP
TCP and UDP
TCP and UDP


P2: Explain the impact of network topology, communication and bandwidth requirements
Geometric representation of how the computers are connected to each other is known as
topology. There are five types of topology – Mesh, Star, Bus, Ring and Hybrid.

II. Types of Topology
There are five types of topology in computer networks

1. Mesh Topology


In mesh topology each device is connected to every other device on the network through
a dedicated point-to-point link. When we say dedicated it means that the link only carries
data for the two connected devices only. Let say we have n devices in the network then
each device must be connected with (n-1) devices of the network. Number of links in a
mesh topology of n devices would be n(n-1)/2.

Advantages of Mesh topology




No data traffic issues as there is a dedicated link between two devices which means the
link is only available for those two devices.



Mesh topology is reliable and robust as failure of one link doesn’t affect other links and
the communication between other devices on the network.



Mesh topology is secure because there is a point to point link thus unauthorized access
is not possible.



Fault detection is easy.
Disadvantages of Mesh topology



Amount of wires required to connected each system is tedious and headache.



Since each device needs to be connected with other devices, number of I/O ports
required must be huge.




Scalability issues because a device cannot be connected with large number of
devices with a dedicated point to point link.


2. Star Topology

In star topology each device in the network is connected to a central device called hub.
Unlike Mesh topology, star topology doesn’t allow direct communication between
devices, a device must have to communicate through hub. If one device wants to send
data to other device, it has to first send the data to hub and then the hub transmit that data
to the designated device.
Advantages of Star topology


Less expensive because each device only need one I/O port and needs to be
connected with hub with one link.



Easier to install



Less amount of cables required because each device needs to be connected with
the hub only.



Robust, if one link fails, other links will work just fine.




Easy fault detection because the link can be easily identified.


Disadvantages of Star topology


If hub goes down everything goes down, none of the devices can work without hub.



Hub requires more resources and regular maintenance because it is the central system of
star topology.

a. Bus Topology

In bus topology there is a main cable and all the devices are connected to this main cable
through drop lines. There is a device called tap that connects the drop line to the main cable.
Since all the data is transmitted over the main cable, there is a limit of drop lines and the
distance a main cable can have.
Advantages of bus topology


Easy installation, each cable needs to be connected with backbone cable.



Less cables required than Mesh and star topology


Disadvantages of bus topology


Difficultly in fault detection.



Not scalable as there is a limit of how many nodes you can connect with
backbone cable.


b. Ring Topology

In ring topology each device is connected with the two devices on either side of it. There
are two dedicated point to point links a device has with the devices on the either side of
it. This structure forms a ring thus it is known as ring topology. If a device wants to send
data to another device then it sends the data in one direction, each device in ring topology
has a repeater, if the received data is intended for other device then repeater forwards this
data until the intended device receives it.
Advantages of Ring Topology


Easy to install.



Managing is easier as to add or remove a device from the topology only two links
are required to be changed.


Disadvantages of Ring Topology


A link failure can fail the entire network as the signal will not travel forward due
to failure.



Data traffic issues, since all the data is circulating in a ring.


c. Hybrid topology

A combination of two or more topology is known as hybrid topology. For example a
combination of star and mesh topology is known as hybrid topology.
Advantages of Hybrid topology


We can choose the topology based on the requirement for example, scalability is
our concern then we can use star topology instead of bus technology.



Scalable as we can further connect other computer networks with the existing
networks with different topologies.

Disadvantages of Hybrid topology


Fault detection is difficult.




Installation is difficult.



Design is complex so maintenance is high thus expensive.


3. The impact of current network technology, communication and standards:
OSPF: It is a routing protocol generally used for larger network either a single network or a
group network. It is designed by Internet Engineering Task Force. It can also use as a
Gateway Protocol.
EX: To run OSPF on routers, we use the following command
Router (config) # router ospf process-id
Router (config-router) # network dia_chi_IP wildcard_mask area area_id
Where: Process - id: number of progress The OSPF process runs on the router, only has a
local meaning on the router.
In order for a port to join OSPF, we "network" the network address of that port. For
OSPF, we must use a wildcard - mask to get the correct subnet for routing. To calculate
the value of the wildcard mask, subtract the subnet - mask value of 255.255.255.0 one
octet from the value of 255.255.255.0, and each octet will be searched. This calculation is
only true for a consecutive IP range, not for all cases.

Configure the OSPF of the router as follows: Configure the R1 router: use OSPF
R1 (config) #router ospf 1


R1 (config-router) #network 192.168.1.0 0.0.0.255 area 0

R1 (config-router) #network 192.168. 3.0 0.0.0.255 area 0

Configure router R12: use OSPF
R2 (config) #router ospf 1
R2 (config-router) #network 192.168.2.0 0.0.0.255 area 0
R2 (config-router) #network 192.168.3.0 0.0 .0.255 area 0

FTP: File Transfer Protocol (FTP) is mainly a standard protocol of Network which is
used to transfer data from client to host or one server to another server. If user or admin
want to upload a file on a website he or she needs a username, password and host
address.

SMTP: Simple mail transfer protocol is like a media which transfers e-mail. SMTP always work
with POP3 service.


TCP/IP: Transmission Control Protocol and Internet Protocol is a set of a protocol stack.
Basically it is two different protocol. TCP/IP is closely related with FTP, SMTP, HTTP.

a. Network users can communicate by email and instant messenger.


Security is good - users cannot see other users' files unlike on stand-alone machines.


b. Data Communications
Transmission of signals


Send and receive information over communications lines Encoding, interfacing, signal

integrity, multiplexing etc.
c. The impact of network bandwidth requirements:
Bandwidth affects how long it takes to download or upload information over the Internet.

A connection that has plenty of bandwidth available provides a smooth, responsive user
experience. The more available bandwidth, the more quickly data can be transferred;
however, the law of diminishing returns applies here. Once you have sufficient bandwidth,
Internet performance is not further affected.
d. Networking
Topology and architecture used to interconnect devices
e. Bandwidth
Bandwidth is the capacity of a wired or wireless network communications link to
transmit the maximum amount of data from one point to another over a computer network or
internet connection in a given amount of time -- usually one second. Synonymous with
capacity, bandwidth describes the data transfer rate. Bandwidth is not a measure of network
speed -- a common misconception. Expected average load; anticipated peak load; local
internet availability; cost constraints, throughput.


III. M1: Compare common networking principles and how protocols enable the
effectiveness of networked systems.
NETWORKING PRINCIPLES AND THEIR PROTOCOLS
• The Benefits and Constraints of Different Network Types and Standards
1. Personal Area Network (PAN) The smallest and most basic type of network, a PAN is made up
of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one
person in one building. These types of networks are typically found in small offices or
residences, and are managed by one person or organization from a single device.
Benefits:
+ No extra space requires: Personal area network does not require extra wire or space. For
connecting two devices you only need to enable Bluetooth in both devices to start sharing data

among them. For example, connecting wireless keyboard and mouse with the tablet through
Bluetooth.
+ Connect to many devices at a time: Many devices can be connected to one device at the same
time in a personal area network. You can connect one mobile to many other mobiles or tablets to
share files.
+Cost effective: No extra wires are needed in this type of network. Also, no extra data charges
are involved so PAN is an inexpensive way of communication.
+Easy to use: It is easy to use. No advanced setup is required.
+Reliable: If you use this type of data connection within 10 meters then your network is stable
and reliable.
+Secure: This network is secured because all the devices are authorized before data sharing.
Third party injection and data hacking are not possible in PAN.
Constraints:
+ Less distance range:
Signal range is maximum 10 meters which makes limitation for long distance sharing.


+ Interfere with radio signals: As personal area network also use infrared so it can interfere with
radio signals and data can be dropped.
+ Slow data transfer: Bluetooth and infrared have a slow data transfer rate as compared to
another type of networks like LAN (local area network).
+ Health problem: In some cases, PAN uses microwave signals in some digital devices which
have a bad effect on the human body like brain and heart problems may occur.
2. Local Area Network (LAN)We’re confident that you’ve heard of these types of networks
before
– LANs are the most frequently discussed networks, one of the most common, one of the most
original and one of the simplest types of networks. LANs connect groups of computers and lowvoltage devices together across short


LO2 Explain networking devices and operations

P3 Discuss the operating principles of networking devices and server types

IV. Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and
Brouter)
A network device is a node in the wireless mesh network. It can transmit and receive wireless
HART data and perform the basic functions necessary to support network formation and
maintenance. Network devices include field devices, router devices, gateway devices, and mesh
hand-held devices.
1. Repeater
A repeater operates at the physical layer. Its job is to regenerate the signal over the same
network before the signal becomes too weak or corrupted so as to extend the length to which
the signal can be transmitted over the same network. An important point to be noted about
repeaters is that they do not amplify the signal. When the signal becomes weak, they copy the
signal bit by bit and regenerate it at the original strength. It is a 2 port device.


2. Hub
A hub is basically a multiport repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which connects different
stations. Hubs cannot filter data, so data packets are sent to all connected devices. In other
words, collision domain of all hosts connected through Hub remains one. Also, they do not
have intelligence to find out best path for data packets which leads to inefficiencies and
wastage.

a. Bridge
A bridge operates at data link layer. A bridge is a repeater, with add on the functionality
of filtering content by reading the MAC addresses of source and destination. It is also used
for interconnecting two LANs working on the same protocol. It has a single input and single
output port, thus making it a 2 port device.



Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×