Assignment-NW - BASIC ASSIGNMENT PDF

Title Assignment-NW - BASIC ASSIGNMENT
Course ITSS Embedded Linux
Institution Trường Đại học Bách khoa Hà Nội
Pages 35
File Size 1 MB
File Type PDF
Total Downloads 369
Total Views 574

Summary

PROGRAM TITLE: ................................................... UNIT TITLE: Network InformationASSIGNMENT NUMBER: Assignment 1ASSIGNMENT NAME: ........................................... SUBMISSION DATE: ..............................................DATE RECEIVED: ...................................


Description

PROGRAM TITLE: …………………………………………… UNIT TITLE: Network Information ASSIGNMENT NUMBER: Assignment 1 ASSIGNMENT NAME: ……………………………………. SUBMISSION DATE: ………………………………………. DATE RECEIVED: ……………………………………………. TUTORIAL LECTURER: …………………………………… WORD COUNT: ……………………………………………..

STUDENT NAME: BUI THI HOAI STUDENT ID: BKC18310 MOBILE NUMBER: 0964762045

Summative Feedback:

Internal verification:

Contents A. INTRODUCTION..................................................................................................................4 B. CONTENT..............................................................................................................................5 I.

Definition networking:.......................................................................................................5 1.

Types of Networks in Use Today......................................................................................5

2.

Constraint Network...........................................................................................................8

II. Types of Topology...............................................................................................................11 1.

Mesh Topology................................................................................................................11

2.

Star Topology..................................................................................................................13

3.

The impact of current network technology, communication and standards:..................17

III. M1: Compare common networking principles and how protocols enable the effectiveness of networked systems.........................................................................................21 IV. Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter). .23 1.

Repeater..........................................................................................................................23

2.

Hub..................................................................................................................................24

3.

Server Types....................................................................................................................27

V. (P4) Discuss the inter-dependence of workstation hardware with relevant networking software.....................................................................................................................................29 1.

What is workstation hardware?.......................................................................................29

2.

What is networking software?.........................................................................................30

3.

What is the inter-dependence of workstation hardware with relevant networking

software?................................................................................................................................30

A. INTRODUCTION Networking is referred as connecting computers electronically for the purpose of sharing information. Resources such as files, applications, printers and software are common information shared in a networking. The advantage of networking can be seen clearly in terms of security, efficiency, manageability and cost effectiveness as it allows collaboration between users in a wide range. Basically, network consists of hardware component such as computer, hubs, switches, routers and other devices which form the network infrastructure. These are the devices that play an important role in data transfer from one place to another using different technology such as radio waves and wires. There are many types of network available in the networking industries and the most common network are Local Area Network (LAN) and Wide Area Network (WAN). LAN network is made up of two or more computers connected together in a short distance usually at home, office buildings or school. WAN is a network that covers wider area than LAN and usually covers cities, countries and the whole world. Several major LAN can be connected together to form a WAN. As several devices are connected to network, it is important to ensure data collision does not happen when this devices attempt to use to detect and prevent collision in networks.

B. CONTENT LO1 Examine networking principles and their protocols. P1. Discuss the benefits and constraints of different network types and standards I. Definition networking: Networking is the exchange of information and ideas among people with a common profession or special interest, usually in an informal social setting. Networking is used by professionals to expand their circles of acquaintances, to find out about job opportunities in their fields, and to increase their awareness of news and trends in their fields or in the greater world. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. 1. Types of Networks in Use Today



Personal Area Network (PAN) The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building. These types of networks are typically found in small offices or residences, and are managed by one person or organization from a single device.



Local Area Network (LAN) We’re confident that you’ve heard of these types of networks before– LANs are the most frequently discussed networks, one of the most common, one of the most original and one of the simplest types of networks. LANs connect groups of computers and low-voltage devices together across short distances (within a building or between a group of two or three buildings in close proximity to each other) to share information and resources. Enterprises typically manage and maintain LANs. Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data. -



LAN works with TCP / IP protocol.

Wireless Local Area Network (WLAN)

Functioning like a LAN, WLANs make use of wireless network technology, such as WiFi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network.



Campus Area Network (CAN) Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of networks are typically seen in universities, large K-12 school districts or small businesses. They can be spread across several buildings that are fairly close to each other so users can share resources.



Metropolitan Area Network (MAN) These types of networks are larger than LANs but smaller than WANs – and incorporate elements from both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a campus). Owner ship and maintenance is handled by either a single person or company (a local council, a large company, etc.)



Wide Area Network (WAN) Slightly more complex than a LAN, a WAN connects computers together across longer physical distances. This allows computers and low-voltage devices to be remotely connected to each other over one large network to communicate even when they’re miles apart. The Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple administrators or the public. -



The protocol used mainly in the WAN is TCP / IP protocol.

Storage-Area Network (SAN) As a dedicated high-speed network that connects shared pools of storage devices to several servers, these types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away from the network and place them into their own highperformance network. SANs can be accessed in the same fashion as a drive attached

to a server. Types of storage-area networks include converged, virtual and unified SANs.



Passive Optical Local Area Network (POLAN) As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into structured cabling to overcome concerns about supporting traditional Ethernet protocols and network applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses optical splitters to split an optical signal from one strand of single mode optical fiber into multiple signals to serve users and devices.



Enterprise Private Network (EPN) These types of networks are built and owned by businesses that want to securely connect its various locations to share computer resources



Virtual Private Network (VPN) By extending a private network across the Internet, a VPN lets its users send and receive data as if their devices were connected to the private network – even if they’re not. Through a virtual point to point connection, users can access a private network remotely.

2. Constraint Network A constraint network is a formulation of an instance of the constraint satisfaction

-

problem(CSP)which is at the core of constraint programming. In a discrete instance, the domains, which are the sets of allowed values of variables, are finite. The discrete constraint satisfaction problem is not known to admit polynomial running time algorithms to solve its instances. a) The Advantages of Networking



Information sharing o The depth of knowledge and experience from a group of people can be staggering. Networking will provide many opportunities to ask questions and receive feedback. Discussing other points of view really expands your knowledge base, and allows you to see things from a broader perspective. Learning from other’s “best practices” saves time, energy and resources.



Connections o When opportunity “knocks” you want to be in a position to take advantage of it. Many times there is a need for information-sharing, joint ventures, partnerships, and even needs for services. Having a wide network of individuals to contact may be the difference in seizing the moment or missing it completely.



Promotion o Whether promoting yourself or your organization, having a large network may assist you in moving your career forward, promoting a new product launch, or driving new members to your organization. “Word of mouth” is still one of the best forms of advertising. Spreading good information about you or your organization may provide leads for career advancement or organization growth.



Credibility o Improving your reputation and finding support are also benefits of networking. If you are successful at networking, you might get a reputation for being a person people will want to talk to and get to know. A good reputation leads to support. You may have valuable information, ideas, and resources those in your network may need. Establishing your desire to assist a colleague increases your credibility.

 -

Self Esteem Making new friends and socializing is an important aspect of our human nature. Developing new relationships leads to higher self esteem and confidence. By taking the steps to improving yourself and connecting to people you are moving your career forward. Your confidence will continue to grow as you become more comfortable with networking. Confidence draws people to you and opens up the opportunity to gain more information for yourself and share information with others.

a. Protocol A protocol is a standard set of rules that allow electronic devices to communicate with each other. These rules include what type of data may be transmitted, what commands are used to send and receive data, and how data transfers are confirmed.

b. Internet Protocol Suite The Internet protocol is to gather traffic protocols that perform a stack protocol which runs on the Internet. The Internet protocol sometimes referred to as a TCP/IP protocol, after TCP/IP, to mention the important protocols in which, Transmitting protocol (TCP) and Internet protocol(IP). The Internet protocol can be described by the same description as the OSI model, but there are some different, not all the corresponding layers.

Table1 Common Protocol Used and Their Ports:

Port 20, 21 22 23 25 50, 51 53 67, 68 69 80 110 119 123 135-139 143 161, 162 389 443 3389

Service name File Transfer Protocol(FPT)

Transport protocol TCP

Secure Shell (SSH) Telnet Simple Mail Transfer Protocol (SMTP) IP Sec Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Trivial File Transfer Protocol (TFTP) Hyper Text Transfer Protocol (HTTP) Post Office Protocol (POP3) Network News Transport Protocol (NNTP) Network Time Protocol (NTP) NetBIOS Internet Message Access Protocol (IMAP4) Simple Network Management Protocol (SNMP) Lightweight Directory Access Protocol HTTP with Secure Sockets Layer (SSL) Remote Desktop Protocol

TCP and UDP

TCP TCP TCP and UDP UDP UDP

TCP TCP TCP UDP TCP and UDP TCP and UDP TCP and UDP TCP and UDP TCP and UDP TCP and UDP

P2: Explain the impact of network topology, communication and bandwidth requirements Geometric representation of how the computers are connected to each other is known as topology. There are five types of topology – Mesh, Star, Bus, Ring and Hybrid.

II. Types of Topology There are five types of topology in computer networks

1. Mesh Topology

In mesh topology each device is connected to every other device on the network through a dedicated point-to-point link. When we say dedicated it means that the link only carries data for the two connected devices only. Let say we have n devices in the network then each device must be connected with (n-1) devices of the network. Number of links in a mesh topology of n devices would be n(n-1)/2.

Advantages of Mesh topology



No data traffic issues as there is a dedicated link between two devices which means the link is only available for those two devices.



Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the communication between other devices on the network.



Mesh topology is secure because there is a point to point link thus unauthorized access is not possible.



Fault detection is easy. Disadvantages of Mesh topology



Amount of wires required to connected each system is tedious and headache.



Since each device needs to be connected with other devices, number of I/O ports required must be huge.



Scalability issues because a device cannot be connected with large number of devices with a dedicated point to point link.

2. Star Topology

In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a device must have to communicate through hub. If one device wants to send data to other device, it has to first send the data to hub and then the hub transmit that data to the designated device. Advantages of Star topology 

Less expensive because each device only need one I/O port and needs to be connected with hub with one link.



Easier to install



Less amount of cables required because each device needs to be connected with the hub only.



Robust, if one link fails, other links will work just fine.



Easy fault detection because the link can be easily identified.

Disadvantages of Star topology 

If hub goes down everything goes down, none of the devices can work without hub.



Hub requires more resources and regular maintenance because it is the central system of star topology.

a. Bus Topology

In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There is a device called tap that connects the drop line to the main cable. Since all the data is transmitted over the main cable, there is a limit of drop lines and the distance a main cable can have. Advantages of bus topology 

Easy installation, each cable needs to be connected with backbone cable.



Less cables required than Mesh and star topology

Disadvantages of bus topology 

Difficultly in fault detection.



Not scalable as there is a limit of how many nodes you can connect with backbone cable.

b. Ring Topology

In ring topology each device is connected with the two devices on either side of it. There are two dedicated point to point links a device has with the devices on the either side of it. This structure forms a ring thus it is known as ring topology. If a device wants to send data to another device then it sends the data in one direction, each device in ring topology has a repeater, if the received data is intended for other device then repeater forwards this data until the intended device receives it. Advantages of Ring Topology 

Easy to install.



Managing is easier as to add or remove a device from the topology only two links are required to be changed.

Disadvantages of Ring Topology 

A link failure can fail the entire network as the signal will not travel forward due to failure.



Data traffic issues, since all the data is circulating in a ring.

c. Hybrid topology

A combination of two or more topology is known as hybrid topology. For example a combination of star and mesh topology is known as hybrid topology. Advantages of Hybrid topology 

We can choose the topology based on the requirement for example, scalability is our concern then we can use star topology instead of bus technology.



Scalable as we can further connect other computer networks with the existing networks with different topologies.

Disadvantages of Hybrid topology 

Fault detection is difficult.



Installation is difficult.



Design is complex so maintenance is high thus expensive.

3. The impact of current network technology, communication and standards: OSPF: It is a routing protocol generally used for larger network either a single network or a group network. It is designed by Internet Engineering Task Force. It can also use as a Gateway Protocol. EX: To run OSPF on routers, we use the following command Router (config) # router ospf process-id Router (config-router) # network dia_chi_IP wildcard_mask area area_id Where: Process - id: number of progress The OSPF process runs on the router, only has a local meaning on the router. In order for a port to join OSPF, we "network" the network address of that port. For OSPF, we must use a wildcard - mask to get the correct subnet for routing. To calculate the value of the wildcard mask, subtract the subnet - mask value of 255.255.255.0 one octet from the value of 255.255.255.0, and each octet will be searched. This calculation is only true for a consecutive IP range, not for all cases.

Configure the OSPF of the router as follows: Configure the R1 router: use OSPF R1 (config) #router ospf 1


Similar Free PDFs