Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (9.12 MB, 50 trang )
<span class="text_page_counter">Trang 1</span><div class="page_container" data-page="1">
<b>Submission date 16/06/2023<sup>Date received (1st </sup></b>
<b>Re-submission date<sup>Date received (2nd </sup>submission)</b>
<b>Student declaration</b>
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice.
<b>Student’s signature: BUI TAN SANGGrading grid</b>
</div><span class="text_page_counter">Trang 3</span><div class="page_container" data-page="3"><b>Grade:Assessor Signature:Date:Internal Verifier’s Comments:</b>
<b>Signature & Date:</b>
3
</div><span class="text_page_counter">Trang 4</span><div class="page_container" data-page="4"><b>CHAPTER 1: EXAMINE NETWORKIMH PRINCIPLES AND THEIR PROTOCOLS (LO1)...10</b>
1. Discuss the benefits and constraints of different network types and standards (P1)...10
1.1. Define network...10
1.1.1. Client sever... 10
1.1.2. Peer to peer... 11
1.2. Network type... 12
1.2.1. LAN (Local area network)...12
1.2.2. MAN (Metropolitan area network)...14
1.2.3. WAN (Wide area network)... 15
1.2.4. PAN (Personal area network)... 15
1.2.5. CAN (Campus network)...16
1.2.6. CDN (Content delivery network)...17
1.2.7. VPN (Virtual private network)...18
1.3. Protocol and Standards...19
1.3.1. Network protocol definition...19
1.3.2. Network standards definition...23
2. Network topology & communication and Bandwidth requirements (P2)...27
2.1. Network topology definition...27
2.2. Discuss the Impact of topology...29
2.2.1. Definition: Physical & Logical Topology...29
2.2.2. Examples of topology with diagrams (Bus, Ring, Star, Tree, Hybrid, Mesh)...30
2.3. Communication and Bandwidth...33
2.3.1. Define commutations...33
</div><span class="text_page_counter">Trang 5</span><div class="page_container" data-page="5">3. Compare common networking principles and how protocols enable the effectiveness of networked
systems. (M1)... 34
3.1. Comparison of Network Principles and Explanation of Network Protocols:...34
3.2. Comparison of Physical Topologies and Logical Topologies:...35
<b>CHAPTER 2: EXPLAIN NETWORKING DEVICES AND OPERATIONS (LO2)...36</b>
1. Discuss the operating principles of networking devices and server types (P3)...36
</div><span class="text_page_counter">Trang 6</span><div class="page_container" data-page="6">Figure 1 : Network...10
Figure 2 : Client sever...10
Figure 3 : Peer to peer...11
Figure 4 : Network type...12
Figure 5 : LAN (Local area network)...13
Figure 6 : Virtual LANs...14
Figure 7 : MAN (Metropolitan area network)...14
Figure 8 : WAN (Wide area network)...15
Figure 9 : PAN (Personal area network)...16
Figure 10 : CAN (Campus network)...17
Figure 11 : CDN (Content delivery network)...17
Figure 12 : VPN (Virtual private network)...18
Figure 13 : Network protocol...19
Figure 14 : TCP/IP(Transmission Control Protocol/ Internet Protocol)...20
Figure 15 : HTTP(Hyper Text Transfer Protocol)...20
Figure 16 : DNS (Domain Name System)...21
Figure 17 : ICMP (Internet Control Message Protocol)...22
Figure 18 : Network Standards...23
Figure 19 : 1.International Organization for Standardization (ISO)...24
Figure 20 : International Electrotechnical Commission (IEC)...24
Figure 21 : Institute of Electrical and Electronics Engineers (IEEE)...25
Figure 22 : American National Standards Institute (ANSI)...25
Figure 23 : European Committee for Standardization (CEN)...25
Figure 24 : British Standards Institution (BSI)...26
Figure 25 : International Telecommunication Union (ITU)...26
Figure 26 : Internet Engineering Task Force (IETF)s...26
Figure 27 : Bus Topology...27
Figure 28 : Star Topology...27
Figure 29 : Ring Topology...28
Figure 30 : Mesh Topology...28
Figure 31 : Tree Topology...29
Figure 32 : Hybrid Topology...29
Figure 33 : Physical Topology...30
Figure 34 : Logical Topology...30
Figure 35 : Point-to-Point...31
Figure 36 : Bus topology...31
Figure 37 : Star topology...31
Figure 38 : Ring topology...32
</div><span class="text_page_counter">Trang 7</span><div class="page_container" data-page="7">Figure 49 : Web server...39
Figure 50 : File server...39
Figure 51 : Database server...40
Figure 52 : DNS server...41
Figure 53 : DHCP server...41
Figure 54 : Workstation...42
Figure 55 : Central Processing Unit (CPU)...43
Figure 56 : Memory (RAM)...43
Figure 57 : Storage Devices...44
Figure 58 : Motherboard...44
Figure 59 : Graphics Processing Unit (GPU)...45
Figure 60 : Networking Devices...45
Figure 61 : Power Supply Unit (PSU)...46
Figure 62 : Cooling Systems...46
Figure 63 : System Software...47
Figure 64 : Application Software...47
7
</div><span class="text_page_counter">Trang 8</span><div class="page_container" data-page="8">HTTP Hyper Text Transfer Protocol
TCP/IP Transmission Control Protocol / Internet Protocol
ICMP Internet Control Message Protocol
DHCP Dynamic Host Configuration Protocol
</div><span class="text_page_counter">Trang 9</span><div class="page_container" data-page="9">The network has grown to be a crucial component of living in the 4.0 era. It can be seen practically everywhere, including in business, education, and health. To be able to solve difficulties in life, we therefore need to be knowledgeable about networks.
Basic components of networking include network structure, protocols, standards, and communication. Additionally, we are familiar with computer, server, and network device components.
<b>Here are the items that I explored in this report:</b>
<b>Chapter1: Examine networking principles and their protocols.(LO1)</b>
Discuss the benefits and constraints of different network types and standards. (P1)
Explain the impact of network topology, communication and bandwidth requirements. (P2)
Compare common networking principles and how protocols enable the effectiveness of networked systems. (M1)
<b>Chapter2: Explain networking devices and operations.(LO2) </b>
Discuss the operating principles of networking devices and server types. (P3) Discuss the inter-dependence of workstation hardware with relevant networking software. (P4)
Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. (M2)
9
</div><span class="text_page_counter">Trang 10</span><div class="page_container" data-page="10"><b>1. Discuss the benefits and constraints of different network types and standards (P1)</b>
<b>1.1. Define network</b>
A network is made up of a number of interconnected hardware components, including computers, servers, switches, routers, and other gear, that are connected to one another to allow for communication and data sharing. It might be as tiny as a local network inside a house or office, or it can cover great distances among various places in the world.
Figure 1 : Network
<b>1.1.1. Client sever</b>
The client-server computer network concept consists of the client and server, with the server handling resource storage, service application installation, and client request processing. The client is responsible for sending requests, while electronic equipment and computers are clients.
Figure 2 : Client sever
</div><span class="text_page_counter">Trang 11</span><div class="page_container" data-page="11">networking concept, where the server acts as the boss, while the client acts as the slave.
<b>The client/server model: A server/client form allows for efficient communication and </b>
processing of requests, enabling server-to-server communication for both simple and sophisticated tasks.
• Network overload can be avoided by client servers.
• When something goes wrong, the client-server system ensures data integrity.• simple network growth
• To function, only the same communication format—not the same platform—must be shared.
• Client-server technology enables the integration of cutting-edge methods like GIS, object-oriented design paradigm, and more.
• Users can access data remotely using the client-server approach, send and receive files easily, and conduct informational searches.
<b>•</b> Regular server upkeep and maintenance are required.
<b>•</b> Client server lacks network data protection due to communication across two geographiclocations, exposing network information during data exchange.
<b>1.1.2. Peer to peer</b>
P2P is a decentralized network model with parallel computing, distributed storage, and anonymous routing, enabling faster media sharing. However, it is susceptible to piracy and software piracy due to its media sharing capabilities.
Figure 3 : Peer to peer
<b>•</b> The server is not necessary.
<b>•</b> Every computer system has a unique management user.
11
</div><span class="text_page_counter">Trang 12</span><div class="page_container" data-page="12"><b>•</b> a P2P network appropriate for use in homes and small businesses.
<b>•Reduce network traffic usage. </b>
• The information on the machine cannot perform a centralized backup.
• Allowing simultaneous access by multiple computer devices reduces performance.• The files are not organized scientifically but are stored on personal computers making it
difficult to locate them.
• Securing the network is the job of all users.
• Provides only some basic permissions and no advanced security.
<b>1.2. Network type</b>
Computers can connect to the network and communicate with one another through any medium. The three main types of networks for operating over the area they cover are LAN, MAN, and WAN. They have some things in common and things in common with one another. The geographic areas they cover, with LAN covering the smallest, MAN covering an area greater than LAN, and WAN covering the largest of all, are one of their main contrasts.
Figure 4 : Network type
Other varieties of computer networks include:
<b>1.2.1. LAN (Local area network)</b>
A local area network (LAN) connects computers and devices using wired and wireless methods.Although wired LAN has lost popularity to wireless LAN (WLAN), it remains a reliable and secure alternative. WLANs use hardware like routers and access points.
</div><span class="text_page_counter">Trang 13</span><div class="page_container" data-page="13"><b>LAN benefits:</b>
<b>•Resource sharing: which is one of the main justifications for building up any network. </b>
More files, data, and software can be shared as more devices connect to one another.
<b>•Secure data storage: All connected devices have access to a single, central place </b>
where network data is kept. Devices need authorization to connect to the network, preventing unauthorized users from accessing private data.
<b>•Quick data transmission: Ethernet cables offer quick, dependable data transmission </b>
speeds that quicken device-to-device connectivity.
<b>•Effective communication: On the same network, any authorized user can talk to </b>
<b>LAN use cases:</b>
LANs serve various network contexts, including home offices and business networks. They efficiently transmit data between devices, allowing information and services to be shared and accessed. WLANs use Wi-Fi radio waves to link devices, but not all WLANs use it.
<b>Virtual LANs:</b>
VLANs group network components into separate segments, preventing congestion, improving performance, efficiency, and security by isolating traffic for each segment, simplifying management.
13
</div><span class="text_page_counter">Trang 14</span><div class="page_container" data-page="14"><b>1.2.2. MAN (Metropolitan area network)</b>
A MAN is a collection of LANs that are connected together across an entire city, town, or municipality. A MAN, like LANs, can connect by a variety of wired or wireless methods, such as fiber optics, Ethernet cables, Wi-Fi, or cellular.
Figure 7 : MAN (Metropolitan area network)
<b>MAN benefits:</b>
<b>•Municipal coverage: A man has the ability to cover a whole town or city, extending </b>
network connectivity by dozens of kilometres.
<b>•Effective networking standards: IEEE 802.11 networking standards are frequently </b>
used in MAN configurations to increase bandwidth capacity and frequency levels, which improve network performance.
</div><span class="text_page_counter">Trang 15</span><div class="page_container" data-page="15">rates, are the most widely used type of MAN connectivity.
<b>MAN use cases:</b>
A MAN enables network availability in multiple locations, allowing organizations with LANs in thesame municipality to extend connectivity. Government entities can also configure MANs for public network connectivity, such as free Wi-Fi for city residents.
<b>1.2.3. WAN (Wide area network)</b>
A wide area network (WAN) is an expansive computer network configuration that connects multiple LANs within the same network, extending globally. It allows users to access data, files, and applications from different locations, enabling communication and collaboration.
Figure 8 : WAN (Wide area network)
<b>WAN benefits:</b>
<b>•Wide coverage: Because networks can link from anywhere in the world, WANs offer </b>
more extensive connectivity.
<b>•Better performance: To connect LANs, WANs employ lines with dedicated bandwidth. </b>
These connections speed up networks and offer greater data transmission rates than LANs.
<b>•Greater security: Because the network only connects to itself when using dedicated </b>
lines, there is a reduced risk of a system being taken over by hackers.
<b>WAN use cases:</b>
A WAN is crucial for long-distance connectivity, connecting branch offices and businesses, and is used by an estimated two-thirds of the world's population, making it valuable beyond enterprises.
<b>1.2.4. PAN (Personal area network)</b>
PANs are the smallest, simplest networks, connecting devices within an individual's range. Mostare wireless, providing short-range infrared technology. Wireless options include Bluetooth and USB, while wired options include USB.
15
</div><span class="text_page_counter">Trang 16</span><div class="page_container" data-page="16"><b>PAN benefits:</b>
<b>•Portability: The majority of PAN-connected devices are compact and portable.•Cost-effectiveness: Establishing a connection between two devices in a PAN without </b>
the use of extra wiring is typically less expensive than doing so in a wired network.
<b>•Reliability: As long as the devices stay within a 10-meter range of one another, PANs </b>
ensure stable connectivity between them.
<b>•Security: PANs link to other devices connected to larger networks rather than larger </b>
networks directly. Depending on how secure the intermediary device is inside the wider overall network, a device's security in a PAN is dependent.
<b>PAN use cases:</b>
PANs enable individual users to connect devices within their personal vicinity, such as body area networks and small home networks. They could play a crucial role in futurology, optimizing IoT systems in offices and homes.
<b>1.2.5. CAN (Campus network)</b>
Campus networks are interconnected, dispersed LANs that extend coverage to buildings in close proximity, while MANs connect LANs within a larger metro area. Campus networks range from 1 km to 5 km, while MANs can extend up to 50 km.
</div><span class="text_page_counter">Trang 29</span><div class="page_container" data-page="29">root nodes connecting intermediate nodes.
Figure 31 : Tree Topology
<b>6. Hybrid Topology: Hybrid topologies combine multiple topologies, allowing network </b>
designers to create unique networks tailored to their specific needs.
Figure 32 : Hybrid Topology
<b>2.2. Discuss the Impact of topology</b>
<b>2.2.1. Definition: Physical & Logical Topology</b>
<b>Physical Topology:</b>
Physical topology refers to the physical arrangement of devices, cables, and network elements, describing their connections and communication channels. It determines the dataroute within the network.
29
</div><span class="text_page_counter">Trang 30</span><div class="page_container" data-page="30">Figure 33 : Physical Topology
<b>Logical Topology:</b>
Logical topology represents the logical relationships and communication patterns between network devices, controlling the routing, addressing, and transmission of data throughout the network. It differs from physical topology in that it specifies logical channels that data takes independently of physical connections. Network configurations and protocols are often used to implement logical topology.
Figure 34 : Logical Topology
<b>2.2.2. Examples of topology with diagrams (Bus, Ring, Star, Tree, Hybrid, Mesh)</b>
<b>1. Point-to-Point: topology connects two devices using specific communication </b>
channels, enabling direct connections between distant locations or distant locations.
</div><span class="text_page_counter">Trang 31</span><div class="page_container" data-page="31"><b>2. Bus topology: Connects devices using a single communication channel, such as </b>
coaxial wire or Ethernet, for data transmission and reception.
Figure 36 : Bus topology
<b>3. Star: In a star topology, each network device is connected to a central hub or switch, </b>
controlling data flow and facilitating communication.
Figure 37 : Star topology
31
</div>