0% found this document useful (0 votes)
28 views23 pages

Networking-Mairaj Poke-Assignment - 1

The document discusses different types of computer networks, including their benefits and limitations. It describes Local Area Networks (LANs) which connect devices within a building or area, Metropolitan Area Networks (MANs) which operate within a larger region than a LAN, and Wide Area Networks (WANs) which connect across cities, states, or countries. The document also discusses network topologies, bandwidth requirements, networking devices like hubs, switches and routers, server types, and how protocols enable effective communication between networked systems.

Uploaded by

Mairaj Poke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views23 pages

Networking-Mairaj Poke-Assignment - 1

The document discusses different types of computer networks, including their benefits and limitations. It describes Local Area Networks (LANs) which connect devices within a building or area, Metropolitan Area Networks (MANs) which operate within a larger region than a LAN, and Wide Area Networks (WANs) which connect across cities, states, or countries. The document also discusses network topologies, bandwidth requirements, networking devices like hubs, switches and routers, server types, and how protocols enable effective communication between networked systems.

Uploaded by

Mairaj Poke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

STUDENT ASSESSMENT SUBMISSION AND DECLARATION

When submitting evidence for assessment, each student must sign a statement
confirming that the work is their own.

Student name: Mairaj Poke Assessor name: Miss Pooja

Issue date: Submission date: 10-Oct- Submitted on: 14-Oct-2022


2022

Programme: Pearson BTEC Level 5 HND in Computing (Application Development)

Unit: 2 Networking

Assignment Number and Title: 1 of 2: Designing a Network Infrastructure to


Support File Sharing, Email, Servers and Internet Connections (Part 1).

Plagiarism
Plagiarism is a special form of cheating. Plagiarism must be avoided at all costs and
students who break the rules, however innocently, may be punished. It is your
responsibility to ensure that you understand the proper referencing procedures. As a
college student, you are expected to use appropriate references and keep careful,
detailed notes on all sources of material you have used in your work, including any
material downloaded from the Internet. If you need further advice, please contact the
relevant tutor or course tutor.
Student Declaration

Student Statement

I confirm that the submitted assignment is entirely my own work and I fully understand
the consequences of plagiarism. I understand that making a false statement is a form
of misconduct.

Student signature: Date: 10-Oct-2022


Table of Contents
The benefits and constraints of different network types and standards. 4
Network I type 4
LAN 4
Metropolitan Area Network (MAN): 4
WAN 5
Benefits I of different I network types 5
Benefits I of LAN 5
Benefits I of MAN 5
Benefits I of WAN 5
Types of network standards: 6
The impact I of network topology, I communication and bandwidth I requirements. I 6
Impact of I Network Topology I 6
Types I of Network I Topology’s 7
Bandwidth Requirement 12
Discuss the operating principles of networking devices and server types 12
Network Device 12
Hub: - 12
Switches: - 13
Router: - 13
Routing 14
Gateway: – 14
Discuss the interdependence of workstation hardware with relevant networking
software. 15
Compare I common networking I principles and how protocols I enable the
effectiveness I of networked systems I. 22
Network I protocol layers and their I Functions 22
There I are 3 Types I of layer: 22
What is I a Protocol I 24
Types of I protocols I 24
Explore a range I of server types and justify I the selection of a server, considering a
given I scenario regarding cost I and performance I optimisation. 25
Types of I servers 25
Selected I server DNS I 25
DNS load 25
How DNS I Load Balancing Works I 25
Anycast I DNS 26
DNS I failover 26
The benefits and constraints of different network types and
standards.
A computer network is a combination of computers together through networked
I I I I I

devices and media (network protocol, transmission environment ) in a structured


I I I I

manner and these computers communicate to communicate with each other. This
I I I I I II I

report will explanation of networking principles, protocols and devices, including


I I I I

benefits and limitations of networked solutions, the impact of network topology,


I I I I

communication and bandwidth requirements, the efficiency of networking systems,


I I I I

operating values of networking devices and server types and networking software
I I I I

Network type I

LAN (Local Area Network): Is known as a private network in a building, an area


I I I I

that is some km in size. They connect with servers and workplaces in offices and
I I I I

factories to share resources and exchange information. I I

Benefits of LAN I

● Comprising a set of computers or mobile devices joined to a server, local


I I I I I

area network (LAN) helps businesses, schools and other organizations


I I I I

conduct daily operations. I I

● It is low cost and easy to set up the connection.


I I I I

● LANs support I a number of faults I tolerant features, I which improves I


I

reliability and I reduces downtime I for your business


● Devices that attach to the LAN can effortlessly share data with each other.
I I I

Disadvantage of LAN
● LANs do save costs due to shared computing resources, but the initial cost of
setting up local area networks is quite high.
Unit 2 – Networking Assignment 1

● The LAN administrator can check the personal information files of each LAN
user, so it does not offer good privacy.
● Unauthorized users can access important organization data if the LAN
administrator is unable to secure the centralized data storage.
● Local Area Network requires constant LAN management as there are
problems related to software setup and hardware failure

Metropolitan Area Network (MAN): A metropolitan area network (MAN) is a I

network that interconnects users with computer resources in a geographic area or


I I I I

region larger than that covered by even a large local area network (LAN) but smaller
I I I I

than the area covered by a wide area network (WAN). The term is applied to the
I I I I

interconnection of networks in a city into a single larger network (which may then
I I I

also offer efficient connection to a wide area network).


I I I

Benefits of MAN I

● It I is less expensive I to attach MAN with I WAN. MAN gives I the good
efficiency I of data. In MAN data I is easily managed I in a centralized way.
● On I MAN you can I send local emails I fast and free

● MAN, uses fibre optics so I the speed of data I can easily reach I upon
1000 Mbps. Files and databases, I can be transferred I fast.

Disadvantage of MAN
● You need more cable to make a MAN connection from one place to another.

● In the MAN network, it is difficult to secure the system against hackers

WAN (Wide Area Network): Is known as "wide area network", it is used in a large
I I I I I

geographic range, generally for the whole country or continent, ranging from a few
I I I I I

hundred to several thousand kilometres. These include a set of machines aimed at

<IN0719A15E><Mairaj Poke>Page | 5
Unit 2 – Networking Assignment 1

running programs for users. These machines are often referred to as hosts or are
I I I I I

called servers; end systems. Main machines are connected by subnets or


I I I I

communication subnets. the mission of a subnet is to send messages from one


I I I I

server to another. I

Benefits of WAN
I

● The network offers both information storage and a mechanism for distribution
that information with other network users
● I There are I servers that I rise security. I

● I A LAN can often I span a building I while a WAN I can consist of a I large
geographical I range, passage I national or international I boundaries

Disadvantage of WAN
• Investment costs for initial setup are very high.
• WAN is difficult to maintain. You need experienced technicians and network
administrators.
• There are more errors and problems due to the wide coverage and use of
different technologies.
● •Troubleshooting takes more time due to the involvement of multiple wired
and wireless technologies.
● •Offers less security compared to other types of networks.

Types of network standards:


The Institute of Electrical and Electronic Engineers (IEEE), a non-profit technical
association that is the highest authority on technical fields. Computer engineer
ranges and many more which are related to technical field.

IEEE types:

<IN0719A15E><Mairaj Poke>Page | 6
Unit 2 – Networking Assignment 1

1) IEEE 802.3 Ethernet standards: Half-duplex shared with the LAN for each
segment and its part of the total bandwidth at each station. Ethernet for total
bandwidth is 10 megabits per second. There are 3 types of computer networks:

a) IEEE 802.3, which is an Ethernet based IEEE standard with a requirement to


manage immediate system access requests.
b) IEEE 802.3 which is Fast Ethernet: It is 100Mbps Ethernet which works 10
times faster than 10Mbps Ethernet for LAN environment.
c) IEEE 802.3, which is a Gigabit Ethernet with 1000Mbps/1Gbps Ethernet
specification that transmits data at 1 gigabit per second and is mostly used in
metropolitan area networks (MANs).

Constrains of IEEE 802.3 Ethernet standards

o It offers network-wide connectionless communication.


o Due to the need for deterministic service, it is not applicable to real-time
applications.
o The client-server architecture cannot be used since the network cannot define
packet priorities.
o When utilizing it for interactive applications, you must input dummy data to
provide the required frame size of 46B.
o Data transfers in interactive applications must be rapid because the size of
the data is so little. There is a 46B minimum frame size restriction in Ethernet.
It is not a good option for interactive applications as a result.

2) IEEE 802.5 Token Ring standards: Any network host can send data at any time
when no one else is on the line. It works as the network passes rings of tokens,
almost like a relay race for the next number.

Constrains of IEEE 802.5 Token Ring standards

o It is challenging to diagnose the ring.


o Performance-wise, it is inferior than the bus topology.
o It is Pricey.
o The entire network is affected if one workstation crashes, or the entire
network is affected if one node fails.
o All computers must be turned on in order for them to connect with one
another.

3) IEEE 802.11 Wireless LAN (WLAN) Standards: The IEEE 802.11 standard
refers to the specification of a developed wireless LAN with technology. It is an
interface between a wireless client and a base station, such as laptops.

Constrains of IEEE 802.11 Wireless LAN (WLAN) Standards

o It can only cover a small area.

<IN0719A15E><Mairaj Poke>Page | 7
Unit 2 – Networking Assignment 1

o Communication may be hampered by rain or thunder, and attacks may be


successful due to the insufficient data security of wireless LANs, which require
access points that are more expensive than wires and hubs.
o Unauthorized users have access to insecure communication.

4) IEEE 802.16 Broadband wireless network

A group of wireless broadband standards known as IEEE 802.16 were created by


the Institute of Electrical and Electronics Engineers (IEEE). In order to create
standards for broadband for wireless metropolitan area networks, the IEEE
Standards Board organised a working group in 1999.

Constrains of IEEE 802.16 Broadband wireless network

o No matter what your business is or where you are located, you must make
sure that your Wi-Fi is password-protected.
o To access the internet and take use of your broadband's full speed, you
should always be within range of your router.
o When a signal travels through thick brick walls or concrete roofs, its strength
decreases. One of the causes of the decreased internet speed is this.

The impact of network topology, communication and bandwidth requirement.

Topology: The topology for the system that is a key determinant of performance and
how the system is set up, with a physical and logical description for the links and
nodes, how they are set up and related to each other.

Topology types:

● Bus topology

● Ring topology

● Star topology

● Network topology

Bus topology:

Devices that are networked with one cable from one end to the other in one
direction. It is also called line topology.

<IN0719A15E><Mairaj Poke>Page | 8
Unit 2 – Networking Assignment 1

Pros

1) It is easily expandable for many more users and system to be added.

2) It is very cheap in terms of cost.

3) It is best for small networks and works efficiently.

Cons

1) The entire network will collapse if a single cable encounters any problem.

2) Efficiency decreases when the number of nodes increases.

3) All computers receiving the same signal from a common bus are good.

Star topology:

The network topology is designed so that each network node is directly connected to
one central hub using coaxial cable, twisted pair or fiber optic cable.

Pros:

1) Adds new devices easily and can be removed from the topology.

2) Activities are controlled and monitored by the central node.

Cons:

<IN0719A15E><Mairaj Poke>Page | 9
Unit 2 – Networking Assignment 1

1) Network costs increase with increasing numbers.

2) The capacity of the central device is fundamentally affected by all connected


devices.

3) Devices with efficiency are compromised if the hub function is able to support the
number of devices.

Ring topology:

In this topology, all nodes are arranged in a ring, where data can travel around the
ring in one or both directions, with each device having exactly two computers
together.

Pros:

1) Information goes down in one direction, so the speed is better than any other
topology.

2) Connectivity and data flows very smoothly resulting in less collision.

3) The network server does not need to control the connectivity for the workstation.

4) The station has the same access to resources every time with every system.

Cons:

1) Data and information being passed through the source and destination, which
slows them down.

2) The circle is looped with a node that goes down and the whole network
collapses.

3) A network that is connected using a wired connection is a network completely


dependent on that connection.

<IN0719A15E><Mairaj Poke>Page | 10
Unit 2 – Networking Assignment 1

Mesh topology:

This is a setup where all computer network devices are interconnected for
transmission that would be distributed in the event of a link failure. A wireless
network is most often used.

PROS:

1) Data transfer for multiple devices thus handles high volumes of traffic.

2) A device that is not will cause network data transmission to be interrupted.

3) Devices that are added additionally do not interfere with transmission between
other devices.

Cons:

1) Implementing higher networks other than any other network topology to create a
less desirable option.

2) Topology, which is difficult and time-consuming to create and maintain a topology.

Discuss the operating principles of networking devices and server types

Network Device
Hardware devices that are used to connect computers, printers, fax machines and
I I I

other electronic devices to a network are called network devices These devices
I I I I I I I II

transfer data in am fast, secure and correct way over same or different networks.
I I I I I I

Network devices may be inter-network or intra-network Some devices are installed I I I I I

on the device, like NIC card or RJ45 connector, whereas some are part of then
I I I I I I I I I I I I

network, like router, switch, etc. Let us explore some of these devices in greater
I I I I I I I I I I I I

detail

<IN0719A15E><Mairaj Poke>Page | 11
Unit 2 – Networking Assignment 1

Hub: - A hub is a physical layer networking device which is used to connect


I I I I I I I

multiple devices in a network . They are generally used to connect computers in a I I I

LAN. A hub has many ports in it. A computer which intends to be connected to the
I I I I I I I I I I

network is plugged in to one of these ports. When a data frame arrives at a port, it
I I I I I I

is broadcast to ever other port, without considering whether it is destined for a


I I I I I I I I I I I

particular destination or not.


I I I

How the Hub works:


Data can be sent from the host to the network hub and then from the hub to all
connected ports during the data transfer process. A network hub can't be that secure
because of this work. Additionally, duplicating data packets on all ports will slow
down the hub, necessitating the need for a network switch.
Situations where the Hub is used:
In the past, hubs were used in local area networks (LANs) to connect different
network devices because they served as a central hub. A hub transmits data packets
to all its ports and to all other network devices when a network device sends a frame
containing a data packet to one of its ports. If two devices on the same network try to
send them at the same time, the two data packets will collide.

Switches: - A switch is a data link layer networking device which connects devices
I I I I I I I I

in a network and uses packet switching to send and receive data over the network.
I I I I I I I I

ILike a hub, a switch also has many ports, to which computers are plugged in.
I I I I I I I

However, when a data frame arrives at any port of a network switch, it examines
I I I I I I I

the destination address and sends the frame to the corresponding device(s). Thus,
I I I I I I

it supports both unicast and multicast communications.


I I I I

How the switch works:

Each time a host sends a frame to another host, the destination host's source host is
recorded with a port in the switch's MAC address table. The source address is
always stored in the switch database. The host's MAC address and port number will
not be recorded in the switch table unless it sends some data. The switch does not
know any host or its address when initially configured. When a host sends a frame in

<IN0719A15E><Mairaj Poke>Page | 12
Unit 2 – Networking Assignment 1

such a scenario, the switch stores the host's MAC address in the table, but since
there is no destination information, the switch sends the frame to all hosts.

Situations where the switch is used:

An active hub, sometimes referred to as an Ethernet switch, can be useful for


connecting nodes to an internal corporate LAN because it avoids bandwidth
allocation conflicts by preventing data packets from overlapping. Accordingly, the
important bandwidth is provided before the following ones.
Router: - A router is a network layer hardware device that transmits data from one
I II I I II II I I I I I

LAN to another if both networks support the same set of protocols. So, a router is
I I I I I I I I I I

typically connected to at least two LANs and the internet service provider (ISP). It
I II I I I I I I I

receives it data in the form of packets, which are data frames with their destination
I I I I I I I I

address added. Router also strengthens the signals before transmitting them. That I I I I I I I I I

is why it is also called repeater .


I I I I

Situations where the Router is used:


A router is a device that controls traffic between networks and helps networks
connect to each other. Routing is a method used to transfer IP packets from one
network to another. If the router does not have a dedicated NIC for each network, it
will have more than two NICs, one physically connected to one network and the
other physically connected to another network.

Routing Table: - A router reads it’s routing table to decide the best available route
I I I I I I I I I I

the packet can take to reach its destination quickly and accurately . The routing
I I I I I I II I I I I

table may be of these two types


I I I I I

∙Static In a static routing table the routes are fed manually. So, it is suitable only
I I I I I I I I I I I I I

for very small networks that have maximum two to three routers .
I I I I I II I I I I I I I

∙Dynamic In a dynamic routing table the router communicates with other routers
I I I I I I I I I I I

through protocols to determine which routes are free. This is suited for larger
I II I I I I I

networks where manual feeding may not be feasible due to large number of
I I I I I I I

routers . I

Gateway: – A gateway, as the name suggests, is a passage to connect two I I I I I I

networks together that may work upon different networking models . They basically
I I I I I I I I I I

work as the messenger agents that take data from one system, interpret it, and
I I I I I I I I I

transfer it to another system. Gateways are also called protocol converters and can
I I I I I I I I I

operate at any network layer . Gateways are generally more complex than switch or
I I I I I I II

router.

<IN0719A15E><Mairaj Poke>Page | 13
Unit 2 – Networking Assignment 1

Situations where the Gateway is used:


The information in the packet header, which contains the IP address of the
destination, is first verified when a particular data packet arrives at the gateway. The
data is converted to any protocol that the destination network can understand after
checking for any errors or the destination IP address. Finally, it creates a special
transmission path for the packet and forwards the translated data packet to the
destination.

Difference Between Hub, Switch. And Router.

Hub Switch Router


Flows in two directions (full
Flows in two directions Flows in two directions (full
duplex).
(half duplex). duplex).

It is in the form of packets


It is in the form of bits that It is in the form of frames that
that send data.
send data. send data.

Hub broadcast device. Switch the multicast device. A router is a routing device.
It works for Data/Network Layer. It works for the network layer.
Works for physical layer.

No node in the network is The device is connected to the The device connects two
stored under the MAC same network. The device is networks.
address connected to the network.

Nodes in networks are Nodes in networks are stored by Nodes in networks are stored
stored by MAC address. MAC address and IP address. by MAC address and IP
address.

Types: Active hub, Types: Layer 2 and Layer 3 Types: Broadband router,
Passive hub and Intelligent switch. Wireless router, Edge router.
hub

Servers in computer networks:

<IN0719A15E><Mairaj Poke>Page | 14
Unit 2 – Networking Assignment 1

A server in computing is a program or device that offers functions to so-called


clients, which are other programs or devices. The client-server model is the name of
this architecture. Splitting one overall calculation into different processes or devices.
Services are the numerous functions that servers can offer. These services include
performing calculations for a client or distributing data or resources among many
clients. One server can serve several clients and one client can use many servers. A
client process may be active on the same computer. It can also connect to the server
over the network to run on another device.

Server Types:

1. Application servers

Instead of client computers running applications locally, applications are run by


application servers. Resource-intensive applications used by many people are often
run by application servers. This eliminates the requirement that each client have
enough resources to run programs. In addition, it eliminates the requirement to
maintain software on multiple machines rather than just one.

DNS server

DNS servers are application servers that help client computers resolve names by
translating human-friendly names into machine-understandable IP addresses. The
DNS system is a widely dispersed database of names and other DNS servers, each
of which can be used to request another computer name that is not otherwise
known. When a client requires a system address, it sends a DNS request to the DNS
server along with the name of the requested resource. The DNS server returns the
requested IP address from its name table.

Mail servers

One very popular class of application server is the mail server. Emails sent by users
are received by mail servers that keep them on file until a client requests them on
behalf of the user. An email server allows one device to be set up and connected to
the network at all times. Instead of each client computer having its own e-mail
subsystem running 24/7, it is ready to send and receive messages.

2. File servers

Distribute and store files on file servers. Files stored on the server can be shared by
a number of clients or users. In addition, central file storage makes it easier to
implement backup and fault tolerance solutions rather than trying to guarantee the
security and integrity of files on every device in the company. File server hardware
can be designed to maximize read and write speeds to increase performance.

3. Database servers

It's staggering how much data is consumed by businesses, users, and other
services. Databases are used to store large amounts of this data. Databases must
be accessed by multiple clients at the same time and can use a staggering amount

<IN0719A15E><Mairaj Poke>Page | 15
Unit 2 – Networking Assignment 1

of disk space. These two requirements are good candidates for placing such
databases on servers. Database servers manage database programs and respond
to many client requests. Oracle, Microsoft SQL Server, DB2, and Informix are
examples of common database server programs.

Virtual servers

Virtual servers are taking the server world by storm. Unlike traditional servers, which
are installed as an operating system on the machine's hardware, virtual servers exist
only as defined in specialized software called a hypervisor. Each hypervisor can run
hundreds or even thousands of virtual servers at once. The hypervisor represents
the server's virtual hardware as if it were real physical hardware. A virtual server
uses the virtual hardware as usual, and the hypervisor passes the actual compute
and storage needs to the real hardware underneath, which is shared among all the
other virtual servers.

Proxy servers

A proxy server acts as an intermediary between the client and the server. A proxy
server, often used to isolate clients or servers for security reasons, will take the
request from the client. Instead of responding to the client, it forwards the request to
another server or process. The proxy server receives a response from the other
server and then responds to the original client as if it were responding itself. In this
way, neither the client nor the corresponding server needs to connect directly to
each other.

Interdependence of Workstation with relevant network software.

Various hardware components are required for network workstations, which are:

1. Network Interface Card (NIC)

A circuit board that is commonly mounted on the computer to connect to the network
is called a network interface card, or network interface controller. It functions as a
crucial element in the network connection of computers. Currently, most PCs and
some network servers have NIC cards that are built-in in some fashion. Additionally,
network cards such as server network cards can be plugged into device expansion
slots.

<IN0719A15E><Mairaj Poke>Page | 16
Unit 2 – Networking Assignment 1

How it works

A NIC card can transmit signals at the physical layer and deliver data packets at the
network layer by acting as an interface at the TCP/IP layer. The network interface
controller serves as a bridge between a computer or server and a data network,
regardless of what tier it is on. The LAN card collects data from the user device when
a user requests a web page, delivers that data to an internet server, and then
retrieves the necessary data from the internet to display for users.

2. Network File Server (NFS)

It is a distributed file system since an NFS is a protocol that enables users on client
machines to access files on a network. For your company to share files across a
network, you'll need a network file system, or NFS. Any computer or device located
elsewhere that is connected to the network you will be using can access remote data
and files. It will be simpler to share files as everyone on a network will have access
to them.

<IN0719A15E><Mairaj Poke>Page | 17
Unit 2 – Networking Assignment 1

Since Sun Microsystems first released it in 1984, the NFS protocol has undergone
changes. Due to the fact that it is an open standard solution, anyone can use it on all
operating systems and modify the protocol as needed. It is still changing today.

How it works

Depending on the version you use, the NFS operates differently. There are now
three NFS versions in use, each with a unique set of operational criteria.

NFS version 2: The earliest and most extensively used file format available is
NFSv2. It uses an IP network and the User Datagram Protocol, or UDP, to function.
A reliable network connection is possible thanks to the IP network.

NFS version 3: NFSv3 allows for asynchronous writes, which let the server decide
on the best synchronisation rules. Before a command to commit to managing the
data is established, the data will be synced. Compared to NFSv2, the architecture
produces better buffering.

NFS version 4: The most modern NFS protocol you may use is NFSv4. Both the
internet and firewalls are compatible with it. It can run in more locations because it
doesn't need a prebind service. In this NFS format, the Transmission Control
Protocol, or TCP, operates. the TCP connections between an IP and an application.
It keeps track of data chunks and only needs to get the dropped frames from the
TCP set when something needs to be delivered twice.

Conclusion: - A computer system used to manage the file system, the network
printer, handle network communications, and other tasks is known as a network file
server. A server may be non-dedicated, in which case a portion of server operations
are assigned as workstations or DOS-based systems, or it may be dedicated, in
which case all of the server's processing capacity is allocated to network services.

The network interface card, along with user utilities and system management
software, is put onto the servers' hard drives. The NOS boots when the system is
started, and other servers are thereafter under its control.

<IN0719A15E><Mairaj Poke>Page | 18
Unit 2 – Networking Assignment 1

Workstations: Also known as nodes, workstations are typically intelligent computing


devices like the IBM pc that are connected to the server via a network interface card
and cable. However, DUMV terminals are utilised in

3. Networking Cable

Coaxial Cable

An inner conductor is encased in an insulating layer, an outer conductor (conductive


shielding) is encircled by the inner conductor, and an outer jacket provides
protection. The design of a typical cable is shown in the diagram below. Electrical
current travels along the central conductor.

Fibre Optic Cable

A form of Ethernet cable known as fibre optic cable, sometimes referred to as optical
fibre cable, contains one or more optic fibres used for data transmission. While
carrying light, it is constructed similarly to an electrical cable, and the cost of fibre
optic cable is significantly more than that of copper wire. Fibre optic cables offer both
high-speed data transfer and long-distance communication since they are made to
utilise light pulses.

Fibre optic cable often has a speed range of 10 Gbps, 40 Gbps, and even 100 Gbps.
As a result, it is widely utilised in many global telephones, cable television, and
internet systems.

Twisted Pair Cable

<IN0719A15E><Mairaj Poke>Page | 19
Unit 2 – Networking Assignment 1

Twisted pair cables were among the first directed transmission media. Twisted pair
cables are made up of two distinct, insulated copper wires that are run parallel and
twisted together. The copper wires normally have a diameter of 1mm. Data is
transmitted across one wire, while the other serves as the ground reference.

Network Operating System

The term "Network Operating System" refers to an operating system that comes with
software and related protocols to conveniently and economically communicate with
other autonomous computers via a network. It enables shared hardware between
computers, such as discs, printers, etc. The Network Operating System is installed
on top of each of the individual machines that make up the Network, each of which
has its own operating system. Individual computers must log into another computer
using the correct password since they each have their own Operating System that
allows them to access resources from other computers. Additionally, this functionality
prevents process migration and prevents communication between processes
operating on different machines. The standard network protocol is called the
transmission control protocol.

<IN0719A15E><Mairaj Poke>Page | 20
Unit 2 – Networking Assignment 1

Features of the Networking Operating System

o The Network Operating System has a few security features, such as login
restrictions using
o This type of operating system offers a wide range of backup and internet
services.
o It offers a wide range of features, such as processor guidance, computerised
hardware detection, and guidance for multiprocessing of many different
auditing tools.

Example

MS Window Server

Microsoft specifically develops the Windows Server operating systems for usage on
a server. Powerful computers called servers are built to run continuously and supply
resources to other computers. This indicates that Windows Server is nearly
exclusively utilised in corporate environments.

Since the release of Windows Server 2003 in April 2003, Microsoft has distributed
Windows Server under this moniker. However, server versions of Windows were
accessible long before this. For instance, Windows NT 4.0 was offered as a server
and a workstation (for general usage).

Windows Server Include Enterprise Management Software

Windows Server comes with a tonne of enterprise software because it is designed


for commercial use. A server can play the responsibilities listed below:

Directory Services: A server can function as a domain controller thanks to Active


Directory, a service for managing users. The domain controller manages all user
account authentication in place of requiring each user to authenticate into a local
workstation.

DHCP: A server can use the Dynamic Host Configuration Protocol (DHCP) to
automatically assign IP addresses to any device connected to a network. Your router
presumably handles this where you live. However, IT personnel at a company can
benefit from Windows Server's expanded DHCP functionality.

Files and Storage: Another frequent application is having a file server for your
business. This enables you to keep crucial information in one place and to create
permissions to manage who can access what files.

Print Services: It is a waste of time for IT professionals to set up each new


workstation's printer individually if a company has hundreds of printers scattered
across the premises. You may quickly link printers to computers by setting up a print
server, which will cut down on duplicative effort.

<IN0719A15E><Mairaj Poke>Page | 21
Unit 2 – Networking Assignment 1

Windows Update Services: Businesses frequently don't want all Windows updates
to be applied immediately. You can route all workstation updates through a server
that has been configured to act as a Windows Update controller and set up specific
rules for how they should operate.

Windows server have few hardware limitations

The majority of people don't give any thought to how much RAM their computer can
hold. You can install as much RAM as you want—up to 2TB—on a 64-bit version of
Windows 10 Pro. However, the bulk of users only have 32GB or less of RAM
installed in their PCs, making even installing 1TB of RAM highly improbable.

Up to 24TB of RAM is supported by Windows Server. Additionally, it offers far more


CPU sockets than Windows 10 Pro, which only supports two, up to 64. Although it
may seem absurd, there are valid justifications for these high hardware restrictions.
A server frequently needs to be incredibly powerful because it supports crucial
functions for hundreds of users within a company.

Windows server pricing Differs

<IN0719A15E><Mairaj Poke>Page | 22
Unit 2 – Networking Assignment 1

As you might anticipate from a business-focused solution, Windows Server is not


inexpensive. It costs a lot more than a consumer version of Windows and is available
in many varieties based on your demands.

You may get an idea of what you would pay for the server OS by visiting Microsoft's
pricing page for Windows Server 2019. You may also need to pay for CALs (Client
Access Licenses) in order to use the services lawfully, depending on how many
users will access the server.

<IN0719A15E><Mairaj Poke>Page | 23

You might also like