This increases overall installation and management costs Cost is higher than LAN While we move our network to another city or area it doesn''''t work 1.3 Protocol and Standardsu 1.3.1 Net
Discuss the benefits and constraints of different network types and standards (P1) 2
Define Network
A computer network is a system that connects many devices to share resources and communicate with each other It enables data transmission and sharing of information between devices It is done within the network, regardless of their physical location.
Network Types
- A local area network (LAN) is a collection of devices that are interconnected at a physical location, such as a building, office, or home LANs can be small or large, from a home network with users to a business network with rows of users and devices in the office or school
Figure 2.Local area network(LAN) [2]
Simple and Inexpensive: The main benefit of a Local Area Network is that it is quick and easy to set up for a relatively low price If an organization wants to build a network at a low cost and flexibility, a local area network would be an ideal choice
Accessible Software: Programs can also be shared on the Local Area Network
Combine a single licensed program and any device can use it on the network
Fast communication: Devices linked to the LAN transfer files and communicate di- rectly and quickly based on the LAN model and installed ethernet cable They work on 1000 Mbps, 100 Mbps and 10 Mbps Gigabit Ethernet technology is evolving rapidly If the technology becomes complex and mass-produced, lower-cost vari- ants will become accessible to the masses
Client and Server Association: All company related information is kept on one server If a customer requests information, the customer can seamlessly access that information
Resource collaboration: Expensive components, like scanners and printers, cannot be connected to every device in the office and it becomes a heavy task for the or- ganization, but in a LAN, requires a printer and scanner and people can be con- nected and they have to send instructions from their respective machines This will save staff time and money
File Locking: A LAN allows locking files within its network
Weak data protection: Unauthorized users can access files if the server has not been programmed properly Therefore, malfunctions are frequently observed
Maximum Damage: If a device, file, or server goes down, it affects the entire net- work
Expensive Installation Fee: Installing a LAN is expensive because it requires spe- cialized software to install the server
Malware: Malware can easily penetrate the LAN, corrupt the whole network, and destroys important data
Maintenance: LAN requires frequent maintenance and the involvement of techni- cians and system operators
Space Issues: LAN software requires an area of memory in each mainframe used on the network It minimizes the space required for the user's program
- Wide area network (also known as a WAN) is a large information network that is not constrained to one location A WAN can facilitate communication, information sharing, and more between devices from around the world through a WAN provider
Figure 3.Wide area network(WAN) [1]
Share Resources: The primary benefit of WAN is the ability to connect multiple of- fices, branches, and data centers around the world This enables businesses to share resources, data, and applications with each other, eliminating the need for expensive and time-consuming physical connections between each location
Scalability and flexibility: A WAN can easily scale up to meet increased bandwidth requirements in a short period of time This means that organizations can instantly increase bandwidth as needed without having to install new equipment
Cost reduction: A WAN is significantly less expensive to implement than a private network This makes WANs cost-effective for connecting remote offices and in- creasing bandwidth
Improved security: Data transmission across a WAN is more secure than LAN- based transmission because most WANs use public networks
Acess to a wide range of service: Since WANs use the internet, organizations can access a wide range of networks and services
Increased latency: Since data is transmitted over a WAN, there may be an in- crease in latency This means that it may take longer for data to travel across the network
Higher costs: Because WANs use a public network, they may come with a higher price tag than a private network
Security risks: While WANs are generally more secure than LANs due to the use of TLS, there are still some security risks For example, employees may not use TLS properly, which can open the network to hacking
Slower Issue: WANs are often slower than LANs due to the increased distance be- tween locations This can affect the performance of applications and services that are hosted on the WAN
Complexity: WANs require complex network configurations and specialized hard- ware, which can be difficult to set up and maintain Additionally, WANs are vulnera- ble to outages and disruptions due to their reliance on the public Internet This can cause data to be lost or delayed, which can be costly for businesses
- The term MAN full form is a metropolitan area network It is in between LAN and WAN technology and that cover the entire city It is very similar to LAN technology Here this article gives information about the advantages and disadvantages of MAN to know more details about it
Figure 4.Metropolian area network(MAN)
It provides higher security compare to WAN
It is wider than LAN
It helps in cost-effective sharing of common resources such as printer etc
It help people interface fast LANs together This is due to easy implement of links MAN require fewer resources compare to WAN This saves the implementation cost
The dual bus used in MAN help the transmission of data in both direction simultaneously
It provides a good backbone for a large network and also provides greater access to WAN
A MAN is usually encompasses several block of city or an entire city
Increases the efficiency of handling data
Increases the speed of transfer data
Save the cost attach to establish a wide area network
More cable require for a MAN connection from one place to another
The data rate is slow compared to LAN
It is difficult to make a system secure from hackers
The large network difficult to manage
It is difficult to secure the network once its becomes large
Network installation require skilled technicians and network administrators This increases overall installation and management costs
Cost is higher than LAN
While we move our network to another city or area it doesn't work
Protocol and Standardsu
Network protocols are a set of rules outlining how connected devices communicate across a network to exchange information easily and safely Protocols serve as a common language for devices to enable communication irrespective of differences in software, hardware, or internal processes
Different protocols serve different functions to ensure efficient, quick, and secure net- work communication Various types of network protocols can be categorized into the following three broad categories to help organizations operate seamlessly across dif- ferent business scenarios:
- Network Communication Protocols: These protocols determine the rules and formats to transfer data across networks Communication protocols govern various aspects of analog and digital communications, such as syntax, authentication, semantics, and er- ror detection, among others Some key network communication protocols include:
Hyper-Text Transfer Protocol (HTTP)
- Network Security Protocols: These protocols ensure safe data transmission over the network connections Network security protocols define the procedures to secure data from any unauthorized access These protocols leverage encryption and cryptography to safeguard Here are the most widely used network security protocols:
Secure File Transfer Protocol (SFTP)
Hyper-Text Transfer Protocol Secure (HTTPS)
- Network Management Protocols: Network managers require standard policies and procedures to manage and monitor the network for maintaining smooth communica- tion Network management protocols ensure quick troubleshooting and optimal perfor- mance across the network The following are essential network protocols manage- ment:
Simple Network Management Protocol (SNMP)
Internet Control Message Protocol (ICMP)
- International Organization for Standardization (ISO)
- Storage Networking Industry Association (SNIA
Explain the impact of network topology, communication, and bandwidth requirements (P2)
Network topology
Topology or Network Topology is simply a network topology model This model clearly shows each hardware element, their arrangement
On the other hand, network topology is also understood as a way of connecting nodes in the same network To optimize the operation of the network system
The physical network connection structure (most commonly LAN) is divided into sev- eral categories In which each network structure owns the configuration of each differ- ent node For enterprises, the ideal network structure or not depends on the aspect of scale, investment cost and purpose of use
Each network structure model diagram is the basis for network administrators to moni- tor and support the maintenance and repair process of the network system
The structure a network can directly impact its functioning Therefore, companies of must select the most suitable topology for their network bolster performance and to enhance data efficiency The right topology also optimizes resource allocation and minimizes operational costs
Organizations use network topology to define how their network nodes are linked to each other The two major categories of topology are physical and logical
Physical Topology refers to the interconnected structure of a local area network
(LAN) The method employed to connect the physical devices on the network with the cables, and the type of cabling used, all constitute the physical topology This contrasts with logical topology, which describes a network’s media signal perfor- mance and how it exchanges device data
Logical network topology is not always mapped to a specific physical topology For example, twisted pair Ethernet is logical bus topology that is mapped to a physical star topology plan, while IBM’s token ring is a logical ring topology that is physically implemented as a star topology
Logical topology is a concept in networking that defines the architecture of the com- munication mechanism for all nodes in a network Using network equipment such as routers and switches, the logical topology of a network can be dynamically main- tained and reconfigured
Logical topologies contrasts with physical topologies, which refer to the physical in- terconnections of all devices in the network
The logical topology defines how the data should transfer Contrast this to the physi- cal topology, which consists of the layout of cables, network devices and wiring
Some common physical network topologies used by organizations include point to point, bus, ring, star, tree, mesh, and hybrid topology networks Each type consists of different node and link configurations
Point to point is a simple topology that directly links two nodes and reserves the en- tire bandwidth of the connection for them to communicate with one another Physi- cally, point- -point connections rely on a cable or wire that connects the two end-to points However, logical topological connections using satellite links and micro- waves are more common nowadays
A basic example of a point- -point connection is changing the temperature of an air to conditioning unit using a remote control
In a bus topology, all the nodes are linked using a single cable with a terminator on both ends This configuration sees one main cable acting as the backbone for the whole network
In such an arrangement, the server node transmits data from one end of the cable and in a single direction to the client node As the data travels to each node, its des- tination address (MAC/IP) is checked to see if it is received and processed If there is a mismatch in the address, the node does not do anything with the data
This way, only the node that recognizes its address uses the data that travels on the single cable, while the other nodes are unaffected Once the data reaches the end of the cable, the terminator removes it to prevent signal bouncing
In a ring topology, each node is linked with its neighbor to form a closed network
This configuration sees the data move from one node to another, either unidirec- tionally or bidirectionally Such network topology is used in smaller networks, like those in schools
Allows to broaden the network
Permits to link two different kinds of networks
Costly and difficult to manage
Protocol conversion is performed, thus resulting in a slower transmission rate f Modern
In regards to networking (network devices modem), a modem is a piece of hardware that enables a computer to transmit and receive data over telephone lines In a nutshell, a modem is a piece of hardware that connects a computer or router to a broadband network
When a signal is sent, the device converts digital data to an analog audio signal and sends it over a phone line Similarly, when an analog signal is received, it is converted back to a digital signal by the modem Onboard modems, internal modems, external modems, and removable modems are all examples of modems A modem operates at the OSI model’s physical layer (Layer 1) or Data link layer (Layer 2), depending on the type
Easily allows connecting LAN to internet
Converts digital signal into an analog signal
When compared to the hub, the speed is slow
It only serves as a bridge between the LAN and the internet
It cannot maintain its network traffic
The modem is unaware of its destination path g Repeater
With regards to networking (network devices repeater), a repeater is an item that boosts the strength of a signal so that it can travel longer distances without losing quality These devices are commonly used in networks to help data reach further destinations
A range extender or wireless repeater, for example, is a repeater that extends the range and strength of a Wi-Fi signal A repeater is effective in office buildings, schools, and factories where a single wireless router cannot reach all areas A re- peater operates at the OSI model’s physical layer (Layer 1)
Repeaters are simple to set up and inexpensive
Repeaters do not necessitate any additional processing
They can connect signals with various types of cables
Repeaters are unable to connect disparate networks
They are unable to distinguish between actual signals and noise
They will not be able to reduce network traffic h Access Point
In terms of networking, an access point (AP) is a wireless network device that acts as a portal for devices to connect to a local area network Access points can extend an existing network’s wireless coverage and increase the number of users who can connect Wireless access points (WAPs) are devices that combine a transmitter and receiver (transceiver) to form a wireless LAN (WLAN) The access point operates at the OSI model’s Data Link layer (Layer 2)
Installing is easier and faster
Allows data transmission even when the user is moving
It is simple to extend to places where wires and cables are inaccessible
The range of network devices is limited, which causes issues for many users
Installing this network device is difficult and time-consuming
Because these network devices are susceptible to interference, fog and radiation can cause them to malfunction
Compare common networking principles and how protocols enable the
Explain networking devices and operations (LO2)
Server
The term ‘server’ has a double meaning in IT It is used to describe a computer that makes resources available over a network, as well as the program that runs on this computer So it’s necessary to have two different server definitions:
Definition Server (hardware): a hardware-based server is a physical device connected to a computer network on which one or more software-based servers run alongside the operating system An alternative term for a hardware-based server is host In principle, any computer can be used as a host with server software
Definition Server (software): a software-based server is a program that offers a specialized service to be used by other programs (known as clients) locally or via a network The service offered depends on the type of server software The client-server model is the basis of communication When it comes to exchanging data, service-specific communication protocols are used
Web servers are computer systems that provide hosting for websites, web applications, and other online content They receive client requests, such as web browser requests, and respond by providing the requested content
A web server communicates with clients via HTTP (Hypertext Transfer Protocol) and can handle multiple requests at the same time Apache, Nginx, and Microsoft IIS are some popular examples of web servers These types of servers host most of the websites on the internet b File Servers
A file server is a type of server that stores and manages files that other network devices can access It allows users to store and retrieve files in a centralized location, eliminating the need for local storage on individual devices
A file server distributes files using protocols such as SMB (Server Message Block) and NFS (Network File System) Users can access files on the server using a file manager or explorer and, depending on their access permissions, they can even modify or delete them Windows File Server, Linux Samba Server, and FreeNAS are all examples of popular file servers c Database Servers
A database server is a type of server that stores and manages databases Databases are collections of data that are organized in a specific way They enable clients to query the database and perform operations like adding, modifying, and deleting data
A database server operates by running database management system (DBMS) software The DBMS software manages the database and provides an interface through which clients can interact with it
Microsoft SQL Server, Oracle Database, and MySQL are some examples of popular database servers These types of servers are commonly used in businesses to manage large amounts of data as well as to support a variety of applications and services d Application Servers
A computer system that hosts applications and provides services to other devices on a network is known as an application server It manages an application’s business logic and provides a runtime environment in which the application can run
An application server operates by executing application server software, which serves as a platform for hosting applications and managing application resources IBM WebSphere, Oracle WebLogic, and JBoss are some popular application servers These types of servers are commonly used in businesses to deploy and manage web applications, as well as provide client services e Mail Servers
A mail server is a type of server that manages email messages sent and received over a network It serves as a central hub for email communication, storing, processing, and forwarding email messages
A mail server communicates with other mail servers and clients by using email protocols such as SMTP (Simple Mail Transfer Protocol) and IMAP (Internet Message Access Protocol)
Microsoft Exchange Server, Postfix, and Sendmail are examples of popular mail servers
In businesses, these types of servers are commonly used to manage email communication between employees and clients f Print Servers
A print server is a server that manages printing devices like printers, scanners, and fax machines across a network It serves as a centralized control point for printing activities, allowing multiple users to share the same printing resources
A print server manages print queues and sends print jobs to the appropriate printer after receiving requests from clients Print servers that are widely used include Windows Print Server, CUPS (Common Unix Printing System), and PaperCut In businesses, these servers are commonly used to manage printing activities and control printing resources g DNS Servers
A DNS server (Domain Name System) is a type of server that converts domain names into
IP addresses and vice versa It serves as an internet directory, allowing users to access websites and services via easy- -remember domain names rather than numerical IP to addresses
A DNS server operates by maintaining a database of domain names and their corresponding IP addresses Then, it responds to client requests to translate domain names into IP addresses
BIND (Berkeley Internet Name Domain), Microsoft DNS Server, and Google Public DNS are all popular DNS servers These servers are critical for Internet communication because they allow users to quickly and efficiently access websites and services h Game Servers
A game server is a server that hosts multiplayer games over the internet or on a local network These servers enable players to connect and interact in real-time live gameplay Typically, game servers run specialized software that manages the game world and player interactions This software is in charge of keeping the game state, synchronizing player actions, and managing network latency
Discuss the inter-dependence of workstation hardware with relevant
Definition: Networking software refers to the programs, protocols, and applications that enable communication and data exchange across numerous computers or de- vices over a network
Network software functions: o Administrators can add and remove network users using user management o This is very beneficial when hiring or relocating o File management enables administrators to control where data is kept and who has access to it o Access provides users with continuous access to network resources o Network security systems assist administrators in securing networks and preventing infractions
Workstation hardware refers to the physical components of a computer system used by a single person, which generally includes the computer itself, peripherals (such as monitors, keyboards, and mouse), and any connected hardware devices
2.3 Explain what is meant by interdependencies
Interdependencies refer to the relationships and connections between differ- ent elements or components of a system, where the functioning or perfor- mance of one component depends on the others
In a supply chain, the timely delivery of raw materials is critical to product manufacturing
The fulfillment of one person's work in a team project is dependent on the input or output of another person's task
In an ecosystem, one species' existence may be linked to the availability of resources given by another
2.5 Discuss and explain the interdepence of workstation hardware with network- ing software Derive an example form your discussion
The interdependencies between workstation hardware and networking software are as follows:
- Network Interface Cards (NIC) - Workstation hardware requires NICs, which are physical devices that enable computers to connect to a network Networking software relies on NICs to establish network connections and facilitate data transmission
- Network Drivers - Workstation hardware, such as NICs, requires specific network drivers to communicate with networking software effectively These drivers act as intermediary software that enables the hardware components to interact with the net- working software
- Protocol Support - Workstation hardware and networking software must have com- patible protocol support For example, if a workstation has hardware that only sup- ports Ethernet connections, the networking software should be compatible with Ether- net protocols to establish proper communication
- Bandwidth Management - Workstation hardware performance, such as CPU and memory, can directly impact the networking software's ability to manage network traf- fic effectively Insufficient hardware resources may lead to network congestion and negatively impact overall network performance
Assume a corporation wishes to install a Voice over Internet Protocol (VoIP) system to enable workers to make phone calls via the network However, the company's workstations are outfitted with NICs that do not allow Voice over IP These NICs can only handle regular data transfer
In this situation, the networking software necessitates the use of NICs capable of processing speech over IP in order to transform voice signals into network data and vice versa Employees are unable to make VoIP calls across the network due to a lack of functionality in current NICs This results in decreased performance and limits in the use of the VoIP system
To remedy this issue, the organization must upgrade the workstation hardware by adding network interface cards (NICs) that support
Explore a range of server types and justify the selection of a server,
considering a given scenario regarding cost and performance opti- mization(M2)