1. Trang chủ
  2. » Luận Văn - Báo Cáo

information technology assignment 1 unit networking infrastructure

41 0 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Networking Infrastructure
Tác giả Ngo Van Tin
Người hướng dẫn Nguyen Bao Quoc
Trường học BTEC FPT International College
Chuyên ngành Information Technology
Thể loại Assignment
Năm xuất bản 2023
Thành phố Da Nang
Định dạng
Số trang 41
Dung lượng 3,73 MB

Cấu trúc

  • 1. Discuss the benefits and constraints of different network types and standards. (P1) 2 (8)
    • 1.1 Define Network (8)
    • 1.2 Network Types (8)
    • 1.3 Protocol and Standardsu (12)
      • 1.3.1 Network protocol definition (12)
      • 1.3.2 Types of Network Protocol (13)
      • 1.3.3 Some common Network Standards (14)
  • 2. Explain the impact of network topology, communication, and bandwidth requirements. (P2) (14)
    • 2.1 Network topology (14)
      • 2.1.1 Types of Network Topology (14)
      • 2.1.2 Examples of topology (15)
    • 2.2 Communications and Bandwidth (0)
  • 3. Compare common networking principles and how protocols enable the (0)
    • 3.2. Compare LAN, CAN, MAN, WAN (0)
    • 3.3. Compare physical topologies and logical topologies (0)
    • 3.4. Compare between OSI reference model and TCP/IP reference model (0)
    • 3.5. Compare TCP between UDP (0)
  • CHAPTER 2 Explain networking devices and operations (LO2) (0)
    • 1.1. Network devices (0)
      • 1.1.1. Definition (0)
      • 1.1.2. Several network devices (0)
    • 1.2. Server (34)
      • 1.2.2. Server types (35)
    • 2. Discuss the inter-dependence of workstation hardware with relevant (39)
      • 2.1. Network software (39)
      • 2.2. Workstation hardware (40)
      • 2.3. Explain what is meant by interdependencies (40)
      • 2.4. Give examples of interdependency (40)
      • 2.5. Discuss and explain the interdepence of workstation hardware with (40)
    • 3. Explore a range of server types and justify the selection of a server, (41)
      • 3.1. Types of server (41)
        • 3.1.1. Web server (41)
        • 3.1.2. Mail server (41)
        • 3.1.3. DB server (41)
        • 3.1.4. DNS server (41)
        • 3.1.5. DHCP server (41)
      • 3.2. Hardware (41)
        • 3.2.1. Dedicated server (41)
        • 3.2.2. Virtual Private Server (41)
        • 3.2.3. Cloud server (41)
    • 4. Considering a given scenario, identify the topology protocol selected for the (41)

Nội dung

This increases overall installation and management costs Cost is higher than LAN While we move our network to another city or area it doesn''''t work 1.3 Protocol and Standardsu 1.3.1 Net

Discuss the benefits and constraints of different network types and standards (P1) 2

Define Network

A computer network is a system that connects many devices to share resources and communicate with each other It enables data transmission and sharing of information between devices It is done within the network, regardless of their physical location.

Network Types

- A local area network (LAN) is a collection of devices that are interconnected at a physical location, such as a building, office, or home LANs can be small or large, from a home network with users to a business network with rows of users and devices in the office or school

Figure 2.Local area network(LAN) [2]

Simple and Inexpensive: The main benefit of a Local Area Network is that it is quick and easy to set up for a relatively low price If an organization wants to build a network at a low cost and flexibility, a local area network would be an ideal choice

Accessible Software: Programs can also be shared on the Local Area Network

Combine a single licensed program and any device can use it on the network

Fast communication: Devices linked to the LAN transfer files and communicate di- rectly and quickly based on the LAN model and installed ethernet cable They work on 1000 Mbps, 100 Mbps and 10 Mbps Gigabit Ethernet technology is evolving rapidly If the technology becomes complex and mass-produced, lower-cost vari- ants will become accessible to the masses

Client and Server Association: All company related information is kept on one server If a customer requests information, the customer can seamlessly access that information

Resource collaboration: Expensive components, like scanners and printers, cannot be connected to every device in the office and it becomes a heavy task for the or- ganization, but in a LAN, requires a printer and scanner and people can be con- nected and they have to send instructions from their respective machines This will save staff time and money

File Locking: A LAN allows locking files within its network

Weak data protection: Unauthorized users can access files if the server has not been programmed properly Therefore, malfunctions are frequently observed

Maximum Damage: If a device, file, or server goes down, it affects the entire net- work

Expensive Installation Fee: Installing a LAN is expensive because it requires spe- cialized software to install the server

Malware: Malware can easily penetrate the LAN, corrupt the whole network, and destroys important data

Maintenance: LAN requires frequent maintenance and the involvement of techni- cians and system operators

Space Issues: LAN software requires an area of memory in each mainframe used on the network It minimizes the space required for the user's program

- Wide area network (also known as a WAN) is a large information network that is not constrained to one location A WAN can facilitate communication, information sharing, and more between devices from around the world through a WAN provider

Figure 3.Wide area network(WAN) [1]

Share Resources: The primary benefit of WAN is the ability to connect multiple of- fices, branches, and data centers around the world This enables businesses to share resources, data, and applications with each other, eliminating the need for expensive and time-consuming physical connections between each location

Scalability and flexibility: A WAN can easily scale up to meet increased bandwidth requirements in a short period of time This means that organizations can instantly increase bandwidth as needed without having to install new equipment

Cost reduction: A WAN is significantly less expensive to implement than a private network This makes WANs cost-effective for connecting remote offices and in- creasing bandwidth

Improved security: Data transmission across a WAN is more secure than LAN- based transmission because most WANs use public networks

Acess to a wide range of service: Since WANs use the internet, organizations can access a wide range of networks and services

Increased latency: Since data is transmitted over a WAN, there may be an in- crease in latency This means that it may take longer for data to travel across the network

Higher costs: Because WANs use a public network, they may come with a higher price tag than a private network

Security risks: While WANs are generally more secure than LANs due to the use of TLS, there are still some security risks For example, employees may not use TLS properly, which can open the network to hacking

Slower Issue: WANs are often slower than LANs due to the increased distance be- tween locations This can affect the performance of applications and services that are hosted on the WAN

Complexity: WANs require complex network configurations and specialized hard- ware, which can be difficult to set up and maintain Additionally, WANs are vulnera- ble to outages and disruptions due to their reliance on the public Internet This can cause data to be lost or delayed, which can be costly for businesses

- The term MAN full form is a metropolitan area network It is in between LAN and WAN technology and that cover the entire city It is very similar to LAN technology Here this article gives information about the advantages and disadvantages of MAN to know more details about it

Figure 4.Metropolian area network(MAN)

It provides higher security compare to WAN

It is wider than LAN

It helps in cost-effective sharing of common resources such as printer etc

It help people interface fast LANs together This is due to easy implement of links MAN require fewer resources compare to WAN This saves the implementation cost

The dual bus used in MAN help the transmission of data in both direction simultaneously

It provides a good backbone for a large network and also provides greater access to WAN

A MAN is usually encompasses several block of city or an entire city

Increases the efficiency of handling data

Increases the speed of transfer data

Save the cost attach to establish a wide area network

More cable require for a MAN connection from one place to another

The data rate is slow compared to LAN

It is difficult to make a system secure from hackers

The large network difficult to manage

It is difficult to secure the network once its becomes large

Network installation require skilled technicians and network administrators This increases overall installation and management costs

Cost is higher than LAN

While we move our network to another city or area it doesn't work

Protocol and Standardsu

Network protocols are a set of rules outlining how connected devices communicate across a network to exchange information easily and safely Protocols serve as a common language for devices to enable communication irrespective of differences in software, hardware, or internal processes

Different protocols serve different functions to ensure efficient, quick, and secure net- work communication Various types of network protocols can be categorized into the following three broad categories to help organizations operate seamlessly across dif- ferent business scenarios:

- Network Communication Protocols: These protocols determine the rules and formats to transfer data across networks Communication protocols govern various aspects of analog and digital communications, such as syntax, authentication, semantics, and er- ror detection, among others Some key network communication protocols include:

Hyper-Text Transfer Protocol (HTTP)

- Network Security Protocols: These protocols ensure safe data transmission over the network connections Network security protocols define the procedures to secure data from any unauthorized access These protocols leverage encryption and cryptography to safeguard Here are the most widely used network security protocols:

Secure File Transfer Protocol (SFTP)

Hyper-Text Transfer Protocol Secure (HTTPS)

- Network Management Protocols: Network managers require standard policies and procedures to manage and monitor the network for maintaining smooth communica- tion Network management protocols ensure quick troubleshooting and optimal perfor- mance across the network The following are essential network protocols manage- ment:

Simple Network Management Protocol (SNMP)

Internet Control Message Protocol (ICMP)

- International Organization for Standardization (ISO)

- Storage Networking Industry Association (SNIA

Explain the impact of network topology, communication, and bandwidth requirements (P2)

Network topology

Topology or Network Topology is simply a network topology model This model clearly shows each hardware element, their arrangement

On the other hand, network topology is also understood as a way of connecting nodes in the same network To optimize the operation of the network system

The physical network connection structure (most commonly LAN) is divided into sev- eral categories In which each network structure owns the configuration of each differ- ent node For enterprises, the ideal network structure or not depends on the aspect of scale, investment cost and purpose of use

Each network structure model diagram is the basis for network administrators to moni- tor and support the maintenance and repair process of the network system

The structure a network can directly impact its functioning Therefore, companies of must select the most suitable topology for their network bolster performance and to enhance data efficiency The right topology also optimizes resource allocation and minimizes operational costs

Organizations use network topology to define how their network nodes are linked to each other The two major categories of topology are physical and logical

Physical Topology refers to the interconnected structure of a local area network

(LAN) The method employed to connect the physical devices on the network with the cables, and the type of cabling used, all constitute the physical topology This contrasts with logical topology, which describes a network’s media signal perfor- mance and how it exchanges device data

Logical network topology is not always mapped to a specific physical topology For example, twisted pair Ethernet is logical bus topology that is mapped to a physical star topology plan, while IBM’s token ring is a logical ring topology that is physically implemented as a star topology

Logical topology is a concept in networking that defines the architecture of the com- munication mechanism for all nodes in a network Using network equipment such as routers and switches, the logical topology of a network can be dynamically main- tained and reconfigured

Logical topologies contrasts with physical topologies, which refer to the physical in- terconnections of all devices in the network

The logical topology defines how the data should transfer Contrast this to the physi- cal topology, which consists of the layout of cables, network devices and wiring

Some common physical network topologies used by organizations include point to point, bus, ring, star, tree, mesh, and hybrid topology networks Each type consists of different node and link configurations

Point to point is a simple topology that directly links two nodes and reserves the en- tire bandwidth of the connection for them to communicate with one another Physi- cally, point- -point connections rely on a cable or wire that connects the two end-to points However, logical topological connections using satellite links and micro- waves are more common nowadays

A basic example of a point- -point connection is changing the temperature of an air to conditioning unit using a remote control

In a bus topology, all the nodes are linked using a single cable with a terminator on both ends This configuration sees one main cable acting as the backbone for the whole network

In such an arrangement, the server node transmits data from one end of the cable and in a single direction to the client node As the data travels to each node, its des- tination address (MAC/IP) is checked to see if it is received and processed If there is a mismatch in the address, the node does not do anything with the data

This way, only the node that recognizes its address uses the data that travels on the single cable, while the other nodes are unaffected Once the data reaches the end of the cable, the terminator removes it to prevent signal bouncing

In a ring topology, each node is linked with its neighbor to form a closed network

This configuration sees the data move from one node to another, either unidirec- tionally or bidirectionally Such network topology is used in smaller networks, like those in schools

Allows to broaden the network

Permits to link two different kinds of networks

Costly and difficult to manage

Protocol conversion is performed, thus resulting in a slower transmission rate f Modern

In regards to networking (network devices modem), a modem is a piece of hardware that enables a computer to transmit and receive data over telephone lines In a nutshell, a modem is a piece of hardware that connects a computer or router to a broadband network

When a signal is sent, the device converts digital data to an analog audio signal and sends it over a phone line Similarly, when an analog signal is received, it is converted back to a digital signal by the modem Onboard modems, internal modems, external modems, and removable modems are all examples of modems A modem operates at the OSI model’s physical layer (Layer 1) or Data link layer (Layer 2), depending on the type

Easily allows connecting LAN to internet

Converts digital signal into an analog signal

When compared to the hub, the speed is slow

It only serves as a bridge between the LAN and the internet

It cannot maintain its network traffic

The modem is unaware of its destination path g Repeater

With regards to networking (network devices repeater), a repeater is an item that boosts the strength of a signal so that it can travel longer distances without losing quality These devices are commonly used in networks to help data reach further destinations

A range extender or wireless repeater, for example, is a repeater that extends the range and strength of a Wi-Fi signal A repeater is effective in office buildings, schools, and factories where a single wireless router cannot reach all areas A re- peater operates at the OSI model’s physical layer (Layer 1)

Repeaters are simple to set up and inexpensive

Repeaters do not necessitate any additional processing

They can connect signals with various types of cables

Repeaters are unable to connect disparate networks

They are unable to distinguish between actual signals and noise

They will not be able to reduce network traffic h Access Point

In terms of networking, an access point (AP) is a wireless network device that acts as a portal for devices to connect to a local area network Access points can extend an existing network’s wireless coverage and increase the number of users who can connect Wireless access points (WAPs) are devices that combine a transmitter and receiver (transceiver) to form a wireless LAN (WLAN) The access point operates at the OSI model’s Data Link layer (Layer 2)

Installing is easier and faster

Allows data transmission even when the user is moving

It is simple to extend to places where wires and cables are inaccessible

The range of network devices is limited, which causes issues for many users

Installing this network device is difficult and time-consuming

Because these network devices are susceptible to interference, fog and radiation can cause them to malfunction

Compare common networking principles and how protocols enable the

Explain networking devices and operations (LO2)

Server

The term ‘server’ has a double meaning in IT It is used to describe a computer that makes resources available over a network, as well as the program that runs on this computer So it’s necessary to have two different server definitions:

Definition Server (hardware): a hardware-based server is a physical device connected to a computer network on which one or more software-based servers run alongside the operating system An alternative term for a hardware-based server is host In principle, any computer can be used as a host with server software

Definition Server (software): a software-based server is a program that offers a specialized service to be used by other programs (known as clients) locally or via a network The service offered depends on the type of server software The client-server model is the basis of communication When it comes to exchanging data, service-specific communication protocols are used

Web servers are computer systems that provide hosting for websites, web applications, and other online content They receive client requests, such as web browser requests, and respond by providing the requested content

A web server communicates with clients via HTTP (Hypertext Transfer Protocol) and can handle multiple requests at the same time Apache, Nginx, and Microsoft IIS are some popular examples of web servers These types of servers host most of the websites on the internet b File Servers

A file server is a type of server that stores and manages files that other network devices can access It allows users to store and retrieve files in a centralized location, eliminating the need for local storage on individual devices

A file server distributes files using protocols such as SMB (Server Message Block) and NFS (Network File System) Users can access files on the server using a file manager or explorer and, depending on their access permissions, they can even modify or delete them Windows File Server, Linux Samba Server, and FreeNAS are all examples of popular file servers c Database Servers

A database server is a type of server that stores and manages databases Databases are collections of data that are organized in a specific way They enable clients to query the database and perform operations like adding, modifying, and deleting data

A database server operates by running database management system (DBMS) software The DBMS software manages the database and provides an interface through which clients can interact with it

Microsoft SQL Server, Oracle Database, and MySQL are some examples of popular database servers These types of servers are commonly used in businesses to manage large amounts of data as well as to support a variety of applications and services d Application Servers

A computer system that hosts applications and provides services to other devices on a network is known as an application server It manages an application’s business logic and provides a runtime environment in which the application can run

An application server operates by executing application server software, which serves as a platform for hosting applications and managing application resources IBM WebSphere, Oracle WebLogic, and JBoss are some popular application servers These types of servers are commonly used in businesses to deploy and manage web applications, as well as provide client services e Mail Servers

A mail server is a type of server that manages email messages sent and received over a network It serves as a central hub for email communication, storing, processing, and forwarding email messages

A mail server communicates with other mail servers and clients by using email protocols such as SMTP (Simple Mail Transfer Protocol) and IMAP (Internet Message Access Protocol)

Microsoft Exchange Server, Postfix, and Sendmail are examples of popular mail servers

In businesses, these types of servers are commonly used to manage email communication between employees and clients f Print Servers

A print server is a server that manages printing devices like printers, scanners, and fax machines across a network It serves as a centralized control point for printing activities, allowing multiple users to share the same printing resources

A print server manages print queues and sends print jobs to the appropriate printer after receiving requests from clients Print servers that are widely used include Windows Print Server, CUPS (Common Unix Printing System), and PaperCut In businesses, these servers are commonly used to manage printing activities and control printing resources g DNS Servers

A DNS server (Domain Name System) is a type of server that converts domain names into

IP addresses and vice versa It serves as an internet directory, allowing users to access websites and services via easy- -remember domain names rather than numerical IP to addresses

A DNS server operates by maintaining a database of domain names and their corresponding IP addresses Then, it responds to client requests to translate domain names into IP addresses

BIND (Berkeley Internet Name Domain), Microsoft DNS Server, and Google Public DNS are all popular DNS servers These servers are critical for Internet communication because they allow users to quickly and efficiently access websites and services h Game Servers

A game server is a server that hosts multiplayer games over the internet or on a local network These servers enable players to connect and interact in real-time live gameplay Typically, game servers run specialized software that manages the game world and player interactions This software is in charge of keeping the game state, synchronizing player actions, and managing network latency

Discuss the inter-dependence of workstation hardware with relevant

Definition: Networking software refers to the programs, protocols, and applications that enable communication and data exchange across numerous computers or de- vices over a network

Network software functions: o Administrators can add and remove network users using user management o This is very beneficial when hiring or relocating o File management enables administrators to control where data is kept and who has access to it o Access provides users with continuous access to network resources o Network security systems assist administrators in securing networks and preventing infractions

Workstation hardware refers to the physical components of a computer system used by a single person, which generally includes the computer itself, peripherals (such as monitors, keyboards, and mouse), and any connected hardware devices

2.3 Explain what is meant by interdependencies

Interdependencies refer to the relationships and connections between differ- ent elements or components of a system, where the functioning or perfor- mance of one component depends on the others

In a supply chain, the timely delivery of raw materials is critical to product manufacturing

The fulfillment of one person's work in a team project is dependent on the input or output of another person's task

In an ecosystem, one species' existence may be linked to the availability of resources given by another

2.5 Discuss and explain the interdepence of workstation hardware with network- ing software Derive an example form your discussion

The interdependencies between workstation hardware and networking software are as follows:

- Network Interface Cards (NIC) - Workstation hardware requires NICs, which are physical devices that enable computers to connect to a network Networking software relies on NICs to establish network connections and facilitate data transmission

- Network Drivers - Workstation hardware, such as NICs, requires specific network drivers to communicate with networking software effectively These drivers act as intermediary software that enables the hardware components to interact with the net- working software

- Protocol Support - Workstation hardware and networking software must have com- patible protocol support For example, if a workstation has hardware that only sup- ports Ethernet connections, the networking software should be compatible with Ether- net protocols to establish proper communication

- Bandwidth Management - Workstation hardware performance, such as CPU and memory, can directly impact the networking software's ability to manage network traf- fic effectively Insufficient hardware resources may lead to network congestion and negatively impact overall network performance

Assume a corporation wishes to install a Voice over Internet Protocol (VoIP) system to enable workers to make phone calls via the network However, the company's workstations are outfitted with NICs that do not allow Voice over IP These NICs can only handle regular data transfer

In this situation, the networking software necessitates the use of NICs capable of processing speech over IP in order to transform voice signals into network data and vice versa Employees are unable to make VoIP calls across the network due to a lack of functionality in current NICs This results in decreased performance and limits in the use of the VoIP system

To remedy this issue, the organization must upgrade the workstation hardware by adding network interface cards (NICs) that support

Explore a range of server types and justify the selection of a server,

considering a given scenario regarding cost and performance opti- mization(M2)

Ngày đăng: 09/05/2024, 10:58