Benefits and Constraints of Different Network Types
VerifiedAdded on 2021/08/16
|22
|5141
|7484
AI Summary
This assignment is on the benefits and constraints of different network types. -A metropolitan area network is a computer network that interconnects users.
>> Get more study resources related to computer networks
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Benefits and constraints of different network types and standards.
I. Discuss the benefits and constraints of different network types:
1. Local Area Networks (LAN):
- Local Area Network (LAN) is a high-speed communications system designed to connect
computers and other data processing devices working together in a small geographical
area such as a floor of the building, or in a building….
1.1 Benefits:
- Initial investment costs are lower.
- Devices that are connected to the LAN can easily share or transfer data to each other.
- Can connect to other peripherals such as printers, photocopiers ....
- Computers can use the same an application.
- Easily install security protocols to protect LAN users from intruders or hackers.
1.2 . Constraints:
- LAN covers small geographical area.
- In the server based on LAN architecture, if server develops some fault, all the users are
affected.
- Appearance of virus in one system can spread very fast to all the LAN users very easily.
I. Discuss the benefits and constraints of different network types:
1. Local Area Networks (LAN):
- Local Area Network (LAN) is a high-speed communications system designed to connect
computers and other data processing devices working together in a small geographical
area such as a floor of the building, or in a building….
1.1 Benefits:
- Initial investment costs are lower.
- Devices that are connected to the LAN can easily share or transfer data to each other.
- Can connect to other peripherals such as printers, photocopiers ....
- Computers can use the same an application.
- Easily install security protocols to protect LAN users from intruders or hackers.
1.2 . Constraints:
- LAN covers small geographical area.
- In the server based on LAN architecture, if server develops some fault, all the users are
affected.
- Appearance of virus in one system can spread very fast to all the LAN users very easily.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2. Wide Area Network (WAN):
- The WAN is a network which is a collection of LANs and other network types connected using
router. It covers large geographical distance compare to LAN and MAN types.
2.1. Benefits:
- WAN covers larger geographical area. Hence business offices situated at longer distances can
easily communicate.
- Like LAN, it alloows sharing of resources and application software among distributed
workstations or users.
-Organizations can form their global integrated network through WAN. Moreover, it supports
global markets and global businesses.
2.2 Constraints:
- Initial investment costs are higher.
- It has lower security compare to LAN and MAN due to wider coverage and use of more
technologies.
- Security is big concern and requires use of firewall and security software/protocols at multiple
points across the entire system.
- There are more errors and issues due to wide coverage and use of different technologies.
- It is difficult to maintain the network.
4. Metropolitan area network (MAN):
-A metropolitan area network (MAN) is a computer network that interconnects users with
computer resources in a geographic area or region larger than that covered by even a large
local area network (LAN) but smaller than the area covered by a wide area network (WAN).
- The WAN is a network which is a collection of LANs and other network types connected using
router. It covers large geographical distance compare to LAN and MAN types.
2.1. Benefits:
- WAN covers larger geographical area. Hence business offices situated at longer distances can
easily communicate.
- Like LAN, it alloows sharing of resources and application software among distributed
workstations or users.
-Organizations can form their global integrated network through WAN. Moreover, it supports
global markets and global businesses.
2.2 Constraints:
- Initial investment costs are higher.
- It has lower security compare to LAN and MAN due to wider coverage and use of more
technologies.
- Security is big concern and requires use of firewall and security software/protocols at multiple
points across the entire system.
- There are more errors and issues due to wide coverage and use of different technologies.
- It is difficult to maintain the network.
4. Metropolitan area network (MAN):
-A metropolitan area network (MAN) is a computer network that interconnects users with
computer resources in a geographic area or region larger than that covered by even a large
local area network (LAN) but smaller than the area covered by a wide area network (WAN).
4.1 Benefits:
- MAN requires fewer resources than WAN.
- MAN helps people interface LAN together faster.
-MAN provide better security than WAN.
- Like LAN and WAN, MAN also offers centralized management of data and files.
-MAN uses the limitations of both LAN and WAN to provide a larger, controllable network.
- High speed than WAN.
4.2. Constraint:
- It is difficult to manage MAN when MAN becomes large.
- It requires more cables to connect from one place to another than the LAN.
-It is difficult to make the system secure from hackers
-If MAN is installed on copper wires then there will be very low speed. So, it required the high
cost to set up fiber optics for the first time.
5. Global area network (GAN):
-The Global Area Network (GAN) refers to a network of different connected networks covering
an unlimited geographic area. The term is synonymous with the Internet, which is considered
the global network.
- MAN requires fewer resources than WAN.
- MAN helps people interface LAN together faster.
-MAN provide better security than WAN.
- Like LAN and WAN, MAN also offers centralized management of data and files.
-MAN uses the limitations of both LAN and WAN to provide a larger, controllable network.
- High speed than WAN.
4.2. Constraint:
- It is difficult to manage MAN when MAN becomes large.
- It requires more cables to connect from one place to another than the LAN.
-It is difficult to make the system secure from hackers
-If MAN is installed on copper wires then there will be very low speed. So, it required the high
cost to set up fiber optics for the first time.
5. Global area network (GAN):
-The Global Area Network (GAN) refers to a network of different connected networks covering
an unlimited geographic area. The term is synonymous with the Internet, which is considered
the global network.
5.1 Benefits:
-Connect branches for data transmission purposes.
-Low cost, stable speed.
-Meet the requirements of information security.
-Simple to manage and easy to switch.
5.2 Constraint:
- It is easy for hackers to steal information and reveal
information. When centralized control is shared, the user can access
the data
- Network maintenance is difficult and costly - Lost information
or stolen.
II. Discuss the benefits and constraints of different network standard:
1. Definition:
- Network standards are a set of rules that ensure the interoperability of network technologies
by defining the rules of communication between networked devices. Network standards exist
to help ensure that the products of different vendors can work together in a network without
the risk of incompatibility.
2.Some common Network Standards:
2.1. ITU (International Telecommunication Union):
- The ITU is a specialized United Nations agency that regulates international
telecommunications, including radio and TV frequencies, satellite and telephony
specifications, networking infrastructure, and tariffs applied to global communications. It also
provides developing countries with technical expertise and equipment to advance those
nations’ technological bases.
-Connect branches for data transmission purposes.
-Low cost, stable speed.
-Meet the requirements of information security.
-Simple to manage and easy to switch.
5.2 Constraint:
- It is easy for hackers to steal information and reveal
information. When centralized control is shared, the user can access
the data
- Network maintenance is difficult and costly - Lost information
or stolen.
II. Discuss the benefits and constraints of different network standard:
1. Definition:
- Network standards are a set of rules that ensure the interoperability of network technologies
by defining the rules of communication between networked devices. Network standards exist
to help ensure that the products of different vendors can work together in a network without
the risk of incompatibility.
2.Some common Network Standards:
2.1. ITU (International Telecommunication Union):
- The ITU is a specialized United Nations agency that regulates international
telecommunications, including radio and TV frequencies, satellite and telephony
specifications, networking infrastructure, and tariffs applied to global communications. It also
provides developing countries with technical expertise and equipment to advance those
nations’ technological bases.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
- The main activities of the ITU cover all aspects of the field telecommunications sector. ITU
hasthree main areas of activity:
+ITU-R (Radiocommunication Sector): play an important role in the global management of
radio frequency resources and satellite orbits, construction Establish international standards for
radio communication systems.
+ ITU-T (Telecommunication Standardization Sector): a collection of experts from all over the
world to build international standards known by name. The ITU-T Recommendation, which
determines the global infrastructure of the public information and communication technology.
+ ITU-D (Development Sector): efforts to replicate telecom access Fair and reasonable as a way
to stimulate socio-economic development Wider.
- The purpose of ITU-T is to build, publish, disseminate and monitor the application.
Recommendation for standardization of telecommunications activities on a global level,
through research technical issues, manipulation and tariffs on international media. Currently
active ITU-T standardization is conducted by:
- Media Advisory Group (TSAG);
- Research Groups (SG);
- Co-ordinating Coordination Groups (with Radio Communications Unit).
2.2 IEEE (Institute of Electrical and Electronics Engineers):
-The IEEE (Institute of Electrical and Electronics Engineers), or “I-triple-E,” is an international
society composed of engineering professionals. Its goals are to promote development and
education in the electrical engineering and computer science fields. To this end, IEEE hosts
numerous symposia, conferences, and local chapter meetings and publishes papers designed to
educate members on technological advances. It also maintains a standards board that
establishes its own standards for the electronics and computer industries and contributes to
the work of other standards-setting bodies.
* Some of the best-known IEEE standards are as follows:
- IEEE 802.1 (LAN/MAN):
The IEEE 802.1 group defined internetworking standards, with IEEE 802.1d and IEEE 802.1q
used in the local-area networking environment.
- IEEE 802.3 (Ethernet):
+ Several Ethernet standards are used in today's network environment. Some of these
standards dictate the bandwidth and operation of the Ethernet LAN, such as Ethernet and Fast
Ethernet, whereas other standards dictate how these Ethernet networks function, such as the
STP.
+ The IEEE 802.3 standards define how the Ethernet standard is used in the networking
environment. Some IEEE 802.3:
hasthree main areas of activity:
+ITU-R (Radiocommunication Sector): play an important role in the global management of
radio frequency resources and satellite orbits, construction Establish international standards for
radio communication systems.
+ ITU-T (Telecommunication Standardization Sector): a collection of experts from all over the
world to build international standards known by name. The ITU-T Recommendation, which
determines the global infrastructure of the public information and communication technology.
+ ITU-D (Development Sector): efforts to replicate telecom access Fair and reasonable as a way
to stimulate socio-economic development Wider.
- The purpose of ITU-T is to build, publish, disseminate and monitor the application.
Recommendation for standardization of telecommunications activities on a global level,
through research technical issues, manipulation and tariffs on international media. Currently
active ITU-T standardization is conducted by:
- Media Advisory Group (TSAG);
- Research Groups (SG);
- Co-ordinating Coordination Groups (with Radio Communications Unit).
2.2 IEEE (Institute of Electrical and Electronics Engineers):
-The IEEE (Institute of Electrical and Electronics Engineers), or “I-triple-E,” is an international
society composed of engineering professionals. Its goals are to promote development and
education in the electrical engineering and computer science fields. To this end, IEEE hosts
numerous symposia, conferences, and local chapter meetings and publishes papers designed to
educate members on technological advances. It also maintains a standards board that
establishes its own standards for the electronics and computer industries and contributes to
the work of other standards-setting bodies.
* Some of the best-known IEEE standards are as follows:
- IEEE 802.1 (LAN/MAN):
The IEEE 802.1 group defined internetworking standards, with IEEE 802.1d and IEEE 802.1q
used in the local-area networking environment.
- IEEE 802.3 (Ethernet):
+ Several Ethernet standards are used in today's network environment. Some of these
standards dictate the bandwidth and operation of the Ethernet LAN, such as Ethernet and Fast
Ethernet, whereas other standards dictate how these Ethernet networks function, such as the
STP.
+ The IEEE 802.3 standards define how the Ethernet standard is used in the networking
environment. Some IEEE 802.3:
- IEEE 802.3 (Ethernet): 10-Mbps Ethernet specification developed by Xerox, often used in
LANs.
- IEEE 802.3u (Fast Ethernet) 100-Mbps Ethernet specification working at 10 times the speed
of 10-Mbps Ethernet, often used in LANs.
- IEEE 802.3z (Gigabit Ethernet) 1000-Mbps/1-Gbps Ethernet specification that transfers data
at 1 gigabit per second (1000 Mbps). Often used in large LANs (at the core layer).
- IEEE 802.3ae (10Gigabit Ethernet) 10,000-Mbps/10-Gbps Ethernet specification that
transfers data at 10 gigabits per second (10,000 Mbps). Often used in MANs.
- IEEE 802.5 (Token Ring): IEEE 802.5 is a specification that is relevant and compatible with
the Token Ring standard developed by IBM. Token Ring refers to both the IBM Token Ring
and IEEE 802.5 network deployments.
IEEE 802.11 (Wireless LAN): The IEEE 802.11 standard refers to a family of specifications
developed for wireless LAN technology. IEEE 802.11 specifies a wireless interface between a
wireless client and a base station, such as a wireless laptop and a wireless base unit or between
two wireless clients, such as between two wireless laptops.
2.3. ISO (International Organization for Standardization): -
ISO is the global alliance of national standards bodies.
- The goal of ISO is to promote the development of standardization and related activities
around the world in order to facilitate the international exchange of goods and services and
to develop cooperation in the field of mental activity. intellectual, scientific, technological
and economic.
2.4. IETF (Internet Engineering Task Force):
- IETF is the organization that sets standards for how systems communicate over the
Internet—inparticular, how protocols operate and interact.
- The purpose of the IETF is to develop and promote Internet standards, working closely with
standard organizations of the World Wide Web Consortium (W3C) and ISO / IEC
(International Electrotechnical Commission); and specifically address the TCP / IP standards
and Internet protocol suite. This is a voluntary open standards organization that does not
require formal or informal membership. 2.5. ISOC (Internet Society):
- ISOC is a professional membership society that helps set the technical standards for the
Internet.
-The purpose of ISOC is to guarantee, promote the development, expansion and use of the
Internet is most convenient for people around the world.
P2. Explain the impact of network topology, communication and bandwidth
requirements.
I. Explain the impact of network topology:
1. BUS TOPOLOGY:
LANs.
- IEEE 802.3u (Fast Ethernet) 100-Mbps Ethernet specification working at 10 times the speed
of 10-Mbps Ethernet, often used in LANs.
- IEEE 802.3z (Gigabit Ethernet) 1000-Mbps/1-Gbps Ethernet specification that transfers data
at 1 gigabit per second (1000 Mbps). Often used in large LANs (at the core layer).
- IEEE 802.3ae (10Gigabit Ethernet) 10,000-Mbps/10-Gbps Ethernet specification that
transfers data at 10 gigabits per second (10,000 Mbps). Often used in MANs.
- IEEE 802.5 (Token Ring): IEEE 802.5 is a specification that is relevant and compatible with
the Token Ring standard developed by IBM. Token Ring refers to both the IBM Token Ring
and IEEE 802.5 network deployments.
IEEE 802.11 (Wireless LAN): The IEEE 802.11 standard refers to a family of specifications
developed for wireless LAN technology. IEEE 802.11 specifies a wireless interface between a
wireless client and a base station, such as a wireless laptop and a wireless base unit or between
two wireless clients, such as between two wireless laptops.
2.3. ISO (International Organization for Standardization): -
ISO is the global alliance of national standards bodies.
- The goal of ISO is to promote the development of standardization and related activities
around the world in order to facilitate the international exchange of goods and services and
to develop cooperation in the field of mental activity. intellectual, scientific, technological
and economic.
2.4. IETF (Internet Engineering Task Force):
- IETF is the organization that sets standards for how systems communicate over the
Internet—inparticular, how protocols operate and interact.
- The purpose of the IETF is to develop and promote Internet standards, working closely with
standard organizations of the World Wide Web Consortium (W3C) and ISO / IEC
(International Electrotechnical Commission); and specifically address the TCP / IP standards
and Internet protocol suite. This is a voluntary open standards organization that does not
require formal or informal membership. 2.5. ISOC (Internet Society):
- ISOC is a professional membership society that helps set the technical standards for the
Internet.
-The purpose of ISOC is to guarantee, promote the development, expansion and use of the
Internet is most convenient for people around the world.
P2. Explain the impact of network topology, communication and bandwidth
requirements.
I. Explain the impact of network topology:
1. BUS TOPOLOGY:
- Bus topology is the simplest and most common method of networking. The bus topology
consists of a single cable that connects all the computers in the network in a row.
Advantages:
- The advantage of this network is the cost savings of cable.
Disadvantages:
- The downside is that this network is slow
- When the cable fails, the whole network will stop working
- When trouble is very difficult to check error detection
2. STAR TOPOLOGY:
- Star Network provides resources and centralized management
mode. - Each device is connected to a central device called hub
through cable - Data passes through hub before reaching destination.
• Advantages:
– Easy to install, configure, manage and expand
consists of a single cable that connects all the computers in the network in a row.
Advantages:
- The advantage of this network is the cost savings of cable.
Disadvantages:
- The downside is that this network is slow
- When the cable fails, the whole network will stop working
- When trouble is very difficult to check error detection
2. STAR TOPOLOGY:
- Star Network provides resources and centralized management
mode. - Each device is connected to a central device called hub
through cable - Data passes through hub before reaching destination.
• Advantages:
– Easy to install, configure, manage and expand
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
– Centralized management
– Addition or removal of device does not affect the whole network
• Disadvantages:
– Requires more cable
– Failure of hub affects entire network
– More Expensive
3. RING TOPOLOGY:
• Devices are connected in a closed loop
• All devices have equal access to media
• Device waits for its turn to transmit
• Most common type is Token Ring network
• Advantages:
– Reliable and offers greater speed
– No collisions
– Handles large volume of traffic
• Disadvantages:
– More cabling is required compared to bus topology
– One faulty device affects the entire network– Addition of devices
affect network.
– Addition or removal of device does not affect the whole network
• Disadvantages:
– Requires more cable
– Failure of hub affects entire network
– More Expensive
3. RING TOPOLOGY:
• Devices are connected in a closed loop
• All devices have equal access to media
• Device waits for its turn to transmit
• Most common type is Token Ring network
• Advantages:
– Reliable and offers greater speed
– No collisions
– Handles large volume of traffic
• Disadvantages:
– More cabling is required compared to bus topology
– One faulty device affects the entire network– Addition of devices
affect network.
4. MESH TOPOLOGY:
- Used in WANs to interconnect LANs
- Every device is connected to every other device
- Use routers to determine the best path of communication
• Advantages:
– Improves fault tolerance
– Failure of one link does not affect entire network
– Centralized management is not required
• Disadvantages:
– Difficult to install and manage
– Each link from one device to other requires individual NIC – Expensive
5 TREE TOPOLOGY:
- Combines the characteristic of linear bus and star topology
- Devices are wired to root hub
- Twisted pair cable is commonly used
- Lowest level devices are smaller computers
- Used in WANs to interconnect LANs
- Every device is connected to every other device
- Use routers to determine the best path of communication
• Advantages:
– Improves fault tolerance
– Failure of one link does not affect entire network
– Centralized management is not required
• Disadvantages:
– Difficult to install and manage
– Each link from one device to other requires individual NIC – Expensive
5 TREE TOPOLOGY:
- Combines the characteristic of linear bus and star topology
- Devices are wired to root hub
- Twisted pair cable is commonly used
- Lowest level devices are smaller computers
• Advantages:
– Easy to expand the network
– Point-to-point wiring for each device
– Fault detection is easy
• Disadvantages:
– Difficult to configure
– If backbone breaks, entire network goes down
– More expensive
6. HYBIRD TOPOLOGY:
Hybrid topology is a network where two or more topologies are connected in such a way
that the resulting network does not have one of the standard forms.
• Advantages:
– Used for creating larger networks
– Handles large volume of traffic
– Fault detection is easy
• Disadvantages:
– Easy to expand the network
– Point-to-point wiring for each device
– Fault detection is easy
• Disadvantages:
– Difficult to configure
– If backbone breaks, entire network goes down
– More expensive
6. HYBIRD TOPOLOGY:
Hybrid topology is a network where two or more topologies are connected in such a way
that the resulting network does not have one of the standard forms.
• Advantages:
– Used for creating larger networks
– Handles large volume of traffic
– Fault detection is easy
• Disadvantages:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
– Installation and configuration is difficult
– More expensive than other topologies
– More cabling is required
II. Communication:
1. Unicast:
A unicast transmission is a one-to-one communication that passes from a single source to a
single receiver or destination
1.1 Benefits:
- Unicast is the main form of transmission in LAN and Internet
- All LAN (Ethernet) and IP networks support Unicast mode of applications using IP protocol
transport methods such as HTTP, SMTP, FTP, Telnet.
-Transmission takes place from host to host, which can reduce the traffic burden on a Local
Area Network (LAN)
- 1.2 Constraint:
- Applications which are mass-distributed are too costly to be conducted
- Each network connection consumes computing resources on the sending host and requires
its own separate network bandwidth for transmission.
- Require that the sender know the exact IP address of each destination device.
2.Broadcast:
-A multicasting is associated with a group of interested receivers. No direct relationship
between the clients and servers. Client that are connected to the multicast adds no additional
overhead on the server.
2.1 Benefits:
- A single communication channel is shared by all computers.
- Packets are transmitted and received by all the computer.
- Address field is attached to whom it is intended.
2.2 Constraint:
- Have every connected device receive all broadcast signals all the time would introduce
unnecessary interference and tons of unwanted data.
– More expensive than other topologies
– More cabling is required
II. Communication:
1. Unicast:
A unicast transmission is a one-to-one communication that passes from a single source to a
single receiver or destination
1.1 Benefits:
- Unicast is the main form of transmission in LAN and Internet
- All LAN (Ethernet) and IP networks support Unicast mode of applications using IP protocol
transport methods such as HTTP, SMTP, FTP, Telnet.
-Transmission takes place from host to host, which can reduce the traffic burden on a Local
Area Network (LAN)
- 1.2 Constraint:
- Applications which are mass-distributed are too costly to be conducted
- Each network connection consumes computing resources on the sending host and requires
its own separate network bandwidth for transmission.
- Require that the sender know the exact IP address of each destination device.
2.Broadcast:
-A multicasting is associated with a group of interested receivers. No direct relationship
between the clients and servers. Client that are connected to the multicast adds no additional
overhead on the server.
2.1 Benefits:
- A single communication channel is shared by all computers.
- Packets are transmitted and received by all the computer.
- Address field is attached to whom it is intended.
2.2 Constraint:
- Have every connected device receive all broadcast signals all the time would introduce
unnecessary interference and tons of unwanted data.
-Broadcasts are available on many levels of the OSI model, so they must be adjusted to fit from
one floor to the next.
- Network allows the server to provide data of limited bandwidth, maximum bandwidth client =
general service bandwidth.
3.Multicast:
- Multicast is the way the message is sent from one point to another, and thus a multi-point
connection. This technique is used under the OSI model in the network layer.
3.1 Benefits:
-Its advantage is that at the same time the message is sent to multiple participants or to a group
of private users. The transmitter only needs the data transfer rate as if there was only one
receiver while multicasting. Multicast is useful if a group of customers requires a common set of
data at the same time. Multicast transmission saves significant bandwidth.
- Capable of controlling network traffic and reducing server and CPU load, optimize
transmission performance
3.2 Constraint:
-Lack of TCP windowing and “slow start” mechanisms can result in network congestion.
- Some multicast protocol mechanisms result in the occasional generation of duplicate packets.
III. Bandwidth Requirement:
1. Bandwidth:
- Bandwidth is a term refers to the flow of electrical signals transmitted through the
transmission device per second. 2. Bandwidth Requirement:
- Expected average load
- Anticipated peak load
- Local internet availability
- Cost constraints, throughput.
P3. Discuss the operating principles of networking devices and server types.
Implement a network design topology infrastructure based on a prepared design
and list the different type of topologies.
I. Discuss the operating principles of networking devices.
1. Repeater:
1.1 What is Repeater:
one floor to the next.
- Network allows the server to provide data of limited bandwidth, maximum bandwidth client =
general service bandwidth.
3.Multicast:
- Multicast is the way the message is sent from one point to another, and thus a multi-point
connection. This technique is used under the OSI model in the network layer.
3.1 Benefits:
-Its advantage is that at the same time the message is sent to multiple participants or to a group
of private users. The transmitter only needs the data transfer rate as if there was only one
receiver while multicasting. Multicast is useful if a group of customers requires a common set of
data at the same time. Multicast transmission saves significant bandwidth.
- Capable of controlling network traffic and reducing server and CPU load, optimize
transmission performance
3.2 Constraint:
-Lack of TCP windowing and “slow start” mechanisms can result in network congestion.
- Some multicast protocol mechanisms result in the occasional generation of duplicate packets.
III. Bandwidth Requirement:
1. Bandwidth:
- Bandwidth is a term refers to the flow of electrical signals transmitted through the
transmission device per second. 2. Bandwidth Requirement:
- Expected average load
- Anticipated peak load
- Local internet availability
- Cost constraints, throughput.
P3. Discuss the operating principles of networking devices and server types.
Implement a network design topology infrastructure based on a prepared design
and list the different type of topologies.
I. Discuss the operating principles of networking devices.
1. Repeater:
1.1 What is Repeater:
-Repeater is an electronic device with two ports: input port and output port. It functions to
compensate the signal attenuation by forwarding all incoming electrical signals from the input
port to the output port after amplification. The repeater is used, which is integrated in most
telecommunication systems.
1.2 Operating Principles:
- The repeater works on the first level of the OSI model - the physical layer.
- This image below describes how repeater work:
- Internet sources will go to the modem and from the modem will go to the router. The router
transmits the signal to the repeater and finally the signal from the repeater and sends it to the
computer.
2.Hub:
2.1 What is Hub:
-A hub is a common connection point for devices in a network. Hubs are commonly used to
connect segments of a LAN. A hub contains multiple ports and operates at Physical Layer like
Repeater.
compensate the signal attenuation by forwarding all incoming electrical signals from the input
port to the output port after amplification. The repeater is used, which is integrated in most
telecommunication systems.
1.2 Operating Principles:
- The repeater works on the first level of the OSI model - the physical layer.
- This image below describes how repeater work:
- Internet sources will go to the modem and from the modem will go to the router. The router
transmits the signal to the repeater and finally the signal from the repeater and sends it to the
computer.
2.Hub:
2.1 What is Hub:
-A hub is a common connection point for devices in a network. Hubs are commonly used to
connect segments of a LAN. A hub contains multiple ports and operates at Physical Layer like
Repeater.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2.2 Operating Principles:
- The Hub provides each PC with a dedicated connection through its gateways and misleads us
into a true peer-to-peer network. However, this star is only physical. Essentially inside the
Hub, its ports are connected to a common signaling line, also called a bus.
- At one point, only one computer was able to signal the common bus. Other computers wait
and "listen" - only when the bus is busy are they transmitted. At the same time, if two
computers simultaneously transmit data, then collision will occur on the transmission line.
- Constraint of the Hub are prone to conflicts that reduce the performance of the network.
3.Bridge:
3.1 What is Bridge:
- Bridge is a connectivity device that forwards data based on a physical address. In OSI Layer
model Bridge works at physical layer and data link layer.
3.2 Operating Principles:
- Bridge can remember and recall the address of the devices for further transmission. When the
process of bridging occurs, it makes a bridging table along side where it stores the MAC
addresses of the various terminals. This table helps the bridges to send the data packet to the
exact location next time. But if a specific address does not meet the contents of the bridging
table then the data packet is forwarded further ahead to every attached terminal in LAN
except from the computer it is connected to.
- A bridge filters and forwarrds packets by physical address. Bridges operate at the Network
Access Layer in the TCP/IP protocol stack.
- The Hub provides each PC with a dedicated connection through its gateways and misleads us
into a true peer-to-peer network. However, this star is only physical. Essentially inside the
Hub, its ports are connected to a common signaling line, also called a bus.
- At one point, only one computer was able to signal the common bus. Other computers wait
and "listen" - only when the bus is busy are they transmitted. At the same time, if two
computers simultaneously transmit data, then collision will occur on the transmission line.
- Constraint of the Hub are prone to conflicts that reduce the performance of the network.
3.Bridge:
3.1 What is Bridge:
- Bridge is a connectivity device that forwards data based on a physical address. In OSI Layer
model Bridge works at physical layer and data link layer.
3.2 Operating Principles:
- Bridge can remember and recall the address of the devices for further transmission. When the
process of bridging occurs, it makes a bridging table along side where it stores the MAC
addresses of the various terminals. This table helps the bridges to send the data packet to the
exact location next time. But if a specific address does not meet the contents of the bridging
table then the data packet is forwarded further ahead to every attached terminal in LAN
except from the computer it is connected to.
- A bridge filters and forwarrds packets by physical address. Bridges operate at the Network
Access Layer in the TCP/IP protocol stack.
4.Switch:
4.1 What is Switch:
Switch is a switching device, which is a device used to connect network segments together in a
star-based network. According to this model, the switch acts as the central device, all the
computers are connected here.
4.2. Operating Principles:
- When switch receives data from one of the connected devices, it forwards data only to the
port on which the destination system is connected.
- Uses the Media Access Control (MAC) address of the devices to determine the correct port.
- Refers to MAC table which stores MAC address with corresponding porrt number.
4.1 What is Switch:
Switch is a switching device, which is a device used to connect network segments together in a
star-based network. According to this model, the switch acts as the central device, all the
computers are connected here.
4.2. Operating Principles:
- When switch receives data from one of the connected devices, it forwards data only to the
port on which the destination system is connected.
- Uses the Media Access Control (MAC) address of the devices to determine the correct port.
- Refers to MAC table which stores MAC address with corresponding porrt number.
5.Router:
5.1. What is Router:
-Router is a computer network device used to transfer packets over a network and to terminals
through a process called routing. Operate at Network Layer of the OSI model
5.2 Operating Principle:
Step1: The router turns on and loads its OS from flash.
Step2: The router will load the last saved configuration file into NVRAM and set up the network
interfaces and routing protocols that it will run.
Step3: Routers add network and subnet addresses for each interface to its routing table along
with the name of the interface.
5.1. What is Router:
-Router is a computer network device used to transfer packets over a network and to terminals
through a process called routing. Operate at Network Layer of the OSI model
5.2 Operating Principle:
Step1: The router turns on and loads its OS from flash.
Step2: The router will load the last saved configuration file into NVRAM and set up the network
interfaces and routing protocols that it will run.
Step3: Routers add network and subnet addresses for each interface to its routing table along
with the name of the interface.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Step4: The router has a simple static route that sends all non-local data out of the network port
that is connected to the cable company.
Step5: When the router receives the site request from your computer, it will check the
destination IP address against its routing table.
Step6: The bits that make up the destination IP address in the IP packet are used as a hash key
to point to the correct route, which will point to the correct network interface to which the
packet will be forwarded.
Step7: The router transmits the packet to the correct interface, to the next router, repeating
the process until the packet reaches the destination.
6. Gateway:
6.1 What is Gateway:
- A gateway is a packet-switching device between two different networks
6.2. Operating Principle:
Gateways serve as the entry and exit point of network; all data routed inward or outward must
first pass through and communicate with the gateway in order to use routing paths. A router is
configured to act as a gateway device in a computer network. A port (or default gateway) is
implemented at the boundary of a network to manage all internal or external data
communications from that network. In addition to the routing packets, the ports also have
information about the internal path of the host network.
that is connected to the cable company.
Step5: When the router receives the site request from your computer, it will check the
destination IP address against its routing table.
Step6: The bits that make up the destination IP address in the IP packet are used as a hash key
to point to the correct route, which will point to the correct network interface to which the
packet will be forwarded.
Step7: The router transmits the packet to the correct interface, to the next router, repeating
the process until the packet reaches the destination.
6. Gateway:
6.1 What is Gateway:
- A gateway is a packet-switching device between two different networks
6.2. Operating Principle:
Gateways serve as the entry and exit point of network; all data routed inward or outward must
first pass through and communicate with the gateway in order to use routing paths. A router is
configured to act as a gateway device in a computer network. A port (or default gateway) is
implemented at the boundary of a network to manage all internal or external data
communications from that network. In addition to the routing packets, the ports also have
information about the internal path of the host network.
II. Discuss the operating principles of Server:
1.Web Server:
1.1 Definition:
- Web server refers to server software, or hardware dedicated to running said software,
that can serve contents to the World Wide Web. A web server processes incoming network
requests over HTTP and several other related protocols
1.2 Operating Principles:
• Client uses TCP/IP protocol to connect to server.
• Client sends HTTP request packages to server.
• Server returns HTTP response packages to client. If request resources include: dynamic
scripts, then the server calls the script engine first.
• Client disconnects from server, starts rendering HTML.
2.File Server:
2.1 Definition:
- File-server is a server in the network whose main purpose is to provide a place to store
shared computer files (such as documents, audio files, photographs, movies photos, images,
databases, etc.) that can be accessed by workstations in a computer network.
2.2 Operating Principles:
- A file server allows users to share information over a network without having to
physically transfer files by floppy diskette or some other external storage device. Any computer
can be configured to be a host and act as a file server. In its simplest form, a file server may be
an ordinary PC that handles requests for files and sends them over the network. In a more
sophisticated network, a file server might be a dedicated network-attached storage (NAS)
device that also serves as a remote hard disk drive for other computers, allowing anyone on the
network to store files on it as if to their own hard drive.
3. Database Server:
3.1 Definition:
- Database server or data server is a data warehouse used to store website, data and
information.
A database server is a LAN computer dedicated to storing, maintaining, and restoring
databases.
3.2. Opera Principles:
1.Web Server:
1.1 Definition:
- Web server refers to server software, or hardware dedicated to running said software,
that can serve contents to the World Wide Web. A web server processes incoming network
requests over HTTP and several other related protocols
1.2 Operating Principles:
• Client uses TCP/IP protocol to connect to server.
• Client sends HTTP request packages to server.
• Server returns HTTP response packages to client. If request resources include: dynamic
scripts, then the server calls the script engine first.
• Client disconnects from server, starts rendering HTML.
2.File Server:
2.1 Definition:
- File-server is a server in the network whose main purpose is to provide a place to store
shared computer files (such as documents, audio files, photographs, movies photos, images,
databases, etc.) that can be accessed by workstations in a computer network.
2.2 Operating Principles:
- A file server allows users to share information over a network without having to
physically transfer files by floppy diskette or some other external storage device. Any computer
can be configured to be a host and act as a file server. In its simplest form, a file server may be
an ordinary PC that handles requests for files and sends them over the network. In a more
sophisticated network, a file server might be a dedicated network-attached storage (NAS)
device that also serves as a remote hard disk drive for other computers, allowing anyone on the
network to store files on it as if to their own hard drive.
3. Database Server:
3.1 Definition:
- Database server or data server is a data warehouse used to store website, data and
information.
A database server is a LAN computer dedicated to storing, maintaining, and restoring
databases.
3.2. Opera Principles:
- In the Database Network, the client handles SQL requests from the database server. The
Network Database Server handles requests from the client database and replies to SQL queries
that will be downloaded through a networked computer. On the whole, the database server
uses its own resources to process requests or search results for requests. Database server is
sometimes known as an SQL engine.
4.Vitualization Server:
4.1 Definition:
- Server virtualization is a virtualization technique that involves partitioning a physical
server into a number of small, virtual servers with the help of virtualization software. In server
virtualization, each virtual server runs multiple operating system instances at the same time.
4.2 Operating Principles:
- The core of the virtualization server is the virtual machine (VM), which is a separate
software that includes the operating system and applications inside. Because each virtual
machine is independent annd separate, multiple virtual machines can run simultaneously on
the same server. There are thin layers of software called hypervisors that separate virtual
machines from the host and virtual machines that are automatically allocated resources as
required.
5. Terminal Server:
5.1. Definition:
-A terminal server is a server or network device that enables connections to multiple client
systems to connect to a LAN network without using a modem or a network interface.
5.2. Operating Principles:
- Terminal Services only trasnsmits the user interface of the program to the client, with the
client connecting through the network, sending keyboard gesture information, and hovering
over the Remote Desktop Protocol to the Terminal Server. It then sends the client screen
information as simple GDI events (and bandwidth), which are supported with bitmap
information if required to display the correct desktop status.
-Each user logs in and sees only their own session, the session is managed transparently by the
server operating system and independent of any other client session. Terminal Server provides
virtual Windows session management, so users can essentially view that session as their own
PC.
6. DNS Server:
Network Database Server handles requests from the client database and replies to SQL queries
that will be downloaded through a networked computer. On the whole, the database server
uses its own resources to process requests or search results for requests. Database server is
sometimes known as an SQL engine.
4.Vitualization Server:
4.1 Definition:
- Server virtualization is a virtualization technique that involves partitioning a physical
server into a number of small, virtual servers with the help of virtualization software. In server
virtualization, each virtual server runs multiple operating system instances at the same time.
4.2 Operating Principles:
- The core of the virtualization server is the virtual machine (VM), which is a separate
software that includes the operating system and applications inside. Because each virtual
machine is independent annd separate, multiple virtual machines can run simultaneously on
the same server. There are thin layers of software called hypervisors that separate virtual
machines from the host and virtual machines that are automatically allocated resources as
required.
5. Terminal Server:
5.1. Definition:
-A terminal server is a server or network device that enables connections to multiple client
systems to connect to a LAN network without using a modem or a network interface.
5.2. Operating Principles:
- Terminal Services only trasnsmits the user interface of the program to the client, with the
client connecting through the network, sending keyboard gesture information, and hovering
over the Remote Desktop Protocol to the Terminal Server. It then sends the client screen
information as simple GDI events (and bandwidth), which are supported with bitmap
information if required to display the correct desktop status.
-Each user logs in and sees only their own session, the session is managed transparently by the
server operating system and independent of any other client session. Terminal Server provides
virtual Windows session management, so users can essentially view that session as their own
PC.
6. DNS Server:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
6.1 Definition:
There is
- A DNS server, also known as a domain name system, is an orderly system for computers
and services that participate in the Internet. It links a variety of information with the domain
name assigned to them so that users can use that domain to find out what information they
need to know. It is important to select a domain name that is meaningful to the user, which is
linked to other network devices to locate and provide information to users around the world.
6.2 Operating Principle:
- Each service provider operates and maintains its own DNS server, including machines
within the individual part of each service provider in the Internet. That is, if a browser searches
for the address of a website, the DNS server that decodes the website name must be the DNS
server of the organization that manages the website, not the organization (s). other.
-INTERNIC (Internet Network Information Center) is responsible for tracking the domain and the
corresponding DNS server. INTERNIC is an organization founded by NSF (National Science
Foundation), AT & T and Network Solution, responsible for registering Internet domain names.
INTERNIC only has the task of managing all DNS servers on the Internet, not the name
resolution of each address.
-DNS is capable of querying other DNS servers to obtain a resolved name. The DNS server of
each domain usually has two distinct jobs. First, it is responsible for resolving names from
machines within the domain to Internet addresses, both inside and outside the domain it
manages. Second, they respond to external DNS servers trying to resolve names within the
domain it manages.
- The DNS server has the ability to remember names that have been resolved. For future
resolution requests. The number of names resolved depends on the size of each DNS.
III. Implement a network design topology infrastructure based on a prepared design and list the
different type of topologies:
-This image below shows a network topology infrastructure I design based on requirement of
customer and we use STAR TOPOLOGY in each floor (have 3 floor).
There is
- A DNS server, also known as a domain name system, is an orderly system for computers
and services that participate in the Internet. It links a variety of information with the domain
name assigned to them so that users can use that domain to find out what information they
need to know. It is important to select a domain name that is meaningful to the user, which is
linked to other network devices to locate and provide information to users around the world.
6.2 Operating Principle:
- Each service provider operates and maintains its own DNS server, including machines
within the individual part of each service provider in the Internet. That is, if a browser searches
for the address of a website, the DNS server that decodes the website name must be the DNS
server of the organization that manages the website, not the organization (s). other.
-INTERNIC (Internet Network Information Center) is responsible for tracking the domain and the
corresponding DNS server. INTERNIC is an organization founded by NSF (National Science
Foundation), AT & T and Network Solution, responsible for registering Internet domain names.
INTERNIC only has the task of managing all DNS servers on the Internet, not the name
resolution of each address.
-DNS is capable of querying other DNS servers to obtain a resolved name. The DNS server of
each domain usually has two distinct jobs. First, it is responsible for resolving names from
machines within the domain to Internet addresses, both inside and outside the domain it
manages. Second, they respond to external DNS servers trying to resolve names within the
domain it manages.
- The DNS server has the ability to remember names that have been resolved. For future
resolution requests. The number of names resolved depends on the size of each DNS.
III. Implement a network design topology infrastructure based on a prepared design and list the
different type of topologies:
-This image below shows a network topology infrastructure I design based on requirement of
customer and we use STAR TOPOLOGY in each floor (have 3 floor).
P4: Discuss the inter-dependence of workstation hardware with relevant
networking software:
- Networking Software: Networking software is a foundational element for any network. It helps
administrators deploy, manage and monitor a network. Traditional networks are made up of
specialized hardware, such as routers and switches, that bundle the networking software into
the solution. Software-defined networking (SDN) separates that software from the hardware,
making it easier to innovate and adapt the network to quickly meet changing network
demands. - Inter-dependence of workstation hardware with relevant networking software:
+ A network file server is a computer system used for the purpose of managing the file system,
the network printer, handling network communication, and other functions. A server may be
dedicated is such case all of its processing power is allocated to network function, or it may be
non- dedicated which means that a part of server functions allocated as a work stations or DOS
based system.
+ Network operating system: it is loaded into the servers’ hard disk along with the system
management tools and user utilities. When the system is started, NOS boots and other server
come under its control.
+ Workstations: workstations or nodes are attached to the server through the network
interfaces card and the cable; workstations are normally intelligence systems, such as the IBM
pc. But DUMV terminals are used in mainframe computers. The concept of distributed process
depends on the fact that personal computer are attached to the network performed their own
processing after loading programs and data from servers. Due to this a work station is called an
networking software:
- Networking Software: Networking software is a foundational element for any network. It helps
administrators deploy, manage and monitor a network. Traditional networks are made up of
specialized hardware, such as routers and switches, that bundle the networking software into
the solution. Software-defined networking (SDN) separates that software from the hardware,
making it easier to innovate and adapt the network to quickly meet changing network
demands. - Inter-dependence of workstation hardware with relevant networking software:
+ A network file server is a computer system used for the purpose of managing the file system,
the network printer, handling network communication, and other functions. A server may be
dedicated is such case all of its processing power is allocated to network function, or it may be
non- dedicated which means that a part of server functions allocated as a work stations or DOS
based system.
+ Network operating system: it is loaded into the servers’ hard disk along with the system
management tools and user utilities. When the system is started, NOS boots and other server
come under its control.
+ Workstations: workstations or nodes are attached to the server through the network
interfaces card and the cable; workstations are normally intelligence systems, such as the IBM
pc. But DUMV terminals are used in mainframe computers. The concept of distributed process
depends on the fact that personal computer are attached to the network performed their own
processing after loading programs and data from servers. Due to this a work station is called an
active device on the network. After processing, files are stored back on the server where they
can be used by others workstation.
+ Network interface card-every device connected to a LAN needs network interface card to plug
into the LAN. For example, a PC needs to have an Ethernet card installed in it to connect to an
Ethernet LAN.
+ Network cabling: once the server, workstations, and network interface cards are in place,
network cabling is used to network everything together. The most popular type of network
cables: Twisted pair wiring, Co-axial cable, Fiber optics cable.
>>> That is some interdependence of the workstation hardware with the relevant network
software to properly implement the network.
can be used by others workstation.
+ Network interface card-every device connected to a LAN needs network interface card to plug
into the LAN. For example, a PC needs to have an Ethernet card installed in it to connect to an
Ethernet LAN.
+ Network cabling: once the server, workstations, and network interface cards are in place,
network cabling is used to network everything together. The most popular type of network
cables: Twisted pair wiring, Co-axial cable, Fiber optics cable.
>>> That is some interdependence of the workstation hardware with the relevant network
software to properly implement the network.
1 out of 22
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.