Introduction In this report, I will discuss the benefits and constraints of different network types and standards, the operating principles of networking devices and server types and ex
DISCUSS THE BENEFITS AND CONSTRAINTS OF DIFFERENT NETWORK TYPES AND STANDARDS
MAN (Metropolitan Area Network)
A Metropolitan Area Network or MAN includes a computer network throughout a town, a university campus, or a small region Such network types are larger than LANs, but smaller than WANs, and they combine elements from both network types ) Either a single individual or corporation (a city council, a big company, etc.) manages ownership and maintenance
- It offers fast communication using high-speed carriers, like fiber optic cables
- The dual bus in MAN network provides support to transmit data in both directions concurrently
- A MAN network mostly includes some areas of a city or an entire city
- You need more cable to establish MAN connection from one place to another
- It is difficult to secure a MAN network against hackers.
WAN (Wide Area Network)
A WAN connects computers together over longer physical distances, which is slightly more complicated than a LAN The Internet is the most basic example of a WAN, connecting all computers on the planet A WAN is typically owned and managed by multiple administrators or the general public due to its broad reach It is mainly limited to an organization or company
- WAN allows you to cover a broader geographical area As a result, corporate offices located at greater distances can communicate easily
- Contains devices like mobile phones, laptop, tablet, computers, gaming consoles, etc
- WLAN connections work using radio transmitters and receivers built into client devices
- The initial investment setup cost is relatively significant
- Maintaining the WAN network is challenging You'll need technicians and network administrators that are well- versed in their fields
- There are more errors and issues because of the wide coverage and the use of different technologies
- It requires more time to resolve issues because of the involvement of multiple wired and wireless technologies.
WLAN (Wireless Local Area Network)
A wireless local area network (WLAN) is a wireless distribution method for two or more devices WLANs use high-frequency radio waves and often include an access point to the Internet A WLAN allows users to move around the coverage area, often a home or small office, while maintaining a network connection
- It’s a reliable sort and versatile way of communication, also reduces the value of ownership
- The direction of connectivity are often anywhere i.e you’ll connect devices in any direction unless it’s within the range of access point
- The amount of power it requires is more as it uses transmitter; therefore, the battery life of laptops can be affected
- It’s easier to feature or remove workstation provides high rate thanks to small area coverage
- WLAN requires license, it’s a limited area to hide
- The Government agenciescan control the flow of signals of WLAN and can also limit it if required this will affect data transfer from connected devices to the web
- WLAN uses frequency which may interfere with other devices which use frequency
- It’s required to vary the network card and access point when standard changes
A network protocol is a set of rules that define how data are transmitted between the same network devices It allows linked devices to interact with one another despite variations in internal processes, structures, or designs Network protocols make it simple to interact with people all over the world, and they play an important part in today's digital communication
Network protocols are used for accessing the Internet, transferring files among devices, automating processes on the network, and sending messages across the internet network Apart from this, network protocols help network administrators to locate and fix errors Without them, computers wouldn’t know how to communicate with each other
Here are some common network protocols standards:
TCP/IP: is the set of communications protocols used in the Internet and similar computer networks The current foundational protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP), as well as the User Datagram Protocol (UDP)
HTTP (Hypertext Transfer Protocol) is the foundation of the World Wide Web (WWW) and is used to load web pages using hypertext links HTTP is an application layer protocol, which allows the user to see a user-friendly interface designed to transfer information between networked devices
DNS (Domain Name System): is the hierarchical and decentralized naming system used to identify computers reachable through the
Internet or other Internet Protocol (IP) networks The resource records contained in the DNS associate domain names with other forms of information
Here are some international standard organizations:
International Organization for Standardization (ISO): As the largest developer and publisher of standards in the world, ISO fills the vital role of a medium for agreement between individual standards developers, spreading progress made by one country's local developers across the world to further the goal of standardization
International Electro technical Commission (IEC): IEC plays the crucial role of coordinating efforts carried out in different countries and unifying them, such as the development of various units of measurement and the standardization of the modern form of the metric system
Institute of Electrical and Electronics Engineers (IEEE): is a nonprofit organization that develops and publishes over 900 standards relating to electronics, a broad field in today's modern world A journal publisher in addition to publishing IEEE standards, IEEE is by far the most cited publisher for new patents
Standard name used in networking:
• Application layer − HTTP, HTML, POP, H.323, IMAP
• Data link layer − Ethernet IEEE 802.3, X.25, Frame Relay
• Physical layer −RS-232C (cable), V.92 (modem)
II Network topology & communication and Bandwidth requirements
Network topology refers to the manner in which the links and nodes of a network are arranged to relate to each other Network topology can be used to define or describe many different types of networks, including radio control and control networks, public schools It is classified into 2 types Physical : and logical topology The structure of the logical topology describes how data flows throughout the network, whereas physical topology is the organization of distinct network parts, such as equipment positioning and connecting cable location
Physical network topology is the placement of the various components of a network and the different connectors usually represent the physical network cables, and the nodes represents usually the physical network devices (like switches)
Logical topology is the arrangement of devices on a computer network and how they communicate with one another, how devices are connected to the network through the actual cables that transmit data The logical topology of a network can be dynamically maintained and reconfigured with network equipment such as routers and switches
4 Difference between Physical and Logical Topology
It is basically the physical layout of the network media
Types: Bus, star, ring and mesh topologies
Can be affected by cost, durability, flexibility,
Refers to the way, how data is transmitted throughout the network
Logical bus and the logical ring
Data transmission can impact on packets lost or congestion
A bus topology is a Local Area Network ( LAN) topology which all devices in the network are connected through a single line
At the end of the line, a terminator is connected to the wire to absorb the signals
- Easy to connect a computer or peripheral to linear bus
- Independent work by each device, This makes the communication effective and uninterrupted
- Cost-effective method of setup, because the required cable length is less than the other network options
- It does not support very large networks
- Entire networks could shutdown if there is a failure in the main cable and difficult to identify the problem
- Additional devices make the speed of the network slow.
Star Topology
A star topology is a network that is designed to look very similar to a star with a central core and many systems connected directly to that core The systems in a star topology do not connect to each other, but instead pass messages to the central core that, in turn, passes the message to either all other systems
- It is simple to add a new site, and only the central site will have to be updated - Easy to detect faults and to remove parts
- There are no network delays when installing or disconnecting devices
- Each device requires just one port i.e to attach to the hub
- If the network switch fails, connected nodes are disabled and are unable to participate in the communication of the computer network
- Hub requires more resources and regular maintenance because it’s the central system of star
- More expensive than linear bus topology due to the value of the connecting devices (network switches) p p gy g ( )
Ring Topology
This topology links all network devices to form a ring, and the data flows is always in one direction This means that every device has an equal opportunity to access the media, without any cable termination
- Data flow is circular and the risk of a packet collision is minimized - Equal access to the resources
- It is cheap to install and expand
- Speed to transfer the data is very high
- A single cable failure may interrupt the entire network
- In order for all the computer to communicate with each other, all computer must be turned on
- It is difficult to add and delete any node in a network, causing problems for network activity.
Mesh Topology
A mesh topology is a network configuration in which each computer and network device is linked to each other Every component of the network is connected directly to every other component
- Failure during a single device won’t break the network
- Data transmission is more consistent because failure doesn’t disrupt its processes - It is simple to identify errors
- Adding new devices won’t disrupt data transmissions
- Installation in mesh topology is very difficult, since each node is connected to each other
- Mesh topology is more expensive to implement than other topologies
- It takes a lot of time and effort to build and maintain this topology.
Tree Topology
Tree topology is a hybrid of star topology and bus topology It is a special type of structure where many connected elements are arranged like the branches of a tree In a tree topology, there can be only one connection between any two connected nodes
- Because all information transferred by the nodes flows through the hub, the hub can easily detect the node with an error
- Due to its hybrid approach, various manufacturers support this network - Point-to-point cabling for each segment
- The uses of tree topology are limited due to its difficult installation process
- The security of tree topology is extremely weak, since any computer within the network can access the data that passes through the network
- Maintenance and configuration of tree topology become difficult due to its large size.
Hybrid Topology
Hybrid topology is a combination of two or more network topologies These topologies can include a mix of bus topology, mesh topology, ring topology, star topology, and tree topology
- It is extremely flexible and reliable
- Error detecting and troubleshooting are easy
- It is used to build massive networks
- The design of a hybrid network is quite complicated
- The installation process demands the use of several connections
- To connect one topology to another topology, hardware changes are required
A communication network is a pattern or form that is implemented in the organization to communicate information effectively The communication network is the established system where the message may flow in one or too many directions in the organization based on requirements
Network rules: Regulations are an important data quality component Network rules and rules of attribute help to maintain the integrity of data when used in combination
Network rules dictate which network features the utility network can connect to or associate For particular asset groups and asset types, these rules are imposed at the class level Features and objects may be connected and associated so long as the feature restrictions are respected
A well-defined policy network can meet the needs of enterprises it supports, and consider network policies as goals Your network cannot be established optimally without clear objectives and its performance cannot be measured without clear objectives.
Bandwidth requirement
Network Bandwidth is a measurement of the maximum wired or wireless communication capacity for transmitting data over a network connection over a specific time frame
Bandwidth is needed for the network since it determines how fast a web page loads on a browser The higher the bandwidth, the more data the transmission media can handle at once A lower bandwidth transmission media would not be able to carry as much data, meaning that the data would take longer to be sent The website and the internet connection used to access it can have a considerable impact on the bandwidth.
DISCUSS THE OPERATING PRINCIPLES OF NETWORKING DEVICES AND SERVER TYPES
Switch
- Concept: Connecting all the devices, including computers, printers and servers in the small business network facilitates the sharing of resources
- Operating principles of a switch: Could connect multiple devices, like computers, wireless connection points, printers and servers, in a building or on the campus, on the same network Connected devices can share information and communicate with each other by a switch
Gateway
- Concept: A gateway is a node in a computer network that serves as a major stop for data traveling to or from other networks Using gateways, we may communicate and transmit data back and forth The Internet would be useless without gateways
- Operating principles of a gateway: When a computer server operates as a gateway, it also works as a firewall and a server proxy An unexpected traffic firewall keeps outsiders out of a private network The proxy server's goal is to ensure that your internet data requests are processed by the correct server.
Hub
- Concept: : A hub is a physical layer networking device that links various devices to a network These PCs are often used to connect to a LAN
- Operating principles of Hub: When a hub is receiving an Ethernet frame from a network device on one of its ports, the hub transfers the packet to all ports on all other network devices If two network devices on the same network attempt to send out packets at the same time, a collision occurs.
Repeater
- Concept: A repeater is a network device transmitting a received signal that is more powerful than the original signal, and that is expanded geographically or topologically as it would be
- Operating principles of a repeater: Repeater operates on the connecting device's physical layer The principal role for the same two network connections is to extend the network transmission distance via the data signal to be sent or forwarded The repetition device is a network device that reproduces and restores the signal
- Concept: A Web Server is software and hardware using HTTP and other protocols to react to customer requests made over the World Wide Web The major task of a web server is the storage, processing and delivery of the website material to our users Web server Web servers also support SMTP (Simple Mail Transfer Protocol) and FTP (File Transfer Protocol) as well as HTTP - Operating principles:
Obtaining the IP Address from domain name Browser requests the full URL
Web server responds to request Browser displays the web page
Email Server
- Concept: A mail server is an application that receives incoming email from local users and remote senders and forwards outgoing messages for delivery.
- Operating principles: When the sender clicks the send button, all the packets are uploaded to a central computer (the email server) that hosts the email service The email service then relays these packets through the internet to the server which holds the email service of the recipient The mail server of the recipient looks for his email address, locates it and places the email within the inbox.
DNS Server
- Concept: DNS (Domain Name Server) is a host name to IP address translation service DNS is a distributed database implemented in a hierarchy of name servers It is an application layer protocol for message exchange between clients and servers
- Operating principles: DNS translates domain names to IP addresses so browsers can load
Internet resources Each device connected to the Internet has a unique IP address which other machines use to find the device DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.
DHCP Server
- Concept: DHCP (Dynamic Host Configuration Protocol) is based on a client-server model and based on discovery, offer, request, and ACK DHCP port number for server is 67 and for the client is 68 It is a Client server protocol which uses UDP services IP address is assigned from a pool of addresses
- Operating principles: When a device wants access to a network that’s using DHCP, it sends a request for an IP address that is picked up by a DHCP server The server responds be delivering an IP address to the device, then monitors the use of the address and takes it back after a specified time or when the device shuts down The IP address is then returned to the pool of addresses managed by the DHCP server to be reassigned to another device as it seeks access to the network
FTP Server
- Concept: FTP (File transfer protocol) is an Internet tool provided by TCP/IP It helps to transfer files from one computer to another by providing access to directories or folders on remote computers and allows software, data, text file to be transferred between different kinds of computers.
- Operating principles: The FTP connection is established between two systems and they communicate with each other using a network When an FTP connection is established, there are two types of communication channels are also established and they are known as command channel and data channel The command channel is used to transfer the commands and responses from client to server and server to client Whereas the data channel is used to actually transfer the data between client and server.
DISCUSS THE INTER-DEPENDENCE OF WORKSTATION HARDWARE WITH RELEVANT NETWORKING SOFTWARE
INTER-DEPENDENCE
Definition: Interdependence provides support to individuals allowing them the strength to support others and to focus on their own personal growth Interdependence in networking depicts how the failure of a node in one network causes the failure of dependent nodes in other networks, which in turn may cause more damage to the initial network, resulting in multiple failures and serious results
Actually, we can see that this term appears in almost every aspect of our life
- A biological process controlled by a number of proteins is often represented as a network Since the same proteins participate in different processes, the networks are interdependent
- Students depend on each other to complete an assignment
- Different regions in a country depend on each other for resources
- Food chain on which each animal has to depend to live
- Processes the workstation's task data, can control the output and input
- Missing part of the system may cause the computer not to work properly
- Different tasks in the computer are performed independently by each machine's hardware
- Network software is a fundamental element of any network system
- Network software plays an important role in managing network infrastructure and simplifying IT operations by facilitating communication, security, content, and data sharing
- The centralized nature of network software increases the productivity of the complete system
5 Interdependence on hardware and software
- Hardware refers to the basic components of a computer These can include things like keyboards, mice, motherboards, monitors, and hard drives For these to work, they require programs to be installed as software lack of software, users have to communicate with the system through machine language which consumes a lot of time
- Software is an instruction book that tells the hardware what to do, without hardware software does not exist at all, it cannot perform some operations
Through the above report, the information, meaning, content and examples given are quite complete with what I need to know about Networking, based on which I can use or understand perfectly the information about networks, the structure of networks, how to use them and the software, addresses, servers, applications, routers There are a few important details that are directly related to the correct use, through which I understand how to secure them of each type of network.