1. Trang chủ
  2. » Luận Văn - Báo Cáo

information technology assignment 1 unit networking

41 1 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Information Technology Assignment 1 Unit: Networking
Tác giả Nguyen Trinh Anh Tuan
Người hướng dẫn Truong Dang Hieu
Trường học Btec Fpt International College
Chuyên ngành Information Technology
Thể loại Assignment
Năm xuất bản 2022
Thành phố Danang
Định dạng
Số trang 41
Dung lượng 1,33 MB

Cấu trúc

  • CHAPTER 1: BASIC KNOWLEDGE LO1: Examine networking principles and their pro- tocols (8)
    • I. P1) Discuss the benefits and constraints of different network types and standards.6 1. What is network? (8)
      • 1.1 Define network (8)
      • 1.2 Network type (MAN, WAN,LAN etc.) (10)
      • 1.3 Benefit of the network (12)
      • 1.4 Protocol and Standards (12)
      • 1.5 List some protocols : TCP/IP, HTTP,DNS,ICMP (21)
      • 1.6 List some standard organnizations and standard names (23)
    • II. P2)Network topology & communication and Bandwidth requirement (23)
      • 2. Discuss the Impact of topology (24)
      • 3. Examples of topology with diagrams (Bus, Ring, Star, Tree, Hybrid, Mesh) (24)
    • III. P3) Discuss the operating principles of networking devices and server types (29)
    • IV. M1) Compare common networking principles and how protocols enable the ef- (39)

Nội dung

LIST OF ACRONYMACL Access Control List ADSL Asymmetric Digital Subscriber Line ARCNET Attached Resource Computer Network ARP Address Resolution Protocol Bit Binary Digit DHCP Dynamic Hos

BASIC KNOWLEDGE LO1: Examine networking principles and their pro- tocols

P1) Discuss the benefits and constraints of different network types and standards.6 1 What is network?

-A network could be a system consisting of many computers (at least 2 computers within the same system) that are connected to every other through physical transmission lines in line with a particular structure.

-The function of a network is to form data exchange and resource sharing between computers within the system easier without using external devices like USB, memory cards, and disks CD…

-A complete electronic network system will include the subsequent parts: Terminals, transmission medium, physical connection equipment, and connection software.

Terminals, such as computers, phones, printers, scanners, and cameras, serve as endpoints within a network These terminals establish connectivity through physical connection devices like wires, modules, and switches, which facilitate direct links between different terminals.

-Connection software: kind of like the transmission medium, connection software is the program and application installed on the terminal devices and has the function of sharing data over wireless transmission lines.

-There are four common styles of computer networks today: LAN, MAN, WAN, and PAN Below, we are going to share thoroughly each kind of network.

-Metropolitan Area Network (MAN Network)

-Wide Area Network (WAN Network)

-Local Area Network (LAN Network)

Performed Student: Nguyen Trinh Anh Tuan

-The client-server model (client-server network model) is a distributed application architecture It partitions tasks or workloads between resource or service providers, called servers, and service requesters (Clients) In the Client-Server architecture, when the Client sends a request for data to the server over the Internet, the server accepts the requested process Then send the requested data packets back to the client Clients do not share any of their resources.

In the realm of computing, a client refers to a computer or host device that utilizes services provided by a remote server This relationship can be likened to a traditional client-server dynamic, where the client requests and receives information or services from the server.

-A peer to peer (P2P) network is a distributed application architecture that partitions tasks or workloads among peers Peers are devices participating in the application with equal privileges They form a peerto-peer network of nodes.

-Peers make a portion of their resources, such as processing power, disk storage, or network bandwidth, available to other participants without the need for central coordination of a stable server or host Peers are both providers and consumers of resources It differs from the traditional client-server model in that resource consumption and provision are split.

-Previously, the peer-to-peer system was used in many application areas This architecture was popularized by the file sharing system Napster, released in 1999 This concept has inspired new structures and philosophies in many areas of human interaction In such a social context, peer-to-peer as a meme refers to the egalitarian social network that has emerged throughout society, enabled by Internet technology in general.

1.2 Network type (MAN, WAN,LAN etc.)

Local Area Networks (LANs) connect computers within a limited area, such as a home or office, enabling devices to share data and resources This connectivity allows organizations and individuals to manage internal data effectively and facilitate communication within a network LANs also enable mobile devices like smartphones, laptops, and tablets to access the internet, enhancing productivity and efficiency in modern workspaces.

-Can run large online applications thanks to strong bandwidth

-Cheap and easy to manage

-Can only transmit in a certain space because the transmission line is short.

Metropolitan Area Networks (MANs), also referred to as urban networks, interconnect multiple Local Area Networks (LANs) using various transmission methods Designed for large-scale connectivity within cities or towns, MANs enable organizations and businesses with dispersed branches to seamlessly connect their networks, allowing for efficient communication and resource sharing.

Performed Student: Nguyen Trinh Anh Tuan departments connected to each other.

Man network is often used for businesses because this model provides many types of services such as connecting lines via voice (voice), data (data), video (image), and deploying applications easily.

- Advantages of MAN network The large connection range makes the interaction between business parts easy, efficient, low cost, stable transmission speed, information security, and simple management.

Can connect with high speed up to 1Gb/s to run the state, change information, develop ecommerce.

Popular with large bandwidth needs in big cities like Hanoi and Ho Chi Minh City

-There is a wide variety of services, maximized on modern bandwidth, service by providing service in the present and in the future, improving the broadband network service will be highly profitable network. Constaint:

The connection is quite large

Have average bandwidth to run banking operations

-WAN (Wide Area Network), also known as wide area network, is a combination of urban networks including MAN and LAN through satellite equipment, optical cables, and power cables.

Wide area network was created to connect on a large scale across the country The protocol used in the WAN is TCP/IP, the bandwidth varies depending on the installation location.

- Advantages of WAN Large connectivity, no signal limitation, easy information sharing, data storage Relative transmission speed varies by region or transmission device.

It can both connect to private networks and create connections on a global scale.

Can transmit signal over long distances and unlimited.

User access rights can be controlled.

Information can be shared easily and quickly.

Weak connection because of low bandwidth.

-The Internet is extremely important and brings a lot of benefits to the entire global humanity The Internet makes information transfer quickly, you can access information on the internet at almost any location on the globe For the sake of simplicity, to summarize the internet has the following benefits:

-Look up and learn a huge store of information online

-Help people do business, sell online, make money and increase jobs

-Linking friends and relatives through social networks like Facebook, vegetable garden Zalo

-Send and receive mail, read online news

-Watch movies, listen to music online, play games

-The protocol is a rule file that defines how to format, transmit, and receive data so that network computers - from servers and routers to endpoints - can communicate with each other, regardless of any differences in the base layer, design, or standard facilities To send and receive data successfully, devices on both sides of a communication exchange must accept and follow protocol conventions.

Performed Student: Nguyen Trinh Anh Tuan

P2)Network topology & communication and Bandwidth requirement

Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network Primarily, it is the topological structure of a computer network, and can be described in terms of physics and logic The physical topology (physical topology) is the arrangement of the various network elements, in- cluding equipment storage and cabling settings, while the logical topology (logical topology) specifies how the data flow in the network works Node distances, physical intersections, transmission rates, and or signal types can vary between two networks even though their topologies may be identical.

2 Discuss the Impact of topology

Physical topology defines the physical arrangement of devices connected within a Local Area Network (LAN) It involves the use of cables and hardware connections to establish the physical infrastructure that interconnects network components, ensuring data transmission and communication between devices Physical topology forms the backbone of a network's physical structure, influencing factors such as data flow, network performance, and fault tolerance.

Logical Topology: Logical Topology is Logical Topology The logical topology can be automatically maintained and reconfigured by using network devices such as routers and switches The topology is opposed to physical topology, which refers to the physical interconnection of all network devices.

A logical topology is a concept in a network that defines the architecture of the communication mechanism for all nodes in a network Using network devices such as routers and switches, the logical topology of a network can be automatically maintained and reconfigured The topology is anti-logical with the physical topology, which refers to the physical interconnection of all devices in the network.

3 Examples of topology with diagrams (Bus, Ring, Star, Tree, Hybrid, Mesh)

Bus topology using a single cable connecting all nodes is included The main cable acts as a backbone for the

Performed Student: Nguyen Trinh Anh Tuan entire network One of the computers in the network acts as a server When it has 2 endpoints, it is called a linear BUS topology.

In a star topology, all computers connect with the help of a hub This cable is called the hub node and all other nodes are connected using this hub It is most popular on LANs because they are cheap and easy to set up.

In a Ring network, every device has exactly 2 neighbors for communication purposes It is called a ring structure, because its formation resembles a ring In this topology, every computer is connected to another computer Here, the last node is combined with the first node.

This topology uses tokens to transfer information from one computer to another In this topology, all messages go through a ring in the same direction.

Mesh topology has a unique network design in which each computer on the network connects to each other

It is developed a P2P connection between all network devices It provides a high degree of redundancy, so even if one network cable fails, data has an alternate path to its destination.

Partial Mesh Topology: In this type of topology, most of the connected devices are almost similar to a full topology The only difference is that at least the device is connected to only 2 or 3 devices.

Tree topology, akin to hierarchical topology, features a root node connected to all other nodes, akin to star topology This network structure entails integrating multiple star topologies into a single bus, resulting in a common network structure often employed in networking, comparable to star and bus topologies.

Performed Student: Nguyen Trinh Anh Tuan

Hybrid topology combines 2 or more topologies As shown in the figure, you can see in an office that uses two links: Start and P2P Hybrid topologies are always created when 2 different underlying network topologies are connected.

5.Define Communications In Terms Of Networking.

A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any kind of variation of a physical quantity The protocol defines the rules, syntax, semantics and synchronization of communication and possible error recovery methods Protocols may be implemented by hardware, software, or a combination of both.

Network communication, also known as internetworking, refers to a collection of protocols (rules and standards) that allow application programs to communicate with one another regardless of the hardware and operating systems on which they are executed Internetworking enables application programs to interact with one another regardless of their physical network connectivity.

Protect your data, do not rely on the network Recognize the danger.Design service protection as close to the service as possible Publish routes by default.Encrypt without compromising performance Protect yournetworks.Layer your security.

Design for interworking and flexibility Use open standards Maximize the use of commoditized services.Consolidate the use of data networks and migrate to IP-based technologies Publish DNS names.Join up to provide resilience.Understand the user

Understand your basic network requirements Design networks for a roaming user base.

Design services to be accessed broader than your department Design for organizations who share a site to share the site's network Be able to support your users.

Bandwidth requirements for the networks The term "bandwidth" is now widely used in technology and human life in general In the Website field, bandwidth refers to the maximum amount of data exchanged between a website or a server and a user in a given unit of time, usually a second The higher the bandwidth limit, the more data can be transferred (download/upload) Web access requests will be denied if bandwidth is exhausted Bits per second are the most commonly used unit of measurement for bandwidth Modern networks are frequently measured in millions of bits per second (Mbps) or billions of bits per second (bps) due to their high capacity (gigabits per second - Gbps).

Bandwidth requirements for the networks:

Bandwidth not only affects data upload and download speed, but also has a significant impact on your website Bandwidth or bandwidth web hosting is a parameter indicating the amount of transmission capacity between a website and a personal computer in a certain time In particular, the larger the bandwidth limit, the larger the amount of data allowed to be transmitted (upload or download) will become.

P3) Discuss the operating principles of networking devices and server types

Network switches are essential in connecting different network segments via a star topology, acting as a central hub for satellite devices like computers They establish temporary connections for data transfer, while also supporting Full Duplex technology Unlike other devices, switches expand the bandwidth of the transmission line, enhancing network efficiency and performance.

In simple terms, a Switch can be understood as a traffic policeman that routes the data of a local area network It has the ability to choose the path to decide to forward frames (units of the data link layer) so the LAN works more efficiently The switch is able to identify the machine it is connected to by reading the source MAC address in the frame it receives When two machines in the network communicate with each other, the switch itself creates a virtual circuit between the two respective ports without affecting traffic on other ports.

Step 1: PC-HN sends a packet to PC-SG via its own channel when connected to the switch.

Step 2: They will convert the data into a data frame, validate the MAC address in the data frame's source MAC field, and save the MAC address in the MAC address database alongside the incoming port number Step 3: Toggle checks the MAC address in the frame's destination mac field and the MACaddress-table to see if it is already in the table.

Step 4: If the destination mac address is already in the mac table, the switch looks for the corresponding outgoing port and forwards the unicast frame to that port.

Step 5: If the destination MAC address entry is not found in the MAC table, the switch will broadcast the frame data to all other connected ports.

Step 6: PC-NA, PC-DN, and PC-SG receive the frame as a packet and compare their IP addresses to the packet's destination IP address.

Step 7: PC-B and PC-C will reject the packet because their IP addresses do not match the packet's destination IP address PC-IP D's address, on the other hand, corresponds to the packet's destination IP address.

Step 8: PC-SG will send an acknowledgement packet to PC-HN.

Step 9: Convert to receive an acknowledgement frame from PC-SG on port 4, validate the MAC address in the source MAC field, and store the MAC address along with the incoming port number in the MAC address database.

Step 10: Validate the destination MAC address from the frame, check the MAC address table to confirm the MAC address entry The switch has learned and cached the MAC address of PC-HN, and now unicasts acknowledge the incoming packet to PC-A.

Step 11: When the switch learns the MAC addresses of all the PCs or nodes, it always sends unicast frames to the network's connected nodes.

Router (router or router) is a network device used to deliver data packets to end devices In a word, Router is a device to share the Internet to many other devices in the same network layer.

If the router cannot locate the configuration file, it enters setup mode The setting will be saved in the NV-Ram when done in setup mode.

Step 1: Start the network router by loading bootstrap The following are the three steps in the process of starting the IOS software: - Hardware testing -> IOS software download -> Locate and execute the startup configuration file Following the POST procedure, the router will perform the following actions: To begin, use the bootstrap loader from Rom gzip.

Step 2: Locate the IOS on flash drives ornetworks

Step 3: Download and install the operating sy tem.

Step 4: The configuration file in the NV-Ram is copied to the main memory and executed line by line Set network communication port addresses and use the routing command

Step 5: If the configuration file does not exist in the NV-Ram, the operating system will attempt to connect to the TFTP server If no TFTP is found, the installation mode will begin

3.Other commonly used networking devices

Hub is the central point of connection for devices in the network They are used to connect LANs, they have a lot of ports to do that When a packet arrives at one port, it is copied to other ports so that other ports can recognize the packet.

Performed Student: Nguyen Trinh Anh Tuan

The Switch functions as the central hub for data transfer, enabling other devices to connect and exchange information Notably, advanced Switch devices implementing Full Duplex technology enhance transmission line bandwidth, optimizing data flow efficiency and supporting a wider range of applications and devices.

Router (router or router) is a network device used to deliver data packets to end devices In a word, Router is a de- vice to share the Internet to many other devices in the same network layer.

Gateway is a specialized term for telecommunications, information technology, used in the process of running data Gateway has many benefits, so it is widely used in the market today.

Gateway is a specialized term for telecommunications, information technology, used in the process of running data Gateway has many benefits, so it is widely used in the market today.

Modem is an acronym for Modulator and Demodulator which means a modulator and demodulator to convert digital signals into analog signals and vice versa on a telephone network The modulated signal here can be any current communication electrical signal, regardless of the standard.

Performed Student: Nguyen Trinh Anh Tuan

WiFi Repeater is an indispensable device when you want to expand Internet coverage in your home or office

-An access point (AP) is a device that creates a wireless local area network, or WLAN, usually in an office or large building An access point is a station that transmits and receives data You can call them wifi transceivers.

4.List server types (web server, mail server, DB Serve, DNS Server, DHCP Server)

-Server also known as server is a computer (hardware and software) connected to a computer network or the in- ternet On the server install additional software or a dedicated computer Or multiple networked computers with storage capacity to serve and provide

M1) Compare common networking principles and how protocols enable the ef-

Make a comparison of network principles and explain how network protocol enable effective use of the network system

1 Compare LAN, CAN, MAN, WAN

Networking allows computers to connect and communicate with others through any medium LAN, MAN, and WAN are three types of networks designed to work over the area they cover There are some similarities and differences between them.

One of the significant differences is in the geographical area they cover The LAN covers the smallest area; MAN has a larger area than LAN and WAN has the largest range.

In addition, LANs depend on their own communication hardware and devices to transmit signals In contrast, this cannot happen in the case of MAN and WAN, 2 networks that are required to use shared, private or leased communication hardware.

Ngày đăng: 10/05/2024, 22:12

TỪ KHÓA LIÊN QUAN