Professional Documents
Culture Documents
Btec FPT International College
Btec FPT International College
Btec FPT International College
COLLEGE
INFORMATION TECHNOLOGY
ASSIGNMENT 1
i
ASSIGNMENT FRONT SHEET
Student declaration
I certify that the assignment submission is entirely my work and I fully
understand the consequences of plagiarism. I understand that making a false
declaration is a form of malpractice.
Student’s signature:
Grading grid
P1 P2 P3 P4 M1 M2 D1
i
Summative Feedbacks: Resubmission Feedbacks:
ii
ACKNOWLEDGMENT
First and foremost, I would like to express my heartfelt gratitude to my
mentor, Nguyen Bao Quoc, for his unwavering support throughout my studies
and research. His patience, motivation, enthusiasm, and vast knowledge have
been invaluable to me. His guidance has been instrumental in shaping and
completing this thesis. I would not have been able to achieve this without his
exceptional assistance.
I verify that the work I've submitted for this assignment is all my own, and that all
research sources have been properly credited.
Grading grid...........................................................................................................................2
ACKNOWLEDGMENT............................................................................................1
ASSURANCE..............................................................................................................2
INTRODUCTION.......................................................................................................3
PROTOCOLS (LO1)..................................................................................................9
1. Discuss the benefits and constraints of different network types and standards.
(P1)............................................................................................................................................9
2.2 Communications............................................................................................................20
2.3 Bandwidth.......................................................................................................................21
3.3 Compare between OSI reference model and TCP/IP reference model.........................23
1.1.1 Definition:......................................................................................................25
a. Hub......................................................................................................................25
b. Switch.................................................................................................................26
c. Router..................................................................................................................26
d. Bridge.................................................................................................................27
e. Gateway..............................................................................................................28
g. Repeater..............................................................................................................30
h. Access Point.......................................................................................................31
1.2 Server..............................................................................................................................31
1.2.1 Definition.......................................................................................................31
a. Web Server.........................................................................................................32
b. File Servers.........................................................................................................32
c.Database Servers..................................................................................................33
d. Application Servers............................................................................................34
e. Mail Servers........................................................................................................34
f. Print Servers........................................................................................................35
g. DNS Servers.......................................................................................................35
h. Game Servers......................................................................................................36
2.5 Discuss and explain the interdepence of workstation hardware with networking
software. Derive an example from your discussion.............................................................38
4. Considering a given scenario, identify the topology protocol selected for the
efficient utilization of a networking system(D1).................................................................39
CONCLUSION..........................................................................................................40
REFERENCES..........................................................................................................42
Benefits:
- Simple and Inexpensive: The main benefit of a Local Area Network is
that it is quick and easy to set up for a relatively low price. If an
organization wants to build a network at a low cost and flexibility, a local
area network would be an ideal choice.
- Accessible Software: Programs can also be shared on the Local Area
Network. Combine a single licensed program and any device can use it on
the network.
- Fast communication: Devices linked to the LAN transfer files and
communicate directly and quickly based on the LAN model and installed
ethernet cable. They work on 1000 Mbps, 100 Mbps, and 10 Mbps.
Gigabit Ethernet technology is evolving rapidly. If the technology
becomes complex and mass-produced, lower-cost variants will become
accessible to the masses.
- Client and Server Association: All company-related information is kept
on one server. If a customer requests information, the customer can
seamlessly access that information.
- Resource collaboration: Expensive components, like scanners and
printers, cannot be connected to every device in the office and it becomes
a heavy task for the organization, but a LAN, requires a printer and
scanner. and people can be connected and they have to send instructions
Benefits:
- It provides higher security compared to WAN
- It is wider than LAN
- It helps in the cost-effective sharing of common resources such as printers
- It helps people interface fast LANs together. This is due to the easy
implementation of links
- MAN requires fewer resources compared to WAN. This saves the
implementation cost
- The dual bus used in MAN help the transmission of data in both direction
simultaneously
- It provides a good backbone for a large network and also provides greater
In such an arrangement, the server node transmits data from one end of the cable
in a single direction to the client node. As the data travels to each node, its
destination address (MAC/IP) is checked to see if it is received and processed. If
there is a mismatch in the address, the node does not do anything with the data.
This way, only the node that recognizes its address uses the data that travels on
the single cable, while the other nodes are unaffected. Once the data reaches the
end of the cable, the terminator removes it to prevent the signal bouncing
2.1.2.3 Ring topology
In a ring topology, each node is linked with its neighbor to form a closed
network. This configuration sees the data move from one node to another, either
unidirectionally or bidirectionally. Such network topology is used in smaller
networks, like those in schools.
Many ring networks use token passing to regulate data flow. In such an
arrangement, a token is transferred from one device to the next, and only the
node with the token can transmit data. The device that receives the data from the
token sends it back to the server along with an acknowledgment. Only an
endpoint with access to an ’empty’ token can transmit data at a given time,
while the other computers have to wait for their turn.
Tree topologies are suitable for large networks such as offices, university
campuses, and hospitals.
2.1.2.6 Mesh topology
In a mesh topology, all the nodes are interconnected and can send and receive
their data and relay data from other nodes.
Full mesh networks, wherein each node is connected to every other node, are
usually reserved for critical networks as they are extremely costly to implement
and challenging to maintain. IT teams also have the option of implementing
partial mesh networks, wherein all the nodes are not connected. This is less cost-
Performed Student: Ngo Van Tin 22
intensive and easier to implement; however, it does not have all the advantages
of a full mesh network.
2.1.2.7 Hybrid topology
A hybrid network topology, as the name suggests, features characteristics of
multiple other topologies. The creation of such a configuration depends on the
requirement of the network.
The two most commonly used hybrid topologies are star-ring and star-bus. In
the former, the central hubs of multiple star topologies are linked using a ring
topology. In the latter, the hubs of numerous star topologies are connected using
a bus topology.
2.1.2.8 Daisy chain topology
Finally, the daisy chain topology links nodes in a sequence. Data is transferred
from one node to the next until it reaches its destination. The two types of a
daisy chain network topology are linear daisy chain and ring daisy chain.
In the former, devices are linked in a straight line with two ‘ends,’ similar to a
bus topology. In the latter, a ‘ring’ of devices is formed. Ring daisy chain
topologies are usually more favorable than linear daisy chain topologies as the
data travels in a loop, thereby halving the number of senders and receivers.
Further, in case of a single node or link getting damaged, the network does not
grind to a halt as the data can just switch directions to reach its destination.
2.2 Communications
2.2.1 Define commutations in terms of networking.
Network communication, or internetworking, defines a set of protocols (that is,
rules and standards) that allow application programs to talk with each other
without regard to the hardware and operating systems where they are run.
Internetworking allows application programs to communicate independently of
their physical network connections.
2.2.2 Rules of Communication.
The rules of communication in networking are defined by protocols. Protocols
are a set of rules and guidelines that govern communication between devices on
a network. They define how data is transmitted and how devices on the network
can communicate with each other.
2.3 Bandwidth.
3.3 Compare between OSI reference model and TCP/IP reference model
OSI TCP/IP
OSI represents Open System TCP/IP model represents the
Interconnection. Transmission Control Protocol /
Internet Protocol.
Performed Student: Ngo Van Tin 27
OSI is a generic, protocol- TCP/IP model depends on standard
independent standard. It is acting protocols about which the computer
as an interaction gateway between network has been created. It is a
the network and the final user. connection protocol that assigns the
network of hosts over the internet.
The OSI model was developed first, The protocols were created first and
and then protocols were created to fit then built the TCP/IP model.
the network architecture’s needs.
It provides quality services. It does not provide quality services.
The OSI model represents defines It does not mention the services,
administration, interfaces, and interfaces, and protocols.
conventions. It describes clearly
which layer provides services.
The protocols of the OSI model are The TCP/IP model protocols are not
better unseen and can be returned with hidden, and we cannot fit a new
another appropriate protocol quickly. protocol stack in it.
It is difficult as distinguished to It is simpler than OSI.
TCP/IP.
It provides both connection It provides connectionless
and connectionless-oriented transmission in the network layer and
transmission in the network layer; supports connecting and
however, only connection-oriented connectionless-oriented transmission
transmission is in the transport in the transport layer.
layer.
It uses a vertical approach. It uses a horizontal approach.
The smallest size of the OSI header is The smallest size of the TCP/IP
5 bytes. header is 20 bytes.
A USB hub, for example, allows multiple USB devices to connect with one
computer, even if that computer only has one USB connection. Depending on
the hub, the number of ports on a USB hub can range from 4 to over 100, and it
operates at the Physical layer (Layer 1) of the Open Systems Interconnection
(OSI) model.
Advantages:
- Easy to install
- Inexpensive
- It does not affect the performance of the network seriously
Early computers, such as the Altair, used switches as input. A network switch is
much more advanced than a hub, but it isn’t as advanced as a router and operates
at the Data Link layer (Layer 2) of the OSI model.
Advantages:
- Increases the available bandwidth of the network
- It helps in reducing the workload on individual host PCs
- Increases the performance of the network
Disadvantages:
- They are more costly than network bridges.
- Broadcast traffic can be problematic.
- Network connectivity problems are challenging to track down via the
Performed Student: Ngo Van Tin 31
network switch.
c. Router.
In regards to networking (network devices router), a router is a piece of
hardware that receives, analyses and forwards incoming packets to another
network. Routers examine incoming packets to determine the correct target IP
address and send the packet to that address.
Routers typically connect LANs and WANs and use a rapidly updating routing
table to make routing decisions for data packets. Edge routers, core routers,
virtual routers, wireless routers, and various other types of routers are available,
and they operate at the Network layer (Layer 3) of the OSI model.
Advantages:
- They work with routable network protocols.
- Connects various network architectures such as ethernet and token ring,
among others.
- Reduces network traffic by establishing collision domains as well as
broadcast domains.
- Chooses the best path across the internetwork using dynamic routing
algorithms.
Disadvantages:
- They work with routable network protocols.
- More expensive than other network devices.
- They are slower because they must analyze data from layer 1 to layer 3.
Bridges, unlike routers, are protocol independent in that they can forward
packets without analyzing and re-routing messages. Bridging, in a nutshell,
connects two smaller networks to form a more extensive network.
Bridges’ primary function in network architecture is to store and forward frames
between the various segments that the bridge connects. They transfer frames
using hardware Media Access Control (MAC) addresses. Bridges can forward or
prevent data crossing by analyzing the MAC addresses. A bridge operates at the
OSI model’s Data Link layer (Layer 2).
Advantages:
- Reduces collisions
- Reduces network types with minor segmentation
- Connects similar network types with difference cabling
Disadvantages:
Performed Student: Ngo Van Tin 33
- Does not filter broadcasts
- More expensive compared to repeaters
- Slower compare to repeaters due to the filtering process
e. Gateway
When referring to networking (network devices gateway), a gateway is a
networked device that serves as an entry point into another network. A wireless
router, for example, is frequently used as the default gateway in a home
network. In short, a gateway acts as a messenger agent, taking data from one
network, interpreting it, and transferring it to another. Gateways, also known as
protocol converters, can operate at any OSI model layer.
Advantages:
- Allows to broaden the network
- Handlers traffic issues effectively
- Permits to link two different kinds of networks
Disadvantages:
- Never filter data
- Costly and difficult to manage
- Protocol conversion is performed, thus resulting in a slower transmission
When a signal is sent, the device converts digital data to an analog audio signal
and sends it over a phone line. Similarly, when an analog signal is received, it is
converted back to a digital signal by the modem. Onboard modems, internal
modems, external modems, and removable modems are all examples of
modems. A modem operates at the OSI model’s physical layer (Layer 1) or Data
link layer (Layer 2), depending on the type.
Advantages:
- Easily allows connecting LAN to internet
- Converts digital signal into an analog signal
- When compared to the hub, the speed is slow
Disadvantages:
- It only serves as a bridge between the LAN and the internet.
A range extender or wireless repeater, for example, is a repeater that extends the
range and strength of a Wi-Fi signal. A repeater is effective in office buildings,
schools, and factories where a single wireless router cannot reach all areas. A
repeater operates at the OSI model’s physical layer (Layer 1).
Advantage:
- Repeaters are simple to set up and inexpensive.
- Repeaters do not necessitate any additional processing.
- They can connect signals with various types of cables.
Disadvantage:
- Repeaters are unable to connect disparate networks.
- They are unable to distinguish between actual signals and noise.
Advantages:
- Installing is easier and faster.
- Allows data transmission even when the user is moving.
- It is simple to extend to places where wires and cables are inaccessible.
Disadvantages:
- The range of network devices is limited, which causes issues for many
users.
- Installing this network device is difficult and time-consuming.
- Because these network devices are susceptible to interference, fog and
radiation can cause them to malfunction.
1.2 Server
1.2.1 Definition
The term ‘server’ has a double meaning in IT. It is used to describe a computer
that makes resources available over a network, as well as the program that runs
A file server distributes files using protocols such as SMB (Server Message
Block) and NFS (Network File System). Users can access files on the server
using a file manager or explorer and, depending on their access permissions,
they can even modify or delete them. Windows File Server, Linux Samba
Server, and FreeNAS are all examples of popular file servers.
c.Database Servers
A database server is a type of server that stores and manages databases.
Databases are collections of data that are organized in a specific way. They
enable clients to query the database and perform operations like adding,
modifying, and deleting data.
A print server manages print queues and sends print jobs to the appropriate
printer after receiving requests from clients. Print servers that are widely used
include Windows Print Server, CUPS (Common Unix Printing System), and
PaperCut. In businesses, these servers are commonly used to manage printing
activities and control printing resources.
g. DNS Servers
A DNS server (Domain Name System) is a type of server that converts domain
names into IP addresses and vice versa. It serves as an internet directory,
allowing users to access websites and services via easy-to-remember domain
names rather than numerical IP addresses.