1. Trang chủ
  2. » Giáo Dục - Đào Tạo

UNIT TITLE network information

35 6 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 35
Dung lượng 1,03 MB

Cấu trúc

  • A. INTRODUCTION (4)
  • B. CONTENT (5)
    • I. Definition networking (5)
      • 1. Types of Networks in Use Today (5)
      • 2. Constraint Network (9)
    • II. Types of Topology (12)
      • 1. Mesh Topology (12)
      • 2. Star Topology (14)
      • 3. The impact of current network technology, communication and standards (18)
    • III. M1: Compare common networking principles and how protocols enable the (22)
    • IV. Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter). .23 1. Repeater (24)
      • 2. Hub (25)
      • 3. Server Types (28)
    • V. P4) Discuss the inter-dependence of workstation hardware with relevant networking software (30)
      • 1. What is workstation hardware? (30)
      • 2. What is networking software? (31)
      • 3. What is the inter-dependence of workstation hardware with relevant networking software? (31)

Nội dung

INTRODUCTION

Networking involves the electronic connection of computers to facilitate information sharing, including files, applications, printers, and software Its advantages are evident in enhanced security, improved efficiency, better manageability, and cost-effectiveness, enabling collaboration among users across various platforms A network comprises essential hardware components such as computers, hubs, switches, routers, and other devices that create the network infrastructure These devices are crucial for data transfer, utilizing various technologies like radio waves and wired connections Among the many types of networks in the industry, Local Area Networks (LANs) are the most common.

A Local Area Network (LAN) consists of two or more computers connected over a short distance, typically within homes, offices, or schools In contrast, a Wide Area Network (WAN) spans a much larger geographical area, encompassing cities, countries, and even the entire globe Multiple LANs can be interconnected to create a WAN As numerous devices connect to a network, it is crucial to implement measures that detect and prevent data collisions, ensuring smooth communication and data integrity.

CONTENT

Definition networking

in their fields or in the greater world The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.

1 Types of Networks in Use Today

A Personal Area Network (PAN) is the simplest form of networking, consisting of devices such as a wireless modem, computers, phones, printers, and tablets, all centered around a single user within a single building Commonly used in small offices or homes, these networks are typically managed by one individual or organization from a single device.

Local Area Networks (LANs) are among the most common and simplest types of networks, designed to connect groups of computers and low-voltage devices over short distances, typically within a single building or nearby buildings These networks facilitate the sharing of information and resources, and are usually managed and maintained by enterprises Additionally, LANs can connect to Wide Area Networks (WANs) through routers, enabling rapid and secure data transfer.

- LAN works with TCP / IP protocol.

 Wireless Local Area Network (WLAN)

WLANs operate similarly to LANs by utilizing wireless network technology, such as WiFi, to connect devices without the need for physical cables Commonly used in various applications, WLANs provide the flexibility of wireless connectivity while maintaining the functionality of traditional LANs.

Campus area networks (CANs) are larger than local area networks (LANs) but smaller than metropolitan area networks (MANs) Commonly found in universities, large K-12 school districts, and small businesses, these networks connect multiple buildings that are in close proximity, enabling users to easily share resources.

Metropolitan Area Networks (MANs) are larger than Local Area Networks (LANs) yet smaller than Wide Area Networks (WANs), blending features from both These networks cover a specific geographic area, such as a town, city, or campus Ownership and maintenance of MANs are typically managed by a single entity, which can be a local council or a large corporation.

A Wide Area Network (WAN) is more complex than a Local Area Network (LAN) as it connects computers over long distances, enabling remote communication among devices even when separated by miles The Internet exemplifies a WAN by linking computers globally Due to its extensive coverage, a WAN is usually managed by multiple administrators or public entities.

- The protocol used mainly in the WAN is TCP / IP protocol.

A Storage Area Network (SAN) is a high-speed network that links shared storage devices to multiple servers, operating independently of LAN or WAN infrastructures By relocating storage resources to a dedicated, high-performance network, SANs allow for access similar to that of a directly attached drive There are various types of SANs, including converged, virtual, and unified SANs, each designed to enhance storage efficiency and performance.

 Passive Optical Local Area Network (POLAN)

POLAN technology offers a modern solution to traditional switch-based Ethernet LANs by integrating with structured cabling, effectively addressing issues related to traditional Ethernet protocols and applications like Power over Ethernet (PoE) Utilizing a point-to-multipoint LAN architecture, POLAN employs optical splitters to divide a single optical signal from one strand of single-mode optical fiber into multiple signals, efficiently serving various users and devices.

These types of networks are built and owned by businesses that want to securely connect its various locations to share computer resources

A VPN creates a private network over the Internet, enabling users to send and receive data as if their devices are directly connected to this network, regardless of their actual location By establishing a virtual point-to-point connection, users can remotely access the private network securely.

A constraint network serves as a framework for representing instances of the constraint satisfaction problem (CSP), fundamental to constraint programming In discrete instances, the domains consist of finite sets of permissible variable values However, it remains uncertain whether polynomial-time algorithms exist for efficiently solving discrete constraint satisfaction problems.

Information sharing within a network can significantly enhance your knowledge and experience Engaging with diverse perspectives allows for insightful discussions, enabling you to ask questions and receive valuable feedback This collaborative environment broadens your understanding and helps you view challenges from multiple angles, ultimately enriching your learning journey.

“best practices” saves time, energy and resources.

To seize opportunities when they arise, it's crucial to be well-connected A strong network facilitates information sharing, joint ventures, and partnerships, which can be essential for success By cultivating a diverse array of contacts, you increase your chances of capitalizing on opportunities rather than letting them slip away.

Building a strong network is essential for career advancement and organizational growth, whether you're promoting yourself or your business Leveraging "word of mouth" remains one of the most effective advertising strategies, as sharing positive information about you or your organization can generate valuable leads and drive new opportunities.

Networking enhances your credibility by improving your reputation and fostering valuable connections When you successfully engage with others, you become known as someone people want to converse with and learn from, which builds a strong reputation This positive image not only attracts support but also positions you as a resourceful individual with valuable information and ideas By demonstrating your willingness to assist colleagues, you further solidify your credibility within your network.

- Making new friends and socializing is an important aspect of our human nature

Building new relationships enhances self-esteem and confidence, which are crucial for career advancement By actively working on personal development and engaging with others, you foster a supportive network that propels your professional growth As you become more adept at networking, your confidence will naturally increase, attracting others to you This heightened confidence not only facilitates the exchange of valuable information but also creates opportunities for collaboration and knowledge sharing.

Types of Topology

There are five types of topology in computer networks

In a mesh topology, every device is interconnected through dedicated point-to-point links, ensuring that each link exclusively transmits data between the two connected devices For a network with n devices, each device must connect to (n-1) other devices, resulting in a total of n(n-1)/2 links within the mesh topology This configuration enhances reliability and data transmission efficiency across the network.

 No data traffic issues as there is a dedicated link between two devices which means the link is only available for those two devices.

 Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the communication between other devices on the network.

 Mesh topology is secure because there is a point to point link thus unauthorized access is not possible.

 Amount of wires required to connected each system is tedious and headache.

 Since each device needs to be connected with other devices, number of I/O ports required must be huge.

 Scalability issues because a device cannot be connected with large number of devices with a dedicated point to point link.

In a star topology network, all devices are connected to a central hub, which facilitates communication between them Unlike mesh topology, where devices can communicate directly, star topology requires that any data transmission must first go through the hub Therefore, when one device needs to send data to another, it must send the information to the hub, which then relays it to the intended recipient.

 Less expensive because each device only need one I/O port and needs to be connected with hub with one link.

 Less amount of cables required because each device needs to be connected with the hub only.

 Robust, if one link fails, other links will work just fine.

 Easy fault detection because the link can be easily identified.

 If hub goes down everything goes down, none of the devices can work without hub.

 Hub requires more resources and regular maintenance because it is the central system of star topology. a Bus Topology

Bus topology consists of a central main cable to which all devices are connected via drop lines A tap device facilitates the connection between the drop line and the main cable However, data transmission is limited by the number of drop lines and the maximum distance the main cable can cover.

 Easy installation, each cable needs to be connected with backbone cable

 Less cables required than Mesh and star topology

 Not scalable as there is a limit of how many nodes you can connect with backbone cable. b Ring Topology

In ring topology, each device is interconnected with two neighboring devices, creating a circular structure This configuration involves two dedicated point-to-point links for each device, allowing data transmission in a single direction Each device is equipped with a repeater that forwards data until it reaches the intended recipient, ensuring efficient communication within the network.

 Managing is easier as to add or remove a device from the topology only two links are required to be changed.

 A link failure can fail the entire network as the signal will not travel forward due to failure

 Data traffic issues, since all the data is circulating in a ring. c Hybrid topology

A combination of two or more topology is known as hybrid topology For example a combination of star and mesh topology is known as hybrid topology.

 We can choose the topology based on the requirement for example, scalability is our concern then we can use star topology instead of bus technology

 Scalable as we can further connect other computer networks with the existing networks with different topologies.

 Design is complex so maintenance is high thus expensive.

3 The impact of current network technology, communication and standards:

OSPF: It is a routing protocol generally used for larger network either a single network or a group network It is designed by Internet Engineering Task Force It can also use as a

EX: To run OSPF on routers, we use the following command

Router (config) # router ospf process-id

Router (config-router) # network dia_chi_IP wildcard_mask area area_id

Where: Process - id: number of progress The OSPF process runs on the router, only has a local meaning on the router.

To enable a port to participate in OSPF, it is essential to "network" the port's network address using a wildcard mask for accurate subnet routing The wildcard mask is calculated by subtracting the subnet mask value of 255.255.255.0 from 255.255.255.0, examining each octet in the process It's important to note that this calculation applies specifically to consecutive IP ranges and may not be valid for all scenarios.

Configure the OSPF of the router as follows: Configure the R1 router: use OSPF

File Transfer Protocol (FTP) is a standard network protocol used for transferring data between a client and a host or between servers To upload files to a website, users or administrators must provide a username, password, and host address.

SMTP: Simple mail transfer protocol is like a media which transfers e-mail SMTP always work with POP3 service.

TCP/IP, which stands for Transmission Control Protocol and Internet Protocol, is a crucial protocol stack that facilitates communication over networks It comprises two distinct protocols and is closely associated with other protocols like FTP, SMTP, and HTTP This framework enables network users to effectively communicate through various means, including email and instant messaging.

 Security is good - users cannot see other users' files unlike on stand-alone machines. b Data Communications

 Send and receive information over communications lines Encoding, interfacing, signal integrity, multiplexing etc. c The impact of network bandwidth requirements:

Bandwidth affects how long it takes to download or upload information over the Internet

A high-bandwidth connection ensures a seamless and responsive user experience, as it allows for faster data transfer However, it's important to note that after reaching a certain threshold of bandwidth, additional increases yield diminishing returns, meaning that beyond a sufficient level, internet performance does not significantly improve.

Topology and architecture used to interconnect devices e Bandwidth

Bandwidth refers to the maximum data transfer capacity of a wired or wireless network connection, indicating how much data can be transmitted from one point to another within a specified time frame, typically one second Often confused with network speed, bandwidth is actually synonymous with capacity and describes the data transfer rate Key factors influencing bandwidth include expected average load, anticipated peak load, local internet availability, and cost constraints.

M1: Compare common networking principles and how protocols enable the

NETWORKING PRINCIPLES AND THEIR PROTOCOLS

• The Benefits and Constraints of Different Network Types and Standards

1 Personal Area Network (PAN) The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building These types of networks are typically found in small offices or residences, and are managed by one person or organization from a single device.

A personal area network (PAN) eliminates the need for additional wires or space, allowing seamless connectivity between devices By simply enabling Bluetooth on both devices, users can effortlessly share data For instance, a wireless keyboard and mouse can easily connect to a tablet via Bluetooth, enhancing convenience and efficiency.

A personal area network allows multiple devices to connect simultaneously, enabling one mobile device to link with several other mobiles or tablets for seamless file sharing.

+Cost effective: No extra wires are needed in this type of network Also, no extra data charges are involved so PAN is an inexpensive way of communication.

+Easy to use: It is easy to use No advanced setup is required.

+Reliable: If you use this type of data connection within 10 meters then your network is stable and reliable.

+Secure: This network is secured because all the devices are authorized before data sharing Third party injection and data hacking are not possible in PAN

Signal range is maximum 10 meters which makes limitation for long distance sharing.

+ Interfere with radio signals: As personal area network also use infrared so it can interfere with radio signals and data can be dropped.

+ Slow data transfer: Bluetooth and infrared have a slow data transfer rate as compared to another type of networks like LAN (local area network).

+ Health problem: In some cases, PAN uses microwave signals in some digital devices which have a bad effect on the human body like brain and heart problems may occur.

2 Local Area Network (LAN)We’re confident that you’ve heard of these types of networks before

Local Area Networks (LANs) are among the most commonly discussed and utilized types of networks, known for their simplicity and effectiveness They connect groups of computers and low-voltage devices over short distances, facilitating communication and resource sharing within a localized environment.

LO2 Explain networking devices and operations

P3 Discuss the operating principles of networking devices and server types

Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter) .23 1 Repeater

A network device serves as a crucial node within a wireless mesh network, enabling the transmission and reception of wireless HART data while facilitating essential functions for network formation and maintenance These devices encompass field devices, router devices, gateway devices, and handheld mesh devices, all of which play a vital role in ensuring seamless connectivity and communication within the network.

A repeater functions at the physical layer of a network, tasked with regenerating signals to extend transmission distances It ensures that signals do not weaken or become corrupted by copying and restoring them bit by bit to their original strength, rather than amplifying them Notably, a repeater is a two-port device essential for maintaining signal integrity over extended network lengths.

A hub functions as a multiport repeater, connecting various wires from different branches, such as in a star topology where it links multiple stations However, hubs lack the ability to filter data, resulting in data packets being broadcast to all connected devices This creates a single collision domain for all hosts connected through the hub Additionally, hubs do not possess the intelligence to determine the optimal path for data packets, leading to inefficiencies and wasted bandwidth.

A bridge functions at the data link layer, acting as a repeater while also filtering content by analyzing the MAC addresses of both source and destination It serves to interconnect two LANs that operate on the same protocol and features a single input and output port, categorizing it as a two-port device.

A switch is a multiport bridge designed to enhance efficiency and performance at the data link layer It performs error checking before forwarding data, ensuring that only error-free packets are sent to the correct port This capability allows a switch to divide the collision domain among hosts while maintaining the same broadcast domain.

A router is a crucial Network Layer device that directs data packets using their IP addresses It connects Local Area Networks (LANs) and Wide Area Networks (WANs), maintaining a dynamically updating routing table to make informed routing decisions Additionally, routers help to segment broadcast domains for the hosts connected to them, enhancing network efficiency.

A gateway serves as a crucial connection point between two networks that may use different networking models, functioning as a messenger agent to interpret and transfer data between systems Often referred to as protocol converters, gateways can operate at any network layer and are typically more complex than switches or routers.

A bridging router, also known simply as a bridging router, integrates the functionalities of both a bridge and a router Operating at either the data link layer or the network layer, it effectively routes packets across different networks while also filtering traffic within a local area network.

Modulators and demodulators, commonly known as modems, play a crucial role in transmitting digital signals over analog telephone lines They convert digital signals into analog signals of varying frequencies for transmission, which are then received and converted back into digital signals by a modem at the destination.

This list categorizes the many different types of servers used in the marketplace today. a Proxy Server

A proxy server sits between a client program (typically a Web browser) and an external server (typically another server on the Web) to filter requests, improve performance, and share connections. b Mail Server

Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate networks (via LANs and WANs) and across the Internet. c Server Platforms

A term often used synonymously with operating system, a platform is the underlying hardware or software for a system and is thus the engine that drives the server. d Web Server

A Web server is responsible for delivering static content to a user's Web browser by retrieving files from a disk and transmitting them over the network This process involves communication between the browser and the server through the HTTP protocol.

Application servers, often considered a form of middleware, play a crucial role in the computing landscape by serving as a bridge between database servers and end users, facilitating seamless connections between the two Additionally, they encompass real-time communication servers, enhancing the efficiency of data exchange and interaction.

Real-time communication servers, often referred to as chat or IRC servers, facilitate instant information exchange among numerous users These servers, also known as instant messaging (IM) servers, play a crucial role in enabling swift communication in various online environments.

File Transfer Protocol (FTP) is one of the oldest Internet services, enabling the secure transfer of one or more files between computers It ensures file security, organization, and transfer control, making it an essential tool for efficient data management and collaboration.

Collaboration software, formerly known as 'groupware,' showcases the true potential of the Internet by allowing users to work together seamlessly from any location This software facilitates teamwork in a virtual environment, whether through the Internet or a corporate intranet One example of such software is a list server, which helps manage group communication and collaboration effectively.

List servers facilitate effective management of mailing lists, allowing for both interactive public discussions and one-way communications such as announcements, newsletters, and advertisements.

A Telnet server enables users to log on to a host computer and perform tasks as if they're working on the remote computer itself. k Open Source Server

P4) Discuss the inter-dependence of workstation hardware with relevant networking software

 Hardware e.g network card, cabling; permissions; system bus; local-system architecture e.g memory, processor, I/O devices.

 A workstation is a special computer designed for technical or scientific applications

Intended primarily to be used by one person at a time, they are commonly connected to a local area network and run multi-user operating systems.

 Workstations offer higher performance than mainstream personal computers, especially with respect to CPU and graphics, memory capacity, and multitasking capability.

Workstations are specifically designed to enhance the visualization and manipulation of complex data types, including 3D mechanical design, engineering simulations like computational fluid dynamics, animation and image rendering, as well as mathematical plotting.

Software refers to a collection of programs specifically designed to execute tasks through a sequence of instructions It is primarily categorized into two types: system software and application software System software is essential for operating, managing, and enhancing a computer's processing capabilities, as it enables the functionality of both hardware and application software Common programming languages used for developing system software include various high-level and low-level languages.

C, C++, and Assembly language Application software: is designed to achieve a specific user requirement Some application software is as follows Word documents allow creating documents Spreadsheet allows maintaining financial details Database Management Systems (DBMS) helps in maintaining data in databases.

3 What is the inter-dependence of workstation hardware with relevant networking software?

Both hardware and software are essential for a computer's functionality, as they are interdependent; hardware, which consists of the physical components, cannot operate without software, which provides the necessary instructions for tasks.

Computer Networks and Protocols have revolutionized human interaction, influencing how we work, play, and communicate Digital networking is increasingly integrated into unexpected areas of our lives, empowering us for the future As new protocols and standards emerge, they will continue to transform and enhance our daily experiences However, many existing digital networking technologies are based on foundational protocols and standards that have remained stable for over thirty years, rather than being cutting-edge innovations.

1 Through the report on, we can find out what networking is It's created as well as the connection, it's useless and inconvenienced in life

2 The development of networking has brought many interests to society like:

- A lot of people can share the same utility software

A collaborative team can efficiently share and utilize case data by connecting to a centralized network By leveraging a master file during their workflow, they can seamlessly exchange information, enhancing their overall productivity and communication.

- The data is concentrated to secure security, exchange between people that are advantageous, fast, backup data is better

- Using the same printer devices, scanner, hard disk and other equipment

- The user and exchange information via an e-mail service (Email), services Chat transmissions (FTP), Web services (FTP), Web service

- Delete the geographic distance between the computers in the network wants to share and swap data together

- Some users don't need to be equipped with expensive computer costs (low-cost costs and functioning).

- Allows the programmer at a computer center to use the utility programs, the memory of another computer center to increase the economy of the system

- Safe for the data and the software because it manages access to the user accounts

(depending on the Internet administrators).

3 Organizations with significant or authoritative influence on the standardization of computer networks:

ANSI "American National Standards Institute"

IEEE "Academy of Electrical and Electronics Engineers "

M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimisation.

Based on the method of creating the server, you can classify servers as follows:

- Not limited in terms of server resources, increasing storage space, bandwidth, tolerating large numbers of people accessing at the same time.

- By not having to share it with other users.

- Get the right to install the system and configure according to your own needs.

- High security, limiting network attacks.

- Easy direct or remote administration

However, the upgrade or expansion of this platform becomes complicated and expensive because of the investment in specialized hardware equipment.

Maintaining a physical server system requires significant investment and operational costs for business owners These expenses include purchasing or renting dedicated servers, setting up installation spaces, covering electricity and network system costs, hiring IT staff, and ongoing server maintenance.

->suitable for large enterprises, organizations requiring high security, running 24/7.

- You are not sharing resources.

- VPSs are easy to scale.

- You have full control over the server.

However, the increase or decrease of resources for VPS will also be limited because the resources of the server are limited.

Upgrading your VPS configuration can be time-consuming and may require significant effort, as it involves migrating to a new server, which can lead to temporary downtime for your VPS.

->Software development companies, e-commerce websites, high-traffic applications, businesses that have database needs or are running their own software and services.

A Cloud Server operates on a cloud computing infrastructure, enabling automatic interchangeability that ensures stable performance even during server failures This technology guarantees the safety of data, providing reliable service continuity.

Cloud Servers offer rapid and effortless scalability of resources, allowing users to expand or reduce their capacity as needed This flexibility is made possible by the vast pool of resources available, which is derived from numerous physical servers within the cloud infrastructure.

User data is securely stored on a centralized SAN system, isolated from the server infrastructure This setup incorporates multiple security layers, including firewalls and antivirus measures, to ensure optimal protection for all data.

This approach is recognized as the most cost-effective solution, allowing flexibility in upgrading or downgrading resources while only paying for the actual usage of components such as CPU, capacity, and RAM.

->like VPS, but the cost is more flexible due to how much you pay Flexible expansion capacity and zero downtime when upgrading.

Ngày đăng: 24/04/2022, 21:58

w