1. Trang chủ
  2. » Luận Văn - Báo Cáo

informationtechnology assignment 1 unit networking

55 0 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề InformationTechnology Assignment 1 Unit: Networking
Tác giả Nguyen Trinh Anh Tuan
Người hướng dẫn Truong Dang Hieu
Trường học BTEC FPT International College
Chuyên ngành Information Technology
Thể loại Assignment
Năm xuất bản 2022
Thành phố Da Nang
Định dạng
Số trang 55
Dung lượng 1,64 MB

Cấu trúc

  • I. P1) Discuss the benefits and constraints of different network types and standards (11)
    • 1.2 Network type (MAN, WAN,LAN etc.) (14)
    • 1.3 Benefit of the network (16)
    • 1.4 Constraint of the network (17)
    • 1.5 Protocol and Standards (18)
    • 1.6 List some protocols : TCP/IP, HTTP,DNS,ICMP.................................................................................... 17 Internet Protocol (IP) (25)
    • 1.6 List some standard organnizations and standard names (27)
  • II. P2)Network topology & communication and Bandwidth requirements (28)
  • III. P3) Discuss the operating principles of networking devices and server types (36)
  • IV. P4) Discuss the inter-dependence of workstation hardware with relevant networking software (46)
  • V. M1) Compare common networking principles and how protocols enable the effectiveness of (48)

Nội dung

Computer networks connect devices, allow them to exchange data, and facilitate sharing of information and resources.A network consisting of 2 ormore computers linked together to share re

P1) Discuss the benefits and constraints of different network types and standards

Network type (MAN, WAN,LAN etc.)

LAN (Local Area Network), also known as a local area network, is used in a limited area with high transmission speed.

Devices using LAN can share resources with each other, typically sharing files, printers, and some other devices.

High transmission speed, support to connect many devices quickly Although limited in connection range, it costs less, uses less wires, and is easy to administer.

MAN (Metropolitan Area Network), also known as urban network, links from many LANs via cables, other transmission means, The ability to connect in a large range such as in a town or city , conscious.

The MAN network model is often used mainly for organizations and businesses with many branches and departments connected to each other.

Man network is often used for businesses because this model provides many types of services such as connecting lines via voice (voice), data (data), video (image), deploying applications easily .

- Advantages of MAN network network The large connection range makes interaction between business parts easy, efficient, low cost, stable transmission speed, information security, simple management.

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

WAN (Wide Area Network), also known as wide area network, is a combination of urban networks including MAN and LAN through satellite equipment, optical cables, and power cables.

Wide area network was created to connect on a large scale across the country The protocol used in the

WAN is TCP/IP, the bandwidth varies depending on the installation location.

Large connectivity, no signal limitation, easy information sharing, data storage Relative transmission speed varies by region or transmission device.

Benefit of the network

The Internet is extremely important and brings a lot of benefits to the entire global humanity The Internet makes information transfer quickly, you can access information on the internet at almost any location on the globe For the sake of simplicity, to summarize the internet has the following benefits: High speed

Can run large online applications thanks to strong bandwidth

Cheap and easy to manage

Look up and learn a huge store of information online

Help people do business, sell online, make money and increase jobs

Linking friends and relatives through social networks like Facebook, vegetable garden Zalo

Send and receive mail, read online news

Watch movies, listen to music online, play games

Constraint of the network

A constraint network represents a mathematical relationship between several variables and is able to compute the value of any one of these variables given the values of all the others.

There are two types of nodes in a constraint network: cells and constraints Cells represent variables (read-only cells represent constants) and constraints represent primitive mathematical relationships such as z = x + y and z = x * y The neighbors of a constraint are the cells that it constrains The neighbors of a cell are the constraints that constrain it.

Figure1- 6 Constraint of the network

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

Protocol and Standards

2 The protocol is a rule file that defines how to format, transmit, and receive data so that network

3 computers - from servers and routers to endpoints - can communicate with each other, regardless of any

4 differences in the base layer, design, or standard facilities

6 To send and receive data successfully, devices

18 on both sides of a communication exchange must accept

7 and follow protocol conventions Network protocol support can be built into the software, hardware, or

10.Standardized network protocols provide network devices with a common language Without them,

11.computers would be unable to communicate with one another As a

PERFOMED STUDENT: Nguyen Trinh Anh Tuan result, except for networks explicitly

12.designed for a specific architecture, only a few networks can function, and the internet as we know it

To communicate with one another, almost all end- users rely on network

15.The protocol is a rule file that defines how to format, transmit, and receive data so that network

16.computers - from servers and routers to endpoints - can communicate with each other, regardless of any

17.differences in the base layer, design, or standard facilities

19.To send and receive data successfully, devices on both sides of a communication exchange must accept

20.and follow protocol conventions Network protocol support can be

PERFOMED STUDENT: Nguyen Trinh Anh Tuan built into the software, hardware, or

23.Standardized network protocols provide network devices with a common language Without them,

24.computers would be unable to communicate with one another As a result, except for networks explicitly

25.designed for a specific architecture, only a few networks can function,

22 and the internet as we know it

To communicate with one another, almost all end- users rely on network

The protocol is a rule file that defines how to format, transmit, and receive data so that network computers - from servers and routers to endpoints - can communicate with each other, regardless of any differences in the base layer, design, or standard facilities To send and receive data successfully, devices on both sides of a communication exchange must accept and follow protocol conventions Network protocol support can be built into the software, hardware, or both Standardized network protocols provide network devices with a common language Without them, computers would be unable to communicate with one another As a result, except for networks explicitly designed for a specific architecture, only a few networks can function, and the internet as we know it today would not exist To communicate with one another, almost all end-users rely on network protocols.

A protocol is a set of established rules that define how to format, transmit, and receive data so that computer network devices - from servers and routers to endpoints - can communicate with each other , regardless of the differences in infrastructure, design, or basic standards between them.

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

An Internet standard is a specification that is very beneficial to the Internet, has proven to be mature, and is supported by the general public This title is awarded by the Internet Architecture Council on the recommendation of the Internet Engineering Task Force (IETF) Standardized procedures were introduced in late 1988 The whole process takes at least a few months and often takes several years In many cases, it is postponed indefinitely Each Internet standard is either a selected Request for

Comments, or a set of multiple RFCs.

A network protocol is a set of rules that a network must follow Network protocols are formal standards and policies made up of rules, procedures, and formats that define communication between two or more devices over a network.

List some protocols : TCP/IP, HTTP,DNS,ICMP 17 Internet Protocol (IP)

The Internet Protocol Suite is a collection of protocols that implement the protocol stack on which the Internet runs The Internet Protocol Suite is sometimes referred to as the TCP/IP protocol suite TCP and

IP are important protocols in the Internet Protocol Suite - Transmission Control Protocol (TCP) and Internet Protocol (IP) The Internet Protocol Suite is similar to the OSI model, but with some differences Also, not all layers correspond well.

HTTP is the data communication platform for the World Wide Web Hypertext is structured text that uses hyperlinks between nodes containing the text HTTP is an application protocol for distributed and hybrid hypermedia information systems.

HTTP's default port is 80 and 443 Both of these ports are secure.

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

DNS (Domain Name System) or domain name resolution system, can be explained as a system that helps humans and computers "communicate" with each other more easily (Because of their communication language) We are names and letters, and computers can only understand sequences of numbers!) The system helps to translate domain names (hostnames) into strings of numbers, so that computers can understand.

ICMP( Internet Control Message Protocol)

ICMP stands for Internet Control Message Protocol Readers can understand simply a protocol of the Internet Protocol packet, also known as the control protocol on the network.

ICMP is used to report errors that occur during the transmission of data packets on the network Or used to probe and manage the operation of the network.

List some standard organnizations and standard names

ITU - International Telecommunication Union is an association of national unions, based in

Switzerland, founded in 1947, whose members include major government and telecommunications companies.

IEEE: Institute of Electrical and Electronics Engineers): is a non-profit organization, op erating since

1963, with more than 360,000 members (in 2010) including engineers, scientists, students worldwide. IETF: Internet Engineering Task Force) is also an organization that develops standards related to wireless technology

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

P2)Network topology & communication and Bandwidth requirements

Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network Primarily, it is the topological structure of a computer network, and can be described in terms of physics and logic The physical topology (physical topology) is the arrangement of the various network elements, including equipment storage and cabling settings, while the logical topology (logical topology) specifies how the data flow in the network works Node distances, physical intersections, transmission rates, and/or signal types can vary between two networks even though their topologies may be identical.

2.Discuss the Impact of topology

➢Physical Topology: Physical topology is Physical topology The interconnected topology of a local area network is physical topology (LAN) Connecting physical devices on a network using cables and cables forms the physical topology

➢ Logical Topology: Logical Topology is Logical Topology The logical topology can be automatically maintained and reconfigured by using network devices such as routers and switches The topology is opposed to physical topology, which refers to the physical interconnection of all network devices.

A logical topology is a concept in a network that defines the architecture of the communication mechanism for all nodes in a network Using network devices such as routers and switches, the logical topology of a network can be automatically maintained and reconfigured The topology is anti-logical with the physical topology, which refers to the physical interconnection of all devices in the network.

3.Examples of topology with diagrams (Bus, Ring, Star, Tree, Hybrid, Mesh)

Bus topology using a single cable connecting all nodes is included The main cable acts as a backbone for the entire network One of the computers in the network acts as a server When it has 2 endpoints, it is called a linear BUS topology.

In a star topology, all computers connect with the help of a hub This cable is called the hub node and all other nodes are connected using this hub It is most popular on LANs because they are cheap and easy to set up

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

In a Ring network, every device has exactly 2 neighbors for communication purposes It is called a ring structure, because its formation resembles a ring In this topology, every computer is connected to another computer Here, the last node is combined with the first node.

This topology uses tokens to transfer information from one computer to another In this topology, all messages go through a ring in the same direction

Mesh topology has a unique network design in which each computer on the network connects to each other It is developed a P2P connection between all network devices It provides a high degree of redundancy, so even if one network cable fails, data has an alternate path to its destination.

Partial Mesh Topology: In this type of topology, most of the connected devices are almost similar to a full topology The only difference is that at least the device is connected to only 2 or 3 devices.

A tree topology has a root node and all other nodes connected together forming a hierarchy So it is also known as hierarchical topology This topology integrates different star topologies in a single bus, so it is called star topology Tree topology is a very common network similar to star and bus topology.

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

Hybrid topology combines 2 or more topologies As shown in the figure, you can see in an office that uses two links: Start and P2P Hybrid topologies are always created when 2 different underlying network topologies are connected.

5.Define Communications In Terms Of Networking.

Network communication, also known as internetworking, refers to a collection of protocols (rules and standards) that allow application programs to communicate with one another regardless of the hardware and operating systems on which they are executed Internetworking enables application programs to interact with one another regardless of their physical network connectivity.

Protect your data, do not rely on the network

Design service protection as close to the service as possible

Design for interworking and flexibility

Maximize the use of commoditized services

Consolidate the use of data networks and migrate to IP-based technologies

Join up to provide resilience

Understand your basic network requirements

Design networks for a roaming user base

Design services to be accessed broader than your department

Design for organizations who share a site to share the site's network

Be able to support your users.

➢ Bandwidth requirements for the networks

The term "bandwidth" is now widely used in technology and human life in general In the Website field, bandwidth refers to the maximum amount of data exchanged between a website or a

PERFOMED STUDENT: Nguyen Trinh Anh Tuan server and a user in a given unit of time, usually a second The higher the bandwidth limit, the more data can be transferred

(download/upload) Web access requests will be denied if bandwidth is exhausted

Bits per second are the most commonly used unit of measurement for bandwidth Modern networks are frequently measured in millions of bits

34 per second (Mbps) or billions of bits per second (bps) due to their high capacity (gigabits per second - Gbps).

➢ Bandwidth requirements for the networks The term "bandwidth" is now widely used in technology and human life in general In the Website field, bandwidth refers to the maximum amount of data exchanged between a website or a server and a user in a given unit of time, usually a second The higher the bandwidth limit, the more data can be transferred (download/upload) Web access requests will be denied if bandwidth is exhausted Bits per second are the most commonly used unit of measurement for bandwidth Modern networks are frequently measured in millions of bits per second (Mbps) or billions of bits per second (bps) due to their high capacity (gigabits per second - Gbps).

III Discuss the operating principles of

PERFOMED STUDENT: Nguyen Trinh Anh Tuan networking devices and

P3) Discuss the operating principles of networking devices and server types

III (P3) Discuss the operating principles of networking devices and server types.

Switch is an important switching device in the network, used to connect network segments together in a star model In this model, the switch plays a central role and all other satellite devices including computers are connected here, thereby creating a temporary connection for data transfer In addition, the Switch supports Full Duplex technology to expand the bandwidth of the transmission line, which other devices cannot do.

In simple terms, a Switch can be understood as a traffic policeman that routes the data of a local area network It has the ability to choose the path to decide to forward frames (units of the data link layer) so the LAN works more efficiently The switch is able to identify the machine it is connected to by reading the source MAC address in the frame it receives When two machines in the network communicate with each other, the switch itself creates a virtual circuit between the two respective ports without affecting traffic on other ports.

Step 1: PC-HN sends a packet to PC-SG via its own channel when connected to the switch

Step 2: They will convert the data into a data frame, validate the MAC address in the data frame's source MAC field, and save the MAC address in the MAC address database alongside the incoming port number Step 3: Toggle checks the MAC address in the frame's destination mac field and the MACaddress-table to see if it is already in the table

Step 4: If the destination mac address is already in the mac table, the switch looks for the corresponding outgoing port and forwards the unicast frame to that port

Step 5: If the destination MAC address entry is not found in the MAC table, the switch will broadcast the frame data to all other connected ports

Step 6: PC-NA, PC-DN, and PC-SG receive the frame as a packet and compare their IP addresses to the packet's destination IP address

Step 7: PC-B and PC-C will reject the packet because their IP addresses do not match the packet's destination IP address PC-IP D's address, on the other hand, corresponds to the packet's destination IP address

Step 8: PC-SG will send an acknowledgement packet to PC-HN

Step 9: Convert to receive an acknowledgement frame from PC-SG on port 4, validate the MAC address in the source MAC field, and store the MAC address along with the incoming port number in the MAC address database

Step 10: Validate the destination MAC address from the frame, check the MAC address table to confirm the MAC address entry The switch has learned and cached the MAC address of PC-HN, and now unicasts acknowledge the incoming packet to PC-A

Step 11: When the switch learns the MAC addresses of all the PCs or nodes, it always sends unicast frames to the network's connected nodes.

Router (router or router) is a network device used to deliver data packets to end devices In a word, Router is a device to share the Internet to many other devices in the same network layer.

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

If the router cannot locate the configuration file, it enters setup mode The setting will be saved in the NV-Ram when done in setup mode

Step 1: Start the network router by loading bootstrap The following are the three steps in the process of starting the IOS software: - Hardware testing -> IOS software download -> Locate and execute the startup configuration file Following the POST procedure, the router will perform the following actions:

To begin, use the bootstrap loader from Rom gzip

Step 2: Locate the IOS on flash drives or networks

Step 3: Download and install the operating system

Step 4: The configuration file in the NV-Ram is copied to the main memory and executed line by line Set network communication port addresses and use the routing command

Step 5: If the configuration file does not exist in the NV-Ram, the operating system will attempt to connect to the TFTP server If no TFTP is found, the installation mode will begin

3.Other commonly used networking devices

Hub is the central point of connection for devices in the network They are used to connect LANs, they have a lot of ports to do that When a packet arrives at one port, it is copied to other ports so that other ports can recognize the packet.

Switch is the central device and all other devices will connect to this device to transfer data In addition, more modern Switch devices that support Full Duplex technology are also used to expand the bandwidth of the transmission line.

Router (router or router) is a network device used to deliver data packets to end devices In a word, Router is a device to share the Internet to many other devices in the same network layer.

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

A bridge, also known as a bridge, is a networking device that connects multiple LANs (local area networks) together to form a larger LAN The process of aggregating networks is called networking.

Gateway is a specialized term for telecommunications, information technology, used in the process of running data Gateway has many benefits, so it is widely used in the market today.

Modem is an acronym for Modulator and Demodulator which means a modulator and demodulator to convert digital signals into analog signals and vice versa on a telephone network The modulated signal here can be any current communication electrical signal, regardless of the standard.

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

WiFi Repeater is an indispensable device when you want to expand Internet coverage in your home or office

An access point (AP) is a device that creates a wireless local area network, or WLAN, usually in an office or large building An access point is a station that transmits and receives data You can call them wifi transceivers.

4.List server types (web server, mail server, DB Serve, DNS Server, DHCP Server)

Server also known as server is a computer (hardware and software) connected to a computer network or the internet On the server install additional software or a dedicated computer Or multiple networked computers with storage capacity to serve and provide

P4) Discuss the inter-dependence of workstation hardware with relevant networking software

1.Explain What Is Meant By Interdependencies

Network interface card (NIC) Establishes and manages the computer’s network connection

Translates digital computer data into signals (appropriate for the networking medium) for outgoing messages and translates signals into digital computer data for incoming messages

Device driver: a small, specialized program that represents a device to an OS and manages communications between the OS and NIC

EX: The web browser communicates with the webserver to retrieve web page data using the hypertext transfer protocol (HTTP) It is a TCP / IP-based communication protocol that provides data on the World Wide Web It provides standards for computers to communicate with each other

HTTP determines how the client requests to build and send data to the server; and how the server responds to these requests

HTTP client: is a program (Web browser or another client) used to establish a connection to the server to send one or more HTTP request messages HTTP server: is a program (Apache webserver or Network Information Service - IIS) used to accept connections to the server from HTTP requests by sending HTTP feedback Moreover, a web client wants to get information from a web server They start with the web interface on the client's pc to take the command request Then the web client communicates with the webserver through a NIC card to take HTTP packets from the webserver The web client takes the HTTP from the web server and shows it on applications to the users

Conclusion: workstation hardware with relevant networking software is dependent on each other, as they must communicate with each other but achieve that, they need support from some hardware components Additionally, the hardware requires a driver to manage communications between the os and the hardware.

Computer hardware is the physical components that computer systems require in order for it to function.

It covers everything with a circuit board that works in a PC or laptop; includes 1 motherboard, graphics cards, CPU (Central Processing Unit), ventilation fan, webcam, power supply, and so on.

Workstations have input/output devices such as keyboards, mice, etc like regular computers, but they are equipped with quality components, durable, professional, and more durable than regular computers A server is a type of computer that does not have input/output devices like workstations and ordinary computers.

Equipped with the latest generation configuration, there is a dedicated graphics card that is rarely found in regular PC models Quickly handle heavy tasks such as complex graphics processing The processing ability of computers and servers is slow and often takes a long time.

The workstation uses extremely powerful CPU performance with high frequency, the workstation is equipped with an Intel Core i7 or Intel Xeon processor instead of a CORE I CPU like a regular computer The workstation is capable of multi-threading, has a high cache, and fast CPU speed of up to 4.0Ghz.

The workstation's RAM is usually 16GB, has the highest clock speed at the moment, can be upgraded to a maximum of 4 RAM slots, and speed up image rendering in seconds And especially the memory has the function of self-checking and correcting errors ECC Memory that computers usually do not have.

- GraphicsWorkstation GPUs are different from regular PCs The state machine is equipped with the most dedicated graphics card It should be used specifically for graphics applications while conventional computers are limited in graphics, so they are often used for office applications.

- Hard Drive The workstation's hard drive is designed as a hybrid between HDD, with the highest rotational speed of 7200rpm, so it is very safe, and the computer's rotation speed usually falls to 5400rpm, very few machines have a speed of 7200rpm SSD PCle uses the latest technology to provide fast access speed while ensuring a large capacity for data storage.

A high-end anti-glare IPS technology screen is integrated into the machine, with screens from 15.6inch to 17.3inch and Full HD resolution up to 4K The most accurate color and contrast, the screen has a wider viewing angle, and the image is not distorted,

Networking software is applications that help you connect computers to each other, VPN connections, firewall software, or IP changing software Some typical network software include: TeamViewer, Connectify Hotspot, Hamachi or Hotspot Shield Free VPN

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

3.Discuss and explain the interdepencies of workstation hardware with networking software Derive an example form your discussion

A network is formed when more than one computer is joined together for communication There are additional servers in a network that provide many data storage sites For servers to handle so many computers, an operating system is necessary When a laptop submits an internet request to a server, many scheduling algorithms decide which request receives which resource That is how a piece of software communicates with the hardware of a workstation

A network is more capable than a single computer designed for individual use Because they are PCs with their software and storage, they may be used independently of the mainframe

A network interface card (NIC) is a piece of computer hardware that enables computers to connect to a network, most often a local area network

A network interface card is a piece of computer hardware that allows computers to connect to a network, most often a local area network.

M1) Compare common networking principles and how protocols enable the effectiveness of

Make a comparison of network principles and explain how network protocol enable effective use of the network system

1.Compare LAN, CAN, MAN, WAN

Networking allows computers to connect and communicate with others through any medium LAN, MAN, and WAN are three types of networks designed to work over the area they cover There are some similarities and differences between them.

One of the significant differences is in the geographical area they cover The LAN covers the smallest area; MAN has a larger area than LAN and WAN has the largest range.

In addition, LANs depend on their own communication hardware and devices to transmit signals In contrast, this cannot happen in the case of MAN and WAN, 2 networks that are required to use shared, private or leased communication hardware.

Table 1Compare LAN,WAN,MAN

Comparison Base LAN MAN Wan

Full name Local Area Network Metropolitan Area

Meaningful A network connects a group of computers in a small geographical area.

The network covers relatively large areas such as cities and towns

It spans large areas and connects countries Internet example

Network Ownership Private Private or public Private or public

Design and maintenance Easily Difficult Difficult

Delay on transmission Short Medium Long

Fault Tolerance (ability to continue working when one or more components fail)

Jam Infrequent Happens more Happens more

Used for School, hospital Small Town, City Country/Continent.

Allow A single device pair communicates.

Multiple computers can simultaneously interact.

A large number of computers communicate at the same time.

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

2.Compare physical topologies and logical topologies.

Table 2 Compare physical topologies and logical topologies

3.Compare between OSI reference model and TCP/IP reference model

OSI and TCP/IP model comparison table

– Similarities: The OSI and TCP/IP models have some things in common as follows:

OSI and TCP/IP both have layered architectures.

OSI and TCP/IP both have a Network layer and a Transport layer.

OSI and TCP/IP both use Packet transfer technology.

– Difference: The tcp/ip vs osi comparison table below will help you understand the basic differences between these two network protocols.

Content OSI model TCP/IP model

Reliability and popularity Many people think that this is an old model, just for reference, the number of users is more limited than TCP/IP

Standardized, trusted by many people and used globally

Approach Vertical approach Horizontal approach

Combination of floors Each different floor will perform a different task, there is no combination of

In the application layer, the presentation layer and the session

50 any floor layer are combined

Design Develop the model first, then develop the protocol

Protocols are designed first, then models are developed

The media Supports both routed and wireless connections

Supports connectionless communication from the network layer

Dependency Protocol independent Depends on the protocol

As we know, both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are the most widely used Internet protocols.

Among them, TCP is a connection-oriented protocol That is, once a connection is established, data can be sent bidirectionally Meanwhile, UDP is a simpler connectionless Internet protocol Many messages are sent as packet in chunks using UDP On the basis of the characteristics and properties of the two protocols, we can distinguish between UDP and TCP.

Characteristics TCP (Transmission Control Protocol) UDP (User Datagram

An information transfer protocol that uses data to be transferred between systems over a network In it, the data is transmitted in the form of packets It includes error checking, ensuring the delivery and maintaining the order of the packets.

Similar to TCP protocol But error checking and data recovery are not guaranteed

If you use this protocol, data will be sent continuously, regardless of the problem at the receiving end.

2 Design TCP is a connection oriented protocol UDP is a connectionless protocol.

3 Reliability Because TCP provides error checking support and also ensures delivery of data to the destination This makes it more reliable than UDP.

On the other hand, UDP only provides basic error checking support using checksums So delivery of data to the destination cannot be guaranteed in UDP compared to TCP.

In TCP, data is transmitted in a specific sequence This means that the packets arrive at the receiver in order.

In UDP there is no sequence of data To do the ordering it must be managed by the application layer.

5 Performance TCP is slower and less efficient in terms of performance than UDP In addition,

UDP is faster and more efficient than TCP.

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

TCP is also heavier than UDP.

6 Retransmission It is possible to retransmit the packet in TCP in case the packet is lost or needs to be resend.

Unable to retransmit packets in UDP.

After completing this report, I understood what an algorithm is, its properties, its characteristics, how it is represented inside the algorithm, how to make a good algorithm, Network server language What is LAN, Server Matters and Protocols and Standards of Computer Networks Through that, I learned a lot more basic knowledge as well as new extended knowledge

PERFOMED STUDENT: Nguyen Trinh Anh Tuan

After this Assignment, I have mostly completed the content I have learned about networks, bandwidth, and computer network devices I know how to build a computer network on a small scale, know the rules and understand which servers should businesses use for work, so in Assignment, I deserve an M.

Ngày đăng: 10/05/2024, 22:12