Asm 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 42

TABLE OF CONTENTS

I. Introduction ................................................................................................................................................. 5
II. Network and Protocol ................................................................................................................................ 5
II.1. Network types ..................................................................................................................................... 5
II.1.1. Definition ...................................................................................................................................... 5
II.1.2. Advantage and disadvantage of network types............................................................................. 6
II.2. Standards and Protocols .................................................................................................................... 10
II.2.1. Definition .................................................................................................................................... 10
II.2.2. International standard organizations ........................................................................................... 11
II.2.3. Network protocol ........................................................................................................................ 12
III. Network topology, Communication and Bandwidth Requirements....................................................... 17
III.1. Network topology ............................................................................................................................ 17
III.1.1. Definition ................................................................................................................................... 17
III.1.2 Advantage and disadvantage of topologies ................................................................................ 18
III.2. Communication and Bandwidth Requirement ................................................................................. 24
III.2.1. COMMUNICATION ................................................................................................................ 24
III.2.2. Bandwidth.................................................................................................................................. 26
IV. Networking Devices and Sever Types ................................................................................................... 27
IV.1. Networking devices ......................................................................................................................... 27
IV.2. Server types ..................................................................................................................................... 31
V. Workstation Hardware and Networking Software .................................................................................. 35
V.1. Workstation hardware and networking software .............................................................................. 35
V.1.1. Workstation hardware................................................................................................................. 35
V.1.2. Networking software .................................................................................................................. 38
V.2.3. The inter-dependence of workstation hardware with relevant networking software ................. 40
VI. Conclusion .............................................................................................................................................. 41

3|Page
Mai The Duc
VII. References ............................................................................................................................................. 41

4|Page
Mai The Duc
I. INTRODUCTION

A network is made up of two or more computers that are connected in order to share resources, exchange
files, or send and receive electronic messages. A network's computers can be connected through cables,
phone lines, radio waves, satellites, or infrared light beams. For example, internet, wifi,
telecommunication, and so on so forth. In this report, I am going to explain what is infrastructure for
networking. In addition, I will explain the scenario of the assignment.

All of a network's resources that enable network or internet access, management, business operations, and
communication are referred to as network infrastructure. Hardware and software, as well as systems and
devices, make up the network infrastructure, which enables computation and communication between
users, services, applications, and processes. The network infrastructure of a system is made up of
everything that is engaged in the network, from servers to wireless routers. The network infrastructure
enables efficient communication and service between users, applications, services, devices, and etc.
(Daniels, 2019)

The scenario put me in the role of a network engineer of a high-tech networking solution development
company name’s Nguyen Networking Limited

II. NETWORK AND PROTOCOL

II.1. Network types

II.1.1. DEFINITION
A network is defined in information technology as the linking of at least two computer systems via a cable
or wireless connection. The most basic network consists of two computers linked by a wire. Peer-to-peer
networks are the name for this sort of network. In this network, there is no hierarchy; both participants
have equal privileges. Each computer has access to the other's data and may share resources including disk
space, programs, and peripheral devices (TV screen, printer, and etc.).

5|Page
Mai The Duc
Today's networks are a little more complicated, and they aren't merely made up of two computers. A
network can have millions of clients or more in a server. A central computer (server) in these networks
provides resources to the other network participants (IONOS, 2020).

Some of the most common networks are:

• WAN: wide area network.


• MAN: metropolitan area network.
• LAN: local area network.
• PAN: personal area network.

II.1.2. ADVANTAGE AND DISADVANTAGE OF NETWORK TYPES

1. Personal area network (PAN)


According to Junaid Rehman in 2021, Personal area network has the following pros and cons:

• Advantages:
 No extra space requires: No need for extra wire or space.
 Connect to many devices at a time.
 Cost-effective: Because there’s no need for extra space requires.
 Easy to use and reliable.
 Secure: Because all devices are approved before data exchange, this network is safe. In
PAN, data hacking and third-party injection are not feasible

• Disadvantages:
 Less distance range: The maximum signal range is 10 meters
 Slow data transfer.

6|Page
Mai The Duc
2. Local area network (LAN)
According to Junaid Rehman in 2021, Local area network has the following pros and cons:

• Advantages:
 Resource and software sharing.
 Securing of data: It is safer to keep data on the server.
 Computer identification
 Easy, fast, and time-saving for communication.

• Disadvantages:
 Data security problem: Unauthorized users can access data if the server machine is not
set up appropriately and there is a security breach.
 Limitation of distance: Local area networks are often created within a building or a
neighboring building and cannot reach beyond that.
 Setting up a LAN is expensive: The cost of setting up a LAN is high since specific
software is required to create a server. Furthermore, communication gear such as hubs,
switches, routers, and cables are expensive.

7|Page
Mai The Duc
3. Metropolitan area network (MAN)
According to Arsal Jahejo in 2020, Metropolitan area network has the following pros and cons:

• Advantages:
 Less expensive.
 Sending local emails: Fast and free when sending emails in MAN.
 Sharing of the internet: Multiple users can get the same high-speed internet.
 High security: MAN has a better security level than WAN.

• Disadvantages:
 Difficult to manage.
 Hackers attack: Require highly security staff in MAN.
 Need More wires: MAN is a combination of two or more LANs therefore cables require
more.

8|Page
Mai The Duc
4. Wide area network (WAN)
According to Junaid Rehman in 2021, Wide area network has the following pros and cons:

• Advantages:
 Covers a large geographical area.
 Centralized data: all data are synchronized
 Get update files and data.
 A lot of applications to exchange messages.
 Sharing of software and resources: We can share software programs and other resources
with other users on the internet, just like we can in a LAN. We share computer
resources across numerous websites in web hosting.
 Global business.
 High bandwidth.

• Disadvantages:
 Security problems: WAN has more security problems as compare to MAN and LAN.

9|Page
Mai The Duc
 The setup cost is high: The expense of setting up a WAN is greater. It might entail
buying routers, switches, and other security software.
 Troubleshooting problems: Because the WAN spans so many locations, resolving an
issue in it is challenging.
 Server down and disconnection issue: Because of many affect the server like weather,
etc.

II.2. Standards and Protocols

II.2.1. DEFINITION

“Networking standards define the rules for data communications that are needed for interoperability of
networking technologies and processes” (Reddy, 2018).

10 | P a g e
Mai The Duc
Networking standards define the rules for data communication that are required for networking
technologies and processes to function together. Standards assist in the creation and maintenance of open
markets by allowing suppliers to compete on the basis of product quality while remaining compatible with
existing market items (Reddy, 2018).

❖ Types of Standards : (jagroopofficial, 2021)


➢ Standards are of two types :
▪ De Facto Standard.
▪ De Jure Standard.

1. De Facto Standard :
▪ The meaning of the work ” De Facto ” is ” By Fact ” or “By Convention”. These are the
standards that have not been approved by any Organization but have been adopted as Standards
because of their widespread use. Also, sometimes these standards are often established by
Manufacturers.

2. De Jure Standard :
▪ The meaning of the word “De Jure” is “By Law” or “By Regulations”.Thus, these are the
standards that have been approved by the officially recognized body like ANSI, ISO, IEEE,
etc. These are the standards that are important to follow if it is required or needed.

II.2.2. INTERNATIONAL STANDARD ORGANIZATIONS

Some of the international standard organizations:

1. International Standards Organization (ISO).

2. International Telecommunication Union (ITU).

3. Institute of Electronics and Electrical Engineers (IEEE).

4. American National Standards Institute (ANSI).

11 | P a g e
Mai The Duc
5. Internet Engineering Task Force (IETF).

6. Electronic Industries Alliance (EIA)

II.2.3. NETWORK PROTOCOL

A protocol is a set of rules that controls how computers on a network communicate with one another. Two
computers must speak the same language in order to communicate with one another. To guarantee that
your computer can interact with another computer on the next desk or halfway over the world, a variety of
network protocols and standards are necessary. OSI and TCP/IP are two most common protocol model,
each model have it own mechanism.

II.2.3.1. OSI

“Created at a time when network computing was in its infancy, the OSI was published in 1984 by the
International Organization for Standardization (ISO). Though it does not always map directly to specific
systems, the OSI Model is still used today as a means to describe Network Architecture” (Forcepoint,
2021).

12 | P a g e
Mai The Duc
The OSI (Open Systems Interconnection) is a seven-layer design, with each layer performing specialised
functions. These seven layers work together to send data from one person to another across the globe. In
order to promote interoperability across diverse devices and applications, the OSI model defines computer
functions into a common set of rules and criteria. OSI may be broken down into four layers to assist
users identify some of the protocols users should be familiar with (Winkelman, 2013).

OSI Layer Name Common Protocols

7 Application
6 Presentation HTTP | FTP | SMTP | DNS | Telnet
5 Session
4 Transport TCP | SPX
3 Network IP | IPX
2 Data Link
Ethernet
1 Physical

• Ethernet (Physical/Data Link Layers).


• IP/IPX (Network Layer).
• TCP/SPX (Transport Layer).
• HTTP, FTP, Telnet, SMTP, and DNS(combined Session/Presentation/Application Layers).

13 | P a g e
Mai The Duc
1. Physical Layer (layer 1):

The physical layer is the lowest layer in the OSI reference model. It is in charge of establishing a physical
connection between the devices. Bits of information are stored in the physical layer. It is in charge of
sending individual bits from one node to another. When this layer receives data, it converts the signal
received into 0s and 1s and sends them to the Data Link layer, which reassembles the frame
(GeeksforGeeks, 2021).

2. Data Link Layer (layer 2):

The data link layer (DLL) is in charge of message transmission from node to node. The major purpose of
this layer is to ensure that data transfers from one node to another via the physical layer are error-free. It is
DLL's job to transmit a packet to the Host using its MAC address when it arrives in a network
(GeeksforGeeks, 2021). Data link layer is diveded into two sub layer:

• Logical Link Control (LLC).


• Media Access Control (MAC).

3. Network Layer (layer 3):

The network layer is responsible for data transfer between hosts on various networks. It also handles
packet routing, which is the choosing of the quickest path to send a packet among a large number of
options. The network layer places the IP addresses of the sender and receiver in the header
(GeeksforGeeks, 2021).

4. Transport Layer (layer 4):

The transport layer ensures that data is transferred between end users in a transparent manner, as well as
providing dependable data transfer services to the upper levels. Flow control, segmentation and
desegmentation, and error control are all used by the transport layer to ensure the reliability of a specific
link. Some protocols are based on state and connections. This implies the transport layer can keep track of
the segments and retransmit those that are lost. If no problems occur, the transport layer additionally offers
acknowledgement of successful data transmission and sends the following data (Infoblox, 2021).

5. Session Layer (layer 5):

The session layer is in charge of establishing connections, maintaining sessions, authenticating users, and
ensuring security (GeeksforGeeks, 2021).

6. Presentation Layer (layer 6):

The Translation layer is often referred to as the Presentation layer. The data from the application layer is
retrieved and processed in this layer so that it may be transmitted over the network in the proper format
(GeeksforGeeks, 2021).

14 | P a g e
Mai The Duc
7. Application Layer (layer 7):

The Application layer, which is implemented by network applications, is at the very top of the OSI
Reference Model's stack of layers. These programmes generate data that must be sent via the internet. This
layer also acts as a window for application services to connect to the network and show data to the user
(GeeksforGeeks, 2021).

❖ The pros and cons of OSI model:


• Advantages:
 It is a general model that may be used to guide the development of any network model.
 It's a layered model. Changes to one layer have little effect on the other levels if the
interfaces between them do not alter dramatically.

▪ Disadvantages:
 The OSI model is quite complicated. The first implementation was inefficient, sluggish,
and expensive.
 Even though there are numerous levels, some of them, such as the session and
presentation layers, have extremely limited functionality when used in practise.

II.2.3.2. TCP/IP

Transmission Control Protocol/Internet Protocol (TCP/IP) is a suite of communication protocols that are
used to link network devices on the internet. In a private computer network, TCP/IP is also used as a
communications protocol. TCP/IP defines how data is transferred over the internet by defining end-to-end
communications that define how packets should be broken down, addressed, sent, routed, and received at
their destination. TCP/IP is a
network protocol that needs
little central control and is
meant to make networks more
dependable by allowing them
to automatically recover from
the failure of any device on
the network (Shacklett, 2021).

15 | P a g e
Mai The Duc
The IP suite's two primary protocols have distinct roles. TCP specifies how programmes might establish
communication channels across a network. It also controls how a message is broken down into smaller
packets and sent over the internet, where it is reassembled in the correct sequence at the destination
address. IP specifies how each packet is addressed and routed to ensure that it reaches its intended
destination (Shacklett, 2021).

1. Network Access Layer (layer 1):

The TCP/IP model's lowest layer is the network access layer. The network access layer is the OSI
reference model's combining of the Physical and Data Link layers. It specifies how data should be
physically sent across the network. This layer is primarily in charge of data transfer between two devices
on the same network. Encapsulating IP datagrams into network frames and translating IP addresses to
physical addresses are two of the activities performed by this layer (Javatpoint, 2021).

2. Internet Layer (layer 2):

The functions of this layer are similar to those of the OSI Network layer. It specifies the protocols that are
in charge of logical data transfer across the whole network.

3. Transport Layer (layer 3):

The transport layer is responsible for establishing a secure data connection between two devices. It splits
data into packets, acknowledges packets received from the other device, and ensures that the other device
recognises packets received (Fisher, 2019).

4. Application Layer (layer 4):

The application layer is a collection of apps that need to communicate via a network. This is where the
user interacts most frequently, such as through email and messaging. The apps don't have to worry about
communication specifics because the lower layers take care of it (Fisher, 2019).

❖ The pros ans cons of TCP/IP model:


• Advantages:
 Works independently of the operating system.
 Support several routing protocols.
 Is using a highly scalable client-server architecture.

16 | P a g e
Mai The Duc
• Disadvantages:
 Is difficult to set up and manage.
 The transport layer does not ensure packet delivery.
 Protocols are difficult to replace in TCP/IP.

III. NETWORK TOPOLOGY, COMMUNICATION AND BANDWIDTH


REQUIREMENTS

III.1. Network topology

III.1.1. DEFINITION

The way a network's links and nodes are connected is referred to as network topology. Actual network
topology refers to the physical signal transmission channel, whereas logical network topology refers to the
method in which data moves across the network between devices, regardless of the physical link between
the units (OmniSci, 2021).

Physical and logical topologies are the two methods of network topology. The actual links and linkages
between nodes and the network—the wires, cables, and so on—are referred to as physical network
topology. Logical network topology is more abstract and strategic, referring to the conceptual knowledge
of how and why the network is set up the way it is, as well as how data flows across it (Contributor, 2019).

❖ Physical topology: The physical network topology refers to the network's real connections (wires,
cables, and so on). Tasks like setup, maintenance, and provisioning need knowledge of the physical
network. It can be arranged in star, ring, mesh, and bus topologies.
❖ Logical topology: The logical network topology is a higher-level concept that describes how the
network is built up, including which nodes link to each other and in what ways, as well as how data is
transported over the network. Any virtual and cloud resources are included in the logical network
topology. It exists in bus ring topologies.

17 | P a g e
Mai The Duc
Some of the most popular topologies:

1. Bus.
2. Ring.
3. Tree.
4. Star.
5. Mesh (Full Mesh & Partial Mesh)
6. Hybrid.

III.1.2 ADVANTAGE AND DISADVANTAGE OF TOPOLOGIES

1. Bus topology:
According to Javatpoint in 2021, Bus topology has the following pros and cons:

• Advantages:
 Low-cost cable.
 Moderate data speeds: Up to 10 Mbps.
 Familiar technology.
 Limited failure: A failure in one node has no bearing on the other nodes.

18 | P a g e
Mai The Duc
• Disadvantage:
 Extensive cabling: Even though a bus architecture is simpler, it still needs a lot of
cabling.
 Difficult troubleshooting.
 Reconfiguration is difficult: Adding more devices to the network would cause the
network to slow down.

2. Ring topology:
According to Javatpoint in 2021, Ring topology has the following pros and cons:

• Advantages:
 Network Management.
 Product availability: There are several hardware and software solutions available for
network operation and monitoring.
 Cost: Low cost.
 Reliable.

• Disadvantages:
 Difficult troubleshooting.
 Failure: The failure of a single station causes the entire network to fail.

19 | P a g e
Mai The Duc
 Reconfiguration difficult: Adding more devices to the network would cause the
network to slow down.
 Delay: The number of nodes has a direct relationship with communication latency. The
communication latency rises as more devices are added.

3. Star topology:
According to Javatpoint in 2021, Star topology has the following pros and cons:

• Advantages:
 Efficient troubleshooting.
 Network control: The star topology makes it simple to incorporate complex network
control capabilities. Any modifications to the star topology are automatically taken into
account.
 Limited failure
 Familiar technology
 Easily expandable: It's simple to grow since more stations may be connected to the
hub's open ports.
 Cost-effective: Good prices.
 High data speeds.

20 | P a g e
Mai The Duc
• Disadvantages:
 A central point of failure: All linked nodes will be unable to interact with each other if
the central hub or switch fails.
 Cable: When a large volume of cable routing is necessary, cable routing can become
challenging.

4. Tree topology:
According to Javatpoint in 2021, Tree topology has the following pros and cons:

• Advantages:
 Easily expandable: The new device can be added to the current network. As a result, we
may state that tree topology can be readily expanded.
 Easily manageable.
 Error detection: In a tree topology, mistake detection and repair are simple
 Limited failure.
 Point-to-point wiring: It has point-to-point wiring for individual segments.

• Disadvantages:
 Difficult troubleshooting.
 High cost.

21 | P a g e
Mai The Duc
 Failure: The main bus cable is the most important part of the tree topology, and if it
fails, the entire network would be harmed
 Reconfiguration difficult: It becomes more complex to modify when new devices are
added.

5. Mesh topology:
According to Javatpoint in 2021, Mesh topology has the following pros and cons:

• Advantages:
 Reliable.
 Fast Communication: Communication is very fast between the nodes
 Easier Reconfiguration.

22 | P a g e
Mai The Duc
• Disadvantages:
 Cost: In comparison to previous topologies, a mesh topology has a large number of
linked devices, such as a router, and more transmission medium.
 Management: Mesh topology networks are enormously complex to maintain and
administer. If the network isn't closely monitored, a communication connection
breakdown can go undetected.
 Efficiency: The number of redundant connections is large in this architecture, which
decreases the network's efficiency.

6. Hybrid topology:
According to Javatpoint in 2021, Hybird topology has the following pros and cons:

• Advantages:
 Reliable.
 Scalable: The network's size can be readily increased by adding additional devices
without impacting the present network's operation.
 Flexible: This architecture is extremely adaptable, since it may be built to meet the
needs of the business.
 Effective.

23 | P a g e
Mai The Duc
• Disadvantage:
 Complex design: The design of the Hybrid network is the main disadvantage of the
Hybrid architecture. The architecture of the Hybrid network is extremely complex to
build
 Costly Hub: Because the hubs used in the Hybrid topology are distinct from those used
in other topologies, they are highly costly.
 Costly infrastructure: A hybrid network needs a lot of cabling, network devices, and
other equipment.

III.2. Communication and Bandwidth Requirement

III.2.1. COMMUNICATION

III.2.1.1. Definition

Network communication, also known as internetworking, refers to a collection of protocols (i.e., rules and
standards) that enable application programs to communicate with one another regardless of the hardware
or operating system they are running on. Application programs can communicate via the internet

24 | P a g e
Mai The Duc
regardless of their actual network connectivity (International Business Machines, 2015).

❖ Rules of network protocol include guidelines that regulate the following characteristics of a network:

1. Access method: A computer sends data into and receives data from a network cable; once data has
traveled across the network, access methods help to regulate network traffic flow.

2. Allowed physical topologies: It enables us to comprehend the many components of our network and
their interconnections. Also, it demonstrates how they interact with one another and what we may
anticipate from their performance.

3. Types of cabling: A cable system is similar to a massive highway system that transports data and voice
communication to its end customers. As you may expect, the cabling infrastructure's structure is critical to
the end service. Consider cabling infrastructure to be the foundation of everything. You can't carry speech
or data packets anyplace without it (TELECO, 2021).

4. Data transfer’s speed: The quantity of data transmitted between two locations on a network in a
particular time period is measured by the data transfer rate. With fast data transmission rates allowing
networks to be employed for complicated activities such as online streaming, it is a critical topic in
modern corporate networking.

❖ Requirement:
• The communication network must be able to accommodate an increasing number of new devices.
• Any computer must be capable of sending and receiving electrical signals (data) via the physical
media that links them.
• When one computer sends a message, the receiving computer must be able to hear and understand
the message.
• On a network, computers must either supply a service to other computers or utilise a service
supplied by others.

III.2.1.2. Impact of network communication

The transmission of digital data between two or more computers is known as data communication. A
physical link between networked computing equipment is established via cable or wireless media. The
Internet is the most well-known computer network for data communication. Network communication
plays an indispensable role because the internet is so important to humankind nowadays.

25 | P a g e
Mai The Duc
III.2.2. BANDWIDTH

III.2.2.1. Definition

“Bandwidth is measured as the amount of data that can be transferred from one point to another within a
network in a specific amount of time. Typically, bandwidth is expressed as a bitrate and measured in bits
per second (bps)” (PAESSLER, 2021). Bandwith normally measure in Byte, Megabyte, and Terabyte.

Bandwidth requirement refers to how much digital information we can send or receive across a connection
in a certain amount of time. The lesser the requirement, the better the user experience. On the other side, if
the requirement exceeds the user's bandwidth, a bad experience is inevitable. Because of that, bandwidth
requirement have big impact in the real world internet used.

III.2.2.2. Impact of bandwidth

The quantity of data traffic that can travel across the network connection is determined by bandwidth,
which has a significant influence on the network's performance. Individuals, corporations, and
organisations that employ acceptable bandwidth traffic have different demands. To prevent wasting
bandwidth, don't use too much for essential necessities. The quantity of bandwidth available to companies
must be sufficient to avoid a bandwidth deficit that causes the data transmission process to fail.

26 | P a g e
Mai The Duc
IV. NETWORKING DEVICES AND SEVER TYPES

IV.1. Networking devices

• Switch:
A network switch links devices on a network and sends and receives data packets between them. A
switch, unlike a router, only delivers data to the one device for which it was intended, not to a
network of numerous devices (CLOUDFLARE, 2021).
Operating principles:
When a device is connected to a switch, the switch records its media access control (MAC)
address, which is a code included in the device's network interface card (NIC) that attaches to the
switch through an ethernet connection. The MAC address is used by the switch to determine which
connected device is sending outgoing packets and where incoming packets should be delivered.
When a device transmits a packet to another device, it enters the switch, which scans the packet's
header to figure out what to do with it. It matches the destination address or addresses and delivers
the packet to the destination devices through the relevant ports (Shaw, 2020).

• Routers:
A router serves as a dispatcher, determining the optimal path for your data to take. It links your
company to the rest of the world, safeguards data from security risks, and can even prioritize some
machines over others. It has two major functions: managing traffic across these networks by
forwarding data packets to their proper IP addresses and letting many devices connect to the
Internet at the same time.

27 | P a g e
Mai The Duc
Operating principles:
To decide the packet's next path, a router looks at the destination IP address in the packet header
and compares it to the routing database. The routing table list comprises data transmission
instructions for a specific network destination. They have a set of criteria for determining the most
effective route to send data to a certain IP address.

• Gateway:
Information, data, and other communications are converted from one protocol or format to another
through the gateway. Some of the tasks of a gateway can be performed by a router. An Internet
gateway is a device that connects a corporate network to the Internet (Gartner, 2021).
Operating principles:
The gateway connects two programmes and provides a mechanism for them to communicate
across protocols, allowing them to exchange data on the same computer or across many computers.
With the help of the gateway, users will be able to communicate and send data back and forth. The
internet would be worthless without gateways. A gateway is a term used to describe a computer
network node. A node is just a physical point where data is sent, received, or used.

28 | P a g e
Mai The Duc
• Firewall:
A firewall is a network security device that analyzes the incoming and outgoing network traffic
and determines whether specific traffic should be allowed or blocked based on a set of security
rules (CISCO, 2021). It detects and inhibits unauthorized access to your operating system, as well
as undesirable incoming traffic from unknown sources. Examples like hackers or cybersecurity
attackers, fraudster’s websites, and so on.
Operating principles:
The firewall analyses data packet process IDs against specified data transmission rules for the local
network or host machine. It filters connections between application levels and lower layers in the
OSI architecture by hooking onto socket calls.

• Hub:
A hub is a network device that links many network devices at the physical layer.
In a local area network, they're frequently utilised to link PCs (LAN). A hub is a gadget that has a
lot of ports on it. A machine that wants to connect to the network plugs into one of these ports.
Regardless of whether a data frame is intended for a specific destination, when it arrives at a port,
it is broadcast to all other ports.
Operating principles:
All data received through one port is transmitted to all other ports, which is how hubs work. This
sort of operation produces a very insecure environment, as anyone with a sniffer may sniff the
network, and any unencrypted traffic over the network is not secure.

29 | P a g e
Mai The Duc
• Repeater:

A network device that works at the physical layer is known as a repeater. A repeater is a device
that increases the signal's strength so that it may travel greater distances without deteriorating in
quality. These devices are frequently used in networks to help cables connecting network devices
reach further destinations.

Operating principles:

A repeater is a device that is used in computer networks to expand the network's coverage area, re-
propagate a weak or broken signal, and/or offer service to far-flung nodes. The frequency domain
of the received/input signal is increased via repeaters, making it more reusable, scalable, and
available.

30 | P a g e
Mai The Duc
IV.2. Server types

1. Web Server: The site you're currently visiting is powered by a web server. Clients are served web
content by this type of server (Andrea, 2021).

2. Database Server: A database server is frequently used in conjunction with another type of server.
This server's sole purpose is to store data in groups (Andrea, 2021).

3. eMail Server: SMTP, or Simple Mail Transfer Protocol, is the most common protocol used by
email servers. There are other protocols that newer mail servers can use, but SMTP is still the most
popular (Andrea, 2021).

31 | P a g e
Mai The Duc
4. Web Proxy Server: A web proxy server can run on any of a number of protocols, but they all do
the same thing. They collect user requests, filter them, and then act on behalf of the user. The most
common type of web proxy server is one that is designed to bypass school and corporate web
filters (Andrea, 2021).

5. DNS Server: A DNS server, also known as a "Domain Name Service" server, is used to translate
domain names into IP addresses. When you enter in a domain name and press Enter, your browser
refers to this server. The idea is that individuals won't have to learn IP addresses, and businesses
would be able to identify themselves appropriately (Andrea, 2021).

32 | P a g e
Mai The Duc
6. FPT Server: FTP servers, often known as "File Transfer Protocol" servers, have a single purpose:
to facilitate file transfers between users. Because these servers don't come with any sort of
encryption by default, a variety of secure implementations of the protocol are frequently used in
their stead (Andrea, 2021).

7. File Server: An FTP server is not the same as a File Server. This sort of server is more
contemporary, with the ability to "map" networked data to disks. This implies that users may
browse folders using their home computer's file browser (Andrea, 2021).

33 | P a g e
Mai The Duc
8. DHCP Server: The Dynamic Host Communication Protocol (DHCP) is used by a DHCP server to
configure the network settings of client computers. Instead of manually configuring static IP
addresses and other network settings on client computers in a large network, a DHCP server in the
network configures these network settings dynamically for LAN devices (Andrea, 2021).

34 | P a g e
Mai The Duc
V. WORKSTATION HARDWARE AND NETWORKING SOFTWARE

V.1. Workstation hardware and networking software

V.1.1. WORKSTATION HARDWARE

A workstation is a high-performance computer system with sophisticated graphics capabilities, huge


storage space, and a powerful central processing unit that is primarily meant for a single user. The casing,
central processing unit (CPU), data storage, graphics card, and other physical components of a computer
make up the hardware.

1. CPU (Central Processing Unit):


The Core Processing Unit (CPU) is commonly referred to as the computer's brain. It's the component of a
computer that handles computations, operations, and programme execution. Before providing an output,
the CPU accepts instructional inputs from the computer's RAM, decodes, and processes the activity. CPUs
may be found in a wide range of devices, including computers, laptops, smartphones, tablets, and smart
TVs. The tiny, generally square chip is installed on the device's motherboard and communicates with the
rest of the hardware to run your computer (Frew, 2019).

35 | P a g e
Mai The Duc
2. ROM (Read Only Memory):
The Read Only Memory (ROM) is a form of electronic storage that is incorporated in during the
manufacturing process. ROM chips are found in computers and a variety of other electronic devices;
VCRs, gaming consoles, and vehicle radios all rely on ROM to perform their duties. ROM chips are either
integrated into an external unit – such as flash drives and other auxiliary memory devices – or placed on a
detachable chip into the device's circuitry. Non-volatile memory, such as ROM, may function without a
power source.

3. RAM (Random Access Memory):


The Random Access Memory (RAM) refers to memory that may be accessed at any time. One of the most
basic components of a computer is RAM. RAM is the ultra-quick and temporary data storage space that a
computer need right now or in the near future. RAM is a type of temporary storage that vanishes when the
power is turned off. It's extremely quick, making it perfect for things that the computer is actively working
on, such as presently running apps and the data those applications operate on or with.

36 | P a g e
Mai The Duc
4. BUS:
A BUS is a computer subsystem that connects and transfers data between computer components. An
internal BUS, for example, connects the computer's internals to the motherboard. A "bus topology" or
"design" can also be used to describe digital connections in different ways. A bus can be serial or parallel.
Data is sent across several cables using parallel buses. Serial buses utilise a bit-serial format to transport
data.

5. NIC (Network Interface Card):


A Network Interface Card (NIC) is a piece of hardware that allows a computer to connect to a network. It
is a circuit board that is inserted in a computer and provides the machine with a dedicated network
connection. It's also known as a network adapter, network interface controller, or LAN adapter.

37 | P a g e
Mai The Duc
V.1.2. NETWORKING SOFTWARE

Any network's basis is built on networking software. It aids network administrators in the deployment,
management, and monitoring of a network. Traditional networks are comprised of specialized hardware,
such as routers and switches, that include networking software.

Multiple devices, such as PCs, laptops, mobile phones, tablets, and other systems, can connect to each
other and to other networks using network software. The internet is a good example of a globally linked
system of servers and computers that rely on networking software to keep users connected.

V.1.2.1. Operating System

The most essential programme that runs on a computer is the operating system. It controls the memory and
operations of the computer, as well as all of its software and hardware. It also allows you to communicate
with the computer even if you don't understand its language. A computer is worthless without an operating
system (GCFGlobal, 2021).

The Operating System (OS) on your computer controls all of the applications and hardware. Several
computer applications are usually operating at the same time, and they all require access to your
computer's central processing unit (CPU), memory, and storage. All of this is coordinated by the operating
system to ensure that each software receives the resources it requires (GCFGlobal, 2021).

Most popular OS are:

• Microsoft Windows
• macOS
• Linux

V.1.2.2. Application

Applications play a significant part in the utilisation of a workstation. Through the workstation, people
utilise applications to work or do anything on the internet.
Microsoft Word, Microsoft Excel, and any of the web browsers used to surf the Internet are examples of
application software... Alternatively, if the software suites are meant for end customers, the actual
software suites themselves (techopedia, 2020).

38 | P a g e
Mai The Duc
Some populer internet browser:

• Google Chrome
• Opera
• Microsoft Edge
• Mozilla Firefox
• Safari (for ISO)

39 | P a g e
Mai The Duc
V.2.3. THE INTER-DEPENDENCE OF WORKSTATION HARDWARE WITH
RELEVANT NETWORKING SOFTWARE

Interdependence is a connection between subjects where one subject’s needs can be fulfilled by the other
subject’s resources and these transfer of resources works both ways.

In this case, computer hardware is controlled by software. These two components are mutually exclusive
and cannot function without one another. A computer's hardware and software must work together to
efficiently process data and generate usable output. Computer hardware is meaningless without software.
Computer software, on the other hand, cannot be utilised without accompanying hardware. Similarly,
computer software must first be loaded into the hardware of the computer before being executed. There
are numerous types of software, with the two most common being operating-system software, which
allows the hardware to function, and application software, which performs a specific task.

For example:

• You might use a tablet to make paintings and have them saved to the cloud automatically.
• You can use Google to search to information you need on the internet.
• Facebook, Instagram, Twitter,… Social media is very popular for everyone nowadays.
• You can use Youtube to watch videos and search for musics.
• You can use Netflixx to watch movies.

We can develop software with an infinite amount of potential and capability. However, all of these tasks
need the use of hardware. We can not utilise application without an OS to let us use and communicate
with the workstation. Our workstaton would like a body without a brain since we don't have the CPU and
RAM run applications properly. Because the NIC assists our device in connecting to the internet, we can
only utilise applications that do not require an internet connection, such as Word, Paint, Excel, etc.

40 | P a g e
Mai The Duc
VI. CONCLUSION

After make this far, I have explained all of my points about networking. the network is a connection of
two or more computers. protocol and standards make up the set of rules for computers on a network to
communicate with one another. four common network types: WAN, MAN, LAN, PAN. networking
devices and the inter-dependence of workstation hardware with relevant networking software have been
presented. With all the information in the report, my assignment has come to the end. I have gain
experience after working hard on this assignment which will be useful for a future project.

VII. REFERENCES

Andrea, H., 2021. NETWORKS TRAINING. [Online]


Available at: https://www.networkstraining.com/different-types-of-servers/
[Accessed 18 August 2021].

CISCO, 2021. CISCO. [Online]


Available at: https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html
[Accessed 18 August 2021].

CLOUDFLARE, 2021. CLOUDFLARE. [Online]


Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-network-switch/
[Accessed 18 August 2021].

Contributor, S., 2019. DNSstuff. [Online]


Available at: https://www.dnsstuff.com/what-is-network-topology
[Accessed 18 August 2021].

Daniels, D., 2019. Gigamon. [Online]


Available at: https://blog.gigamon.com/2019/03/06/what-is-network-infrastructure/
[Accessed 12 August 2021].

Fisher, S., 2019. Avast. [Online]


Available at: https://www.avast.com/c-what-is-tcp-ip
[Accessed 9 September 2021].

41 | P a g e
Mai The Duc
Forcepoint, 2021. Forcepoint. [Online]
Available at: https://www.forcepoint.com/cyber-edu/osi-model
[Accessed 9 September 2021].

Frew, J., 2019. MUO. [Online]


Available at: https://www.makeuseof.com/tag/cpu-technology-explained/
[Accessed 9 September 2021].

Gartner, 2021. Gartner. [Online]


Available at: https://www.gartner.com/en/information-technology/glossary/gateway
[Accessed 18 August 2021].

GCFGlobal, 2021. GCFGlobal. [Online]


Available at: https://edu.gcfglobal.org/en/computerbasics/understanding-operating-systems/1/
[Accessed 9 September 2021].

GeeksforGeeks, 2021. GeeksforGeeks. [Online]


Available at: https://www.geeksforgeeks.org/layers-of-osi-model/
[Accessed 9 September 2021].

Infoblox, 2021. Infoblox. [Online]


Available at: https://www.infoblox.com/glossary/layer-4-of-the-osi-model-transport-layer/
[Accessed 9 September 2021].

International Business Machines, 2015. IBM. [Online]


Available at: https://www.ibm.com/docs/en/zos/2.4.0?topic=services-basics-network-communication
[Accessed 18 August 2021].

IONOS, 2020. Digital Guide IONOS. [Online]


Available at: https://www.ionos.com/digitalguide/server/know-how/what-is-a-network/
[Accessed 16 August 2021].

jagroopofficial, 2021. GeeksforGeeks. [Online]


Available at: https://www.geeksforgeeks.org/protocol-and-standard-in-computer-networks/
[Accessed 18 August 2021].

Jahejo, A., 2020. Computer Network Topology. [Online]


Available at: https://computernetworktopology.com/metropolitan-area-network/
[Accessed 18 August 2021].

42 | P a g e
Mai The Duc
Javatpoint, 2021. Javatpoint. [Online]
Available at: https://www.javatpoint.com/computer-network-tcp-ip-model
[Accessed 9 September 2021].

Javatpoint, 2021. What is Topology?. [Online]


Available at: https://www.javatpoint.com/computer-network-topologies
[Accessed 18 August 2021].

OmniSci, 2021. omnisci. [Online]


Available at: https://www.omnisci.com/technical-glossary/network-topology
[Accessed 18 August 2021].

PAESSLER, 2021. PAESSLER. [Online]


Available at: https://www.paessler.com/it-explained/bandwidth
[Accessed 18 August 2021].

Reddy, A., 2018. tutorialspoint. [Online]


Available at: https://www.tutorialspoint.com/Network-Standardization
[Accessed 18 August 2021].

Reddy, A., 2018. tutorialspoint. [Online]


Available at: https://www.tutorialspoint.com/Network-Standardization
[Accessed 9 September 2021].

Rehman, J., 2021. IT Release. [Online]


Available at: https://www.itrelease.com/2018/07/advantages-and-disadvantages-of-wide-area-network-
wan/
[Accessed 18 August 2021].

Rehman, J., 2021. IT Release. [Online]


Available at: https://www.itrelease.com/2018/07/advantages-and-disadvantages-of-personal-area-network-
pan/
[Accessed 18 August 2021].

Rehman, J., 2021. IT Release. [Online]


Available at: https://www.itrelease.com/2018/07/advantages-and-disadvantages-of-local-area-network-lan/
[Accessed 18 August 2021].

43 | P a g e
Mai The Duc
Shacklett, M. E., 2021. TechTarget. [Online]
Available at: https://www.techtarget.com/searchnetworking/definition/TCP-IP
[Accessed 9 September 2021].

Shaw, K., 2020. NETWORKWORLD. [Online]


Available at: https://www.networkworld.com/article/3584876/what-is-a-network-switch-and-how-does-it-
work.html
[Accessed 9 September 2021].

techopedia, 2020. techopedia. [Online]


Available at: https://www.techopedia.com/definition/4224/application-software
[Accessed 9 September 2021].

TELECO, 2021. telecophones. [Online]


Available at: https://www.telecophones.com/importance-cabling-infrastructure/
[Accessed 18 August 2021].

Winkelman, R., 2013. An Educator's Guide to School Networks.. 1st ed. Florida: Florida Center for
Instructional Technology.

44 | P a g e
Mai The Duc

You might also like