Assignment 1
Assignment 1
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 M1 M2 D1
❒ Summative Feedback: ❒ Resubmission Feedback:
Lecturer Signature:
Task 1. Discuss the benefits and constraints of different
network types and standards(P1)
1. Definition of network
Network are two or more computers linked together that can share
resources like printers, internet connections, software, and so on. It is a
grouping of systems and gadgets.
· Benefits:
- Can connect to a private network as well as construct massive
connections that span a whole nation or the globe.
· Drawbacks:
- The connection is quite poor due to the low bandwidth.
b.Standard
· Some standard organizations
-ISO: The International Organization for Standardization
-ITU: The International Telecommunication Union
-ANSI: The American National Standards Institute
-NIST: The National Institute of Standards and Technology
- Ecma International
· The names of the standards used in the network:
-WiFi 802.11 a/g/n/ac,
- IEEE 802.3
- RS-232C cable
- RFCs
- Ethernet
- V.92
This has a major impact on the This has a major impact on the speed
cost, scalability, and bandwidth and delivery of data packets. It also
capacity of networks based on the handles flow control and ordered
selection and availability of delivery of data packets.
devices.
B. Bandwidth
What is network bandwidth?
Network bandwidth is a measurement indicating the maximum capacity
of a wired or wireless communications link to transmit data over a
network connection in a given amount of time. Typically, bandwidth is
represented in the number of bits, kilobits, megabits, or gigabits that can
be transmitted in 1 second. Synonymous with capacity, bandwidth
describes data transfer rate. Bandwidth is not a measure of network
speed -- a common misconception.
Why bandwidth is important:
Bandwidth is not an unlimited resource. In any given deployment
location, such as a home or business, there is only so much capacity
available. Sometimes, this is due to physical limitations of the network
device, such as the router or modem, cabling, or wireless frequencies
being used. Other times, bandwidth is intentionally rate-limited by a
network administrator or internet or wide area network (WAN) carrier.
Multiple devices using the same connection must share bandwidth.
Some devices, such as TVs that stream 4K video, are bandwidth hogs.
In comparison, a webinar typically uses far less bandwidth. Although
speed and bandwidth are not interchangeable, greater bandwidth is
essential to maintain tolerable speeds on multiple devices.
Packet switching:
Packet switching is a method of grouping data transmitted over a digital
network into packets. It is a connectionless network switching method.
It never establishes any physical connection before the transmission
begins. In packet switching, before a message is transmitted, it is
divided into a number of manageable parts called packets.
Compare these two principles together, by saying the
advantages and disadvantages of each of them.
· Hub:
-Concept: A hub is basically a multiport repeater. A hub
connects multiple wires coming from different branches, for
example, the connector in star topology which connects
different stations. Hubs cannot filter data, so data packets are
sent to all connected devices. In other words, the collision
domain of all hosts connected through Hub remains one.
Types of Hub
Active Hub:- These are the hubs that have their own power supply
and can clean, boost, and relay the signal along with the network.
It serves both as a repeater as well as a wiring center. These are
used to extend the maximum distance between nodes.
Passive Hub:- These are the hubs that collect wiring from nodes
and power supply from the active hub. These hubs relay signals
onto the network without cleaning and boosting them and can’t be
used to extend the distance between nodes.
Intelligent Hub:- It works like active hubs and includes remote
management capabilities. They also provide flexible data rates to
network devices. It also enables an administrator to monitor the
traffic passing through the hub and to configure each port in the
hub.
-Operation principles:
When a hub receives a packet of data (an Ethernet frame) at one
of its ports from a network device, it transmits (repeats) the packet
to all of its ports to all of the other network devices. If two network
devices on the same network try to send packets at the same time
a collision is said to occur.
Hubs operate in such a way that all data received through one port
is sent to all other ports. This type of operation creates an
extremely unsecure environment and anyone can sniff the network
using a sniffer and any unencrypted traffic over the network is not
secure. Hubs are unsecure LAN devices that should be replaced
with switches for security and increased bandwidth.
· Repeater:
-Concept: A repeater operates at the physical layer. Its job is to
regenerate the signal over the same network before the
signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the same
network. An important point to be noted about repeaters is
that they do not amplify the signal. When the signal becomes
weak, they copy the signal bit by bit and regenerate it at the
original strength. It is a 2-port device.
-Operation principles:
The purpose of repeater design is to push your network
signals so that they can be transmitted further.
Due to the influence of transmission line noise, the digital
signal or analog signal carrying information can only transmit
a limited distance.
The function of the repeater is to regenerate and transmit the
received signal, thus increasing the distance of the signal
transmission. It connects two or more network segments of
the same network. The repeater can connect the cables of
the two LANs, retime and regenerate the digital signals on
the cable, and then send them out. These functions are the
typical functions of the first layer of the OSI model, the
physical layer.
· DHCP Server:
-Concept: A DHCP Server is a network server that
automatically provides and assigns IP addresses, default
gateways, and other network parameters to client devices. It
relies on the standard protocol known as Dynamic Host
Configuration Protocol or DHCP to respond to broadcast queries
by clients.
-Operating principles: DHCP works at the application
layer to dynamically assign the IP address to the client and this
happens through the exchange of a series of messages called
DHCP transactions or DHCP conversations.
FTP Server:
-Concept: The File Transfer Protocol (FTP) is a
communication standard for transferring files over a
network. Designed for the client-server model architecture,
FTP servers allow users to sign in and access files.
-Operating principles:
FTP servers go beyond other servers in facilitating file
transfers over the internet. The above graphic shows how
FTP servers act as an intermediary between devices. With
two devices known as FTP clients connected to the internet
and a specific FTP server, the server enables the uploading
and downloading of data between the two parties.
Task 4.1 - Explore a range of server types and justify the selection
of a server, considering a given scenario regarding cost and
performance optimization (M2)
1. Explore a range of common server types and give a brief outline
of their uses
Server is a common word in today’s networking. It refers to a specialized
computer or hardware on which the server software works and provides
services to other computers or clients. A server has many functions, and
they come in different types to facilitate different uses.
+Appication server: Also known as a type of middleware, it
occupies a substantial amount of computing region between database
servers and the end-user, and is commonly used to connect the two.
+FTP Server: It works on one of the oldest of the Internet
services, the file transfer protocol. It provides a secure file transfer
between computers while ensuring file security and transfer control.