Networking Report: Network Information Unit, BKD18400, November 2020

Verified

Added on  2021/10/01

|33
|6140
|1532
Report
AI Summary
Document Page
NETWORKING
PROGRAM TITLE: NETWORK INFORMATION
UNIT TITLE: NETWORKING
ASSIGNMENT NUMBER: 1
ASSIGNMENT NAME: NETWORK INFORMATION
SUBMISSION DATE: 11/2020
DATE RECEIVED: 10/11/2020
TUTORIAL LECTURER: TRAN HOANG BACH
WORD COUNT: 5501
STUDENT NAME: NGO VAN HUY
STUDENT ID: BKD18400
MOBILE NUMBER: 0383930441
ASSIGNMENT 1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING
Contents
Introduction...........................................................................................................................................3
Contents.................................................................................................................................................3
LO1 Examine networking principles and their protocols........................................................................3
P1 Discuss the benefits and constraints of different network types and standards...............................3
P2 Explain the impact of network topology, communication and bandwidth requirements...............10
LO2 Explain networking devices and operations..................................................................................19
P3 Discuss the operating principles of networking devices and server types.......................................19
P4 Discuss the interdependence of workstation hardware with relevant networking software..........21
Performance evaluation.......................................................................................................................22
Conclusion............................................................................................................................................22
Critical evaluation.................................................................................................................................22
ASSIGNMENT 2
Document Page
NETWORKING
Summative Feedback:
Internal verification:
ASSIGNMENT 3
Document Page
NETWORKING
A. Introduction
In my report, I am going a detailed guide that outlines the principles, models, and network
equipment for network training purposes and outlines the sections of the manual that are
relevant to Brick Lane. My main content is inside part II (Contents). I will show about
communication skills, problem-solving skills, time management skills and critical reasoning
and the importance of them are. In part III is my conclusion in this report, parts I finished. In
part IV, I will show what I did and not, I will evaluate the point of my report. Finally, in part V
is references that are sources I refer on.
B. Contents
LO1 Examine networking principles and their protocols
P1 Discuss the benefits and constraints of different network types and standards
What is a network?
In information technology, a network is defined as the connection of at least two computer
systems, either by a cable or a wireless connection. The simplest network is a combination of
two computers connected by a cable. This type of network is called a peer-to-peer network.
There is no hierarchy in this network; both participants have equal privileges. Each computer
has access to the data of the other device and can share resources such as disk space,
applications or peripheral devices (printers, etc.).
Computer network
Computer networks are the basis of communication in IT. They are used in a huge variety of
ways and can include many different types of network. A computer network is a set of
computers that are connected together so that they can share information.
Benefits of networks
There are various benefits that are achieved in a networked environment they include:
ï‚· Strengthening Relationships: Networking is about sharing, not taking. It is about forming
trust and helping one another toward goals.
ï‚· Fresh Ideas: Your network can be an excellent source of new perspectives and ideas to help
you in your role.
ASSIGNMENT 4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING
 Raised Profile: Being visible and getting noticed is a benefit of networking that’s essential in
career building. Regularly attending professional and social events will help to get your face
known.
ï‚· Access to Opportunities: Expanding your contacts can open doors to new opportunities for
business, career advancement, personal growth, or simply new knowledge.
ï‚· New Information: Networking is a great opportunity to exchange best practice knowledge,
learn about the business techniques of your peers and stay abreast of the latest industry
developments.
ï‚· Advice and Support: Gaining the advice of experienced peers is an important benefit of
networking.
Drawbacks
ï‚· Costly to set up and maintain
ï‚· Security Concerns
ï‚· Virus and Malware
ï‚· Lack of Robustness
ï‚· Needs an Efficient Handler
ï‚· Lack of Independence
ASSIGNMENT 5
Document Page
NETWORKING
System types:
1) Peer-based network
This is a network in which the computers are managed independently of one another and
have equal rights for initiating communication with each other, sharing resources, and
validating users.
2) Client-server network
A client server network is defined as specific type of online network comprised of a single
central computer acting as a server that directs multiple other computers, which are
referred to as the clients.
3) Cloud network
Cloud networking is a type of IT infrastructure in which some or all of an organization’s
network capabilities and resources are hosted in a public or private cloud platform, managed
in-house or by a service provider, and available on demand.
4) Cluster network
A cluster network is two or more computing devices working together for a common
computing purpose. These networks take advantage of the parallel processing power of the
computing devices.
5) Centralized network
A centralized network architecture is built around a single server that handles all the major
processing. Less powerful workstations connect to the server and submit their requests to
the central server rather than performing them directly.
6) Virtualized network
Network virtualization in computing is the procedure that separates the management plane
from the control plane by combining hardware (such as switches and routers) and software
network resources into a single, software-based administrative entity called a virtual
network.
ASSIGNMENT 6
Document Page
NETWORKING
Network standards
Conceptual models: OSI model, TCP/IP model
ï‚· OSI model: The OSI Model (Open Systems Interconnection Model) is a conceptual framework
used to describe the functions of a networking system. The OSI model characterizes
computing functions into a universal set of rules and requirements in order to support
interoperability between different products and software. In the OSI reference model, the
communications between a computing system are split into seven different abstraction
layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
ï‚· TCP/IP model: TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of
communication protocols used to interconnect network devices on the internet. TCP/IP can
also be used as a communications protocol in a private computer network(an intranet or an
extranet).
- The following are the similarities between the OSI and TCP/IP model:
ï‚· Both the reference models are based upon layered architecture.
ï‚· The layers in the models are compared with each other. The physical layer and the data link
layer of the OSI model correspond to the link layer of the TCP/IP model. The network layers
and the transport layers are the same in both the models. The session layer, the
ASSIGNMENT 7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING
presentation layer and the application layer of the OSI model together form the application
layer of the TCP/IP model.
ï‚· In both the models, protocols are defined in a layer-wise manner.
ï‚· In both models, data is divided into packets and each packet may take the individual route
from the source to the destination.
- Differences between OSI and TCP / IP Reference Models:
Standards: IEEE 802
IEEE 802 is a collection of networking standards that cover the physical and data-link layer
specifications for technologies such as Ethernet and wireless. These specifications apply to
local area networks (LAN) and metropolitan area networks (MAN). IEEE 802 also aids in
ensuring multi-vendor interoperability by promoting standards for vendors to follow.
ASSIGNMENT 8
Document Page
NETWORKING
Three most common types of networks:
1. Local Area Network (LAN) – is a computer network that interconnects computers within a
limited area such as a residence, school, laboratory, university campus or office building.
Four characteristics of LANs:
ASSIGNMENT 9
Document Page
NETWORKING
ï‚· Local area network is a group of computers connected with each other in a small place such
as school, hospital, apartment etc.
ï‚· LAN is secure because there is no outside connection with the local area network thus the
data which is shared is safe on the local area network and can’t be accessed outside.
ï‚· LAN due to their small size are considerably faster, their speed can range anywhere from 100
to 100Mbps.
ï‚· LANs are not limited to wire connection, there is a new evolution to the LANs that allows
local area network to work on a wireless connection.
2. Metropolitan Area Network (MAN) – is a computer network that interconnects users with
computer resources in a geographic region of the size of a metropolitan area.
Three characteristics of MANs:
 Wireless MAN — Single Carrier (SCa) uses single carrier modulation.
 Wireless MAN — OFDM uses a 256-carrier OFDM. This air interface provides multiple access
to different stations through time-division-multiple access.
 Wireless MAN — OFDM uses a 2048-carrier OFDM scheme. The interface provides multiple
access by assigning a subset of the carriers to an individual receiver.
3. Wide area network (WAN)– is a telecommunications network that extends over a large geographic
area for the primary purpose of computer networking. Wide area networks are often established
with leased telecommunication circuits.
ASSIGNMENT 10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING
Three characteristics of WANs:
ï‚· WANs have a large capacity, connecting a large number of computers over a large area, and
are inherently scalable.
ï‚· They facilitate the sharing of regional resources.
ï‚· They provide uplinks for connecting LANs and MANs to the Internet.
*Other types of networks:
Wireless LAN (WLAN)
Storage Area Network (SAN)
P2 Explain the impact of network topology, communication and bandwidth
requirements.
Network Topologies
Network topology refers to how various nodes, devices, and connections on your network
are physically or logically arranged in relation to each other. Think of your network as a city,
and the topology as the road map. Just as there are many ways to arrange and maintain a
city—such as making sure the avenues and boulevards can facilitate passage between the
parts of town getting the most traffic—there are several ways to arrange a network. Each
has advantages and disadvantages and depending on the needs of your company, certain
arrangements can give you a greater degree of connectivity and security.
There are two approaches to network topology: physical and logical.
ASSIGNMENT 11
Document Page
NETWORKING
 Physical – The physical network topology refers to the actual connections (wires, cables, etc.)
of how the network is arranged. Setup, maintenance, and provisioning tasks require insight
into the physical network.
 Logical – The logical network topology is a higher-level idea of how the network is set up,
including which nodes connect to each other and in which ways, as well as how data is
transmitted through the network.
Also, the way in which computers are connected together to form a network has a large
effect on its speed and efficiency. There are a number of different ways to connect
computers in a network - but these are the most common:
Star Topology
In this type of topology all the computers are connected to a single hub through a cable. This
hub is the central node and all others nodes are connected to the central node.
Features:
o Every node has its own dedicated connection to the hub.
o Hub acts as a repeater for data flow.
o Can be used with twisted pair, Optical Fiber or coaxial cable.
Advantages:
o Fast performance with few nodes and low network traffic.
ASSIGNMENT 12
Document Page
NETWORKING
o Hub can be upgraded easily.
o Easy to troubleshoot.
o Easy to setup and modify.
o Only that node is affected which has failed, rest of the nodes can work smoothly.
Disadvantages:
o Cost of installation is high.
o Expensive to use.
o If the hub fails then the whole network is stopped because all the nodes depend on the hub.
o Performance is based on the hub that is it depends on its capacity.
Bus Topology
Bus topology is a network type in which every computer and network device is connected to
single cable. When it has exactly two endpoints, then it is called Linear Bus topology.
Features:
o It transmits data only in one direction.
o Every device is connected to a single cable.
Advantages:
o It is cost effective.
o Cable required is least compared to another network topology.
o Used in small networks.
ASSIGNMENT 13
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING
o It is easy to understand.
o Easy to expand joining two cables together.
Disadvantages:
o Cables fails then whole network fails.
o If network traffic is heavy or nodes are more the performance of the network decreases.
o Cable has a limited length.
o It is slower than the ring topology.
Ring Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbors for each device.
Features:
o The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology.
o The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology.
o In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction
in them. Also, if one ring fails, the second ring can act as a backup, to keep the network up.
o Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass
through each node of the network, till the destination node.
ASSIGNMENT 14
Document Page
NETWORKING
Advantages:
o Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
o Cheap to install and expand.
Disadvantages:
o Troubleshooting is difficult in ring topology.
o Adding or deleting the computers disturbs the network activity.
o Failure of one computer disturbs the whole network.
Tree Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
ASSIGNMENT 15
Document Page
NETWORKING
Features:
o Ideal if workstations are located in groups.
o Used in Wide Area Network.
Advantages:
o Extension of bus and star topologies.
o Expansion of nodes is possible and easy.
o Easily managed and maintained.
o Error detection is easily done.
Disadvantages:
o Heavily cabled.
o Costly.
o If more nodes are added maintenance is difficult.
o Central hub fails, network fails.
ASSIGNMENT 16
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING
Mesh Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are:
ï‚· Routing
ï‚· Flooding
MESH Topology: Routing
In routing, the nodes have a routing logic, as per the network requirements. Like routing
logic to direct the data to reach the destination using the shortest distance. Or, routing logic
which has information about the broken links, and it avoids this node etc. We can even have
routing logic, to re-configure the failed nodes.
MESH Topology: Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is
required. The network is robust, and the its very unlikely to lose the data. But it leads to
unwanted load over the network.
Types:
o Partial Mesh Topology: In this topology some of the systems are connected in the same
fashion as mesh topology but some devices are only connected to two or three devices.
o Full Mesh Topology: Each and every nodes or devices are connected to each other.
Features:
o Fully connected.
ASSIGNMENT 17
Document Page
NETWORKING
o Robust.
o Not flexible.
Advantages:
o Each connection can carry its own data load.
o It is robust.
o Fault is diagnosed easily.
o Provides security and privacy.
Disadvantages:
o Installation and configuration are difficult.
o Cabling cost is more.
o Bulk wiring is required.
Hybrid Topology
It is two different types of topologies which is a mixture of two or more topologies. For
example, if in an office in one department ring topology is used and another star topology is
used, connecting these topologies will result in Hybrid Topology (ring topology and star
topology).
Features:
o It is a combination of two or topologies.
o Inherits the advantages and disadvantages of the topologies included.
ASSIGNMENT 18
Document Page
NETWORKING
Advantages:
o Reliable as Error detecting and troubleshooting is easy.
o Effective.
o Scalable as size can be increased easily.
o Flexible.
Disadvantages:
o Complex in design.
o Costly.
M1 Compare common networking principles and how protocols enable the
effectiveness of networked systems.
Networking principles
The network layer itself relies on the following principles:
1. Each network layer entity is identified by a network layer address. This address is
independent of the datalink layer addresses that it may use.
2. The service provided by the network layer does not depend on the service or the internal
organization of the underlying datalink layers. 3. The network layer is conceptually divided
into two planes: the data plane and the control plane. The data plane contains the protocols
and mechanisms that allow hosts and routers to exchange packets carrying user data.
Internet Protocol
The Internet Protocol (IP) is the network layer protocol of the TCP/IP protocol suite. IP allows
the applications running above the transport layer (UDP/TCP) to use a wide range of
heterogeneous datalink layers. IP was designed when most point-to-point links were
telephone lines with modems. Since then, IP has been able to use Local Area Networks
(Ethernet, Token Ring, FDDI, ...), new wide area data link layer technologies (X.25, ATM,
Frame Relay, ...) and more recently wireless networks (802.11, 802.15, UMTS, GPRS, ...).
ASSIGNMENT 19
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING
LO2 Explain networking devices and operations
P3 Discuss the operating principles of networking devices and server types.
1. Network Operating Principles
Rules that Govern Communications
ï‚· Protocol suites are implemented by hosts and networking devices in software, hardware or
both.
ï‚· The protocols are viewed in terms of layers, with each higher-level service depending on the
functionality defined by the protocols shown in the lower levels.
2. Network Protocols
ï‚· Networking protocols define a common format and set of rules for exchanging messages
between devices.
ï‚· Some common networking protocols are Hypertext Transfer Protocol (HTTP), Transmission
Control Protocol (TCP), and Internet Protocol (IP).
ASSIGNMENT 20
Document Page
NETWORKING
3. Devices
Protocol Interaction
Communication between a web server and web client is an example of an interaction
between several protocols:
ï‚· HTTP - an application protocol that governs the way a web server and a web client interact.
ï‚· TCP - transport protocol that manages the individual conversations.
 IP – encapsulates the TCP segments into packets, assigns addresses, and delivers to the
destination host.
ï‚· Ethernet - allows communication over a data link and the physical transmission of data on
the network media.
ASSIGNMENT 21
Document Page
NETWORKING
Protocol Suites and Industry Standards
ï‚· A protocol suite is a set of protocols that work together to provide comprehensive network
communication services.
ï‚· May be specified by a standards organization or developed by a vendor.
ï‚· The TCP/IP protocol suite is an open standard, the protocols are freely available, and any
vendor is able to implement these protocols on their hardware or in their software.
P4 Discuss the interdependence of workstation hardware with relevant networking
software.1. Network Devices
Workstation
A workstation (WS) is a computer dedicated to a user or group of users engaged in business
or professional work. It includes one or more high-resolution displays and a faster processor
than a personal computer (PC). A workstation also has greater multitasking capability
because of additional random-access memory (RAM), drives and drive capacity. A
workstation may also have higher-speed graphics adapters and more connected peripherals.
The term workstation also has been used to reference a PC or mainframe terminal on a local
area network (LAN). These workstations may share network resources with one or more
large client computers and network servers.
ASSIGNMENT 22
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING
Network Interface Card
A network interface card (NIC) is a hardware component, typically a circuit board or chip,
which is installed on a computer so that it can connect to a network. Modern NICs provide
functionality to computers such as support for I/O interrupt, direct memory access (DMA)
interfaces, data transmission, network traffic engineering, and partitioning.
A NIC provides a computer with a dedicated, full-time connection to a network by
implementing the physical layer circuitry necessary for communicating with a data link layer
standard, such as Ethernet or Wi-Fi. Each card represents a device and can prepare, transmit
and control the flow of data on the network. The NIC uses the OSI model to send signals at
the physical layer, transmit data packets at the network layer, and operate as an interface at
the TCP/IP layer.
Server
A server is a computer, a device or a program that is committed to managing network
resources. Server are often known to be dedicated because they carry out hardly any other
tasks apart from their server tasks.
There are a number of categories of servers including print server, file servers, network
servers
ASSIGNMENT 23
Document Page
NETWORKING
Interconnect Devices
Inter connection devices are devices that are capable of giving computers the ability to
transfer data on a network.
Example of interconnection devices include the network interface card, net work bridges,
switches and routers. The network interface card (or NIC for short) is the network adapter
that all devices must have in order to be part of a network.
Connectors and Cabling. Leased line cable
A leased line also known as a dedicated line, connects two locations for private voice and/or
data telecommunication service. A leased line is not a dedicated cable; it is a reserved circuit
between two points. The leased line is always active and available for a fixed monthly fee.
Leased line can span short or long distances. They maintain a single open circuit at all time,
as opposed to traditional telephone services that reuse the same lines for many different
conversations through a process called switching.
Network Media Types:
There are three general classes of media types: coaxial cable, twisted pair and fiber optic
cable. Coaxial cable had suffered waning popularity, but is making a bit of a comeback with
cable modem solutions. There are two types of fiber-optic cable: multi mode fiber and single
mode fiber. Twisted pair is the most common type of computer network cabling. Twisted
pair can be classified according to the value of the intrinsic impedance of the wire, and
whether it is shielded or unshielded. Unshielded twisted pair, with an intrinsic impedance of
100 ohms, is the most common type of computer network cabling used today.
ASSIGNMENT 24
Document Page
NETWORKING
Coaxial Cable
A coaxial cable has a central conductor.
Coaxial cable uses a single conductor in the middle of a cable. The central conductor is
surrounded by an insulator called the dielectric. A conductive shield is put around the
dielectric. This shield acts as the second conductor for the circuit as well serves to protect
the inner conductor from interference. Coaxial cable for local area network (LAN)
connections is obsolete. Coaxial cable is being used in some cases for delivering the last mile
of service. For e.g., coaxial cables are being used by Cable TV networks to deliver high-speed
service customer premises.
Unshielded Twisted Pair
ASSIGNMENT 25
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING
UTP cable is the most common.
Unshielded twisted pair cabling, or UTP cabling, is the most common type of network
cabling. It consists of four twisted pairs of wire, each with a different number of twists per
foot, all encased on one sheath. UTP cabling is graded according to category. Category 3 and
4 were replaced by Category 5 cabling by the year 2000. Category 5 is recommended for
running Ethernet at speeds of 100 Mbps. Category 5e, was introduced to run gigabit
Ethernet or 1000BaseT networks. Category 6 and Category 6a have since been introduced to
give better performance at higher speeds. UTP cabling has an intrinsic impedance of 100
ohms.
Shielded Twisted Pair
ASSIGNMENT 26
Document Page
NETWORKING
FTP or ScTP has a metal back to ground the shield.
There are two types of shielded twisted pair wiring. In the 1980s and 1990s shielded twisted
pair was promoted as the best wire type for Token Ring networks. This had an intrinsic
impedance of 150 ohms. A new wiring trend is to use 100 ohm shielded twisted pair. The
shielding reduces noise and increases the performance of the cable. These are sometimes
called foiled twisted pair, or FTP (not to be confused with file transfer protocol) or
sometimes called screened twisted pair, or ScTP. These types of cables are compatible with
normal UTP.
Multi Mode Fiber Optic Cable
Fiber optic cable is sometimes called wave guide or light guide because it guides the light
waves along the length of the cable. Multi mode fiber is used for short cable runs, usually 1.6
mi (approximately 2 km) or less.
Single Mode Fiber Optic Cable
ASSIGNMENT 27
Document Page
NETWORKING
Single mode fiber optic cable can operate over much longer distances. Because the fiber only
allows one mode of light to propagate, light pulses put on the fiber keep their shape much
longer. This allows the light pulses to travel much further without interfering with other
pulses. Single mode fibre is recommended for cable runs in excess of 1.6 mi.
2. Software
Network operating system. This is a software that allows numerous computers to
communicate, share files and hardware devices with one another. Previous versions of
Microsoft Windows and Apple operating systems were not designed for single computer
usage and not network usage.
Virus Checker-
This a component of an antivirus software package that scans a hard drive for viruses and
other harmful items, These programs are made for various operating systems, and scanning
methods can be manual or a\automatic example of this anti-virus programs are Kaspersky,
Vast Antivirus.
Firewall-
A firewall is software used to keep the security of a private network. Firewalls block
unauthorized access to or from private networks and are often employed to prevent
unauthorized Web users or illicit software from gaining access to private networks
ASSIGNMENT 28
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING
connected to the Internet. For example, firewalls are normally used in schools and colleges
to block students from accessing some sites.
Commercial Systems-
Commercial software í any software or program that is intended and developed for licensing
or sale to end users or that assists a commercial purpose. Commercial software was once
considered to be branded software, but now a number of free and opensource software
applications are licensed or sold to end users. There are various commercial systems here
are few examples: Windows, Linux, Mac OS, Server OS.
The server operating system is the software layer of which other programs or applications,
can run on the server hardware. Server operating systems helps enable typical server roles
such as Web server, Mail server, File server, Database server, application server and print
server.
System Bus-
The system bus is a pathway composed of cables and connectors used to transmit data
between a computer microprocessor and the main memory. The bus provides a
communication path for the data and control signals moving between the major
components of the computer system. The system bus works by combining the functions of
the three main buses: namely, the data, address and control buses. Each of the three buses
has its separate characteristics and responsibilities.
The system bus combines the functions of the three main buses, which are as follows:
1. The control bus carries the control, timing and coordination signals to manage the
various functions across the system.
2. The address bus is used to specify memory locations for the data being transferred.
3. The data bus, which is a bidirectional path, carries the actual data between the
processor, the memory and the peripherals. Examples of system bus low pin count,
IEEE196, IEEE-488 and high-performance parallel interface.
Local System Architecture
Memory: a memory stores the data in the system or the network which relies on the power
and sending this data to different components in the computer like the network card.
Without the memory one will not be able to store any data in the system and data will be
displayed in the system.
Examples of memories are: RAM and ROM
ASSIGNMENT 29
Document Page
NETWORKING
Processor: this is an integrated electronic circuit that executes the calculations for running
the computer, does the arithmetic and the other functions executed by the OS. Without the
processor the following tasks cannot be done: Clock speed Capability to route instructions in
a certain time.
Examples of processor: Xeon, Intel Core I7 and I/O devices: an input output device are used
for communicating with the computer where one is able to send and receive data from the
computer.
Without the I/O devices one will not be able to access any data or operate in the system
Examples of I/O device: Modem, Network adapter, Hard drives and touch screen.
M2 Explore a range of server types and justify selection of server considering a
given scenario
A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to help the files that
form Web pages to users, in reply to their requests, which are promoted by their computers
HTTP clients. Devoted computers and appliances may be referred to as Web servers as well.
File server is a device that panels access to separately stored files, as part of a multiplier
system, a file server Is a computer attached to a network that has the primary purpose of
providing a location for shared disk access.
Database server It is similar to data warehouse where the website stores or keeps their data
and information. A Database Server is a computer in a LAN that is devoted to database
storage and recovery. The database server holds the Database Management System (DBMS)
and the databases. Upon requests from the client machines, it searches the database for
selected records and passes them back over the network.
ASSIGNMENT 30
Document Page
NETWORKING
Virtualization server is a virtualization method that includes dividing a physical server into a
number of small, virtual servers with the help of virtualization software. In server
virtualization, each virtual server runs multiple operating system instances at the same time.
Terminal service server also occasionally called a communication server, is a hardware
device or server that provides terminals, such as PCs, printers, and other devices, with a
mutual connection point to a local or wide area network (WAN).
Terminal services server a hardware device or server that allows one or more terminals to
connect to a local area network (LAN) or the Internet without the need for each terminal to
have a network interface card (NIC) or modem. Terminals can be PCs, printers, IBM 3270
emulators, or other devices with an RS-232/RS-423 serial port interface.
I would choose the database server for the chosen scenario because Database Server gives
new meaning to the word performance in the client/server world. Performance
developments are achieved primarily by reducing network traffic, intelligently maintaining
database files, and providing intelligent lock management. When associated to other leading
server solutions, Advantage Database Server offers exceptional performance without the
overhead associated with other SQL database management systems. The cost will be it will
cost around $499 dollars and the reason why I choose a database server is because for the
given scenario being a college having a database server will be helpful for looking for student
records. The Operating system requirement for the database server is:
ï‚· English Windows 2003
ï‚· English Windows 2008
ï‚· English Windows 2008 R2
ï‚· English Windows Server 2012 R2
ï‚· Linux
Supported Database management systems.
Microsoft SQL Server 2012 SP2
ASSIGNMENT 31
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING
Microsoft SQL Server 2008 R2 SP2
Microsoft SQL Server 2005 R2 SP2
32-bit and 64-bit English Microsoft SQL Server 2008, standard and enterprise editions.
32-bit and 64bit Oracleâ„¢ 10g Release 2 (10.2.0.2 and higher), standard and enterprise
edition.
32-bit and 64-bit Oracle 11g Release 1 and Release 2, standard and enterprise edition.
Performance evaluation
Each group will define a performance evaluation problem in their thesis projects or ongoing
research projects and apply methodologies in the course to analyze the problem. If it is
impossible for a group to find an appropriate problem, the group will give a talk about a
topic or a research paper closely related to performance evaluation in networking.
Each group will define a performance evaluation problem in their ongoing research projects
and apply methodologies in the course to analyze the problem. The outcome of this project
assignment should be excellent enough to be publishable in academic venues (conference &
journal). If it is impossible for a group to find an appropriate problem, each student will give
a talk about a topic or a research paper closely related to performance evaluation in
networking.
Conclusion
In conclusion, a network is two or more computers connected together using a
telecommunication system for the purpose of communicating and sharing resources.
Without having a network, Companies would not be able to share resources and increase
productivity more effectively. The WAN network allowed companies to use the Internet over
large areas. This provided the company to have meetings overseas by video conferencing
and sharing data over the network. As you can see, Networks have many benefits to the end
user. Weather your Network is Wired or Wireless, Networks are an important part of
technology.
Critical evaluation
Information Technology (IT) is a rapidly-developing discipline. IT instructors often design new
courses to meet changing needs. There is also a need to evaluate courses once they have
been designed and implemented. Evaluation of courses leads to improvements in the
learning experiences for students and better understanding of the educational process and
outcomes for course designers and instructors. Evaluation and improvement of quality is a
requirement for programs accredited under ABET (and other accrediting bodies).
ASSIGNMENT 32
Document Page
NETWORKING
A networking class in IT was selected for evaluation. Networking was selected because it is
one of the core required topics in the IT curriculum. The course was compared to national
standards for curriculum in the networking area. A single class was evaluated but methods
were developed which can be applied to other courses in the IT discipline. The evaluation
study included evaluation of the course content and the course structure. Student input was
obtained through a survey instrument and the validity of the input was considered.
References
Available at: ComputerNetworkingNotes. (2018). Full Form of Hardware and Networking
Devices.
[online] Available at: https://www.computernetworkingnotes.com
point, t., n.d. [Online] Available at: ComputerNetworkingNotes. (2018). Computer
Networking Devices Explained with Function. [online] Available at:
https://www.computernetworkingnotes.com/networking-tutorials/computer-networking-
devicesexplained-with-function.html
ASSIGNMENT 33
chevron_up_icon
1 out of 33
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]