ASM1 Networking TranSonPhuQui SE06202 Draf1

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 60

BTEC FPT INTERNATIONAL COLLEGE

INFORMATION TECHNOLOGY
ASSIGNMENT
UNIT: NETWORKING

STUDENT : TRAN SON PHU QUI


CLASS : SE06202
STUDENT ID : BD00419
SUPERVISOR : NGUYEN BAO QUOC

DaNang, February 2023

1
ASSIGNMENT 2 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking Infrastructure

Date received (1st sub-


Submission date
mission)

Date received (2nd


Re-submission date
submission)

Tran Son Phu


Student name Student ID BD00419
Qui

Class SE06202 Assessor name Nguyen Bao Quoc

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the con-
sequences of plagiarism. I understand that making a false declaration is a form of malpractice.

Student’s signature:

PHUQUI

Grading grid

P1 P2 P3 P4 M1 M2 D1

2
Summative Feedbacks: Resubmission Feedbacks:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:

3
TABLE OF CONTENT

BTEC FPT INTERNATIONAL COLLEGE.....................................................................................................................1


ASSIGNMENT 2 FRONT SHEET..............................................................................................................................2
CHAPTER 1: EXAMINE NETWORKING PRINCIPLES AND THEIR PROTOCOLS. (LO1)...............................................9
I. DISCUSS THE BENEFITS AND CONSTRAINTS OF DIFFERENT TYPES OF NETWORKS AND NETWORKING
STANDARDS. (P1).............................................................................................................................................9
1. Network definition...............................................................................................................................9
1.1. Client-server...................................................................................................................................11
2. Network type.....................................................................................................................................15
2.1. Local area network (LAN)...............................................................................................................16
2.1.1. Ethernet LAN (Wired Connection)..............................................................................................17
2.1.2. WLAN (Wireless).........................................................................................................................17
2.1.3. MAN (Metropolitan Area Network)...........................................................................................17
2.1.4. WAN (Wide Area Network)........................................................................................................19
2.1.4 Personal Area Network (PAN)....................................................................................................20
3 Protocol and Standards......................................................................................................................22
Standard.....................................................................................................................................................28
II . Network topology & communication and Bandwidth requirements.(P2)......................................................31
2. Topology.................................................................................................................................................31
2.1. Logical topology......................................................................................................................................31
2.1.1. Physical topology.....................................................................................................................................31
2.1.2. Bus network..............................................................................................................................................32
............................................................................................................................................................................ 32
2.1.3. Star Network.......................................................................................................................................32
2.1.4. Ring network.......................................................................................................................................33
............................................................................................................................................................................ 34
2.1.5. Mesh network.....................................................................................................................................34
2.1.6. Tree network...............................................................................................................................35
2.1.7. Hybrid network..........................................................................................................................35
2.1.8. Communication...................................................................................................................................36
2.1.9. Bandwidth...........................................................................................................................................37
3. Compare Physical Topology and Logical Topology............................................................................38
3.1. Compare LAN, MAN, WAN..................................................................................................................38

4
CHAPTER 2: EXPLAIN NETWORKING DEVICES AND OPERATIONS (LO2).............................................................39
1.Discuss the operating principles of networking devices and server types.(P3)...............................................39
1.1. Network devices.............................................................................................................................39
1.1.1. Modem.......................................................................................................................................39
1.1.2. RJ45 Connector................................................................................................................................40
1.1.3 Router.........................................................................................................................................40
1.1.4. Switch.........................................................................................................................................41
1.1.5. Ethernet Card.............................................................................................................................41
1.1.6. Bridge..........................................................................................................................................42
1.1.7. Hub.............................................................................................................................................43
1.2. Server type.....................................................................................................................................43
2. Discuss the inter-dependence of workstation hardware with relevant networking software.(P4)...50
2.1. Workstation Hardware:..................................................................................................................51
2.2. Workstation Software:...................................................................................................................52
3. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization (M2)..................................................................................53
4. Considering a given scenario, identify the topology protocol selected for the efficient utilization of
a networking system(D1)...........................................................................................................................53

5
LIST OF TABLES AND FIGURES

6
LIST OF ACRONYMS
- MAC (Media Access Control)
- TCP/IP (Transmission Control Protocol/Internet Protocol)
- HTTP (Hypertext Transfer Protocol)
- P2P (Peer-to-peer)
- PAN (Personal Area Network)
- LAN (Local Area Network)
- WAN (Wide Area Network)
- MAN (Metropolitan Area Network)
- SAN (Storage Area Network)
- EPN (Enterprise Private Network)
- VPN (Virtual Private Network)
- Ethernet LAN (Wired connection)
- WLAN (Wireless)
- DNS (Domain name system)
- FTP (File transfer protocol)
- VM (Virtual machine)
- ASM (Advanced System Management)

7
INTRODUCTION

In today's digital age, information theft and cyber terrorism are very common. It is
widely applied in most fields such as business, science, education and non-profit
activities. Therefore, understanding network administration is very important to detect
and solve problems related to network security and connectivity.

To understand the basics of networking, we need to learn about network types,


network topologies, protocols, and network standards. This helps us understand how
network elements interact with each other to ensure efficient network operation. In
addition, network administration includes skills such as installing, configuring, and
maintaining network hardware and software, and managing network security tools
such as firewalls and intrusion detection systems.
Here are the items that I will discuss in this report:

8
CHAPTER 1: EXAMINE NETWORKING PRINCIPLES AND THEIR PROTOCOLS.
(LO1)
I. DISCUSS THE BENEFITS AND CONSTRAINTS OF DIFFERENT TYPES OF
NETWORKS AND NETWORKING STANDARDS. (P1)
1. Network definition
A network is a large or small system of many devices, such as phones, laptops,
or computers, that can be linked together and exchange data back and forth such
as emails or documents, files. These devices are connected using physical wires
such as copper cable, fiber optics, but they can also be wireless.
The simplest network is a combination of two computers connected by a cable.
This type of network is called a peer-to-peer network. There is no hierarchy in this
network; both participants have equal privileges. Each computer has access to the
data of the other device and can share resources such as disk space, applications
or peripheral devices (printers, etc.).
Today’s networks tend to be a bit more complex and don’t just consist of two
computers. Systems with more than ten participants usually use client-server
networks. In these networks, a central computer (server) provides resources to
the other participants in the network (clients).

Figure XX: Network


 A network has six basic components:
- Servers or Host computers are powerful computers that store data or
applications and connect to resources that are shared by the users of a
network. They act as a central repository for all the data and applications
9
used by the network.

- Network devices. These physical devices or nodes are the data


communication equipment that is connected inside a computer network.
Examples of network devices include modems, routers, PCs, servers,
firewalls, switches and gateways. Each device in a computer network is
identified by a network address and often has easily identifiable
hostnames.

- Links. A link is the transmission medium used for connecting the nodes and
enabling them to transmit to each other. The links can be either wired,
wireless or optical, such as an Ethernet cable or a Wi-Fi signal. The links
can be configured in different ways, both physically and logically, and the
network topology dictates the manner in which links and nodes relate to
each other.

- Communication protocols. These are the rules or protocols that all nodes
on a network must follow for information transfer. Common protocols
include the TCP/IP suite, IEEE 802, Ethernet, WLAN and cellular standards.

- Routers: Routers are devices responsible for connecting multiple networks


together, such as LANs or wide area networks (WANs). They use IP
(Internet Protocol) addresses to forward data packets between networks.
Routers determine the best path for data transmission, making decisions
based on routing protocols and network topology.

- Switches: Switches are network devices that connect multiple nodes within
a local area network (LAN). They receive data packets from a source node
and forward them to the appropriate destination node based on their MAC
(Media Access Control) addresses. Switches facilitate efficient data
transmission within a LAN.

10
These six components work together to enable communication and data transfer
within a network, facilitating the exchange of information between devices and
networks.
 Advantages:
- Share resources
- Flexible
- Greater connectivity
- Security and data management
- Storage capacity
- Entertainment
o Disadvantages:
- Security risks
- Complexity and maintenance
- Dependency on infrastructure
- Bandwidth limitations
- Initial investment
1.1. Client-server
- A client-server network is the medium through which clients access resources
and services from a central computer, via either a local area network (LAN) or a
wide-area network (WAN), such as the Internet. A unique server called a daemon
may be employed for the sole purpose of awaiting client requests, at which point
the network connection is initiated until the client request has been fulfilled.
- Here are the advantages and disadvantages of the client-server architecture:
o Advantage:
11
- Client server has the ability to prevent network overload
- Client server ensures data integrity when something goes wrong
- Client server allows integration of modern techniques such as GIS, object-
oriented design model, ...
- Client server model, users can remotely access data, perform simple
operations to send and receive files or search for information.
o Disadvantages:
- Need to maintain and maintain the server regularly.
- The ability to secure network information is another limitation of Client
server.
- In the process of data exchange, the possibility of network information being
exposed is easy to happen.

I.1.1 Working principle of Client server

12
The entire communication process between server and client must be based on
standard protocols. TCP/IP, SAN (IBM), ISDN, OSI, X.25, LAN-to-LAN Netbios are
standard protocols in common use today.
Client server is an effective software solution, helping to overcome the overload
of the network system. Besides, this model also overcomes the difference in the
physical structure and operating system of computer systems. Client server model
consists of 2 parts: client & server.
I.1.2 Peer-to-peer
P2P (Peer to Peer) is a network consisting of a group of devices that share and
store files together. Each participant (node) acts as an individual peer. Usually, all
nodes have the same power and perform the same tasks.

Here are the advantages and disadvantages of peer-to-peer architecture:


o Advantages:
- Peer to Peer networking does not require a network operating system.
- There is no need for an expensive server as individual workstations are used
to access the data files.
- No need for specialized staff like network technicians.
- Much easier to set up than a client-server network, doesn't require much
specialized knowledge.
- If one computer fails, it won't disrupt any other part of the network. It just
means that those files are not available to other users at that time.
o Disadvantages:
- Since each computer can be accessed by others, it can slow down the user's
performance.
- Files and folders cannot be backed up centrally.
13
- Files and resources are not centrally organized in a particular “shared area”.
They are stored on individual computers and can be difficult to identify if the
computer owner does not have a proper storage system in place.
- If a virus enters the network, many users will be affected.
- Ensuring that viruses are not introduced into the network is the responsibility
of each individual user.
- The resources will disappear because the node providing the resource is
disconnected at any time.

1.1.3 Compare Peer-To-Peer And Client-Server Architecture


 Similar between Client-Server and Peer-to-Peer Network:
- Both use the TCP/IP protocol to transfer information over a network.
- Both can be used to remotely access a computer or application from another
location.
- Both ca be used to handle applications that require high processing power or
low latency.
- Both can be used to share resources such as files, printers and applications.

 Difference between Client-Server and Peer-to-Peer Network:


S.NO Client-Server Network Peer-to-Peer Network
1 In Client-Server Network, Clients In Peer-to-Peer Network, Clients
and server are differentiated, and server are not differentiated.
Specific server and clients are
present.
2 Client-Server Network focuses While Peer-to-Peer Network
on information sharing. focuses on connectivity.
3 In Client-Server Network, While in Peer-to-Peer Network,
14
Centralized server is used to Each peer has its own data.
store the data.
4 In Client-Server Network, Server While in Peer-to-Peer Network,
respond the services which is Each and every node can do both
request by Client. request and respond for the
services.
5 Client-Server Network are While Peer-to-Peer Network are
costlier than Peer-to-Peer less costlier than Client-Server
Network. Network.
6 Client-Server Network are more While Peer-to-Peer Network are
stable than Peer-to-Peer less stable if number of peer is
Network. increase.
7 Client-Server Network is used for While Peer-to-Peer Network is
both small and large networks. generally suited for small
networks with fewer than 10
computers.

2. Network type
A computer network is a group of computers linked to each other that enables the
computer to communicate with another computer and share their resources, data,
and applications.
 Some of the most popular computer network types are:
- LAN (Local Area Network)
- PAN(Personal Area Network)
- MAN (Metropolitan Area Network)
- WAN (Wide Area Network)

15
 There are numerous additional kinds of computer networks, such as:
- SAN (Storage Area Network)
- EPN (Enterprise Private Network)
- VPN (Virtual Private Network)
2.1. Local area network (LAN)
- LAN (Local Area Network) is a group of computers connected to each other in
a small area such as building, office.
- LAN is used for connecting two or more personal computers through a
communication medium such as twisted pair, coaxial cable, etc.
- It is less costly as it is built with inexpensive hardware such as hubs, network
adapters, and ethernet cables.
- The data is transferred at an extremely faster rate in Local Area Network.
- Local Area Network provides higher security.

16
- Most Common type of LAN:
o Ethernet LAN (Wired connection)
o WLAN (Wireless)
2.1.1. Ethernet LAN (Wired Connection)
- Ethernet LAN uses Ethernet cables to connect the devices in a network. In this
type of connection, the network installation is wired, and the Switches and
Routers are configured using the network settings. Involves a hardwired
connection to the internet by Ethernet cables (Cat5, Cat6 and so on). Ethernet
is more stable and secure and faster than Wi-Fi. It is less accessible and
expensive.
2.1.2. WLAN (Wireless)
- Wireless LAN stands for Wireless Local Area Network. It is also called LAWN
(Local Area Wireless Network). WLAN is one in which a mobile user can
connect to a Local Area Network (LAN) through a wireless connection.
- Wireless LANs provide high speed data communication in small areas such as
building or an office. WLANs allow users to move around in a confined area
while they are still connected to the network.

 Advantages :
- High speed.
- Has large bandwidth, can run online applications connected through the
network such as conferences, movie screenings...
- Low cost, simple network administration.
 Disadvantages :
- The transmission is short, only works in a certain area.
- Maintenance: Common hardware problems and system errors
- Distributing malicious code: The appearance of viruses in a network based on
LAN infrastructure is very dangerous.
2.1.3. MAN (Metropolitan Area Network)
17
- A metropolitan area network is a network that covers a larger geographic area
by interconnecting a different LAN to form a larger network.
- Government agencies use MAN to connect to the citizens and private
industries.
- In MAN, various LANs are connected to each other through a telephone
exchange line.
- The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, …
- It has a higher range than Local Area Network(LAN).

 Advantages :
- The MAN
installation
allows users to share
their internet
access so that
multiple users can
access high-speed
internet.
- The MAN network
is capable of
creating high-speed
connections
over a wide range of up to hundreds of Mb/s and can be expanded up to
1Gb/s for: e-commerce development, information exchange, State
administrative management, direction work, public administrative services.
- High security and more comprehensive than LAN, MAN network data is quite
safe.
- Maximizing traffic on bandwidth on telecommunications and IT network
infrastructure helps to diversify services, enhance service delivery capabilities,
and bring significant profits to service providers.
- Capable of combining with multiple networks of many organizations rather
than being managed by just one organization.
 Disadvantages:
- Compared with LAN, the investment cost of setting up MAN network will be
more expensive.
- Building a MAN network system takes a lot of time and effort, which needs to
be done by a skilled technical team.
- The MAN network consists of many local area networks, so the network
management method is also more complicated and complicated.
- Bandwidth is just average.
18
- Since this network consists of many LANs, it is difficult to prevent hackers.
- As skilled network technicians and administrators are required to deploy this
network, the overall installation and management costs will increase.
2.1.4. WAN (Wide Area Network)
- A Wide Area Network is a network that extends over a large geographical
area such as states or countries.
- A Wide Area Network is quite bigger network than the LAN.
- A Wide Area Network is not limited to a single location, but it spans over a
large geographical area through a telephone line, fibre optic cable or
satellite links.
- The internet is one of the biggest WAN in the world.
- A Wide Area Network is widely used in the field of Business, government,
and education.

 Advantages:
- Increase effi ciency.
- Easy of communication
- Large network cover
- Share information
over a large area.
- Messages can be sent
very quickly to anyone else
on the network.
- It supports the global
market and global business.
- Centralized IT infrastructure
- Boost your privacy.
 Disadvantages:
- It is slow in speed.
- It is complected and complex.
- It is difficult to maintain the network.
- It is very costly because we have to pay every time for transferring data.
- WAN is a big and complex problem.
- Very much dependent on the third party because it is a public network.
- WAN is not secure and means not reliable.
- Security problem
- Training cost
- Maintenance problem
- Require high-performance device
19
2.1.4 Personal Area Network (PAN)
- Personal Area Network (PAN) is a computer network organized around an
individual for personal use only. The PAN is used for data sharing between
devices within 10 meters or 33 feet, various digital devices such as
smartphones, tablets, printers, computers, and other devices within an
individual user's environment. Wireless keyboards, Wireless Mice,
Smartphones, TV remotes, Wireless printers, Gaming consoles, Bluetooth,
Fire-wire, ZigBee, Wire and wireless USB are some examples of PAN.

 Types of
PANs
- There are
two types
of PANs:
wireless
and wired.
- A wireless
PAN is
designed
to serve a
single
person,
SOHO or
small
workgroup. As such, limited distance, throughput, peripheral sharing and low
volume are some of the main characteristics of this type of network. A
wireless PAN functions wirelessly and is carried over a low-powered, short-
distance wireless network technology, such as Infrared Data Association
(IrDA), wireless universal serial bus (USB), Bluetooth, ultra-wideband
or Zigbee.
- Conceptually, the difference between a PAN and a wireless local area network
(LAN) is that the former tends to be centered around one person while the
latter is connected without wires and serves multiple users.
- Wired PANs. These networks provide short connections between peripherals
using wired technologies, such as USB, IEEE-1394 high-performance serial
buses or a Thunderbolt hardware interface.
Advantages of personal area network
- No extra space requires: Personal area network does not require extra wire or
space. For connecting two devices you only need to enable Bluetooth in both
devices to start sharing data among them. For example, connecting wireless
keyboard and mouse with the tablet through Bluetooth.
20
- Connect to many devices at a time: Many devices can be connected to one
device at the same time in a personal area network. You can connect one
mobile to many other mobiles or tablets to share files.
- Cost effective: No extra wires are needed in this type of network. Also, no
extra data charges are involved so PAN is an inexpensive way of
communication.
- Easy to use: It is easy to use. No advanced setup is required.
- Reliable: If you use this type of data connection within 10 meters then your
network is stable and reliable.
- Secure: This network is secured because all the devices are authorized before
data sharing. Third party injection and data hacking are not possible in PAN.
- Used in office, conference, and meetings: infrared is the technology used in
TV remotes, AC remotes, and other devices. Bluetooth, infrared and other
types of PAN are used to interconnect digital devices in offices, meetings, and
conferences.
- Synchronize data between different devices: One person can synchronize
several devices i.e. download, upload and exchange data among devices.
- Portable: A person can move devices as it is a wireless network and data
exchange is not affected. That means PAN is portable as well.
 Disadvantages of personal area network
- Less distance range: Signal range is maximum 10 meters which makes
limitation for long distance sharing.
- Interfere with radio signals: As personal area network also use infrared so it
can interfere with radio signals and data can be dropped.
- Slow data transfer: Bluetooth and infrared have a slow data transfer rate as
compared to another type of networks like LAN (local area network).
- Health problem: In some cases, PAN uses microwave signals in some digital
devices which have a bad effect on the human body like brain and heart
problems may occur.
- Costly in terms of communication devices: Personal area network is used in
digital devices which are costly, so it is another disadvantage of PAN.
Examples are smartphones, PDA, laptops, and digital cameras.
- Infrared signals travel in a straight line: TV remote use infrared signals which
have a problem that they travel in straight line. So, this counts another
disadvantage of PAN.

2.1.5 Differences between PAN, LAN, MAN and WAN

21
3 Protocol and Standards
3.1 Protocol
A network protocol is an established set of rules that determine how data is
transmitted between different devices in the same network. Essentially, it allows
connected devices to communicate with each other, regardless of any differences in
their internal processes, structure or design. Network protocols are the reason you
can easily communicate with people all over the world, and thus play a critical role
in modern digital communications.
TCP/IP model
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of
communication protocols used to interconnect network devices on the internet.
TCP/IP is also used as a communications protocol in a private computer network
(an intranet or extranet).

The 4 layers of the TCP/IP model

22
TCP/IP functionality is divided into four layers, each of which includes specific
protocols:
The application layer provides applications with standardized data exchange. Its
protocols include HTTP, FTP, Post Office Protocol 3, Simple Mail Transfer
Protocol and Simple Network Management Protocol. At the application layer, the
payload is the actual application data.

- The transport layer is responsible for maintaining end-to-end


communications across the network. TCP handles communications between
hosts and provides flow control, multiplexing and reliability. The transport
protocols include TCP and User Datagram Protocol, which is sometimes used
instead of TCP for special purposes.
- The network layer, also called the internet layer, deals with packets and
connects independent networks to transport the packets across network
boundaries. The network layer protocols are IP and Internet Control Message
Protocol, which is used for error reporting.
- The physical layer, also known as the network interface layer or data link
layer, consists of protocols that operate only on a link -- the network
component that interconnects nodes or hosts in the network. The protocols in
this lowest layer include Ethernet for local area networks and Address
Resolution Protocol.
23
 OSI model
- The Open Systems Interconnection model (OSI model) is a conceptual

model from the International Organization for Standardization (ISO) that


"provides a common basis for the coordination of standards development for
the purpose of systems interconnection".[2] In the OSI reference model, the
communications between a computing system are split into seven different
abstraction layers: Physical, Data Link, Network, Transport, Session,
Presentation, and Application.[3]

Layer 1: The Physical Layer


24
Physical Layer is the lowest layer of the OSI Model.
It activates, maintains and deactivates the physical connection.
It is responsible for transmission and reception of the unstructured raw data over
network.
Voltages and data rates needed for transmission is defined in the physical layer.
It converts the digital/analog bits into electrical signal or optical signals.

Data encoding is also done in this layer.


Layer 2: Data Link Layer
Data link layer synchronizes the information which is to be transmitted over the
physical layer.
The main function of this layer is to make sure data transfer is error free from one
node to another, over the physical layer.
Transmitting and receiving data frames sequentially is managed by this layer.
This layer sends and expects acknowledgements for frames received and sent
respectively. Resending of non-acknowledgement received frames is also handled by
this layer.
This layer establishes a logical layer between two nodes and also manages the
Frame traffic control over the network. It signals the transmitting node to stop,
when the frame buffers are full.
Layer 3: The Network Layer
Network Layer routes the signal through different channels from one node to other.
It acts as a network controller. It manages the Subnet traffic.
It decides by which route data should take.
It divides the outgoing messages into packets and assembles the incoming packets
into messages for higher levels.
Layer 4: Transport Layer
Transport Layer decides if data transmission should be on parallel path or single
path.
Functions such as Multiplexing, Segmenting or Splitting on the data are done by this
layer
It receives messages from the Session layer above it, convert the message into
smaller units and passes it on to the Network layer.
Transport layer can be very complex, depending upon the network requirements.
Transport layer breaks the message (data) into small units so that they are handled
more efficiently by the network layer.
Layer 5: The Session Layer
Session Layer manages and synchronize the conversation between two different
applications.
Transfer of data from source to destination session layer streams of data are marked
25
and are resynchronized properly, so that the ends of the messages are not cut
prematurely and data loss is avoided.
Layer 6: The Presentation Layer
Presentation Layer takes care that the data is sent in such a way that the receiver
will understand the information (data) and will be able to use the data.
While receiving the data, presentation layer transforms the data to be ready for the
application layer.
Languages(syntax) can be different of the two communicating systems. Under this
condition presentation layer plays a role of translator.
It performs Data compression, Data encryption, Data conversion etc.
Layer 7: Application Layer
Application Layer is the topmost layer.
Transferring of files disturbing the results to the user is also done in this layer. Mail
services, directory services, network resource etc are services provided by
application layer.
This layer mainly holds application programs to act upon the received and to be sent
data.
TCP/IP vs OSI Model – Comparative Analysis
Similarities between the TCP/IP and OSI models
Both the models are based upon layered structuring.
In both models, data are mainly used to convert raw data into packets and help
them reach their destination node.
In both models, protocols are defined in a layer-wise manner.
The layers in the models are compared with each other. The physical layer and the
data link layer of the OSI model correspond to the link layer of the TCP/IP model.
- The session layer, the presentation layer and the application layer of the OSI
model together form the application layer of the TCP/IP model.
- The network layers and the transport layers are the same in both models.
 Difference between TCP/IP and OSI Model

TCP/IP OSI Model

The full form of TCP/IP is The full form of OSI is Open Systems
Transmission Control Protocol/ Interconnection.
Internet Protocol.

It is a communication protocol that is It is a structured model which deals


26
based on standard protocols and which the functioning of a network
allows the connection of hosts over a
network.

In 1982, the TCP/IP model became In 1984, the OSI model was
the standard language of ARPANET introduced by the International
Organisation of Standardization
(ISO).

It comprises of four layers: It comprises seven layers:


 Network Interface  Physical
 Internet  Data Link
 Transport  Network
 Application  Transport
 Session
 Presentation
 Application

It follows a horizontal approach. It follows a vertical approach.

The TCP/IP is the implementation of An OSI Model is a reference model,


the OSI Model. based on which a network is created

It is protocol dependent. It is protocol independent.

Standard
3 Networking standards define the guidelines for information correspondences that
are required for
4 interoperability of systems administration advances and procedures. Guidelines
help in making and
5 keeping up open markets and enable various merchants to contend based on the
nature of their items
6 while being perfect with existing business sector items
7 Networking standards define the guidelines for information correspondences that
are required for

27
8 interoperability of systems administration advances and procedures. Guidelines
help in making and
9 keeping up open markets and enable various merchants to contend based on the
nature of their items
10 while being perfect with existing business sector items
- Networking standards define the rules for data communications that are
needed for interoperability of networking technologies and processes.
Standards help in creating and maintaining open markets and allow different
vendors to compete on the basis of the quality of their products while being
compatible with existing market products.
- During data communication, a number of standards may be used
simultaneously at the different layers.

- The commonly used standards at each layer are :


o Application layer − HTTP, HTML, POP, H.323, IMAP
o Transport layer − TCP, SPX
o Network layer −IP, IPX
o Data link layer − Ethernet IEEE 802.3, X.25, Frame Relay
o Physical layer −RS-232C (cable), V.92 (modem)

 Types of Standards
 Standards are of two types:
- De facto − These are the standards that are followed without any formal plan
or approval by any organization. They have come into existence due to
traditions or facts. For example, HTTP had started as a de facto standard.
- De jure − These standards are the ones which have been adopted through
28
legislation by any officially recognized standards organization. Most of the
communication standards that are used today are de jure standards.
 Standards Organizations
- International Standards Organization (ISO)
- International Telecommunication Union (ITU)
- Institute of Electronics and Electrical Engineers (IEEE)
- American National Standards Institute (ANSI)
- Internet Research Task Force (IETF)
- Electronic Industries Association (EIA)
 Some Standard name:
- IEEE 802: a family of standards for local area networks (LAN), personal area
network (PAN), and metropolitan area networks (MAN) maintained by the
IEEE 802 LAN/MAN Standards Committee (LMSC).
- UNC: Universal Naming Convention, a naming system used in Microsoft
Windows for accessing shared network folders and printers on a local area
network. It consists of three parts: a host device name, a share name, and an
optional file path.
- Ethernet: a standard for wired LANs that uses twisted pair or fiber optic cables
to transmit data. It is defined by the IEEE 802.3 standard.
- Wi-Fi: a standard for wireless LANs that use radio waves to provide wireless
internet access. It is defined by the IEEE 802.11 standard.
- Bluetooth/Zigbee: standards for wireless PANs that enable short-range
communication between devices such as smartphones, keyboards, mice,
speakers, .... They are defined by the IEEE 802.15 standard.

29
30
II . Network topology & communication and Bandwidth requirements.(P2)
2. Topology

Network topology is the arrangement of the elements (links, nodes, etc.) of a


communication network. Network topology can be used to define or describe the
arrangement of various types of telecommunication networks, including command
and control radio networks, industrial fieldbusses and computer networks.

Network topology is the topological structure of a network and may be depicted


physically or logically. It is an application of graph theory wherein communicating
devices are modeled as nodes and the connections between the devices are
modeled as links or lines between the nodes. Physical topology is the placement of
the various components of a network (e.g., device location and cable installation),
while logical topology illustrates how data flows within a network. Distances
between nodes, physical interconnections, transmission rates, or signal types may
differ between two different networks, yet their logical topologies may be identical.
A network’s physical topology is a particular concern of the physical layer of the OSI
model.

Network topology can be defined as physical topology and subject topology. In the
network topology diagram, devices are represented as network nodes and
connections between devices are represented as lines. Network topology types
depend on how you configure your network.

2.1. Logical topology


It tells about a network that should be configured for the transfer of information.
This is different from physical topology as it does not explain the physical wiring of a
network, but instead, it describes the flow of data, information, and back, from one
system to another and the routes it takes.
2.1.1. Physical topology
A Physical topology explains about how network devices are physically connected or
how devices are actual ly plugged into each other, for example cables, wireless
connectivity and more.
It is a diagram which shows the structure of how devices are connected physically
31
inside a network. It refers to how a network looks and functions.
2.1.2. Bus network
A bus network is a local area network (LAN) topology in which each node
-- a workstation or other device -- is connected to a main cable or link
called a bus. All connected stations on the bus can communicate with all
others on the singular network segment. A bus network topology is
simple and reliable. If one station fails to operate, the rest of the stations
can still communicate with each other. For a major disruption to take
place, the bus itself must be cut or broken somewhere along the line. Bus
networks are also easy to expand. Additional nodes can be added
anywhere along the link.

Advantages:
- Easily connect or disconnect devices from this network without affecting
other devices.
- Business is very good compared to other communications.
- The topology is easy to understand.
- Competitively connecting devices or computers is the simplest network
topology.
- Cable length must be shorter than star topology.
 Disadvantages:
- Damage to the spine causes the entire network to malfunction or split in two.
- Packets are too slow.
- The bus topology is not suitable for large networks.
- It can be difficult to identify the problem when the entire network is down.
- Solving personal problems.
- The main wiring area must be disconnected.
2.1.3. Star Network
A star network is an implementation of a spoke–hub distribution paradigm in
computer networks. In a star network, every host is connected to a central hub. In

32
its simplest form, one central hub acts as a conduit to transmit messages. The star
network is one of the most common computer network topologies.

Advantages:
- Easy to install and wire.
- No disruptions to the network when connecting or removing devices.
- Easy to detect faults and to remove parts.
 Disadvantages:
- Requires more cable length than a linear topology.
- If the hub, switch, or concentrator fails, nodes attached are disabled.
- More expensive than linear bus topologies because of the cost of the hubs.
2.1.4. Ring network
A ring network is a network topology in which each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node – a
ring. Data travels from node to node, with each node along the way handling every
packet. Rings can be unidirectional, with all traffic travelling either clockwise or
anticlockwise around the ring, or bidirectional

 Advantages:
- The advantage of using this
network topology is the ability to
33
have fast network throughput.
- Fewer packet conflicts.
- High speed transmission.
- Tokens are used between nodes thus making the performance better than
Bus topology.
 Disadvantages:
- The disadvantage is the point of failure, since a single node failure can disrupt
data transmission on the network.
- Not enough bandwidth.
- Network wires or cables used for damage.
2.1.5. Mesh network
A mesh network is a local area network topology in which the infrastructure nodes
(i.e. bridges, switches, and other infrastructure devices) connect directly,
dynamically and non-hierarchically to as many other nodes as possible and
cooperate with one another to efficiently route data to and from clients.
This lack of dependency on one node allows for every node to participate in the
relay of information. Mesh networks dynamically self-organize and self-configure,
which can reduce installation overhead. The ability to self-configure enables
dynamic distribution of workloads, particularly in the event a few nodes should fail.
This in turn contributes to fault-tolerance and
reduced maintenance costs.

 Advantages:
- Adding new equipment is very easy.
- Configured to control high level.
- Easy Extensibility.
- Adding a new device does not affect the network.
- A link.
- Data connection.
 Disadvantages:
- Easy to install.
- Low cost operation.
- Complex procedures.
- Energy consumption.
- High risk of further connections.

34
2.1.6. Tree network
Tree Topology is a topology which is having a tree structure in which all the
computers are connected like the branches are connected to the tree. In Computer
networks, tree topology is called a combination of a Bus and Star network topology.
The main advantages of this topology are that is very flexible and also has better
scalability. Tree network topology is considered to be the simplest topology in all
the topologies which is having only one route between any two nodes on the
network
 Advantages:
- A callable topology. Leaf nodes can contain more nodes.
- Supported by several hardware and software vendors.
- Point-to-point wiring for individual segments.
- The tree topology is highly secure.
- It is used in WAN.
- The tree topology is reliable.
 Disadvantages:
- This network is very difficult to configure compared to other network
topologies.
- The length of a segment is limited and the limit of the segment depends on
the type of cable used.
- Due to the presence of a large number of nodes, the network performance of
the tree topology becomes somewhat slow.
- If the computer on the first level fails, the computer on the next level also
crashes.
- Requires a large number of cables compared to star and ring topologies.
- Since data needs to travel from the central cable, this creates dense network
traffic.
- The backbone appears as the failure point of the entire network segment.
- Handling topology is quite complicated.
- Establishment costs also increase.
2.1.7. Hybrid network
A hybrid network is any network that can use more than one type of
connecting technology. For example, a home network that uses both Wi-Fi and
Ethernet cables to connect computers is a hybrid. Hybrid environments allow
organizations to keep important data on-premises. This allows them to
maintain full control over sensitive assets, while also taking full advantage of
the scalability and agility the cloud provides. However, as organizations
become more hybrid and distributed, their security needs to be able to span
across all environments.
 Advantages:
- Regarding the advantages of using each of these topology types, it is highly

35
fault tolerant, which makes it reliable and flexible.
- Extensible because you can add new nodes easily.
You can design it in a way to utilize the best features of different topologies.
 Disadvantages:
- The disadvantages include things like high cost and complexity of
maintenance.
- Expensive infrastructure.
- A hub connecting two different networks is very expensive. hubs differ from
traditional hubs in that they have to be smart enough to work with different
architectures.

2.1.8. Communication
Network communication defines a set of protocols that allow application programs
to communicate with each other regardless of the hardware and operating system.
Network communication allows application programs to communicate
independently of their physical network connections. The network communication
technology known as TCP/IP is named after its two main protocols: TCP Protocol and
IP Protocol.
2.1.9. Bandwidth
Network bandwidth is a measure of the maximum capacity of a wired or wireless
communication link to transmit data over a network connection over a period of
time. certain. Typically, bandwidth is expressed in terms of the number of bits,
kilobits, megabits or gigabits that can be transmitted in 1 second. Synonymous with
capacity, bandwidth describes the data transfer rate. Bandwidth is not a measure of
36
network speed (- a common misconception.
The more bandwidth a data connection has, the more data it can send and receive
at the same time.

37
3. Compare Physical Topology and Logical Topology

PHYSICAL TOPOLOGY LOGICAL TOPOLOGY


Depicts physical layout of Depicts logistics of network
network. concerned with transmis- sion of
data.
The layout can be modified based There is no interference and
on needs. manipulation involved
here.
It can be arranged in star, ring, It exists in bus and ring topologies.
mesh and bus topolo- gies.
This has major impact on cost, This has major impact on speed
scalability and band- width and delivery of data packets. It
capacity of network based on also handles flow control and
selection and availability of ordered deliv- ery of data packets,
devices.
It is actual route concerned with It is a high level representation of
transmission. data flow.
Physical connection of the Data path followed of the
network. network.

3.1. Compare LAN, MAN, WAN

LAN MAN WAN


38
A computer network A computer network A computer network
that interconnects that interconnects that extends over a
computers within a user with computer large geographical
limited area such as resources in a area
residence, office geographical area
building, school or a larger than LAN but
laboratory. smaller than WAN
Stands for Local Area Stands for Stands for Wide Area
Network Metropolitan Area Network
Network
Covers an area within Covers an area withinCovers a large area
1km to 10km 100km that goes beyond
100km
Easier to design and Difficult and Difficult and
maintain complicated to design complicated to design
and maintain and maintain
High data transferring Moderate data Low data transferring
speed transferring speed speed
Has a limited number Moderate congestion Low congestion
of users- less
congestion
A network in a home. A network in a city or A network network
school or an office a small town covering a state or a
country

CHAPTER 2: EXPLAIN NETWORKING DEVICES AND


OPERATIONS (LO2)

1.Discuss the operating principles of networking devices and server types.(P3)


1.1. Network devices

Hardware devices that are used to connect computers, printers, fax machines and
other electronic devices to a network are called network devices. These devices
transfer data in a fast, secure and correct way over same or different networks.
Network devices may be inter-network or intra-network

A network has several network types:


o Modem

39
o RJ45 Connector
o Router
o Switch
o Ethernet Card
o Bridge
o Hub
1.1.1. Modem

Modem is a device that enables a computer to send or receive data over


telephone or cable lines. The data stored on the computer is digital whereas a
telephone line or cable wire can transmit only analog data. Analog-Digital
Waveform, the main function of the modem is to convert digital signal into analog
and vice versa. Modem is a combination of two devices − modulator and
demodulator. The modulator converts digital data into analog data when the data
is being sent by the computer. The demodulator converts analog data signals into
digital data when it is being received by the computer.

1.1.2. RJ45
Connector

RJ45 is the
acronym for
Registered Jack 45. RJ45 connector is an 8-pin jack used by devices to
physically connect to Ethernet based local area networks (LANs). Ethernet
is a technology that defines protocols for establishing a LAN. The cable
used for Ethernet LANs are twisted pair ones and have RJ45 connector pins
at both ends. These pins go into the corresponding socket on devices and
connect the device to the network.

I.1.3 Router

A router is a network layer


hardware device that
40
transmits data from one LAN to another if both networks support the
same set of protocols. So a router is typically connected to at least two
LANs and the internet service provider (ISP). It receives its data in the
form of packets, which are data frames with their destination address
added. Router also strengthens the signals before transmitting them.
That is why it is also called repeater.

1.1.4. Switch

Switch is a network device that connects other devices to Ethernet networks


through twisted pair cables. It uses packet switching technique to receive, store
and forward data packets on the network. The switch maintains a list of network
addresses of all the devices connected to it.

41
1.1.5. Ethernet Card

Ethernet card, also known as network interface card (NIC), is a hardware


component used by computers to connect to Ethernet LAN and communicate with
other devices on the LAN. The earliest Ethernet cards were external to the system
and needed to be installed manually. In modern computer systems, it is an
internal hardware component. The NIC has RJ45 socket where network cable is
physically plugged in.

42
1.1.6. Bridge

A network bridge is a computer networking device that creates a single, aggregate


network from multiple communication networks or network segments. This
function is called network bridging. Bridging is distinct from routing. Routing
allows multiple networks to communicate independently and yet remain separate,
whereas bridging connects two separate networks as if they were a single
network. In the OSI model, bridging is performed in the data link layer (layer 2). If
one or more segments of the bridged network are wireless, the device is known as
a wireless bridge.

1.1.7. Hub

43
A hub is a physical layer networking device which is used to connect multiple
devices in a network. They are generally used to connect computers in a
LAN.
A hub has many ports in it. A computer which intends to be connected to the
network is plugged in to one of these ports. When a data frame arrives at a
port, it is broadcast to every other port, without considering whether it is
destined for a particular destination or not.

Advantages:
- Allows the expansion of the network.
- Allows the connection of two different types of networks.
Disadvantages:
- Costly and difficult to manage.
- Never filter data .

1.2. Server type


Servers are large data storage and processing devices that exist either as
hardware or as virtual storehouses located on the internet. Computers or
software systems act as servers that connect to a network.

A server can be any type of device that shares and saves information.
Servers can both store and process information within their own system or
request it from another.
Servers began as small devices that simply transferred data to a more
functional computer then grew in size and ability to perform more complex
functions.

Web Sever:
44
An open-source web server is used for accessing the
world wide web through public domain software.
These servers connect stored information from an
internet website to your own computer. Web servers
store information for the internet that is retrieved via
"HTTP" code and sent to your web browser. This is
one of the most widely used types of servers.

Proxy server:
Proxy servers act as a bridge between a host server and a client server. A proxy
sends data from a website to your computer IP address after it passes through
the proxy's server. This practice adds a layer of security since the information
is requested then transferred from the source to the proxy server and never
directly from a client to another user. A proxy server can filter out various
harmful internet entities.

45
Virtual machine (VM):
As their name suggests, virtual machines store and connect data strictly
through virtual space. To create a virtual machine, IT teams use a hypervisor,
also known as a virtual machine monitor (VMM), which is software that can
run thousands of virtual machines through only one piece of physical
hardware. This method of server virtualization is widely used for data transfer
and storage because they are the most cost-effective type of server to run.

File transfer protocol (FTP) server:


FTP servers are used to relocate files from one
computer to another. Uploaded files move from your
computer to the server while downloaded files are
extracted from the server onto your device. File
transfer protocol also refers to the method of using a
server to connect one computer to another in order to
share data safely.

46
Application server:
These servers connect clients to software applications
through virtual server connections. This allows users to
bypass downloading data to their own hardware in order
to access applications. Application servers can
effectively host large amounts of application data to
many users at once, making them ideal for businesses.

File server:
A file server stores data files for multiple users. They
allow for faster data retrieval and saving or writing files
to a computer. This is a basic type of server used
commonly by organizations where lots of users need
access to files that are more conveniently and safely
47
stored on a server than a personal computer.

Database server:
Database servers function as large storage spaces that
organizations use and access to run multiple programs
to meet their needs. A database server can run
independently of any database architecture.

48
Mail server:
A mail server stores and delivers mail for clients through
email service platforms. Because mail servers are set up
to continually connect to a network, individual users can
access their email without running any systems through
their own devices.

49
Print server:
A print server connects remotely to local computers to
print through a network. These servers give businesses
the ability to use a single printer to serve an entire
department. Some printers even come with their own
built-in server ready to join a network once they're
installed in an office area.

Domain name system (DNS) server:


50
These servers transform readable computer domain
names into computer language IP addresses. The DNS
server takes search data from a user and finds the
requested address to deliver to the client device.

Collaboration server:
When work needs to be shared across multiple users, a
collaboration server makes it easy to connect. These
servers allow you to share and store files, applications
and other large amounts of data.

51
Gaming server:
Large gaming networks use servers to connect users
from around the world. These servers host multi-player
online games.

Monitoring and management server:


Monitoring and management servers function in several
capacities. First, they record and track digital
transactions and receive user requests. Others simply
monitor and don't actively participate in user operations.
Monitoring servers are responsive to network
administrators who survey network health to check for
threats or bugs in the system.

52
2. Discuss the inter-dependence of workstation hardware with relevant
networking software.(P4)

Interdependency between hardware and software:


o Workstation hardware includes the physical components of a computer
or device, such as the processor, memory, storage, and network
interface card (NIC). The NIC is an important component of workstation
hardware because it provides the physical connection between the
workstation and the network. The NIC communicates with the
networking software in the operating system to send and receive data
packets over the network.
o Networking software, refers to the operating system, protocols, drivers,
and other software components that enable communication over a
network.
o Workstation hardware and networking software are interdependent
because they work together to enable devices to connect to and
communicate over a network. The hardware provides the physical
connection and the software provides the protocols and services
necessary for communication to occur. A properly configured and
compatible combination of hardware and software is essential for
effective network communication.
 Example:
If the NIC hardware is not compatible with the networking software in the
operating system, the device may not be able to connect to the network or
communicate with other devices. Similarly, if the networking software is
not properly configured, the device may not be able to access certain
network resources or services.

2.1. Workstation Hardware:


Workstation hardware refers to the physical components of a computer or
device that are used for performing work tasks. Workstations are typically
53
high-performance computers that are optimized for tasks such as graphic
design, video editing, scientific research, and engineering.

Some common components of workstation hardware include:


o Processor: The processor, also known as the central processing unit
(CPU), is the brain of the computer that performs calculations and
executes instructions.
o Memory: Memory, also known as RAM (random access memory), is the
temporary storage space that holds data and instructions that the CPU
needs to access quickly.
o Storage: Workstations typically have high-capacity storage devices such
as solid-state drives (SSDs) or hard disk drives (HDDs) that are used for
storing large amounts of data.
o Graphics card: Workstations often have dedicated graphics cards that
are optimized for tasks such as 3D modeling, animation, and video
editing.
o Network interface card (NIC): The NIC is a hardware component that
enables the workstation to connect to a network.
o Input/output (I/O) devices: Workstations typically have high-quality
input/output devices such as monitors, keyboards, and mice that are
optimized for the specific tasks the workstation is used for.
o Power supply: Workstations require a powerful and reliable power
supply to provide the necessary energy to run the high-performance
components.
o Random Access Memory (RAM): This gives the processor room to
work. The workstation usually has more memory to facilitate
multitasking and big data management.

2.2. Workstation Software:


Workstation software refers to the programs and operating systems that are
installed on a computer or device used for high-performance computing and
specialized tasks such as graphic design, video editing, scientific research, and
engineering.
Software is mainly divided into two categories:
System software and Application software:
54
System software refers to the software components that are essential for the
operation of a computer system. These components include the operating
system, device drivers, utilities, and system libraries. The operating system is
the core component of system software that manages the computer's resources
and provides a platform for other software to run on.

Application software, refers to software that is designed for specific tasks or


functions, such as word processing, database management, graphic design, or
gaming. Application software can be further categorized into productivity
software, creative software, entertainment software, and educational software.
Productivity software includes tools such as word processors, spreadsheets, and
presentation software that are used for office tasks. Creative software includes
tools such as graphic design software, video editing software, and music
production software. Entertainment software includes games, multimedia
players, and virtual reality applications. Educational software includes tools for
learning, such as language learning software, interactive textbooks, and
educational games.

System software and application software are two broad categories of software
that are commonly used in computing. System software provides the core
components that are essential for the operation of a computer system, while
application software provides software tools for specific tasks or

 Some common types of workstation software include:

o Operating systems: Workstations may run specialized operating


systems such as Microsoft Windows Pro, macOS, or Linux distributions
that are optimized for high-performance computing tasks.
o Design and engineering software: Workstations are often used for
specialized tasks such as 3D modeling, animation, and engineering
design. These tasks require specialized software such as AutoCAD,
SolidWorks, or Adobe Creative Suite that is optimized for high-
performance computing tasks.
o Scientific and statistical software: Workstations may also be used for
scientific research and statistical analysis. These tasks require specialized

software such as MATLAB, R, or SPSS that is optimized for high-


performance computing tasks.
o Virtualization software: Workstations may also run virtualization
software such as VMware or VirtualBox that allows multiple operating
55
systems to run on a single workstation.
o Security software: Workstations may also run specialized security
software such as antivirus, firewall, and intrusion detection software to
protect against cyber threats.
Example: A workstation with a high-speed network interface card (NIC)
can leverage the networking software in the operating system to take
advantage of high-bandwidth network connections. The NIC hardware
provides the physical connection between the workstation and the
network, while the networking software in the operating system provides
the protocols and services necessary for communication to occur. The
NIC and networking software must be properly configured and
compatible with each other to ensure reliable and efficient network
communication.

3. Explore a range of server types and justify the selection of a server,


considering a given scenario regarding cost and performance optimization
(M2)

Web Server: A web server is used to host websites and handle web requests.
Mail Server: A mail server is used to send and receive email messages.
Database Server: A database server is used to store and manage data for applications.
DNS Server: A DNS server is used to translate domain names into IP addresses.
File Server: A file server is used to store and share files on a network.
Dedicated Server: A dedicated server is a physical server that is solely dedicated to a
single organization or user.
Virtual Private Server (VPS): A VPS is a virtual machine that is partitioned from a
physical server.
Cloud Server: A cloud server is a virtual machine that is hosted in a cloud computing
environment.

4. Considering a given scenario, identify the topology protocol selected for


the efficient utilization of a networking system(D1)
In a star topology, each device is connected to a central hub or switch. This topology
is easy to set up and maintain, and provides good performance for small to medium-
sized networks. It is a good choice for situations where devices need to be easily
added or removed from the network, and where there is a central point of control.

The selection of a topology protocol should be based on the specific needs and
requirements of the organization. For efficient utilization of a networking system, a
star topology may be a good choice for small to medium-sized networks.

Ultimately, the choice of topology protocol should be made based on a balance


between performance, reliability, and cost.

56
CONCLUSION
Network security is an important field that is increasingly gaining attention as the
internet expands. The security threats and internet protocol were analyzed to
determine the necessary security technology. The security technology is mostly
57
software based, but many common hardware devices are used. The current
development in network security is not very impressive.

The embedded security of the new internet protocol IPv6 may provide many benefits
to internet users. Although some security issues were observed, the IPv6 internet
protocol seems to evade many of the current popular attacks. Combined use of IPv6
and security tools such as firewalls, intrusion detection, and authentication
mechanisms will prove effective in guarding intellectual property for the near future.
The network security field may have to evolve more rapidly to deal with the threats
further in the future.

58
REFERENCES
https://www.researchgate.net/publication/323511648_INTRODUCTION_TO_NETWORKING
https://www.researchgate.net/figure/Database-assisted-TVWS-network-
architecture_fig5_309696523
https://www.open.edu/openlearn/science-maths-technology/an-introduction-web-
applications-architecture/content-section-1.1
https://www.researchgate.net/figure/Multiple-OPC-clients-connected-to-OPC-
server_fig5_259258028
https://coin98.net/p2p-la-gi
https://www.geeksforgeeks.org/difference-between-client-server-and-peer-to-peer-network/
https://www.javatpoint.com/wireless-lan-introduction
https://www.javatpoint.com/types-of-computer-network
https://hoidap247.com/cau-hoi/316539
https://yandex.com/images/search?img_url=https%3A%2F%2Fi.pinimg.com%2F736x%2F7d
%2F49%2Fc3%2F7d49c33a100d7c7a09121eadd765c54e.jpg&lr=10543&pos=7&rpt=simage&text
=standard%20network
https://yandex.com/images/search?img_url=https%3A%2F%2Fimage2.slideserve.com
%2F3737859%2Fslide8-l.jpg&lr=10543&p=1&pos=15&rpt=simage&text=%EF%81%B6%20TCP
%2FIP%20model
https://en.wikipedia.org/wiki/OSI_model
https://www.studytonight.com/computer-networks/complete-osi-model
https://www.geeksforgeeks.org/layers-of-osi-model/
https://byjus.com/free-ias-prep/difference-between-tcp-ip-and-osi-model/#:~:text=The%20TCP
%2FIP%20or%20the,a%20network%20can%20be%20described.
https://www.nibusinessinfo.co.uk/content/personal-area-networks#:~:text=Personal%20area
%20network%20%2D%20advantages%20and,but%20have%20slow%20data%20rates.
https://www.itrelease.com/2018/07/advantages-and-disadvantages-of-personal-area-network-
pan/
https://yandex.com/images/search?text=Differences%20between%20PAN%2C%20LAN%2C
%20MAN%20and%20WAN
https://www.comptia.org/content/guides/what-is-a-network-protocol#:~:text=A%20network
%20protocol%20is%20an,internal%20processes%2C%20structure%20or%20design.
https://www.geeksforgeeks.org/tcp-ip-model/
https://www.techtarget.com/searchnetworking/definition/TCP-IP
https://www.shiksha.com/online-courses/wan-wide-area-network-certification?q=WAN
%20(Wide%20Area%20Network)&fftid=hamburger
https://www.shiksha.com/online-courses/articles/metropolitan-area-network-man-
advantages-and-disadvantages/
https://www.cloudflare.com/learning/network-layer/what-is-a-wan/
https://www.ecstuff4u.com/2018/05/advantages-and-disadvantages-of-wide.html
https://www.techtarget.com/searchmobilecomputing/definition/personal-area-network
https://www.cloudflare.com/learning/network-layer/what-is-a-personal-area-network/
#:~:text=Network%20layer-,What%20is%20a%20personal%20area%20network%20(PAN)
%3F,Bluetooth%20earpiece%20and%20a%20smartphone.
https://studylib.net/doc/25646121/networking-assignment---01
https://www.studocu.com/row/document/esoft-metro-campus/higher-national-diploma/
networking-assignment/11737715
https://www.studocu.com/vn/document/truong-dai-hoc-fpt/computer-architecture/
59
assignment-1-networking/36480144
https://en.wikipedia.org/wiki/Network_topology
https://www.tutorialspoint.com/what-are-the-differences-between-physical-and-logical-
topology#:~:text=A%20Physical%20topology%20explains%20about,connected%20physically
%20inside%20a%20network.
https://www.techtarget.com/searchnetworking/definition/bus-network
https://thegioimang.vn/dien-dan/threads/%C6%AFu-v%C3%A0-nh%C6%B0%E1%BB%A3c-
%C4%91i%E1%BB%83m-c%E1%BB%A7a-c%E1%BA%A5u-tr%C3%BAc-m%E1%BA%A1ng-v
%C3%B2ng-ring.7325/
https://en.wikipedia.org/wiki/Ring_network
https://en.wikipedia.org/wiki/Mesh_networking
https://www.smartcitystartups.com/mesh-network-la-gi-uu-nhuoc-diem-va-ung-dung-cua-no/
https://www.anses.net.in/index.php/network-and-data-security/conclusion/
https://www.geeksforgeeks.org/advantages-and-disadvantages-of-tree-topology/
https://www.fortinet.com/blog/industry-trends/what-are-hybrid-networks-how-to-secure-
them#:~:text=A%20hybrid%20network%20is%20any,keep%20important%20data%20on
%2Dpremises.
https://www.automate.org/tech-papers/what-is-commutation
https://www.tutorialspoint.com/what-are-hub-and-switch-in-computer-network
https://www.tutorialspoint.com/communication_technologies/
communication_technologies_network_devices.htm
https://www.indeed.com/career-advice/career-development/types-of-servers

60

You might also like