Networking Assignment Syntax Solution Network Diagram
Networking Assignment Syntax Solution Network Diagram
1
Networking (unit -1)
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
2
Networking (unit -1)
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.
3
Networking (unit -1)
Unit Tutor
Issue Date
Submission Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system. The recommended word count is 3,000–3,500 words for the report excluding
annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
5
Networking (unit -1)
SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They
are planning to make it one of the state-of-the-art companies in Matara with the latest facilities.
Customer Care 10
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
192 . 168 . 10 . 0 / 24 is given and should be used for all the departments except
the server room. IPs should assign using DHCP .
ERP and CRM Systems need to be implemented in Matara branch in local servers.
Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10 . 254 . 1 . 0 / 24 subnet. ( Uses
stati c
6
Networking (unit -1)
Downloaded by Miracle soulS ([email protected])
IPs )
Sales and Marketi ng Team need to access Network resources using WIFI
connecti vity.
Assume you have been appointed as the new network consultant of SYNTAX SOLUTIONS .
Prepare a network architectural design and implement i t with your suggesti ons and
recommendati ons to meet the company requirements.
( Note: Clearly state your assumpti ons. You are allowed to design the network according
to your assumpti ons, but main requirements should not be violated)
Acti vity 01
Discuss the benefi ts and constraints of diff erent network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can
be used in above LAN and WLAN design.
Discuss the importance and impact of network topologies and network protocol
suites while comparing the main network topologies and network protocol suites
that are used in network design using examples. Recommend suitable network
topologies and network protocol suites for above scenario and justi fy your answer
with valid points.
7
Networking (unit -1)
Discuss the inter- dependence of workstati on hardware with networking soft ware and
provide examples for networking soft ware that can be used in above network design.
Acti vity 03
Prepare a writt en network design plan to meet the above menti oned user
requirements including a blueprint drawn using a modeling tool. ( Ex: Microsoft Visio,
Edraw Max).
Support your answer by providing the VLAN and IP subnetti ng scheme for the above
scenario and the list of devices, network components and soft ware used to design the
network for above scenario and while justi fying your selecti ons.
Test and evaluate the proposed design to meet the requirements and analyse user
feedback by using a User feedback form.
Install and confi gure Network services , devices and applicati ons ( Ex: VLAN, DHCP,
DNS, Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network.
Acti vity 04
Implement a networked system based on your prepared design with valid evidence s
and recommend potenti al future enhancements for the networked system with valid
justi fi cati ons to your recommendati ons. Use criti cal refl ecti on to criti cally evaluat e
the design, plan, confi gurati on, and testi ng of your network while justi fying with valid
conclusions.
8
Networking (unit -1)
9
Networking (unit -1)
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
11
Networking (unit -1)
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
12
Networking (unit -1)
13
Networking (unit -1)
2. Network Topology...................................................................................................
3. Network Protocol.....................................................................................................
Activity 02
6. Servers Types........................................................................................................
Activity 03 and 04
i
Networking (unit -1)
Network System
Network System is a group or System of interconnected computers to share
information and distributed processing task. The Connection can be established by
using either cable media or wireless media. Each network includes hardware and
software that connects computer and devices. Computer network basic of
communication in IT.
Peer-to-Peer Network
In the most basic sense, a peer-to-peer network is a simple network where each
computer doubles as a node and a server for the files it holds exclusively. These are
like a home network or an office network. However, when P2B networks are installed
on the Internet, the size of the network and the available files allow a greater amount
of data to be shared. Early P2P networks such as Napster used client software and a
central server, while later networks such as GAZA and BitTorrent were partitioned
between multiple nodes to free the bandwidth, leaving the central server. Peer-to-peer
networks are commonly associated with cyber theft and illegal file-sharing. Today no
one enjoys P2P usage or network exclusive dominance. Popular P2P networks include
eDonkey, BitTorrent, Gnutella and eMule. (technopedia, 2016)
1
Networking (unit -1)
- Software used:-The operating system for building the P2P network already
has built-in software.
- Resume download:- When downloading any large file and network is
discounted then upon reconnection to the network and can resume the download
easily
- Inexpensive :- Setting up a peer to peer network is inexpensive.
- No need for a specialist :- There is not extra network technician needed to
handle the working of the network. Any person can operate the computer on the
network
- New connection :- It is easy to add a new node to the network. Just need extra
copper wire or USB cable to attach the node(computer) to the network.
Disadvantages of Peer-to-Peer
2
Networking (unit -1)
Cloud sells services to anyone on the Internet. A private cloud is a data center that provides
services hosted to a limited number of people, with a proprietary network or specific access
and access systems. Cloud infrastructure includes the hardware and software components
needed to properly implement a cloud computing model.
These services are divided into three main categories:
1. Infrastructure as a service (IaaS)
2. Platform as a service (PaaS)
3. Software as a service (SaaS)
ADVANTAGES DISADVANTAGES
Reduce Infrastructure Costs Moving from cloud to on-premise is not easy
Table -01
3
Networking (unit -1)
The client server network is defined as a specific type of online network that consists of a
single central computer that acts as a server that runs multiple computers, referred to as
clients. By accessing the server, client can access shared files and information stored on the
server. A client server model can be implemented on a single computer system, but it is
commonly used on a variety of platforms. (Donohoe, 2019)
Figure 3 :- Client-Server
ADVANTAGES DISADVANTAGES
Clients able to access the system Not possible to directly print document or edit
any informations on the client hard disk drive
Table - 02
4
Networking (unit -1)
A LAN is a group of computers and devices that are in a specific location, such as
a building, office or home. A LAN can be small or large, from a home network
with a user to an enterprise network with thousands of users and devices in an
office or school
5
Networking (unit -1)
Advantages of LAN
i. Resource Sharing :- Easy to share resource such as hard disk drives, DVD drives
and Printers
ii. Software Sharing :- Easy to share software (No need to purchase individual
license for each and every computer)
iii. Convenient Communication :- Users can exchange messages and data in a
convenient way
iv. Centralized Data :- Data of the users are located at the centralized serve
v. Improved Security :-It can be guaranteed to be secure
vi. Internet Sharing :- Has the capability to share internet connection among all the
LAN users
Disadvantages of LAN
6
Networking (unit -1)
A wide area network is a network that exists over a large-scale geographical area, such as a
city, state, or country. Also known as Long Haul Network. WANs are often used by large
businesses to connect their office networks; Each office usually has its own local area
network. The world largest WAN is internet. Internet connects many smaller local area
networks (LAN) metro area networks(MAN).It can be said WAN is a combination of
LAN and MAN. (Bradley, 2020)
7
Networking (unit -1)
ADVANTAGES DISADVANTAGES
WAN covers a large geographical area, so Expensive setting up the network
networks can be made over long distances
Different peripherals can be shared with all the Maintaining a network is a full-time job which
computers in the network requires network supervisors and technicians
to be employed
Everyone on that network can access the same Security is a real issue
data
Shares software and resources with connecting Need a good firewall to restrict outsiders from
workstations. entering and disrupting the network
Table :- 03
8
Networking (unit -1)
Private Area Network (PAN) is a computer network organized around an individual for
personal use only. The PAN is used for data sharing between devices within 10 meters or 33
feet, various digital devices such as smartphones, tablets, printers, computers and other
devices within an individual user's environment. Wireless keyboards, Wireless Mice,
Smartphones, TV remotes, Wireless printers, Gaming consoles, Bluetooth, Fire-wire,
ZigBee, Wibree and wireless USB are some examples for PAN (Jahejo, n.d.)
Figure 7 :- (PAN)
ADVANTAGES DISADVANTAGES
No extra space, cable and wire requires. PAN can be operated in less range
of areas
Data can Synchronize between Infrared signals travel only in
a straight line
different devices
Connect to many devices at a time Can only be used for personal area
Secure
9
Networking (unit -1)
A metropolitan area network (MAN) is a large computer network that usually covers a city
or a large campus. A MAN network is optimal for a larger geographical area than a LAN,
from multiple buildings to entire cities. The purpose of the is to provide a long-term
connection to the Internet. The primary use of metropolitan networks is a customer with
high potential needs in a metropolitan area. A man's aim is to provide the required capacity
at a lower cost and higher efficiency than to receive an equivalent service from a local
telephone company.
Figure 5 :- (man)
10
Networking (unit -1)
Disadvantages of MAN
12
Networking (unit -1)
Campus Area Network (CAN) is a group of local area networks (LANs) that are
interconnected within a defined geographical area, such as school campuses, university
campuses, military bases or corporate campuses, and corporate buildings. This Campus
Area Network is also known as the Corporate Area Network and the Residential Network or
Resnet because it is used only by the residents of the particular premises. The Campus Area
Network is a network of interconnected local area networks that are connected by switches
and routers to form a single network, such as the CAN. The campus area network covers
areas ranging from 1 to 5 km and can be wired or wireless. (Geeksforgeek, 2020)
Figure 6 :- (CAN)
ADVANTAGES DISADVANTAGES
Economical in the sense that it uses fewer The connection between nodes (computers) is
cables, switches, hubs and routers limited in size
Sharing of data is easy Maintenance is expensive
Use a wireless connection for connecting
different departments and buildings
Files are transferred with high speed over the
network (internet)
Internet is used from the same ISP (Internet
Service Provider)
Table :- 5
13
Networking (unit -1)
14
Networking (unit -1)
Recommendation
The type of network I used for this Matara; The branch is MAN. (Metropolitan Area
Network). The metropolitan area includes large geographical areas such as network cities or
school districts. Therefore, the famous software company was based in Colombo. Due to
this the network structure of the Matara branch should be merged with the Colombo
company. Therefore, the metropolitan area network is good for this company.
15
Networking (unit -1)
Network topology is the schematic description of the arrangement of the physical and
logical components of a communication network. Nodes typically include devices such as
switches, routers, and software with switch and router features. Topologies are categorized
as either physical network topology, which is the physical signal transmission medium, or
logical network topology, which refers to how data travels through the network among
devices, independent of the physical connection of the devices. (omnisci, 2021)
Bus Topology
This type of network topology is called bus topology because all computers or servers are
connected by a single cable or a backbone. Each workstation sends and receives signals
through this single cable; Bus. This is a linear topography. Depending on the type of
computer network card, a coaxial cable or an RJ-45 network cable is used to connect them
together. (Computer Hope, 2018)
16
Networking (unit -1)
ADVANTAGES DISADVANTAGES
The bus network is easy to extend and can If a cable encounters any problem the entire
include many servers and systems. network will collapse.
Cost is cheap Difficult to diagnose a problem with a
particular server or system.
It is ideal for small network setup and works The effectiveness of bus topology decreases as
effectively for LAN. the number or number of nodes increases.
Table :- 08
Ring Topology
The transmission of data takes place by token and data travels in one direction. Every node is
connected to two nodes on each side. Nodes are connected in a way that makes a close loop,
therefore the name ring topology.
17
Networking (unit -1)
ADVANTAGES DISADVANTAGES
Because information flows in the same In the ring, information and data are sent
direction, speed is better than any other through the source and target, which makes
topography it slower
The network server does not need to control Since the ring is a closed loop, if any one
the connection between workstations node goes down, the entire network will
collapse
Conflict is minimized because data flow The whole network is connected by wire
and connection efficiency are very connection, so the network is completely
consistent dependent on these connections
Every once in a while there is equal access
to resources
Table :- 08
Star Topology
18
Networking (unit -1)
ADVANTAGES DISADVANTAGEGES
New devices can be easily connected and The capability of the core device is important
any device can be easily removed from as it affects the performance of all connected
the topography. devices.
In the star, the central junction controls and Network cost increases with the number of
monitors all activities devices
Since each terminal is connected separately In this network, the performance of all other
and directly, the problem with one device devices is compromised if the hub junction is
does not affect the other network. not capable of supporting that number of
devices.
Table :- 09
Tree Topology
19
Networking (unit -1)
20
Networking (unit -1)
Mesh topology is the network topology in which all network nodes are individually
connected to most other nodes. There is no concept of a central switch, hub or computer,
which acts as a focal point for sending messages.
it can be divided into two kinds:
- Fully connected mesh topology :- All the nodes connected to every other node
- Partially connected mesh topology :- Does not have all the nodes connected to
each other
ADVANTAGES DISADVANTAGES
Each connection can carry its own data Installation and configuration can be
load difficult if the connection is high
It is robust Bulk wiring required
A fault is easily detected The cost of cabling is high in fully
connected mesh topology
Provides security and privacy
Table :- 11
I Recoman Mesh topology for Matara Branch. In this topology, all the nodes are directly or
partially connected to each other. Mesh topology makes a point-to-point connection.
21
Networking (unit -1)
Hybrid topology is a type of network topology that uses two or more different network
topologies. These topologies include a combination of bus topology, mesh topology, ring
topology, star topology and tree topology.
ADVANTAGES DISADVANTAGES
Can be modified as per requirement Expensive network type
Extremely flexible The design of a hybrid network is very
complicated.
Very reliable There is a change in hardware to connect
topology with another topology.
Easily scalable as Hybrid networks are built Architectures are larger in scale so they
in a fashion which enables easy integration require a lot of cables in the installation
of process.
new hardware components
Error detecting and troubleshooting are easy Hubs are very costly and need to be
Used for creating a large network intelligent enough to work with different
architectures.
Handles a large volume of traffic
22
Networking (unit -1)
23
Networking (unit -1)
1. LAN stands for Local Area Network, usually a group of computers and
network devices connected within a single geographic area or building. By
definition, connections must be high-speed and relatively inexpensive (e.g.,
token ring or Ethernet). Most university departments are in lanes.
2. MAN stands for Metropolitan Area Network, which is usually a large network of
multiple buildings within the same city or city. The WAN is an abbreviation for a
wide area network that, unlike MAN, is not limited to one geographical area,
although it can be limited to the limits of a state regulation.
3. The WAN connects multiple LANs, and it can be controlled by one company (a
company or an association) or made available to the public. The technology is fast
and reasonably priced. The Internet is an example of a public WAN.
24
Networking (unit -1)
A network protocol is a set of established rules that direct how computer network devices -
from servers and routers to endpoints - communicate, transmit, and receive data regardless
of differences in their basic configurations, designs, or standards.
To successfully send and receive information, devices on both sides of the communication
exchange must adopt and follow ethical conventions. In networking, support for protocols
can be configured in software, hardware, or both. (Alissa & Wesley, 2021)
There are different types of protocols that support the important and compassionate role of
interacting with different devices in the network. These are:
1. TCP
2. FTP
3. HTTP
4. UDP
5. DNS
6. POP3
25
Networking (unit -1)
TCP is a communications standard for delivering data and messages through networks.
Most commonly used protocols within digital network communications. Organizes data so
it can be transmitted between server and client. TCP is part of Internet protocol suite, So its
known as TCP/IP
ADVANTAGES DISADVANTAGES
Can be deployed effectively in all the This model cannot describe new models or
practical networking problems new technologies.
Allow cross-platform communications To have a centralized TCP / IP domain, it
among heterogeneous networks requires a lot of efforts for registration
Any individual or organization can use TCP Only TCP and IP worked well in the long
/ IP suite without any reorganization run whereas others lost their relevance with
or permission time
Can add networks without disturbing any TCP / IP was designed for WAN. It cannot
service with the help of TCP / IP work so efficiently with LAN and PAN
It assigns a unique IP address to each TCP / IP fails to represent any other stack
computer or system registered on a network (Bluetooth) except TCP / IP suite
Almost all the routers can read TCP packets Does not differentiate between the data link
and give special service to them and physical barriers.
Table:- 13
26
Networking (unit -1)
The file transfer protocol enables file sharing between hosts, both local and remote, and runs
over TCP. For file transfer, FTP creates two TCP connections: control and data connection.
The control link is used to change control information such as commands for recovering
passwords and files, and the data link is used to convert the actual file. These two connections
run in parallel during the entire file transfer process.
There are two types of FTP
1. Active FTP
2. Passive FTP
Figure 14 :- (FTP)
ADVANTAGES DISADVANTAGES
Enables sharing large files and multiple FTP lacks security. Data, usernames, and
directories at the same time. passwords are transferred in plain text,
making them vulnerable to malicious actors.
Recover lost data, and schedule a file FTP lacks encryption capabilities, making it
transfer. non-compliant with industry standards.
Resume file sharing if it was interrupted. Hard to script jobs
Fastest transfer than HTTP.
Table :- 14
27
Networking (unit -1)
HTTP is an application layer protocol used for distributed, collaborative and hypermedia
information systems. It runs on the client-server model, where the web browser acts as the
client. Data such as text, images and other multimedia files are shared over the World Wide
Web using HTTP. As a request and response type protocol, the client sends a request to the
server, which is processed by the server before sending a reply to the client.
HTTP is an unstable protocol, meaning that the connection between the client and the server
is only visible to each other. After that, both the client and the server forget about each
other. Due to this event, both the client and the server are unable to retain information
between requests.
ADVANTAGES DISADVANTAGES
Memory usage and CPU usage are low HTTP lacks encryption capabilities, making it
less secure.
Errors can be reported without closing Too complex for simple data
connections
Owing to lesser TCP connections, network Only point-to-point communication
congestion is reduced
Simple for page level data and Simple No reliable exchanges
implementation
No server resources ate required HTTP requires more power to establish
communication and transfer data.
Table :- 15
28
Networking (unit -1)
UDP is an unconnected traffic layer protocol that provides a simple but unreliable
messaging service. Unlike TCP, UDP does not include reliability, flow control or error
recovery functions. UDP is useful in situations where TCP reliability mechanisms are not
required. Retrieving lost data packets is not possible with UDP.
Figure 15 :- (UDP)
ADVANTAGES DISADVANTAGES
Broadcast and multicast connections are In UDP, it's possible that a packet may not
possible with UDP be delivered, be delivered twice, or not be
delivered at all
UDP is faster than TCP Manual disintegration of data packets is
needed
Table :- 15
29
Networking (unit -1)
The DNS protocol translates or maps hostname to IP addresses. The DNS operates on the
client-server model and uses the database distributed over the name servers hierarchy.
Hosts are identified based on their IP addresses, but the IP address is difficult to memorize
due to its complexity. IPs are also dynamic, making it very important to map domain names
to IP addresses. DNS helps solve this problem by converting websites' domain names to
numeric IP addresses.
Figure 16 :- (DNS)
ADVANTAGES DISADVANTAGES
DNS facilitates internet access Could enable hackers to redirect to other
Eliminates the need to memorize IP Don't carry information pertaining to the
addresses client who initiated it
Specially designed for security purpose Pages for phishing data.
High Speed internet connection Only helps for new connections
No new infrastructure Overheads of updating DNS server
Single point of failures
Table :- 16
30
Networking (unit -1)
The post office protocol is also an email protocol. Using this protocol, end users can
download emails from the mail server to their own email client. Once the emails are
downloaded locally, they can be read without an internet connection. Also, once the emails
have been moved inland, they will be removed from the mail server and the space will be
free. Unlike IMAP4, POP3 is not designed to deal extensively with messages on the mail
server. POP3 is the latest version of the Post Office protocol.
Figure 18 :- (POP3)
ADVANTAGES DISADVANTAGES
Messages can be read when user is offline E-mail cannot be access from other
machines
Less storage space is required E-mail attachments may contain viruses
Very popular
Easy to configure and use
Table :- 17
31
Networking (unit -1)
Sometimes referred to as the access method, a protocol used to define the method of
exchanging data over a computer network, such as a local area network, the Internet, or the
Intranet. The following situations.
32
Networking (unit -1)
Computer networking devices are also called data-mediating units and network devices in a
computer network. The units that generate the last receiver or data are called hosts or data
terminal equipment. Network is the building blocks that facilitate the connection between
devices, services and endpoints that use those services.
Some networking devices are as follows
Hub
Hub A hub is a common connection point, also known as a network hub, used to connect
devices within a network. It acts as a central connector for all devices connected through the
hub. There are several ports in the center. Once a pocket reaches one port, it can be viewed
on all segments of the network as a pocket is copied to other ports.
There are three type hubs
i. Passive Hub: The connection point for wires that helps to make the physical network.
ii. Active Hub: Able to monitor the data sent to the connected devices.
iii. Intelligent Hub: These hubs have some kinds of management software that help to
analyze the problem in the network and resolve them.
33
Networking (unit -1)
Repeaters remove unwanted noise from the incoming signal. Unlike an analog signal, the
original digital signal can be clearly perceived and recovered, even if it is weak or
distorted.
Types of Repeater
i. Telephone repeater.
ii. Optical communications repeater.
iii. Radio repeater.
iv. Analog repeater.
v. Digital repeater.
34
Networking (unit -1)
Figure 21 :- (Router)
A router is a hardware device designed to receive, analyze, and move incoming packets to
another network. It can be used to transfer packets to another network interface, drop them,
and perform other network-related actions.
Types of router
i. Wired Router
ii. Wireless router
iii. Virtual Router
iv. Core Rout
v. B-Router
vi. Edge Router
vii. Subscriber Edge Router
viii. Inter-provider Border Router
35
Networking (unit -1)
- Assign IP Address: IP (Internet Protocol) is the most essential element for every
computer system because IP address refers to the address assigned to the
computer on the network.
- Share resources: Routers allow multiple users to share resources such as faxes,
scanners, printers and file folders on remote drives.
Gateway
36
Networking (unit -1)
Figure 22 :- (bridge)
A network bridge is a device that divides a network into segments. Each segment represent
a separate collision domain, so the number of collisions on the network is reduced. Each
collision domain has its own separate bandwidth, so a bridge also improves the network
performance.
Function of bridge
- This networking device is used for dividing local area networks into several
segments.
- In the OSI model, it works under the data link layer
- It is used to store the address of MAC in PC used in a network
- Used for diminishing the network traffic
37
Networking (unit -1)
Figure 23 :- (switch)
Switch A switch is a multiboard bridge with a buffer and a design that maximizes its
performance (a higher number of ports indicates less traffic) and performance. A switch is a
data connection layer device. This makes it very efficient because the switch can perform
error checking before forwarding data, which does not forward packets with errors and only
selects good packets and sends them to the correct port.
38
Networking (unit -1)
Table :- 18
Recommandation
39
Networking (unit -1)
Client Servers
In the client/server programming model, a server is a program that awaits and fulfills
requests from client programs in the same or other computers. A given application in a
computer may function as a client with requests for services from other programs and also
as a server of requests from other programs.
Mail Servers
Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over
corporate networks (via LANs and WANs) and across the Internet.
Virtual Servers
In 2009, the number of virtual servers deployed exceeded the number of physical servers.
Today, server virtualization has become near ubiquitous in the data center. From
hypervisors to hybrid clouds, ServerWatch looks at the latest virtualization technology
trends.
Web Servers
At its core, a Web server serves static content to a Web browser by loading a file from a
disk and serving it across the network to a user’s Web browser. This entire exchange is
mediated by the browser and server talking to each other using HTTP.
40
Networking (unit -1)
41
Networking (unit -1)
42
Networking (unit -1)
44
Networking (unit -1)
45
Networking (unit -1)
46
Networking (unit -1)
47
Networking (unit -1)
48
Networking (unit -1)
49
Networking (unit -1)
50
Networking (unit -1)
51
Networking (unit -1)
52
Networking (unit -1)
Future Enhacement
53
Networking (unit -1)