Your contribution can guide someone’s learning journey. Share your
documents today.
ASSIGNMENT 1 FRONT SHEET QualificationBTEC Level 5 HND Diploma in Computing Unit number and titleUnit 2: Networking Infrastructure Submission dateDate Received 1st submission Re-submission DateDate Received 2nd submission Student NameĐoàn Nhật QuangStudent IDGCD18518 ClassGCD0901Assessor nameĐặng Quan Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plag making a false declaration is a form of malpractice. Student’s signature Grading grid P1P2P3P4M1M2D1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contents I.Discuss the benefits and constraints of different network types and standards............................................ 3 1.Network............................................................................................................................................................ 3 2.Network types.................................................................................................................................................. 3 3.Network protocol............................................................................................................................................. 5 4.International standard organizations............................................................................................................ 8 II.Explain the impact of network topology, communication and bandwidth requirements......................... 9 1.Network topology............................................................................................................................................. 9 2.Physical topology........................................................................................................................................... 10 3.Logical topology............................................................................................................................................. 10 4.The difference between physical topology and logical topology................................................................ 10 5.Examples of popular topologies................................................................................................................... 11 6.Network communication............................................................................................................................... 17 III.Discuss the operating principles of networking devices and server types................................................ 20 1.Network devices............................................................................................................................................. 20 2.Servers............................................................................................................................................................ 23 IV.Discuss the inter-dependence of workstation hardware with relevant networking software................. 23 References................................................................................................................................................................... 25 Figures Figure 1 Working model of LAN.................................................................................................................................. 3 Figure 2 Network connection MAN.............................................................................................................................. 4 Figure 3 WAN connection............................................................................................................................................. 5 Figure 4 Bus Topology................................................................................................................................................ 11 Figure 5 Ring Topology.............................................................................................................................................. 13 Figure 6 Star Topology................................................................................................................................................ 14 Figure 7 Mesh Topology............................................................................................................................................. 15 Figure 8 Tree Topology.............................................................................................................................................. 16 Figure 9 Hybrid Topology........................................................................................................................................... 17 Figure 10 the model in the net shop............................................................................................................................ 24
I.Discussthebenefitsandconstraintsofdifferentnetworktypesand standards 1.Network In information technology, a network is defined as the connection of at least two computer systems, either by cable or wireless connection. The simplest network is a combination of two computers connected by cable. This type of network is called a peer-to-peer network. There is no hierarchy in this network; both participants have the same privileges. Each computer has access to the other's data and can share resources like disk space, applications, or peripherals (printers, etc.). Networks today tend to be a bit more complex and consist of more than just two computers. Systems with more than ten participants typically use a client-server network. In these networks, a central computer (server) provides resources to other participants in the network (client). 2.Network types a.Local Area Network (LAN) Definition LAN (Local Area Network), also known as a local area network, is used in a limited area with high transmission speed. Figure 1 Working model of LAN
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Devices using LAN can share resources with each other, typically sharing files, printers, ... and some other devices. Advantages High transmission speed, support to connect many devices quickly. Although limited in connection range, it costs less, uses less wires, and is easy to administer. b.Metropolitan Area Network(MAN) Definition MAN (Metropolitan Area Network), also known as urban network, links from many LANs via cables, other transmission means. The ability to connect in a large range such as in a town or city , the provincial. The MAN network model is often used mainly for organizations and businesses with many branches and departments connected to each other. Figure 2 Network connection MAN Man network is often used for businesses because this model provides many types of services such as connecting lines via voice (voice), data (data), video (image), deploying applications easily. . Advantages The large connection range makes interaction between business parts easy, efficient, low cost, stable transmission speed, information security, simple management. c.Wide Area Network(WAN)
Definition WAN (Wide Area Network), also known as wide area network, is a combination of urban networks including MAN and LAN through satellite equipment, optical cables, and power cables. Figure 3 WAN connection Wide area network was created to connect on a large scale across the country. The protocol used in the WAN is TCP/IP, the bandwidth varies depending on the installation location. Advantages Large connectivity, no signal limitation, easy information sharing, data storage. Relative transmission speed varies by region or transmission device. 3.Network protocol A network protocol is a set of established rules that define how data is transmitted between different devices in the same network. It basically allows connected devices to communicate with each other, regardless of any differences in their internal processes, structures or designs. Network protocols are the reason you can easily communicate with people around the world and therefore play a vital role in modern digital communication.
Similar to how speaking the same language simplifies communication between two people, network protocols make it possible for devices to interact with each other due to predefined rules built into the device's software and hardware suffer. Neither a local area network (LAN) nor a wide area network (WAN) could function as it does today without the use of network protocols. a.List common protocol 1. Internet Protocol: IP works similarly to a postal service. When users send and receive data from their devices, the data is concatenated into packets, like messages with two IP addresses: one for the sender and one for the recipient. After the packet leaves the sender, it goes to a port, like a post office, directing it in the appropriate direction. Packets continue to move through the ports until they reach their destination. IP is often paired with TCP to form TCP/IP, the overall set of internet protocols. Together, IP sends packets to their destination and TCP arranges the packets in the correct order, as IP sometimes sends packets out of order to ensure packets go the fastest way. 2. Transmission control protocol: TCP is the other half of TCP/IP and puts packets in order so that IP can deliverthem.specifically,TCPnumbersindividualpacketsbecauseIPcansendpacketstotheir destination through different routes and make them out of order, so TCP modifies this before IP delivers packets . TCP also detects errors during sending - including the lack of any packets based on TCP's numbering system - and asks IP to retransmit those packets before IP delivers the data to its destination. Through this process, the TCP/IP suite controls the communication on the internet 3. File Transfer Protocol: FTP is a client-server protocol, with which a client requests a file and the server supplies it. FTP runs over TCP/IP -- a suite of communications protocols -- and requires a command channel and a data channel to communicate and exchange files, respectively. Clients request files through the command channel and receive access to download, edit and copy the file, among other actions, through the data channel. FTP has grown less popular as most systems began to use HTTP for file sharing. However, FTP is a common network protocol for more private file sharing, such as in banking. 4. Hypertext Transfer Protocol: Like FTP, HTTP is a file sharing protocol that runs over TCP/IP, although HTTP's superiority works across web browsers and is generally recognizable to most users. When a user visits a website domain and wants to access that domain, HTTP provides access. HTTP connects to the domain's server and requests the web page's HTML, which is the code that structures and displays the design of the page.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Another form of HTTP is HTTPS, which stands for HTTP over Secure Sockets Layer or HTTP Secure. HTTPS can encrypt user web pages and HTTP requests. This provides greater security for users and can prevent common cybersecurity threats, such as man-in-the-middle attacks. 5. Domain name system: DNS is a database that includes a website's domain name, which people use to access the website, and its corresponding IP addresses, which devices use to locate the website. DNS translates the domain name into IP addresses, and these translations are included within the DNS. Servers can cache DNS data, which is required to access the websites. DNS also includes the DNS protocol, which is within the IP suite and details the specifications DNS uses to translate and communicate. DNS is important because it can quickly provide users with information, as well as access to remote hosts and resources across the internet. 6. Dynamic Host Configuration Protocol: DHCP assigns IP addresses to network endpoints so they can communicate with other network endpoints over IP. Whenever a device joins a network with a DHCP server for the first time, DHCP automatically assigns it a new IP address and continues to do so each time a device moves locations on the network. When a device connects to a network, a DHCP handshake takes place, where the device and DHCP server communicate. The device establishes a connection; the server receives it and provides available IP addresses; the device requests an IP address; and the server confirm it to complete the process 7. Simple mail transfer protocol: SMTP is the most common email protocol that is part of the TCP/IP suite and controls how an email client sends a user's email messages. The email server uses SMTP to send email messages from the client to the email server to the receiving email server. However, SMTP doesn't control how the email client receives mail - just how the client sends it. That said, SMTP requires other protocols to ensure email is sent and received properly. SMTP can work with Post Office Protocol 3 or Internet Mail Access Protocol, which controls how email servers receive email messages. 8. User Datagram Protocol: UDP is an alternative to TCP and also works with IP to transmit time-sensitive data. UDP enables low-latency data transmissions between internet applications, so this protocol is ideal for voice over IP or other audio and video requirements. Unlike TCP, UDP doesn't wait for all packets to arrive or organize the packets. Instead, UDP transmits all packets even if some haven't arrived. UDP only transmits packets, while TCP transmits, organizes and ensures the packets arrive. While UDP works more quickly than TCP, it's also less reliable. 9. OSPF Routing Protocol: OSPF works with IP in sending packets to their destination. IP aims to send packets over the road as quickly as possible, which OSPF is designed to do. OSPF opens the shortest or
fastest path first for packets. It also updates the routing tables - a set of rules that control where packets travel - and alerts routers about changes to the routing table or the network when a change occurs. OSPF is similar to and supports the Routing Information Protocol - which directs traffic based on the number of hops it has to make on a route - and it has also replaced RIP in many networks. OSPF was developed as a more affordable and scalable alternative to RIP. For example, RIP sends updated routing tables out every 30 seconds, while OSPF sends updates only when necessary and performs updates for the specific part of the table where the change occurred. 10. Telnet: Telnet is designed for remote connectivity, and it establishes connections between a remote endpoint and a host machine to enable a remote session. Telnet prompts the user at the remote endpoint to log on and, once authenticated, gives the endpoint access to network resources and data at the host computer. Telnet has existed since the 1960s and was arguably the first draft of the modern internet. However, Telnet lacks sophisticated security protections required for modern communications and technology, so it isn't commonly used anymore. 4.International standard organizations Some international standards organizations: IEC - International Electrotechnical Commission IEEE - Institute of Electric and Electronic Engineers IETF - Internet Engineering Task Force ISO - International Organization for Standardization ITU - The International Telecommunication Union ITU-R - ITU Radiocommunications Sector (CCIR) ITU-T - ITU Telecommunications Sector (CCITT) IUPAC - International Union of Pure and Applied Chemistry OASIS - Organization for the Advancement of Structured Information Standards SI - Systéme International d'Unit's (International System of Units) W3C - World Wide Web Consortium Accellera - Accellera Organization The names of the standards used in networking: International Organization for Standardization (ISO): Probably the largest standards organization in the world, ISO is actually a confederation of standards organizations from dozens of countries. In the networking world, ISO is best known for its OSI Reference Model.
American National Standards Institute (ANSI): ANSI is the primary organization responsible for coordinating and publishing computer and information technology standards in the United States. While they are often thought of as developing and maintaining standards, they are not. Instead, they oversee and accredit the organizations that actually create the standards, referring to them as the Standards Development Organization or SDO. ANSI also publishes standards documents created by SDOs and serves as the US representative for ISO. Information Technology Industry Council (ITIC): ITIC is a group of several dozen companies in the information technology (computer) industry. ITIC is an ANSI approved SDO for developing and handling standards related to a variety of computer-related topics. It was formerly known as the Computer and Business Equipment Manufacturers Association (CBEMA). National Committee on Information Technology (NCITS): A committee established by ITIC to develop and maintain standards relevant to the world of information technology. NCITS was formerly known as the X3 Accredited Standards Committee, Information Technology, or more commonly, just X3. It maintains several subcommittees that develop and maintain standards for various technical topics. The Institute of Electrical and Electronics Engineers (IEEE): IEEE (pronounced “eye-triple-ee”) is a well-known professional organization for people working in the electrical or electronic field, including computers. computer and network. IEEE's main claim to fame in the networking industry is the IEEE 802 Project, which covers many popular networking technologies including Ethernet. Electronics Industry Alliance (EIA): EIA is the international industry association best known for publishing standards for electrical wiring and transmission. Telecommunication Industry Association (TIA): TIA is the communications sector of the EIA, and is responsible for developing communications standards. Because communications, wiring, and transmission lines are all involved, and because the TIA and EIA organizations are also involved, standards issued by the EIA or TIA are often labeled with the prefixes combining ““ EIA/TIA” or “TIA/EIA”. International Telecommunication Union - Telecommunications Standardization Field (ITU-T): ITU-Tisanotherlargeinternationalorganizationthatdevelopsstandardsforthe telecommunications industry. ITU-T was formerly known as the International Telephone and Telephone Advisory Committee or CCITT. European Telecommunications Standards Institute (ETSI): An organization with members from dozens of countries both inside and outside Europe that develops telecommunications standards for the European (and elsewhere) market. ETSI is known for regulating the use of radio bandwidth in Europe and developing standards like HiperLAN. II.Explain the impact of network topology, communication and bandwidth requirements. 1.Network topology
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Network topology is used to describe the physical and logical structure of a network. It maps the way different nodes on a network--including switches and routers--are placed and connected, as well as how data flows. Diagramming the locations of endpoints and service requirements helps determine the best placement for each node to optimize traffic flows. 2.Physical topology Physical topology can be considered as a layout of the network media that shows the interconnections of the devices on the network. It specifies which geometric shape the linked devices form with each other. The physical topology does not give much comprehensive detail about the type of devices, the mechanism used for interacting with other devices in the network, and how data is transferred from one device to another. Therefore, it gives essential details of the network and network devices broadly, neglecting the higher level details like device type, addressing schemes, connectivity, and so on. The factors that affect communication of devices on a network based on the physical topology selected are: CostScalability Bandwidth capacity Ease of installation Ease of troubleshooting 3.Logical topology Unlike the physical topology, the logical topology emphasizes the manner in which data is transmitted between network nodes rather than the physical layout of the path the data follows. An important fact regarding these topologies is that both the physical and logical topologies are independent of a network, no matter what shape and size it may be. Such a logical topology is a signal path that traverses a physical topology. It handles - Line discipline Delivery frame according to order Error message Optimal flow control. 4.The difference between physical topology and logical topology Key difference between physical and logical topology
The physical topology is basically the physical layout of the network media. In contrast, logical topology refers to how, how data is transmitted throughout the network. The physical topology will not impede the transfer of data from one device to the other according to the logical topology. Logical topology is invisible in nature while physical topology can be customized. 5.Examples of popular topologies a.Bus Topology A bus topology is a type of network topology where every node, i.e. every device on the network, is connected to an individual main cable. Data is transmitted along a single route, from one point to another. We cannot transmit data either way. When this topology has exactly two endpoints, it is called a Linear Bus Topology. It is mainly used for small networks. Figure 4 Bus Topology Benefits of bus topology: It is cost effective. The required cable length is the least compared to other topologies.
The operation of this topology is easy to understand. Expansion can be easily done by linking the cables together. Drawbacks of bus topology If the main cable goes down, the network is completely down. Network performance is threatened and reduced if there are many nodes and large network traffic. The main cable can only be that long. Cable length is limited. Bus topology is not as fast as ring topology. Example of Bus Topology The 10BASE-2 network is an example of bus topology which is used in earlier days. Nowadays the bus topology is not used. b.Ring topology A ring topology is a type of topology where each computer is connected to another computer on each side. The last computer is connected to the first, thus forming a ring. This topology allows each computer to have exactly two neighboring computers. In this topology, the main computer is called a monitoring station, which is responsible for all operations. The transmission of data between devices is done with the help of tokens. To transmit data, the computer station must hold the token. Tokens are issued only when the transmission is complete, then other computer stations can use the token to transmit data. The data transmission is done by the sequential method, i.e. bit by bit. Therefore, the data must route its way through each node in the network to reach the destination node. We use repeaters in Ring topology to avoid data loss during transmission. These repeaters are especially useful when the topology has a large number of nodes and the data will reach the last node in the network. Data transmission is one-way in the Ring topology, but it can be made bidirectional by connecting each node to a different set of connections. This is called a double ring topology. Here, two ring networks are created, with data in each traveling in opposite directions.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Figure 5 Ring Topology Benefits of Ring Topology The network is not affected by numerous nodes or heavy traffic, as only the nodes possessing tokens can transfer data. Ring topology has cheap installation and expansion. Drawbacks of Ring Topology It is a tedious task to troubleshoot in Ring topology. It is difficult to add or delete nodes, as it interrupts the network activity. If one computer crashes, the entire network activity is disrupted. Example of Ring Topology SONET Ring Network is an example of Ring Topology. SONET stands for Synchronous Optical Network. c.Star Topology Star Topology is the kind of network topology in which all the nodes are connected via cables to a single node called a hub, which is the central node. The hub can be active or passive in nature. Active hubs
contain repeaters, while passive hubs are considered non-intelligent nodes. Each node contains a reserved connection to the central node, which the central node acting as a repeater during data transmission. Figure 6 Star Topology Benefits of Star Topology Star topology boasts fast performance due to low network traffic. It is easy to upgrade the Hub as and when required. Setup can be done easily and can be easily modified as well. Star Topology is easy to troubleshoot. In case a node has failed, it can easily be replaced without affecting the working of the rest of the network. Drawbacks of Star Topology The installation cost is extreme, and it is expensive to use. All the nodes are dependent on the hub. Example of Star Topology Star topology is mostly used for LAN(Local Area Network). In a small area, building, home, office, etc LAN networking with star topology system is used. d.Mesh Topology
Mesh topology is the kind of topology in which all the nodes are connected with all the other nodes via a network channel. Mesh topology is a point-to-point connection. It has n(n-1)/2 network channels to connect n nodes. Mesh topology has two techniques for transmission of data, i.e. routing and flooding. In the routing technique, the nodes possess a routing logic, like the logic for the shortest distance to the destination node or the logic to avoid routes with broken connections. In the flooding technique, all the network nodes receive the same data. This leaves us no need for routing logic. This technique makes the network robust but results in unwanted load on the network. Figure 7 Mesh Topology Benefits of Mesh Topology Every connection has the ability to carry its particular data load. Mesh Topology is very robust. It is easy to diagnose faults. Mesh Topology provides privacy and security. Drawbacks of Mesh Topology Mesh Topology is challenging to install and configure. As all the nodes are connected with each other, cabling is expensive. Bulk wiring is essential. Example of Mesh Topology
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
ALOHA, FabFi networking systems are the example of Mesh Topology. The wireless connection between mobile, computers. laptops can be said an example of mesh topology. e.Tree Topology Tree topology is the topology in which the nodes are connected hierarchically, with all the nodes connected to the topmost node or root node. Hence, it is also known as hierarchical topology. Tree topology has at least three levels of hierarchy. Tree topology is applied in Wide Area Network. It is an extension of Bus topology and Star topology. It is best if the workstations are located in groups, for easy working and managing. Figure 8 Tree Topology Benefits of Tree Topology It is easy to expand the network with more nodes. It is easy to maintain and manage. It is easy to detect an error in the network. Drawbacks of Tree Topology It is profoundly cabled. It is expensive when compared to other topologies. If the root node collapses, the network will also collapse.
Example of TREE Topology Corporate Network mainly based on the TREE Topology which helps to maintain the management system f.Hybrid Topology Hybrid Topology is basically a network topology consisting of two or more different types of topologies. It is a reliable and scalable topology, but simultaneously, it is an expensive one. It receives the merits and demerits of the topologies used to build it. Figure 9 Hybrid Topology Benefits of Hybrid Topology It is easy to troubleshoot and provides simple error-detecting techniques. It is a flexible network topology, making it quite effective. It is scalable since the size can be made greater easily. Drawbacks of Hybrid Topology It isn't very easy to design it. It is expensive, as it involves more than one topologies. Example of Hybrid Topology Our great INTERNET is an example of a hybrid topology. 6.Network communication
Acommunicationnetworkisasetofmethodsthatusersusetotransmitvaluableinformation.A communication network is the sum total of all the means and methods that an organization uses to communicate. Networking is an art and a science - and it gets much easier with practice. I've been online since I was a kid and I'm still learning what works and doesn't work. (Yes, I like to think my network has grown some sophistication since third grade.) While I can't guarantee anything, I've discovered that the following rules hold true all the time. a)Network Rules 1. ONLY GO TO GET: It is important to clearly define what you intend to contribute to others, through building a lasting relationship. People and companies are willing to open their doors to those who earn their trust. 2. ADD VALUE: This point is the match, because all the network is based on genuine interest on your part to link and other side to establish links. Always start by asking what the other person needs, and don't worry about selling or getting something before you show your worth. 3. DETERMINATION OF THE PARTY'S DIFFERENCE: As you can observe, you need to connect internally with your meaning and goals first so as not to guide your force in network building. Knowing people means caring about them and helping them achieve their goals: this tactic is practically non- reusable so that later on they will notice you and even help or advise you. friend. 4. SECTION: Not everyone will be the target audience, as we call it in communication. Leverage your difference to connect with people who know how to appreciate it. And no two networks are the same: you need to design different strategies for each. For example, interact with the manager of a company, not with members of the board of directors of a professional association, or with a headhunter. 5. GET INNOVATIONS: At this point, I want to emphasize: if you don't transfer, nothing will happen. It's about creating a living web, in permanent change. My recommendation is that you start by creating 5 new contacts per week in person or virtual and another 5 per day via social media, always in a personalized way. All of this in a five-link, and then evaluate the results. 6. RESPECT SPACE: No another bad user; That into that, find a way to enter into yourself naturally. Remember that persistence is not the same as persistence, and that is the quality you must develop in a successful networking. Also train yourself to accept "no" for the answer. 7. SHIPPING: When creating your network, the condition is that your honesty and good opinions are always present, even though others may not treat you the same. For this, establish clear rules; For example, if you want to make a commercial offer, ask first, and of course, you don't want to benefit others or users.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8. AGREE NEED CONSULTANCY: As I updated my previous post, networking is a process that takes time. Once up and running, collaborations are quick and snappy. To promote it, you can learn to develop opportunities to create a sense of need, arouse curiosity, inform, invite, share. 9. TRAINING THE INTEREST OF EXPOSURE INTERESTING INSTITUTE: In the engineering software, all will help you implement the network. You may be work with the map concept to sort of your mind and how to share them with the other people. I also recommend developing different strategies and presentation materials, which should be up-to-date and readily available. The goal is to conquer a space in the big world of your professional network and stand out for your value, solvency and differentiation. 10. SYSTEM ERROR: Human quality is essential, because you can't make the network a bad person. Finding your links is permanent, through the creation of intermediate relationships. Authenticity, as opposed to creating a character out of your profession's role, is a valuable side that can help you forge a lasting relationship. By following these steps, you will be able to establish a quality professional affiliate network that will enhance your skills and quality, and at the same time you will be able to more effectively achieve your goals based on the product. quality products, maintenance and its determination. b)Bandwidth Bandwidth is the capacity of a channel to transmit data. During transmission, information is sent in a binary system, a language that encodes data using only two symbols (usually defined as “1” and “0”, or “on” and “off” ), each symbol is called a bit. The basic unit of this language, the byte, consists of 8 bits. Therefore, the bandwidth determines the number of bytes that can be transferred on the connection. The unit of measurement is bits per second (bps). For example, a 15-second low-definition video, weighing 1 Megabyte, can be downloaded from a web page on your computer in 3-5 minutes if the connection is made via modem (56 kbps) or internet. ISDN (from 64 to 128 kbps ). Instead, the same action will take a few seconds if the connection is broadband, like connecting to fiber (over 1000 Gbps). Network bandwidth is the ability of a network communication link to transfer the maximum amount of data from one point to another over a computer network or Internet connection in a given period of time, usually a second. Bandwidth has the same meaning in terms of capacity and determines data transfer rate. Bandwidth is not a measure of network speed. In fact, the words "bandwidth" and "speed" are often mistakenly used as synonymous. The explanation for this misunderstanding could be partly due to the fact that ISPs use them in advertisements that refer to speed when they mean bandwidth. Indeed, speed refers to the speed at which data can be sent, while the definition of bandwidth is the capacity for that rate.
Why is it so important to calculate network bandwidth requirements before network deployment? Bandwidth can be compared to the volume of water that can flow through a water pipe. If the pipe is larger, water can flow in large quantities through it at once. Bandwidth works in a similar way. So, the more bandwidth a data connection has, the more data it can send and receive at the same time. Consider that in any type of deployment location, there is a bandwidth limit. This means that there is a space constraint for the data to be transferred. Therefore, multiple devices in an area must share the bandwidth. Some devices require more bandwidth than others. Greater bandwidth is absolutely necessary if proper speeds have to be maintained across different devices. III.Discuss the operating principles of networking devices and server types 1.Network devices a.Switches A network switch is a device that operates at the Data Link layer of the OSI model — Layer 2. It receives packets sent by devices connected to its physical ports and sends them back, but only through ports leading to the devices that packets are intended to reach. They can also operate at the network layer - Layer 3 where routing takes place. Switches are a common component of networks based on ethernet, Fiber Channel, Asynchronous Transfer Mode (ATM), and InfiniBand, among others. In general though, most switches today use ethernet. How does a network switch work? When a device is connected to a switch, the switch records its media access control (MAC) address, a code that is injected into the device's network interface card (NIC) attached to an ethernet cable. attached to the switch. The switch uses the MAC address to determine where the attached device's outgoing packets are being sent from and where the packets are sent. So a MAC address can be assigned to a physical device as opposed to a network layer (Layer 3) IP address, which can be dynamically assigned to a device and change time. When one device sends a packet to another, it goes into the switch, and the switch reads its header to determine what to do with it. It matches the destination address or addresses and sends the packet out through the appropriate ports to the destination device. To reduce the risk of collisions between network traffic going to and from a switch and a connected device at the same time, most switches provide duplex functionality where incoming and outgoing packets a device that has access to the full bandwidth of the connected switch. Types of switches
Switches vary in size, depending on how many devices you need to connect in a particular area, as well as the type of network speed/bandwidth required for those devices. In a small or home office, a four- or eight-port switch is usually enough, but for larger deployments you'll often see switches up to 128 ports. The form factor of a smaller switch is one that you can fit on your desktop, but the switch can also fit into a rack for placement in a wire closet or data center or farm. server. Rack-mount switch sizes range from 1U to 4U, but there are also larger sizes available. Switches also vary in the network speeds they provide, ranging from Fast ethernet (10/100 Mbps), Gigabit ethernet (10/100/1000 Mbps), 10 Gigabit (10/100/1000/1000 Mbps) and even 40/100 Gbps speed. Which speed to choose depends on the throughput required for the supported tasks. Switches also differ in their capabilities. Here are three types: Unmanaged Managed Smart or intelligent switches Management features Thecompletelistofnetworkswitchfeaturesandfunctionswillvarydependingontheswitch manufacturer and any additional software provided, but in general, the switch should provide Experts ability: Enable and disable specific ports on the switch. Configure settings for duplex (half or full), as well as bandwidth. Set the quality of service (QoS) level for a specific port. Enable MAC filtering and other access control features. Set up SNMP monitoring of devices, including link health. Configure port mirroring, to monitor network traffic. b.some other popular network devices 1.Access point While a wired or wireless link is technological in an AP, it usually means a wireless device. An AP operates on the second OSI layer, the data link layer, and can either act as a bridge that connects a standard wireless network to wireless devices or as a router that transmits data to another access point. Wireless connectivity points (WAPs) are a device that is used to generate a wireless LAN (WLAN) transmitter and receiver. Access points are usually networked separate machines with an integrated antenna, transmitter, and adapter. 2.Router
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Routers allow packets to be transmitted to their destination by monitoring a sea of network devices that are interconnected with different network topologies. Routers are smart devices and store data on the network they are connected to. Most routers can be configured as a firewall for packet filters and can use ACLs. Routers are also used for LAN to WAN conversion in conjunction with a network control unit/data service unit (CSU/DSU). Such routers are called boundary routers. They act as an external LAN to WAN link and run across your network boundary. Routers interact through the management of destination tables and local connections. A router delivers data on linked systems and sends requests if the destination is unknown. The router is your first line of defense, and only traffic approved by the network administrator needs to be enabled to pass. 3.Hub The hubs link various networking devices. A network also functions as amplification by amplifying signals that deteriorate over cables after long distances. In the network communication system family, a hub is the easiest, as it links LAN components with the same protocols. Digital or analog data can be used with a server as long as its configuration prepares for formatting the incoming data. Hubs do not process or address packets; they only send data packets to all connected devices. We send data packets. Hubs operate on the Open Systems Interconnection (OSI) physical layer. Two types of hubs exist: simple and multiple. There are two types of Hubs: Active Hub Passive Hub Active HUB: Those are hubs that can clean, raise and distribute the signal together with the network with their power supply. It is both a repeater and a cable hub. The total distance between nodes can be increased. Passive HUB: These are hubs that collect cable from active network nodes and electricity. These hubs relay signals to the grid without being cleaned and improved, nor can the distance between nodes be increased. 4.Gateway The transportation and session layers of the OSI model usually work in gateways. There are many guidelines and specifications for different vendors on the transport layer and above; gateways manage these. The connection between networking technologies, such as OSI and Transmission Control Protocol / Internet Protocols, such as TCP / IP, is supported by the gateway. Gateways link, thus, two or more self- contained networks with their own algorithms, protocols, topology, domain name system and policy, and
network administration. Gateways handle all routing functions and more. In fact, an added translation router is a gateway. A protocol converter is called the feature that translates between different network technologies. 5.Modem Digital signals are transmitted through analog phone lines using modems (modulator demodulators). The modem converts digital signals into analog signals of various frequencies and transmits them to a modem at the receiver location. The receiving modem turns the other way and provides a digital output to a device, normally a computer, connected to a modem. In most cases, digital data is transmitted via the RS- 232 standard interface to or from a serial line modem. Most cable operators use modems as final terminals to locate and remember their homes and personal clients, and many phone companies provide DSL services. All physical and data link layers are operating on modems. 6.Brouter A bridging router is also known as a device that combines both the features of a router and a bridge. It can be used on the data connection layer or the network layer. It can route packets through networks like a router, act as a bridge and filter network traffic in the local area. 2.Servers Web server. The web server powers the website you are viewing right now. This type of server focuses on serving web content to clients. Database server. A database server often works in tandem with another type of server. This type of server exists only to store data in groups. eMail server. Email servers usually run on “SMTP” or “Simple Mail Transfer Protocol”. ... Web Proxy Server. A web proxy server can run on one of many protocols, but they all have one thing in common. ... DNS server. DNS servers, or “Domain Name Services” servers, are used to translate domain names to their respective IP addresses. ftp server. An FTP server, or “File Transfer Protocol” server, has a single purpose: to host file exchanges between users. File server. A file server is different from an FTP server. This type of server is more modern and usually has the ability to "map" networked files to the drive. DHCPserver.TheDHCPserverusesDynamicHostCommunicationProtocol(DHCP)to configure the client computer's network settings. IV.Discusstheinter-dependenceofworkstationhardwarewithrelevant networking software.
A network is formed, when more than one computer is connected among each other, for the purpose of communication among them. There are servers also present in a network, which provides many data storage places. Servers in order to manage so many computers need an operating system. When a request is received from computer, over the internet to the server, there are some scheduling algorithms, which determines what or resource is to be given to which request. In this way a software interacts, with the workstation hardware. A work station is a computer designed for individual use that is more capable than a personal computer. As they are PCs, they can be used independently of the mainframe assuming that they have their own apps installed and their own hard disk storage. Network interface card is a computer hardware part that allows computers to be clubbed together in a network usually a local area network. An example of communication between a server and a client: that is the model in the net shop. The server can access data from the workstation, the server can adjust the functions or turn off the workstation. and vice versa, the client can request data from the server. Figure 10 the model in the net shop
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References (n.d.). Retrieved from https://www.ionos.com/digitalguide/server/know-how/what-is-a-network/ (n.d.). Retrieved from https://techdifferences.com/difference-between-physical-and-logical-topology.html (n.d.). Retrieved from https://www.etechnog.com/2019/06/network-topology-types- examples.html#:~:text=1%20Bus%20Topology%202%20Ring%20Topology%203%20Star,device s%20are%20connected%20to%20a%20single%20Backbone%20Cable. (n.d.). Retrieved from https://www.tanaza.com/tanazaclassic/blog/how-to-calculate-network-bandwidth- requirements/#:~:text=Network%20bandwidth%20is%20an%20essential%20factor%20in%20the, calculate%20WiFi%20bandwidth%20needs%20when%20designing%20the%20network%3F (n.d.). Retrieved from https://www.cleverism.com/lexicon/bandwidth/ (n.d.). Retrieved from https://www.networkworld.com/article/3584876/what-is-a-network-switch-and- how-does-it-work.html (n.d.). Retrieved from https://www.educba.com/types-of-network-devices/