Tải bản đầy đủ (.pdf) (86 trang)

btec level 5 hnd diploma in computing unit 2 networking infrastructure

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (5.82 MB, 86 trang )

<span class="text_page_counter">Trang 1</span><div class="page_container" data-page="1">

<b> ASSIGNMENT 1 FRONT SHEET </b>

<b>Unit number and title Unit 2: Networking Infrastructure </b>

</div><span class="text_page_counter">Trang 3</span><div class="page_container" data-page="3">

<b>❒ Summative Feedback: </b>❒<b>❒ Resubmission Feedback:</b>

</div><span class="text_page_counter">Trang 5</span><div class="page_container" data-page="5">

<b>Lecturer Signature:</b>

</div><span class="text_page_counter">Trang 7</span><div class="page_container" data-page="7">

2.1. LAN (Local Area Network): ... 5

2.2. MAN (Metropolitan Area Network): ... 6

2.3. WAN (Wide Area Network): ... 7

2.4. WLAN (Wireless Local Area Network): ... 8

<small>3.NETWORK PROTOCOLS AND STANDARDS: ...</small>

<b><small>II. NETWORK TOPOLOGY & COMMUNICATION AND BANDWIDTH REQUIREMENTS.</small></b><small> ... 11 </small>

</div><span class="text_page_counter">Trang 8</span><div class="page_container" data-page="8">

6.1. Network Communication ... 21

</div><span class="text_page_counter">Trang 11</span><div class="page_container" data-page="11">

<b>Introduction </b>

In this report, I will discuss the benefits and constraints of different network types and standards, the operating principles of networking devices and server types and explain the impact of network topology, communication and bandwidth requirements , help people better understand the location network only, network configuration, network-connected devices. Everything will be presented in a small report.

<b>I. Discuss the benefits and constraints of different network types and standards. </b>

<b>1. What is a network ? </b>

A network is a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to allow data sharing A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves or satellites.

</div><span class="text_page_counter">Trang 13</span><div class="page_container" data-page="13">

<b>2. Network type. </b>

<b>2.1. LAN (Local Area Network): </b>

The most commonly mentioned network is the Local Area Network, which is one of the most common, original, and basic network kinds. A local area network (LAN) is a privately owned network that runs within and around a single structure, such as a house, office, or factory. LANs are often used to link personal computers and consumer gadgets in order to share resources (such as printers) and exchange data.

To transport data quickly and reliably, LANs can link to wide area networks (WANs) via routers.

<b>Benefits: </b>

reduces the cost of hardware purchases.

</div><span class="text_page_counter">Trang 14</span><div class="page_container" data-page="14">

the network.

</div><span class="text_page_counter">Trang 15</span><div class="page_container" data-page="15">

- Data of all network users can be stored on a single hard disk of the server computer.

<b>2.2. MAN (Metropolitan Area Network): </b>

A Metropolitan Area Network or MAN includes a computer network throughout a town, a university campus, or a small region. Such network types are larger than LANs, but smaller than WANs, and they combine elements from both network types. ). Either a single individual or corporation (a city council, a big company, etc.) manages ownership and maintenance.

</div><span class="text_page_counter">Trang 17</span><div class="page_container" data-page="17">

<b> </b>

<b>Benefits: </b>

<b>Constraints: </b>

<b>2.3. WAN (Wide Area Network): </b>

A WAN connects computers together over longer physical distances, which is slightly more complicated than a LAN. The Internet is the most basic example of a WAN, connecting all computers on the planet. A WAN is typically owned and managed by multiple administrators or the general public due to its broad reach. It is mainly limited to an organization or company.

<b>Benefits: </b>

can communicate easily.

</div><span class="text_page_counter">Trang 18</span><div class="page_container" data-page="18">

- Contains devices like mobile phones, laptop, tablet, computers, gaming consoles, etc.

</div><span class="text_page_counter">Trang 19</span><div class="page_container" data-page="19">

- WLAN connections work using radio transmitters and receivers built into client devices.

<b>Constraints: </b>

versed in their fields.

<b>2.4. WLAN (Wireless Local Area Network): </b>

A wireless local area network (WLAN) is a wireless distribution method for two or more devices. WLANs use high-frequency radio waves and often include an access point to the Internet. A WLAN allows users to move around the coverage area, often a home or small office, while maintaining a network connection.

</div><span class="text_page_counter">Trang 21</span><div class="page_container" data-page="21">

<b>Benefits: </b>

the range of access point.

affected.

<b>Constraints: </b>

data transfer from connected devices to the web.

<b>3. Network protocols and standards: </b>

A network protocol is a set of rules that define how data are transmitted between the same network devices. It allows linked devices to interact with one another despite variations in internal processes, structures, or designs. Network protocols make it simple to interact with people all over the world, and they play an important part in today's digital communication.

</div><span class="text_page_counter">Trang 23</span><div class="page_container" data-page="23">

<b> </b>

<b>Here are some common network protocols standards: </b>

<b>TCP/IP: is the set of communications protocols used in the Internet and similar computer networks. The current foundational </b>

protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP), as well as the User Datagram Protocol (UDP).

<b> </b>

<b>HTTP (Hypertext Transfer Protocol) is the foundation of the World Wide Web (WWW) and is used to load web pages using hypertext </b>

links. HTTP is an application layer protocol, which allows the user to see a user-friendly interface designed to transfer information between networked devices.

<b>DNS (Domain Name System): is the hierarchical and decentralized naming system used to identify computers reachable through the </b>

Internet or other Internet Protocol (IP) networks. The resource records contained in the DNS associate domain names with other forms of information

<b>Here are some international standard organizations: </b>

</div><span class="text_page_counter">Trang 25</span><div class="page_container" data-page="25">

<b>International Organization for Standardization (ISO): As the largest developer and publisher of standards in the world, ISO fills the </b>

vital role of a medium for agreement between individual standards developers, spreading progress made by one country's local developers across the world to further the goal of standardization.

<b>International Electro technical Commission (IEC): IEC plays the crucial role of coordinating efforts carried out in different countries </b>

and unifying them, such as the development of various units of measurement and the standardization of the modern form of the metric system.

<b>Institute of Electrical and Electronics Engineers (IEEE): is a nonprofit organization that develops and publishes over 900 standards </b>

relating to electronics, a broad field in today's modern world. A journal publisher in addition to publishing IEEE standards, IEEE is by far the most cited publisher for new patents.

<b>II. Network topology & communication and Bandwidth requirements. </b>

</div><span class="text_page_counter">Trang 27</span><div class="page_container" data-page="27">

<b>1. Network Topology </b>

Network topology refers to the manner in which the links and nodes of a network are arranged to relate to each other. Network topology can be used to define or describe many different types of networks, including radio control and control networks, public

throughout the network, whereas physical topology is the organization of distinct network parts, such as equipment positioning and connecting cable location.

</div><span class="text_page_counter">Trang 29</span><div class="page_container" data-page="29">

<b>3. Logical Topology </b>

are connected to the network through the actual cables that transmit data. The logical topology of a network can be dynamically maintained and reconfigured with network equipment such as routers and switches.

</div><span class="text_page_counter">Trang 31</span><div class="page_container" data-page="31">

<b>4. Difference between Physical and Logical Topology </b>

Types: Bus, star, ring and mesh topologies.

Can be affected by cost, durability, flexibility,

Logical bus and the logical ring.

Data transmission can impact on packets lost or congestion.

<b> </b>

</div><span class="text_page_counter">Trang 33</span><div class="page_container" data-page="33">

<b>5. Types of Topology 5.1. Bus Topology </b>

A bus topology is a Local Area Network ( LAN) topology which all devices in the network are connected through a single line. At the end of the line, a terminator is connected to the wire to absorb the signals.

<b>Advantages: </b>

<b>Disadvantages: </b>

</div><span class="text_page_counter">Trang 35</span><div class="page_container" data-page="35">

<b>5.2. Star Topology </b>

A star topology is a network that is designed to look very similar to a star with a central core and many systems connected directly to that core. The systems in a star topology do not connect to each other, but instead pass messages to the central core that, in turn, passes the message to either all other systems

<b>Advantages: </b>

and to remove parts.

<b>Disadvantages: </b>

of the computer network.

</div><span class="text_page_counter">Trang 36</span><div class="page_container" data-page="36">

p p gy g ( )

</div><span class="text_page_counter">Trang 37</span><div class="page_container" data-page="37">

<b>5.3. Ring Topology </b>

This topology links all network devices to form a ring, and the data flows is always in one direction. This means that every device has an equal opportunity to access the media, without any cable termination.

<b> Advantages: </b>

<b>Disadvantages: </b>

</div><span class="text_page_counter">Trang 39</span><div class="page_container" data-page="39">

<b>5.4. Mesh Topology </b>

A mesh topology is a network configuration in which each computer and network device is linked to each other. Every component of the network is connected directly to every other component.

<b>Advantages: </b>

errors.

<b>Disadvantages: </b>

<b>5.5. Tree Topology </b>

Tree topology is a hybrid of star topology and bus topology. It is a special type of structure where many connected elements are arranged like the branches of a tree. In a tree topology, there can be only one connection between any two connected nodes.

</div><span class="text_page_counter">Trang 41</span><div class="page_container" data-page="41">

that passes through the network.

</div><span class="text_page_counter">Trang 43</span><div class="page_container" data-page="43">

<b>Disadvantages: </b>

</div><span class="text_page_counter">Trang 45</span><div class="page_container" data-page="45">

<b>6. Communication and bandwidth requirements 6.1. Network Communication </b>

A communication network is a pattern or form that is implemented in the organization to communicate information effectively. The communication network is the established system where the message may flow in one or too many directions in the organization based on requirements.

<b>Network rules: Regulations are an important data quality component. Network rules and rules of attribute help to </b>

maintain the integrity of data when used in combination.

Network rules dictate which network features the utility network can connect to or associate. For particular asset groups and asset types, these rules are imposed at the class level. Features and objects may be connected and associated so long as the feature restrictions are respected

A well-defined policy network can meet the needs of enterprises it supports, and consider network policies as goals. Your network cannot be established optimally without clear objectives and its performance cannot be measured without clear objectives.

<b>6.2. Bandwidth requirement </b>

Network Bandwidth is a measurement of the maximum wired or wireless communication capacity for transmitting data over a network connection over a specific time frame.

</div><span class="text_page_counter">Trang 47</span><div class="page_container" data-page="47">

<b> </b>

Bandwidth is needed for the network since it determines how fast a web page loads on a browser. The higher the bandwidth, the more data the transmission media can handle at once. A lower bandwidth transmission media would not be able to carry as much data, meaning that the data would take longer to be sent. The website and the internet connection used to access it can have a considerable impact on the bandwidth.

<b>III. Discuss the operating principles of networking devices and server types. </b>

<b>1. Network devices </b>

<b>1.1. Router </b>

- <b>Concept: A router is a device that connects two or more networks or subnets that have packet switches. </b>

Two main functions are served: traffic management between these networks by transmission of data packets to their designated IP addresses and multiple devices using the same Internet.

</div><span class="text_page_counter">Trang 49</span><div class="page_container" data-page="49">

- <b>Operating principles of a router: Computers and other devices are connected to the Internet by routers. As </b>

a dispatcher, a router selects the best way to receive your travel data. It links your enterprise with the world, safeguards information against security threats and even can decide which computers take priority.

<b>1.2. Switch </b>

- <b>Concept: Connecting all the devices, including computers, printers and servers in the small business </b>

network facilitates the sharing of resources

- <b>Operating principles of a switch: Could connect multiple devices, like computers, wireless connection </b>

points, printers and servers, in a building or on the campus, on the same network. Connected devices can share information and communicate with each other by a switch

</div><span class="text_page_counter">Trang 51</span><div class="page_container" data-page="51">

<b>1.3. Gateway </b>

- Concept: A gateway is a node in a computer network that serves as a major stop for data traveling to or from other networks. Using gateways, we may communicate and transmit data back and forth. The Internet would be useless without gateways.

- Operating principles of a gateway: When a computer server operates as a gateway, it also works as a firewall

</div><span class="text_page_counter">Trang 59</span><div class="page_container" data-page="59">

<b>2. Server types </b>

-

<b>Concept: A Web Server is software and hardware using HTTP and other protocols to react </b>

to customer requests made over the World Wide Web. The major task of a web server is the storage, processing and delivery of the website material to our users. Web server. Web servers also support SMTP (Simple Mail Transfer Protocol) and FTP (File Transfer Protocol) as well as HTTP.

-

<b>Operating principles:</b>

<b> </b>

Obtaining the IP Address from domain name Browser requests the full URL

Web server responds to request Browser displays the web page <small> </small>

</div><span class="text_page_counter">Trang 63</span><div class="page_container" data-page="63">

- <b>Concept: A mail server is an application that receives incoming email from local users and </b>

remote senders and forwards outgoing messages for delivery.

- <b>Operating principles: When the sender clicks the </b>send button, all the packets are uploaded to a central computer (the email server) that hosts the email service. The email service then relays these packets through the internet to the server which holds the email service of the recipient. The mail server of the recipient looks for his email address, locates it and places the email within the inbox.

</div><span class="text_page_counter">Trang 67</span><div class="page_container" data-page="67">

- Operating principles: DNS translates domain names to IP addresses so browsers can load Internet resources. Each device connected to the Internet has a unique IP address which other machines use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.

</div><span class="text_page_counter">Trang 69</span><div class="page_container" data-page="69">

<b>2.4. DHCP Server </b>

- Concept<b>: </b>DHCP (Dynamic Host Configuration Protocol) is based on a client-server model and based on discovery, offer, request, and ACK. DHCP port number for server is 67 and for the client is 68. It is a Client server protocol which uses UDP services. IP address is assigned from a pool of addresses.

- Operating principles<b>: </b>When a device wants access to a network that’s using DHCP, it sends a request for an IP address that is picked up by a DHCP server. The server responds be delivering an IP address to the device, then monitors the use of the address and takes it back after a specified time or when the device shuts down. The IP address is then returned to the pool of addresses managed by the DHCP server to be reassigned to another device as it seeks access to the network.

-

</div><span class="text_page_counter">Trang 71</span><div class="page_container" data-page="71">

<b>2.5. FTP Server </b>

- <b>Concept: FTP (File transfer protocol) is an Internet tool provided by TCP/IP. It helps to </b>

transfer files from one computer to another by providing access to directories or folders on remote computers and allows software, data, text file to be transferred between different kinds of computers.

- <b>Operating principles: The FTP connection is established between two systems and they </b>

communicate with each other using a network. When an FTP connection is established, there are two types of communication channels are also established and they are known

<b>as command channel and data channel</b>. The <b>command channel is used to transfer the commands and responses from client to server and server to client. Whereas the data channel is used to actually transfer the data between client and server. </b>

</div><span class="text_page_counter">Trang 73</span><div class="page_container" data-page="73">

<b>IV. Discuss the inter-dependence of workstation hardware with relevant networking software. </b>

<b> Definition: Interdependence provides support to individuals allowing them the strength to support others and to focus on their </b>

own personal growth. Interdependence in networking depicts how the failure of a node in one network causes the failure of dependent nodes in other networks, which in turn may cause more damage to the initial network, resulting in multiple failures and serious results.

</div>

×