Tải bản đầy đủ (.pdf) (64 trang)

information technology assignment 1 unit 2 networking

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (1.77 MB, 64 trang )

<span class="text_page_counter">Trang 1</span><div class="page_container" data-page="1">

<b>STUDENT : NGUYEN DINH THAI CLASS : IT05101 </b>

<b>STUDENT ID : BD00123 </b>

<b>SUPERVISOR : TRUONG DANG HIEU </b>

<b>Da Nang, June 2022 </b>

</div><span class="text_page_counter">Trang 2</span><div class="page_container" data-page="2">

<b> ASSIGNMENT 1 FRONT SHEET </b>

<b>Unit number and title Unit 2: Networking </b>

<b>Re-submission date<sup>Date received (2nd </sup></b>

<b>submission) </b>

</div><span class="text_page_counter">Trang 3</span><div class="page_container" data-page="3">

i

<b>Summative Feedbacks: </b>

<b>Resubmission Feedbacks:</b>

<b>Grade:Assessor Signature:Date:Internal V</b>erifier’s<b> Comments:</b>

<b>Signature & Date:</b>

</div><span class="text_page_counter">Trang 4</span><div class="page_container" data-page="4">

ii

<b>TABLE OF CONTENT </b>

Table of Contents

<b>TABLE OF CONTENT ... ii</b>

<b>LIST OF TABLES AND FIGURES ... v</b>

<b>LIST OF ACRONYM ... vii</b>

<b>INTRODUCTION ... 1</b>

Chapter 1. Examine networking principles and their protocols. (LO1) ... 2

1 Discuss the benefits and constraints of different network types and standards. (P1) ... 2

1.1 Define network: ... 2

1.2 Network type: ... 4

1.2.1 Local Area Network (LAN):... 4

1.2.2 Metropolitan Area Network (MAN): ... 5

1.2.3 Wide Area Network (WAN): ... 6

1.2.4 Compare LAN-MAN-WAN: ... 7

1.3 Network protocol definition: ... 9

1.3.1 Protocol:... 9

1.3.2 List some protocols:<small>(30)</small> ... 19

1.3.3 List some standard organizations and standard names:<small>(31)</small>... 20

2 Network topology & communication and Bandwidth requirements. (P2) ... 22

2.1 Network topology definition: <small>(32)</small> ... 22

2.1.1 Definition of Physical Topology and Logical Topology: <small>(33)</small> ... 22

2.2 Examples of topology with diagrams: ... 22

2.2.1 Bus: ... 22

2.2.2 Ring: ... 23

2.2.3 Star: ... 24

</div><span class="text_page_counter">Trang 5</span><div class="page_container" data-page="5">

CHAPTER 2: Explain networking devices and operations. (LO2) ... 31

3 Discuss the operating principles of networking devices and server types. (P3) ... 31

3.2.1 The principle of operation of the router: <small>(43)</small> ... 31

3.3 List network devices: ... 31

3.4 List server types: ... 36

4 Discuss the inter-dependence of workstation hardware with relevant networking software. (P4) ... 39

4.2 Explain what is meant by interedpendencies: ... 39

4.3 Explain the meaning of interdependence: ... 39

4.4 Identify workstation hardware: ... 39

4.5 Identify network software: ... 40

4.6 Discuss and explain the differences between workstation hardware and network software. Get an example of your discussion form: <small>(62)</small> ... 41

5 Compare common networking principles and how protocols enable the effectiveness of networked systems. (M1) ... 42

5.2 Make a comparison of network principles: ... 42

5.2.1 Compare LAN, CAN, MAN, WAN: <small>(63)</small> ... 42

5.2.2 Compare physical topologies and logical topologies: <small>(64)</small> ... 43

</div><span class="text_page_counter">Trang 6</span><div class="page_container" data-page="6">

iv

5.2.3 Compare between OSI reference model and TCP/IP reference model: ... 44

5.2.4 Compare TCP between UDP ... 45

5.3 Explains how network protocol enable effective use of the network system: ... 49

6 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization: ... 50

<b>CONCLUSION ... 51 </b>

<b>EVALUATION...52 </b>

<b>REFERENCES ... 53</b>

</div><span class="text_page_counter">Trang 7</span><div class="page_container" data-page="7">

v

<b>LIST OF TABLES AND FIGURES </b>

Table 1. 1 Compare LAN-MAN-WAN ... 8

Table 1. 2 Difference between software and hardware ... 41

Table 1. 3 Compare LAN, CAN, WAN, MAN of chapter 1 ... 43

Table 1. 4 Compare Physical Topology and Logical Topology of chapter1 ... 43

Table 1. 5 Compare OSI and TCP/IP of chapter 1 ... 45

Table 1. 6 Compare TCP and UDP of chapter 1 ... 49

Figure 1. 1 The client server model ... 2

Figure 1. 2 Peer-to-Peer ... 3

Figure 1. 3 Local Area Network ... 4

Figure 1. 4 Metropolitan Area Network ... 5

Figure 1. 5 Wide Area Network ... 7

Figure 1. 6 Layers and functions of each layer of the OSI . model ... 9

Figure 1. 7 Application layer ... 10

Figure 1. 8 Presentation layer ... 11

Figure 1. 9 Session layer ... 11

Figure 1. 10 Transport layer ... 12

Figure 1. 11 Network layer ... 13

Figure 1. 12 Data link layer ... 13

Figure 1. 13 Physical layer ... 14

Figure 1. 14 OSI divides network communication into 7 layers... 15

</div><span class="text_page_counter">Trang 8</span><div class="page_container" data-page="8">

vi

Figure 1. 15 TCP/IP Layered Model ... 15

Figure 1. 16 Application Layer ... 16

Figure 1. 17 Transport layer ... 17

Figure 1. 18 Internet layer ... 18

Figure 1. 19 The most common protocols of the TCP/IP model ... 19

Figure 1. 20 Bus Topology ... 22

Figure 1. 21 Ring Topology ... 23

Figure 1. 22 Star Topology ... 24

Figure 1. 23 Tree Topology ... 25

Figure 1. 24 Partially Connected Mesh Topology of chapter 1 ... 26

Figure 1. 25 Full Connected Mesh Topology of chapter 1 ... 27

Figure 1. 26 Hybrid Topology of chapter 1 ... 28

Figure 1. 27 Block diagram of communication rules ... 29

Figure 1. 28 Hub of chapter 2 ... 31

Figure 1. 29 Switch of chapter 2 ... 32

Figure 1. 30 Router of chapter 2 ... 32

Figure 1. 31 Bridge of chapter 2 ... 33

Figure 1. 32 Gateway of chapter 2 ... 33

Figure 1. 33 Modem of chapter 2 ... 34

Figure 1. 34 Web Server of chapter 2 ... 36

Figure 1. 35 Mail Server of chapter 2 ... 36

Figure 1. 36 Database Server of chapter 2 ... 37

Figure 1. 37 Domain Name System of chapter 2 ... 37

Figure 1. 38 Dynamic Host Configuration Protocol of chapter 2 ... 38

</div><span class="text_page_counter">Trang 9</span><div class="page_container" data-page="9">

vii

<b>LIST OF ACRONYM </b>

IEEE Institute of Electrical and Electronics Engineer

</div><span class="text_page_counter">Trang 10</span><div class="page_container" data-page="10">

viii

ADSL Asymmetric Digital Subscriber Line

</div><span class="text_page_counter">Trang 11</span><div class="page_container" data-page="11">

The report includes the following:

Chapter 1. Examine networking principles and their protocols. (LO1)

1 Discuss the benefits and constraints of different network types and standards. (P1) 2 Network topology & communication and Bandwidth requirements. (P2) CHAPTER 2: Explain networking devices and operations. (LO2)

3 Discuss the operating principles of networking devices and server types. (P3) 4 Discuss the inter-dependence of workstation hardware with relevant networking soft-ware. (P4)

5 Compare common networking principles and how protocols enable the effectiveness of networked systems. (M1)

6 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization: (M2)

</div><span class="text_page_counter">Trang 12</span><div class="page_container" data-page="12">

<b>Chapter 1. Examine networking principles and their protocols. (LO1) </b>

<b>1 Discuss the benefits and constraints of different network types and standards. (P1) </b>

<b>1.1 Define network: </b>

A computer network is a group of computers and periphery- al bias connected to each other through transmission mediums similar as crooked brace, optic fiber, electromagnetic swells, infrared shafts, etc. to partake data with each other. Data is transmitted from one machine to another in the form of double bits 0 and 1, which, after being converted into voltage or electror magnetic swells, will be transmitted through the transmission medium be-low. <small>(1)</small>

Client-Sever: is a computer network model that includes two main components: a client (client) and a server (server). In this model, the server is the place to store resources, install service programs, and perform client requests. The client takes the role of sending the request to the server. Client includes computers and electronic devices in general. <small>(2)</small>

Figure 1. 1 The client server model

</div><span class="text_page_counter">Trang 13</span><div class="page_container" data-page="13">

o The Client server model allows the network to centralize applications and functions in one or more dedicated file services. These machines become the heart of the system. The operating system of the Client server allows users to share the same resources simultaneously, regardless of geographical location. <small>(3)</small>

o The client-server web model is a well-known model in computer networking, very widely applied, and is the model of all existing websites. An opposite model is the master-slave model, where the server (as the boss) sends data to the client (as the slave) regardless of whether the client needs it or not. <small>(4)</small>

o The client/server model is as follows: Client/Server is the most general model, in fact, a server can be connected to many other servers to work efficiently and faster. When receiving a request from a client, this server can send the request it has just received to another server such as a database server because it cannot handle this request by itself. Servers can perform simple or complex tasks. <small>(5)</small>

A peer to peer (P2P) network is a distributed application architecture that partitions tasks or workloads among peers. Peers are devices participating in the application with equal privileges. They form a peer-to-peer network of nodes. <small>(6)</small>

Figure 1. 2 Peer-to-Peer

</div><span class="text_page_counter">Trang 14</span><div class="page_container" data-page="14">

o Peers make a portion of their resources, such as processing power, disk storage, or network bandwidth, available to other participants without the need for central coordination of a stable server or host. Peers are both providers and consumers of resources. It differs from the traditional client-server model in that resource consumption and provision are split. <small>(7)</small>

<b>1.2 Network type: </b>

<b>1.2.1 Local Area Network (LAN): </b>

LAN stands for Local Area Network, roughly translated as local computer network, this interface allows computers to connect to each other to work together and share data. This connection is made via a LAN cable or Wifi (wireless) in a narrow space, so it can only be used in a limited range such as offices, homes, schools...<small>(8) </small>

<small>Figure 1. 3 Local Area Network </small>

</div><span class="text_page_counter">Trang 15</span><div class="page_container" data-page="15">

Can only transmit in a certain space because the transmission line is short.

<b>1.2.2 Metropolitan Area Network (MAN): </b>

MAN (Metropolitan Area Network), also known as urban network, connects from many LANs via cables, other transmission means. The ability to connect in a large range such as in a town or city, conscious. <small>(9)</small>

The MAN network model is often used mainly for organizations and businesses with many branches and departments connected to each other.<small>(10) </small>

Man network is often used for businesses because this model provides many types of services such as connecting lines via voice (voice), data (data), video (image), deploying applications easily.<small> (11)</small>

<small>Figure 1. 4 Metropolitan Area Network</small>

</div><span class="text_page_counter">Trang 44</span><div class="page_container" data-page="44">

<b>3.3.6 Modem: </b>

Figure 1. 33 <small>Modem of chapter 2 </small>

is a device that modulates the analog signal to encode digital data, and demodulates the carrier signal to decode the digital signal. <small>(49) </small>

<b>3.3.7 Repeater: </b>

<b> </b>Figure 2.7 Repeater of chapter 2

is an extender, amplifier to help transmit wifi signal farther and more stable. This device is used to extend wifi network coverage in homes, offices, factories... <small>(50) </small>

</div><span class="text_page_counter">Trang 45</span><div class="page_container" data-page="45">

<b><small>(43): </small></b>

<small>(44): </small>

<small>(45): (46): (47): (48): </small>

<small>(49): (50): </small>

</div><span class="text_page_counter">Trang 46</span><div class="page_container" data-page="46">

<b>3.4 List server types: </b>

<b>3.4.1 A web server:</b>

<small> Figure 1. 34 Web Server of chapter 2 </small>

is computer software and underlying hardware that accepts requests via HTTP (the network protocol created to distribute web content) or its secure variant HTTPS. A user agent, commonly a web browser or web crawler, initiates communication by making a request for a web page or other resource using HTTP, and the server responds with the content of that resource or an error message. A web server can also accept and store resources sent from the user agent if configured to do so. <small>(51) </small>

<b>3.4.2 Mail Server: </b>

Figure 1. 35 Mail Server of chapter 2

is a system server that is specifically configured according to the domain name of the business used to send and receive email messages.<small> (52) </small>

</div><span class="text_page_counter">Trang 47</span><div class="page_container" data-page="47">

<b>3.4.3 DB Server: </b>

<small> Figure 1. 36 Database Server of chapter 2 </small>

is a computer system that provides other computers with services related to accessing and retrieving information from a database. <small>(53) </small>

<b>3.4.4 DNS Server: </b>

<small> Figure 1. 37 Domain Name System of chapter 2 </small>

The Domain Name System, also known as the Domain Name System, is an ordered naming system for computers and services participating in the Internet. It associates a variety of information with domain names marked for them so that users can use that domain to find out the information they need to know. It is important to choose a domain name that is meaningful to the user, which is linked to different networks of devices in order to locate and provide information to users around the world. <small>(54) </small>

</div><span class="text_page_counter">Trang 48</span><div class="page_container" data-page="48">

<b>3.4.5 DHCP Server: </b>

<small> Figure 1. 38 Dynamic Host Configuration Protocol of chapter 2 </small>

Dynamic Host Configuration Protocol is a protocol that allocates IP addresses to all devices accessing the same network through the built-in DHCP server on the router. <small>(55) </small>

<small>(51): </small>

<small>(52): (53): </small>

<small>(54): (55): </small>

</div><span class="text_page_counter">Trang 49</span><div class="page_container" data-page="49">

<b>4 Discuss the inter-dependence of workstation hardware with relevant networking software. (P4) </b>

<b>4.2 Explain what is meant by interedpendencies: </b>

<b>4.2.1 Hardware: is any part of PC/Laptop that we can touch, grasp or touch. These are the main </b>

electronic devices used to make a computer.

<b>4.2.2 Software: is a collection of programming code (programming code) installed on the </b>

mainboard or stored in the computer's hard drive. They will command/instruct the computer to perform various tasks.

<b>4.2.3 Interdependence of hardware and software: There must be hardware to make the physical </b>

connection and there must be software controls for it to work and that is the relationship between hardware and software, t has to be an association with together.

<b>4.3 Explain the meaning of interdependence: </b>

<b>4.3.1 Example 1: if our computer already has a network card, but we have not installed the driver </b>

software on that network card, we will not be able to access the network, and the software that controls the network card is the driver.

<b>4.3.2 Example 2: A video game is software, which uses a computer processor (CPU), memory </b>

<b>(RAM), hard drive, and video card to run. </b>

<b>4.4 Identify workstation hardware: </b>

All network computers need an installed network interface to connect to the network. <small>(56)</small>

Generally, most desktop computers these days have an intergrated Ethernet network interface built-into them.

And if a computer does not, then it can be added as a network interface card. NICs are also usually specific to the cable media you have installed. <small>(57)</small>

For example, Ethernet NICs are available for 10Base-2, 10Base-T, 100Base-T, and 1000Base-T media. <small>(58)</small>

<small>(56): </small>

<small>(58): class="text_page_counter">Trang 50</span><div class="page_container" data-page="50">

<b>4.5 Identify network software: </b>

Network workstations also need networking software to work with the network.<small>(59)</small> This software consists of several components: a driver for the NIC, driver software for the protocols being used, and a network requestor (sometimes called a network redirector). <small>(60)</small>

Workstations acting in a peer-to-peer fashion also have peer software that provides network services to other workstations. <Additionally, network service software might be needed, such as that required to use a particular network directory service (for example, Novell’s eDirectory).=

<small>(61) </small>

<small>(59): i/Pdf/Networking20A20Beginners20Guide.1073789939/help (60): (61): </small>

</div>

×