Unit 2 - Assignment 1 Brief
Unit 2 - Assignment 1 Brief
IV name and date Khoa Canh Nguyen, Nhung, Michael Omar 9th/01/2020
Submission format
Part 1
The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs
and subsections as appropriate, and all work must be supported with research and referenced using the
Harvard referencing system. Please also provide a bibliography using the Harvard referencing system. The
recommended word limit is 2,000–2,500 words, although you will not be penalized for exceeding the total
word limit.
Part 2
You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all
work must be supported with research and referenced using the Harvard referencing system.
Assignment Brief
You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which have branches in Ho Chi Minh City, Hanoi, Da Nang and Can Tho.
The company has been contracted to implement a networking project from a local educational institute. The
specification of the project is given below:
People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the
head of academics and the programme manager, 3 computer network administrators.
Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located
on the first floor and another located on the second floor
As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain networking
principles, protocols and devices and submit a report.
Part 1
5. Discussion on operating principles of networking devices and server types and networking software.
7. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization.
8. For the given specification, identify the topology protocol for the efficient utilization of a networking
system.
The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification
from the institution, as given earlier.
You need to design and implement the networking project within a given timeframe:
Part 2 Design efficient networked systems
1. Prepare a written step-by-step plan of how you are going to design a Local Area Network including a
blueprint of your LAN.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications.
4. Justify the security requirements and quality of services needed for selection of accessories.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
ASSESMENT CRITERIA
Learning Outcomes and Assessment Criteria
TABLE OF CONTENTS
P1) Discuss the benefits and constraints of different network types and standards: ................................9
1) Types of network:....................................................................................................................................9
1.1) Local area network (LAN):.................................................................................................................9
1.1.1) Definition of LAN:..............................................................................................................9
1.1.2) Benefits of LAN:.................................................................................................................9
1.1.3) Constraints of LAN:..........................................................................................................10
1.2) Wide area network (WAN):.............................................................................................................10
1.2.1) Definition of WAN:...........................................................................................................10
1.2.2) Benefits of WAN:.............................................................................................................11
1.2.3) Constraints of WAN:........................................................................................................12
1.3) Metropolitan area network (MAN):................................................................................................13
1.3.1) Definition of MAN:...........................................................................................................13
1.3.2) Benefits of MAN:.............................................................................................................14
1.3.3) Constraints of MAN:........................................................................................................14
1.4) Internet:..........................................................................................................................................14
1.4.1) Definition of Internet:......................................................................................................14
1.4.2) Benefits of the Internet:...................................................................................................15
1.4.3) Constraints of Internet:....................................................................................................16
2) Network protocol:..................................................................................................................................16
2.1) Definition of Network Protocol:......................................................................................................16
2.2) The OSI model:................................................................................................................................16
2.2.1) Physical Layer (First layer):..............................................................................................17
2.2.2) Datalink Layer (Second layer):.........................................................................................18
2.2.3) Network Layer (Third layer):............................................................................................18
2.2.4) Transport Layer (Forth Layer):..........................................................................................18
2.2.5) Session Layer (Fifth Layer):...............................................................................................18
2.2.6) Presentation Layer (Sixth layer):......................................................................................18
2.2.7) Application Layer (Seventh layer):...................................................................................18
2.3) Some kinds of Network Protocol:...................................................................................................19
2.3.1) HTTP:...............................................................................................................................19
2.3.2) TCP/IP:............................................................................................................................19
2.3.3) ICMP:...............................................................................................................................19
2.3.4) DNS:................................................................................................................................19
2.4) Some standard organizations and standards names:.....................................................................20
2.4.1) ISO:..................................................................................................................................20
2.4.2) ANSI:...............................................................................................................................20
2.4.3) ITIC:.................................................................................................................................20
2.4.4) IEEE:................................................................................................................................20
2.4.5) TIA:..................................................................................................................................20
P2) Explain the impact of network topology, communication and bandwidth requirements: ................21
1) Definition of Network Topology:...........................................................................................................21
2) Types of Network Topology:..................................................................................................................21
2.1) Star Topology:.................................................................................................................................21
2.2) Bus Topology:..................................................................................................................................22
2.3) Ring Topology:.................................................................................................................................23
2.4) Tree Topology:................................................................................................................................23
2.5) Mesh Topology:...............................................................................................................................24
2.6) Hybrid Topology:.............................................................................................................................25
3) Communication and Bandwidth:...........................................................................................................25
3.1) Commutations in terms of networking:..........................................................................................25
3.2) Rules of communication:................................................................................................................26
3.3) Bandwidth requirements for networks:.........................................................................................26
P3) Discuss the operating principles of networking devices and server types: .......................................27
1) Operating principles some of networking devices:...............................................................................27
1.1) Repeater:.........................................................................................................................................27
1.2) Hub:.................................................................................................................................................27
1.3) Bridge:.............................................................................................................................................27
1.4) Switch:.............................................................................................................................................28
1.5) Router:............................................................................................................................................29
2) Operating principles of some network servers:.....................................................................................29
2.1) File server:.......................................................................................................................................29
2.2) Print server:.....................................................................................................................................30
2.3) Applications server:.........................................................................................................................30
2.4) DNS server:......................................................................................................................................31
2.5) Mail server:.....................................................................................................................................31
2.6) Web server:.....................................................................................................................................32
2.7) Database server:.............................................................................................................................32
P4) Discuss the inter-dependence of workstation hardware with relevant networking software: ..........33
1) What is inter-dependence?...................................................................................................................33
2) Definition of workstation hardware:.....................................................................................................33
3) Definition of the network software:......................................................................................................34
4) The inter-dependencies of workstation hardware and networking software:.....................................35
INTRODUCTION
- The purpose of this assignment is to:
P1) Benefits and constraints of the different network types and standards
P2) Explain the impact of network topology, communication and bandwidth requirements
P3) Discuss the operating principles of networking devices and server types
P4) The interdependence of workstation hardware with networking software
P1) Discuss the benefits and constraints of different network types and standards:
- A computer network is a group of computers that use a set of common communication protocols over
digital interconnections for the purpose of sharing resources located on or provided by the network
nodes. The interconnections between nodes are formed from a broad spectrum of telecommunication
network technologies, based on physically wired, optical, and wireless radio-frequency methods that may
be arranged in a variety of network topologies.
1) Types of network:
- Businesses, as well as schools and government entities, use wide area networks to relay data to staff,
students, clients, buyers and suppliers from various locations across the world. In essence, this mode of
telecommunication allows a business to effectively carry out its daily function regardless of location. The
Internet may be considered a WAN.
1.2.2) Benefits of WAN:
Centralizes IT infrastructure: Many consider this WAN’s top advantage. A WAN eliminates the
need to buy email or file servers for each office. Instead, you only have to set up one at your head
office’s data center. Setting up a WAN also simplifies server management, since you won’t have to
support, back-up, host, or physically protect several units. Also, setting up a WAN provides
significant economies of scale by providing a central pool of IT resources the whole company can
tap into.
Boosts your privacy: Setting up a WAN allows you to share sensitive data with all your sites
without having to send the information over the Internet. Having your WAN encrypt your data
before you send it adds an extra layer of protection for any confidential material you may be
transferring. With so many hackers out there just dying to steal sensitive corporate data, a
business needs all the protection it can get from network intrusions.
Increases bandwidth: Corporate WANS often use leased lines instead of broadband connections
to form the backbone of their networks. Using leased lines offers several pluses for a company,
including higher upload speeds than your typical broadband connections. Corporate WANS also
generally offer unlimited monthly data transfer limits, so you can use these links as much as you
like without boosting costs. Improved communications not only increase efficiency but also boost
productivity.
Eliminates Need for ISDN: WANs can cut costs by eliminating the need to rent expensive ISDN
circuits for phone calls. Instead, you can have your WAN carry them. If your WAN provider
“prioritizes voice traffic,” you probably won’t see any drop off in voice quality, either. You may also
benefit from much cheaper call rates when compared to calls made using ISDN circuits. Some
companies use a hybrid approach. They have inbound calls come over ISDN and outbound calls go
over the WAN. This approach won’t save you as much money, but it will still lower your bill.
Guaranteed uptime: Many WAN providers offer business-class support. That means you get a
specific amount of uptime monthly, quarterly, or yearly as part of your SLA. They may also offer
you round the clock support. Guaranteed uptime is a big plus no matter what your industry. Let’s
face it. No company can afford to be down for any length of time in today’s business environment
given the stringent demands of modern customers.
Cuts costs, increase profits: In addition to eliminating the need for ISDN, WANs can help you cut
costs and increase profits in a wide variety of other ways. For example, WANS eliminate or
significantly reduce the costs of gathering teams from different offices in one location. Your
marketing team in the United States can work closely with your manufacturing team in Germany
using video conferencing and email. Saving on the travel costs alone could make investing in a
WAN a viable option for you.
- A MAN is larger than a local area network (LAN) but smaller than a wide area network (WAN). MANs do
not have to be in urban areas; the term "metropolitan" implies the size of the network, not the
demographics of the area that it serves.
1.3.2) Benefits of MAN:
Less Expensive: It is less expensive to attach MAN with WAN Network. MAN gives you good
efficiency of data. All data on MAN is easily manageable in a centralized way.
Sending Local Emails: You can send local emails fast and free on MAN.
High Speed than WAN: The speed of data can easily reach 1000 Mbps, as MAN uses fiber optics.
Files and database transfer rates are fast.
Sharing of the Internet: With the installation of MANs, users can share their internet connection.
In this way, multiple users can get the same high-speed internet.
Conversion of LAN to MAN is Easy: MAN is a combination of two or more LAN network. So it is a
faster way to connect two LAN networks together. It is possible by the fast configuration of links.
High Security: MAN’s has a high-security level than WAN.
1.4) Internet:
- It is a network of networks that consists of private, public, academic, business, and government
networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking
technologies. The Internet carries a vast range of information resources and services, such as the inter-
linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony,
and file sharing.
2) Network protocol:
- Essentially, it allows connected devices to communicate with each other, regardless of any differences in
their internal processes, structure or design.
- Network protocols are the reason you can easily communicate with people all over the world, and thus
play a critical role in modern digital communications.
2.2) The OSI model:
- The Open Systems Interconnection (OSI) model is an abstract representation of how the Internet works.
It contains 7 layers, with each layer representing a different category of networking functions.
- The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the OSI 7-layer
model is still widely used, as it helps visualize and communicate how networks operate, and helps isolate
and troubleshoot networking problems.
2.3.1) HTTP:
- The Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide Web, the Internet that
most users interact with. It is used for transferring data between devices. HTTP belongs to the application
layer (layer 7), because it puts data into a format that applications (e.g. a browser) can use directly,
without further interpretation. The lower layers of the OSI model are handled by a computer's operating
system, not applications.
2.3.2) TCP/IP:
- TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP is a set of standardized rules
that allow computers to communicate on a network such as the internet.
- TCP/IP was developed by the U.S. Department of Defense to specify how computers transfer data from
one device to another. TCP/IP puts a lot of emphasis on accuracy, and it has several steps to ensure that
data is correctly transmitted between the two computers.
2.3.3) ICMP:
- The Internet Control Message Protocol (ICMP) reports errors and provides status updates. For example,
if a router is unable to deliver a packet, it will send an ICMP message back to the packet's source.
2.3.4) DNS:
- The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online
through domain names, like nytimes.com or espn.com.
- Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP
addresses so browsers can load Internet resources.
- The process of DNS resolution involves converting a hostname (such as www.example.com) into a
computer-friendly IP address (such as 192.168.1.1). An IP address is given to each device on the Internet,
and that address is necessary to find the appropriate Internet device - like a street address is used to find
a particular home. When a user wants to load a webpage, a translation must occur between what a user
types into their web browser (example.com) and the machine-friendly address necessary to locate the
example.com webpage.
2.4.1) ISO:
- Probably the biggest standards organization in the world, the ISO is really a federation of standards
organizations from dozens of nations. In the networking world, the ISO is best known for its OSI Reference
Model.
2.4.2) ANSI:
- American National Standards Institute (ANSI) is the main organization responsible for coordinating and
publishing computer and information technology standards in the United States. While they are
commonly thought of as developing and maintaining standards, they do neither. Instead, they oversee
and accredit the organizations that actually create the standards, qualifying them as Standards
Developing Organizations or SDOs. ANSI also publishes the standards documents created by the SDOs,
and serves as the United States' representative to the ISO.
2.4.3) ITIC:
- Information Technology Industry Council (ITIC): ITIC is a group of several dozen companies in the
information technology (computer) industry. ITIC is the SDO approved by ANSI to develop and process
standards related to many computer-related topics. It was formerly known as the Computer and Business
Equipment Manufacturers Association (CBEMA).
2.4.4) IEEE:
- Institute of Electrical and Electronics Engineers (IEEE, pronounced “eye-triple-ee”) is a well-known
professional organization for those in the electrical or electronics fields, including computers and
networking. IEEE's main claim to fame in the networking industry is the IEEE 802 Project, which
encompasses many popular networking technologies including Ethernet.
2.4.5) TIA:
- Telecommunications Industry Association (TIA): The TIA is the communications sector of the EIA, and is
responsible for developing communications standards. Since communications, wiring and transmission
are all related, and since the TIA and EIA organizations are also related, standards produced by the EIA or
TIA are often labeled with the combined prefixes “EIA/TIA” or “TIA/EIA”.
P2) Explain the impact of network topology, communication and bandwidth requirements:
- Network topology is the topological structure of a network and may be depicted physically or logically.
Physical network topology, as the name suggests, refers to the physical connections and
interconnections between nodes and the network—the wires, cables, and so forth.
Logical network topology is a little more abstract and strategic, referring to the conceptual
understanding of how and why the network is arranged the way it is, and how data moves through
it.
- Packet switching allows delivery of variable bit rate data streams, realized as sequences of packets, over
a computer network which allocates transmission resources as needed using statistical multiplexing or
dynamic bandwidth allocation techniques. As they traverse networking hardware, such as switches and
routers, packets are received, buffered, queued, and retransmitted (stored and forwarded), resulting in
variable latency and throughput depending on the link capacity and the traffic load on the network.
- Bandwidth availability plays an important role when using VoIP or WebRTC services. If the user does not
have enough bandwidth or available bandwidth when making calls, the user might experience voice
quality problems that could result in choppy voice, unexpected issues, and a poor user experience.
- This chart provides the bandwidth requirements for high quality performance:
P3) Discuss the operating principles of networking devices and server types:
1.1) Repeater:
- A repeater operates at the physical layer. Its job is to regenerate the signal over the same network
before the signal becomes too weak or corrupted so as to extend the length to which the signal can be
transmitted over the same network. An important point to be noted about repeaters is that they do not
amplify the signal. When the signal becomes weak, they copy the signal bit by bit and regenerate it at the
original strength. It is a 2 port device.
1.2) Hub:
- A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches,
for example, the connector in star topology which connects different stations. Hubs cannot filter data, so
data packets are sent to all connected devices. In other words, collision domain of all hosts connected
through Hub remains one. Also, they do not have the intelligence to find out best path for data packets
which leads to inefficiencies and wastage.
1.3) Bridge:
- A bridge operates at data link layer. A bridge is a repeater, with add on the functionality of filtering
content by reading the MAC addresses of source and destination. It is also used for interconnecting two
LANs working on the same protocol. It has a single input and single output port, thus making it a 2 port
device.
1.4) Switch:
- A switch is a multiport bridge with a buffer and a design that can boost its efficiency (a large number of
ports imply less traffic) and performance. A switch is a data link layer device. The switch can perform error
checking before forwarding data, that makes it very efficient as it does not forward packets that have
errors and forward good packets selectively to correct port only. In other words, switch divides collision
domain of hosts, but broadcast domain remains same.
1.5) Router:
- A router is a device like a switch that routes data packets based on their IP addresses. Router is mainly a
Network Layer device. Routers normally connect LANs and WANs together and have a dynamically
updating routing table based on which they make decisions on routing the data packets. Router divide
broadcast domains of hosts connected through it.
P4) Discuss the inter-dependence of workstation hardware with relevant networking software:
1) What is inter-dependence?
- The definition of interdependency is a situation where two or more people or things are dependent
upon each other. And that inter-dependence will make a system
- It is a relationship in which changes or events in any single part of a system will produce some reaction
or have some significant consequences in other parts of the system.
- In networking, the workstation hardware is dependent upon the networking software and so is the
networking software. If either the hardware or the software has issues, the whole system will not function
properly.
- Computer hardware includes the physical parts of a computer, such as the case, central processing unit
(CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and
motherboard.
- Network hardware contains physical parts of network such as routers, switches, hubs, modems,…
Some kinds of hardware in networking:
- The SDN framework: The Software Defined Networking (SDN) framework has three layers as depicted in
the following diagram
APPLICATION LAYER: SDN applications reside in the Application Layer. The applications convey
their needs for resources and services to the control layer through APIs.
CONTROL LAYER: The Network Control Software, bundled into the Network Operating System, lies
in this layer. It provides an abstract view of the underlying network infrastructure. It receives the
requirements of the SDN applications and relays them to the network components.
INFRASTRUCTURE LAYER: Also called the Data Plane Layer, this layer contains the actual network
components. The network devices reside in this layer that shows their network capabilities
through the Control to Data-Plane Interface.
Network operating system: NOS is a system that offers a shared platform for all the connected
computers that can run a shared application. Net and Novell Netware are popular examples of
network software.
Shared network: a networking software whose applications are centrally saved and each
individual computer can access the applications on their own. Oracle is an example of such
network software.
Client server network programs: one component of such applications are stored on client’s
system and the other one is stored on server. Both systems then communicate with each other
and utilizes their part of the component accordingly. For example, Microsoft exchange.
- Hardware is important even in creating a network. Different hardware devices like hubs, routers, etc.
can be used to create a network. A network involves different types like LAN, WAN, MAN, etc. which need
different devices and provide connectivity all over the world.
- Essentially, network software controls the workstation hardware. And the hardware does what the
software told. These two components are complementary and cannot act independently of one another.
In order for a computer to effectively manipulate data and produce useful output, its hardware and
software must work together.
- Without network software, computer hardware is useless. Conversely, computer software cannot be
used without supporting hardware. And the hardware cannot function without being controlled by the
software.
- For example, a user has just bought a Wi-Fi card. When the user plugs the Wi-Fi card into the PC, he/she
cannot use it instantly. The user must first install the driver for the PC to discover the Wi-Fi card and
control it. After that, the Wi-Fi card could be used properly. So, in this situation, the Wi-Fi card is the
hardware and the driver is the software. Without the hardware (Wi-Fi card), the software (the driver)
cannot run and without the software, the Wi-Fi card could not be discovered and controlled. Therefore,
this explains the interdependence of the workstation and the networking software.
CONCLUSION
P1) Benefits and constraints of the different network types and standards
P2) Explain the impact of network topology, communication and bandwidth requirements
P3) Discuss the operating principles of networking devices and server types
P4) The interdependence of workstation hardware with networking software
- These key areas have provided enough important information about networking which is very significant
in normal day life. The research has identified clearly the benefits and constraints of different network
types and standards. The impact of network topology, communication has been informed. The operating
principles of networking devices and server types have been listed and the interdependence of
workstation hardware with networking software has been explained.
EVALUATION
- In my opinion, my assignment has explained and identified enough data about networking with clearly
indication and distinct layout. This project has met the requirements of a professional research and
critically examined the use and the definitions of the networking devices and software.
REFERENCES