Networking-Mairaj Poke-Assignment - 1
Networking-Mairaj Poke-Assignment - 1
When submitting evidence for assessment, each student must sign a statement
confirming that the work is their own.
Unit: 2 Networking
Plagiarism
Plagiarism is a special form of cheating. Plagiarism must be avoided at all costs and
students who break the rules, however innocently, may be punished. It is your
responsibility to ensure that you understand the proper referencing procedures. As a
college student, you are expected to use appropriate references and keep careful,
detailed notes on all sources of material you have used in your work, including any
material downloaded from the Internet. If you need further advice, please contact the
relevant tutor or course tutor.
Student Declaration
Student Statement
I confirm that the submitted assignment is entirely my own work and I fully understand
the consequences of plagiarism. I understand that making a false statement is a form
of misconduct.
manner and these computers communicate to communicate with each other. This
I I I I I II I
operating values of networking devices and server types and networking software
I I I I
Network type I
that is some km in size. They connect with servers and workplaces in offices and
I I I I
Benefits of LAN I
Disadvantage of LAN
● LANs do save costs due to shared computing resources, but the initial cost of
setting up local area networks is quite high.
Unit 2 – Networking Assignment 1
● The LAN administrator can check the personal information files of each LAN
user, so it does not offer good privacy.
● Unauthorized users can access important organization data if the LAN
administrator is unable to secure the centralized data storage.
● Local Area Network requires constant LAN management as there are
problems related to software setup and hardware failure
region larger than that covered by even a large local area network (LAN) but smaller
I I I I
than the area covered by a wide area network (WAN). The term is applied to the
I I I I
interconnection of networks in a city into a single larger network (which may then
I I I
Benefits of MAN I
● It I is less expensive I to attach MAN with I WAN. MAN gives I the good
efficiency I of data. In MAN data I is easily managed I in a centralized way.
● On I MAN you can I send local emails I fast and free
● MAN, uses fibre optics so I the speed of data I can easily reach I upon
1000 Mbps. Files and databases, I can be transferred I fast.
Disadvantage of MAN
● You need more cable to make a MAN connection from one place to another.
WAN (Wide Area Network): Is known as "wide area network", it is used in a large
I I I I I
geographic range, generally for the whole country or continent, ranging from a few
I I I I I
<IN0719A15E><Mairaj Poke>Page | 5
Unit 2 – Networking Assignment 1
running programs for users. These machines are often referred to as hosts or are
I I I I I
server to another. I
Benefits of WAN
I
● The network offers both information storage and a mechanism for distribution
that information with other network users
● I There are I servers that I rise security. I
● I A LAN can often I span a building I while a WAN I can consist of a I large
geographical I range, passage I national or international I boundaries
Disadvantage of WAN
• Investment costs for initial setup are very high.
• WAN is difficult to maintain. You need experienced technicians and network
administrators.
• There are more errors and problems due to the wide coverage and use of
different technologies.
● •Troubleshooting takes more time due to the involvement of multiple wired
and wireless technologies.
● •Offers less security compared to other types of networks.
IEEE types:
<IN0719A15E><Mairaj Poke>Page | 6
Unit 2 – Networking Assignment 1
1) IEEE 802.3 Ethernet standards: Half-duplex shared with the LAN for each
segment and its part of the total bandwidth at each station. Ethernet for total
bandwidth is 10 megabits per second. There are 3 types of computer networks:
2) IEEE 802.5 Token Ring standards: Any network host can send data at any time
when no one else is on the line. It works as the network passes rings of tokens,
almost like a relay race for the next number.
3) IEEE 802.11 Wireless LAN (WLAN) Standards: The IEEE 802.11 standard
refers to the specification of a developed wireless LAN with technology. It is an
interface between a wireless client and a base station, such as laptops.
<IN0719A15E><Mairaj Poke>Page | 7
Unit 2 – Networking Assignment 1
o No matter what your business is or where you are located, you must make
sure that your Wi-Fi is password-protected.
o To access the internet and take use of your broadband's full speed, you
should always be within range of your router.
o When a signal travels through thick brick walls or concrete roofs, its strength
decreases. One of the causes of the decreased internet speed is this.
Topology: The topology for the system that is a key determinant of performance and
how the system is set up, with a physical and logical description for the links and
nodes, how they are set up and related to each other.
Topology types:
● Bus topology
● Ring topology
● Star topology
● Network topology
Bus topology:
Devices that are networked with one cable from one end to the other in one
direction. It is also called line topology.
<IN0719A15E><Mairaj Poke>Page | 8
Unit 2 – Networking Assignment 1
Pros
Cons
1) The entire network will collapse if a single cable encounters any problem.
3) All computers receiving the same signal from a common bus are good.
Star topology:
The network topology is designed so that each network node is directly connected to
one central hub using coaxial cable, twisted pair or fiber optic cable.
Pros:
1) Adds new devices easily and can be removed from the topology.
Cons:
<IN0719A15E><Mairaj Poke>Page | 9
Unit 2 – Networking Assignment 1
3) Devices with efficiency are compromised if the hub function is able to support the
number of devices.
Ring topology:
In this topology, all nodes are arranged in a ring, where data can travel around the
ring in one or both directions, with each device having exactly two computers
together.
Pros:
1) Information goes down in one direction, so the speed is better than any other
topology.
3) The network server does not need to control the connectivity for the workstation.
4) The station has the same access to resources every time with every system.
Cons:
1) Data and information being passed through the source and destination, which
slows them down.
2) The circle is looped with a node that goes down and the whole network
collapses.
<IN0719A15E><Mairaj Poke>Page | 10
Unit 2 – Networking Assignment 1
Mesh topology:
This is a setup where all computer network devices are interconnected for
transmission that would be distributed in the event of a link failure. A wireless
network is most often used.
PROS:
1) Data transfer for multiple devices thus handles high volumes of traffic.
3) Devices that are added additionally do not interfere with transmission between
other devices.
Cons:
1) Implementing higher networks other than any other network topology to create a
less desirable option.
Network Device
Hardware devices that are used to connect computers, printers, fax machines and
I I I
other electronic devices to a network are called network devices These devices
I I I I I I I II
transfer data in am fast, secure and correct way over same or different networks.
I I I I I I
on the device, like NIC card or RJ45 connector, whereas some are part of then
I I I I I I I I I I I I
network, like router, switch, etc. Let us explore some of these devices in greater
I I I I I I I I I I I I
detail
<IN0719A15E><Mairaj Poke>Page | 11
Unit 2 – Networking Assignment 1
LAN. A hub has many ports in it. A computer which intends to be connected to the
I I I I I I I I I I
network is plugged in to one of these ports. When a data frame arrives at a port, it
I I I I I I
Switches: - A switch is a data link layer networking device which connects devices
I I I I I I I I
in a network and uses packet switching to send and receive data over the network.
I I I I I I I I
ILike a hub, a switch also has many ports, to which computers are plugged in.
I I I I I I I
However, when a data frame arrives at any port of a network switch, it examines
I I I I I I I
the destination address and sends the frame to the corresponding device(s). Thus,
I I I I I I
Each time a host sends a frame to another host, the destination host's source host is
recorded with a port in the switch's MAC address table. The source address is
always stored in the switch database. The host's MAC address and port number will
not be recorded in the switch table unless it sends some data. The switch does not
know any host or its address when initially configured. When a host sends a frame in
<IN0719A15E><Mairaj Poke>Page | 12
Unit 2 – Networking Assignment 1
such a scenario, the switch stores the host's MAC address in the table, but since
there is no destination information, the switch sends the frame to all hosts.
LAN to another if both networks support the same set of protocols. So, a router is
I I I I I I I I I I
typically connected to at least two LANs and the internet service provider (ISP). It
I II I I I I I I I
receives it data in the form of packets, which are data frames with their destination
I I I I I I I I
address added. Router also strengthens the signals before transmitting them. That I I I I I I I I I
Routing Table: - A router reads it’s routing table to decide the best available route
I I I I I I I I I I
the packet can take to reach its destination quickly and accurately . The routing
I I I I I I II I I I I
∙Static In a static routing table the routes are fed manually. So, it is suitable only
I I I I I I I I I I I I I
for very small networks that have maximum two to three routers .
I I I I I II I I I I I I I
∙Dynamic In a dynamic routing table the router communicates with other routers
I I I I I I I I I I I
through protocols to determine which routes are free. This is suited for larger
I II I I I I I
networks where manual feeding may not be feasible due to large number of
I I I I I I I
routers . I
networks together that may work upon different networking models . They basically
I I I I I I I I I I
work as the messenger agents that take data from one system, interpret it, and
I I I I I I I I I
transfer it to another system. Gateways are also called protocol converters and can
I I I I I I I I I
operate at any network layer . Gateways are generally more complex than switch or
I I I I I I II
router.
<IN0719A15E><Mairaj Poke>Page | 13
Unit 2 – Networking Assignment 1
Hub broadcast device. Switch the multicast device. A router is a routing device.
It works for Data/Network Layer. It works for the network layer.
Works for physical layer.
No node in the network is The device is connected to the The device connects two
stored under the MAC same network. The device is networks.
address connected to the network.
Nodes in networks are Nodes in networks are stored by Nodes in networks are stored
stored by MAC address. MAC address and IP address. by MAC address and IP
address.
Types: Active hub, Types: Layer 2 and Layer 3 Types: Broadband router,
Passive hub and Intelligent switch. Wireless router, Edge router.
hub
<IN0719A15E><Mairaj Poke>Page | 14
Unit 2 – Networking Assignment 1
Server Types:
1. Application servers
DNS server
DNS servers are application servers that help client computers resolve names by
translating human-friendly names into machine-understandable IP addresses. The
DNS system is a widely dispersed database of names and other DNS servers, each
of which can be used to request another computer name that is not otherwise
known. When a client requires a system address, it sends a DNS request to the DNS
server along with the name of the requested resource. The DNS server returns the
requested IP address from its name table.
Mail servers
One very popular class of application server is the mail server. Emails sent by users
are received by mail servers that keep them on file until a client requests them on
behalf of the user. An email server allows one device to be set up and connected to
the network at all times. Instead of each client computer having its own e-mail
subsystem running 24/7, it is ready to send and receive messages.
2. File servers
Distribute and store files on file servers. Files stored on the server can be shared by
a number of clients or users. In addition, central file storage makes it easier to
implement backup and fault tolerance solutions rather than trying to guarantee the
security and integrity of files on every device in the company. File server hardware
can be designed to maximize read and write speeds to increase performance.
3. Database servers
It's staggering how much data is consumed by businesses, users, and other
services. Databases are used to store large amounts of this data. Databases must
be accessed by multiple clients at the same time and can use a staggering amount
<IN0719A15E><Mairaj Poke>Page | 15
Unit 2 – Networking Assignment 1
of disk space. These two requirements are good candidates for placing such
databases on servers. Database servers manage database programs and respond
to many client requests. Oracle, Microsoft SQL Server, DB2, and Informix are
examples of common database server programs.
Virtual servers
Virtual servers are taking the server world by storm. Unlike traditional servers, which
are installed as an operating system on the machine's hardware, virtual servers exist
only as defined in specialized software called a hypervisor. Each hypervisor can run
hundreds or even thousands of virtual servers at once. The hypervisor represents
the server's virtual hardware as if it were real physical hardware. A virtual server
uses the virtual hardware as usual, and the hypervisor passes the actual compute
and storage needs to the real hardware underneath, which is shared among all the
other virtual servers.
Proxy servers
A proxy server acts as an intermediary between the client and the server. A proxy
server, often used to isolate clients or servers for security reasons, will take the
request from the client. Instead of responding to the client, it forwards the request to
another server or process. The proxy server receives a response from the other
server and then responds to the original client as if it were responding itself. In this
way, neither the client nor the corresponding server needs to connect directly to
each other.
Various hardware components are required for network workstations, which are:
A circuit board that is commonly mounted on the computer to connect to the network
is called a network interface card, or network interface controller. It functions as a
crucial element in the network connection of computers. Currently, most PCs and
some network servers have NIC cards that are built-in in some fashion. Additionally,
network cards such as server network cards can be plugged into device expansion
slots.
<IN0719A15E><Mairaj Poke>Page | 16
Unit 2 – Networking Assignment 1
How it works
A NIC card can transmit signals at the physical layer and deliver data packets at the
network layer by acting as an interface at the TCP/IP layer. The network interface
controller serves as a bridge between a computer or server and a data network,
regardless of what tier it is on. The LAN card collects data from the user device when
a user requests a web page, delivers that data to an internet server, and then
retrieves the necessary data from the internet to display for users.
It is a distributed file system since an NFS is a protocol that enables users on client
machines to access files on a network. For your company to share files across a
network, you'll need a network file system, or NFS. Any computer or device located
elsewhere that is connected to the network you will be using can access remote data
and files. It will be simpler to share files as everyone on a network will have access
to them.
<IN0719A15E><Mairaj Poke>Page | 17
Unit 2 – Networking Assignment 1
Since Sun Microsystems first released it in 1984, the NFS protocol has undergone
changes. Due to the fact that it is an open standard solution, anyone can use it on all
operating systems and modify the protocol as needed. It is still changing today.
How it works
Depending on the version you use, the NFS operates differently. There are now
three NFS versions in use, each with a unique set of operational criteria.
NFS version 2: The earliest and most extensively used file format available is
NFSv2. It uses an IP network and the User Datagram Protocol, or UDP, to function.
A reliable network connection is possible thanks to the IP network.
NFS version 3: NFSv3 allows for asynchronous writes, which let the server decide
on the best synchronisation rules. Before a command to commit to managing the
data is established, the data will be synced. Compared to NFSv2, the architecture
produces better buffering.
NFS version 4: The most modern NFS protocol you may use is NFSv4. Both the
internet and firewalls are compatible with it. It can run in more locations because it
doesn't need a prebind service. In this NFS format, the Transmission Control
Protocol, or TCP, operates. the TCP connections between an IP and an application.
It keeps track of data chunks and only needs to get the dropped frames from the
TCP set when something needs to be delivered twice.
Conclusion: - A computer system used to manage the file system, the network
printer, handle network communications, and other tasks is known as a network file
server. A server may be non-dedicated, in which case a portion of server operations
are assigned as workstations or DOS-based systems, or it may be dedicated, in
which case all of the server's processing capacity is allocated to network services.
The network interface card, along with user utilities and system management
software, is put onto the servers' hard drives. The NOS boots when the system is
started, and other servers are thereafter under its control.
<IN0719A15E><Mairaj Poke>Page | 18
Unit 2 – Networking Assignment 1
3. Networking Cable
Coaxial Cable
A form of Ethernet cable known as fibre optic cable, sometimes referred to as optical
fibre cable, contains one or more optic fibres used for data transmission. While
carrying light, it is constructed similarly to an electrical cable, and the cost of fibre
optic cable is significantly more than that of copper wire. Fibre optic cables offer both
high-speed data transfer and long-distance communication since they are made to
utilise light pulses.
Fibre optic cable often has a speed range of 10 Gbps, 40 Gbps, and even 100 Gbps.
As a result, it is widely utilised in many global telephones, cable television, and
internet systems.
<IN0719A15E><Mairaj Poke>Page | 19
Unit 2 – Networking Assignment 1
Twisted pair cables were among the first directed transmission media. Twisted pair
cables are made up of two distinct, insulated copper wires that are run parallel and
twisted together. The copper wires normally have a diameter of 1mm. Data is
transmitted across one wire, while the other serves as the ground reference.
The term "Network Operating System" refers to an operating system that comes with
software and related protocols to conveniently and economically communicate with
other autonomous computers via a network. It enables shared hardware between
computers, such as discs, printers, etc. The Network Operating System is installed
on top of each of the individual machines that make up the Network, each of which
has its own operating system. Individual computers must log into another computer
using the correct password since they each have their own Operating System that
allows them to access resources from other computers. Additionally, this functionality
prevents process migration and prevents communication between processes
operating on different machines. The standard network protocol is called the
transmission control protocol.
<IN0719A15E><Mairaj Poke>Page | 20
Unit 2 – Networking Assignment 1
o The Network Operating System has a few security features, such as login
restrictions using
o This type of operating system offers a wide range of backup and internet
services.
o It offers a wide range of features, such as processor guidance, computerised
hardware detection, and guidance for multiprocessing of many different
auditing tools.
Example
MS Window Server
Microsoft specifically develops the Windows Server operating systems for usage on
a server. Powerful computers called servers are built to run continuously and supply
resources to other computers. This indicates that Windows Server is nearly
exclusively utilised in corporate environments.
Since the release of Windows Server 2003 in April 2003, Microsoft has distributed
Windows Server under this moniker. However, server versions of Windows were
accessible long before this. For instance, Windows NT 4.0 was offered as a server
and a workstation (for general usage).
DHCP: A server can use the Dynamic Host Configuration Protocol (DHCP) to
automatically assign IP addresses to any device connected to a network. Your router
presumably handles this where you live. However, IT personnel at a company can
benefit from Windows Server's expanded DHCP functionality.
Files and Storage: Another frequent application is having a file server for your
business. This enables you to keep crucial information in one place and to create
permissions to manage who can access what files.
<IN0719A15E><Mairaj Poke>Page | 21
Unit 2 – Networking Assignment 1
Windows Update Services: Businesses frequently don't want all Windows updates
to be applied immediately. You can route all workstation updates through a server
that has been configured to act as a Windows Update controller and set up specific
rules for how they should operate.
The majority of people don't give any thought to how much RAM their computer can
hold. You can install as much RAM as you want—up to 2TB—on a 64-bit version of
Windows 10 Pro. However, the bulk of users only have 32GB or less of RAM
installed in their PCs, making even installing 1TB of RAM highly improbable.
<IN0719A15E><Mairaj Poke>Page | 22
Unit 2 – Networking Assignment 1
You may get an idea of what you would pay for the server OS by visiting Microsoft's
pricing page for Windows Server 2019. You may also need to pay for CALs (Client
Access Licenses) in order to use the services lawfully, depending on how many
users will access the server.
<IN0719A15E><Mairaj Poke>Page | 23