Professional Documents
Culture Documents
ASM1 Networking TranSonPhuQui SE06202 Draf1
ASM1 Networking TranSonPhuQui SE06202 Draf1
ASM1 Networking TranSonPhuQui SE06202 Draf1
INFORMATION TECHNOLOGY
ASSIGNMENT
UNIT: NETWORKING
1
ASSIGNMENT 2 FRONT SHEET
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the con-
sequences of plagiarism. I understand that making a false declaration is a form of malpractice.
Student’s signature:
PHUQUI
Grading grid
P1 P2 P3 P4 M1 M2 D1
2
Summative Feedbacks: Resubmission Feedbacks:
3
TABLE OF CONTENT
4
CHAPTER 2: EXPLAIN NETWORKING DEVICES AND OPERATIONS (LO2).............................................................39
1.Discuss the operating principles of networking devices and server types.(P3)...............................................39
1.1. Network devices.............................................................................................................................39
1.1.1. Modem.......................................................................................................................................39
1.1.2. RJ45 Connector................................................................................................................................40
1.1.3 Router.........................................................................................................................................40
1.1.4. Switch.........................................................................................................................................41
1.1.5. Ethernet Card.............................................................................................................................41
1.1.6. Bridge..........................................................................................................................................42
1.1.7. Hub.............................................................................................................................................43
1.2. Server type.....................................................................................................................................43
2. Discuss the inter-dependence of workstation hardware with relevant networking software.(P4)...50
2.1. Workstation Hardware:..................................................................................................................51
2.2. Workstation Software:...................................................................................................................52
3. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization (M2)..................................................................................53
4. Considering a given scenario, identify the topology protocol selected for the efficient utilization of
a networking system(D1)...........................................................................................................................53
5
LIST OF TABLES AND FIGURES
6
LIST OF ACRONYMS
- MAC (Media Access Control)
- TCP/IP (Transmission Control Protocol/Internet Protocol)
- HTTP (Hypertext Transfer Protocol)
- P2P (Peer-to-peer)
- PAN (Personal Area Network)
- LAN (Local Area Network)
- WAN (Wide Area Network)
- MAN (Metropolitan Area Network)
- SAN (Storage Area Network)
- EPN (Enterprise Private Network)
- VPN (Virtual Private Network)
- Ethernet LAN (Wired connection)
- WLAN (Wireless)
- DNS (Domain name system)
- FTP (File transfer protocol)
- VM (Virtual machine)
- ASM (Advanced System Management)
7
INTRODUCTION
In today's digital age, information theft and cyber terrorism are very common. It is
widely applied in most fields such as business, science, education and non-profit
activities. Therefore, understanding network administration is very important to detect
and solve problems related to network security and connectivity.
8
CHAPTER 1: EXAMINE NETWORKING PRINCIPLES AND THEIR PROTOCOLS.
(LO1)
I. DISCUSS THE BENEFITS AND CONSTRAINTS OF DIFFERENT TYPES OF
NETWORKS AND NETWORKING STANDARDS. (P1)
1. Network definition
A network is a large or small system of many devices, such as phones, laptops,
or computers, that can be linked together and exchange data back and forth such
as emails or documents, files. These devices are connected using physical wires
such as copper cable, fiber optics, but they can also be wireless.
The simplest network is a combination of two computers connected by a cable.
This type of network is called a peer-to-peer network. There is no hierarchy in this
network; both participants have equal privileges. Each computer has access to the
data of the other device and can share resources such as disk space, applications
or peripheral devices (printers, etc.).
Today’s networks tend to be a bit more complex and don’t just consist of two
computers. Systems with more than ten participants usually use client-server
networks. In these networks, a central computer (server) provides resources to
the other participants in the network (clients).
- Links. A link is the transmission medium used for connecting the nodes and
enabling them to transmit to each other. The links can be either wired,
wireless or optical, such as an Ethernet cable or a Wi-Fi signal. The links
can be configured in different ways, both physically and logically, and the
network topology dictates the manner in which links and nodes relate to
each other.
- Communication protocols. These are the rules or protocols that all nodes
on a network must follow for information transfer. Common protocols
include the TCP/IP suite, IEEE 802, Ethernet, WLAN and cellular standards.
- Switches: Switches are network devices that connect multiple nodes within
a local area network (LAN). They receive data packets from a source node
and forward them to the appropriate destination node based on their MAC
(Media Access Control) addresses. Switches facilitate efficient data
transmission within a LAN.
10
These six components work together to enable communication and data transfer
within a network, facilitating the exchange of information between devices and
networks.
Advantages:
- Share resources
- Flexible
- Greater connectivity
- Security and data management
- Storage capacity
- Entertainment
o Disadvantages:
- Security risks
- Complexity and maintenance
- Dependency on infrastructure
- Bandwidth limitations
- Initial investment
1.1. Client-server
- A client-server network is the medium through which clients access resources
and services from a central computer, via either a local area network (LAN) or a
wide-area network (WAN), such as the Internet. A unique server called a daemon
may be employed for the sole purpose of awaiting client requests, at which point
the network connection is initiated until the client request has been fulfilled.
- Here are the advantages and disadvantages of the client-server architecture:
o Advantage:
11
- Client server has the ability to prevent network overload
- Client server ensures data integrity when something goes wrong
- Client server allows integration of modern techniques such as GIS, object-
oriented design model, ...
- Client server model, users can remotely access data, perform simple
operations to send and receive files or search for information.
o Disadvantages:
- Need to maintain and maintain the server regularly.
- The ability to secure network information is another limitation of Client
server.
- In the process of data exchange, the possibility of network information being
exposed is easy to happen.
12
The entire communication process between server and client must be based on
standard protocols. TCP/IP, SAN (IBM), ISDN, OSI, X.25, LAN-to-LAN Netbios are
standard protocols in common use today.
Client server is an effective software solution, helping to overcome the overload
of the network system. Besides, this model also overcomes the difference in the
physical structure and operating system of computer systems. Client server model
consists of 2 parts: client & server.
I.1.2 Peer-to-peer
P2P (Peer to Peer) is a network consisting of a group of devices that share and
store files together. Each participant (node) acts as an individual peer. Usually, all
nodes have the same power and perform the same tasks.
2. Network type
A computer network is a group of computers linked to each other that enables the
computer to communicate with another computer and share their resources, data,
and applications.
Some of the most popular computer network types are:
- LAN (Local Area Network)
- PAN(Personal Area Network)
- MAN (Metropolitan Area Network)
- WAN (Wide Area Network)
15
There are numerous additional kinds of computer networks, such as:
- SAN (Storage Area Network)
- EPN (Enterprise Private Network)
- VPN (Virtual Private Network)
2.1. Local area network (LAN)
- LAN (Local Area Network) is a group of computers connected to each other in
a small area such as building, office.
- LAN is used for connecting two or more personal computers through a
communication medium such as twisted pair, coaxial cable, etc.
- It is less costly as it is built with inexpensive hardware such as hubs, network
adapters, and ethernet cables.
- The data is transferred at an extremely faster rate in Local Area Network.
- Local Area Network provides higher security.
16
- Most Common type of LAN:
o Ethernet LAN (Wired connection)
o WLAN (Wireless)
2.1.1. Ethernet LAN (Wired Connection)
- Ethernet LAN uses Ethernet cables to connect the devices in a network. In this
type of connection, the network installation is wired, and the Switches and
Routers are configured using the network settings. Involves a hardwired
connection to the internet by Ethernet cables (Cat5, Cat6 and so on). Ethernet
is more stable and secure and faster than Wi-Fi. It is less accessible and
expensive.
2.1.2. WLAN (Wireless)
- Wireless LAN stands for Wireless Local Area Network. It is also called LAWN
(Local Area Wireless Network). WLAN is one in which a mobile user can
connect to a Local Area Network (LAN) through a wireless connection.
- Wireless LANs provide high speed data communication in small areas such as
building or an office. WLANs allow users to move around in a confined area
while they are still connected to the network.
Advantages :
- High speed.
- Has large bandwidth, can run online applications connected through the
network such as conferences, movie screenings...
- Low cost, simple network administration.
Disadvantages :
- The transmission is short, only works in a certain area.
- Maintenance: Common hardware problems and system errors
- Distributing malicious code: The appearance of viruses in a network based on
LAN infrastructure is very dangerous.
2.1.3. MAN (Metropolitan Area Network)
17
- A metropolitan area network is a network that covers a larger geographic area
by interconnecting a different LAN to form a larger network.
- Government agencies use MAN to connect to the citizens and private
industries.
- In MAN, various LANs are connected to each other through a telephone
exchange line.
- The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, …
- It has a higher range than Local Area Network(LAN).
Advantages :
- The MAN
installation
allows users to share
their internet
access so that
multiple users can
access high-speed
internet.
- The MAN network
is capable of
creating high-speed
connections
over a wide range of up to hundreds of Mb/s and can be expanded up to
1Gb/s for: e-commerce development, information exchange, State
administrative management, direction work, public administrative services.
- High security and more comprehensive than LAN, MAN network data is quite
safe.
- Maximizing traffic on bandwidth on telecommunications and IT network
infrastructure helps to diversify services, enhance service delivery capabilities,
and bring significant profits to service providers.
- Capable of combining with multiple networks of many organizations rather
than being managed by just one organization.
Disadvantages:
- Compared with LAN, the investment cost of setting up MAN network will be
more expensive.
- Building a MAN network system takes a lot of time and effort, which needs to
be done by a skilled technical team.
- The MAN network consists of many local area networks, so the network
management method is also more complicated and complicated.
- Bandwidth is just average.
18
- Since this network consists of many LANs, it is difficult to prevent hackers.
- As skilled network technicians and administrators are required to deploy this
network, the overall installation and management costs will increase.
2.1.4. WAN (Wide Area Network)
- A Wide Area Network is a network that extends over a large geographical
area such as states or countries.
- A Wide Area Network is quite bigger network than the LAN.
- A Wide Area Network is not limited to a single location, but it spans over a
large geographical area through a telephone line, fibre optic cable or
satellite links.
- The internet is one of the biggest WAN in the world.
- A Wide Area Network is widely used in the field of Business, government,
and education.
Advantages:
- Increase effi ciency.
- Easy of communication
- Large network cover
- Share information
over a large area.
- Messages can be sent
very quickly to anyone else
on the network.
- It supports the global
market and global business.
- Centralized IT infrastructure
- Boost your privacy.
Disadvantages:
- It is slow in speed.
- It is complected and complex.
- It is difficult to maintain the network.
- It is very costly because we have to pay every time for transferring data.
- WAN is a big and complex problem.
- Very much dependent on the third party because it is a public network.
- WAN is not secure and means not reliable.
- Security problem
- Training cost
- Maintenance problem
- Require high-performance device
19
2.1.4 Personal Area Network (PAN)
- Personal Area Network (PAN) is a computer network organized around an
individual for personal use only. The PAN is used for data sharing between
devices within 10 meters or 33 feet, various digital devices such as
smartphones, tablets, printers, computers, and other devices within an
individual user's environment. Wireless keyboards, Wireless Mice,
Smartphones, TV remotes, Wireless printers, Gaming consoles, Bluetooth,
Fire-wire, ZigBee, Wire and wireless USB are some examples of PAN.
Types of
PANs
- There are
two types
of PANs:
wireless
and wired.
- A wireless
PAN is
designed
to serve a
single
person,
SOHO or
small
workgroup. As such, limited distance, throughput, peripheral sharing and low
volume are some of the main characteristics of this type of network. A
wireless PAN functions wirelessly and is carried over a low-powered, short-
distance wireless network technology, such as Infrared Data Association
(IrDA), wireless universal serial bus (USB), Bluetooth, ultra-wideband
or Zigbee.
- Conceptually, the difference between a PAN and a wireless local area network
(LAN) is that the former tends to be centered around one person while the
latter is connected without wires and serves multiple users.
- Wired PANs. These networks provide short connections between peripherals
using wired technologies, such as USB, IEEE-1394 high-performance serial
buses or a Thunderbolt hardware interface.
Advantages of personal area network
- No extra space requires: Personal area network does not require extra wire or
space. For connecting two devices you only need to enable Bluetooth in both
devices to start sharing data among them. For example, connecting wireless
keyboard and mouse with the tablet through Bluetooth.
20
- Connect to many devices at a time: Many devices can be connected to one
device at the same time in a personal area network. You can connect one
mobile to many other mobiles or tablets to share files.
- Cost effective: No extra wires are needed in this type of network. Also, no
extra data charges are involved so PAN is an inexpensive way of
communication.
- Easy to use: It is easy to use. No advanced setup is required.
- Reliable: If you use this type of data connection within 10 meters then your
network is stable and reliable.
- Secure: This network is secured because all the devices are authorized before
data sharing. Third party injection and data hacking are not possible in PAN.
- Used in office, conference, and meetings: infrared is the technology used in
TV remotes, AC remotes, and other devices. Bluetooth, infrared and other
types of PAN are used to interconnect digital devices in offices, meetings, and
conferences.
- Synchronize data between different devices: One person can synchronize
several devices i.e. download, upload and exchange data among devices.
- Portable: A person can move devices as it is a wireless network and data
exchange is not affected. That means PAN is portable as well.
Disadvantages of personal area network
- Less distance range: Signal range is maximum 10 meters which makes
limitation for long distance sharing.
- Interfere with radio signals: As personal area network also use infrared so it
can interfere with radio signals and data can be dropped.
- Slow data transfer: Bluetooth and infrared have a slow data transfer rate as
compared to another type of networks like LAN (local area network).
- Health problem: In some cases, PAN uses microwave signals in some digital
devices which have a bad effect on the human body like brain and heart
problems may occur.
- Costly in terms of communication devices: Personal area network is used in
digital devices which are costly, so it is another disadvantage of PAN.
Examples are smartphones, PDA, laptops, and digital cameras.
- Infrared signals travel in a straight line: TV remote use infrared signals which
have a problem that they travel in straight line. So, this counts another
disadvantage of PAN.
21
3 Protocol and Standards
3.1 Protocol
A network protocol is an established set of rules that determine how data is
transmitted between different devices in the same network. Essentially, it allows
connected devices to communicate with each other, regardless of any differences in
their internal processes, structure or design. Network protocols are the reason you
can easily communicate with people all over the world, and thus play a critical role
in modern digital communications.
TCP/IP model
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of
communication protocols used to interconnect network devices on the internet.
TCP/IP is also used as a communications protocol in a private computer network
(an intranet or extranet).
22
TCP/IP functionality is divided into four layers, each of which includes specific
protocols:
The application layer provides applications with standardized data exchange. Its
protocols include HTTP, FTP, Post Office Protocol 3, Simple Mail Transfer
Protocol and Simple Network Management Protocol. At the application layer, the
payload is the actual application data.
The full form of TCP/IP is The full form of OSI is Open Systems
Transmission Control Protocol/ Interconnection.
Internet Protocol.
In 1982, the TCP/IP model became In 1984, the OSI model was
the standard language of ARPANET introduced by the International
Organisation of Standardization
(ISO).
Standard
3 Networking standards define the guidelines for information correspondences that
are required for
4 interoperability of systems administration advances and procedures. Guidelines
help in making and
5 keeping up open markets and enable various merchants to contend based on the
nature of their items
6 while being perfect with existing business sector items
7 Networking standards define the guidelines for information correspondences that
are required for
27
8 interoperability of systems administration advances and procedures. Guidelines
help in making and
9 keeping up open markets and enable various merchants to contend based on the
nature of their items
10 while being perfect with existing business sector items
- Networking standards define the rules for data communications that are
needed for interoperability of networking technologies and processes.
Standards help in creating and maintaining open markets and allow different
vendors to compete on the basis of the quality of their products while being
compatible with existing market products.
- During data communication, a number of standards may be used
simultaneously at the different layers.
Types of Standards
Standards are of two types:
- De facto − These are the standards that are followed without any formal plan
or approval by any organization. They have come into existence due to
traditions or facts. For example, HTTP had started as a de facto standard.
- De jure − These standards are the ones which have been adopted through
28
legislation by any officially recognized standards organization. Most of the
communication standards that are used today are de jure standards.
Standards Organizations
- International Standards Organization (ISO)
- International Telecommunication Union (ITU)
- Institute of Electronics and Electrical Engineers (IEEE)
- American National Standards Institute (ANSI)
- Internet Research Task Force (IETF)
- Electronic Industries Association (EIA)
Some Standard name:
- IEEE 802: a family of standards for local area networks (LAN), personal area
network (PAN), and metropolitan area networks (MAN) maintained by the
IEEE 802 LAN/MAN Standards Committee (LMSC).
- UNC: Universal Naming Convention, a naming system used in Microsoft
Windows for accessing shared network folders and printers on a local area
network. It consists of three parts: a host device name, a share name, and an
optional file path.
- Ethernet: a standard for wired LANs that uses twisted pair or fiber optic cables
to transmit data. It is defined by the IEEE 802.3 standard.
- Wi-Fi: a standard for wireless LANs that use radio waves to provide wireless
internet access. It is defined by the IEEE 802.11 standard.
- Bluetooth/Zigbee: standards for wireless PANs that enable short-range
communication between devices such as smartphones, keyboards, mice,
speakers, .... They are defined by the IEEE 802.15 standard.
29
30
II . Network topology & communication and Bandwidth requirements.(P2)
2. Topology
Network topology can be defined as physical topology and subject topology. In the
network topology diagram, devices are represented as network nodes and
connections between devices are represented as lines. Network topology types
depend on how you configure your network.
Advantages:
- Easily connect or disconnect devices from this network without affecting
other devices.
- Business is very good compared to other communications.
- The topology is easy to understand.
- Competitively connecting devices or computers is the simplest network
topology.
- Cable length must be shorter than star topology.
Disadvantages:
- Damage to the spine causes the entire network to malfunction or split in two.
- Packets are too slow.
- The bus topology is not suitable for large networks.
- It can be difficult to identify the problem when the entire network is down.
- Solving personal problems.
- The main wiring area must be disconnected.
2.1.3. Star Network
A star network is an implementation of a spoke–hub distribution paradigm in
computer networks. In a star network, every host is connected to a central hub. In
32
its simplest form, one central hub acts as a conduit to transmit messages. The star
network is one of the most common computer network topologies.
Advantages:
- Easy to install and wire.
- No disruptions to the network when connecting or removing devices.
- Easy to detect faults and to remove parts.
Disadvantages:
- Requires more cable length than a linear topology.
- If the hub, switch, or concentrator fails, nodes attached are disabled.
- More expensive than linear bus topologies because of the cost of the hubs.
2.1.4. Ring network
A ring network is a network topology in which each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node – a
ring. Data travels from node to node, with each node along the way handling every
packet. Rings can be unidirectional, with all traffic travelling either clockwise or
anticlockwise around the ring, or bidirectional
Advantages:
- The advantage of using this
network topology is the ability to
33
have fast network throughput.
- Fewer packet conflicts.
- High speed transmission.
- Tokens are used between nodes thus making the performance better than
Bus topology.
Disadvantages:
- The disadvantage is the point of failure, since a single node failure can disrupt
data transmission on the network.
- Not enough bandwidth.
- Network wires or cables used for damage.
2.1.5. Mesh network
A mesh network is a local area network topology in which the infrastructure nodes
(i.e. bridges, switches, and other infrastructure devices) connect directly,
dynamically and non-hierarchically to as many other nodes as possible and
cooperate with one another to efficiently route data to and from clients.
This lack of dependency on one node allows for every node to participate in the
relay of information. Mesh networks dynamically self-organize and self-configure,
which can reduce installation overhead. The ability to self-configure enables
dynamic distribution of workloads, particularly in the event a few nodes should fail.
This in turn contributes to fault-tolerance and
reduced maintenance costs.
Advantages:
- Adding new equipment is very easy.
- Configured to control high level.
- Easy Extensibility.
- Adding a new device does not affect the network.
- A link.
- Data connection.
Disadvantages:
- Easy to install.
- Low cost operation.
- Complex procedures.
- Energy consumption.
- High risk of further connections.
34
2.1.6. Tree network
Tree Topology is a topology which is having a tree structure in which all the
computers are connected like the branches are connected to the tree. In Computer
networks, tree topology is called a combination of a Bus and Star network topology.
The main advantages of this topology are that is very flexible and also has better
scalability. Tree network topology is considered to be the simplest topology in all
the topologies which is having only one route between any two nodes on the
network
Advantages:
- A callable topology. Leaf nodes can contain more nodes.
- Supported by several hardware and software vendors.
- Point-to-point wiring for individual segments.
- The tree topology is highly secure.
- It is used in WAN.
- The tree topology is reliable.
Disadvantages:
- This network is very difficult to configure compared to other network
topologies.
- The length of a segment is limited and the limit of the segment depends on
the type of cable used.
- Due to the presence of a large number of nodes, the network performance of
the tree topology becomes somewhat slow.
- If the computer on the first level fails, the computer on the next level also
crashes.
- Requires a large number of cables compared to star and ring topologies.
- Since data needs to travel from the central cable, this creates dense network
traffic.
- The backbone appears as the failure point of the entire network segment.
- Handling topology is quite complicated.
- Establishment costs also increase.
2.1.7. Hybrid network
A hybrid network is any network that can use more than one type of
connecting technology. For example, a home network that uses both Wi-Fi and
Ethernet cables to connect computers is a hybrid. Hybrid environments allow
organizations to keep important data on-premises. This allows them to
maintain full control over sensitive assets, while also taking full advantage of
the scalability and agility the cloud provides. However, as organizations
become more hybrid and distributed, their security needs to be able to span
across all environments.
Advantages:
- Regarding the advantages of using each of these topology types, it is highly
35
fault tolerant, which makes it reliable and flexible.
- Extensible because you can add new nodes easily.
You can design it in a way to utilize the best features of different topologies.
Disadvantages:
- The disadvantages include things like high cost and complexity of
maintenance.
- Expensive infrastructure.
- A hub connecting two different networks is very expensive. hubs differ from
traditional hubs in that they have to be smart enough to work with different
architectures.
2.1.8. Communication
Network communication defines a set of protocols that allow application programs
to communicate with each other regardless of the hardware and operating system.
Network communication allows application programs to communicate
independently of their physical network connections. The network communication
technology known as TCP/IP is named after its two main protocols: TCP Protocol and
IP Protocol.
2.1.9. Bandwidth
Network bandwidth is a measure of the maximum capacity of a wired or wireless
communication link to transmit data over a network connection over a period of
time. certain. Typically, bandwidth is expressed in terms of the number of bits,
kilobits, megabits or gigabits that can be transmitted in 1 second. Synonymous with
capacity, bandwidth describes the data transfer rate. Bandwidth is not a measure of
36
network speed (- a common misconception.
The more bandwidth a data connection has, the more data it can send and receive
at the same time.
37
3. Compare Physical Topology and Logical Topology
Hardware devices that are used to connect computers, printers, fax machines and
other electronic devices to a network are called network devices. These devices
transfer data in a fast, secure and correct way over same or different networks.
Network devices may be inter-network or intra-network
39
o RJ45 Connector
o Router
o Switch
o Ethernet Card
o Bridge
o Hub
1.1.1. Modem
1.1.2. RJ45
Connector
RJ45 is the
acronym for
Registered Jack 45. RJ45 connector is an 8-pin jack used by devices to
physically connect to Ethernet based local area networks (LANs). Ethernet
is a technology that defines protocols for establishing a LAN. The cable
used for Ethernet LANs are twisted pair ones and have RJ45 connector pins
at both ends. These pins go into the corresponding socket on devices and
connect the device to the network.
I.1.3 Router
1.1.4. Switch
41
1.1.5. Ethernet Card
42
1.1.6. Bridge
1.1.7. Hub
43
A hub is a physical layer networking device which is used to connect multiple
devices in a network. They are generally used to connect computers in a
LAN.
A hub has many ports in it. A computer which intends to be connected to the
network is plugged in to one of these ports. When a data frame arrives at a
port, it is broadcast to every other port, without considering whether it is
destined for a particular destination or not.
Advantages:
- Allows the expansion of the network.
- Allows the connection of two different types of networks.
Disadvantages:
- Costly and difficult to manage.
- Never filter data .
A server can be any type of device that shares and saves information.
Servers can both store and process information within their own system or
request it from another.
Servers began as small devices that simply transferred data to a more
functional computer then grew in size and ability to perform more complex
functions.
Web Sever:
44
An open-source web server is used for accessing the
world wide web through public domain software.
These servers connect stored information from an
internet website to your own computer. Web servers
store information for the internet that is retrieved via
"HTTP" code and sent to your web browser. This is
one of the most widely used types of servers.
Proxy server:
Proxy servers act as a bridge between a host server and a client server. A proxy
sends data from a website to your computer IP address after it passes through
the proxy's server. This practice adds a layer of security since the information
is requested then transferred from the source to the proxy server and never
directly from a client to another user. A proxy server can filter out various
harmful internet entities.
45
Virtual machine (VM):
As their name suggests, virtual machines store and connect data strictly
through virtual space. To create a virtual machine, IT teams use a hypervisor,
also known as a virtual machine monitor (VMM), which is software that can
run thousands of virtual machines through only one piece of physical
hardware. This method of server virtualization is widely used for data transfer
and storage because they are the most cost-effective type of server to run.
46
Application server:
These servers connect clients to software applications
through virtual server connections. This allows users to
bypass downloading data to their own hardware in order
to access applications. Application servers can
effectively host large amounts of application data to
many users at once, making them ideal for businesses.
File server:
A file server stores data files for multiple users. They
allow for faster data retrieval and saving or writing files
to a computer. This is a basic type of server used
commonly by organizations where lots of users need
access to files that are more conveniently and safely
47
stored on a server than a personal computer.
Database server:
Database servers function as large storage spaces that
organizations use and access to run multiple programs
to meet their needs. A database server can run
independently of any database architecture.
48
Mail server:
A mail server stores and delivers mail for clients through
email service platforms. Because mail servers are set up
to continually connect to a network, individual users can
access their email without running any systems through
their own devices.
49
Print server:
A print server connects remotely to local computers to
print through a network. These servers give businesses
the ability to use a single printer to serve an entire
department. Some printers even come with their own
built-in server ready to join a network once they're
installed in an office area.
Collaboration server:
When work needs to be shared across multiple users, a
collaboration server makes it easy to connect. These
servers allow you to share and store files, applications
and other large amounts of data.
51
Gaming server:
Large gaming networks use servers to connect users
from around the world. These servers host multi-player
online games.
52
2. Discuss the inter-dependence of workstation hardware with relevant
networking software.(P4)
System software and application software are two broad categories of software
that are commonly used in computing. System software provides the core
components that are essential for the operation of a computer system, while
application software provides software tools for specific tasks or
Web Server: A web server is used to host websites and handle web requests.
Mail Server: A mail server is used to send and receive email messages.
Database Server: A database server is used to store and manage data for applications.
DNS Server: A DNS server is used to translate domain names into IP addresses.
File Server: A file server is used to store and share files on a network.
Dedicated Server: A dedicated server is a physical server that is solely dedicated to a
single organization or user.
Virtual Private Server (VPS): A VPS is a virtual machine that is partitioned from a
physical server.
Cloud Server: A cloud server is a virtual machine that is hosted in a cloud computing
environment.
The selection of a topology protocol should be based on the specific needs and
requirements of the organization. For efficient utilization of a networking system, a
star topology may be a good choice for small to medium-sized networks.
56
CONCLUSION
Network security is an important field that is increasingly gaining attention as the
internet expands. The security threats and internet protocol were analyzed to
determine the necessary security technology. The security technology is mostly
57
software based, but many common hardware devices are used. The current
development in network security is not very impressive.
The embedded security of the new internet protocol IPv6 may provide many benefits
to internet users. Although some security issues were observed, the IPv6 internet
protocol seems to evade many of the current popular attacks. Combined use of IPv6
and security tools such as firewalls, intrusion detection, and authentication
mechanisms will prove effective in guarding intellectual property for the near future.
The network security field may have to evolve more rapidly to deal with the threats
further in the future.
58
REFERENCES
https://www.researchgate.net/publication/323511648_INTRODUCTION_TO_NETWORKING
https://www.researchgate.net/figure/Database-assisted-TVWS-network-
architecture_fig5_309696523
https://www.open.edu/openlearn/science-maths-technology/an-introduction-web-
applications-architecture/content-section-1.1
https://www.researchgate.net/figure/Multiple-OPC-clients-connected-to-OPC-
server_fig5_259258028
https://coin98.net/p2p-la-gi
https://www.geeksforgeeks.org/difference-between-client-server-and-peer-to-peer-network/
https://www.javatpoint.com/wireless-lan-introduction
https://www.javatpoint.com/types-of-computer-network
https://hoidap247.com/cau-hoi/316539
https://yandex.com/images/search?img_url=https%3A%2F%2Fi.pinimg.com%2F736x%2F7d
%2F49%2Fc3%2F7d49c33a100d7c7a09121eadd765c54e.jpg&lr=10543&pos=7&rpt=simage&text
=standard%20network
https://yandex.com/images/search?img_url=https%3A%2F%2Fimage2.slideserve.com
%2F3737859%2Fslide8-l.jpg&lr=10543&p=1&pos=15&rpt=simage&text=%EF%81%B6%20TCP
%2FIP%20model
https://en.wikipedia.org/wiki/OSI_model
https://www.studytonight.com/computer-networks/complete-osi-model
https://www.geeksforgeeks.org/layers-of-osi-model/
https://byjus.com/free-ias-prep/difference-between-tcp-ip-and-osi-model/#:~:text=The%20TCP
%2FIP%20or%20the,a%20network%20can%20be%20described.
https://www.nibusinessinfo.co.uk/content/personal-area-networks#:~:text=Personal%20area
%20network%20%2D%20advantages%20and,but%20have%20slow%20data%20rates.
https://www.itrelease.com/2018/07/advantages-and-disadvantages-of-personal-area-network-
pan/
https://yandex.com/images/search?text=Differences%20between%20PAN%2C%20LAN%2C
%20MAN%20and%20WAN
https://www.comptia.org/content/guides/what-is-a-network-protocol#:~:text=A%20network
%20protocol%20is%20an,internal%20processes%2C%20structure%20or%20design.
https://www.geeksforgeeks.org/tcp-ip-model/
https://www.techtarget.com/searchnetworking/definition/TCP-IP
https://www.shiksha.com/online-courses/wan-wide-area-network-certification?q=WAN
%20(Wide%20Area%20Network)&fftid=hamburger
https://www.shiksha.com/online-courses/articles/metropolitan-area-network-man-
advantages-and-disadvantages/
https://www.cloudflare.com/learning/network-layer/what-is-a-wan/
https://www.ecstuff4u.com/2018/05/advantages-and-disadvantages-of-wide.html
https://www.techtarget.com/searchmobilecomputing/definition/personal-area-network
https://www.cloudflare.com/learning/network-layer/what-is-a-personal-area-network/
#:~:text=Network%20layer-,What%20is%20a%20personal%20area%20network%20(PAN)
%3F,Bluetooth%20earpiece%20and%20a%20smartphone.
https://studylib.net/doc/25646121/networking-assignment---01
https://www.studocu.com/row/document/esoft-metro-campus/higher-national-diploma/
networking-assignment/11737715
https://www.studocu.com/vn/document/truong-dai-hoc-fpt/computer-architecture/
59
assignment-1-networking/36480144
https://en.wikipedia.org/wiki/Network_topology
https://www.tutorialspoint.com/what-are-the-differences-between-physical-and-logical-
topology#:~:text=A%20Physical%20topology%20explains%20about,connected%20physically
%20inside%20a%20network.
https://www.techtarget.com/searchnetworking/definition/bus-network
https://thegioimang.vn/dien-dan/threads/%C6%AFu-v%C3%A0-nh%C6%B0%E1%BB%A3c-
%C4%91i%E1%BB%83m-c%E1%BB%A7a-c%E1%BA%A5u-tr%C3%BAc-m%E1%BA%A1ng-v
%C3%B2ng-ring.7325/
https://en.wikipedia.org/wiki/Ring_network
https://en.wikipedia.org/wiki/Mesh_networking
https://www.smartcitystartups.com/mesh-network-la-gi-uu-nhuoc-diem-va-ung-dung-cua-no/
https://www.anses.net.in/index.php/network-and-data-security/conclusion/
https://www.geeksforgeeks.org/advantages-and-disadvantages-of-tree-topology/
https://www.fortinet.com/blog/industry-trends/what-are-hybrid-networks-how-to-secure-
them#:~:text=A%20hybrid%20network%20is%20any,keep%20important%20data%20on
%2Dpremises.
https://www.automate.org/tech-papers/what-is-commutation
https://www.tutorialspoint.com/what-are-hub-and-switch-in-computer-network
https://www.tutorialspoint.com/communication_technologies/
communication_technologies_network_devices.htm
https://www.indeed.com/career-advice/career-development/types-of-servers
60