100% found this document useful (1 vote)
291 views83 pages

Unit 2 - Assignment BDT

The document is an assignment front sheet and brief for a networking infrastructure assignment. It provides details on the qualification, unit, submission dates, student and assessor information. It also includes grading criteria and learning outcomes that will be assessed. The brief asks the student to design, implement, test and diagnose a networked system for an educational institution with 200 students, 15 teachers and other staff. It provides specifications on resources, building layout, and tasks to be completed in three parts - a report on networking principles, a network design plan, and implementing the designed system.

Uploaded by

Cục Muối
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
100% found this document useful (1 vote)
291 views83 pages

Unit 2 - Assignment BDT

The document is an assignment front sheet and brief for a networking infrastructure assignment. It provides details on the qualification, unit, submission dates, student and assessor information. It also includes grading criteria and learning outcomes that will be assessed. The brief asks the student to design, implement, test and diagnose a networked system for an educational institution with 200 students, 15 teachers and other staff. It provides specifications on resources, building layout, and tasks to be completed in three parts - a report on networking principles, a network design plan, and implementing the designed system.

Uploaded by

Cục Muối
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 83

ASSIGNMENT FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking Infrastructure

Submission date Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name Bui Duc Tam Student ID GCC 18086

Class GCC 0801 Assessor name Le Huynh Quoc Bao

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Grading grid

P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3
ASSIGNMENT BRIEF SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 2: Networking

Assignment title Networking Infrastructure

Academic Year

Unit Tutor

Issue date Submission date

IV name and date Khoa Canh Nguyen, Nhung, Michael Omar 9th/01/2020

Submission format

Part 1
The submission is in the form of an individual written report. This should be written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide a bibliography using the Harvard referencing system. The recommended word limit is 2,000–
2,500 words, although you will not be penalized for exceeding the total word limit.

Part 2
The submission is in the form of an individual evidence portfolio.

 A LAN design plan and blueprint and justification document.


 A fully completed test plan including an evaluation of results and recommendations for improvements to
LAN.
 A proposed and justified maintenance schedule.
Part 3
 Evidence of an implemented network.

You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work
must be supported with research and referenced using the Harvard referencing system.

Unit Learning Outcomes


LO1: Examine networking principles and their protocols.

LO 2: Explain networking devices and operations.

LO3: Design efficient networked systems.

LO4: Implement and diagnose networked systems.

Assignment Brief
You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which have branches in Ho Chi Min City, Hanoi, Da Nang and Can Tho.

The company has been contracted to implement a networking project from a local educational institute. The
specification of the project is given below:

People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the
head of academics and the programme manager, 3 computer network administrators.

Resources: 50 student lab computers, 35 staff computers, 3 printers


Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located
on the first floor and another located on the second floor
As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain networking
principles, protocols and devices and submit a report.

Part 1
You will need to produce a report that includes the following:

1. An introduction to provide an overview of your report.


2. Benefits and constraints of different types of networks and networking standards.
3. The impact of network topology, speed of communication and bandwidth requirements.

4. Effectiveness of networking systems.


5. Discussion on operating principles of networking devices and server types and networking software.
6. Discuss the relationship of workstation hardware with networking software.
7. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization.
8. For the given specification, identify the topology protocol for the efficient utilization of a networking
system.


The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification
from the institution, as given earlier.

You need to design and implement the networking project within a given timeframe:

Part 2 Design efficient networked systems


1. Prepare a written step-by-step plan of how you are going to design a Local Area Network including a
blueprint of your LAN.
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications.
4. Justify the security requirements and quality of services needed for selection of accessories.
5. Suggest a maintenance schedule to support the networked system.

Part 3 Implement test and diagnose networked systems


1. Implement a networked system based on your prepared design.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
5. Discuss the significance of upgrades and security requirements in your recommendations.

ASSESMENT CRITERIA

Learning Outcomes and Assessment Criteria


Pass Merit Distinction

LO1 Examine networking principles and their protocols

P1 Discuss the benefits and M1 Compare common


constraints of different network types networking principles and LO1 & 2
and standards. how protocols enable the
effectiveness of networked D1 Considering a given scenario,
P2 Explain the impact of network systems. identify the topology protocol
topology, communication and selected for the efficient
bandwidth requirements. utilization of a networking
system.
LO2 Explain networking devices and operations

P3 Discuss the operating principles of M2 Explore a range of server


networking devices and server types. types and justify the selection
of a server, considering a
P4 Discuss the inter-dependence of given scenario regarding cost
workstation hardware with relevant and performance
networking software. optimisation.

LO3 Design efficient networked systems

P5 Provide a logical/physical design of M3 Install and configure D2 Design a maintenance


the networked system with clear network services and schedule to support the
explanation and addressing table. applications on your choice. networked system.

P6 Evaluate the design to meet the


requirements.
LO4 Implement and diagnose networked systems

P7 Implement a networked system M4 Recommend potential D3 Use critical reflection to


based on a prepared design. enhancements for the evaluate own work and
networked systems. justify valid conclusions.
P8 Document and analyse test results
against expected results.

P1 Discuss the benefits and constraints of different network types and standards.

A1.  Definition of network:

Computer networking is an engineering discipline aimed at studying and analyzing the process of communication between different co
mputer devices or computer systems that are connected or networked together to exchange data and share resources.

Advantages:

 Increased speed 
 Reduced cost 
 Improved safety 
 Central software management 
 Flexible access to electronic mail

Disadvantages:

 High installation costs 
 It takes time to manage 
 the faults of the server or cable
History of network:

1960s: Leonard Kleinrock proposed the idea of one of the earliest computer networks, ARPANET, and the development of
ARPANET began in 1966. The Internet was formally born in 1969. It linked four pcs (UCLA, Stanford Research Institute, UCSB, and
Utah University) from four universities. 1970s: Ray Tomlinson sent the first e-mail in 1971. The Wi-Fi basis, a wireless UHF packet
network called ALOHAnet, was used in the same year. Robert Metcalfe and David Boggs created the Ethernet prototype in 1973,
which operated at 2.94 Mbps. In 1978, Bob Kahn created and created the TCP / IP network protocol with the assistance of Vint Cerf.
1980s: In 1981, RFC 791 formally specified IPv4, the first significant version of the Internet protocol. BITNET was created and in the
same year CSNET was established. In 1983, ARPANET banned NCT and needed TCP / IP. The idea of VLAN was created in the
early 1980s and WaveLAN network technology was launched, the official forerunner of Wi-Fi. 1990: Tim Berners-Lee et al.
consolidated the WWW in 1992 with two primary parts: HTTP and HTML. IPv6 has been upgraded to a broad spectrum of IP
addresses from IPv4, enhanced routing, and encryption integrated. The first version of the 802.11 Wi-Fi standard was launched in
1997. In turn, the 802.11a and 802.11b were developed two years later, providing transmission speeds of up to 11 Mbps. 2000s: All
Wi-Fi devices must be WPA2 certified by 2006 (an upgrade and replacement of WPA). In 2009, the 802.11n Wi-Fi standard became
official, providing higher transfer speeds and being able to operate on the 2.4GHz and 5GHz bandwidths. 2018: The Wi-Fi Alliance
introduced WPA3 encryption for Wi-Fi.

A3. Benefits and constraints of network :

In 21st century, technology plays a crucial role in a new era of innovation. In particular, industry 4.0 allows electronic devices, even a
machine system to operate automatically with wireless connectivity and sensors. While the fourth industrial revolution aims at
automating and sharing data between devices as well as systems and manufacturing processes, the network is a tool for people to
connect and share information easily. Today, almost every field, the same as businesses, organizations, or media, uses the network.
Computer network can be said to be an important factor in life. We can not deny the benefits of computer networking, but we should
also take its disadvantage into account.

Benefits:

Occupational opportunities There are many popular IT jobs with high prospects such as programming mobile apps, database
administrator, software engineer, etc. And for its easy accessibility to people, the network not only assists in the IT area but also helps
someone else. It means which people who are looking for work can easily search for the job they want. Share information easily The
most useful tools of computer networks are sharing files, sharing resources, sharing a single connection or increasing storage capacity.
It helps save time and energy for people. In contrast, instant message is not a problem for the people now, they can talk to each other
in real time or even work or organize online meetings over a connected line. Accessibility to people Accessing technology devices is
no longer difficult for people, which means that everyone can easily access the network on their own. Even easier than ever, because
the way they use the network is just a search or social networking as well. For example, Google's well-known search engine is being
developed to bring people access to the internet. Many people recognize the engine and its daily use shows that the network plays an
enormous role in the daily lives of people, and without it we can't think about how our lives will be. Cost Installation of the network is
becoming easier and cheaper. It can also last a long time and does not involve frequent installation or modifications of the scheme. It
also enables us to download on - the-market software applications. Last but not least, most of the data it offers is free and there are
different resources for us to consult. A numerous amount of knowledge The willingness of people to share data and lessons is
increasing. This implies finding the data we need is much easier for us. It can be seen that for traditional data searching is reading
books and by looking online, by typing and clicking, most individuals will select the quicker type.

Constraints:

Security: Many people use the Internet, we can not be certain that the information that we have been looking for is safe or not.
Because people share a lot of files and resources, sometimes we get confused about what is really right or wrong. Even a hacker or
theft can steal our privacy information. Lack of independence: Because customers often have to rely uncontrolled on a server, sudden
server failure that prohibits users from continuing to work is also a damaging factor for network users.

Addiction: These days, people tend to work and have fun on smart devices. Most of their job is done by e-mail, homework online,
etc. They check up to 100 times a day on their phones, or even check job messages on holiday. The more time we spend on data
access, the less time we have to relax.

Information availability: The data published is not controlled and the quantity of it is endless. We can not understand if the data we

obtained is true or false, nor can we be sure of the origin of the data.

Computing network policy: Although we have a secure network policy (NSP), we still have no clue what we are really going to face
during the network usage phase. Cybersecurity regulations are also unable to reach individual network users, and data thieves can still
benefit from network infringements. To conclude, networking is now the best way to interact and share data with each other. Like
other things, however, network itself has benefits and disadvantages, so we need to increase consciousness about how we use it and
think about the implications before we do anything on the internet.
B. Network types:

B1. By geographic location:

• PAN (Personal Area Network): a computer network for connecting among devices such as smartphones, laptop, tablet centered on
an individual person’s workspace. It is managed by one person or organization. This sort is effective, comfortable, and comparatively
safe. It gives users low information rates, however, and does not suit bigger distances for wireless connection.

• LAN (Local Area Network): a computer network connects groups of computers within a limited area such as house, school, or
office building, which is owned, controlled, and managed by a single person or organization. LAN communication is simple, quick
and time-saving. Furthermore, all LAN computers are recognized. The range of this sort, on the other hand, is restricted and the set-up
fee is costly.

• MAN (Metropolitan Area Network): a combination of LAN and WAN. MAN span the entire area such as town or city. It is owned
and operated by a government body or large corporation. MAN offers users with high velocity experience, but it's also cheaper. But
it's hard to handle and there are more opportunities to attack hackers, so information can be leaked.

• WAN (Wide Area Network): a telecommunications network that expands on a huge geographical area, which exist under collective
or distributed ownership or management. This sort of network includes a bigger region of geography. You can distribute your job
elsewhere and decrease travel fees as well. WAN, on the contrary, concludes mixed technologies that generate a safety gap. The
installation costs are also high.

• WLAN (A Wireless LAN): using wireless communication to form LAN within a specific area such as home, school, etc. It allows
users to move around within the area without depending on physical cables to connect to the network. With big information rat, it has
inexpensive costs. Users can migrate the workstation while the connectivity is maintained. However, the region it includes needs
permission. In addition, the data transfer rate will reduce if the amount of linked devices rises.

• SAN (Storage Area Network or System Area Network): used to promote accessibility of storage devices and to explain a
relatively local network that is designed to provide high-speed connection. High information transfer speed and data security are two
of this sort of network's many benefits. Like others, it also has drawbacks such as not being great for heavy traffic and leaking delicate
information ca.

• VPN (Virtual Private Network): allowing users to send and receive data through private network and can access a private network
remotely. VPN protects your sensitive information, including bank account information, credit card information, or email credentials.
By using VPN, you can play any game without being banned. Nevertheless, VPN is sometimes expensive due to high-quality service,
and not all devices support VPN because some operating systems and devices do not have VPN software.

• Internet: the global system that connects all devices worldwide by using the Internet protocol suite (TCP/IP). It is a network of
networks contains private, public, academic, business and government networks. People can interact worldwide and in real time with
each other and save more time than ever before. Despite this, private privacy has reduced and the way individuals are dependent on it
can decrease productivity.References:

B2. Role capabilities

• Client/Server

The server computer is an available resource and provides a service or function when asked. The client computer requests for the
service and has to use an operating system that allows it to be identified to join the network. The server computer is classified by the
services they provide such as file, print, application, massage, and database.

Advantages:

- The files and resources are centralized

- Security

- Centralized backup, Intranet capability and Internet monitoring.

Disadvantages:

- Expensive server

- Professional manager

- Resources are not available if the server is turned off

• Peer to Peer (P2P)Each computer plays role as both client and server. Each one is responsible for creating resources as
well as asking for networking resources. P2P relationship is suitable for a small network including less

than 10 computers on a single LAN.

Advantages:

- Easy setup and low cost

- Less expensive hardware

- Managing is not difficult

Disadvantages:

- No central control system

- Resource sharing causes additional load

- Not very secure

B3. Other types

• Cloud

Cloud network exists within or is component of a cloud computing infrastructure that offers network interconnectivity between cloud-
based applications, services and solutions that are allowed. Many cloud kinds exist: government, private, hybrid, and community
cloud.

Advantages: no hardware required, efficient recovery, easy to access data.

• Cluster A computer cluster can be seen as a single system with a set of computers that are loosely or tightly connected and work
together in many aspects. Each node performs the same job in this network scheme and is regulated by software.

Advantages: a scalable solution, reliable and simple to configure


Disadvantages: high price and increased infrastructure to create a single system for more servers and hardwareCentralization A
central server controls a centralized system. This system stores data about communication as well as user account. For instance, this
network is used by Facebook, Amazon or Google.

Benefits: simple, easy to manufacture and control.

Disadvantages: all subsystems fail if the key system is damaged and is not accessible.

• Virtualization

Virtualization uses software to simulate a hardware platform such as a server, storage device or

network resource.

Advantages: Reduce operating cost. Increase IT productivity, efficiency, agility, and responsiveness.

Simpler to manage.

Disadvantages: the cost is vast and increase when organization expands. Public network security

problems such as attacks and viruses is required.

C. Networking standards

C1. Networking model

• What is a networking model?

To show its structural design, a networking model organizes tasks and characteristics of a scheme.

• Why use a model?

It offers a starting point for determining what needs to be done to allow communication or for figuring

out how to connect distinct protocols in systems.

 Common types of networking model:


o OSI model

The Open Systems Interconnection (OSI) model is a conceptual model developed by the International Organization for
Standardization that allows the use of normal protocols to interact with various communication systems. In simple English, the OSI
offers a standard for communication between distinct computer systems.

The OSI model can be viewed as a universal computer networking language. It is based on the idea of dividing a communication
scheme into seven abstract layers, each stacked on the last layer.
( Source: www.cdn.ttgtmedia.com )

The OSI model's seven abstraction layers can be described from top to bottom as follows:

7.The application layer

This is the only layer that interacts directly with the user's information. To initiate communications, software applications such as web
browsers and email clients depend on the application layer. However, it should be made clear that client software apps are not
component of the application layer; instead, the application layer is accountable for the protocols and information manipulation on
which the software depends in presenting significant information to the customer. Application layer protocols include both HTTP and
SMTP (one of the protocols that allows email communication is the Simple Mail Transfer Protocol).

6.The presentation layer

This layer is mainly accountable for information preparation so that the application layer can use it; in other words, layer 6 makes the
information available for consumption apps. Data translation, encryption and compression is the responsibility of the presentation
layer.
Two communicating systems may use distinct encoding techniques, so it is up to layer 6 to translate incoming data into a syntax that
the receiving device's application layer can comprehend.
If the devices communicate over an encrypted connection, it is the responsibility of layer 6 to add the encryption at the end of the
sender as well as to decode the encryption at the end of the receiver.

5.The session layer


This is the layer responsible for the communication between the two systems being opened and closed. The time between opening and
closing the communication is called the session. The session layer ensures that the session remains open long enough to transfer all the
data being exchanged, and then closes the session promptly so that resources are not wasted.
Also synchronizes the session layer

4.The transport layer

Layer 4 is responsible for both devices ' end-to-end interaction. This involves taking and breaking information from the session layer
into pieces called segments before sending it to layer 3. It is the responsibility of the transport layer on the receiving device to
reassemble the segments into data that the session layer can consume.
Also accountable for flow control and error is the transport layer
3.The network layer

It is the responsibility of the network layer to facilitate information transfer between two separate networks. If the two communicating
devices are on the same network, then there is no need for the network layer. The network layer breaks down sections on the sender's
device from the transport layer into smaller units, called packets, and reassembles those packets on the receiving machine. The
network layer also finds the data's best physical path to reach their destination; this is called routing.

2.The data link layer

The data link layer is very comparable to the network layer, except that the data link layer facilitates information transfer on the
SAME network between two machines. The layer of the data link takes packets from the layer of the network and breaks them into
narrower frames. Like the network layer, the data link layer is also responsible for intra-network communication flow control and
error control (only flow control and error control for inter-network communication is carried out by the transport layer).

1.The physical layer


This layer involves the information transfer physical equipment, such as wires and switches. This is also the layer where the
information is transformed into a bit stream, which is a 1s and 0s string. Both devices ' physical layer must also agree on a signal
protocol so that on both systems the 1s can be differentiated from the 0s.

Advantages:

 It is a model that is truly generic. And in computer networking it is regarded a standard model
 Services, interfaces, and protocols distinguish layers in OSI model architectures
 Adapting to many protocols has all the flexibility
 It promotes connectivity and connectivity-oriented services
 For this OSI model architecture, administration and maintenance are simple and simple.
 This layered architecture is based on the principle of abstraction
 It is safer and more adaptable than bundling all facilities in one layer

Disadvantages:

 It defines no specific protocol.
 In this model, it can sometimes be hard to fit a fresh protocol
 There is a certain duplication of services in different layers
 Interdependence also exists between the layers

o TCP/IP model

Transmission Control Protocol / Internet Protocol (TCP / IP) is the language used by a computer for internet access. It consists of a sui
te of protocols designed to set up networks to provide internet access to a host.

TCP / IP is accountable for full information connectivity and end-to-end data transmission by offering additional features including
addressing, mapping and acknowledgement. TCP / IP has four layers that are slightly different from the OSI model.

The technology is so prevalent that the complete name would rarely be used. In other words, the acronym is now the word itself in
popular use.
1.The Network Layer

This layer is the mixture of the OSI model's Data Link Layer and Physical Layer. It looks for hardware addressing and the protocols in
this layer allow information to be transmitted physically.

We've just talked about ARP being an Internet layer protocol, but there's a conflict over declaring it as an Internet Layer or Network
Access layer protocol. It is defined as residing in layer 3, encapsulated by the protocols of layer 2.

2.Internet layer

This layer parallels the network layer tasks of OSI. It describes the protocols that are accountable for the network-wide logical
transmission of information. The primary protocols that reside on this layer are:

IP–stands for Internet Protocol and is accountable for providing packets to the target host from the source host by looking at the IP
addresses in the packet headers. There are two variants of the IP: IPv4 and IPv6. IPv4 is the one presently used by most websites. But
IPv6 is increasing as opposed to the amount of consumers, the amount of IPv4 addresses is restricted in number.

ICMP  is the Internet Message Control Protocol. It is encapsulated in IP datagrams and is accountable for offering data on network iss
ues to hosts.

ARP  stands for Protocol on Address Resolution. His task is to discover a host's hardware address from a recognized IP address. There 
are several kinds of ARP: Reverse ARP, Proxy ARP, Free ARP and Inverse ARP.

3. Transport Layer

This layer is similar to the OSI model's transport layer. It is accountable for end-to
end communication and information distribution without errors. It shields apps in the upper layer from information complexities. In th
is layer, the two primary protocols are:

Transmission Control Protocol (TCP)–Reliable and error-free communication between end devices is known to be provided. It
carries out data sequencing and segmentation. It also has recognition function and controls information flow through the mechanism
of flow control. It is a very efficient protocol but owing to such characteristics it has a lot of overhead. Higher overhead leads to higher
costs.
User Datagram Protocol (UDP) However, no such characteristics are available. If your request does not require reliable transportatio
n because it is very cost-effective, it is the go - to protocol. UDP is connectionless unlike TCP, which is a connection-oriented protoco
l.

4.Application Layer

This layer executes the tasks of the OSI model's top three layers: Application, Presentation and Session Layer. It is accountable for
communication between node and node and it regulates the requirements of the user interface. Some of the protocols in this layer are:
HTTP, HTTPS, FTP, TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, LPD. For some data about these
protocols, look at the protocols in the Application Layer. Protocols other than those in the related article are as follows:

HTTP and HTTPS–HTTP is the protocol for the transfer of hypertext. The World Wide Web uses it to handle web browser and
server communications. HTTPS is HTTP-Secure. It's a SSL (Secure Socket Layer) mixture of HTTP. In instances where the browser
needs to complete forms, log in, authenticate, and perform bank transactions, it is effective.

SSH –Secure Shell stands for SSH. It's a Telnet: Like terminal 
emulation software. The most preferred reason for SSH is its capacity to preserve the encrypted connection. It uses a TCP / IP link to s
et up a safe session.

NTP – NTP is the protocol of Network Time. The clocks on our desktop are synchronized to one standard time source.

Advantages:

 It is an industry-standard model that can be deployed efficiently in practical issues of networking.


 It is interoperable, i.e. it enables heterogeneous networks to communicate across platforms.
 It's a suite of open protocols. It is not owned by any specific institute, so any person or organisation can use it.
 It's a client-server architecture that is scalable. This enables the adding of networks without disrupting the existing facilities.
 It gives each computer on the network an IP address, making it possible to identify each machine over the network. It assigns a
domain name to each website. It offers facilities for naming and address resolution.

Disadvantages:

 In essence, it's not generic. So, no protocol stack other than the TCP / IP suite can be represented. It can't define the Bluetooth l
ink, for instance.
 The ideas of services, interfaces, and protocols are not obviously separated. Therefore, describing new techniques in new netw
orks is not appropriate.
 It does not differentiate between the data connection and the physical layers, which have very distinct functionalities.
 It was initially intended for wide area networks and implemented. Small networks such as LAN (local area network) and PAN 
(personal area network) are not optimized.

C2. Common Network Standards: IEEE 802 Group

• IEEE 802.1 (LAN/MAN)

Established to provide LAN, MAN, and WAN with architecture, management, safety, and internetworking. It includes four groups
that focus on distinct norms and policies in the following fields: Internet work, Audio / Video (A / V) bridging, Data Center bridging,
Security.

• IEEE 802.3 (Ethernet)

This is set to define the physical and networking features of the Ethernet network. For instance, how physical node links (routers /
switches / hubs) are performed by different wired media such as coaxial copper or fiber cable.

• IEEE 802.5 (Token Ring)

This is set to define the physical and networking features of the Ethernet network. For instance, how physical node links (routers /
switches / hubs) are performed by different wired media such as coaxial copper or fiber cable.

• IEEE 802.11 (Wireless LAN)

Applying to WLAN and providing 1 or 2 Mbps transmission in the 2.4 Ghz band using either FHSS or DSSS.

P2: Explain the impact of network topology, communication and bandwidth requirements
A. Network topology
A1. What is "network topology"

Network technology describes the arrangement and representation of nodes and links in the network as a graph. It includes both
physical and logical design. A logical topology is a depiction in which the devices that use it appear to the network. Physical topology
is physical connections between computer wires and other devices on the network.

A2. Types of topology

Bus:

Bus topology is a kind of network in which each computer and network device is connected to a single cable.

If it has exactly two endpoints, it is called Linear Bus topology.

Advantages: keep the layout simple, less cable, low cost, etc.

Disadvantages: network disruption, half-duplex, a limited number of devices connected, etc.

Star:

In this type of topology, all computers are connected to a single hub through a cable. This hub is the primary

node and all other nodes are connected to the primary node.

Advantages: more reliable, simple set up and manage, no disruption to the network, etc.

Disadvantages: more cables required, central node dependency, high cost, etc. To handle large flows of network traffic among devices
connected, this type is a good option.

Ring:
Ring topology is called because it forms a ring as each computer is connected to a different computer, with

the last connected to the first one. Exactly two neighbors for each device.

Advantages: high reliability, minimize cabling, longer distance, etc.

Disadvantages: expensive, difficult to find faults, failure of one computer can affect the whole network, etc.

In order to boost the security of the network topology, ring topology is a potential choice.

Mesh:

Mesh networking is a type of network topology in which a machine (node) transmits its own data to other

nodes and acts as a relay. Routers are used to provide the largest and most efficient path of data for

effective communication. In the event of a hardware failure to continue the network communication process,

many routes are available.Advantages: easy fault isolation, more privacy, easier diagnose network problems, etc.

Disadvantages: high cabling required, complex implementation, require an immense amount of configuration,

etc.

This type can meet complicated levels of administrative access.

B. Network communication

B1. What is “communication”


A communication network is the pattern of direction in which information flows from the organization.

Communication channels are either formal or casual networks (networks through which information flows).

Formal networks follow the energy chain and are limited to task-related communications. The informal

network (grapevine) is free to move in any direction, skipping energy levels and meeting the social needs of

group members as well as promoting job performance

B2. What is “protocol”

A protocol is a set of legislation that govern communication between computers on a network. Two devices

must talk the same language in order to talk to each other. It needs many different types of network protocols

and standards to ensure that your computer (regardless of which operating system, network card or

application you are using) can communicate on the next desk or halfway around the globe with another

computer. The OSI (Open Systems Interconnection) reference model defines seven layers of networking

protocols. The complexity of these layers extends beyond the scope of this tutorial, but can be simplified into

four layers to help identify the protocols you should be acquainted with.

B3. Types of common communication protocols (For each protocol, you need to discuss about: full

name, working layer, why do we need to use this protocol, how does this protocol work, port number,

protocol data unit (PDU), PDU size, PDU structure …..)


TCP (Transmission Control Protocol)

The TCP is a standard that defines how to establish and maintain a network conversation via which

application programs can exchange data

- Working layer: transport layer

- TCP provides reliable delivery of a stream of octets

- Using a set of rules to exchange messages with other internet points at the information packet level

- Protocol number: 6

HTTP (Hypertext Transfer Protocol)

The HTTP is the foundation of data communication on the World Wide Web. The hypertext is a structured

text that uses hyperlinks between nodes that contain text. The HTTP is the protocol for the distribution and

cooperative implementation of the hypermedia information system.

- Working layer: application layer

- An Internet-based protocol for sending and receiving webpages

- The HTTP is the application protocol for distributed and collaborative hypermedia information system

- Port number: 80FTP (File Transfer Protocol)

The FTP is the most popular protocol used to transfer files from the internet and private network.

- Working layer: Application layer

- The most common protocol used in the file transferring in the Internet and within private networks.
- Port number: 20/21

IP (Internet Protocol)

- Working layer: the IP suite is referred as TCP/IP.

- The principal protocol in the Internet protocol suite for relaying data across networks

DNS (Domain Name System)

The Domain Name Systems (DNS) is the phonebook of the Internet. People access information online using

domain names such as nytimes.com or r espn.com. Web browsers communicate with e using Internet

Protocol (IP) addresses. DNS translates domain names into IP addresses to allow browsers to load Internet

resources.

- Working layer: application layer

- It is used to convert the domain name to IP address

- Each device connected to the Internet has a unique IP address which other machines use to find the

device

- Port number: 53

ARP (Address Resolution Protocol)

Address Resolution Protocol (ARP) is a process to convert a dynamic IP address in a local area network

(LAN) to a permanent physical device address. The physical machine address is also known as a Media

Access Control or MAC address.

- Working layer: layer 2 or layer 3


- ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from

its known IP address.

POP3 (Post Office Protocol version 3)

One of the two main protocols used to get mail from the internet is version 3 of the Post Office Protocol. It's

very simple because it allows the client to get complete information from the server's mailbox and remove

content from the server.

- Working layer: layer 7

- To retrieve mail from the internet

- It allows the client to retrieve complete content from the server mail box and deletes contents from the

server.

C. Bandwidth

C1. What is bandwidth:

Bandwidth is the ability of a wired or wireless network connection to transmit the maximum amount of data

over a computer network or internet connection in a given amount of time— usually a second. Bandwidth,

synonymous with capacity, describes the rate of transmission of data

C2. Measuring bandwidth

Bandwidth is the sum of information that moves through a network connection over time as measured in
parts per second (bps). There are countless tools for administrators to evaluate the bandwidth of network

connection. These instruments include on LANs (local area networks) Netperf and TCP testing. There are

countless Internet bandwidth and velocity test programs, most of which are free to use.

Even with these tools at your disposal, it is difficult to correctly evaluate bandwidth usage because it varies

ov er time depending on hardware configuration plus software application characteristics, including how we

are ed.

D. Discuss about the impact of network topology, communication and bandwidth requirements

Network topology impact Plays an significant part in the functioning of the network.

Helps us to understand networking thoughts better.

Plays a main feature of performance.

Helps to reduce operating and maintenance costs such as cabling costs.

A network topology is a factor in determining the type of media to cable a network.

Simple detection of errors or errors occurs using network topologies.

Effective use of funding and networking components

P3- Discuss the operating principles of networking devices and server types.
A. Network devices

 NIC
A Network Interface Card (NIC) is a hardware element, typically a circuit board or chip, mounted on a laptop to connect to a network.
Modern NICs provide pcs with features such as I / O interrupt assistance, DMA interfaces, data transmission, network traffic
engineering, and partitioning.

Working layer in the OSI model:

The NIC utilizes the OSI model to send physical layer signals, transmit network layer data packets, and function as a TCP / IP layer in
terface.

How does a network interface card work?

The network card of a computer functions by taking the CPU's information and sending it to a location. It transforms the information
into a form that can be cable-transferred and then transforms the information it gets back into computer-usable information. Network
interface cards obtain these data from buses on the motherboard of the computer, typically those that send peripheral information.The
network card converts the data from a parallel structure to a linear structure, allowing it to communicate easily along wires. Once the
target device address is received by the network card, the information will be sent. Information sent back is then transformed back into
parallel structure and redistributed along the buses of the motherboard so that the information obtained can be processed by the CPU.

Types of NIC:

There are two primary kinds of configuration-specific NIC cards: ethernet and wireless. To transfer network information and connect to the
internet, Ethernet NIC cards require you to plug an ethernet cable into the card. This cable's other end is either connected to your modem or to a
router. A tiny antenna connected to the card comes with wireless NIC.The antenna picks up your router’s wireless signal and make it a usable
internet connection for your computer

Jumper configurable network interface cards :

Configurable network interface cards for older machinery are effective and simple to use. They are equipped with physical jumpers
(tiny devices that control computer hardware without the need for software) that determine interrupt request line settings, input /
output address, upper memory block and transceiver type.

Software configurable network interface cards:
 NIC configurable software must be configured manually when installed, but it must contain a proprietary software program that allow
s the operator to configure the NIC through a menu, or choose the auto configuration mode to determine which configuration is most a
ppropriate.

Configurable network interface plug-and-play cards:

 Most NICs use PnP technology today as it does not need to be configured manually, though it may be. During the system boot-up seq
uence, PnP NICs will auto-configure during setup, but may cause hard drive disputes.

Advantages of network interface card:

Network interface cards can be purchased and installed very cheaply.

New network interface cards are capable of reaching speeds up to 2000 Mbps. 

Stable device-cable connection.

Disadvantage of network interface card:

Proper setup is required so that the device can function properly

It can be unsafe network interface cards and information is not guaranteed.

To manage better speeds, replacement must be substituted.

 HUB

A network hub is a node that transmits information to any linked computer or Ethernet device. A hub is less advanced than a switch, o
f which data transmission to particular devices can be isolated.
Working layer in the OSI model

Hub operate at the first or physical layer in OSI model

When we use this device

For tiny, easy local area network (LAN) settings, network hubs are best suited. Hubs are unable to provide routing or other sophisticat
ed network facilities. Since they work indiscriminately by transmitting packets across all ports, network hubs are sometimes referred t
o as "dumb switches."

How does a network interface card work?

Hubs connect various equipment for computer networking. A hub also functions as a repeater by amplifying signals that deteriorate
over connecting wires after traveling lengthy distances. In the network connecting devices family, a hub is the easiest because it
connects LAN parts with the same protocols.

Types of Hub

There are two types of hub:

Active hub: Repeat the incoming transmissions and reinforce them.Sometimes they are also referred to as repeater

Passive hubs: are merely a connectivity point, with no extra capacities.
Advantages of Hub

It can stretch the network's complete range. 

This does not seriously impact network performance. 

It's even cheaper.

 It can connect various kinds of media.

Disadvantage of Hub

There are no methods such as collision detection and packet re-transmission.

It doesn't work in full duplex mode.

It can not connect distinct network architectures such as token ring and ethernet etc.

There is no network traffic reduction mechanism

 ROUTER

A router is a physical or virtual device that transmits information between two or more packet-switched computer networks — analyzi
ng the destination IP address of a specified data packet, calculating the best way to reach that destination and then transmitting it accor
dingly.

Working layer in the OSI model

Router operate at Network layer in OSI model


B.Server types:

• What is a server ?

- A server is a computer program or device that provides a service to another computer program and
its user, also known as the client. Also often referred to as a server in a data center is the physical

device running on a server program. That machine can be a dedicated server, or for other purposes it can also be used.

Types of servers?

- Web server: A Web server is a computer program that offers requesting HTML pages or files. In

this scenario, a web browser acts as the client.

- Application Server: Application server is a program that provides an application program's

company logic on a distributed ted network computer.

- File server: A file server is a computer responsible for the storage and management of the core

information file so that it can be accessed by other machines on the same network.

- Server virtualization: Virtualization of servers is masking server resources from server users, including the number and identity of
individual physical servers, processors, and operating systems.

- Mail Server: A file server is a computer responsible for the storage and management of the core information file so that it can be
accessed by other machines on the same network.

- News Server: News server serves as a source of distribution and delivery for thousands of government newsgroups presently
available through the USENET news network

- Proxy Server: A proxy server is software that works between an endpoint device, such as a laptop, and another server that needs a
customer or client service.

- FTP Server: File Transfer Protocol, one of the oldest Internet services, enables one or more files to be moved securely between
computers while providing security and organization of files

and control of transfer.


- Groupware Server: A groupware server is software designed to allow users to collaborate and work together in a virtual
atmosphere, regardless of location, via the Internet or a corporate intranet.

- IRC Server: Internet Relay Chat, an option for those seeking real-time capabilities, consists of several separate server networks (or
"networks") that allow users to connect to each other via an IRC network.

How a server works?

Step 1: Browser Resolves the Domain Name to an IP Address First of all, web browsers need to know the IP address to which the
domain name www.quackit.com resolves. If this information is not already stored in the cache, it will request the information from
one or more DNS servers (through the internet). The DNS server tells the browser which IP address the domain name (and thus where
the website is located) resolves to address.

Step 2: Browser Requests the Full UR

Now that the web browser knows where the website's IP address is located, the web server can request the full URL.

Step 3: Web Server sends the Requested Page By sending back the requested page, the web server responds. If the page does not exist
(or there is another error), the appropriate error message will be returned.

Step 4: Browser Displays the Webpage This page is sent by your web browser and made available to you.

Server structures:

Mainframe or minicomputer: Mainframe computers are computers primarily used for critical applications by large organizations;
large-scale data processing such as census, industry and consumer statistics, business resource planning, and transaction processing.
They are larger and more powerful in processing than some other computer classes: mini-computers, servers,

workstations, and personal computers.


Minicomputer: A mini-computer is a class of small computers introduced into the world in the mid-1960s that has all the features of a
computer of large size, but its size is smaller than those. A minicomputer is located between the mainframe and is smaller than the
former and larger than the latter because of its size. It is also called a computer of mid-range.

Blade server: A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical
space and energy that has many components removed to save space, minimize power consumption and other considerations while still

having all the functional components to be considered a computer.

Virtual servers: Virtual web servers provide low-cost web hosting services in a very popular way. Dozens of virtual servers can co-
reside on the same computer instead of requiring a separate computer for each server. Performance is not affected in most cases, and
each website acts as if a dedicated server serves it.

Cloud Servers: A cloud server is a logical server built, hosted and delivered over the Internet via a cloud computing platform. Cloud
servers have similar capabilities and functionality to a typical server but are accessed from a cloud service provider remotely.

Dedicated Servers: It refers to the rental and exclusive use of a computer which includes a Web server, related software, and Internet
connection, housed in the premises of the Web hosting company. Usually it is needed for a website (or set of related company sites)
that can develop a significant amount of traffic-for example, a site that has to handle up to 35 million hits a day. The server can
usually be configured from the client company and operated remotely. Web hosting companies claim to save router, internet
connection, security system, and network administration costs by using a dedicated server on their premises. In addition, let's have a
comparison of common networking principles and how protocols enable networked systems to be effective.

A. LAN vs. MAN vs. WAN

A LAN (local area network) is a group of computers and network devices connected together, usually within the same building.
A MAN (metropolitan area network) is a larger network that usually spans several buildings in the same city or town. A WAN (wide
area network), Compared to a MAN, it is not limited to a geographical location, even if it may be confined within the boundaries of a
state or country. A WAN connects multiple LANs and may be restricted to or available to the public by a company (a company or

organisation). High speed technology is comparatively costly.

B. Topologies: Bus vs Star vs Ring vs Mesh vs Tree vs Hybrid vs Daisy chain

BUS: In local area networks where bus topology is used, each node is connected to a single cable, by the help of interface connectors.

STAR: In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.
So it can be said that every computer is indirectly connected to every other node with the help of the hub.

RING: A ring topology is a bus typology in a closed loop. Data travels around the ring in one direction. When one node sends data to
another, the data passes through each intermediate node on the ring until it reaches its destination.

MESH: The value of fully meshed networks is proportional to the exponent of the number of subscribers, assuming that
communicating groups of any two endpoints, up to and including all the endpoints, is approximated by Reed’s Law.

TREE: A tree topology (a.k.a. hierarchical topology) can be viewed as a collection of star networks arranged in a hierarchy. This tree
has individual peripheral nodes (e.g. leaves) which are required to transmit to and receive from one other node only and are not
required to act as repeaters or regenerators.
HYBRIB: Hybrid topology is also known as hybrid network. Hybrid networks combine two or more topologies in such a way that the
resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.).

DAISY: A daisy chain network topology allows the workstation to be connected in such a way that the data which has to be sent is
transmitted in a sequence.

C. Models: TCP/IP model vs. OSI model:

For advance: you can compare between OSI, TCP/IP AND IPX/SPX models

TCP / IP is a model client-server, i.e. the server provides the client requests for service. OSI, in contrast, is a conceptual model. TCP /
IP is a standard protocol used for each network, including the Internet, while OSI is not a protocol, but a reference model used to
understand and design the architecture of the system. TCP / IP is a model with four layers, while OSI has seven layers. The vertical
method is followed by TCP / IP. OSI Model, on the other side, promotes the Horizontal strategy. TCP / IP is tangible while OSI is not
tangible. TCP / IP follows the strategy from top to bottom, while OSI Model follows the strategy from bottom up.

E. Layers in OSI modelThe application layer

What are principles: This layer also serves as a window for accessing the network and showing the data provided to the user by the
application providers.

Application-level protocols: At the top of the layer stack OSI Reference Model

Comparing the client/server model and the peer-to-peer model:


The main distinction between Client-Server and Peer-to-Peer network is that the client-server network model has a dedicated server
and particular customers, whereas each node can act as both server and client in peer-to-peer models. The server offers services to the
client in the client server model. Every peer, however, can provide services in a peer-to-peer manner and can also request the services.

Sharing data is more essential in the client-server model, whereas peer-to-peer connectivity is more essential. Data is stored on a
centralized server in the client-server model, whereas each peer has their own information in peer-to-peer. The servers are distributed
in a peer-to-peer model in a system, so there are fewer chances of bottlenecking the server, but there is a single server serving the
clients in the client-server model, so there are more chances of bottlenecking the server. Implementation of the client-server model is
more costly than peer-to-peer. The model client-server is more scalable and stable than the peer-to-peer model.

Compare some protocols such as IMAP vs. POP3 (in Email service)

For IMAP: Emails that you have specified in your mail client will be updated on the mail server and the subsequent modifications
will appear in the inbox of your webmail. Even if you do these offline actions, the changes will be reflected online once you have
reconnected to the Internet and your mail application has synchronized with the server.

For POP3: Any emails you may have read may still appear as "fresh" in your webmail inbox,

and any responses you have sent may not appear in the products sent to your webmail (depending on your supplier and how you set up
your POP account). This pronounced contrast can cause excellent inconvenience for some customers who may prefer to synchronize
their mail customer and mail server to reduce confusion and prevent repeating the same practice.

The transport layer:


What are principles: Provides logical communication across layered protocol architecture and other network elements between
application procedures operating on distinct hosts.

Transport - level protocols: In the same way TCP is constructed on top of the IP at the endpoints.

Comparing UDP and TCP: TCP is connection-oriented, while UDP is connection-free. In order to transfer helpful data, TCP is
extremely reliable as it requires the acknowledgement of the information sent. Also, if any, send back the lost packets. While UDP
will not request retransmission if the packet is lost and the target computer will receive corrupt data. UDP is therefore an unreliable
protocol. Compared to UDP, TCP is slower as TCP creates the link before information is transmitted and guarantees packet delivery.
On the other side, UDP does not recognize whether or not the transmitted data is obtained. UDP header size is 8 bytes, and TCP size is
more than twice as large. TCP header size is 20 bytes since and TCP header includes choices, padding, checksum, flags, information

offset, acknowledgement number, sequence number, source and destination ports, etc. TCP and UDP can check for mistakes, but only
TCP can correct the mistake as it has both congestion and flow control.

The network layer:

What are principles: To allow the exchange of data via intermediate devices known as router, linked to distinct networks.

Internet protocol: is the main protocol to communicate data graphs across the network limits in the Internet protocol suite. It offers
Internet connectivity and fundamentally provides the Internet with its routing feature.

Static vs. Dynamic RoutingThe routers are manually configured and the table is also manually generated in static routing, while the
setup and table development is automatic and router driven in dynamic routing. The paths are user-defined in static routing while the
routes are updated as topology modifications in dynamic routing. No complicated algorithms are used for static routing. Dynamic
routing, on the other hand, utilizes the complicated algorithm to calculate the shortest route or path. For big networks where the
amount of hosts is high, dynamic routing is appropriate. In contrast, it is possible to implement static routing in a tiny network. If a
connection in static routing fails, the rerouting is discontinued and route traffic needs manual intervention. By comparison, dynamic
routing connection failure does not interfere with rerouting. In dynamic routing, the message broadcast and multicast makes it less
safe. On the other side, there is no static routing involving advertising which makes it safer. Protocols like RIP, EIGRP, BGP, etc. are
involved in dynamic routing. Inverse, there is no need for such protocols for static routing. No extra resources are required for static
routing, while dynamic routing needs extra resources such as memory, bandwidth, etc.

P4 Discuss the inter-dependence of workstation hardware with relevant networking


software.

A. Workstation hardware:

• What is workstation?

A workstation is a computer intended for business or professional use (as opposed to home or recreational use) that is faster and more
skilled than a personal computer for individual u se. Small engineering companies, architects, graphic designers, and any organization,
department, or individual needing a faster microprocessor, large quantities of random access memory (RAM), and distinctive features
such as high-speed graphics adapters, use workstations and applications designed for them.

• The minimum hardware specification: NIC, mainboard, CPU, Memory, storage devices.

- NIC:

+ Definition: NIC (Network Interface Card) is a computer hardware component that connects a computer to a computer network.

+ Purpose: helping a communication among computers or laptops on the same local area network (LAN) and large-scale network
communications through routable protocols.
+ Types/Categories: Ethernet and wireless

+ Features/functions: it is a middleman between computer and network. They are responsible for translating data on the computer
into a form that can be transferred via a network cable and wireless network signal.

+ Some manufacturers: Intel, Allied Telesis, etc.

- Mainboard:

+ Definition: The motherboard is the key circuit board holding the essential processing parts of a computer. It allows all the parts of
your computer to receive power and communicate with one another. It is usually screwed to the case along its largest face, which
could be the bottom or the side of the case depending on the form factor and orientation.

+ Purpose: To handle all the subsystems of the computer. A chipset manages system-wide communications. The motherboard also
delivers energy to low-powered devices.

+ Types/ Categories: there are 4 types of motherboard. They are XT, AT, Baby AT, and ATX. The most common motherboard form
factor is ATX.

+Features/Functions: The primary function of a motherboard is to connect and control all computer components, accept inputs and
deliver outputs. The motherboard regulates the flow of data in a system. The CPU pins connect lea ding circuits to separate
motherboard areas, collection of data, or sending of data.

+ Some manufacturers: Asus, Corsair, MSI, Aorus, Acer, etc.

- CPU:

+ Definition: Stands for "Central Processing Unit." The primary component of the CPU is a computer processing commands. It runs
the operating system and applications, receiving on a steady basis user input or active software programs. It processes the data and
produces output that an application can store or display on the screen.
+ Purpose: The CPU depends strongly on a chipset, which is a set of microchips situated on

the motherboard, to regulate commands and information flows to and from other components of the computer.

+ Types/ Categories: control unit and arithmetic logic unit

+ Features/ Functions: The CPU is based on system clock, memory, secondary storage and address and data buses.

+ Some manufacturers: There are presently two CPU manufacturers: Intel and AMD

Memory:

+ Definition: Is any physical unit capable of momentarily storing data such as RAM (random access memory) or ROM (read-only
memory). Memory devices use embedded circuits and are used by software, hardware and operating systems.

+ Purpose: making a computer a place to quickly access data.

+ Types/ Categories: RAM and ROM

+ Features/ Functions: to store data

+ Some manufacturers: AMAX Information Technologies, Antec, AOpen, APEVIA, etc.

B. Networking software:

• Functions of Network Software:

- Helps to set up and install computer networks

- Enables users to have access to network resources in a seamless manner

- Allows administrations to add or remove users from the network

- Helps to define locations of data storage and allows users to access that data

- Helps administrators and security system to protect the network from data breaches,
unauthorized access and attacks on a network

- Enables network virtualizations

• The minimum networking software you mention: OS (including desktop version and server

version), drivers, applications:

- OS (including desktop version and server version):

+ Definition: An operating system (OS) is the program that manages all the other computer application programs after being loaded
into the computer by a boot program. The application programs use the operating system by requesting services through the
application program's designated interface. In addition, customers can interact directly with the operating system via a user interface

+ Purpose: Every general-purpose computer must have an operating system to run other programs and applications

+ Characteristic: Operating systems ms are different depending on the three primary characteristics of licensing, software
compatibility, and complexity.

+ Categories/Types: A mobile OS enables apps and programs to be run by smartphones, tablet PCs and other

mobile devices. A pple IOS, Google Android, Black Berry OS, and Windows 10 Mobile are mobile operating systems. An embedded
operating system is specialized for use in big devices such as vehicles, traffic lights, digital televisions, ATMs, aircraft controls, POS
terminals, digital cameras, GPS navigation systems, elevators and smart meters. A Network Operating System (NOS) is a computer
operating system mainly intended to assist workstations, personal computers and, in some cases, older terminals linked to a LAN. An
RTOS is an operating system that provides a certain capacity within a time limit. An operating system, for instance, could be intended
to guarantee that a certain product on a ssembly line was available to a robot.

+ Functions:

- Memory Management
- Processor Management

- Device Management- File Management

- Security

- Drivers:

+ Definition: A group of documents allowing one or more hardware systems to interact with

the operating system of the computer..

+ Purpose: To make abstraction possible by acting as a translator between the hardware device and the apps or operating systems
using it.

+ Categories/Types:

- BIOS

- Motherboard Drivers

- Hardware drivers

- Virtual Device drivers

+ Functions: allows your computer’s operating system to operate some specific piece of hardware.

- Applications:

+ Definition: is software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.

+ Purpose: can be used for a variety of tasks.

+ Characteristic: convenience

+ Categories/Types:
- Embedded Systems

- Windows applications (also called 'Desktop applications')

- Web Applications

- Web Services

- Console applications

+ Function:

- Managing information

- Manipulating data

- Constructing visuals

- Coordinating resources

- Calculating figures

C. Discuss the inter-dependence of workstation hardware with relevant networking software.

The "inter-dependence" among HW & SW

Hardware: technological devices such as computer, servers, storage, printers, equipment, etc. Software: applications for
productivity,business, networks, systems and security, and mobile apps.

Hardware The physical and tangible components can be seen and touched. Five primary computer components are input devices,
output devices, CPU, storage devices, and memory.

Software Is instructions or programs written in distinct programming languages like JAVA, C++, Python, etc. Hardware and software
operate together to generate a productive output concurrently. If no hardware device is supported, the software can not operate. In the
meantime, if no software instructions are given, the hardware will be useless. It can be said that the hardware operates on the
software's working platform, and because of the assembly of parts into a full machine system, the working software. These are two
elements which, depending on the features of each other, operate and communicate with each other and are inseparable. We can claim
that a digital computer's core and soul is the hardware and software.

P5: Design a networked system to meet a given specification:


Room layout and equipment layout
Finish
CHEAP VERSION:

 Multilayer Switch: Switch Cisco WS-C3560CX-12PC-S 12 Port Gigabit Ethernet 10/100/1000 Mbps POE, 2 x SFP (~921$)
(Source: https://thietbimangcisco.vn/cisco-ws-c3560cx-12pc-s-c-323-336-5350.html )

 Server: Dell PowerEdge T30 Server - CPU G4400 / Ram 4GB / HDD 1x 1TB / Raid SATA / 1x PS (~430$)

(Source: http://nghiahung.vn/may-chu-dell-poweredge-t30-cpu-g4400-ram-4gb-hdd-1x-

1tb-raid-sata-1x-ps-10380973.html )
Switch: CISCO WS-C3650-24TS-L Catalyst 3650 24 Port Data 4x1G Uplink LAN Base (~1400$)

(Source: https://thietbimangcisco.vn/cisco-ws-c3650-24ts-l-c-323-333-5235.html)

 Router: TP-Link Router TL-WR940N 450Mbps Wireless N (~18$ -31$)


(Source: https://vatgia.com/5696/6104527/router-tp-link-tl-wr940n-450mbps-wireless-n.html )

 Printer: HP DESKJET INK AVANTAGE 1115 - F5S21B : (~43$)

(Source: https://www.nguyenkim.com/may-in-phun-mau-hp-deskjet-ink-avantage1115-f5s21b.html )
 Computer: Desktop office computer set G41 Ram3 4G, HD 250g, 19 inch screen (~50$)

(Source: https://www.chotot.com/soc-trang/thanh-pho-soc-trang/mua-ban-may-tinh-de-ban/62822040.htm )

Amount:

• Multilayer: 921 x 1 = 921 ($)

• Server: 430 x 1 = 403 ($)

• Switch: 1400 x 8 = 11,200 ($)

• Router: ~25($)

• Printer: 43 x 3 = 129 ($)


• PC: 50 x 26 = 1300 ($)

• Total: ~14000 ($)

AVERAGE VERSION:

 Multilayer Switch: Cisco WS-C3850-48T-E Catalyst 3850 48 Port Data IP Services (~8870$)

(Source: https://thietbimangcisco.vn/cisco-ws-c3850-48t-e-c-323-334-5356.html )

 Server: Dell PowerEdgeR430 Server (E5-2620 / 8GB / 1 * 2T SAS / optical drive / 4 backplane / 3 years on-site service) (3685$)

(Source: https://tiki.vn/dell-dell-poweredge-r730-server-e5260316gb312t-sasoptical-drive8-backplanedouble3-years-onsite-service

p8973890.html?spid=8973954&utm_source=google&utm_medium=cpc&utm_campaign=SEA_NBR_GGL_PLA_DTP_ALL_VN_A
LL_UNK_UNK_C.ALL_X.1057274772_Y.54169762056_V.8973954_W.DT_A.816359382168&gclid=Cj0KCQjwn_LrBRD4ARIs

AFEQFKvNjT1buZAl-QafsiiPxh6cV-PdnukGiuUPzL4CqMre_WL5IrgRR7YaAnmiEALw_wcB )

 Switch: C9200L-48T-4X-E Cisco Catalyst 9200L 48-ports Data 4x10G uplink Switch, Network Essentials (~6893$)

(Source: https://thietbimangcisco.vn/c9200l-48t-4x-e-c-323-379-5650.html )

 Router: Ubiquiti Unifi Router ERPro-8 10/100/1000 Mbps (~538$)

(Source: https://vatgia.com/5696/6411842/thong_so_ky_thuat/thi%E1%BA%BFt-b%E1%BB%8B-router-ubiquiti-unifi-erpro-8.html)

Printer: (~250$)

Canon MF241D multifunction printer. Speed (A4): 27ppm


FPOT (A4): 6.0 seconds

Print resolution: Up to 1200 x 1200dpi

Recommended monthly print volume: 500 - 2,000 pages

(Source: https://pages.lazada.vn/wow/i/vn/sell-on-lazada/register_now/?spm=a2o4n.pdp.header.d2.578b5328F1w02o )

PC: ELEAD DESKTOP PG2019I - PG2019i (~550$)


(Source: https://www.sendo.vn/may-tinh-de-ban-elead-pg2019i-17353261.html?
gclid=Cj0KCQjwn_LrBRD4ARIsAFEQFKt0zYJAZqDLqhN5nDVxVLzkoU2A1kxkBe93r5rYyBlAJ_ZYsu1agksaAsrLEALw_wcB
&gclsrc=aw.ds )

Amount:

• Multilayer: 8870 x 1 = 8870 ($)

• Server: 3685 x 1 = 3685 ($)

• Switch: 6893 x 8 = 55144 ($)

• Router: 538 x 1 = 538 ($)

• Printer: 250 x 3 = 750 ($)

• PC: 550 x 26 = 14300 ($)

• Total: ~83287 ($)


GOOD VERVION:

Multilayer Switch: Cisco Catalyst 3750X-24T catalyst 3750X 24 Port Ethernet Data Port LAN Base Switch Layer 3 - 24
x10/100/1000 (~364$)

(Source: https://thietbimangcisco.vn/cisco-ws-c3750x-24t-s-c-323-331-5376.html)

 Server: Server Dell Poweregde T30 Tower: 1 x Xeon Intel Xeon E3-1225 v5 3.3G, 8M cache, 4C / 4T, turbo (80W), 8Gb
2133MT / s DDR4 ECC UDIMM Upto 64GB (~125$)
(Source: https://www.lazada.vn/products/may-tinh-chu-server-dell-power-egde-t30-tower-i200163932s250191893.html?
ef_id=CjwKCAjw5fzrBRASEiwAD2OSV9ciyWZqDcnzLCocWeqJia2u6DSlAYK5h9hsWoplCIdTq4kHJSSPxoCzBAQAvD_BwE:
G:s&s_kwcid=AL!3153!3!286178070203!!!u!296303633664!
&exlaz=d_1:mm_150050845_51350205_2010350205::12:1497503216!59440595164!!!pla296303633664!c!296303633664!
250191893!
121420745&gclid=CjwKCAjw5fzrBRASEiwAD2OSV9ciyWZqDcnzLCocWeqJia2u6DSlAYK5h9hsWoplCIdTq4kHJSSPxoCzBAQ
AvD_BwE)

Switch: Switch Aruba J9781A 2530 48 Ports 10/100, 2 fixed GE SFP ports, 2 RJ-45 autosensing 10/100/1000 ports (~1155$)
(Source: https://cnttshop.vn/switch-aruba-j9781a-2530-48-ports1g?
gclid=CjwKCAjw5fzrBRASEiwAD2OSVzmWHOXNM33FgY1nXwtZy5rkxjkZf3do5slWvVGtqDrVMwFHg00xgBoCq5gQAvD_B
wE )

Router: TP-Link Archer C5400 MU-MIMO Wi-Fi Router 3 Band AC5400 (4 x 10/100 / 1000Mbps LAN ports, 1 x 10/100/
1000Mbps WAN port, 1 x USB 3.0 port + 1 x USB 2.0 port) (~254$)

(Source: https://tiki.vn/router-wifi-tplink-archer-c5400-mumimo-gigabit-3-bang-tan-ac5400-hang-chinh-hangp3858183.html?
spid=3858185&utm_source=google&utm_medium=cpc&utm_campaign=SEA_NBR_GGL_PLA_DTP_ALL_VN_ALL_UNK_UNK
_C.ALL_X.1057274772_Y.54169762056_V.3858185_W.DT_A.816359382128&gclid=CjwKCAjw5fzrBRASEiwAD2OSV5vKEJp4
0G429RG_r3Ln5WgbKV1vFzZfnssvXphOJXrq64io8WUVQBoC1zQQAvD_BwE)

 Printer: Canon MF3010 Multifunction Printer Scan Copy (~144$)


(Source: https://tiki.vn/may-in-da-nang-canon-mf3010-scan-copy-hang-chinh-hangp481625.html?
spid=194366&utm_source=google&utm_medium=cpc&utm_campaign=SEA_NBR_GGL_PLA_DTP_ALL_VN_ALL_UNK_UNK_
C.ALL_X.2045169324_Y.75301584147_V.194366_W.DT_A.827602579887&gclid=CjwKCAjw5fzrBRASEiwAD2OSV9s4cY7ytT
Rpl6S0lzag-zOZm0tz4wjvgdi8PwG9MVFLlLmsEBhdQBoCYUoQAvD_BwE )

 PC: Dell Optiplex 9010 Core i5 3470 desktop set, 8gb Ram, 500gb HDD and 22inch Dell Computer monitor (~254$)
(Source: https://tiki.vn/bo-may-tinh-de-ban-dell-optiplex-9010-core-i5-3470-ram-8gb-hdd-500gb-va-man-hinh-may-tinh-dell-22-

inch-hang-nhap-khau

p21405896.html?spid=21405907&utm_source=google&utm_medium=cpc&utm_campaign=SEA_NBR_GGL_PLA_DTP_ALL_VN

_ALL_UNK_UNK_C.ALL_X.2045169324_Y.75301584147_V.21405907_W.DT_A.827602579887&gclid=CjwKCAjw5fzrBRASEi

wAD2OSV7C26z1Di_yFDP4I8C35X6aCWRjhYMuLE-HkEOjRxp03t7OrjIGigxoCdm8QAvD_BwE)

Amount:

• Multilayer: 364 x 1 = 364 ($)

• Server: 125 x 1 = 125 ($)

• Switch: 1155 x 8 = 9240 ($)

• Router: 254 x 1 = 254 ($)


• Printer: 144 x 3 = 432 ($)

• PC: 254 x 26 = 6604 ($)

• Total: ~17019($)

P6. Test and evaluate the design to meet the requirements and analyse user feedback.

Feedback:

 If there are economic conditions, I will use the most expensive of the three models because it optimizes the system

 In this system there are 6 VLAN:

• VLAN 10: is the VLAN of the Server (Gateway: 192.168.10.1 – Network address: 192.168.10.0)

107108

• VLAN 20: is the VLAN of the Staff computer in Network room (Gateway: 192.168.20.1 – Network address:

192.168.20.10)

• VLAN 30: is the VLAN of the Higher manager room (Gateway: 192.168.30.1 – Network address: 192.168.30.10)

• VLAN 40: is the VLAN of the Teacher Room (Gateway: 192.168.40.1 – Network address: 192.168.40.10)

• VLAN 50: is the VLAN of the Staff Room (Gateway: 192.168.50.1 – Network address: 192.168.50.10)

• VLAN 60: is the VLAN for Students on the 1st and 2nd floor (Gateway: 192.168.60.1 – Network address:

192.168.60.10)

 Good security.

 Design suitable for each object.

 VLAN network stratification for each object.



All ports connected to other devices of Switch0 are converted to VLAN 10

Similarly, create VLAN20 with switch1 and do the steps as VLAN10


Similar PC0, we switch from static to DHCP the other PCs in VLAN20.

Create VLAN30 in the Higher manager room and move the ports connecting other devices to VLAN30 like VLAN10

Do the same for VLAN40 in the Teacher room and VLAN 50 in the Staff room
Transfer PCs from static to DHCP as we did
Do the same with the printer.
Create VLAN60 for both switches on the first floor and convert the ports connected to other devices to VLAN60.
Convert IP for all PC in 1st floor
Change laptop port PT-LAPTOP-MN-1CFE to PT-LAPTOP-MN-1W

Other laptops and smartphones do the same. And SSID for each Laptop and Smartphone suitable for each room wireless device

2nd floor is exactly the same as 1st floor

Attach PT-CLOUD-NM-1CFE port to Cloud and Server. Delete Switch0 and PC0, then connect the wire as the picture.
Create an email with the name BDT01 to BDT42 with a common password of 123321
Enter email into each PC and Laptop in the system.

P8. Document and analyse test results against expected results.


 System information:

• VLAN10: Server

- Ip address: 192.168.10.10

- Subnet Mask: 255.255.255.0

- Gateway: 192.168.10.1

• VLAN20: Switch1, PC1, PC2, PC3

- Ip address: 192.168.20.11 to 192.168.20.13

- Subnet Mask: 255.255.255.0

- Gateway: 192.168.20.1

• VLAN30: Switch2, PC4 to PC8, Priter0

- Ip address: 192.168.30.11 to 192.168.30.16

- Subnet Mask: 255.255.255.0

- Gateway: 192.168.30.1

• VLAN40: Switch3, PC9 to PC12, Priter1

- Ip address: 192.168.40.11 to 192.168.40.15

- Subnet Mask: 255.255.255.0

- Gateway: 192.168.40.1
• VLAN50: Switch3, PC13 to PC16, Priter2

- Ip address: 192.168.50.11 to 192.168.50.15

- Subnet Mask: 255.255.255.0

- Gateway: 192.168.50.1

• VLAN60: Switch5 to Switch8, PC17 to PC26, Laptop0 to Laptop15, Smartphone0 to Smartphone15

- Ip address: 192.168.60.11 to 192.168.60.52

- Subnet Mask: 255.255.255.0

- Gateway: 192.168.60.1

 Ping
Web – DNS:

Email:
FTP:
REFERENCE
https://www.techopedia.com/definition/30218/cloud-network

https://www.stratospherenetworks.com/advantages-and-disadvantages-of-cloud.htmlhttps://www.esds.co.in/blog/cloud-computing-
types-cloud/#sthash.djLFLvLM.dpbs

https://en.wikipedia.org/wiki/Computer_cluster

https://www.tecmint.com/what-is-clustering-and-advantages-disadvantages-of-clustering-in-linux/

https://www.webopedia.com/TERM/C/centralized_network.html

https://www.quora.com/What-are-the-advantages-and-disadvantages-of-centralized-and-Decentralized

Robot-System

https://itstillworks.com/advantages-disadvantages-virtual-private-network-8560489.html
https://www.vmware.com/solutions/virtualization.html

https://www.computerhope.com/history/network.htm

http://edutechwiki.unige.ch/en/Networking_history

https://www.networkcomputing.com/networking/6-key-milestones-computer-networking-history

https://www.techopedia.com/definition/19936/ieee-8021-working-group-ieee-8021

https://www.techopedia.com/definition/19938/ieee-8023

https://www.ionos.com/digitalguide/server/know-how/token-ring/

https://www.webopedia.com/TERM/8/802_11.html

http://www.functionx.com/networking/Lesson06.htm

https://www.teach-ict.com/gcse_new/networks/peer_peer/miniweb/pg3.htm

https://ftms.edu.my/v2/wp-content/uploads/2019/02/CN1047-Chapter-1.pdf

https://en.wikipedia.org/wiki/Personal_area_network

https://www.belden.com/blog/smart-building/network-types

http://www.itrelease.com/category/computers/

https://vittana.org/12-pros-and-cons-of-internet

http://cloudcomputingnet.com/disadvantages-of-computer-networks/

https://vittana.org/11-advantages-and-disadvantages-of-computer-networking

https://greengarageblog.org/14-main-advantages-and-disadvantages-of-computer-networking

https://www.nibusinessinfo.co.uk/content/benefits-computer-networks

You might also like