0% found this document useful (0 votes)
824 views

Assignment 1

This document provides information about networking infrastructure for a BTEC Level 5 HND Diploma in Computing assignment. It includes a front sheet with student and assignment details, and sections on network types and standards, topology, devices, servers, and the relationship between hardware and software. The key points, protocols, concepts, and their interactions are discussed in detail across multiple sub-sections.

Uploaded by

HD Lee
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
824 views

Assignment 1

This document provides information about networking infrastructure for a BTEC Level 5 HND Diploma in Computing assignment. It includes a front sheet with student and assignment details, and sections on network types and standards, topology, devices, servers, and the relationship between hardware and software. The key points, protocols, concepts, and their interactions are discussed in detail across multiple sub-sections.

Uploaded by

HD Lee
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

ASSIGNMENT 1 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking Infrastructure

Submission date Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name Le Minh Triet Student ID GCD19828

Class GCD0901 Assessor name Dang Quang Hien

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Grading grid

P1 P2 P3 P4 M1 M2 D1

1 | Minh Triết
 Summative Feedback:  Resubmission Feedback:

Grade: Assessor Signature: Date:


Lecturer Signature:

1 | Minh Triết
A. Table of Contents
A. Table of Contents ................................................................................................................................... 2
B. The benefits and constraints of different network types and standards .............................................. 5
I. What is network .................................................................................................................................. 5
1. Definition ...................................................................................................................................... 5
2. Some types of network that are popular such as MAN, WAN, LAN ............................................ 5
II. The protocols and standards ............................................................................................................... 7
1. Define network protocol .............................................................................................................. 7
2. Purpose of network protocol ....................................................................................................... 7
3. Some common protocols ............................................................................................................. 8
4. The international standard organizations and the names of the standards used in networking8
C. The impact of network topology, communication and bandwidth requirements ................................ 9
I. Network topology ................................................................................................................................ 9
II. Types of Network Topology............................................................................................................... 10
1. Star Topology ............................................................................................................................. 10
2. Bus Topology .............................................................................................................................. 10
3. Ring Topology ............................................................................................................................. 11
4. Tree Topology............................................................................................................................. 12
5. Mesh Topology ........................................................................................................................... 13
6. Hybrid Topology ......................................................................................................................... 14
III. Network communication ............................................................................................................... 15
IV. Rules of network ............................................................................................................................ 15
V. Bandwidth and the importance of bandwidth .................................................................................. 15
D. The operating principles of networking devices and server types ...................................................... 16
I. Switches and routers ......................................................................................................................... 16
1. Switch ......................................................................................................................................... 16

2 | Minh Triết
2. Router......................................................................................................................................... 16
II. Networking devices ........................................................................................................................... 17
III. Types of servers ............................................................................................................................. 17
E. The inter-dependence of workstation hardware with relevant networking software ........................ 19
I. Workstation hardware ...................................................................................................................... 19
II. Networking software ......................................................................................................................... 19
III. Meaning of interdependence ........................................................................................................ 19
F. References ............................................................................................................................................ 20

3 | Minh Triết
Figure 1 Network ............................................................................................................................................ 5
Figure 2 Local Area Network .......................................................................................................................... 6
Figure 3 Metropolitan Area Network ............................................................................................................. 6
Figure 4 Wide Area Network .......................................................................................................................... 7
Figure 5 Star Topology .................................................................................................................................. 10
Figure 6 Bus topology ................................................................................................................................... 11
Figure 7 Ring Totology .................................................................................................................................. 12
Figure 8 Tree Topology ................................................................................................................................. 13
Figure 9 Mesh Topology ............................................................................................................................... 13
Figure 10 Hybrid Topology ........................................................................................................................... 14
Figure 11 Router ........................................................................................................................................... 16
Figure 12 DHCP Server.................................................................................................................................. 18
Figure 13 DNS server .................................................................................................................................... 18

4 | Minh Triết
B. The benefits and constraints of different
network types and standards
I. What is network
1. Definition
Network is two or more computers connected together that can share resources, communicate with each
other like printers, internet connections, applications, etc. It is a collection of systems and devices. such as
computers and mobile devices that are linked together by a wireless network (Wi-Fi) or a wired network
(Ethernet).

Figure 1 Network

2. Some types of network that are popular such as MAN, WAN, LAN
 LAN (Local Area Network): A LAN is a Network that connects a small number of systems in an area.
Benefits: High speed and large bandwidth, saving cables and running online applications connected
through the network such as conferences, movie screenings, etc. In addition, low cost, simple network
management simple.
Constraints: Short transmission line, can only work in a certain area. When there is a problem on the cable
line, the entire network will stop working and if there is a problem, it is very difficult to check for errors

5 | Minh Triết
Figure 2 Local Area Network

 MAN (Metropolitan Area Network): This is a communication infrastructure developed in and around major
cities.
Benefits: Can both connect into a private network and can create large connections, covering an entire
country or globally. The ability to transmit the connection signal is very wide and unlimited, and the user's
access is controlled, and the security is good.
Constraints: The bandwidth is average but the connection range is relatively large. Therefore, the
installation cost is higher than LAN. At the same time, the network management method is more
complicated.

Figure 3 Metropolitan Area Network

6 | Minh Triết
 WAN (Wide Area Network): It is a network that connects two or more local area networks over large
geographical distances. A WAN spans a large geographical area, such as a district, province, or even a
country. Given the wide range of geographical locations that WANs can connect to, this type of network is
also commonly referred to as the Internet.
Benefits: Fast and accurate processing speed. provide information immediately, with a large amount of
information, complete. There are many attractive entertainment and educational services.
Constraints: Information security issues.Threats like viruses or spam. The user object has not been
managed yet, which is an environment for bad guys to abuse.

Figure 4 Wide Area Network

II. The protocols and standards


1. Define network protocol
A protocol is a collection of rules for structuring and processing data in networking. Network protocols
have the same effect as a common computer language. The network machines can employ drastically
different software and hardware, but the usage of protocols allows them to interact independently.

2. Purpose of network protocol


•The network protocol that works on the sending computer:
Break down data for processing
More information about the receiver
Carrying out data transmission
•The network protocol that works on the receiving computer:

7 | Minh Triết
Extract the address information on the packet.
Forward the packet
Move the packet to the buffer memory to proceed with the connection of the packets into a complete
message

3. Some common protocols


TCP (Transmission Control Protocol): This protocol is responsible for breaking data into packets to transmit
data. Establishing connections between computers ensures successful data transmission.
IP (Internet Protocol): Routes data packets as they are trueyefn over the internet. And make sure the data
is sent properly to the destination
HTTP (HyperText Transfer Protocol): allows the exchange of information (mainly in the form of hypertext)
over the Internet.
FTP (File Transfer Protocol): allows file exchange over the Internet.
SMTP (Simple Mail Transfer Protocol): allows sending electronic mail messages (e-mail) over the Internet.
POP3 (Post Office Protocol, version 3): allows receiving e-mail messages over the Internet.
MIME (Multipurpose Internet Mail Extension): an extension of the SMTP protocol, allowing to send binary
files, movies, music, ... by email.
WAP (Wireless Application Protocol): allows information exchange between wireless devices, such as
mobile phones.

4. The international standard organizations and the names of the standards used in
networking
ITU standards
ITU-T J.343 - “Hybrid perceptual bitstream models for objective video quality measurements”
ITU-T E804 - “Quality of service aspects for popular services in mobile networks”
ITU-R Recommendation BS.1387-1 “Method for objective measurements of perceived audio quality”
IETF standards
IETF RFC 2326: "Real Time Streaming Protocol (RTSP)"
IETF STD 0006: "User Datagram Protocol"
IETF RFC 4566: "SDP Session Description Protocol”

8 | Minh Triết
ISO/IEC standards
ISO/IEC 14496-x: "Information technology – Coding of audio-visual objects”
ISO/IEC 10918-1:1993: "Information technology - Digital compression and coding of continuous-tone still
images – Requirements and guidelines"

C. The impact of network topology,


communication and bandwidth requirements
I. Network topology
Network topology refers to how various nodes, devices, and connections on your network are physically
or logically arranged in relation to each other. Think of your network as a city, and the topology as the road
map. There are two approaches to network topology: physical and logical. (Contributor, August 15, 2019)
Physical network topology, as the name suggests, refers to the physical connections and interconnections
between nodes and the network—the wires, cables, and so forth.
Logical network topology: it’s a little more abstract and strategic, referring to the conceptual
understanding of how and why the network is arranged the way it is, and how data moves through it.

9 | Minh Triết
II. Types of Network Topology
1. Star Topology
Devices can only communicate with each other indirectly through the Hub (now replaced by Switch or
Router).

Figure 5 Star Topology

Advantages
Allowing you to conveniently manage your entire network from a single location. Additionally, devices can
be added, removed, and modified without taking the entire network offline. The simplicity of the network
design makes life easier for administrators, too, because it’s easy to identify where errors or performance
issues are occurring.
Disadvantages
If the central hub goes down, the rest of the network can’t function. The overall bandwidth and
performance of the network are also limited by the central node’s configurations and technical
specifications, making star topologies expensive to set up and operate.

2. Bus Topology
Also known as backbone network topology, linear network topology. The feature of a bus network is to
connect all devices with one main cable through a drop line.

10 | Minh Triết
Advantages
The advantage of a bus network topology lies in its simplicity, as less cabling is required compared to other
network topologies making it easy to install.
Disadvantages
If the cable experiences a failure, the whole network goes down, which can be time-consuming and
expensive to restore
Bus topologies are best suited for small networks because there’s only so much bandwidth, and every
additional node will slow transmission speeds.

Figure 6 Bus topology

3. Ring Topology
The data can travel through the ring network in either one direction or both directions, with each device
having exactly two neighbors.
Advantages
Ring topologies are cost-effective and inexpensive to install, and the intricate point-to-point connectivity
of the nodes makes it relatively easy to identify issues or misconfigurations on the network.
Disadvantages

11 | Minh Triết
Ring topology is still vulnerable to failure without proper network management. The addition of more
devices can contribute to overall communication delays.

Figure 7 Ring Totology

4. Tree Topology
The tree topology structure gets its name from how the central node functions as a sort of trunk for the
network, with nodes extending outward in a branch-like fashion.
Advantages
Troubleshooting errors on the network is a straightforward process. Combining elements of the star and
bus topologies allows for the easy addition of nodes and network expansion.

Disadvantages

12 | Minh Triết
The entire network depends on the health of the root node in a tree topology structure. Should the central
hub fail, the various node branches will become disconnected

Figure 8 Tree Topology

5. Mesh Topology
Mesh topologies offers two different methods of data transmission: routing and flooding. When data is
routed, the nodes use logic to determine the shortest distance from the source to destination, and when
data is flooded, the information is sent to all nodes within the network without the need for routing logic.

Figure 9 Mesh Topology

Advantages

13 | Minh Triết
Mesh topologies are reliable and stable, and the complex degree of interconnectivity between nodes
makes the network resistant to failure
Disadvantages
Mesh topologies are incredibly labor-intensive. The cost of cabling adds up fast, and to say mesh networks
require a lot of cabling is an understatement.

6. Hybrid Topology
Hybrid topologies combine two or more different topology structures
Advantages
The degree of flexibility they provide, as there are few limitations on the network structure itself that a
hybrid setup can’t accommodate.
Disadvantages
It is a type of network expensive.Design of a hybrid network is very complex.There is change hardware in
order to connect topology with another topology.

Figure 10 Hybrid Topology

14 | Minh Triết
III. Network communication
The communication network protocol is a rulesystem that permits two or more communications set
entities to transmit the information through any type of physical quantity modification. The protocol
specifies the communication rules, syntax, semantics, and synchronization, as well as error recovery
techniques. Protocols can be carried out by hardware, software or both

IV. Rules of network


 Junction-edge connectivity
 Junction-junction connectivity
 Edge-junction-edge connectivity
 Structural attachment
 Containment

Rules are an important component of data quality. When used in conjunction, network rules and attribute
rules help maintain data integrity.

Network rules dictate which features can connect or associate in the utility network. These rules are
imposed at the dataset level for specific asset groups and asset types. Features can connect and associate
as long as feature restrictions are respected and network rules exist to allow such relationships

V. Bandwidth and the importance of bandwidth


The term "bandwidth" refers to the quantity of data transmitted per second. This idea can also be used to
indicate a transmission line's data transmission speed. (Matbao, 29/12/2020)

Bandwidth will help ensure paid connections work to the right specifications. The more data the
bandwidth contains, the more data can be sent and received at the same time. Bandwidth operation on
the same principle. So, the higher the capacity of the communication link, the more data can pass through
each second.

15 | Minh Triết
D. The operating principles of networking devices
and server types
I. Switches and routers
1. Switch
The switch uses the MAC address to identify which attached device outgoing packets are being sent from
and where to deliver incoming packets.

So the MAC address identifies the physical device as opposed to the network layer (Layer 3) IP address,
which can be assigned dynamically to a device and change over time.

When a device sends a packet to another device, it enters the switch and the switch reads its header to
determine what to do with it. It matches the destination address or addresses and sends the packet out
through the appropriate ports that leads to the destination devices. (Shaw, OCT 6, 2020)

2. Router
Computers and other devices connect to the Internet through routers. A router operates as a dispatchman
and selects the optimal path for your trip information. It links your business worldwide, safeguards
information against security risks and even decides whose machines are overriding other people.

Figure 11 Router

16 | Minh Triết
II. Networking devices
Default Gateway

This option must be seen as the default gateway, which is the IP address of the modem, and as a Router
when you specify the static IP. The default gateway is used to connect to outbound networks, which allows
one computer to communicate with another computer in a different network. (Data, VODData)

Default gateway systems are designed to route requests to the right destination, even if the originator
and recipient is using different network protocols.

The default gateway will generally be the main router for small networks such as an indoor network.
However a subnetting system is employed with a certain standard gateway, given the growing number of
networks, or in instances where more networks can function at the same time.
For example: In the home computer network, the client addresses are usually 192.168.1.2, 192.168.1.3,
192.168.1.4 ..., when you want to send and receive information out to the Internet, are any IP addresses.
NetID is different from 192.168.1.0, then the Default Gateway address is 192.168.1.1. This IP address
192.168.1.1 must be pre-installed on the home ADSL Router. This also means that a home computer that
wants to connect to the Internet must send information to the ADSL Router, and this device will redirect
the packet to where it needs to go.
Firewall

A firewall is an entry- and exit-check barrier between a local area network (local area network) and another
network (e.g. Internet). Without a firewall, there would be no thrilling traffic in and out of the internal
network, and after a firewall is created, incoming traffic will be thrust by the firewall.

A firewall can filter traffic from dangerous traffic sources such as hackers, some types of viruses so that
they cannot damage or cripple your system. In addition, because all sources of access to and from the
internal network and other networks must pass through the firewall, the firewall also has the effect of
monitoring and analyzing traffic flows and deciding what to do with those traffic flows. suspicious volume
such as blocking some data sources from allowing access or tracking a suspicious transaction. (Van, 2020)

III. Types of servers


DHCP Sever

DHCP - Dynamic Host Configuration Technology is a protocol used to assist manage the allocation of IP
addresses in the network rapidly, automatically and centrally. The DHCP server is used to issue unique IP
addresses and automatically configure other network information. In most homes and small business
models, the router will act as a DHCP server. In larger networks, a computer can act as a DHCP server.

17 | Minh Triết
For example: if a network printer has a changed IP address, every computer connected to that printer will
have to regularly update its settings so that their computer understands how to contact the printer.

Figure 12 DHCP Server

DNS Sever

DNS (Domain Name System) or domain name resolution system, can be explained as a system that helps
humans and computers "communicate" with each other more easily (Because of their communication
language). We are names and letters, and computers can only understand sequences of numbers!) The
system helps to translate domain names (hostnames) into strings of numbers, so that computers can
understand.

For example: if a network printer has a changed IP address, every computer connected to that printer will
have to regularly update its settings so that their computer understands how to contact the printer.

Figure 13 DNS server

18 | Minh Triết
E. The inter-dependence of workstation hardware
with relevant networking software
I. Workstation hardware
A workstation is a special computer designed for technical or scientific applications. ... Typical workstations
previously employed proprietary hardware which made them distinct from PCs; for instance IBM used
RISC-based CPUs for its workstations and Intel x86 CPUs for its business/consumer PCs during the 1990s
and 2000s.

II. Networking software


Networking software is a key to any network. This supports administrators in the deployment,
management and monitoring of a network. Traditional networks consist of specialized hardware, such
routers and switches, which bundles software into a solution.

III. Meaning of interdependence


A network file sever is a computer system used for the purpose of managing the file system, the network
printer, handling network communication, and other functions. A server may be dedicated is such case all
of its processing power is allocated to network function, or it may be non-dedicated which means that a
part of server functions allocated

A work station is a computer intended for individual use that is faster and more capable than a personal
computer. Since they are PCs, they can also be used independently of the mainframe assuming they have
their own applications installed and their own hard disk storage. We are going to discuss the
interdependence of workstation hardware with relevant networking software. • Network interface card is
a computer hardware part that enables computers to be combined together in a network usually a local
area network. Computers that are networked always communicate with each other using a specified
protocol for transferring data packets. Network Interface Card acts as a translator letting machine mutually
send and obtain data on a LAN. Specialists in information system frequently use these cards to setup
wireless or wired connections networks.

19 | Minh Triết
F. References
Contributor, S., August 15, 2019. DNSstuff. [Online]
Available at: https://www.dnsstuff.com/what-is-network-topology#star-topology
[Accessed 19 6 2021].

Data, V., VODData. VODData. [Online]


Available at: https://vdodata.vn/khi-nao-thi-can-dung-den-default-gateway/

Matbao, 29/12/2020. MATBAO. [Online]


Available at: https://wiki.matbao.net/bandwidth-la-gi-bang-thong-anh-huong-the-nao-toi-
website/#nhung-cau-hoi-thuong-gap-ve-bang-thong

Shaw, K., OCT 6, 2020. NETWORKWORLD. [Online]


Available at: https://www.networkworld.com/article/3584876/what-is-a-network-switch-and-how-does-
it-work.html

Van, L., 2020. LONG VAN System Solution. [Online]


Available at: https://longvan.net/tuong-lua-la-gi-tac-dung-cua-tuong-lua.html

20 | Minh Triết

You might also like