Btec FPT International College

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 53

BTEC FPT INTERNATIONAL

COLLEGE

INFORMATION TECHNOLOGY

ASSIGNMENT 1

UNIT 2: NETWORKING INFRASTRUCTURE

STUDENT : NGO VAN TIN


CLASS : SE06202
STUDENT ID : BD00325
SUPERVISOR : NGUYEN BAO QUOC

DaNang, June 2023

i
ASSIGNMENT FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and Unit 2: Networking Infrastructure


title
Date received (1st
sub- mission)
Submission date 25/06/2023 25/06/2023

Date received (2nd


submission)
Re-submission
date
NGO VAN
TIN
Student name Student ID BD00325

Class SE06202 Assessor name Nguyen Bao Quoc

Student declaration
I certify that the assignment submission is entirely my work and I fully
understand the consequences of plagiarism. I understand that making a false
declaration is a form of malpractice.
Student’s signature:

Grading grid

P1 P2 P3 P4 M1 M2 D1

i
Summative Feedbacks: Resubmission Feedbacks:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:

ii
ACKNOWLEDGMENT
First and foremost, I would like to express my heartfelt gratitude to my
mentor, Nguyen Bao Quoc, for his unwavering support throughout my studies
and research. His patience, motivation, enthusiasm, and vast knowledge have
been invaluable to me. His guidance has been instrumental in shaping and
completing this thesis. I would not have been able to achieve this without his
exceptional assistance.

I would also like to extend my thanks to my friends, who have


contributed to expanding my knowledge in my field of study. Not only have
they provided valuable insights and discussions, but they have also been a
constant pillar of support whenever I needed them.

Furthermore, I would like to acknowledge the school for providing me


with all the necessary resources and facilities, enabling me to complete my
work effectively. Their commitment to creating an environment conducive to
learning and research has been pivotal in my academic journey.

Lastly, but most importantly, I would like to express my heartfelt


appreciation to my family: my parents, Ngo Van Trung and Nguyen Thi Hang,
who have been there for me from the very beginning. Their unwavering love,
encouragement, and support have fueled my drive to excel in my work.

Once again, I extend my sincere thanks to all those who have


contributed to my academic and personal growth.

Perfomed Student: Ngo Van Tin 1


ASSURANCE
I hereby affirm that this work is entirely mine, derived from my own
research. I acknowledge and attribute all materials and sources utilized in its
creation, including books, papers, reports, lecture notes, and any other relevant
documents, both electronic and personal communication. Additionally, I
confirm that this assignment has not been previously submitted for assessment
in any other course unless explicit permission has been granted by all unit
coordinators involved, nor have I duplicated or plagiarized ideas from others'
work in any form.

Declaration of the learner

I verify that the work I've submitted for this assignment is all my own, and that all
research sources have been properly credited.

Signature of the student: Date:

Perfomed Student: Ngo Van Tin 2


INTRODUCTION
Nbetworking also plays a crucial role in our lives. In this report, we will explore
the world of networking, including concepts such as networking protocols,
network architecture, and basic network programming. This knowledge will
enable us to gain a deeper understanding of how networking functions, how
protocols are defined, and the process of building network applications. Let's
delve into the fascinating world of networking in this assignment!
 This report includes the following:
Chapter 1: Examine networking principles and their protocols(LO1)
1. Discuss the benefits and constraints of different network types and standards.
(P1)
2.  Network topology & communication and Bandwidth requirements(P2)
3.  Compare common networking principles and how protocols enable the
effectiveness of networked systems. (M1)
Chapter 2 Explain networking devices and operations(LO2)
1. Discuss the operating principles of networking devices and server types. (P3)
2. Discuss the interdependence of workstation hardware with relevant
networking
software. (P4)
3. Explore a range of server types and justify the selection of a server,
considering a given scenario regarding cost and performance optimization(M2)
4. Considering a given scenario, identify the topology protocol selected for the
efficient utilization of a networking system. (D1)

Perfomed Student: Ngo Van Tin 3


Table of Contents

DaNang, June 2023.....................................................................................................1

Grading grid...........................................................................................................................2

ACKNOWLEDGMENT............................................................................................1

ASSURANCE..............................................................................................................2

INTRODUCTION.......................................................................................................3

CHAPTER 1. EXAMINE NETWORKING PRINCIPLES AND THEIR............9

PROTOCOLS (LO1)..................................................................................................9

1. Discuss the benefits and constraints of different network types and standards.
(P1)............................................................................................................................................9

1.1 Define Network.................................................................................................................9

1.2 Network Types..................................................................................................................9

1.3 Protocol and Standards..................................................................................................13

1.3.1 Network protocol definition:..........................................................................13

1.3.2 Types of Network Protocol:...........................................................................13

1.3.3 Some Common Network Standards:..............................................................14

2. Explain the impact of network topology, communication, and bandwidth


requirements. (P2).................................................................................................................15

2.1 Network topology............................................................................................................15

2.1.1 Types of Network Topology..........................................................................15

2.1.2 Examples of topology....................................................................................16

2.1.2.1 Point-to-point topology...............................................................................16

Perfomed Student: Ngo Van Tin 4


2.1.2.2 Bus topology..............................................................................................16

2.1.2.3 Ring topology.............................................................................................17

2.1.2.4 Star topology...............................................................................................17

2.2 Communications............................................................................................................20

2.2.1 Define commutations in terms of networking...............................................20

2.2.2 Rules of Communication...............................................................................20

2.3 Bandwidth.......................................................................................................................21

3. Compare common networking principles and how protocols enable the


effectiveness of networked systems(M1).............................................................................22

3.1 Compare LAN, CAN, MAN, WAN.................................................................................22

3.2 Compare physical topologies and logical topologies.....................................................23

3.3 Compare between OSI reference model and TCP/IP reference model.........................23

3.4 Compare TCP between UDP..........................................................................................24

CHAPTER 2. Explain networking devices and operations (LO2).......................25

1. Discuss the operating principles of networking devices and server types.(P3)


.................................................................................................................................................25

1.1. Network devices.............................................................................................................25

1.1.1 Definition:......................................................................................................25

1.1.2 Several network device..................................................................................25

a. Hub......................................................................................................................25

b. Switch.................................................................................................................26

c. Router..................................................................................................................26

d. Bridge.................................................................................................................27

e. Gateway..............................................................................................................28

Perfomed Student: Ngo Van Tin 5


f. Modern................................................................................................................29

g. Repeater..............................................................................................................30

h. Access Point.......................................................................................................31

1.2 Server..............................................................................................................................31

1.2.1 Definition.......................................................................................................31

1.2.2 Server types....................................................................................................32

a. Web Server.........................................................................................................32

b. File Servers.........................................................................................................32

c.Database Servers..................................................................................................33

d. Application Servers............................................................................................34

e. Mail Servers........................................................................................................34

f. Print Servers........................................................................................................35

g. DNS Servers.......................................................................................................35

h. Game Servers......................................................................................................36

2. Discuss the inter-dependence of workstation hardware with relevant


networking software.(P4).....................................................................................................37

2.1 Network software............................................................................................................37

2.2 Workstation hardware....................................................................................................37

2.3 Explain what is meant by interdependencies.................................................................38

2.4 Give examples of interdependency.................................................................................38

2.5 Discuss and explain the interdepence of workstation hardware with networking
software. Derive an example from your discussion.............................................................38

3.Explore a range of server types and justify the selection of a server,


considering a given scenario regarding cost and performance optimization(M2)..........39

4. Considering a given scenario, identify the topology protocol selected for the
efficient utilization of a networking system(D1).................................................................39

Perfomed Student: Ngo Van Tin 6


CRITICAL EVALUATION.....................................................................................39

CONCLUSION..........................................................................................................40

REFERENCES..........................................................................................................42

Perfomed Student: Ngo Van Tin 7


LIST OF TABLE AND FIGURE
Figure 1. Computer network.....................................................................................................10
Figure 2. A local area network (LAN)........................................................................................11
Figure 3. Wide area network(WAN)..........................................................................................12
Figure 4. Metropolitan area network(MAN)................................................................................13
Figure 5. Network protocol.......................................................................................................14
Figure 6. Point to point............................................................................................................. 17
Figure 7. Bus topology............................................................................................................. 17
Figure 8. Ring topology............................................................................................................ 18
Figure 9. Star topology............................................................................................................. 19
Figure 10. Tree topology.......................................................................................................... 19
Figure 11. Mesh topology......................................................................................................... 20
Figure 12. Hybrid topology.......................................................................................................20
Figure 13. Daisy chain topology................................................................................................21
Figure 14. Bandwidth............................................................................................................... 22
Figure 15. HUB....................................................................................................................... 26
Figure 16. SWITCH................................................................................................................. 27
Figure 17. ROUTER................................................................................................................ 28
Figure 18. BRIDGE................................................................................................................. 29
Figure 19. GATEWAY............................................................................................................ 30
Figure 20. MODERN............................................................................................................... 30
Figure 21. REPEATER............................................................................................................ 31
Figure 22. ACCESS POINT......................................................................................................32
Figure 23. WEB SERVER........................................................................................................33
Figure 24. FILE SERVER........................................................................................................ 34
Figure 25. DATABASE SERVER.............................................................................................34
Figure 26. APPLICATION SERVER.........................................................................................35
Figure 27. MAIL SERVER.......................................................................................................36
Figure 28. PRINT SERVER......................................................................................................36
Figure 29. DNS SERVER.........................................................................................................37
Figure 30. GAME SERVER.....................................................................................................38

Table 1.Compare LAN, CAN, MAN, WAN...............................................................................23


Table 2. Compare physical topologies and logical topologies........................................................24
Table 3. Compare between OSI reference model and TCP/IP reference model................................25
Table 4. Compare TCP between UDP........................................................................................25

Perfomed Student: Ngo Van Tin 8


LIST OF ACRONYM
LAN Local Area Networks
WAN Wide Area Networks
MAN Metropolitan Area Network
TCP/IP Transmission Control Protocol/ Internet Protocol
DNS Domain Name System
HTTP Hypertext Transfer Protocol
ICMP Internet Control Message Protocol
ANSI American National Standards Institute
ISO International Organization for Standardization
IEEE Institute of Electrical and Electronics Engineers
BPS Bits Per Second
CAN Campus Area Network
TCP Transmission Control Protocol
UDP User Datagram Protocol
VPN Virtual Private Network

Perfomed Student: Ngo Van Tin 9


CHAPTER 1. EXAMINE NETWORKING PRINCIPLES AND
THEIR
PROTOCOLS (LO1)

1. Discuss the benefits and constraints of different network types and


standards. (P1)
1.1 Define Network
A computer network is a system that connects many devices to share resources
and communicate with each other. It enables data transmission and sharing of
information between devices. It is done within the network, regardless of their
physical location.

Figure 1. Computer network

1.2 Network Types


 A local area network (LAN) is a collection of devices that are interconnected
at a physical location, such as a building, office, or home. LANs can be small or
large, from a home network with users to a business network with rows of users
and devices in the office or school.

Performed Student: Ngo Van Tin 10


Figure 2. A local area network (LAN)

 Benefits:
- Simple and Inexpensive: The main benefit of a Local Area Network is
that it is quick and easy to set up for a relatively low price. If an
organization wants to build a network at a low cost and flexibility, a local
area network would be an ideal choice.
- Accessible Software: Programs can also be shared on the Local Area
Network. Combine a single licensed program and any device can use it on
the network.
- Fast communication: Devices linked to the LAN transfer files and
communicate directly and quickly based on the LAN model and installed
ethernet cable. They work on 1000 Mbps, 100 Mbps, and 10 Mbps.
Gigabit Ethernet technology is evolving rapidly. If the technology
becomes complex and mass-produced, lower-cost variants will become
accessible to the masses.
- Client and Server Association: All company-related information is kept
on one server. If a customer requests information, the customer can
seamlessly access that information.
- Resource collaboration: Expensive components, like scanners and
printers, cannot be connected to every device in the office and it becomes
a heavy task for the organization, but a LAN, requires a printer and
scanner. and people can be connected and they have to send instructions

Performed Student: Ngo Van Tin 11


from their respective machines. This will save staff time and money.
- File Locking: A LAN allows locking files within its network.
 Drawbacks:
- Weak data protection: Unauthorized users can access files if the server
has not been programmed properly. Therefore, malfunctions are
frequently observed.
- Maximum Damage: If a device, file, or server goes down, it affects the
entire network.
- Expensive Installation Fee: Installing a LAN is expensive because it
requires specialized software to install the server.
- Malware: Malware can easily penetrate the LAN, corrupt the whole
network, and destroys important data.
- Maintenance: LAN requires frequent maintenance and the involvement of
technicians and system operators.
- Space Issues: LAN software requires an area of memory in each
mainframe used on the network. It minimizes the space required for the
user's program.
 Wide area network (also known as a WAN) is a large information
network that is not constrained to one location. A WAN can facilitate
communication, information sharing, and more between devices from
around the world through a WAN provider.

Figure 3. Wide area network(WAN)

Performed Student: Ngo Van Tin 12


 Benefits:
- Share Resources: The primary benefit of WAN is the ability to connect
multiple offices, branches, and data centers around the world. This
enables businesses to share resources, data, and applications with each
other, eliminating the need for expensive and time-consuming physical
connections between each location
- Scalability and flexibility: A WAN can easily scale up to meet increased
bandwidth requirements in a short time. This means that organizations can
instantly increase bandwidth as needed without having to install new
equipment.
- Cost reduction: A WAN is significantly less expensive to implement than
a private network. This makes WANs cost-effective for connecting
remote offices and increasing bandwidth.
- Improved security: Data transmission across a WAN is more secure than
LAN-based transmission because most WANs use public networks.
- Access to a wide range of services: Since WANs use the internet,
organizations can access a wide range of networks and services.
 Drawbacks:
- Increased latency: Since data is transmitted over a WAN, there may be an
increase in latency. This means that it may take longer for data to travel
across the network.
- Higher costs: Because WANs use a public network, they may come with a
higher price tag than a private network.
- Security risks: While WANs are generally more secure than LANs due to
the use of TLS, there are still some security risks. For example,
employees may not use TLS properly, which can open the network to
hacking.
- Slower Issue: WANs are often slower than LANs due to the increased
distance between locations. This can affect the performance of

Performed Student: Ngo Van Tin 13


applications and services that are hosted on the WAN.
- Complexity: WANs require complex network configurations and
specialized hardware, which can be difficult to set up and maintain.
Additionally, WANs are vulnerable to outages and disruptions due to their
reliance on the public Internet. This can cause data to be lost or delayed,
which can be costly for businesses
 The term MAN full form is a metropolitan area network. It is in between
LAN and WAN technology and that covers the entire city. It is very
similar to LAN technology. Here this article gives information about the
advantages and disadvantages of MAN to know more details about it.

Figure 4. Metropolitan area network(MAN)

 Benefits:
- It provides higher security compared to WAN
- It is wider than LAN
- It helps in the cost-effective sharing of common resources such as printers
- It helps people interface fast LANs together. This is due to the easy
implementation of links
- MAN requires fewer resources compared to WAN. This saves the
implementation cost
- The dual bus used in MAN help the transmission of data in both direction
simultaneously
- It provides a good backbone for a large network and also provides greater

Performed Student: Ngo Van Tin 14


access to WAN
- A MAN is usually encompassed several blocks of the city or an entire city
- Increases the efficiency of handling data
- Increases the speed of transfer of data
- Easy to implement link
- Save the cost attach to establishing a wide area network
 Drawbacks:
- More cable require for a MAN connection from one place to another
- The data rate is slow compared to LAN
- It is difficult to make a system secure from hackers
- The large network difficult to manage
- It is difficult to secure the network once it becomes large
- Network installation requires skilled technicians and network
administrators. This increases overall installation and management costs
- Cost is higher than LAN
- While we move our network to another city or area it doesn't work
1.3 Protocol and Standards
1.3.1 Network protocol definition:
Network protocols are a set of rules outlining how connected devices
communicate across a network to exchange information easily and safely.
Protocols serve as a common language for devices to enable communication
irrespective of differences in software, hardware, or internal processes.

Performed Student: Ngo Van Tin 15


Figure 5. Network protocol

1.3.2 Types of Network Protocol:


 Different protocols serve different functions to ensure efficient, quick, and
secure network communication. Various types of network protocols can
be categorized into the following three broad categories to help
organizations operate seamlessly across different business scenarios:
 Network Communication Protocols: These protocols determine the rules
and formats to transfer data across networks. Communication protocols
govern various aspects of analog and digital communications, such as
syntax, authentication, semantics, and error detection, among others.
Some key network communication protocols include:
- Hyper-Text Transfer Protocol (HTTP)
- Transmission Control Protocol (TCP)
- Internet Protocol (IP)
- User Datagram Protocol (UDP)
- File Transfer Protocol (FTP)
 Network Security Protocols: These protocols ensure safe data
transmission over network connections. Network security protocols define
the procedures to secure data from any unauthorized access. These
protocols leverage encryption and cryptography to safeguard. Here are the
most widely used network security protocols:
- Secure File Transfer Protocol (SFTP)
Performed Student: Ngo Van Tin 16
- Hyper-Text Transfer Protocol Secure (HTTPS)
- Secure Socket Layer (SSL)
 Network Management Protocols: Network managers require standard
policies and procedures to manage and monitor the network for
maintaining smooth communication. Network management protocols
ensure quick troubleshooting and optimal performance across the
network. The following are essential network protocols management:
- Simple Network Management Protocol (SNMP)
- Internet Control Message Protocol (ICMP)
1.3.3 Some Common Network Standards:
- International Organization for Standardization (ISO)
- Wi-Fi Alliance (WFA)
- International Telecommunication Union (ITU)
- Internet Society (ISOC)
- Storage Networking Industry Association (SNIA
- IT Infrastructure Library (ITIL)
- European Union (EU)

2. Explain the impact of network topology, communication, and bandwidth


requirements. (P2)
2.1 Network topology.
Topology or Network Topology is simply a network topology model. This
model clearly shows each hardware element and their arrangement. 
On the other hand, network topology is also understood as a way of connecting
nodes in the same network. To optimize the operation of the network system.
The physical network connection structure (most commonly LAN) is divided
into several categories. In which each network structure owns the configuration
of each different node. For enterprises, the ideal network structure or not
depends on the aspect of scale, investment cost, and purpose of use.

Performed Student: Ngo Van Tin 17


Each network structure model diagram is the basis for network administrators to
monitor and support the maintenance and repair process of the network system.
2.1.1 Types of Network Topology
The structure of a network can directly impact its functioning. Therefore,
companies must select the most suitable topology for their network to bolster
performance and enhance data efficiency. The right topology also optimizes
resource allocation and minimizes operational costs.
Organizations use network topology to define how their network nodes are
linked to each other. The two major categories of topology are physical and
logical.
 Physical Topology refers to the interconnected structure of a local area network
(LAN). The method employed to connect the physical devices on the network
with the cables, and the type of cabling used, all constitute the physical
topology. This contrasts with logical topology, which describes a network’s
media signal performance and how it exchanges device data.
Logical network topology is not always mapped to a specific physical topology.
For example, twisted pair Ethernet is a logical bus topology that is mapped to a
physical star topology plan, while IBM’s token ring is a logical ring topology
that is physically implemented as a star topology.
 Logical topology is a concept in networking that defines the architecture of the
communication mechanism for all nodes in a network. Using network
equipment such as routers and switches, the logical topology of a network can
be dynamically maintained and reconfigured.
Logical topologies contrast with physical topologies, which refer to the physical
interconnections of all devices in the network.
The logical topology defines how the data should transfer. Contrast this to the
physical topology, which consists of the layout of cables, network devices, and
wiring.
2.1.2 Examples of topology
Some common physical network topologies used by organizations include point-
Performed Student: Ngo Van Tin 18
to-point, bus, ring, star, tree, mesh, and hybrid topology networks. Each type
consists of different node and link configurations.
2.1.2.1 Point-to-point topology
Point-to-point is a simple topology that directly links two nodes and reserves the
entire bandwidth of the connection for them to communicate with one another.
Physically, point-to-point connections rely on a cable or wire that connects the
two endpoints. However, logical topological connections using satellite links
and microwaves are more common nowadays.

Figure 6. Point to point

A basic example of a point-to-point connection is changing the temperature of


an air conditioning unit using a remote control. 
2.1.2.2 Bus topology
In a bus topology, all the nodes are linked using a single cable with a terminator
on both ends. This configuration sees one main cable acting as the backbone for
the whole network.

Performed Student: Ngo Van Tin 19


Figure 7. Bus topology

In such an arrangement, the server node transmits data from one end of the cable
in a single direction to the client node. As the data travels to each node, its
destination address (MAC/IP) is checked to see if it is received and processed. If
there is a mismatch in the address, the node does not do anything with the data. 
This way, only the node that recognizes its address uses the data that travels on
the single cable, while the other nodes are unaffected. Once the data reaches the
end of the cable, the terminator removes it to prevent the signal bouncing
2.1.2.3 Ring topology
In a ring topology, each node is linked with its neighbor to form a closed
network. This configuration sees the data move from one node to another, either
unidirectionally or bidirectionally. Such network topology is used in smaller
networks, like those in schools.

Figure 8. Ring topology

Many ring networks use token passing to regulate data flow. In such an
arrangement, a token is transferred from one device to the next, and only the
node with the token can transmit data. The device that receives the data from the
token sends it back to the server along with an acknowledgment. Only an
endpoint with access to an ’empty’ token can transmit data at a given time,
while the other computers have to wait for their turn.

Performed Student: Ngo Van Tin 20


2.1.2.4 Star topology
In a star topology, all nodes are connected to a central hub using a
communication link. Each node needs a separate wire to establish a point-to-
point connection with the hub, which functions as a server to control
and manage the entire network.

Figure 9. Star topology

In such a configuration, if one endpoint wants to transmit data to another


endpoint, it must send the request to the central hub, forwarding the message to
the intended recipient.
2.1.2.5 Tree topology
In a tree topology, nodes are arranged in a configuration that resembles a tree’s
leaves, branches, and trunk. Endpoints, or ‘leaves,’ are connected to mid-level
nodes or ‘branches’ linked to the tree’s ‘trunk.’ The trunk is the backbone
connection that links multiple mid-level nodes.

Performed Student: Ngo Van Tin 21


Figure 10. Tree topology

Tree topologies are suitable for large networks such as offices, university
campuses, and hospitals.
2.1.2.6 Mesh topology
In a mesh topology, all the nodes are interconnected and can send and receive
their data and relay data from other nodes.

Figure 11. Mesh topology

Full mesh networks, wherein each node is connected to every other node, are
usually reserved for critical networks as they are extremely costly to implement
and challenging to maintain. IT teams also have the option of implementing
partial mesh networks, wherein all the nodes are not connected. This is less cost-
Performed Student: Ngo Van Tin 22
intensive and easier to implement; however, it does not have all the advantages
of a full mesh network.
2.1.2.7 Hybrid topology
A hybrid network topology, as the name suggests, features characteristics of
multiple other topologies. The creation of such a configuration depends on the
requirement of the network.

Figure 12. Hybrid topology

The two most commonly used hybrid topologies are star-ring and star-bus. In
the former, the central hubs of multiple star topologies are linked using a ring
topology. In the latter, the hubs of numerous star topologies are connected using
a bus topology.
2.1.2.8 Daisy chain topology
Finally, the daisy chain topology links nodes in a sequence. Data is transferred
from one node to the next until it reaches its destination. The two types of a
daisy chain network topology are linear daisy chain and ring daisy chain.

Performed Student: Ngo Van Tin 23


Figure 13. Daisy chain topology

In the former, devices are linked in a straight line with two ‘ends,’ similar to a
bus topology. In the latter, a ‘ring’ of devices is formed. Ring daisy chain
topologies are usually more favorable than linear daisy chain topologies as the
data travels in a loop, thereby halving the number of senders and receivers.
Further, in case of a single node or link getting damaged, the network does not
grind to a halt as the data can just switch directions to reach its destination.
2.2 Communications
2.2.1 Define commutations in terms of networking.
Network communication, or internetworking, defines a set of protocols (that is,
rules and standards) that allow application programs to talk with each other
without regard to the hardware and operating systems where they are run.
Internetworking allows application programs to communicate independently of
their physical network connections.
2.2.2 Rules of Communication.
The rules of communication in networking are defined by protocols. Protocols
are a set of rules and guidelines that govern communication between devices on
a network. They define how data is transmitted and how devices on the network
can communicate with each other.
2.3 Bandwidth.

Performed Student: Ngo Van Tin 24


Figure 14. Bandwidth

 Network bandwidth is a measurement indicating the maximum capacity


of a wired or wireless communications link to transmit data over a
network connection in a given amount of time. Typically, bandwidth is
represented in the number of bits, kilobits, megabits, or gigabits that can
be transmitted in 1 second. Synonymous with capacity, bandwidth
describes the data transfer rate. Bandwidth is not a measure of network
speed -- a common misconception.
 Bandwidth requirements for networks can vary depending on the specific
needs of the network and its users. Some factors that can affect bandwidth
requirements include:
- Number of users
- Types of applications
- Data transfer rate
- Distance between devices
- Network topology

3. Compare common networking principles and how protocols enable the


effectiveness of networked systems(M1).
3.1 Compare LAN, CAN, MAN, WAN

Performed Student: Ngo Van Tin 25


Basis LAN MAN WAN
Full-Form LAN stands for MAN stands for WAN stands for
local area metropolitan area wide area network
network network
Geographic Operates in small Operates in large Operates in large
Span areas such as the areas such as a areas such as
same building or city country or continent
campus
Ownership LAN’s MAN’s ownership While WAN also
ownership is can be private or might not be owned
private public by one organization
Transmission The transmission While the Whereas the
Speed speed of a LAN transmission transmission speed
is high speed of a MAN of a WAN is low
is average
Propagation The propagation There is a Whereas, there is a
delay delay is short in a moderate long propagation
LAN propagation delay delay in a WAN
in a MAN
Congestion There is less While there is Whereas WAN’s
congestion in a more congestion design and
LAN in MAN maintenance are also
more difficult than
LAN as well MAN
Design & LAN’s design While MAN’s Whereas WAN’s
Maintenance and maintenance design and design and
are easy maintenance are maintenance are also
more difficult than more difficult than
LAN LAN as well MAN
Fault There is more While there is less In WAN, there is
Performed Student: Ngo Van Tin 26
tolerance fault tolerance in fault tolerance also less fault
LAN tolerance
Table 1.Compare LAN, CAN, MAN, WAN

3.2 Compare physical topologies and logical topologies


Physical Topology Logical Topology
Physical Topology means the Logical topology means how the
physical layout of the network. network device layout will be shown
and how the data will be transferred.
For example − Ring, Bus, Star, and For example − Ring and Bus.
Mesh.
In this topology, we are concerned This topology is concerned with the
with how data will be transferred high-level representation of the data
from the actual path. transfer.
As per the requirement, we can There is no change accepted.
modify the layout of the network.
It can affect cost, bandwidth, It can affect data delivery.
scalability, etc.
Types of physical topologies are star, Types of logical topologies are logical
mesh, bus, and ring. bus and logical ring
It is an actual route concerned with It is a high-level representation of data
transmission. flow.
The physical connection of the Data path followed on the network.
network.
Table 2. Compare physical topologies and logical topologies

3.3 Compare between OSI reference model and TCP/IP reference model
OSI TCP/IP
OSI represents Open System TCP/IP model represents the
Interconnection. Transmission Control Protocol /
Internet Protocol.
Performed Student: Ngo Van Tin 27
OSI is a generic, protocol- TCP/IP model depends on standard
independent standard. It is acting protocols about which the computer
as an interaction gateway between network has been created. It is a
the network and the final user. connection protocol that assigns the
network of hosts over the internet.
The OSI model was developed first, The protocols were created first and
and then protocols were created to fit then built the TCP/IP model.
the network architecture’s needs.
It provides quality services. It does not provide quality services.
The OSI model represents defines It does not mention the services,
administration, interfaces, and interfaces, and protocols.
conventions. It describes clearly
which layer provides services.
The protocols of the OSI model are The TCP/IP model protocols are not
better unseen and can be returned with hidden, and we cannot fit a new
another appropriate protocol quickly. protocol stack in it.
It is difficult as distinguished to It is simpler than OSI.
TCP/IP.
It provides both connection It provides connectionless
and connectionless-oriented transmission in the network layer and
transmission in the network layer; supports connecting and
however, only connection-oriented connectionless-oriented transmission
transmission is in the transport in the transport layer.
layer.
It uses a vertical approach. It uses a horizontal approach.
The smallest size of the OSI header is The smallest size of the TCP/IP
5 bytes. header is 20 bytes.

Performed Student: Ngo Van Tin 28


Protocols are unknown in the OSI In TCP/IP, returning protocol is not
model and are returned while the difficult.
technology modifies.
Table 3. Compare between OSI reference model and TCP/IP reference model

3.4 Compare TCP between UDP


Factor TCP UDP
Connection Requires an established No connection is needed to
type connection before start and end a data transfer
transmitting data
Data sequence Can sequence data (send in Cannot sequence or arrange
a specific order) data
Data Can retransmit data if No data retransmitting. Lost
retransmission packets fail to arrive data can’t be retrieved
Delivery Delivery is guaranteed Delivery is not guaranteed
Check for Thorough error-checking Minimal error-checking
errors guarantees data arrives in covers the basics but may not
its intended state prevent all errors
Speed Slow, but complete data Fast, but at risk of incomplete
delivery data delivery
Broadcasting Slow, but complete data Fast, but at risk of incomplete
delivery data delivery
Table 4. Compare TCP between UDP

CHAPTER 2. Explain networking devices and operations (LO2)

1. Discuss the operating principles of networking devices and server types.


(P3)
1.1. Network devices.
1.1.1 Definition:
Network devices are physical devices that allow hardware on a computer

Performed Student: Ngo Van Tin 29


network to interact and communicate with one another. In layman’s terms, we
can describe network devices in computer networks as the devices that connect
fax machines, computers, printers, and other electronic devices to the network.
You can quickly, safely, and accurately transfer data over one or more networks
with the help of network devices. Network devices are also referred to as
hardware and networking hardware.
1.1.2 Several network device
a. Hub
A hub is one of the simplest networking devices that connects several computers
or other network devices when referring to networking (network devices hub).
In layman’s terms, a hub is a hardware device that allows multiple devices or
connections to connect to a computer.

Figure 15. HUB

A USB hub, for example, allows multiple USB devices to connect with one
computer, even if that computer only has one USB connection. Depending on
the hub, the number of ports on a USB hub can range from 4 to over 100, and it
operates at the Physical layer (Layer 1) of the Open Systems Interconnection
(OSI) model.
 Advantages:
- Easy to install
- Inexpensive
- It does not affect the performance of the network seriously

Performed Student: Ngo Van Tin 30


 Disadvantages:
- Can not filter information
- It can not reduce the network traffic
- Broadcast of the data happens to all the port
b. Switch
A switch is a physical circuitry part that controls the flow of signals in
networking (network devices switch). A switch enables you to open or close a
connection. When the switch is opened, a signal or power can pass through the
connection. When the switch is closed, the flow is stopped, and the circuit
connection is broken.

Figure 16. SWITCH

Early computers, such as the Altair, used switches as input. A network switch is
much more advanced than a hub, but it isn’t as advanced as a router and operates
at the Data Link layer (Layer 2) of the OSI model.
 Advantages:
- Increases the available bandwidth of the network
- It helps in reducing the workload on individual host PCs
- Increases the performance of the network
 Disadvantages:
- They are more costly than network bridges.
- Broadcast traffic can be problematic.
- Network connectivity problems are challenging to track down via the
Performed Student: Ngo Van Tin 31
network switch.
c. Router.
In regards to networking (network devices router), a router is a piece of
hardware that receives, analyses and forwards incoming packets to another
network. Routers examine incoming packets to determine the correct target IP
address and send the packet to that address.

Figure 17. ROUTER

Routers typically connect LANs and WANs and use a rapidly updating routing
table to make routing decisions for data packets. Edge routers, core routers,
virtual routers, wireless routers, and various other types of routers are available,
and they operate at the Network layer (Layer 3) of the OSI model.
 Advantages:
- They work with routable network protocols.
- Connects various network architectures such as ethernet and token ring,
among others.
- Reduces network traffic by establishing collision domains as well as
broadcast domains.
- Chooses the best path across the internetwork using dynamic routing
algorithms.
 Disadvantages:
- They work with routable network protocols.
- More expensive than other network devices.
- They are slower because they must analyze data from layer 1 to layer 3.

Performed Student: Ngo Van Tin 32


d. Bridge.
In regards to networking (network devices bridge), a bridge is a device that
connects two LANs or two segments of the same LAN. Networking bridges are
also known as network bridges and bridging. There are two types of bridges: the
Transparent bridge and the Source Routing bridge.

Figure 18. BRIDGE

Bridges, unlike routers, are protocol independent in that they can forward
packets without analyzing and re-routing messages. Bridging, in a nutshell,
connects two smaller networks to form a more extensive network.
Bridges’ primary function in network architecture is to store and forward frames
between the various segments that the bridge connects. They transfer frames
using hardware Media Access Control (MAC) addresses. Bridges can forward or
prevent data crossing by analyzing the MAC addresses. A bridge operates at the
OSI model’s Data Link layer (Layer 2).
 Advantages:
- Reduces collisions
- Reduces network types with minor segmentation
- Connects similar network types with difference cabling
 Disadvantages:
Performed Student: Ngo Van Tin 33
- Does not filter broadcasts
- More expensive compared to repeaters
- Slower compare to repeaters due to the filtering process
e. Gateway
When referring to networking (network devices gateway), a gateway is a
networked device that serves as an entry point into another network. A wireless
router, for example, is frequently used as the default gateway in a home
network. In short, a gateway acts as a messenger agent, taking data from one
network, interpreting it, and transferring it to another. Gateways, also known as
protocol converters, can operate at any OSI model layer.

Figure 19. GATEWAY

 Advantages:
- Allows to broaden the network
- Handlers traffic issues effectively
- Permits to link two different kinds of networks
 Disadvantages:
- Never filter data
- Costly and difficult to manage
- Protocol conversion is performed, thus resulting in a slower transmission

Performed Student: Ngo Van Tin 34


rate.
f. Modern
In regards to networking (network devices modem), a modem is a piece of
hardware that enables a computer to transmit and receive data over telephone
lines. In a nutshell, a modem is a piece of hardware that connects a computer or
router to a broadband network.

Figure 20. MODERN

When a signal is sent, the device converts digital data to an analog audio signal
and sends it over a phone line. Similarly, when an analog signal is received, it is
converted back to a digital signal by the modem. Onboard modems, internal
modems, external modems, and removable modems are all examples of
modems. A modem operates at the OSI model’s physical layer (Layer 1) or Data
link layer (Layer 2), depending on the type.
 Advantages:
- Easily allows connecting LAN to internet
- Converts digital signal into an analog signal
- When compared to the hub, the speed is slow
 Disadvantages:
- It only serves as a bridge between the LAN and the internet.

Performed Student: Ngo Van Tin 35


- It cannot maintain its network traffic.
- The modem is unaware of its destination path.
g. Repeater.
With regards to networking (network devices repeater), a repeater is an item that
boosts the strength of a signal so that it can travel longer distances without
losing quality. These devices are commonly used in networks to help data reach
further destinations.

Figure 21. REPEATER

A range extender or wireless repeater, for example, is a repeater that extends the
range and strength of a Wi-Fi signal. A repeater is effective in office buildings,
schools, and factories where a single wireless router cannot reach all areas. A
repeater operates at the OSI model’s physical layer (Layer 1).
 Advantage:
- Repeaters are simple to set up and inexpensive.
- Repeaters do not necessitate any additional processing.
- They can connect signals with various types of cables.
 Disadvantage:
- Repeaters are unable to connect disparate networks.
- They are unable to distinguish between actual signals and noise.

Performed Student: Ngo Van Tin 36


- They will not be able to reduce network traffic.
h. Access Point.
In terms of networking, an access point (AP) is a wireless network device that
acts as a portal for devices to connect to a local area network. Access points can
extend an existing network’s wireless coverage and increase the number of users
who can connect. Wireless access points (WAPs) are devices that combine a
transmitter and receiver (transceiver) to form a wireless LAN (WLAN). The
access point operates at the OSI model’s Data Link layer (Layer 2).

Figure 22. ACCESS POINT

 Advantages:
- Installing is easier and faster.
- Allows data transmission even when the user is moving.
- It is simple to extend to places where wires and cables are inaccessible.
 Disadvantages:
- The range of network devices is limited, which causes issues for many
users.
- Installing this network device is difficult and time-consuming.
- Because these network devices are susceptible to interference, fog and
radiation can cause them to malfunction.
1.2 Server
1.2.1 Definition
The term ‘server’ has a double meaning in IT. It is used to describe a computer
that makes resources available over a network, as well as the program that runs

Performed Student: Ngo Van Tin 37


on this computer. So it’s necessary to have two different server definitions:
 Definition Server (hardware): a hardware-based server is a physical
device connected to a computer network on which one or more software-
based servers run alongside the operating system. An alternative term for
a hardware-based server is host. In principle, any computer can be used as
a host with server software.
 Definition Server (software): a software-based server is a program that
offers a specialized service to be used by other programs (known as
clients) locally or via a network. The service offered depends on the type
of server software. The client-server model is the basis of communication.
When it comes to exchanging data, service-specific communication
protocols are used.
1.2.2 Server types
a. Web Server
Web servers are computer systems that provide hosting for websites, web
applications, and other online content. They receive client requests, such as web
browser requests, and respond by providing the requested content.

Figure 23. WEB SERVER

A web server communicates with clients via HTTP (Hypertext Transfer


Protocol) and can handle multiple requests at the same time. Apache, Nginx, and
Microsoft IIS are some popular examples of web servers. These types of servers
host most of the websites on the internet.
b. File Servers
A file server is a type of server that stores and manages files that other network
Performed Student: Ngo Van Tin 38
devices can access. It allows users to store and retrieve files in a centralized
location, eliminating the need for local storage on individual devices.

Figure 24. FILE SERVER

A file server distributes files using protocols such as SMB (Server Message
Block) and NFS (Network File System). Users can access files on the server
using a file manager or explorer and, depending on their access permissions,
they can even modify or delete them. Windows File Server, Linux Samba
Server, and FreeNAS are all examples of popular file servers.
c.Database Servers
A database server is a type of server that stores and manages databases.
Databases are collections of data that are organized in a specific way. They
enable clients to query the database and perform operations like adding,
modifying, and deleting data.

Performed Student: Ngo Van Tin 39


Figure 25. DATABASE SERVER

A database server operates by running database management system (DBMS)


software. The DBMS software manages the database and provides an interface
through which clients can interact with it.
Microsoft SQL Server, Oracle Database, and MySQL are some examples of
popular database servers. These types of servers are commonly used in
businesses to manage large amounts of data as well as to support a variety of
applications and services.
d. Application Servers
A computer system that hosts applications and provides services to other devices
on a network is known as an application server. It manages an application’s
business logic and provides a runtime environment in which the application can
run.

Performed Student: Ngo Van Tin 40


Figure 26. APPLICATION SERVER

An application server operates by executing application server software, which


serves as a platform for hosting applications and managing application
resources. IBM WebSphere, Oracle WebLogic, and JBoss are some popular
application servers. These types of servers are commonly used in businesses to
deploy and manage web applications, as well as provide client services.
e. Mail Servers
A mail server is a type of server that manages email messages sent and received
over a network. It serves as a central hub for email communication, storing,
processing, and forwarding email messages.
A mail server communicates with other mail servers and clients by using email
protocols such as SMTP (Simple Mail Transfer Protocol) and IMAP (Internet
Message Access Protocol).

Figure 27. MAIL SERVER

Performed Student: Ngo Van Tin 41


Microsoft Exchange Server, Postfix, and Sendmail are examples of popular mail
servers. In businesses, these types of servers are commonly used to manage
email communication between employees and clients.
f. Print Servers
A print server is a server that manages printing devices like printers, scanners,
and fax machines across a network. It serves as a centralized control point for
printing activities, allowing multiple users to share the same printing resources.

Figure 28. PRINT SERVER

A print server manages print queues and sends print jobs to the appropriate
printer after receiving requests from clients. Print servers that are widely used
include Windows Print Server, CUPS (Common Unix Printing System), and
PaperCut. In businesses, these servers are commonly used to manage printing
activities and control printing resources.
g. DNS Servers
A DNS server (Domain Name System) is a type of server that converts domain
names into IP addresses and vice versa. It serves as an internet directory,
allowing users to access websites and services via easy-to-remember domain
names rather than numerical IP addresses.

Performed Student: Ngo Van Tin 42


Figure 29. DNS SERVER

A DNS server operates by maintaining a database of domain names and their


corresponding IP addresses. Then, it responds to client requests to translate
domain names into IP addresses.
BIND (Berkeley Internet Name Domain), Microsoft DNS Server, and Google
Public DNS are all popular DNS servers. These servers are critical for Internet
communication because they allow users to quickly and efficiently access
websites and services.
h. Game Servers
A game server is a server that hosts multiplayer games over the internet or on a
local network. These servers enable players to connect and interact in real-time
live gameplay.
Typically, game servers run specialized software that manages the game world
and player interactions. This software is in charge of keeping the game state,
synchronizing player actions, and managing network latency.

Performed Student: Ngo Van Tin 43


Figure 30. GAME SERVER

Minecraft, World of Warcraft, and Counter-Strike are examples of popular game


servers. These servers frequently have large communities of players who use
them to connect with others and play competitive or cooperative games.
Individuals or businesses can run game servers, which can be hosted locally or
in data centers. To accommodate large numbers of players and provide a smooth
gaming experience, they require high-performance hardware and network
connectivity.

2. Discuss the inter-dependence of workstation hardware with relevant


networking software.(P4)
2.1 Network software
 Definition: Networking software refers to the programs, protocols, and
applications that enable communication and data exchange across
numerous computers or devices over a network.
 Network software functions:
- Administrators can add and remove network users using user
management.
- This is very beneficial when hiring or relocating.
- File management enables administrators to control where data is kept and
Performed Student: Ngo Van Tin 44
who has access to it.
- Access provides users with continuous access to network resources.
- Network security systems assist administrators in securing networks and
preventing infractions.
2.2 Workstation hardware
Workstation hardware refers to the physical components of a computer system
used by a single person, which generally includes the computer itself,
peripherals (such as monitors, keyboards, and mouse), and any connected
hardware devices.
2.3 Explain what is meant by interdependencies
Interdependencies refer to the relationships and connections between different
elements or components of a system, where the functioning or performance of
one component depends on the others.
2.4 Give examples of interdependency
In a supply chain, the timely delivery of raw materials is critical to product
manufacturing.
The fulfillment of one person's work in a team project is dependent on the input
or output of another person's task.
In an ecosystem, one species' existence may be linked to the availability of
resources given by another.
2.5 Discuss and explain the interdepence of workstation hardware with
networking software. Derive an example from your discussion
 The interdependencies between workstation hardware and networking

software are as follows:


- Network Interface Cards (NIC) - Workstation hardware requires NICs,
which are physical devices that enable computers to connect to a network.
Networking software relies on NICs to establish network connections and
facilitate data transmission.
- Network Drivers - Workstation hardware, such as NICs, requires specific
network drivers to communicate with networking software effectively.
Performed Student: Ngo Van Tin 45
These drivers act as intermediary software that enables the hardware
components to interact with the networking software.
- Protocol Support - Workstation hardware and networking software must
have compatible protocol support. For example, if a workstation has
hardware that only supports Ethernet connections, the networking
software should be compatible with Ethernet protocols to establish proper
communication.
- Bandwidth Management - Workstation hardware performance, such as
CPU and memory, can directly impact the networking software's ability to
manage network traffic effectively. Insufficient hardware resources may
lead to network congestion and negatively impact overall network
performance.
 Example:

Assume a corporation wishes to install a Voice over Internet Protocol (VoIP)


system to enable workers to make phone calls via the network. However, the
company's workstations are outfitted with NICs that do not allow Voice over IP.
These NICs can only handle regular data transfer.
In this situation, the networking software necessitates the use of NICs capable of
processing speech over IP in order to transform voice signals into network data
and vice versa. Employees are unable to make VoIP calls across the network due
to a lack of functionality in current NICs. This results in decreased performance
and limits in the use of the VoIP system.
To remedy this issue, the organization must upgrade the workstation hardware
by adding network interface cards (NICs) that support

3.Explore a range of server types and justify the selection of a server,


considering a given scenario regarding cost and performance
optimization(M2).

4. Considering a given scenario, identify the topology protocol selected for


the efficient utilization of a networking system(D1).

Performed Student: Ngo Van Tin 46


CRITICAL EVALUATION
CHAPTER 1. EXAMINE NETWORKING PRINCIPLES AND THEIR
PROTOCOLS (LO1)

Performed Student: Ngo Van Tin 47


1. Discuss the benefits and constraints of different network types and
standards. (P1)2. Explain the impact of network topology, communication, and
bandwidth requirements. (P2)
3. Compare common networking principles and how protocols enable the
effectiveness of networked systems(M1).
3.1. Compare LAN, CAN, MAN, WAN
3.2. Compare physical topologies and logical topologies
3.3. Compare between OSI reference model and TCP/IP reference model
3.4. Compare TCP between UDP
CHAPTER 2. Explain networking devices and operations (LO2)
1. Discuss the operating principles of networking devices and server types.
(P3)
2. Discuss the inter-dependence of workstation hardware with relevant
networking software.(P4)
3. Explore a range of server types and justify the selection of a server,
considering a given scenario regarding cost and performance optimization(M2).
4. Considering a given scenario, identify the topology protocol selected for
the efficient utilization of a networking system(D1).
I have done the above, I want to get a score of M in this assignment. Hope the
teachers can consider it for me.

Performed Student: Ngo Van Tin 48


CONCLUSION
After finishing this report, my understanding of networking improved
significantly. I now comprehend how to construct a fundamental algorithm,
execute a program, and understand the life cycle of an algorithm. Additionally, I
have learned how to create a flow chart to visually represent the functionality of
an algorithm. Programming is truly fascinating! Thanks to this knowledge, I
have gained insights into the inner workings of the devices in our surroundings.
This subject is captivating and extraordinary. A heartfelt thank you to my
mentor for guiding me through this journey.

Performed Student: Ngo Van Tin 49


REFERENCES
Tiwari, A. (n.d.). Advantages and Disadvantages of Computer Network. Coding
Ninjas. https://www.codingninjas.com/codestudio/library/advantages-and-
disadvantages-of-computer-networking
Advantages and Disadvantages of the LAN - Javatpoint. (n.d.). www.javatpoint.com.
https://www.javatpoint.com/advantages-and-disadvantages-of-lan
ECSTUFF4U for Electronics Engineer. (n.d.).
https://www.ecstuff4u.com/2018/05/advantage-disadvantage-metropolitan-area-
network.html/
Mks. (2023, February 26). Advantages and Disadvantages of WAN | Wide Area Network
advantages and disadvantages: 2023 - Concepts All. Concepts All.
https://conceptsall.com/advantages-and-disadvantages-of-wan/
Singh, A., & Singh, A. (2023). Network Devices in Computer Networks and Its Types.
Shiksha Online. https://www.shiksha.com/online-courses/articles/network-devices-in-
computer-networks-and-its-types/
Network Topology Diagrams and Selection Best Practices for 2022. (n.d.). Spiceworks.
https://www.spiceworks.com/tech/networking/articles/what-is-network-topology/
Studocu. (n.d.). 1 Unit 2 - Assignment brief 1 - Assignment Brief 1 (RQF) Higher National
Certificate/Diploma in - Studocu. https://www.studocu.com/vn/document/truong-dai-
hoc-fpt/networking/1-unit-2-assignment-brief-1/32347587
Techopedia. (2017, May 31). What is Physical Topology? - Definition from Techopedia.
https://www.techopedia.com/definition/4794/physical-topology
Solved need helps with all questions, 1.13 says " which of | Chegg.com. (n.d.).
https://www.chegg.com/homework-help/questions-and-answers/need-help-questions-
113-says-following-network-topologies-common-today-s-network-q98827654
Thẻ ghi nhớ: Networking Essentials V2.0 Module 2. (n.d.). Quizlet.
https://quizlet.com/608742675/networking-essentials-v20-module-2-flash-cards/

Perfomed Student: Huynh Vo Trung Nguyen 50

You might also like