Higher Nationals in Computing Unit 2 Networking ASSIGNMENT 1 Learner’s name ID Class Subject code Assessor name Assignment due Assignment submitted ASSIGNMENT 1 FRONT SHEET Qualification BTEC Level 5 HND Diploma in Computing Unit number and title Unit 2 Networking Submission date Date Received 1st submission Re submission Date Date Received 2nd submission Student Name Student ID Class Assessor name Student declaration I certify that the assignment submission is entirely my own work and I fully u.
Introduction to Network
A network is formed when two or more computers are connected to share resources, such as printers and CDs, exchange files, and communicate effectively These computers can be linked through various methods, including cables, phone lines, radio waves, satellites, or infrared rays.
Two common types of networks include:
There are also the following types: Metropolitan Area Networks (MAN), Wireless LAN (WLAN), Wireless WAN (WWAN))
OSI Model
The Open Systems Interconnection (OSI) model is a conceptual framework that standardizes and defines the communication functions of telecommunication and computing systems It focuses on ensuring interoperability among various communication systems by utilizing standardized communication protocols, regardless of their internal structures and technologies.
The model divides data flow in a communication system into seven abstraction layers, ranging from the physical transmission of bits to the highest-level data representation in distributed applications Each layer provides specific functionalities to the layer above while being supported by the layer below, with standardized communication protocols implemented in software to realize these functionalities.
The OSI model divides the communication process between network devices into seven distinct layers, with each layer responsible for specific tasks These layers operate independently and are self-contained, allowing for efficient execution of their designated functions.
Types of common network
LAN
A Local Area Network (LAN) is a private network that connects a group of computers and other devices, enabling data transfer among them Designed to operate within a limited area such as an office, shopping mall, or campus, LANs facilitate efficient communication and resource sharing within these confined spaces.
Main objective of using of LAN is to share resources (printer, FAX machine, plotter etc) with multiple compute and swap data.
A Local Area Network (LAN) is a private network that operates independently of external regulatory bodies, ensuring greater control and security It typically delivers higher speeds than Wide Area Networks (WANs), making it an efficient choice for local connectivity Additionally, LANs utilize various media access control methods, such as token rings and the Internet, to manage data transmission effectively.
A Local Area Network (LAN) offers numerous benefits, including resource sharing, where devices like printers and scanners can be utilized by all connected computers, significantly reducing hardware costs It facilitates software application sharing, allowing multiple users to access the same software without needing individual licenses Communication is made easy and cost-effective, enabling quick data and message exchanges among networked computers Additionally, LAN centralizes data storage on a server, granting users access to necessary information from any connected device while enhancing data security by managing it in one location Furthermore, LAN enables internet sharing, allowing multiple users to connect to a single internet source, which is particularly beneficial in environments like school labs and internet cafes.
Local Area Networks (LANs) come with several constraints that organizations should consider Firstly, the high setup cost is a significant barrier, as it involves purchasing specialized software and expensive communication devices such as Ethernet cables, switches, and routers Additionally, privacy violations are a concern, as LAN administrators have the ability to access personal data files and monitor users' computer and internet histories Data security is also at risk, as unauthorized users may gain access to sensitive information if server hard disks are not adequately secured Moreover, maintaining a LAN requires a dedicated LAN Administrator to address issues like software installations, hardware failures, and cable disturbances Lastly, LANs are limited in their coverage area, typically confined to a single office, building, or a cluster of nearby buildings.
WAN
A WAN is a network that uses various links—private lines,
(MPLS), virtual private networks (VPNs), wireless
A Wide Area Network (WAN) connects various smaller metropolitan and campus networks across diverse locations, whether they are a few miles apart or located globally In an enterprise setting, WANs serve to link branch offices and remote workers to headquarters or data centers, facilitating the sharing of corporate resources and enhancing communication.
The software files will be shared among all the users; therefore, all can access the latest files Any organization can form its global integrated network using WAN.
A Wide Area Network (WAN) enables businesses to connect offices across vast geographical distances, facilitating seamless communication This network supports various devices, including mobile phones, laptops, tablets, computers, and gaming consoles, enhancing connectivity and collaboration.
Wide Area Networks (WANs) face significant challenges, particularly regarding security, as they are more vulnerable than Local Area Networks (LANs) and Metropolitan Area Networks (MANs) The risk of unauthorized access to sensitive information increases when multiple users can connect to various computers To mitigate these security threats, the implementation of firewalls and antivirus software is essential to safeguard data transfers from potential hackers and viruses Additionally, the initial setup cost of a WAN is notably high, as it spans extensive geographical areas and requires investment in various networking devices, such as routers and switches, along with necessary security software Troubleshooting within a WAN can be particularly complex due to its vast coverage; for instance, repairing undersea cables can be a labor-intensive process Furthermore, maintaining a WAN network demands continuous oversight and advanced technical skills from network supervisors and technicians, making it a considerable commitment.
MAN
A Metropolitan Area Network (MAN) is a network that extends over a city, campus, or specific organizational area, effectively connecting multiple Local Area Networks (LANs) While MANs are larger than LANs, they are smaller than Wide Area Networks (WANs), which can span vast geographical regions and connect users globally.
Metropolitan Area Networks (MANs) are known for their high efficiency and rapid communication capabilities, often utilizing high-speed carriers like fiber optic cables However, the emergence of wireless technologies and advanced networking solutions has led to a diverse range of methods for transmitting signals across larger MAN regions.
It mostly covers towns and cities in a maximum 50 km range The most used medium is optical fibres, cables Data rates are adequate for distributed computing applications
The Metropolitan Area Network (MAN) offers numerous advantages, making it a cost-effective solution for connecting to Wide Area Networks (WAN) One of the key benefits is its affordability, as MAN provides efficient data management in a centralized manner Additionally, it enables fast and free local email communication With data speeds reaching up to 1000 Mbps due to fiber optic technology, MAN ensures rapid file and database transfers Users can also share internet connections through MAN, allowing multiple individuals to access high-speed internet simultaneously Moreover, converting a Local Area Network (LAN) to a MAN is straightforward, facilitating quick connections between multiple LANs through efficient link configurations Finally, MAN provides enhanced security compared to WAN, ensuring a safer networking environment.
Managing a Metropolitan Area Network (MAN) can be challenging due to the complexities that arise with an increase in the size and number of connected Local Area Networks (LANs), leading to security and configuration issues Additionally, the reliance on copper wires can significantly hinder internet speed, necessitating costly upgrades to fiber optics for optimal performance The risk of hacker attacks is also heightened in MANs compared to LANs, making robust security measures essential to prevent data breaches Furthermore, establishing a MAN requires highly skilled technical personnel, such as network administrators and troubleshooters, to ensure proper setup and maintenance Lastly, a MAN demands more cabling than a LAN, as it essentially integrates multiple LANs into a cohesive network.
Network protocols
Defintion
Network protocols are essential rules and conventions that govern data exchange between devices on a network They serve as a common language, enabling seamless communication of information despite differences in infrastructure and design.
Purposes of network protocols
Without protocols, devices would lack the ability to understand the electronic signals they send to each other over network connections Network protocols serve these basic functions:
Network protocols can be likened to a postal service that efficiently manages the flow of physical mail from various sources to multiple destinations While both systems ensure the continuous delivery of messages, network protocols offer advanced functionalities such as streaming, which allows for a steady flow of information to a single destination, and broadcasting, which enables the simultaneous delivery of messages to multiple recipients.
Common network protocols
Transmission Control Protocol/Internet Protocol (TCP/IP) is the fundamental language that enables computers to connect to the internet This suite of protocols is specifically designed to create a network of networks, allowing hosts to access online resources effectively.
TCP/IP is essential for comprehensive internet data connectivity, enabling end-to-end data transmission while offering critical functions such as addressing, mapping, and acknowledgment This protocol suite consists of four layers, which exhibit slight variations from the OSI model.
HTTP, or Hypertext Transfer Protocol, is an application layer protocol essential for distributed and collaborative information systems Operating on a client-server model, it enables web browsers to function as clients that request data, including text, images, and multimedia files, from servers As a request-response protocol, HTTP facilitates the exchange of information over the World Wide Web, with the server processing client requests and returning the appropriate responses.
HTTP is a stateless protocol, which means that the client and server only recognize each other during an active connection Once the connection is terminated, both entities forget about each other, resulting in an inability to retain information between requests.
The DNS protocol helps in translating or mapping host names to IP addresses. DNS works on a client-server model, and uses a distributed database over a hierarchy of name servers.
Hosts are recognized through their IP addresses, which can be challenging to remember due to their complexity and dynamic nature To simplify this, DNS plays a crucial role by translating website domain names into numerical IP addresses, making it easier for users to access online content.
ICMP, or Internet Control Message Protocol, is a vital network layer protocol utilized by network devices to communicate error messages and operational information It facilitates out-of-band messaging within IP packets to address network operations and issues Primarily, ICMP is essential for reporting network errors, congestion, and timeouts, and it plays a crucial role in network troubleshooting.
DHCP, or Dynamic Host Configuration Protocol, is a crucial communication protocol that allows network administrators to automate the allocation of IP addresses within a network Each device that connects to the internet needs a unique IP address, and DHCP facilitates the centralized distribution of these addresses When a device is connected to the network from a different location, DHCP automatically assigns a new IP address, operating efficiently on a client-server model.
Network standards
International Standards Organization
Standardization is a prominent independent, non-governmental organization comprising standards organizations from 165 member countries As the largest global developer of voluntary international standards, it plays a crucial role in facilitating world trade by establishing common standards across nations With over twenty thousand standards established, it addresses a wide range of sectors, including manufactured products, technology, food safety, agriculture, and healthcare.
Standards used in network
Some of the noted standards organizations are:
Institute of Electronics and Electrical Engineers (IEEE)
American National Standards Institute (ANSI)
Internet Research Task Force (IETF)
P2 Explain the impact of network topology, communication and bandwidth requirements.
Introduction to network topology
Defintion
Network topology describes the arrangement of links and nodes within a network, influencing their interconnections It is divided into two main categories: physical network topology, which pertains to the actual transmission medium, and logical network topology, which focuses on how data flows between devices, regardless of their physical connections Examples of logical network topologies include twisted pair Ethernet, classified as a logical bus topology, and token ring, recognized as a logical ring topology.
Physical topology
Physical topology defines the layout and structure of a local area network (LAN), focusing on how physical devices are interconnected through various cabling methods This includes the types of cables used to connect devices within the network In contrast, logical topology pertains to the network's media signal performance and the manner in which data is exchanged between devices.
Logical topology
A logical topology in networking refers to the structural design that governs how data is communicated among all nodes within a network This architecture can be dynamically managed and reconfigured through the use of network devices like routers and switches, ensuring efficient communication and adaptability.
Logical topologies contrasts with physical topologies, which refer to the physical interconnections of all devices in the network.
The difference between physical topology and logical topology
Basic Refer to how a network look and functions.
Fashion in which data travels logistically.
Types Bus, star, ring and mesh topologies Logical bus and the logical ring.
Founded on Physical connections of cables and devices.
Path traveled by data in a network.
Can affect Cost, scalability, flexibility, bandwidth Data delivery causing lost packets or capacity, etcetera congestion.
Popular topologies
The mesh topology has a unique network design in which each computer on the network connects to every other It is develops a P2P
A point-to-point connection among all network devices ensures high redundancy, allowing data to find alternative pathways even if a network cable fails.
The network can be expanded without disrupting current users.
Need extra capable compared with other LAN topologies.
No traffic problem as nodes has dedicated links.
Dedicated links help you to eliminate the traffic problem.
It has multiple links, so if any single route is blocked, then other routes should be used for data communication.
P2P links make the fault identification isolation process easy.
It helps you to avoid the chances of network failure by connecting all the systems to a central node.
Every system has its privacy and security.
Installation is complex because every node is connected to every node.
It is expensive due to the use of more cables No proper utilization of systems.
It requires more space for dedicated links.
Because of the amount of cabling and the number of input-outputs, it is expensive to implement.
It requires a large space to run the cables.
In a star topology, all computers connect through a central hub, known as the central node, which links all other nodes This configuration is widely favored in LAN networks due to its cost-effectiveness and ease of installation.
Easy to troubleshoot, set up, and modify.
Only those nodes are affected, that has failed Other nodes still work.
Fast performance with few nodes and very low network traffic.
In Star topology, addition, deletion, and moving of the devices are easy.
If the hub or concentrator fails, attached nodes are disabled.
Cost of installation of star topology is costly.
Heavy network traffic can sometimes slow the bus considerably.
Performance depends on the hub’s capacity
A damaged cable or lack of proper termination may bring the network down.
Bus topology is a network configuration that utilizes a single central cable to connect all nodes, serving as the backbone of the system In this setup, one computer functions as the server, managing data transmission across the network.
When it has two endpoints, it is known as a linear bus topology.
Cost of the cable is very less as compared to other topology, so it is widely
P a g e | 18 used to build small networks.
Famous for LAN network because they are inexpensive and easy to install.
It is widely used when a network installation is small, simple, or temporary.
In a passive bus topology, computers are designed to listen for data transmissions rather than actively transferring data between themselves This setup allows devices to receive information without taking on the responsibility of moving data across the network.
In case if the common cable fails, then the entire system will crash down. When network traffic is heavy, it develops collisions in the network.
Whenever network traffic is heavy, or nodes are too many, the performance time of the network significantly decreases.
Cables are always of a limited length.
A ring network topology features a circular arrangement where each device is connected to two neighboring devices, facilitating communication This structure connects every computer in the network, with the last node linked back to the first, creating a continuous loop.
This topology uses token to pass the information from one computer to another In this topology, all the messages travel through a ring in the same direction.
Easy to install and reconfigure.
Adding or deleting a device in-ring topology needs you to move only two connections.
The troubleshooting process is difficult in a ring topology.
Failure of one computer can disturb the whole network.
Offers equal access to all the computers of the networks
Faster error checking and acknowledgment.
Break in a single ring can risk the breaking of the entire network
Modern days high-speed LANs made this topology less popular.
In the ring, topology signals are circulating at all times, which develops unwanted power consumption.
It is very difficult to troubleshoot the ring network.
Adding or removing the computers can disturb the network activity.
Tree topologies feature a root node with all other nodes connected in a hierarchical structure, making it synonymous with hierarchical topology This configuration combines multiple star topologies into a single bus, earning it the designation of Star Bus topology As a prevalent network design, tree topology shares similarities with both bus and star topologies.
Failure of one node never affects the rest of the network.
Node expansion is fast and easy.
Detection of error is an easy process
It is easy to manage and maintain
It is heavily cabled topology
If more nodes are added, then its maintenance is difficult
If the hub or concentrator fails, attached nodes are also disabled.
Hybrid topology combines two or more topologies You can see in the above architecture in such a manner that the resulting network does not exhibit one of the standard topologies.
In the depicted office environment, a hybrid network topology is utilized, combining Star and P2P configurations within a single department This integration occurs when two distinct basic network topologies are interconnected, resulting in a versatile and efficient networking solution.
Offers the easiest method for error detecting and troubleshooting Highly effective and flexible networking topology
It is scalable so you can increase your network size
The design of hybrid topology is complex
It is one of the costliest processes
Network communication
Defintion
A communication network refers to the pathways through which information circulates within an organization These channels can be categorized into formal networks, which adhere to the established authority structure and focus on task-related communications, and informal networks, which operate outside of this hierarchy.
(grapevine) is free to move in any direction, skip authority levels, and is as likely to satisfy group members' social needs as it is to facilitate task accomplishments.
The rules in the network communication
Protocols are necessary for effective communication and include:
- An identified sender and receiver
- Speed and timing of delivery
Protocols used in network communications also define:
- Encoding between hosts must be in appropriate format for the medium.
- Messages are first converted into bits by the sending host.
- Each bit is encoded into a pattern of sounds, light waves, or electrical impulses depending on the network media.
- The destination host receives and decodes the signals in order to interpret the message.
The Rules Message Formatting and Encapsulation
- There is an agreed format for letters and addressing letters which is required for proper delivery.
- Putting the letter into the addressed envelope is called encapsulation.
- Each computer message is encapsulated in a specific format, called a frame, before it is sent over the network.
- A frame acts like an envelope providing destination address and source address.
- Humans break long messages into smaller parts or sentences.
- Long messages must also be broken into smaller pieces to travel across a network.
- Each piece is sent in a separate frame.
- Each frame has its own addressing information.
- A receiving host will reconstruct multiple frames into the original message.
- Access Method: that rule which determines when someone is able to send a message.
- Flow Control: Another timing rule which affects how much information can be sent and the speed that it can be delivered is Flow Control.
- Response Timeout: If person A asks a question from person B and he does not hear a response within an acceptable time frame.
The Rules Message Delivery Options
Messages can be communicated through various methods, and at times, it is essential to send information to an individual This process is known as one-to-one delivery or unicast, indicating that there is a single destination for the transmitted message.
Effective communication often requires sharing information with multiple recipients simultaneously This can be achieved through multicast, where a single sender transmits a message to several destinations at once Alternatively, when information needs to reach everyone within a specific area, it is referred to as broadcast, allowing one sender to disseminate a message to all connected recipients.
Network bandwidth
Definition
Bandwidth generally refers to the amount of data that can be transmitted over a connection in a given time frame, especially in the context of internet usage While it has various technical definitions, its most common interpretation relates to the capacity of a transmission medium to handle information efficiently.
An internet connection with a larger bandwidth can move a set amount of data (say, a video file) much faster than an internet connection with a lower bandwidth.
Bandwidth is typically expressed in bits per second, like 60 Mbps or 60 Mb/s, to explain a data transfer rate of 60 million bits (megabits) every second.
Why bandwidth requirement is needed for networks
Higher bandwidth enables the upload and download of larger data volumes, leading to faster data transmission speeds This increased bandwidth not only enhances transfer speeds but also minimizes frustration, ultimately resulting in greater customer satisfaction.
As technology is developing day by day Users Demand for high speed internet, so to provide the highest data speed, higher bandwidth is required.
Bandwidth availability is crucial for ensuring optimal performance in VoIP and WebRTC services Insufficient bandwidth during calls can lead to voice quality issues, resulting in choppy audio, unexpected disruptions, and an overall poor user experience.
Bandwidth plays a crucial role in determining the loading speed of web pages in browsers, as it measures how quickly a computer can download data and reflects the connection speed between the internet and the device This is particularly vital for businesses utilizing social media to engage with clients, especially with the rise of mobile users and the popularity of VR apps For instance, videos uploaded on platforms like Facebook can take considerable time to load, making high bandwidth essential for companies that rely on streaming media for social interactions Ultimately, bandwidth is defined by the number of packets per second that a computer system can process, and it is utilized whenever a request is sent to a server for application software, data, or other information.
P3 Discuss the operating principles of networking devices and server types.
Networking devices
Switches
A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large
A switch is a data link layer device that enhances network performance by performing error checking before forwarding data This efficiency allows it to selectively transmit only error-free packets to the correct port, thereby reducing unnecessary traffic While a switch divides the collision domain among connected hosts, it maintains the same broadcast domain, ensuring effective data management within the network.
A network switch operates as a multiport bridge that forwards data using MAC addresses at the data link layer (Layer 2) of the OSI model Some advanced switches, known as layer-3 or multilayer switches, also provide routing capabilities to forward data at the network layer (Layer 3).
Routers
A router is a device like a switch that routes data packets based on their IP addresses The router is mainly a Network Layer device Routers normally connect
Local Area Networks (LANs) and Wide Area Networks (WANs) work together to maintain a dynamically updating routing table that guides data packet routing decisions Routers play a crucial role in this process by segmenting broadcast domains for the connected hosts, ensuring efficient data transmission across the network.
Routers function at the network layer (layer 3) of the OSI model, facilitating the transfer of data packets between networks by utilizing their logical addresses, specifically in the context of TCP/IP networking.
Routers, which function at a higher OSI level than bridges, possess superior packet-routing and filtering capabilities along with enhanced processing power This advanced functionality contributes to the higher cost of routers compared to bridges, making them a more effective choice for managing IP addresses of destination hosts within a network.
Gateways
A gateway serves as a crucial passage that connects two networks operating on different networking models Acting as messenger agents, gateways facilitate the transfer of data by interpreting information from one system and relaying it to another They are also commonly referred to as protocol converters.
P a g e | 25 converters and can operate at any network layer Gateways are generally more complex than switches or routers Gateway is also called a protocol converter.
A gateway serves as a crucial "translator" within a network, facilitating communication between systems that utilize different protocols, data formats, or architectures This essential network device, which can be a server, router, or firewall, enables the seamless flow of traffic in and out of the network, ensuring compatibility and connectivity across diverse systems.
Bridges
A bridge functions at the data link layer, acting as a repeater while also filtering content by analyzing the MAC addresses of both source and destination It serves to connect two Local Area Networks (LANs) that operate under the same protocol With a single input and output port, a bridge is classified as a two-port device.
A bridge in networking functions by dividing a Local Area Network (LAN) into two segments, allowing it to manage data traffic efficiently When a PC, such as PC 1, sends data to another PC, like PC 2, the data first reaches the bridge The bridge examines the MAC address of the destination PC and determines the appropriate segment for the data transmission If PC 2 is located in segment 1, the bridge will only broadcast the data within that segment, effectively excluding devices in segment 2 This process helps to reduce overall traffic on the network, enhancing performance and efficiency.
Hub
A hub serves as a multiport repeater, linking multiple cables from various branches, such as in a star topology where it connects different stations However, hubs lack the ability to filter data, causing data packets to be transmitted to all connected devices, resulting in a single collision domain for all hosts Additionally, hubs do not possess the intelligence to determine the optimal path for data packets, leading to inefficiencies and wastage in network performance.
Hubs are classified as a device layer in the OSI model, specifically at the physical layer, where they provide minimal support in a network They do not process data or recognize the source or destination of the information passing through them Essentially, hubs function by receiving packets, amplifying electrical signals, and broadcasting these packets to all connected devices.
Networking servers
Definition
A network server is a specialized computer that serves as a central hub, offering essential resources such as hardware access, disk space, and printer connectivity to other computers within the network.
Type of servers
A DNS (Domain Name System) server is essential for devices like computers, tablets, phones, and smart TVs to translate domain names such as www.google.com into IP addresses like 192.168.2.1, enabling seamless internet connectivity.
This is required because computers use IP addresses to communicate with each other, but these are hard for humans to remember and can change from time to time.
A DHCP Server is a crucial network component that automatically assigns IP addresses, default gateways, and other network settings to client devices Utilizing the Dynamic Host Configuration Protocol (DHCP), it efficiently responds to broadcast queries from clients, streamlining network management and connectivity.
A mail server acts as the digital counterpart to a traditional mailman, facilitating the delivery of emails Each email sent traverses multiple mail servers before reaching its final destination, ensuring efficient communication.
Email is transmitted rapidly between computers, but this process involves a complex series of transfers Without a network of mail servers, users would be limited to sending emails only to others with the same email domain, such as from one example.com account to another.
Web servers, which can be software, hardware, or a combination of both, play a crucial role in storing and delivering content to web browsers They operate by communicating with browsers through the Hypertext Transfer Protocol (HTTP), enabling seamless access to online information.
Web servers can also support SMTP (Simple Mail Transfer Protocol) and FTP (File Transfer Protocol).
Web servers are also used for hosting websites and data for web applications They can host single websites and multiple websites using virtualization.
A database server is a specialized machine that operates database software to deliver essential database services It plays a vital role in the client-server computing environment by supplying business-critical information to client systems upon request.
P4 Discuss the inter-dependence of workstation hardware with relevant networking software.
Introduction to inter -dependence networks
The study of interdependent networks is a specialized area within network science that examines the effects of interactions between complex networks This field highlights how nodes in one network often depend on nodes in another for support, illustrating the intricate relationships that can exist between different systems An example of this infrastructure dependency can be seen in various interconnected networks.
Infrastructure networks: The network of power stations depends on instructions from the communications network which require power themselves Another example is the interdependence between electric and natural gas systems.
Transportation networks are interconnected, with airports and seaports relying on each other for resources In any given city, the functionality of an airport is often contingent upon the support and resources provided by the local seaport, highlighting the interdependence of these critical transportation hubs.
Physiological networks, such as the nervous and cardiovascular systems, consist of interconnected components that form a complex network For optimal functioning, these systems rely on internal connectivity and essential resources sourced from one another.
The interdependence between the availability of credit from banking networks and economic production by commercial firms is crucial In October 2012, a bipartite network model was developed to analyze the relationship between banks and their assets, highlighting the interconnected nature of these financial systems.
Protein networks: A biological process regulated by a number of proteins is often represented as a network Since the same proteins participate in different processes, the networks are interdependent.
Ecological networks: Food webs constructed from species which depend on one another are interdependent when the same species participates in different webs.
Climate networks: Spatial measurements of different climatological variables define a network The networks defined by different sets of variables are interdependent.
Workstation hardware
Examples
Networking software
Definition
Networking software is essential for network management, enabling administrators to deploy, monitor, and maintain networks effectively While traditional networks rely on specialized hardware like routers and switches that integrate networking software, software-defined networking (SDN) decouples this software from hardware, facilitating innovation and adaptability to evolving network demands Additionally, network functions virtualization (NFV) separates functions such as firewalls and load balancing from the hardware, enhancing flexibility and efficiency in network operations.
Examples
4.Interdependence of workstation hardware with networking software
Diskless workstations rely on a central server to host their operating systems and manage network components, such as printers This setup can result in network congestion as the server must communicate on behalf of all diskless workstations, leading to increased traffic Additionally, since all network computers share the server's hardware resources—including the hard disk, CPU, and memory—workstation hardware must wait for the server to deliver the requested data Ultimately, the deployment of diskless workstations can create performance bottlenecks due to this reliance on centralized server resources.
The interdependence of workstation hardware in a network increases the necessity for dependable server components To ensure optimal performance and reliability, it is crucial to install robust hardware and software in the server Additionally, implementing effective backup and redundancy techniques is essential for maintaining data integrity and minimizing downtime.
M1 Compare common networking principles and how protocols enable the effectiveness of networked systems.
1 Introduce the common networking principles
Circuit switching
Circuit switching, originally designed for voice communication, is not well-suited for data transmission This method requires establishing a dedicated channel between the sender and receiver before any conversation can take place.
- Decreases the delay the user experiences before and during a call
- The call will be done with a steady bandwidth, dedicated channel, and consistent data rate
- Packets are always delivered in the correct order
- Great for only voice communication
- Dedicated channels for circuit switching are unavailable for any other use
- There is a higher cost to dedicate one channel per use
Packet switching
Packet switching differs from circuit switching by not needing a dedicated channel; instead, it divides messages into smaller data packets that seek the most efficient routes Each packet can take a different path, guided by a header address that specifies the source and destination nodes Upon arrival at the destination, the packets are reassembled to reconstruct the original message sent by the sender.
- More efficient than circuit switching.
- Data packets are able to find the destination without the use of a dedicated channel.
- Reduces lost data packets because packet switching allows for resending of packets.
- More cost-effective since there is no need for a dedicated channel for voice or data traffic.
- Not ideal for applications that are in constant use, such as high volume voice calls.
- High-volume networks can lose data packets during high-traffic times; those data packets cannot be recovered or resent during transmission
- There is a lack of security protocols for data packets during transmission.
Compare these two principles together
In circuit switching there are 3 phases: i) Connection Establishment. ii) Data Transfer. iii) Connection Released.
In Packet switching directly data transfer takes place.
In circuit switching, each data unit know the entire path address which is provided by the source.
In Packet switching, each data unit just know the final destination address intermediate path is decided by the routers.
In Circuit switching, data is processed at source system only
In Packet switching, data is processed at all intermediate node including source system.
Delay between data units in circuit switching is uniform.
Delay between data units in packet switching is not uniform.
Resource reservation is the feature of circuit switching because path is fixed for data transmission.
There is no resource reservation because bandwidth is shared among users.
Circuit switching is more reliable Packet switching is less reliable.
Wastage of resources are more in Circuit
Less wastage of resources as compared to
It is not a store and forward technique It is a store and forward technique.
Transmission of the data is done by the Transmission of the data is done not only source by the source, but also by the intermediate routers.
Congestion can occur during the connection establishment phase, because there might be a case where a request is being made for a channel but the channel is already occupied.
Congestion can occur during data transfer phase, large number of packets comes in no time.
Circuit switching is not convenient for handling bilateral traffic.
Packet switching is suitable for handling bilateral traffic.
In Circuit switching, charge depend on time and distance, not on traffic in the network.
In Packet switching, charge is based on the number of bytes and connection time.
Recording of packet is never possible in circuit switching.
Recording of packet is possible in packet switching.
In Circuit Switching there is a physical path between the source and the destination
In Packet Switching there is no physical path between the source and the destination
Circuit Switching does not support store and forward transmission
Packet Switching supports store and forward transmission
Protocols
What Does Protocol Mean?
A protocol is a set of rules and guidelines for communicating data.
Rules are defined for each step and process during communication between two or more computers
Networks have to follow these rules to successfully transmit data.
Explains Protocol
Protocols, much like programming languages, are governed by specific rules and regulations aimed at enhancing computing efficiency Each protocol is uniquely named and defined by distinct terms, establishing standards for communication They provide comprehensive details on the processes involved in data transmission, ensuring effective and reliable information exchange.
Type of task Process nature Data flow rate Data type Device management
A single process can be handled by more than one protocol simultaneously This coordination of protocols creates a protocol family.
How protocols enable the effectiveness of networked systems
Network protocols are legally guaranteed to use various system frames.
Implementing a standardized and institutionalized protocol facilitates interoperability among various frameworks, allowing users the flexibility to choose hardware from different vendors rather than being locked into a single supplier This shift diminishes the significance of "lock-in" traders and promotes the use of open protocols, enabling diverse systems to communicate effectively Consequently, this enhances the overall functionality and robustness of network administration frameworks.
The OSI model's Layer 2 protocol manages physical connections and interacts with network interface cards (NIC) to facilitate packet transmission Layer 3, known as the Network Protocol (IP), directs datagrams between networks, utilizing a 32-bit IP address to identify applications Layer 4 encompasses TCP and UDP protocols; TCP establishes reliable connections through IP addresses and port numbers, while UDP offers a low-overhead transmission service with minimal error checking.
M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimisation.
Provide a logical design of the network based on user requirements
Lab Computer
VGA GTX-1650 4GB [128-bit/GDDR5] 153.46$
TP-Link SG1008MP (8Port Gigabit + POE)
D1 Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system
1 En.wikipedia.org 2021 OSI model - Wikipedia [online] Available at: < https://en.wikipedia.org/wiki/OSI_model > [Accessed 29
2 DigitalThinkerHelp 2021 What is LAN (Local Area Network)? Definition, Types, Advantages,
Examples [online] Available at: < https://digitalthinkerhelp.com/what-is-lan-local-area- network-definition-types- advantages-examples/ > [Accessed 23 November 2021].
3 Fruhlinger, J and Shaw, K., 2021 What is a WAN? Wide-area network definition and examples
[online] Network World Available at: < https://www.networkworld.com/article/3248989/what- is-a-wan-wide-area- n e t w o r k - d e fi n i t i o n - a n d - e x a m p l e s h t m l > [Accessed 23
4 Techopedia.com 2021 What is Metropolitan Area Network (MAN)? - Definition from Techopedia
[online] Available at: < https://www.techopedia.com/definition/8238/metropolitan-area- network-man > [Accessed 23 November 2021].
5 ManageEngine, c., 2021 Network Monitoring Software by ManageEngine OpManager [online]
ManageEngine OpManager Available at: < https://www.manageengine.com/network- monitoring/network- protocols.html > [Accessed 26 November 2021].
6 Omnisci.com 2021 What is Network Topology? Definition and FAQs | OmniSci [online] Available at: < https://www.omnisci.com/technical-glossary/network-topology > [Accessed 24
7 Vapenik.s.cnl.sk 2021 [online] Available at:
8.Mike Siegler, G., 2021 4 Types of Bandwidth: Advantages and Disadvantages - Ecessa [online]
Ecessa Available at: < https://www.ecessa.com/blog/4-types-of-bandwidth-advantages- and-disadvantages/ > [Accessed 26 November 2021].
9.GeeksforGeeks 2021 Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and
Brouter) - GeeksforGeeks [online] Available at: < https://www.geeksforgeeks.org/network- devices-hub-repeater- bridge-switch-router-gateways/ > [Accessed 26 November 2021].
10 En.wikipedia.org 2021 Interdependent networks - Wikipedia [online]
Available at: < https://en.wikipedia.org/wiki/Interdependent_networks >
11 2021 [online] Available at: < https://www.sdxcentral.com/networking/sdn/definitions/networking- software/ >
12 2021 [online] Available at: < https://brainly.in/question/15526060> [Accessed 29 November 2021].