Tải bản đầy đủ (.docx) (50 trang)

1619 networking assignment 1 fpt greenwich (Merit)

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.36 MB, 50 trang )

ASSIGNMENT 1 FRONT SHEET
Qualification

BTEC Level 5 HND Diploma in Computing

Unit number and title

Unit 2: Networking Infrastructure

Submission date

Date Received 1st submission

Re-submission Date

Date Received 2nd submission

Student Name

Student ID

Class

Assessor name

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid


P1

P2

P3

P4

M1

M2

D1


❒ Summative Feedback:

Grade:
Lecturer Signature:

❒ Resubmission Feedback:

Assessor Signature:

Date:


Table of Contents



I.
Network
1. Network definiton
Ξ First of all, network also known as computer networking, which can be understand as a group of

computers utilizing a principles of general communication protocols over digital connections for the
intention of sharing resources located upon or accommodated by network nodes. The operation of
network transporting and exchanging data between nodes over a shared medium in an information
system, depend on material wireless, optical and wired radio frequency methods which may be regulated
in a variety of network frames (Anon., n.d.).

Figure 1 : Illustrated image of network

Ξ Advantages of networking: File sharing – you'll easily share data between different users, or access it

remotely if you keep it on other connected devices. Resource sharing – using network-connected peripheral
devices like printers, scanners and copiers, or sharing software between multiple users, saves money.
Sharing one internet connection – it's cost-efficient and might help protect your systems if you properly
secure the network. Increasing storage capacity – you'll be able to access files and multimedia, like images
and music, which you store remotely on other machines or network-attached storage devices (Anon., n.d.).

Types of Network

2.


LAN


LAN(Local Area Network) is a network which is confined to a relatively tiny area. It is commonly limited to a

geographic area collection of devices connected together in one physical location, such as a building,
office, or home (Anon., n.d.).
Objects connected to a network are broadly categorized as servers or workstations. Servers are practically
utilized by humans indirectly, but rather run continuously to provide "services" to the other computers (and
their users) on the computer networking.
Available services can consist printing and
faxing,hosting of software, file storage and sharing,
messaging, data storage and retrieval, complete
access control (security) for the network's resources,
and many others(Anon., n.d.).
Advantages and disadvantages:

¥

¥

¥

¥

Benefits
Drawbacks
Figure 2:LAN image
 Resource Sharing
 High Setup Cost
 Software ApplicationSharing: single licensed  Privacy Violations: The LAN administrators are
software can be used by any people
able to overview and check personal data files of
 Easy and Cheap Communication
each or every LAN user.

 Data Security Threat
 Centralized Data
 LAN Maintenance Job: software installations,
 Data Security
program faults or hardware failures or cable
 Internet Sharing: LAN provides the facility for
disturbances in Local Area Network.
sharing a single networking connection among all

Covers Limited Area
the LAN devices.



MAN
Definition: MAN(Metropolitan area network) is a high-speed
model which commonly spans a city or a large campus and
network coverage than LAN. It is formed by the connection
LANs mutually through cables, transmission, …. It perhaps
public utilize networking infrastructure in different regions
2017).

¥

network
has
wider
from multiple
also refer to
(Thakur,



¥

¥

Characteristic:
• It has data rates are moderate to high.
• the average bandwidth but the range of connections is relatively large.
• A MAN generally is refered as a private data computer networking uses for single organization in
several buildings or some organizations interconnected in the similar geographic
neighborhood(Thakur, 2017).
Benefits and drawbacks:
Benefits

Drawbacks

Sending local emails o The installation cost is
fast and free on MAN.
higher than LAN.
o MAN’s has a high- o The way for managing
security level
network
is
more
o Able to share internet
complicated, Difficult To
Manage.
conection.
Each

internet sharing has the o Need More wires.
same
high-speed
connection
o



Figure 3: MAN IMAGE

WAN
¥ Definition: WAN also known as wide area network, is a large networking information which is not tied to a
sole location, which combines between LAN and MAN network connected together through satellite, fiber
optic cable or wire cable (Vendors, 2012).
• WANs can facilitate communication, infomation sharing and much more between devices from
around the world via a WAN provider.
• WAN not only be connected to a private network, but it also can create big connections, which
covers an total country or the global. The protocol utilized mainly in the WAN is TCP / IP protocol.


¥

The connecting WAN networking path is usually available by changing based on each installation
place.
(Vendors, 2012)
Benefits and drawbacks:
Advantages
o The Wan controls
over user access.
o The network security

is quite good.
o Wan can store and
share large tons of
information.
o Sharing network can
be applied by
employees and
customers.

Disadvantages
o Initial Investment costs
are more expensive
than MAN and LAN.
o It is hard to maintain the
network. It requests
proficient technicians
and network
administrators.
o Lower security compare
to LAN and MAN due to
wider coverage and use
of more technologies.
o Quite many errors and
trouble.
Figure 4: WAN illustration



P2P Network
¥ A peer-to-peer (P2P) network is a distributed communication models between two peers or nodes, which

helps each user is capable to share any types of datas on any peer over this network without the
requirement to a central server. Unlike the server-client model, once a P2P network is established via
Internet, a central server can be used to index datas, or establishing a shared network where the
distribution of files is split between all peers in the network that are storing a given file.. This also means


¥

that the network, once established, user can utilized it to share and store files without the help of an
intermediary.
Benefits and drawbacks
Benefits

Drawbacks

• Operating without
network operating system
required.
• No requirement for an
expensive server
workstations are used to
access files.

• Since each computer is
able to be accessed by
others, it can slow down
the user's performance.

• There is no need for highskill staff like a network
technician because each

user can sets their own
permissions
for the files they are willing
to share

• Files and resources are
disorganized centrally in a
shared area. They are
stored on individual
computers and can be
difficult to identify if the

• Datas cannot be centrally
backed up.

Figure 5: P2P network

3. Protocols and Standard
 Protocols

A network protocol is an established set of rules that decide how data is transmitted between devices in the
same network. Primally, it permits connected devices to communicate with other, no matter what any
differences in their internal processes, structure or design. Network protocols is answer for question why you




can easily communicate with people all through the world, and thus play a extremely vital role in modern
digital communications (Anon., 2018).
¥ TCP/IP protocol: is a set of communication protocols that implement the protocol stack on which the

Internet and most commercial computer networks run. This set of protocols is named after its two main
protocols, TCP and IP. Like many other protocol suites, the TCP / IP protocol suite can be thought of as
a set of layers, each solving a set of problems related to data transmission, and providing layer
protocols. a service's upper level is clearly defined based on the use of the lower layer services.
Logically, the upper layers are closer to the user and work with more abstract data or forms that can
eventually be physically transmitted (Fisher, 2019).
¥ DNS protocol: is a system that allows converting easy-to-remember human domain names to their
respective IP addresses. DNS supports to associate with network equipment for the intentions of
locating and addressing Internet devices. The domain link resolution system shares the responsibility of
assigning domain names and mapping names to IP addresses by specifying the authoritative servers for
each domain name. Servers with powered names are assigned to be responsible for their own domain
name, and in turn can assign their own exclusive hostnames to subdomains.
¥ ICMP protocol: also know as Internet Control Message Protocol is a protocol of the Internet Protocol
packet. This protocol commomly be used by network devices like routers to transmit error messages
indicating whether or not a service, a host or router address exists. ICMP can also be used to fore query
messages. Unlike other protocols such as TCP and UDP, ICMP in that it is not generally used for
transmitting data between systems, nor is it frequently used by end-user network applications (Anon.,
2020).
¥ DHCP: is not only a client server application,but it also is a network management protocol. Whenever
any device connects to a network, client of DHCP requires an IP address and other network
configuration data from a DHCP server. The client and server communicate utilizing the DHCP protocol
to provive the end user device accordingly (Anon., 2020).
Standard
Network standards define ground rules for data transmitions that are set by commissions in order to
hardware is compatible computers and assures interoperability. This is done to ensure that backwards
compatibility and compatibility. It is essensial for having standards since standards support to make and
maintain opening markets and permit different vendors to compete on the basis of the quality of their
products if they are compatible to existing market products (Perry, 2000).



International






standard organizations :
International
Standards
Organization (ISO):
The
International
Organization
for
Standardization
(ISO) is understood as an international nongovernmental
organization created of national standards bodies; it expands and brings out a large range of
proprietary, industrial, and commercial standards and is comprised of representatives from various
national standards organizations (KENTON, 2020).
International Telecommunication Union (ITU): International Telecommunication Union (ITU), also
know as specialized branch of the United Nations, which was made up to promote international
collaboration in most formations of telecommunication. Its activities consist maintaining ordinal in the
allocation of radio frequencies, setting standards on technical and operational matters, and aiding
countries in development telecommunication systems (Britannica, n.d.).
Institute of Electronics and Electrical Engineers (IEEE): The Institute of Electrical and Electronics
Engineers (IEEE) - the world's biggest technical association with quite 350,000 members in 150
countries, which is a non-profit organization that's dedicated to advancing the speculation and
application of electrical and electronics engineering and engineering (Anon., 2019).




American National Standards Institute (ANSI): The United States standards organization that sets up
procedures for the development and organized matter of voluntary American national standards.



Internet Research Task Force (IRTF): The Internet Research Task Force is chartered by the
ArchitectureBoard to think about long-term Internet issues from a theoretical point of view. it's
Research Groups, the same as Internet Engineering Task Force Working Groups, which are each


tasked to debate different research topics. Multi-cast audio/video conferencing and privacy enhanced
mail are samples of IRTF output.


Electronic Industries Association (EIA): Electronic Industries Association is that the abbreviation
Electronic Industries Association. EIA is that the us national association of electronic manufacturers.
EIA has developed various industry standards for the interference between processing machines and
digital communication equipment (Anon., 2012).

Names of the standards used in networking:
 10 Gigabit Ethernet – 10GbE(IEEE 802.3ae)
 IEEE 802 standards
 Gigabit Ethernet
 Gigabit Wi-Fi
 Ethernet
(Standardization, n.d.)
II.


Network topology & communication and Bandwidth requirements
1) Network Topology

The configuration, or topology, is schematic description of a network is an arrangement to concluding its
performance. Network topology also is an application of shema theory including the physical or logical
define of how nodes are built up to relate to each device (Kurt, 2019).




Physical network topology: is the set of the different components of the network and connectors
commomly represent physical network cables and nodes typically represent physical network
devices. It refers to the pratical connections to arrange the network. Setup, maintenance, and
provisioning tasks require insight into the physical network (Contributor, August 15, 2019).

Figure 6: Physical network topology




Logical network topology: The logical network topology illustrates a higher-level of how the
network is built up, consisting such nodes connect to other and in which ways, as well as how
transmitting nodes via the network. Logical network topology includes any virtual and cloud
resources (Contributor, August 15, 2019).

Figure 7: Logical network topology

The difference between physical topology and logical topology:

Figure 8: Difference physical and logical topology



2) Some popular topologies
¥ Star Topology: There is a cable on each end points that have a determinator. Star is made by

connecting each node to a main network device like a switch , hub or etc. Cabling and installation of
star topology is easy. It is laid out all nodes and directly connected to one central hub through twistedpair, or fiber cable.. (Ehud Hrushovski, Franỗois Loeser, 2016).

Figure 9: Star Topology

Benefits and flaws of star:
Benefits
• Allow to conveniently manage entire network from a
single location.
• Independently connected to the central hub.
• continue functioning unaffected
ã Stable and secure layouts

Ơ

Flaws
ã If the central hub goes down, the rest of the network
can’t function.
• Have some issues.
• The overall bandwidth and performance of the
network are also limited

Bus Topology: Bus topology is one of the first topology type of the ethernet. Connecting to a PC or
interface to a linear bus that is easy, this topology requests less cable than star topology but if the chief
cable is broke, all networking will down too. Bus topology needs terminal cable end points.

Troubleshoot is difficult because of all network is down if main cable is borke. It is not suggest on large
scale (Contributor, August 15, 2019).


Benefits and drawbacks of bus topology:
Benefits
• Cost-effective choice is smaller.
• The layout is simple.
• Allowing all devices to be connected via a single
coaxial or RJ45 cable.
• Easily added to the network by joining additional
cables.

Ơ

Drawbacks
ã Vulnerable.
ã The cable experiences a failure, the whole
network goes down.
• Time-consuming and expensive to restore.
• every additional node will slow transmission
speeds

Ring Topology: is created by connecting each network device in a circle(like a ring), The data can
travel via the ring network in either one direction or both directions, with each device having exactly two
neighbors. (Contributor, August 15, 2019)

Figure 10: Ring topology.

Benefits


Drawbacks






¥

Packets arriving correctly and without data
loss.
Permitted to send data at a time.
Greatly reduces the risk of packet collisions.
Inexpensive.





Still vulnerable.
Flow of data transmission moves unidirectionally
between nodes.
Scheduling downtime network can be inconvenient and
costly.

Hybrid topology: Hybrid topology a type of network topology which also is a combination of two or
more network topologies. It also is know as a Special Topology. This topology is useful for corporate
offices to link their internal LANs together while adding external networks through Wide Area Networks
(WANs) (Anon., 2011).


Benefits
Drawbacks
Figure 11:Hybrid
topology







Offers the easiest method for error detecting and
troubleshooting.




The design of hybrid topology is complex
The design of hybrid topology is complex

Highly effective and flexible networking topology

It is scalable so you can increase your network size



Ipv4: IPv4 also know as Internet Protocol Version 4 which is a 32-bit IP address that is formatted as four
three-digit numbers separated by a dot. For instance, 69.69.69.69 This permit any digit from 0 to 255 which
presumably contributes 4 billion unique directions. Since computing devices are about to be more affordable,

it had lead to it becoming more generall day by day office and companies (Anon., 2020).


¥

IPv4 is set in thelimitation by digit of unique addresses it can regulate, it means that is prospect,
running out of unique addresses is possible in future. To be able to solve this major problem, using a
new strategy of unique address as a replacement to the IPv4 system. This is called IPv6 (James Pyles,
Jeffrey L. Carrell, Ed Tittel, 2016).

Ơ

Disadvantages and advantages

Benefits

Drawbacks

ã
ã
ã
ã
ã
ã

Encryption
Flexibility
Topology Support
System Support
Device Connectivity is good

Great measures to deliver data packets right to
its host







Ipv6: Ipv6 stands for Internet Protocol Version 6 - the newest generation of the IP protocol, which is greatly
inhanced the digits of unique IP addresses that both computers and devices associated to the assigning of
internet. For all actually intentions, the quantity of addresses is not limited (James Pyles, Jeffrey L. Carrell,
Ed Tittel, 2016).

Configurations of DHCP is complex
Threats imposed
Considered to be inefficient.


¥

¥

IPV6 is based on a 128-bit addressing system. Thus, creating about 269 unique IP addresses using the
IPV6 address scheme is possible. Writing IPV6 as a group of 8 hexadecimal digits separated with a
colon. 1001:ab8:0:1244:0:527:8:1 is an illustration of IPV6 address. When assigning IP addresses to the
computers or any other network devices, are converted to computer-readable binary values with these
human-friendly decimal values (James Pyles, Jeffrey L. Carrell, Ed Tittel, 2016).
Benefits and drawbacks of Ipv6 (Anon., 2014):


Pros
• The expansion is limit of routing tables and makes
them more efficient.
• Multicast addressing simplifies the delivery process.
• Effictive data flow.
• Avoids triangular routing.



Cons
• IP addresses are very long, which include letters
and numbers.
• Complexity in the Network Topology Drawings.
• New IP addresses is assigned manually that quite
complicated task.

FTP: FTP is File Transfer Protocol and using it to transferr files among a customer computer and a server.
This protocol uses the client-server network while communicating between the server and the client. FTP
also uses two ports, one for trasmitting data and the other port to server for listening income customers. FTP
are able to be useful for a user because this permits them to simply upload and download files remotely via
the connection that farther deletes the needs for the user to utilize a removable media to upgrate the files on
server (Noite.pl, n.d.).


¥



Basing on the configuration, this also intents that it may also be remotely accessed from different
geography areas. FTP is generallly used while someone using a office as a hosting server caterer

almost times to not physical access the user (Noite.pl, n.d.).

HTTP: HTTP - HyperText Transfer Protocol, which is employed for transfering digital media for illustrate
HTML. This protocol is employed when transmitting requires from a browser to a internet server. This kind of
protocol is statusless which is defined as not recording any data (BBC, n.d. 2) .

This kind of transmission protocol has been superseded by HTTPS which is a secure version of the
HTTP protocol (BBC, n.d. 2) . HTTPS is a secure version of HTTP which utilises encryption methods to
ensure any data transmitted or received by the user cannot be intercepted.

3) Compare common networking principles and how protocols enable the effectiveness of

networked systems


IEE 802.3

10Base-T: 10Base-T is that Ethernet standard established by the The Institute of Electrical and Electronics
Engineers (Anon., n.d.). Designing 10Base-T as “10BASE-T is that the IEEE standard that defines the need for
sending information at 10 Mbps on unshielded twisted-pair cabling”. This means that when employing a 10Base-T
wire for connecting devices together will only allow a transmission speed of 10 Mbps (Hanna, 2019).

100Base-TX: 100Base-TX may be a modified version of 100Base-T which helps the transmitting speeds of
100 Mbps among devices employing two pairs of type 5 cables when the 100Base-TX uses the Catalogue 6 cables
(Anon., n.d.).

1000Base-T: 1000Base-T is an upgraded standard by the IEE which is identified by as “sending information
at 1000 Mbps on unshielded twisted-pair cabling”. This kind of Ethernet which is an upgraded version of 10Base-T
but allows for faster transmission speeds of 1 gigabit. This also utilizes Category 5 cables within which will enable it
to own the 1 gigabit transmission speed (Hanna, 2019).



10GBase-T: 10GBase-T is also known as a standard for ethernet which helps the capability to take 10
gigabits per second transmitting speeds up to 100 meters (Froehlich, 2017). This is farther expensive which made
by the storage of Category 6 Augmented cables that enable those speeds which utilized for distances through 100
meters. This kind of IEEE. Although this one was first released in 2006 and it is still not generall for the standard
household. This is a reason why a lot of ISPs and consuming level hardware do not help those kinds of speeds.
However, using this by large organisations to conduct large-scale file transmitting and receiving. This is also
generall within data centrals reliable on maintaining high transmissions speeds (Hanna, 2019).

IEEE 802.11: IEEE 802.11 is the working standards which built for Wireless Local Area Networks made by the
Institute of Electrical and Electronics Engineers (IEEE). It also sets specifications for the Media Access Control
(MAC) and the Physical Layer (PHY). One of the first version of these standards was established in 1997 and
upgraded like wireless technology advances (Hiertz, n.d.).

Some of the various protocols that are set by the IEEE

802.11a: These iterations of the 802.11a wireless standard sough to inhance on the original network speed
of 1-2Mbps transmitting (Hanna, 2019). This was updated to 54Mbps and that also used the 5GHz band, standard
802.11 utilised 2.4GHz. This also created to ensure. It would be correspond with other iterations of the wireless
standard such as the 802.11b and 802.11g (Sebastian Max; Rui Zhao; Dee Denteneer; Lars Berlemann, 2021).


802.11g: This type of wireless standard is the most commonly used one today. This further expands on the
802.11b wireless standard by allowing transmission speeds up to 54Mbps and distances up to 150 feet (45.72
Meters). It also still uses the 2.4GHz range which allows it to be compatible with the 802.11b wireless
standard(Mitchell, 2018).
802.11n: This wireless standard was designed to be an improvement over the 802.11g wireless standard.
This utilises MIMO technology, which stands for Multiple Input, Multiple Output. This allows the access point to use
more than one antenna which can improve speed, range, and overall efficiency (Sebastian Max; Rui Zhao; Dee

Denteneer; Lars Berlemann, 2021).

OSI MODEL

OSI stands for Open Systems Interconnection. According to (CloudFlare, n.d.) the OSI provides “Standardization
which enables diverse communication systems to communicate using standard protocols.” It has 7 layer with
different fuction.


Layer 7 also known as the Application layer. This layer interacts with the user and is used to establish the
communication. This layer gains this communication from software applications which rely on protocols for
communicating data and also receiving data (Anon., n.d.).













Layer 6 also known as the Presentation layer. This layer specialises in translation of data so that the
different layers can use it. This means that any information passed from the application layer will need to be
translated so it can be readable by another device. This also works in the opposite direction as data from
another device will not be readable by the application layer(Cloudflare, n.d.).
Layer 5 also known as the Session layer. This layer has the primary focus of adjust the communication

among the devices that using for the transmitting and receiving of data. This layer also has the capability to
establish and terminate the communication. This layer is neccesary as it makes sure that communication
between the two devices is released long enough for the data to be fully transmitted without any
errors(Cloudflare, n.d.).
Layer 4 also known as the Transport layer. This layer is also responsible for the data communication for the
two devices. This contains flow and error control which will identify the transmission speed required so that it
does not cause issues for the recipient if they have a lower speed than the sender(Cloudflare, n.d.).
Layer 3, also known as the Network layer. This layer is designed to transfer the data from one network to
another(Cloudflare, n.d.).
Layer 2, also known as the Data Link layer, refers to the section which specialises in the transmitting and
receiving of data between two devices that are connected within the same network. This takes the packets
received from layer three that do not contain information in relation to which local machine requested the
data(Cloudflare, n.d.).
Layer1, also known as the physical layer, refers to the use of physical equipment that is required for data to
be transferred successfully. This is typically done through mediums such as an Ethernet cable. During this
layer, the data gets converted into bits which consist of 1s and 0s. When communicating between devices,
these must be correctly synchronised to understand the data conversion(Cloudflare, n.d.).

The protocols enable networked systems to connect efficiently using these principles
The way having a protocol which is identified and standardised will supprot various systems to execute
together, i.e. they also are able to get inter-operable. This also can be understood that this do not require to procure
all equipment from one vendor as was the case a few decades ago. Vendor "lock-in" is now alleviated.
Protocols are opened to permit various systems to communicate and this is an enabler for effective of
networking systems.


4) communication and bandwidth


Communication:

Communication is set of protocols, which is in charge of sending and
receiving information from sending and receiving sources via
transmission protocols.
Ơ Rules:
ã An identified sender and receiver.
ã Agreed
upon method of communicating(face-to-face,
telephone, letter, photograph).
• Common language and grammar.
• Speed and timing of delivery.
• Confirmation or acknowledgment requirements.
(Anon., n.d.)
Figure 12: Network communication.
Ơ
Pr
otocols used in network communications also define:
ã Message encoding: Encoding between hosts must be in appropriate format for the medium;
Messages are first converted into bits by the sending host.
• Message delivery options: The destination host receives and decodes the signals in order to
interpret the message; Putting the letter into the addressed envelope is called encapsulation
• Message Formatting and Encapsulation: Agreed format for letters and addressing letters; A frame
acts like an envelope providing destination address and source address
• Message Timing: Access Method; Flow Control; Response Timeout
• Message Size: It is also known as segmenting.. Break long messages into smaller parts or
sentences, encapsulating each segment in a separate frame with the address information as well
as sending them through the world.
¥ These rules are important for network communication since these rules affect the success of network
communication between individuals. For data networks, the same basic criteria be utilized to judge
success. Rules contribute a big support to boost the quality of the pathway between the sender and the
recipient. Decrease time for successful network communication.Avoid network be dropped or go down.

Rules exits to ensure the network are reliability.



Bandwidth:


×