Professional Documents
Culture Documents
ASM1-submission Report - Phung Huu Minh Khanh - GDD210033
ASM1-submission Report - Phung Huu Minh Khanh - GDD210033
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature Km
Grading grid
P1 P2 P3 P4 M1 M2 D1
Summative Feedback: Resubmission Feedback:
2. Types of Networks.
2.1. Personal area network (PAN):
Definition: A personal area network (PAN) is the smallest and simplest type of
network. PANs connect devices within the range of an individual and are no larger
than about 10 meters (m). Because PANs operate in such limited areas of space, most
are wireless and provide short-range connectivity with infrared technology.
An example of a wireless PAN is when users connect Bluetooth devices, like wireless
headsets, to a smartphone or laptop. Although most PANs are wireless, wired PAN
options exist, including USB. PAN benefits:
Portability. Most devices that connect in a PAN are small and can be easily
transported.
Affordability. The ability to form a connection between two devices in a PAN
without additional wiring is generally less expensive compared to a wired network.
Reliability. PANs guarantee stable connectivity between devices, provided that the
devices remain within the 10 m range.
Security. PANs don't directly connect to larger networks, but rather to other
devices connected to larger networks. The security of a device in a PAN is
contingent upon how secure the intermediary device is within the larger overall
network.
2.2. Local area network (LAN):
a. Define: A local area network or LAN is a network that connects computers within a
limited area. This might be in a school, an office or even a home. For example, a
computer may connect to the router via Ethernet, while smartphones and tablets
connect to the router via Wi-Fi. All devices connected to the router share the same
network and often the same Internet connection.
b. Benefits: LAN is useful for sharing resources like files, printers, games or other
applications. It can be easy to manage data since data is stored on the sever
computer.
c. Constraints: The LAN administrator can see and check personal data files of each
and every LAN user. Moreover, he can view the computer and internet history of the
LAN user. So, it is no longer security and become privacy violations. And the area is
also limited
2.3. Metropolitan area network (MAN):
a. Define: MAN network is a network model that is connected from many LANs
together through cables, transmission facilities, etc. The connection range is in a wide
area like in a city. The main users of the MAN network model are organizations and
businesses that have many branches or departments connected to each other.
b. Benefits: Even though the prices is not as expensive as WAN, MAN gives a good
connection, all data is easily manageable in a centralized way. Moreover, the security
sever is better than WAN.
c. Constraints: As it cannot work on phone copper wires. Copper wires affect the
speed of MAN. So high cost is needed for fiber optics. In this network, there is a high
risk of attacking hackers as compared to LAN. So, data may be a leak. Highly security
staff is the need in MAN.
2.4. Campus network (CAN):
a. Define: A campus network is a LAN or set of connected LANs which is used by a
government agency, university, corporation or similar organization and is typically a
network across a set of buildings that are close together.
b. Benefits: CAN use a wireless connection for connecting different departments and
buildings across one organization. CAN is economical in the sense that it uses fewer
cables, switches, hubs and routers.
c. Constraints: Troubleshooting and maintenance of CAN are expensive as compared
to other networks. The connection between nodes (computers) is limited in size i.e.
you cannot connect a large number of nodes together in CAN. And also CAN have a
maximum length of 40 meters.
2.5. Wide area network (WAN):
a. Define: A WAN is a combination of a LAN and a MAN network connected via
satellite, fiber optic cable or wire cable. This wide area network can both connect into
a private network and can create large connections, covering an entire country or
globally.
b. Benefits: Storage capabilities and information sharing. Employees and customers
can use the network together.
c. Constraints: Need of security solutions due to the data transfer can be easily
accessed by hackers. They are expensive to setup. Setting up a WAN requires
purchasing of routers, switches and security solutions.
2.6. Wireless Local Area Network (WLAN):
a. Define: Wireless LAN is a network that allows devices to connect and communicate
wirelessly. Unlike LAN, WLAN is used the internet to commute despite of using
traditional cables.
b. Benefits: It is easier to add or remove workstation. You can also move workstation
while maintaining the connectivity. For propagation, the light of sight is not required.
The direction of connectivity can be anywhere i.e., you can connect devices in any
direction unless it is in the range of access point.
c. Constraints: WLAN requires license, it has a limited area to cover. Government
agencies can limit the signals of WLAN if required. This can affect data transfer from
connected devices to the internet. If the number of connected devices increases then
data transfer rate decreases.
2.7. Virtual private network:
a. Define: A virtual private network (VPN) creates a private network overlay across an
existing public network. VPNs use tunneling protocols that create encrypted
connections between the network and client devices. Network traffic travels over the
VPN service's secure, encrypted tunnels instead of a public network, effectively hiding
a user's IP address and data from ISPs and cybersecurity hackers. The user's location
appears to be wherever the VPN server exists.
b. VPN benefits: Privacy and anonymity. Users can browse a network without having
their activity monitored by an ISP. Increased security. Users must receive
authentication before gaining access to a VPN. Organizations can secure company data
this way by preventing unauthenticated users from accessing sensitive information.
Geo-spoofing. Users connected to VPNs appear to be in the same location as the
server, whether in an office building or another country entirely. Users can retrieve
company data or gain access to geo-blocked content outside of their country's
borders.
c. VPN use cases: Studies show that VPNs have risen in popularity in recent years as
internet users seek to browse the web without surveillance from their ISPs. An ISP can
monitor a user's web activity, including sites visited and the types of content
downloaded. VPNs hide this information from an ISP, while still providing the user
with access to the network service.
3. Overview about Protocol
Network protocols are a set of established rules that define how to format, transmit, and
receive data for computer network devices - from servers and routers to endpoints.
Standardized protocol networks provide a common language for device networks. Without
them, computers wouldn't know how to communicate with each other. A network protocol
connects one layer on one device to the same layer on another device – each layer adds
control information to the message. Physical layer ultimately carries a stream of bits
containing the message. Each network device has an implementation of each protocol at each
layer. Ethernet is a protocol made for Local Area Networks (LAN).
Figure 2: Overview about Protocol.
Internet Control Message Protocol (ICMP): ICMP protocol is made to send error
messages in a network. It works with the IP protocol. It helps to diagnose network
communication issues. ICMP is mainly used to determine whether or not data is
reaching its specified destination in the best ways.
Dynamic Host Configuration Protocol (DHCP): This protocol works on IP networks,
assigning IP addresses to devices and hosts connected to the network. It also allows
them to communicate with each other efficiently. In addition to the IP address, DHCP
also assigns the subnet mask, default gateway address, the domain name server (DNS)
address, and other pertinent configuration parameters.
Simple Network Management Protocol (SNMP): Simple network management
protocol used to manage the network. SNMP is capable of monitoring, configuring and
controlling device networks. SNMP traps can also be configured on the device
network, to notify the server hub when you can execute the tool
4. International Networking Standards Organizations.
American National ANSI is the main organization responsible for coordinating and publishing computer
Standards Institute and information technology standards in the United States.
(ANSI)
Information Technology ITIC is a group of several dozen companies in the information technology
Industry Council (ITIC) (computer) industry. ITIC is the SDO approved by ANSI to develop and process
standards related to many computer-related topics.
National Committee for A committee established by the ITIC to develop and maintain standards related to
Information Technology the information technology world. It maintains several sub-committees that develop
(NCITS) and maintain standards for various technical subjects.
Institute of Electrical and The IEEE (pronounced “eye-triple-ee”) is a well-known professional organization for
Electronics Engineers those in the electrical or electronics fields, including computers and networking.
(IEEE)
Electronic Industries The EIA is an international industry association that is best known for publishing
Alliance (EIA) electrical wiring and transmission standards.
Telecommunications The TIA is the communications sector of the EIA, and is responsible for developing
Industry Association communications standards.
(TIA)
International ITU-T is another large international body that develops standards for the
Telecommunication telecommunications industry. The ITU-T was formerly named the International
Union - Telephone and Telegraph Consultative Committee or CCITT.
Telecommunication
Standardization Sector
(ITU-T)
International Probably the biggest standards organization in the world, the ISO is really a
Organization for federation of standards organizations from dozens of nations.
Standardization (ISO)
Table 1: International Networking Standards Organizations.
II. The impact of network topology, communication and bandwidth requirements (P2)
A. Overview about Topology
First of all, to understand what is topology network, we need to have a little knowledge about
Lan, which I have just approach on the previous chapter. Each part in a local LAN can be arranged
and connected in many different ways and they are called topologies. So, network topology is the
way we arrange and connect components in the system network together.
Physical & Logical Topologies:
• Physical Topology: This is literally how devices can be connected with each other by
what we see, what I mean is it show us how actually they work with cables, wireless
connectivity, and more.
• Logical Topology: Describe a logical path that a signal goes through between node
networks.
Physical Topologies:
o Depicts physical layout of network.
o The layout can be modified based on needs.
o It can be arranged in star, ring, mesh and bus topologies.
o This has major impact on cost, scalability and bandwidth capacity of network
based on selection and availability of devices
o It is actual route concerned with transmission.
Logical Topologies:
Simply put, a router connects devices in a network by converting packet data between them.
This data can be sent between device or from device to Internet. Routers perform this task by
marking locally the IP address for each device on the network. This packet data is guaranteed
to arrive in the right place, not getting lost in the network.
3. Hub:
Definition:
Hub is a network device used to connect computers and electronic devices in the same LAN
system. Each Hub has about 4 – 24 ports, and performs the role of connection hub. In
particular, when one port receives data, the Hub will copy and transfer the data to other
ports. Since the Hub cannot distinguish from which port the task originates, it transfers data
to all ports simultaneously.
6. Repeater:
A repeater is an electronic device that amplifies the signal it receives. You can think of
repeater as a device which receives a signal and retransmits it at a higher level or higher
power so that the signal can cover longer distances, more than 100 meters for standard LAN
cables. Repeaters work on the Physical layer.
3. FTP:
Definition:
FTP - File Transfer Protocol (File Transfer Protocol) is used in the exchange of data in the
network via TCP/IP protocol, usually operating on 2 ports 20 and 21. With this protocol, client
computers in the network can access the FTP server to send or retrieve data. The highlight is
that users can access the FTP server to transmit and receive data even when they are far
away.
5. Mail:
Definition:
A mail server or mail server is a place to store, categorize, and organize all incoming emails
before being sent on the internet. Although you can send and receive emails in a split second,
in fact, when the email is sent, it will go through a series of complex transition stages (other
than the email address, these steps are more complicated) before reaching the recipient's
mailbox.
9. Application:
Definition:
It is a software engine that provides software applications for workstations or devices, usually
over the Internet using html protocols. Simply put, application servers can be treated as a
software framework, providing an environment where many applications can run no matter
what they are. Application server is different from Web server through the use of a lot of
dynamic content created by the server and closely integrated to the Database server.
2. Packet switching:
Definition:
Packet switching is the transfer of small pieces of data across various networks. These data
chunks or “packets” allow for faster, more efficient data transfer. Often, when a user sends a
file across a network, it gets transferred in smaller data packets, not in one piece. For
example, a 3MB file will be divided into packets, each with a packet header that includes the
origin IP address, the destination IP address, the number of packets in the entire data file, and
the sequence number. Packet Switching transmits data across digital networks by breaking it
down into blocks or packets for more efficient transfer using various network devices. Each
time one device sends a file to another, it breaks the file down into packets so that it can
determine the most efficient route for sending the data across the network at that time. The
network devices can then route the packets to the destination where the receiving device
reassembles them for use.
B. How the protocols enable networked systems to connect efficiently using these principles
1. Practical situations that are used for circuit switching:
o Direct physical connection between two devices.
o Shorter links (no, length) than point to point connection.
o Cannot be shared by other devices.
VI. Explore a range of server types and justify the selection of a server, considering a
given scenario regarding cost and performance optimization (M2).
Range Server: As you can see, the Domain Name System is essential to all your internet activities.
Any problems with the system can have cascading effects on your experience. For starters, if the
ISP-supplied DNS servers are slow, or not properly configured for caching, they can effectively
slow your connection. This is especially true when you load a page that draws content from many
different domains, such as advertisers and affiliates. Switching to DNS servers optimized for
efficiency can speed up your surfing, whether in a home or business setting. Speaking of a
business setting, some companies offer DNS services with business-friendly add-ons. For
example, they can filter out malicious websites at the DNS level, so the pages never reach an
employee's browser. They may also contain a lot of information to work in companies. I
mentioned that your DNS server caches popular requests, so it can respond quickly, without
having to query other components of the Domain Name System. So, to build a system with high
securities for DNS server, a rack mount server is considered. A rack mount server is a computer
dedicated to use as a server and designed to be installed in a framework called a rack. The rack
consists of multiple mounting slots known as bays; each are designed to hold a hardware unit
secured in place with screws. A single rack can contain different servers stacked one over the
other, solidifying network assets and limiting the required floor space. The rack server design
additionally streamlines cabling among system segments. In a hardware rack loaded up with
servers, an uncommon cooling framework is important to avert exorbitant warmth development
that would some way or another happen when many power-disseminating parts are kept in a
little space example of rack mount server is Dell PowerEdge R440 – 4x3.5 (Basic).
Specification
CPU Sockets 2 x Socket P (LGA 3647)
CPU Support 2nd Generation Intel Xeon Scalable processors, up to 24 cores per processor
RAM Support 16 x DDR4 DIMM slots, Supports RDIMM /LRDIMM, 2666MT/s, 1TB max.
Drive Bays 8 x 2.5" SATA/SAS or 4 x 3.5" SATA/SAS
RAID Controller H330
RAID Support PERC H330, H730p, HBA330 Software RAID (SWRAID) S140
Form Factor 1U
PCIe 2 x Gen3 slots all (x16)
I/O Ports 2 x USB 3.0, 1 x USB 2.0, Video, 1 x iDRAC micro-USB 2.0,1 x Dedicated
iDRAC network port, 1 x Serial
Network Interface 2 X 1GbE
Power Supply 550W
Redundant Power Optional
Table 3: Specification of Dell PowerEdge R440 - 4x3.5 (Basic).
The power switch can sometimes be a little small/indistinct to spot on the front
panel.
References
Anon., n.d. Advantages and Disadvantages of PAN. [Online]
Available at: https://www.itrelease.com/2018/07/advantages-and-disadvantages-of-personal-area-
network-pan/
[Accessed 27 8 2022].