Ngo Hoang Luyen-Gcs200757
Ngo Hoang Luyen-Gcs200757
Ngo Hoang Luyen-Gcs200757
Student Name/ID
Ngo Hoang Luyen / GCS200757
Number:
Unit Number and
Unit 2: Networking
Title:
Academic Year: 2021 – 2022
Unit Assessor: Van Ho
Assignment Title: Networking Infrastructure
Issue Date: April 1st, 2021
Submission Date:
Internal Verifier
Name:
Date:
Submission Format:
Format:
Submission
● Students are compulsory to submit the assignment in due date and in a way
requested by the Tutor.
● The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/.
● Remember to convert the word file into PDF file before the submission on CMS.
Note:
● The individual Assignment must be your own work, and not copied by or from
another student.
● If you use ideas, quotes or data (such as diagrams) from books, journals or other
sources, you must reference your sources, using the Harvard style.
● Make sure that you understand and follow the guidelines to avoid plagiarism.
Failure to comply this requirement will result in a failed assignment.
Task 1
The CEO of the company, Mr. Nguyen, has asked you to investigate and explain
networking principles, protocols and devices and submit a report.
Learning
Pass Merit Distinction
Outcome
P1. Discuss the benefits and constraints of different network types and standards.
In the today world, Two devices are in network if a process in one device is able to exchange information
with a process in another device. Networks are known as a medium of connections between nodes (set of
devices) or computers. A network consists of group of computer systems, servers, networking devices are
linked together to share resources, including a printer or a file server. The connections is established by
using either cable media or wireless media.
What are the benefits and constraints of different network types and standards?
Network
Normal Complex Complex
administration
There are two approaches to network topology: physical and logical. Physical network topology, as
the name suggests, refers to the physical connections and interconnections between nodes and the
network—the wires, cables, and so forth. Logical network topology is a little more abstract and
strategic, referring to the conceptual understanding of how and why the network is arranged the
way it is, and how data moves through it.
Building a local area network (LAN) topology can be make-or-break for your business, as you
want to set up a resilient, secure, and easy-to-maintain topology. There are several different types
of network topology and all are suitable for different purposes, depending on the overall network
size and your objectives.
❖ Star Topology
A star topology, the most common network topology, is laid out so every node in the network is directly
connected to one central hub via coaxial, twisted-pair, or fiber-optic cable. Acting as a server, this central
node manages data transmission—as information sent from any node on the network has to pass through
the central one to reach its destination—and functions as a repeater, which helps prevent data loss.
Star topologies are common since they allow you to conveniently manage your entire network from a
single location. Because each of the nodes is independently connected to the central hub, should one go
down, the rest of the network will continue functioning unaffected, making the star topology a stable and
secure network layout.
Additionally, devices can be added, removed, and modified without taking the entire network offline.
On the physical side of things, the structure of the star topology uses relatively little cabling to fully
connect the network, which allows for both straightforward setup and management over time as the
network expands or contracts. The simplicity of the network design makes life easier for administrators,
too, because it’s easy to identify where errors or performance issues are occurring.;
On the flipside, if the central hub goes down, the rest of the network can’t function. But if the central hub
is properly managed and kept in good health, administrators shouldn’t have too many issues.
The overall bandwidth and performance of the network are also limited by the central node’s
configurations and technical specifications, making star topologies expensive to set up and operate.
❖ Bus Topology
A bus topology orients all the devices on a network along a single cable running in a single direction from
one end of the network to the other—which is why it’s sometimes called a “line topology” or “backbone
topology.” Data flow on the network also follows the route of the cable, moving in one direction.
Bus topologies are a good, cost-effective choice for smaller networks because the layout is simple,
allowing all devices to be connected via a single coaxial or RJ45 cable. If needed, more nodes can be
easily added to the network by joining additional cables.
However, because bus topologies use a single cable to transmit data, they’re somewhat vulnerable. If the
cable experiences a failure, the whole network goes down, which can be time-consuming and expensive to
restore, which can be less of an issue with smaller networks.
Bus topologies are best suited for small networks because there’s only so much bandwidth, and every
additional node will slow transmission speeds.
Furthermore, data is “half-duplex,” which means it can’t be sent in two opposite directions at the same
time, so this layout is not the ideal choice for networks with huge amounts of traffic.
❖ Dual-Ring Topology
● ery orderly network where every device has access to the token and the opportunity to transmit
● Performs better than a bus topology under heavy network load
● Does not require a central node to manage the connectivity between the computers
● Due to the point to point line configuration of devices with a device on either side (each device is
connected to its immediate neighbor), it is quite easy to install and reconfigure since adding or
removing a device requires moving just two connections.
● Point to point line configuration makes it easy to identify and isolate faults.
● Reconfiguration for line faults of bidirectional rings can be very fast, as switching happens at a
high level, and thus the traffic does not require individual rerouting.
Combining elements of the star and bus topologies allows for the easy addition of nodes and
network expansion. Troubleshooting errors on the network is also a straightforward process, as
each of the branches can be individually assessed for performance issues.
As with the star topology, the entire network depends on the health of the root node in a tree
topology structure. Should the central hub fail, the various node branches will become
disconnected, though connectivity within—but not between—branch systems will remain.
Because of the hierarchical complexity and linear structure of the network layout, adding more
nodes to a tree topology can quickly make proper management an unwieldy, not to mention costly,
experience. Tree topologies are expensive because of the sheer amount of cabling required to
connect each device to the next within the hierarchical layout.
❖ Mesh Topology
A mesh network is a network topology in which each node relays data for the network. All mesh nodes
cooperate in the distribution of data in the network. It can be applied to both wired and wireless networks.
● Data can be transmitted from different devices simultaneously. This topology can withstand high
traffic.
● Even if one of the components fails there is always an alternative present. So data transfer doesn’t
get affected.
● Expansion and modification in topology can be done without disrupting other nodes.
Data communication refers to the exchange of data between a source and a receiver via form of
transmission media such as a wire cable. Data communication is said to be local if communicating devices
are in the same building or a similarly restricted geographical area. The meanings of source and receiver
are very simple. The device that transmits the data is known as source and the device that receives the
transmitted data is known as receiver. Data communication aims at the transfer of data and maintenance of
the data during the process but not the actual generation of the information at the source and receiver.
What is bandwidth?
Bandwidth is the difference between the upper and lower frequencies in a continuous set of frequencies. It
is typically measured in hertz, and may sometimes refer to passband bandwidth, sometimes to baseband
bandwidth, depending on context. Passband bandwidth is the difference between the upper and lower
cutoff frequencies of, for example, a bandpass filter, a communication channel, or a signal spectrum. In
case of a low-pass filter or baseband signal, the bandwidth is equal to its upper cutoff frequency.
Bandwidth in hertz is a central concept in many fields, including electronics, information theory, digital
communications, radio communications, signal processing, and spectroscopy. A key characteristic of
bandwidth is that any band of a given width can carry the same amount of information, regardless of
where that band is located in the frequency spectrum. For example, a 3 kHz band can carry a telephone
conversation whether that band is at baseband or modulated to some higher frequency.
● Types of Bandwidth:
Symmetric Bandwidth
Symmetric bandwidth refers to the same volume and speeds the amount of data is communicated or
travels between two given points. Uploading and downloading of files will have the same capacity –
symmetrical. Symmetric communication can be seen in the different cities in the world through fiber
optics and cable internet. The best example of symmetric bandwidth connection application is video
conferencing. You can enjoy buffer-free transfer of video files with this type of connection.
Asymmetric Bandwidth
In this type, unlike symmetrical, both directions do not have the same amount of data communicated per
second. The upstream data transfer is lower than the downstream data flow. This is called the
Asymmetrical Digital Subscriber Line (ADSL) and is the perfect example of this type of bandwidth. The
download speed of an ADSL is much higher than upload speed mainly because downloading files and
media are the most used than uploading which only needs to send a request to access the URLs.
A. networking devices
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal
over the same network before the signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the same network. An important point to
be noted about repeaters is that they do not amplify the signal. When the signal becomes
weak, they copy the signal bit by bit and regenerate it at the original strength. It is a 2 port
device.
2. Hub – A hub is basically a multiport repeater. A hub connects multiple wires coming
from different branches, for example, the connector in star topology which connects
different stations. Hubs cannot filter data, so data packets are sent to all connected devices.
In other words, the collision domain of all hosts connected through Hub remains one. Also,
they do not have the intelligence to find out the best path for data packets which leads to
inefficiencies and wastage.
❖ Types of Hub
● Active Hub:- These are the hubs that have their own power supply and can clean,
boost, and relay the signal along with the network. It serves both as a repeater as well as
a wiring center. These are used to extend the maximum distance between nodes.
● Passive Hub :- These are the hubs that collect wiring from nodes and power supply
from the active hub. These hubs relay signals onto the network without cleaning and
boosting them and can’t be used to extend the distance between nodes.
● Intelligent Hub :- It works like active hubs and includes remote management
capabilities. They also provide flexible data rates to network devices. It also enables an
administrator to monitor the traffic passing through the hub and to configure each port
in the hub.
3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add on the
functionality of filtering content by reading the MAC addresses of source and destination.
It is also used for interconnecting two LANs working on the same protocol. It has a single
input and single output port, thus making it a 2 port device.
❖ Types of Bridges
● Transparent Bridges:- These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e. whether or not a bridge is added or deleted
from the network, reconfiguration of the stations is unnecessary. These bridges
make use of two processes i.e. bridge forwarding and bridge learning.
● Source Routing Bridges:- In these bridges, routing operation is performed by the
source station and the frame specifies which route to follow. The host can discover
the frame by sending a special frame called the discovery frame, which spreads
through the entire network using all possible paths to the destination.
4. Switch – A switch is a multiport bridge with a buffer and a design that can boost its
efficiency(a large number of ports imply less traffic) and performance. A switch is a data link layer
device. The switch can perform error checking before forwarding data, which makes it very
efficient as it does not forward packets that have errors and forward good packets selectively to the
correct port only. In other words, the switch divides the collision domain of hosts, but broadcast
domain remains the same.
5. Routers – A router is a device like a switch that routes data packets based on their IP addresses.
The router is mainly a Network Layer device. Routers normally connect LANs and WANs
together and have a dynamically updating routing table based on which they make decisions on
routing the data packets. Router divide broadcast domains of hosts connected through it
6. Gateway – A gateway, as the name suggests, is a passage to connect two networks together that may
work upon different networking models. They basically work as the messenger agents that take data from
one system, interpret it, and transfer it to another system. Gateways are also called protocol converters and
can operate at any network layer. Gateways are generally more complex than switches or routers. Gateway
is also called a protocol converter.
7. Brouter – It is also known as the bridging router is a device that combines features of both bridge and
router. It can work either at the data link layer or a network layer. Working as a router, it is capable of
routing packets across networks, and working as the bridge, it is capable of filtering local area network
traffic.
8. NIC – NIC or network interface card is a network adapter that is used to connect the computer to the
network. It is installed in the computer to establish a LAN. It has a unique id that is written on the chip,
and it has a connector to connect the cable to it. The cable acts as an interface between the computer and
router or modem. NIC card is a layer 2 device which means that it works on both physical and data link
layer of the network model.
B. server types
1. Application Servers
Sometimes referred to as a type of middleware, application servers occupy a large chunk of computing
territory between database servers and the end user, and they often connect the two.
2. Client Servers
In the client/server programming model, a server is a program that awaits and fulfills requests from client
programs in the same or other computers. A given application in a computer may function as a client with
requests for services from other programs and also as a server of requests from other programs.
3. Collaboration Servers
In many ways, collaboration software, once called ‘groupware,’ demonstrates the original power of the
Web. Collaboration software designed to enable users to collaborate, regardless of location, via the
4. FTP Servers
One of the oldest of the Internet services, File Transfer Protocol, makes it possible to move one or more
files securely between computers while providing file security and organization as well as transfer control.
5. List Servers
List servers offer a way to better manage mailing lists, whether they be interactive discussions open to the
6. Mail Servers
Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate
From your underlying open source server operating system to the server software that help you get your
8. Proxy Servers
Proxy servers sit between a client program (typically a Web browser) and an external server (typically
another server on the Web) to filter requests, improve performance, and share connections.
Real-time communication servers, formerly known as chat servers or IRC Servers, and still sometimes
referred to as instant messaging (IM) servers, enable large numbers users to exchange information near
instantaneously.
10. Server Platforms
A term often used synonymously with operating system, a platform is the underlying hardware or software
for a system and is thus the engine that drives the server.
A Telnet server enables users to log on to a host computer and perform tasks as if they’re working on the
In 2009, the number of virtual servers deployed exceeded the number of physical servers. Today, server
virtualization has become near ubiquitous in the data center. From hypervisors to hybrid clouds,
At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving
it across the network to a user’s Web browser. This entire exchange is mediated by the browser and server
Workstation hardware:
- This is a computer devoted to a user or group of users involved in business or professional work. It
contains one or more high resolution displays and a faster processor than a personal computer. A
workstation also has greater multitasking capability because of additional random access memory
(RAM), drives and drive capacity. A workstation may also have a higher speed graphics adapters
and more connected peripherals (plug).
Operating System:
- An operating system (OS) is system software that manages computer hardware, software
resources.It manages the computer's memory and processes, allows you to communicate with the
computer hardware.
Traditional Network:
- Is formed, when more than one computer is connected among each other, for the purpose of
communication among them. There are servers also present in a network, which provides many
data storage places. Servers in order to manage so many computers need an operating system.
When a request is received from computer, over the internet to the server, there are some
scheduling algorithms, which determines what or resource is to be given to which request. In this
way a software interacts, with the workstation hardware
Networking Sofware
- Networking software is a foundational element for any network. It helps administrators deploy,
manage, and monitor a network. Traditional networks are made up of specialized hardware, such as
routers and switches, that bundle the networking software into the solution. Software-defined networking
(SDN) separates that software from the hardware, making it easier to innovate and adapt the network to
quickly meet changing network demands. The separation of functions from hardware, such as firewalls or
load balancing, is called network functions virtualization (NFV).
- Network software allows multiple devices, such as desktops, laptops, mobile phones, tablets, and
other systems to connect to one another, as well as other networks. The internet is a prime example of a
globally connected system of servers and computers that relies on networking software to ensure
accessibility by end users.
S.No. SDN TRADITIONAL NETWORK
03
. This network is programmable. This network is non programmable.
- Mob
07 It can prioritize and block specific It leads all packets in the same way no ile
. network packets. prioritization support.
4. M1 Compare common networking principles and how protocols enable the effectiveness of
networked systems.
5. M2 Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimisation.
A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to help the files that form Web
pages to users, in reply to their requests, which are promoted by their computers' HTTP clients. Devoted
computers and appliances may be referred to as Web servers as well.
File server is a device that panels access to separately stored files, as part of a multiplier system, a file
server is a computer attached to a network that has the primary purpose of providing a location for shared
disk access.
Database server It is similar to data ware house where the website stores or keeps their data and
information. A Database Server is a computer in a LAN that is devoted to database storage and
recovery.The data base server holds the Database Management System (DBMS) and the databases. Upon
requests from the client machines, it searches the database for selected records and pases them back over
the network.
Virtualization server is a virtualization method that includes dividing a physical server into a number of
small, virtual servers with the help of virtualization software. In server virtualization, each virtual server
runs multiple operating system instances at the same time.
Terminal service server also occasionally called a communication server, is a hardware device or server
that provides terminals, such as PCs, printers, and other devices, with a mutual connection point to a local
or wide area network (WAN)
Terminal services server a hardware device or server that allows one or more terminals to
Connect to a local area network (LAN) or the Internet without the need for each terminal to
Have a net
work interface card(NIC) or modem. Terminals can be PCs, printers, IBM 3270 emulators ot
Her devices with a RS-232 / RS-423 serial port interface.
I would choose the database server for the chosen scenario because Database Server gives new
Meaning to the word performance in the client/server world. Performance developments are
achieved primarily by reducing network traffic, intelligently maintaining database files, and
providing intelligent lock management. When associated to other leading server solutions,
Advantage Database Server offers exceptional performance without the overhead associated with
other SQL-based database management systems. The cost will be it will cost around $499 dollars
and the reason why I choose a database server is because for the given scenario being a college
having a
Database server will be helpful for looking for student records. The Operating system requirement
for the database server is;
a) English Windows 2003
b) English Windows 2008
c) English Windows 2008 R2
d) English Windows Server 2012 R2
e) Linux
Supported Database management systems
Microsoft SQLServer2012SP2
Microsoft SQLServer2008R2SP2
Microsoft SQL Server 2005 R2SP2
32- bit and 64-bit English Microsoft SQL Server 2008, standard and enterprise editions
32-bit and 64-bit Oracle™ 10g Release 2 (10.2.0.2 and higher),standard and enterprise editions
32-bit and 64-bit Oracle 11g Release1 and Release 2,standard and enterprise edition Protocolo
6. D1 Considering a given scenario, identify the topology protocol selected for the efficient
utilization of a networking system.
A protocol is a set of rules and procedures for communicating data. Rules are defined for each step and
process during communication between two or more computers. Networks have to follow these rules to
successfully transmit data. The Ethernet is a local area network (LAN) set of protocols which serves the
physical and data 1 ink layers. Ethernet utilizes a linear bus or star topology. Ethernet served as the basis
for the IEEE 802.3 standard. The Ethernet deals with the low level Physical and Data Link Layers. The
Data Link Layer is divided into two sublayers: Logical Link Control (LLC). This sublayer establishes the
transmission paths between computers or devices on a network.
Media Access Control (MAC). On a network, the network interface card (NIC) has a unique hardware
address which identifies a computer or peripheral device. The hardware address is used for the MAC
sublayer addressing. Ethernet uses the MAC hardware addresses for the source and destination for each
packet transmitted. Ethernet uses CSMA/CD when transmitting packets. The Carrier Sense Multiple
Access with Collision Detection (CSMA/CD) is an algorithm for transmitting and receiving packets over a
common network hardware medium, by aiding in avoiding transmission collisions. The network is
checked for other transmissions; when the way is clear, the computer transmissions can begin. If a
collision is detected the packet is retransmitted later. The topology that I will use in the scenario will be
bus topology.
Reference
GraduateWay. 2021. Benefits And Constraints Of Different Networking Computer Science Example | GraduateWay.
[online] Available at: <https://graduateway.com/benefits-and-constraints-of-different-networking-computer-
science-essay/> [Accessed 26 August 2021].
Software Reviews, Opinions, and Tips - DNSstuff. 2021. What is Network Topology? Best Guide to Types &
Diagrams - DNSstuff. [online] Available at: <https://www.dnsstuff.com/what-is-network-topology> [Accessed 26
August 2021].
Jones IT | Managed IT Services, IT Support, IT Consulting. 2021. How To Design A Network Topology | Jones IT.
[online] Available at: <https://www.itjones.com/blogs/2020/11/22/a-guide-to-network-topology> [Accessed 26
August 2021].
Devices, N., 2021. Networking Devices | List of Top Networking Devices To Know. [online] EDUCBA. Available at:
<https://www.educba.com/networking-devices/> [Accessed 26 August 2021].
Techopedia.com. 2021. What is a Workstation (WS)? - Definition from Techopedia. [online] Available at:
<https://www.techopedia.com/definition/5140/workstation-ws> [Accessed 26 August 2021].
Igi-global.com. 2021. What is Mobile Technology | IGI Global. [online] Available at: <https://www.igi-
global.com/dictionary/mobile-strategy-business-solution/18956> [Accessed 26 August 2021].
Thakur, M., 2021. ESP8266 Web Server | Circuits4you.com. [online] Circuits4you.com. Available at:
<https://circuits4you.com/2016/12/16/esp8266-web-server/> [Accessed 26 August 2021].
High Performance Browser Networking. 2021. Networking 101: Transport Layer Security (TLS) - High Performance
Browser Networking (O'Reilly). [online] Available at: <https://hpbn.co/transport-layer-security-tls/> [Accessed 26
August 2021].