Unit 2 : Networking Infrastructure - Assignment
VerifiedAdded on 2021/06/30
|26
|8992
|888
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
ASSIGNMENT 1 FRONT SHEET
Qualification BTEC Level 5 HND Diploma in Computing
Unit number and title Unit 2: Networking Infrastructure
Submission date Date Received 1st submission
Re-submission Date Date Received 2nd submission
Student Name Đoàn Nhật Quang Student ID GCD18518
Class GCD0901 Assessor name Đặng Quan
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plag
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 M1 M2 D1
Qualification BTEC Level 5 HND Diploma in Computing
Unit number and title Unit 2: Networking Infrastructure
Submission date Date Received 1st submission
Re-submission Date Date Received 2nd submission
Student Name Đoàn Nhật Quang Student ID GCD18518
Class GCD0901 Assessor name Đặng Quan
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plag
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 M1 M2 D1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
❒ Summative Feedback: ❒ Resubmission Feedback:
Grade: Assessor Signature: Date:
Lecturer Signature:
Grade: Assessor Signature: Date:
Lecturer Signature:
Contents
I. Discuss the benefits and constraints of different network types and standards ............................................ 3
1. Network ............................................................................................................................................................ 3
2. Network types .................................................................................................................................................. 3
3. Network protocol ............................................................................................................................................. 5
4. International standard organizations ............................................................................................................ 8
II. Explain the impact of network topology, communication and bandwidth requirements. ........................ 9
1. Network topology............................................................................................................................................. 9
2. Physical topology ........................................................................................................................................... 10
3. Logical topology ............................................................................................................................................. 10
4. The difference between physical topology and logical topology ................................................................ 10
5. Examples of popular topologies ................................................................................................................... 11
6. Network communication ............................................................................................................................... 17
III. Discuss the operating principles of networking devices and server types ................................................ 20
1. Network devices ............................................................................................................................................. 20
2. Servers ............................................................................................................................................................ 23
IV. Discuss the inter-dependence of workstation hardware with relevant networking software. ................ 23
References ................................................................................................................................................................... 25
Figures
Figure 1 Working model of LAN .................................................................................................................................. 3
Figure 2 Network connection MAN .............................................................................................................................. 4
Figure 3 WAN connection............................................................................................................................................. 5
Figure 4 Bus Topology ................................................................................................................................................ 11
Figure 5 Ring Topology .............................................................................................................................................. 13
Figure 6 Star Topology ................................................................................................................................................ 14
Figure 7 Mesh Topology ............................................................................................................................................. 15
Figure 8 Tree Topology .............................................................................................................................................. 16
Figure 9 Hybrid Topology ........................................................................................................................................... 17
Figure 10 the model in the net shop ............................................................................................................................ 24
I. Discuss the benefits and constraints of different network types and standards ............................................ 3
1. Network ............................................................................................................................................................ 3
2. Network types .................................................................................................................................................. 3
3. Network protocol ............................................................................................................................................. 5
4. International standard organizations ............................................................................................................ 8
II. Explain the impact of network topology, communication and bandwidth requirements. ........................ 9
1. Network topology............................................................................................................................................. 9
2. Physical topology ........................................................................................................................................... 10
3. Logical topology ............................................................................................................................................. 10
4. The difference between physical topology and logical topology ................................................................ 10
5. Examples of popular topologies ................................................................................................................... 11
6. Network communication ............................................................................................................................... 17
III. Discuss the operating principles of networking devices and server types ................................................ 20
1. Network devices ............................................................................................................................................. 20
2. Servers ............................................................................................................................................................ 23
IV. Discuss the inter-dependence of workstation hardware with relevant networking software. ................ 23
References ................................................................................................................................................................... 25
Figures
Figure 1 Working model of LAN .................................................................................................................................. 3
Figure 2 Network connection MAN .............................................................................................................................. 4
Figure 3 WAN connection............................................................................................................................................. 5
Figure 4 Bus Topology ................................................................................................................................................ 11
Figure 5 Ring Topology .............................................................................................................................................. 13
Figure 6 Star Topology ................................................................................................................................................ 14
Figure 7 Mesh Topology ............................................................................................................................................. 15
Figure 8 Tree Topology .............................................................................................................................................. 16
Figure 9 Hybrid Topology ........................................................................................................................................... 17
Figure 10 the model in the net shop ............................................................................................................................ 24
I. Discuss the benefits and constraints of different network types and
standards
1. Network
In information technology, a network is defined as the connection of at least two computer systems, either
by cable or wireless connection. The simplest network is a combination of two computers connected by
cable. This type of network is called a peer-to-peer network. There is no hierarchy in this network; both
participants have the same privileges. Each computer has access to the other's data and can share resources
like disk space, applications, or peripherals (printers, etc.).
Networks today tend to be a bit more complex and consist of more than just two computers. Systems with
more than ten participants typically use a client-server network. In these networks, a central computer
(server) provides resources to other participants in the network (client).
2. Network types
a. Local Area Network (LAN)
Definition
LAN (Local Area Network), also known as a local area network, is used in a limited area with high
transmission speed.
Figure 1 Working model of LAN
standards
1. Network
In information technology, a network is defined as the connection of at least two computer systems, either
by cable or wireless connection. The simplest network is a combination of two computers connected by
cable. This type of network is called a peer-to-peer network. There is no hierarchy in this network; both
participants have the same privileges. Each computer has access to the other's data and can share resources
like disk space, applications, or peripherals (printers, etc.).
Networks today tend to be a bit more complex and consist of more than just two computers. Systems with
more than ten participants typically use a client-server network. In these networks, a central computer
(server) provides resources to other participants in the network (client).
2. Network types
a. Local Area Network (LAN)
Definition
LAN (Local Area Network), also known as a local area network, is used in a limited area with high
transmission speed.
Figure 1 Working model of LAN
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Devices using LAN can share resources with each other, typically sharing files, printers, ... and some other
devices.
Advantages
High transmission speed, support to connect many devices quickly. Although limited in connection range,
it costs less, uses less wires, and is easy to administer.
b. Metropolitan Area Network(MAN)
Definition
MAN (Metropolitan Area Network), also known as urban network, links from many LANs via cables,
other transmission means. The ability to connect in a large range such as in a town or city , the provincial.
The MAN network model is often used mainly for organizations and businesses with many branches and
departments connected to each other.
Figure 2 Network connection MAN
Man network is often used for businesses because this model provides many types of services such as
connecting lines via voice (voice), data (data), video (image), deploying applications easily. .
Advantages
The large connection range makes interaction between business parts easy, efficient, low cost, stable
transmission speed, information security, simple management.
c. Wide Area Network(WAN)
devices.
Advantages
High transmission speed, support to connect many devices quickly. Although limited in connection range,
it costs less, uses less wires, and is easy to administer.
b. Metropolitan Area Network(MAN)
Definition
MAN (Metropolitan Area Network), also known as urban network, links from many LANs via cables,
other transmission means. The ability to connect in a large range such as in a town or city , the provincial.
The MAN network model is often used mainly for organizations and businesses with many branches and
departments connected to each other.
Figure 2 Network connection MAN
Man network is often used for businesses because this model provides many types of services such as
connecting lines via voice (voice), data (data), video (image), deploying applications easily. .
Advantages
The large connection range makes interaction between business parts easy, efficient, low cost, stable
transmission speed, information security, simple management.
c. Wide Area Network(WAN)
Definition
WAN (Wide Area Network), also known as wide area network, is a combination of urban networks
including MAN and LAN through satellite equipment, optical cables, and power cables.
Figure 3 WAN connection
Wide area network was created to connect on a large scale across the country. The protocol used in the
WAN is TCP/IP, the bandwidth varies depending on the installation location.
Advantages
Large connectivity, no signal limitation, easy information sharing, data storage. Relative transmission
speed varies by region or transmission device.
3. Network protocol
A network protocol is a set of established rules that define how data is transmitted between different
devices in the same network. It basically allows connected devices to communicate with each other,
regardless of any differences in their internal processes, structures or designs. Network protocols are the
reason you can easily communicate with people around the world and therefore play a vital role in modern
digital communication.
WAN (Wide Area Network), also known as wide area network, is a combination of urban networks
including MAN and LAN through satellite equipment, optical cables, and power cables.
Figure 3 WAN connection
Wide area network was created to connect on a large scale across the country. The protocol used in the
WAN is TCP/IP, the bandwidth varies depending on the installation location.
Advantages
Large connectivity, no signal limitation, easy information sharing, data storage. Relative transmission
speed varies by region or transmission device.
3. Network protocol
A network protocol is a set of established rules that define how data is transmitted between different
devices in the same network. It basically allows connected devices to communicate with each other,
regardless of any differences in their internal processes, structures or designs. Network protocols are the
reason you can easily communicate with people around the world and therefore play a vital role in modern
digital communication.
Similar to how speaking the same language simplifies communication between two people, network
protocols make it possible for devices to interact with each other due to predefined rules built into the
device's software and hardware suffer. Neither a local area network (LAN) nor a wide area network
(WAN) could function as it does today without the use of network protocols.
a. List common protocol
1. Internet Protocol: IP works similarly to a postal service. When users send and receive data from their
devices, the data is concatenated into packets, like messages with two IP addresses: one for the sender and
one for the recipient. After the packet leaves the sender, it goes to a port, like a post office, directing it in
the appropriate direction. Packets continue to move through the ports until they reach their destination.
IP is often paired with TCP to form TCP/IP, the overall set of internet protocols. Together, IP sends
packets to their destination and TCP arranges the packets in the correct order, as IP sometimes sends
packets out of order to ensure packets go the fastest way.
2. Transmission control protocol: TCP is the other half of TCP/IP and puts packets in order so that IP can
deliver them. specifically, TCP numbers individual packets because IP can send packets to their
destination through different routes and make them out of order, so TCP modifies this before IP delivers
packets .
TCP also detects errors during sending - including the lack of any packets based on TCP's numbering
system - and asks IP to retransmit those packets before IP delivers the data to its destination. Through this
process, the TCP/IP suite controls the communication on the internet
3. File Transfer Protocol: FTP is a client-server protocol, with which a client requests a file and the server
supplies it. FTP runs over TCP/IP -- a suite of communications protocols -- and requires a command
channel and a data channel to communicate and exchange files, respectively. Clients request files through
the command channel and receive access to download, edit and copy the file, among other actions,
through the data channel.
FTP has grown less popular as most systems began to use HTTP for file sharing. However, FTP is a
common network protocol for more private file sharing, such as in banking.
4. Hypertext Transfer Protocol: Like FTP, HTTP is a file sharing protocol that runs over TCP/IP, although
HTTP's superiority works across web browsers and is generally recognizable to most users. When a user
visits a website domain and wants to access that domain, HTTP provides access. HTTP connects to the
domain's server and requests the web page's HTML, which is the code that structures and displays the
design of the page.
protocols make it possible for devices to interact with each other due to predefined rules built into the
device's software and hardware suffer. Neither a local area network (LAN) nor a wide area network
(WAN) could function as it does today without the use of network protocols.
a. List common protocol
1. Internet Protocol: IP works similarly to a postal service. When users send and receive data from their
devices, the data is concatenated into packets, like messages with two IP addresses: one for the sender and
one for the recipient. After the packet leaves the sender, it goes to a port, like a post office, directing it in
the appropriate direction. Packets continue to move through the ports until they reach their destination.
IP is often paired with TCP to form TCP/IP, the overall set of internet protocols. Together, IP sends
packets to their destination and TCP arranges the packets in the correct order, as IP sometimes sends
packets out of order to ensure packets go the fastest way.
2. Transmission control protocol: TCP is the other half of TCP/IP and puts packets in order so that IP can
deliver them. specifically, TCP numbers individual packets because IP can send packets to their
destination through different routes and make them out of order, so TCP modifies this before IP delivers
packets .
TCP also detects errors during sending - including the lack of any packets based on TCP's numbering
system - and asks IP to retransmit those packets before IP delivers the data to its destination. Through this
process, the TCP/IP suite controls the communication on the internet
3. File Transfer Protocol: FTP is a client-server protocol, with which a client requests a file and the server
supplies it. FTP runs over TCP/IP -- a suite of communications protocols -- and requires a command
channel and a data channel to communicate and exchange files, respectively. Clients request files through
the command channel and receive access to download, edit and copy the file, among other actions,
through the data channel.
FTP has grown less popular as most systems began to use HTTP for file sharing. However, FTP is a
common network protocol for more private file sharing, such as in banking.
4. Hypertext Transfer Protocol: Like FTP, HTTP is a file sharing protocol that runs over TCP/IP, although
HTTP's superiority works across web browsers and is generally recognizable to most users. When a user
visits a website domain and wants to access that domain, HTTP provides access. HTTP connects to the
domain's server and requests the web page's HTML, which is the code that structures and displays the
design of the page.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Another form of HTTP is HTTPS, which stands for HTTP over Secure Sockets Layer or HTTP Secure.
HTTPS can encrypt user web pages and HTTP requests. This provides greater security for users and can
prevent common cybersecurity threats, such as man-in-the-middle attacks.
5. Domain name system: DNS is a database that includes a website's domain name, which people use to
access the website, and its corresponding IP addresses, which devices use to locate the website. DNS
translates the domain name into IP addresses, and these translations are included within the DNS. Servers
can cache DNS data, which is required to access the websites. DNS also includes the DNS protocol, which
is within the IP suite and details the specifications DNS uses to translate and communicate.
DNS is important because it can quickly provide users with information, as well as access to remote hosts
and resources across the internet.
6. Dynamic Host Configuration Protocol: DHCP assigns IP addresses to network endpoints so they can
communicate with other network endpoints over IP. Whenever a device joins a network with a DHCP
server for the first time, DHCP automatically assigns it a new IP address and continues to do so each time
a device moves locations on the network.
When a device connects to a network, a DHCP handshake takes place, where the device and DHCP server
communicate. The device establishes a connection; the server receives it and provides available IP
addresses; the device requests an IP address; and the server confirm it to complete the process
7. Simple mail transfer protocol: SMTP is the most common email protocol that is part of the TCP/IP suite
and controls how an email client sends a user's email messages. The email server uses SMTP to send
email messages from the client to the email server to the receiving email server. However, SMTP doesn't
control how the email client receives mail - just how the client sends it.
That said, SMTP requires other protocols to ensure email is sent and received properly. SMTP can work
with Post Office Protocol 3 or Internet Mail Access Protocol, which controls how email servers receive
email messages.
8. User Datagram Protocol: UDP is an alternative to TCP and also works with IP to transmit time-sensitive
data. UDP enables low-latency data transmissions between internet applications, so this protocol is ideal
for voice over IP or other audio and video requirements. Unlike TCP, UDP doesn't wait for all packets to
arrive or organize the packets. Instead, UDP transmits all packets even if some haven't arrived.
UDP only transmits packets, while TCP transmits, organizes and ensures the packets arrive. While UDP
works more quickly than TCP, it's also less reliable.
9. OSPF Routing Protocol: OSPF works with IP in sending packets to their destination. IP aims to send
packets over the road as quickly as possible, which OSPF is designed to do. OSPF opens the shortest or
HTTPS can encrypt user web pages and HTTP requests. This provides greater security for users and can
prevent common cybersecurity threats, such as man-in-the-middle attacks.
5. Domain name system: DNS is a database that includes a website's domain name, which people use to
access the website, and its corresponding IP addresses, which devices use to locate the website. DNS
translates the domain name into IP addresses, and these translations are included within the DNS. Servers
can cache DNS data, which is required to access the websites. DNS also includes the DNS protocol, which
is within the IP suite and details the specifications DNS uses to translate and communicate.
DNS is important because it can quickly provide users with information, as well as access to remote hosts
and resources across the internet.
6. Dynamic Host Configuration Protocol: DHCP assigns IP addresses to network endpoints so they can
communicate with other network endpoints over IP. Whenever a device joins a network with a DHCP
server for the first time, DHCP automatically assigns it a new IP address and continues to do so each time
a device moves locations on the network.
When a device connects to a network, a DHCP handshake takes place, where the device and DHCP server
communicate. The device establishes a connection; the server receives it and provides available IP
addresses; the device requests an IP address; and the server confirm it to complete the process
7. Simple mail transfer protocol: SMTP is the most common email protocol that is part of the TCP/IP suite
and controls how an email client sends a user's email messages. The email server uses SMTP to send
email messages from the client to the email server to the receiving email server. However, SMTP doesn't
control how the email client receives mail - just how the client sends it.
That said, SMTP requires other protocols to ensure email is sent and received properly. SMTP can work
with Post Office Protocol 3 or Internet Mail Access Protocol, which controls how email servers receive
email messages.
8. User Datagram Protocol: UDP is an alternative to TCP and also works with IP to transmit time-sensitive
data. UDP enables low-latency data transmissions between internet applications, so this protocol is ideal
for voice over IP or other audio and video requirements. Unlike TCP, UDP doesn't wait for all packets to
arrive or organize the packets. Instead, UDP transmits all packets even if some haven't arrived.
UDP only transmits packets, while TCP transmits, organizes and ensures the packets arrive. While UDP
works more quickly than TCP, it's also less reliable.
9. OSPF Routing Protocol: OSPF works with IP in sending packets to their destination. IP aims to send
packets over the road as quickly as possible, which OSPF is designed to do. OSPF opens the shortest or
fastest path first for packets. It also updates the routing tables - a set of rules that control where packets
travel - and alerts routers about changes to the routing table or the network when a change occurs.
OSPF is similar to and supports the Routing Information Protocol - which directs traffic based on the
number of hops it has to make on a route - and it has also replaced RIP in many networks. OSPF was
developed as a more affordable and scalable alternative to RIP. For example, RIP sends updated routing
tables out every 30 seconds, while OSPF sends updates only when necessary and performs updates for the
specific part of the table where the change occurred.
10. Telnet: Telnet is designed for remote connectivity, and it establishes connections between a remote
endpoint and a host machine to enable a remote session. Telnet prompts the user at the remote endpoint to
log on and, once authenticated, gives the endpoint access to network resources and data at the host
computer.
Telnet has existed since the 1960s and was arguably the first draft of the modern internet. However, Telnet
lacks sophisticated security protections required for modern communications and technology, so it isn't
commonly used anymore.
4. International standard organizations
Some international standards organizations:
IEC - International Electrotechnical Commission
IEEE - Institute of Electric and Electronic Engineers
IETF - Internet Engineering Task Force
ISO - International Organization for Standardization
ITU - The International Telecommunication Union
ITU-R - ITU Radiocommunications Sector (CCIR)
ITU-T - ITU Telecommunications Sector (CCITT)
IUPAC - International Union of Pure and Applied Chemistry
OASIS - Organization for the Advancement of Structured Information Standards
SI - Systéme International d'Unit's (International System of Units)
W3C - World Wide Web Consortium
Accellera - Accellera Organization
The names of the standards used in networking:
International Organization for Standardization (ISO): Probably the largest standards organization
in the world, ISO is actually a confederation of standards organizations from dozens of countries.
In the networking world, ISO is best known for its OSI Reference Model.
travel - and alerts routers about changes to the routing table or the network when a change occurs.
OSPF is similar to and supports the Routing Information Protocol - which directs traffic based on the
number of hops it has to make on a route - and it has also replaced RIP in many networks. OSPF was
developed as a more affordable and scalable alternative to RIP. For example, RIP sends updated routing
tables out every 30 seconds, while OSPF sends updates only when necessary and performs updates for the
specific part of the table where the change occurred.
10. Telnet: Telnet is designed for remote connectivity, and it establishes connections between a remote
endpoint and a host machine to enable a remote session. Telnet prompts the user at the remote endpoint to
log on and, once authenticated, gives the endpoint access to network resources and data at the host
computer.
Telnet has existed since the 1960s and was arguably the first draft of the modern internet. However, Telnet
lacks sophisticated security protections required for modern communications and technology, so it isn't
commonly used anymore.
4. International standard organizations
Some international standards organizations:
IEC - International Electrotechnical Commission
IEEE - Institute of Electric and Electronic Engineers
IETF - Internet Engineering Task Force
ISO - International Organization for Standardization
ITU - The International Telecommunication Union
ITU-R - ITU Radiocommunications Sector (CCIR)
ITU-T - ITU Telecommunications Sector (CCITT)
IUPAC - International Union of Pure and Applied Chemistry
OASIS - Organization for the Advancement of Structured Information Standards
SI - Systéme International d'Unit's (International System of Units)
W3C - World Wide Web Consortium
Accellera - Accellera Organization
The names of the standards used in networking:
International Organization for Standardization (ISO): Probably the largest standards organization
in the world, ISO is actually a confederation of standards organizations from dozens of countries.
In the networking world, ISO is best known for its OSI Reference Model.
American National Standards Institute (ANSI): ANSI is the primary organization responsible for
coordinating and publishing computer and information technology standards in the United States.
While they are often thought of as developing and maintaining standards, they are not. Instead,
they oversee and accredit the organizations that actually create the standards, referring to them as
the Standards Development Organization or SDO. ANSI also publishes standards documents
created by SDOs and serves as the US representative for ISO.
Information Technology Industry Council (ITIC): ITIC is a group of several dozen companies in
the information technology (computer) industry. ITIC is an ANSI approved SDO for developing
and handling standards related to a variety of computer-related topics. It was formerly known as
the Computer and Business Equipment Manufacturers Association (CBEMA).
National Committee on Information Technology (NCITS): A committee established by ITIC to
develop and maintain standards relevant to the world of information technology. NCITS was
formerly known as the X3 Accredited Standards Committee, Information Technology, or more
commonly, just X3. It maintains several subcommittees that develop and maintain standards for
various technical topics.
The Institute of Electrical and Electronics Engineers (IEEE): IEEE (pronounced “eye-triple-ee”) is
a well-known professional organization for people working in the electrical or electronic field,
including computers. computer and network. IEEE's main claim to fame in the networking industry
is the IEEE 802 Project, which covers many popular networking technologies including Ethernet.
Electronics Industry Alliance (EIA): EIA is the international industry association best known for
publishing standards for electrical wiring and transmission.
Telecommunication Industry Association (TIA): TIA is the communications sector of the EIA, and
is responsible for developing communications standards. Because communications, wiring, and
transmission lines are all involved, and because the TIA and EIA organizations are also involved,
standards issued by the EIA or TIA are often labeled with the prefixes combining ““ EIA/TIA” or
“TIA/EIA”.
International Telecommunication Union - Telecommunications Standardization Field (ITU-T):
ITU-T is another large international organization that develops standards for the
telecommunications industry. ITU-T was formerly known as the International Telephone and
Telephone Advisory Committee or CCITT.
European Telecommunications Standards Institute (ETSI): An organization with members from
dozens of countries both inside and outside Europe that develops telecommunications standards for
the European (and elsewhere) market. ETSI is known for regulating the use of radio bandwidth in
Europe and developing standards like HiperLAN.
II. Explain the impact of network topology, communication and bandwidth
requirements.
1. Network topology
coordinating and publishing computer and information technology standards in the United States.
While they are often thought of as developing and maintaining standards, they are not. Instead,
they oversee and accredit the organizations that actually create the standards, referring to them as
the Standards Development Organization or SDO. ANSI also publishes standards documents
created by SDOs and serves as the US representative for ISO.
Information Technology Industry Council (ITIC): ITIC is a group of several dozen companies in
the information technology (computer) industry. ITIC is an ANSI approved SDO for developing
and handling standards related to a variety of computer-related topics. It was formerly known as
the Computer and Business Equipment Manufacturers Association (CBEMA).
National Committee on Information Technology (NCITS): A committee established by ITIC to
develop and maintain standards relevant to the world of information technology. NCITS was
formerly known as the X3 Accredited Standards Committee, Information Technology, or more
commonly, just X3. It maintains several subcommittees that develop and maintain standards for
various technical topics.
The Institute of Electrical and Electronics Engineers (IEEE): IEEE (pronounced “eye-triple-ee”) is
a well-known professional organization for people working in the electrical or electronic field,
including computers. computer and network. IEEE's main claim to fame in the networking industry
is the IEEE 802 Project, which covers many popular networking technologies including Ethernet.
Electronics Industry Alliance (EIA): EIA is the international industry association best known for
publishing standards for electrical wiring and transmission.
Telecommunication Industry Association (TIA): TIA is the communications sector of the EIA, and
is responsible for developing communications standards. Because communications, wiring, and
transmission lines are all involved, and because the TIA and EIA organizations are also involved,
standards issued by the EIA or TIA are often labeled with the prefixes combining ““ EIA/TIA” or
“TIA/EIA”.
International Telecommunication Union - Telecommunications Standardization Field (ITU-T):
ITU-T is another large international organization that develops standards for the
telecommunications industry. ITU-T was formerly known as the International Telephone and
Telephone Advisory Committee or CCITT.
European Telecommunications Standards Institute (ETSI): An organization with members from
dozens of countries both inside and outside Europe that develops telecommunications standards for
the European (and elsewhere) market. ETSI is known for regulating the use of radio bandwidth in
Europe and developing standards like HiperLAN.
II. Explain the impact of network topology, communication and bandwidth
requirements.
1. Network topology
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Network topology is used to describe the physical and logical structure of a network. It maps the way
different nodes on a network--including switches and routers--are placed and connected, as well as how
data flows. Diagramming the locations of endpoints and service requirements helps determine the best
placement for each node to optimize traffic flows.
2. Physical topology
Physical topology can be considered as a layout of the network media that shows the interconnections of
the devices on the network. It specifies which geometric shape the linked devices form with each other.
The physical topology does not give much comprehensive detail about the type of devices, the mechanism
used for interacting with other devices in the network, and how data is transferred from one device to
another.
Therefore, it gives essential details of the network and network devices broadly, neglecting the higher
level details like device type, addressing schemes, connectivity, and so on.
The factors that affect communication of devices on a network based on the physical topology selected
are:
CostScalability
Bandwidth capacity
Ease of installation
Ease of troubleshooting
3. Logical topology
Unlike the physical topology, the logical topology emphasizes the manner in which data is transmitted
between network nodes rather than the physical layout of the path the data follows. An important fact
regarding these topologies is that both the physical and logical topologies are independent of a network,
no matter what shape and size it may be.
Such a logical topology is a signal path that traverses a physical topology. It handles -
Line discipline
Delivery frame according to order
Error message
Optimal flow control.
4. The difference between physical topology and logical topology
Key difference between physical and logical topology
different nodes on a network--including switches and routers--are placed and connected, as well as how
data flows. Diagramming the locations of endpoints and service requirements helps determine the best
placement for each node to optimize traffic flows.
2. Physical topology
Physical topology can be considered as a layout of the network media that shows the interconnections of
the devices on the network. It specifies which geometric shape the linked devices form with each other.
The physical topology does not give much comprehensive detail about the type of devices, the mechanism
used for interacting with other devices in the network, and how data is transferred from one device to
another.
Therefore, it gives essential details of the network and network devices broadly, neglecting the higher
level details like device type, addressing schemes, connectivity, and so on.
The factors that affect communication of devices on a network based on the physical topology selected
are:
CostScalability
Bandwidth capacity
Ease of installation
Ease of troubleshooting
3. Logical topology
Unlike the physical topology, the logical topology emphasizes the manner in which data is transmitted
between network nodes rather than the physical layout of the path the data follows. An important fact
regarding these topologies is that both the physical and logical topologies are independent of a network,
no matter what shape and size it may be.
Such a logical topology is a signal path that traverses a physical topology. It handles -
Line discipline
Delivery frame according to order
Error message
Optimal flow control.
4. The difference between physical topology and logical topology
Key difference between physical and logical topology
The physical topology is basically the physical layout of the network media. In contrast, logical
topology refers to how, how data is transmitted throughout the network.
The physical topology will not impede the transfer of data from one device to the other according
to the logical topology.
Logical topology is invisible in nature while physical topology can be customized.
5. Examples of popular topologies
a. Bus Topology
A bus topology is a type of network topology where every node, i.e. every device on the network, is
connected to an individual main cable. Data is transmitted along a single route, from one point to another.
We cannot transmit data either way. When this topology has exactly two endpoints, it is called a Linear
Bus Topology. It is mainly used for small networks.
Figure 4 Bus Topology
Benefits of bus topology:
It is cost effective.
The required cable length is the least compared to other topologies.
topology refers to how, how data is transmitted throughout the network.
The physical topology will not impede the transfer of data from one device to the other according
to the logical topology.
Logical topology is invisible in nature while physical topology can be customized.
5. Examples of popular topologies
a. Bus Topology
A bus topology is a type of network topology where every node, i.e. every device on the network, is
connected to an individual main cable. Data is transmitted along a single route, from one point to another.
We cannot transmit data either way. When this topology has exactly two endpoints, it is called a Linear
Bus Topology. It is mainly used for small networks.
Figure 4 Bus Topology
Benefits of bus topology:
It is cost effective.
The required cable length is the least compared to other topologies.
The operation of this topology is easy to understand.
Expansion can be easily done by linking the cables together.
Drawbacks of bus topology
If the main cable goes down, the network is completely down.
Network performance is threatened and reduced if there are many nodes and large network traffic.
The main cable can only be that long. Cable length is limited.
Bus topology is not as fast as ring topology.
Example of Bus Topology
The 10BASE-2 network is an example of bus topology which is used in earlier days. Nowadays the bus
topology is not used.
b. Ring topology
A ring topology is a type of topology where each computer is connected to another computer on each side.
The last computer is connected to the first, thus forming a ring. This topology allows each computer to
have exactly two neighboring computers.
In this topology, the main computer is called a monitoring station, which is responsible for all operations.
The transmission of data between devices is done with the help of tokens. To transmit data, the computer
station must hold the token. Tokens are issued only when the transmission is complete, then other
computer stations can use the token to transmit data.
The data transmission is done by the sequential method, i.e. bit by bit. Therefore, the data must route its
way through each node in the network to reach the destination node. We use repeaters in Ring topology to
avoid data loss during transmission. These repeaters are especially useful when the topology has a large
number of nodes and the data will reach the last node in the network.
Data transmission is one-way in the Ring topology, but it can be made bidirectional by connecting each
node to a different set of connections. This is called a double ring topology. Here, two ring networks are
created, with data in each traveling in opposite directions.
Expansion can be easily done by linking the cables together.
Drawbacks of bus topology
If the main cable goes down, the network is completely down.
Network performance is threatened and reduced if there are many nodes and large network traffic.
The main cable can only be that long. Cable length is limited.
Bus topology is not as fast as ring topology.
Example of Bus Topology
The 10BASE-2 network is an example of bus topology which is used in earlier days. Nowadays the bus
topology is not used.
b. Ring topology
A ring topology is a type of topology where each computer is connected to another computer on each side.
The last computer is connected to the first, thus forming a ring. This topology allows each computer to
have exactly two neighboring computers.
In this topology, the main computer is called a monitoring station, which is responsible for all operations.
The transmission of data between devices is done with the help of tokens. To transmit data, the computer
station must hold the token. Tokens are issued only when the transmission is complete, then other
computer stations can use the token to transmit data.
The data transmission is done by the sequential method, i.e. bit by bit. Therefore, the data must route its
way through each node in the network to reach the destination node. We use repeaters in Ring topology to
avoid data loss during transmission. These repeaters are especially useful when the topology has a large
number of nodes and the data will reach the last node in the network.
Data transmission is one-way in the Ring topology, but it can be made bidirectional by connecting each
node to a different set of connections. This is called a double ring topology. Here, two ring networks are
created, with data in each traveling in opposite directions.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Figure 5 Ring Topology
Benefits of Ring Topology
The network is not affected by numerous nodes or heavy traffic, as only the nodes possessing
tokens can transfer data.
Ring topology has cheap installation and expansion.
Drawbacks of Ring Topology
It is a tedious task to troubleshoot in Ring topology.
It is difficult to add or delete nodes, as it interrupts the network activity.
If one computer crashes, the entire network activity is disrupted.
Example of Ring Topology
SONET Ring Network is an example of Ring Topology. SONET stands for Synchronous Optical
Network.
c. Star Topology
Star Topology is the kind of network topology in which all the nodes are connected via cables to a single
node called a hub, which is the central node. The hub can be active or passive in nature. Active hubs
Benefits of Ring Topology
The network is not affected by numerous nodes or heavy traffic, as only the nodes possessing
tokens can transfer data.
Ring topology has cheap installation and expansion.
Drawbacks of Ring Topology
It is a tedious task to troubleshoot in Ring topology.
It is difficult to add or delete nodes, as it interrupts the network activity.
If one computer crashes, the entire network activity is disrupted.
Example of Ring Topology
SONET Ring Network is an example of Ring Topology. SONET stands for Synchronous Optical
Network.
c. Star Topology
Star Topology is the kind of network topology in which all the nodes are connected via cables to a single
node called a hub, which is the central node. The hub can be active or passive in nature. Active hubs
contain repeaters, while passive hubs are considered non-intelligent nodes. Each node contains a reserved
connection to the central node, which the central node acting as a repeater during data transmission.
Figure 6 Star Topology
Benefits of Star Topology
Star topology boasts fast performance due to low network traffic.
It is easy to upgrade the Hub as and when required.
Setup can be done easily and can be easily modified as well.
Star Topology is easy to troubleshoot.
In case a node has failed, it can easily be replaced without affecting the working of the rest of the
network.
Drawbacks of Star Topology
The installation cost is extreme, and it is expensive to use.
All the nodes are dependent on the hub.
Example of Star Topology
Star topology is mostly used for LAN(Local Area Network). In a small area, building, home, office, etc
LAN networking with star topology system is used.
d. Mesh Topology
connection to the central node, which the central node acting as a repeater during data transmission.
Figure 6 Star Topology
Benefits of Star Topology
Star topology boasts fast performance due to low network traffic.
It is easy to upgrade the Hub as and when required.
Setup can be done easily and can be easily modified as well.
Star Topology is easy to troubleshoot.
In case a node has failed, it can easily be replaced without affecting the working of the rest of the
network.
Drawbacks of Star Topology
The installation cost is extreme, and it is expensive to use.
All the nodes are dependent on the hub.
Example of Star Topology
Star topology is mostly used for LAN(Local Area Network). In a small area, building, home, office, etc
LAN networking with star topology system is used.
d. Mesh Topology
Mesh topology is the kind of topology in which all the nodes are connected with all the other nodes via a
network channel. Mesh topology is a point-to-point connection. It has n(n-1)/2 network channels to
connect n nodes.
Mesh topology has two techniques for transmission of data, i.e. routing and flooding. In the routing
technique, the nodes possess a routing logic, like the logic for the shortest distance to the destination node
or the logic to avoid routes with broken connections. In the flooding technique, all the network nodes
receive the same data. This leaves us no need for routing logic. This technique makes the network robust
but results in unwanted load on the network.
Figure 7 Mesh Topology
Benefits of Mesh Topology
Every connection has the ability to carry its particular data load.
Mesh Topology is very robust.
It is easy to diagnose faults.
Mesh Topology provides privacy and security.
Drawbacks of Mesh Topology
Mesh Topology is challenging to install and configure.
As all the nodes are connected with each other, cabling is expensive.
Bulk wiring is essential.
Example of Mesh Topology
network channel. Mesh topology is a point-to-point connection. It has n(n-1)/2 network channels to
connect n nodes.
Mesh topology has two techniques for transmission of data, i.e. routing and flooding. In the routing
technique, the nodes possess a routing logic, like the logic for the shortest distance to the destination node
or the logic to avoid routes with broken connections. In the flooding technique, all the network nodes
receive the same data. This leaves us no need for routing logic. This technique makes the network robust
but results in unwanted load on the network.
Figure 7 Mesh Topology
Benefits of Mesh Topology
Every connection has the ability to carry its particular data load.
Mesh Topology is very robust.
It is easy to diagnose faults.
Mesh Topology provides privacy and security.
Drawbacks of Mesh Topology
Mesh Topology is challenging to install and configure.
As all the nodes are connected with each other, cabling is expensive.
Bulk wiring is essential.
Example of Mesh Topology
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
ALOHA, FabFi networking systems are the example of Mesh Topology. The wireless connection between
mobile, computers. laptops can be said an example of mesh topology.
e. Tree Topology
Tree topology is the topology in which the nodes are connected hierarchically, with all the nodes
connected to the topmost node or root node. Hence, it is also known as hierarchical topology. Tree
topology has at least three levels of hierarchy.
Tree topology is applied in Wide Area Network. It is an extension of Bus topology and Star topology. It is
best if the workstations are located in groups, for easy working and managing.
Figure 8 Tree Topology
Benefits of Tree Topology
It is easy to expand the network with more nodes.
It is easy to maintain and manage.
It is easy to detect an error in the network.
Drawbacks of Tree Topology
It is profoundly cabled.
It is expensive when compared to other topologies.
If the root node collapses, the network will also collapse.
mobile, computers. laptops can be said an example of mesh topology.
e. Tree Topology
Tree topology is the topology in which the nodes are connected hierarchically, with all the nodes
connected to the topmost node or root node. Hence, it is also known as hierarchical topology. Tree
topology has at least three levels of hierarchy.
Tree topology is applied in Wide Area Network. It is an extension of Bus topology and Star topology. It is
best if the workstations are located in groups, for easy working and managing.
Figure 8 Tree Topology
Benefits of Tree Topology
It is easy to expand the network with more nodes.
It is easy to maintain and manage.
It is easy to detect an error in the network.
Drawbacks of Tree Topology
It is profoundly cabled.
It is expensive when compared to other topologies.
If the root node collapses, the network will also collapse.
Example of TREE Topology
Corporate Network mainly based on the TREE Topology which helps to maintain the management system
f. Hybrid Topology
Hybrid Topology is basically a network topology consisting of two or more different types of topologies.
It is a reliable and scalable topology, but simultaneously, it is an expensive one. It receives the merits and
demerits of the topologies used to build it.
Figure 9 Hybrid Topology
Benefits of Hybrid Topology
It is easy to troubleshoot and provides simple error-detecting techniques.
It is a flexible network topology, making it quite effective.
It is scalable since the size can be made greater easily.
Drawbacks of Hybrid Topology
It isn't very easy to design it.
It is expensive, as it involves more than one topologies.
Example of Hybrid Topology
Our great INTERNET is an example of a hybrid topology.
6. Network communication
Corporate Network mainly based on the TREE Topology which helps to maintain the management system
f. Hybrid Topology
Hybrid Topology is basically a network topology consisting of two or more different types of topologies.
It is a reliable and scalable topology, but simultaneously, it is an expensive one. It receives the merits and
demerits of the topologies used to build it.
Figure 9 Hybrid Topology
Benefits of Hybrid Topology
It is easy to troubleshoot and provides simple error-detecting techniques.
It is a flexible network topology, making it quite effective.
It is scalable since the size can be made greater easily.
Drawbacks of Hybrid Topology
It isn't very easy to design it.
It is expensive, as it involves more than one topologies.
Example of Hybrid Topology
Our great INTERNET is an example of a hybrid topology.
6. Network communication
Acommunication network is a set of methods that users use to transmit valuable information. A
communication network is the sum total of all the means and methods that an organization uses to
communicate.
Networking is an art and a science - and it gets much easier with practice. I've been online since I was a
kid and I'm still learning what works and doesn't work. (Yes, I like to think my network has grown some
sophistication since third grade.) While I can't guarantee anything, I've discovered that the following rules
hold true all the time.
a) Network Rules
1. ONLY GO TO GET: It is important to clearly define what you intend to contribute to others, through
building a lasting relationship. People and companies are willing to open their doors to those who earn
their trust.
2. ADD VALUE: This point is the match, because all the network is based on genuine interest on your
part to link and other side to establish links. Always start by asking what the other person needs, and don't
worry about selling or getting something before you show your worth.
3. DETERMINATION OF THE PARTY'S DIFFERENCE: As you can observe, you need to connect
internally with your meaning and goals first so as not to guide your force in network building. Knowing
people means caring about them and helping them achieve their goals: this tactic is practically non-
reusable so that later on they will notice you and even help or advise you. friend.
4. SECTION: Not everyone will be the target audience, as we call it in communication. Leverage your
difference to connect with people who know how to appreciate it. And no two networks are the same: you
need to design different strategies for each. For example, interact with the manager of a company, not with
members of the board of directors of a professional association, or with a headhunter.
5. GET INNOVATIONS: At this point, I want to emphasize: if you don't transfer, nothing will happen. It's
about creating a living web, in permanent change. My recommendation is that you start by creating 5 new
contacts per week in person or virtual and another 5 per day via social media, always in a personalized
way. All of this in a five-link, and then evaluate the results.
6. RESPECT SPACE: No another bad user; That into that, find a way to enter into yourself naturally.
Remember that persistence is not the same as persistence, and that is the quality you must develop in a
successful networking. Also train yourself to accept "no" for the answer.
7. SHIPPING: When creating your network, the condition is that your honesty and good opinions are
always present, even though others may not treat you the same. For this, establish clear rules; For
example, if you want to make a commercial offer, ask first, and of course, you don't want to benefit others
or users.
communication network is the sum total of all the means and methods that an organization uses to
communicate.
Networking is an art and a science - and it gets much easier with practice. I've been online since I was a
kid and I'm still learning what works and doesn't work. (Yes, I like to think my network has grown some
sophistication since third grade.) While I can't guarantee anything, I've discovered that the following rules
hold true all the time.
a) Network Rules
1. ONLY GO TO GET: It is important to clearly define what you intend to contribute to others, through
building a lasting relationship. People and companies are willing to open their doors to those who earn
their trust.
2. ADD VALUE: This point is the match, because all the network is based on genuine interest on your
part to link and other side to establish links. Always start by asking what the other person needs, and don't
worry about selling or getting something before you show your worth.
3. DETERMINATION OF THE PARTY'S DIFFERENCE: As you can observe, you need to connect
internally with your meaning and goals first so as not to guide your force in network building. Knowing
people means caring about them and helping them achieve their goals: this tactic is practically non-
reusable so that later on they will notice you and even help or advise you. friend.
4. SECTION: Not everyone will be the target audience, as we call it in communication. Leverage your
difference to connect with people who know how to appreciate it. And no two networks are the same: you
need to design different strategies for each. For example, interact with the manager of a company, not with
members of the board of directors of a professional association, or with a headhunter.
5. GET INNOVATIONS: At this point, I want to emphasize: if you don't transfer, nothing will happen. It's
about creating a living web, in permanent change. My recommendation is that you start by creating 5 new
contacts per week in person or virtual and another 5 per day via social media, always in a personalized
way. All of this in a five-link, and then evaluate the results.
6. RESPECT SPACE: No another bad user; That into that, find a way to enter into yourself naturally.
Remember that persistence is not the same as persistence, and that is the quality you must develop in a
successful networking. Also train yourself to accept "no" for the answer.
7. SHIPPING: When creating your network, the condition is that your honesty and good opinions are
always present, even though others may not treat you the same. For this, establish clear rules; For
example, if you want to make a commercial offer, ask first, and of course, you don't want to benefit others
or users.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8. AGREE NEED CONSULTANCY: As I updated my previous post, networking is a process that takes
time. Once up and running, collaborations are quick and snappy. To promote it, you can learn to develop
opportunities to create a sense of need, arouse curiosity, inform, invite, share.
9. TRAINING THE INTEREST OF EXPOSURE INTERESTING INSTITUTE: In the engineering
software, all will help you implement the network. You may be work with the map concept to sort of your
mind and how to share them with the other people. I also recommend developing different strategies and
presentation materials, which should be up-to-date and readily available. The goal is to conquer a space in
the big world of your professional network and stand out for your value, solvency and differentiation.
10. SYSTEM ERROR: Human quality is essential, because you can't make the network a bad person.
Finding your links is permanent, through the creation of intermediate relationships. Authenticity, as
opposed to creating a character out of your profession's role, is a valuable side that can help you forge a
lasting relationship.
By following these steps, you will be able to establish a quality professional affiliate network that will
enhance your skills and quality, and at the same time you will be able to more effectively achieve your
goals based on the product. quality products, maintenance and its determination.
b) Bandwidth
Bandwidth is the capacity of a channel to transmit data. During transmission, information is sent in a
binary system, a language that encodes data using only two symbols (usually defined as “1” and “0”, or
“on” and “off” ), each symbol is called a bit.
The basic unit of this language, the byte, consists of 8 bits. Therefore, the bandwidth determines the
number of bytes that can be transferred on the connection. The unit of measurement is bits per second
(bps). For example, a 15-second low-definition video, weighing 1 Megabyte, can be downloaded from a
web page on your computer in 3-5 minutes if the connection is made via modem (56 kbps) or internet.
ISDN (from 64 to 128 kbps ). Instead, the same action will take a few seconds if the connection is
broadband, like connecting to fiber (over 1000 Gbps).
Network bandwidth is the ability of a network communication link to transfer the maximum amount of
data from one point to another over a computer network or Internet connection in a given period of time,
usually a second. Bandwidth has the same meaning in terms of capacity and determines data transfer rate.
Bandwidth is not a measure of network speed.
In fact, the words "bandwidth" and "speed" are often mistakenly used as synonymous. The explanation for
this misunderstanding could be partly due to the fact that ISPs use them in advertisements that refer to
speed when they mean bandwidth. Indeed, speed refers to the speed at which data can be sent, while the
definition of bandwidth is the capacity for that rate.
time. Once up and running, collaborations are quick and snappy. To promote it, you can learn to develop
opportunities to create a sense of need, arouse curiosity, inform, invite, share.
9. TRAINING THE INTEREST OF EXPOSURE INTERESTING INSTITUTE: In the engineering
software, all will help you implement the network. You may be work with the map concept to sort of your
mind and how to share them with the other people. I also recommend developing different strategies and
presentation materials, which should be up-to-date and readily available. The goal is to conquer a space in
the big world of your professional network and stand out for your value, solvency and differentiation.
10. SYSTEM ERROR: Human quality is essential, because you can't make the network a bad person.
Finding your links is permanent, through the creation of intermediate relationships. Authenticity, as
opposed to creating a character out of your profession's role, is a valuable side that can help you forge a
lasting relationship.
By following these steps, you will be able to establish a quality professional affiliate network that will
enhance your skills and quality, and at the same time you will be able to more effectively achieve your
goals based on the product. quality products, maintenance and its determination.
b) Bandwidth
Bandwidth is the capacity of a channel to transmit data. During transmission, information is sent in a
binary system, a language that encodes data using only two symbols (usually defined as “1” and “0”, or
“on” and “off” ), each symbol is called a bit.
The basic unit of this language, the byte, consists of 8 bits. Therefore, the bandwidth determines the
number of bytes that can be transferred on the connection. The unit of measurement is bits per second
(bps). For example, a 15-second low-definition video, weighing 1 Megabyte, can be downloaded from a
web page on your computer in 3-5 minutes if the connection is made via modem (56 kbps) or internet.
ISDN (from 64 to 128 kbps ). Instead, the same action will take a few seconds if the connection is
broadband, like connecting to fiber (over 1000 Gbps).
Network bandwidth is the ability of a network communication link to transfer the maximum amount of
data from one point to another over a computer network or Internet connection in a given period of time,
usually a second. Bandwidth has the same meaning in terms of capacity and determines data transfer rate.
Bandwidth is not a measure of network speed.
In fact, the words "bandwidth" and "speed" are often mistakenly used as synonymous. The explanation for
this misunderstanding could be partly due to the fact that ISPs use them in advertisements that refer to
speed when they mean bandwidth. Indeed, speed refers to the speed at which data can be sent, while the
definition of bandwidth is the capacity for that rate.
Why is it so important to calculate network bandwidth requirements before network deployment?
Bandwidth can be compared to the volume of water that can flow through a water pipe. If the pipe is
larger, water can flow in large quantities through it at once. Bandwidth works in a similar way. So, the
more bandwidth a data connection has, the more data it can send and receive at the same time.
Consider that in any type of deployment location, there is a bandwidth limit. This means that there is a
space constraint for the data to be transferred. Therefore, multiple devices in an area must share the
bandwidth. Some devices require more bandwidth than others. Greater bandwidth is absolutely necessary
if proper speeds have to be maintained across different devices.
III. Discuss the operating principles of networking devices and server types
1. Network devices
a. Switches
A network switch is a device that operates at the Data Link layer of the OSI model — Layer 2. It receives
packets sent by devices connected to its physical ports and sends them back, but only through ports
leading to the devices that packets are intended to reach. They can also operate at the network layer -
Layer 3 where routing takes place.
Switches are a common component of networks based on ethernet, Fiber Channel, Asynchronous Transfer
Mode (ATM), and InfiniBand, among others. In general though, most switches today use ethernet.
How does a network switch work?
When a device is connected to a switch, the switch records its media access control (MAC) address, a
code that is injected into the device's network interface card (NIC) attached to an ethernet cable. attached
to the switch. The switch uses the MAC address to determine where the attached device's outgoing packets
are being sent from and where the packets are sent.
So a MAC address can be assigned to a physical device as opposed to a network layer (Layer 3) IP
address, which can be dynamically assigned to a device and change time.
When one device sends a packet to another, it goes into the switch, and the switch reads its header to
determine what to do with it. It matches the destination address or addresses and sends the packet out
through the appropriate ports to the destination device.
To reduce the risk of collisions between network traffic going to and from a switch and a connected device
at the same time, most switches provide duplex functionality where incoming and outgoing packets a
device that has access to the full bandwidth of the connected switch.
Types of switches
Bandwidth can be compared to the volume of water that can flow through a water pipe. If the pipe is
larger, water can flow in large quantities through it at once. Bandwidth works in a similar way. So, the
more bandwidth a data connection has, the more data it can send and receive at the same time.
Consider that in any type of deployment location, there is a bandwidth limit. This means that there is a
space constraint for the data to be transferred. Therefore, multiple devices in an area must share the
bandwidth. Some devices require more bandwidth than others. Greater bandwidth is absolutely necessary
if proper speeds have to be maintained across different devices.
III. Discuss the operating principles of networking devices and server types
1. Network devices
a. Switches
A network switch is a device that operates at the Data Link layer of the OSI model — Layer 2. It receives
packets sent by devices connected to its physical ports and sends them back, but only through ports
leading to the devices that packets are intended to reach. They can also operate at the network layer -
Layer 3 where routing takes place.
Switches are a common component of networks based on ethernet, Fiber Channel, Asynchronous Transfer
Mode (ATM), and InfiniBand, among others. In general though, most switches today use ethernet.
How does a network switch work?
When a device is connected to a switch, the switch records its media access control (MAC) address, a
code that is injected into the device's network interface card (NIC) attached to an ethernet cable. attached
to the switch. The switch uses the MAC address to determine where the attached device's outgoing packets
are being sent from and where the packets are sent.
So a MAC address can be assigned to a physical device as opposed to a network layer (Layer 3) IP
address, which can be dynamically assigned to a device and change time.
When one device sends a packet to another, it goes into the switch, and the switch reads its header to
determine what to do with it. It matches the destination address or addresses and sends the packet out
through the appropriate ports to the destination device.
To reduce the risk of collisions between network traffic going to and from a switch and a connected device
at the same time, most switches provide duplex functionality where incoming and outgoing packets a
device that has access to the full bandwidth of the connected switch.
Types of switches
Switches vary in size, depending on how many devices you need to connect in a particular area, as well as
the type of network speed/bandwidth required for those devices. In a small or home office, a four- or
eight-port switch is usually enough, but for larger deployments you'll often see switches up to 128 ports.
The form factor of a smaller switch is one that you can fit on your desktop, but the switch can also fit into
a rack for placement in a wire closet or data center or farm. server. Rack-mount switch sizes range from
1U to 4U, but there are also larger sizes available.
Switches also vary in the network speeds they provide, ranging from Fast ethernet (10/100 Mbps), Gigabit
ethernet (10/100/1000 Mbps), 10 Gigabit (10/100/1000/1000 Mbps) and even 40/100 Gbps speed. Which
speed to choose depends on the throughput required for the supported tasks.
Switches also differ in their capabilities. Here are three types:
Unmanaged
Managed
Smart or intelligent switches
Management features
The complete list of network switch features and functions will vary depending on the switch
manufacturer and any additional software provided, but in general, the switch should provide Experts
ability:
Enable and disable specific ports on the switch.
Configure settings for duplex (half or full), as well as bandwidth.
Set the quality of service (QoS) level for a specific port.
Enable MAC filtering and other access control features.
Set up SNMP monitoring of devices, including link health.
Configure port mirroring, to monitor network traffic.
b. some other popular network devices
1. Access point
While a wired or wireless link is technological in an AP, it usually means a wireless device. An AP
operates on the second OSI layer, the data link layer, and can either act as a bridge that connects a
standard wireless network to wireless devices or as a router that transmits data to another access point.
Wireless connectivity points (WAPs) are a device that is used to generate a wireless LAN (WLAN)
transmitter and receiver. Access points are usually networked separate machines with an integrated
antenna, transmitter, and adapter.
2. Router
the type of network speed/bandwidth required for those devices. In a small or home office, a four- or
eight-port switch is usually enough, but for larger deployments you'll often see switches up to 128 ports.
The form factor of a smaller switch is one that you can fit on your desktop, but the switch can also fit into
a rack for placement in a wire closet or data center or farm. server. Rack-mount switch sizes range from
1U to 4U, but there are also larger sizes available.
Switches also vary in the network speeds they provide, ranging from Fast ethernet (10/100 Mbps), Gigabit
ethernet (10/100/1000 Mbps), 10 Gigabit (10/100/1000/1000 Mbps) and even 40/100 Gbps speed. Which
speed to choose depends on the throughput required for the supported tasks.
Switches also differ in their capabilities. Here are three types:
Unmanaged
Managed
Smart or intelligent switches
Management features
The complete list of network switch features and functions will vary depending on the switch
manufacturer and any additional software provided, but in general, the switch should provide Experts
ability:
Enable and disable specific ports on the switch.
Configure settings for duplex (half or full), as well as bandwidth.
Set the quality of service (QoS) level for a specific port.
Enable MAC filtering and other access control features.
Set up SNMP monitoring of devices, including link health.
Configure port mirroring, to monitor network traffic.
b. some other popular network devices
1. Access point
While a wired or wireless link is technological in an AP, it usually means a wireless device. An AP
operates on the second OSI layer, the data link layer, and can either act as a bridge that connects a
standard wireless network to wireless devices or as a router that transmits data to another access point.
Wireless connectivity points (WAPs) are a device that is used to generate a wireless LAN (WLAN)
transmitter and receiver. Access points are usually networked separate machines with an integrated
antenna, transmitter, and adapter.
2. Router
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Routers allow packets to be transmitted to their destination by monitoring a sea of network devices that
are interconnected with different network topologies. Routers are smart devices and store data on the
network they are connected to. Most routers can be configured as a firewall for packet filters and can use
ACLs. Routers are also used for LAN to WAN conversion in conjunction with a network control unit/data
service unit (CSU/DSU). Such routers are called boundary routers.
They act as an external LAN to WAN link and run across your network boundary. Routers interact
through the management of destination tables and local connections. A router delivers data on linked
systems and sends requests if the destination is unknown. The router is your first line of defense, and only
traffic approved by the network administrator needs to be enabled to pass.
3. Hub
The hubs link various networking devices. A network also functions as amplification by amplifying
signals that deteriorate over cables after long distances. In the network communication system family, a
hub is the easiest, as it links LAN components with the same protocols. Digital or analog data can be used
with a server as long as its configuration prepares for formatting the incoming data. Hubs do not process
or address packets; they only send data packets to all connected devices. We send data packets. Hubs
operate on the Open Systems Interconnection (OSI) physical layer. Two types of hubs exist: simple and
multiple.
There are two types of Hubs:
Active Hub
Passive Hub
Active HUB: Those are hubs that can clean, raise and distribute the signal together with the network with
their power supply. It is both a repeater and a cable hub. The total distance between nodes can be
increased.
Passive HUB: These are hubs that collect cable from active network nodes and electricity. These hubs
relay signals to the grid without being cleaned and improved, nor can the distance between nodes be
increased.
4. Gateway
The transportation and session layers of the OSI model usually work in gateways. There are many
guidelines and specifications for different vendors on the transport layer and above; gateways manage
these. The connection between networking technologies, such as OSI and Transmission Control Protocol /
Internet Protocols, such as TCP / IP, is supported by the gateway. Gateways link, thus, two or more self-
contained networks with their own algorithms, protocols, topology, domain name system and policy, and
are interconnected with different network topologies. Routers are smart devices and store data on the
network they are connected to. Most routers can be configured as a firewall for packet filters and can use
ACLs. Routers are also used for LAN to WAN conversion in conjunction with a network control unit/data
service unit (CSU/DSU). Such routers are called boundary routers.
They act as an external LAN to WAN link and run across your network boundary. Routers interact
through the management of destination tables and local connections. A router delivers data on linked
systems and sends requests if the destination is unknown. The router is your first line of defense, and only
traffic approved by the network administrator needs to be enabled to pass.
3. Hub
The hubs link various networking devices. A network also functions as amplification by amplifying
signals that deteriorate over cables after long distances. In the network communication system family, a
hub is the easiest, as it links LAN components with the same protocols. Digital or analog data can be used
with a server as long as its configuration prepares for formatting the incoming data. Hubs do not process
or address packets; they only send data packets to all connected devices. We send data packets. Hubs
operate on the Open Systems Interconnection (OSI) physical layer. Two types of hubs exist: simple and
multiple.
There are two types of Hubs:
Active Hub
Passive Hub
Active HUB: Those are hubs that can clean, raise and distribute the signal together with the network with
their power supply. It is both a repeater and a cable hub. The total distance between nodes can be
increased.
Passive HUB: These are hubs that collect cable from active network nodes and electricity. These hubs
relay signals to the grid without being cleaned and improved, nor can the distance between nodes be
increased.
4. Gateway
The transportation and session layers of the OSI model usually work in gateways. There are many
guidelines and specifications for different vendors on the transport layer and above; gateways manage
these. The connection between networking technologies, such as OSI and Transmission Control Protocol /
Internet Protocols, such as TCP / IP, is supported by the gateway. Gateways link, thus, two or more self-
contained networks with their own algorithms, protocols, topology, domain name system and policy, and
network administration. Gateways handle all routing functions and more. In fact, an added translation
router is a gateway. A protocol converter is called the feature that translates between different network
technologies.
5. Modem
Digital signals are transmitted through analog phone lines using modems (modulator demodulators). The
modem converts digital signals into analog signals of various frequencies and transmits them to a modem
at the receiver location. The receiving modem turns the other way and provides a digital output to a
device, normally a computer, connected to a modem. In most cases, digital data is transmitted via the RS-
232 standard interface to or from a serial line modem. Most cable operators use modems as final terminals
to locate and remember their homes and personal clients, and many phone companies provide DSL
services. All physical and data link layers are operating on modems.
6. Brouter
A bridging router is also known as a device that combines both the features of a router and a bridge. It can
be used on the data connection layer or the network layer. It can route packets through networks like a
router, act as a bridge and filter network traffic in the local area.
2. Servers
Web server. The web server powers the website you are viewing right now. This type of server
focuses on serving web content to clients.
Database server. A database server often works in tandem with another type of server. This type of
server exists only to store data in groups.
eMail server. Email servers usually run on “SMTP” or “Simple Mail Transfer Protocol”. ...
Web Proxy Server. A web proxy server can run on one of many protocols, but they all have one
thing in common. ...
DNS server. DNS servers, or “Domain Name Services” servers, are used to translate domain
names to their respective IP addresses.
ftp server. An FTP server, or “File Transfer Protocol” server, has a single purpose: to host file
exchanges between users.
File server. A file server is different from an FTP server. This type of server is more modern and
usually has the ability to "map" networked files to the drive.
DHCP server. The DHCP server uses Dynamic Host Communication Protocol (DHCP) to
configure the client computer's network settings.
IV. Discuss the inter-dependence of workstation hardware with relevant
networking software.
router is a gateway. A protocol converter is called the feature that translates between different network
technologies.
5. Modem
Digital signals are transmitted through analog phone lines using modems (modulator demodulators). The
modem converts digital signals into analog signals of various frequencies and transmits them to a modem
at the receiver location. The receiving modem turns the other way and provides a digital output to a
device, normally a computer, connected to a modem. In most cases, digital data is transmitted via the RS-
232 standard interface to or from a serial line modem. Most cable operators use modems as final terminals
to locate and remember their homes and personal clients, and many phone companies provide DSL
services. All physical and data link layers are operating on modems.
6. Brouter
A bridging router is also known as a device that combines both the features of a router and a bridge. It can
be used on the data connection layer or the network layer. It can route packets through networks like a
router, act as a bridge and filter network traffic in the local area.
2. Servers
Web server. The web server powers the website you are viewing right now. This type of server
focuses on serving web content to clients.
Database server. A database server often works in tandem with another type of server. This type of
server exists only to store data in groups.
eMail server. Email servers usually run on “SMTP” or “Simple Mail Transfer Protocol”. ...
Web Proxy Server. A web proxy server can run on one of many protocols, but they all have one
thing in common. ...
DNS server. DNS servers, or “Domain Name Services” servers, are used to translate domain
names to their respective IP addresses.
ftp server. An FTP server, or “File Transfer Protocol” server, has a single purpose: to host file
exchanges between users.
File server. A file server is different from an FTP server. This type of server is more modern and
usually has the ability to "map" networked files to the drive.
DHCP server. The DHCP server uses Dynamic Host Communication Protocol (DHCP) to
configure the client computer's network settings.
IV. Discuss the inter-dependence of workstation hardware with relevant
networking software.
A network is formed, when more than one computer is connected among each other, for the purpose of
communication among them. There are servers also present in a network, which provides many data
storage places. Servers in order to manage so many computers need an operating system.
When a request is received from computer, over the internet to the server, there are some scheduling
algorithms, which determines what or resource is to be given to which request. In this way a software
interacts, with the workstation hardware.
A work station is a computer designed for individual use that is more capable than a personal computer.
As they are PCs, they can be used independently of the mainframe assuming that they have their own apps
installed and their own hard disk storage. Network interface card is a computer hardware part that allows
computers to be clubbed together in a network usually a local area network.
An example of communication between a server and a client: that is the model in the net shop. The server
can access data from the workstation, the server can adjust the functions or turn off the workstation. and
vice versa, the client can request data from the server.
Figure 10 the model in the net shop
communication among them. There are servers also present in a network, which provides many data
storage places. Servers in order to manage so many computers need an operating system.
When a request is received from computer, over the internet to the server, there are some scheduling
algorithms, which determines what or resource is to be given to which request. In this way a software
interacts, with the workstation hardware.
A work station is a computer designed for individual use that is more capable than a personal computer.
As they are PCs, they can be used independently of the mainframe assuming that they have their own apps
installed and their own hard disk storage. Network interface card is a computer hardware part that allows
computers to be clubbed together in a network usually a local area network.
An example of communication between a server and a client: that is the model in the net shop. The server
can access data from the workstation, the server can adjust the functions or turn off the workstation. and
vice versa, the client can request data from the server.
Figure 10 the model in the net shop
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References
(n.d.). Retrieved from https://www.ionos.com/digitalguide/server/know-how/what-is-a-network/
(n.d.). Retrieved from https://techdifferences.com/difference-between-physical-and-logical-topology.html
(n.d.). Retrieved from https://www.etechnog.com/2019/06/network-topology-types-
examples.html#:~:text=1%20Bus%20Topology%202%20Ring%20Topology%203%20Star,device
s%20are%20connected%20to%20a%20single%20Backbone%20Cable.
(n.d.). Retrieved from https://www.tanaza.com/tanazaclassic/blog/how-to-calculate-network-bandwidth-
requirements/#:~:text=Network%20bandwidth%20is%20an%20essential%20factor%20in%20the,
calculate%20WiFi%20bandwidth%20needs%20when%20designing%20the%20network%3F
(n.d.). Retrieved from https://www.cleverism.com/lexicon/bandwidth/
(n.d.). Retrieved from https://www.networkworld.com/article/3584876/what-is-a-network-switch-and-
how-does-it-work.html
(n.d.). Retrieved from https://www.educba.com/types-of-network-devices/
(n.d.). Retrieved from https://www.ionos.com/digitalguide/server/know-how/what-is-a-network/
(n.d.). Retrieved from https://techdifferences.com/difference-between-physical-and-logical-topology.html
(n.d.). Retrieved from https://www.etechnog.com/2019/06/network-topology-types-
examples.html#:~:text=1%20Bus%20Topology%202%20Ring%20Topology%203%20Star,device
s%20are%20connected%20to%20a%20single%20Backbone%20Cable.
(n.d.). Retrieved from https://www.tanaza.com/tanazaclassic/blog/how-to-calculate-network-bandwidth-
requirements/#:~:text=Network%20bandwidth%20is%20an%20essential%20factor%20in%20the,
calculate%20WiFi%20bandwidth%20needs%20when%20designing%20the%20network%3F
(n.d.). Retrieved from https://www.cleverism.com/lexicon/bandwidth/
(n.d.). Retrieved from https://www.networkworld.com/article/3584876/what-is-a-network-switch-and-
how-does-it-work.html
(n.d.). Retrieved from https://www.educba.com/types-of-network-devices/
1 out of 26
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.