Professional Documents
Culture Documents
I. The Benefits and Constraints of Different Network Types and Standards: ................................ 2
A. Network Types ........................................................................................................................ 2
1. LAN ...................................................................................................................................... 2
2. WAN .................................................................................................................................... 3
3. Metropolitan Area Networks ............................................................................................... 3
4. Constraints of Networks in General: ................................................................................... 4
B. Network Standards ................................................................................................................. 4
1. Network Protocol Definition ................................................................................................ 4
2. Examples of Network Protocols .......................................................................................... 4
II. The Impact of Network Topology, Communication and Bandwidth Requirements ................. 4
1. Network topology .................................................................................................................... 4
1.1. Mesh Topology .................................................................................................................. 5
1.2. Star Topology .................................................................................................................... 5
1.3. Bus Topology ..................................................................................................................... 6
1.4. Ring Topology ................................................................................................................... 6
1.5. Tree Topology.....................................................................................................................7
1.6. Hybrid Topology ................................................................................................................7
2. Open System Interconnection (OSI) model .............................................................................7
3. TCP/IP Protocol ...................................................................................................................... 9
4. Communication & Bandwidth................................................................................................10
4.1. Rule of communication ....................................................................................................10
4.2. Impact of Bandwidth Requirement .................................................................................10
III. The Operating Principles of Networking Devices and Server Types ....................................... 11
1. The principles of networking devices ..................................................................................... 11
Bridge ..................................................................................................................................... 11
Repeater ................................................................................................................................. 12
Hub ......................................................................................................................................... 12
Switch ..................................................................................................................................... 12
Router ..................................................................................................................................... 13
Gateway ................................................................................................................................. 13
2. The principles of server types................................................................................................. 14
Dedicated Server: ................................................................................................................... 14
Virtual Private Server ............................................................................................................. 14
Cloud Server ........................................................................................................................... 14
IV. The Inter-Dependence of Workstation Hardware with Relevant Networking Software ........ 14
1. Workstation Hardware Definition .......................................................................................... 14
2. Networking Software Definition ............................................................................................ 14
3. Discussion of Inter-Dependence of Workstation Hardware with Relevant Networking
Software...................................................................................................................................... 14
V. Design a Network System .......................................................................................................... 15
1. User Requirement................................................................................................................... 15
2. Logical Design ........................................................................................................................ 15
3. Physical Design ...................................................................................................................... 16
4. Documentation....................................................................................................................... 16
Configure Servers ................................................................................................................... 16
Configure School Router: .......................................................................................................18
Configure floor switches: ........................................................................................................18
References ...................................................................................................................................... 19
Table of Figures
Figure 1. Example of LAN ............................................................................................................... 2
Figure 2. Example of WAN ............................................................................................................. 3
Figure 3. A MAN based on cable TV (Tanenbaum, 2002) ............................................................. 3
Figure 4. An example of Mesh topology ......................................................................................... 5
Figure 5. An example of Star topology ............................................................................................ 6
Figure 6. An example of Bus topology ............................................................................................ 6
Figure 7. An example of Ring topology ............................................................................................7
Figure 8. Example of Tree topology .................................................................................................7
Figure 9. Layers of TCP/IP (Dye, et al., 2008) ............................................................................... 9
Figure 10. OSI seven-layered network model and TCP/IP (Al-shawi, 2016) ................................10
Figure 11 ......................................................................................................................................... 11
Figure 12. Bridge ............................................................................................................................ 11
Figure 13. Repeater ........................................................................................................................ 12
Figure 14. Hub ............................................................................................................................... 12
Figure 15. Switch ............................................................................................................................ 13
Figure 16. Router ........................................................................................................................... 13
Figure 17. Gateway ......................................................................................................................... 13
I. The Benefits and Constraints of Different Network
Types and Standards:
A. Network Types
In the field of computer network, network is “A computer network is a group of computer
systems and other computing hardware devices that are linked together through
communication channels to facilitate communication and resource-sharing among a wide range
of users.”
The most common uses of computer network are:
o File sharing – is one of the most well-known use of computer network. User connect to the
network to share files and to access files share by other users inside the network. User can
also share files to network as a way to store it to access later.
o Resource sharing – not only files but also devices such as like printers, scanners and copiers
can be connected to a computer network to be used communally.
o Save business costs – setting up a network, if done securely, can help to cut down hardware
solution for file storage and also provide business users with communal use of paid
softwares.
There are various types of network and categorisation is made by examining their scope or scale
in the industry. Examples of the most common types of network are Local Area Network (LAN),
Wireless Local Area Network (WLAN), Wide Area Network (WAN), Personal Area Network
(PAN), etc. LAN and WAN were the first and fundamental catagories of area networks; other
types were designed in regarding to these first two network types. (Anon., n.d.)
1. LAN
Local Area Network is set up for using within a small geographical area.
LAN has been well-known for it providing of high connection speed. For example, Ethernet can
reach 10Mbps, Fast Ethernet can reach 100 Mbps and Gigabit Ethernet can even reach
1000Mbps.
LAN is cost-efficient and easy to set up as it requires only Ethernet cables, a network and not
advanced infrastructure for setting-up.
However, LAN is limited for using only in the area it is set up for and can’t be extended furthur.
2. WAN
Wide Area Network is set up for using in a large geographical area. Most WANs are combination
of multiple LANs connected together.
There is no limitation of how large of an area that WAN can cover. The biggest WAN is the
internet, which exemplify for the fact that WAN can be used to design all types of intricate
network.
However, setting up a WAN requires intricate and creative technological solutions. Hence, the
cost to own and maintain a private WAN is extremely expensive and the cost-efficient way to
have a WAN set up is to contact an ISP (internet service provider).
B. Network Standards
1. Network Protocol Definition
Network standards are called protocols. Each protocol consist of rules, procedures and formats
that govern network communications.
• Types of network topology: , Bus Network, Ring Network, Tree Network, Hybrid Network
Star network have advantages of simple network setup (as new nodes can be easily added while
still maintain integrity of all the network), centralised management and convinient troubleshooting.
Also, failure of one node brings no damage to the rest of network . However, this topology promote high
dependency on central device: performance of nodes extremely rely on that of central devices and more
note-worthily, failure of central device brings the whole network down.
The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
(Tanenbaum, 2002)
1. A layer should be created where a different abstraction is needed.
2. Each layer should perform a well-defined function.
3. The function of each layer should be chosen with an eye toward defining internationally
standardised protocols.
4. The layer boundaries should be chosen to minimize the information flow across the interfaces.
5. The number of layers should be large enough that distinct functions need not be thrown
together in the same layer out of necessity and small enough that the architecture does not become
unwieldy
1. Physical layer. This is the sending a signal along a wire, amplifying it if it gets weak, removing
noise etc. If the type of cable changes (we might want to reflect signals off a satellite or use fiber optics)
we need to convert one kind of signal into another. Each type of transmission might have its own accepted
ways of sending data (i.e. protocols).
2. Data link layer. This is a layer of checking which makes sure that what was sent from one end
of a cable to the other actually arrived. This is sometimes called handshaking. The Ethernet protocol is
layer 2, as is Token Ring. This level is labelled by Media Access Control (MAC) addresses.
3. Network layer. This is the layer of software which recognizes structure in the network. It
establishes global identity and handles the delivery of data by manipulating the physical layer. The
network layer needs to know something about addresses – i.e. where the data are going, since data might
flow along many cables and connections to arrive where they are going. Layer 3 is the layer at which IP
addresses enter.
4. Transport layer. The transport layer builds ‘packets’ or ‘datagrams’ so that the network layer
knows what is data and how to get the data to their destination. Because many machines could be talking
on the same network all at the same time, data are broken up into short ‘bursts’. Only one machine can
talk over a cable at a time so we must have sharing. It is easy to share if the signals are sent in short bursts.
This is analogous to the sharing of CPU time by use of time-slices. TCP and UDP protocols are encoded at
this layer.
5. Session layer. This is the part of a host’s operating system which helps a user program to set up
a connection. This is typically done with sockets or the RPC.
6. Presentation layer. How are the data to be sent by the sender and interpreted by the receiver,
so that there is no doubt about their contents? This is the role played by the external data representation
(XDR) in the RPC system.
7. Application layer. The program which wants to send data has its own protocol layer, typically a
command language encoding (e.g. GET, PUT in FTP or HTTP).
These layers are not always so clearly distinguished. Today, networking technologies at all levels
are mixing them up: routers and switches are merging layers 2 and 3, and routers that prioritize traffic
need to know what application is being transported, so that the information can be fed into layers 2 and
3 in order to provide guarantees on performance (Burgess, 2004).
3. TCP/IP Protocol
The TCP/IP model defines the four communication functions that protocols perform. TCP/IP is an
open standard, which means that one company does not control it. The rules and implementations of the
TCP/IP model were cooperatively developed by members of the industry using Request for Comments
(RFC) documents (Dye, et al., 2008). This table below shows the four layers of TCP/IP.
The TCP/IP model evolved faster than the OSI model and is now more practical in describing
network communication functions. The OSI model describes in detail functions that occur at the upper
layers on the hosts, while networking is largely a function of the lower layers. Figure {} shows comparison
between these two protocol models.
Figure 10. OSI seven-layered network model and TCP/IP (Al-shawi, 2016)
■ Identified sender and receiver: In a communication, sender and receiver need to identify each
other. Particularly in data communication, if sender and/or receiver don’t conform to this rule, data is
delivered to wrong destination and, which trigger confusion and miscommunication within the network/
If both sides participating in communication fail to assure that these rules are met, content of the
communication is highly at risk of being exposed.
Figure 11
Bridge
Bridge is a second class device in the OSI (Data Link Layer) model. Bridge is used to pair two
networks using the same protocol.
When a packet from a networked computer goes to another networked computer, the bridge
copies the packet and sends it to the destination network.
Bridge is transparent, which mean that it is unneccessary for computers belonging to different
networks to know the presence of Bridge to be able to communicate.
Hub
Hub is like a multi-port repeater (Hub has 4 to 24 ports). Hub enables signal input from one port
to be taken to all other ports.
There are two types of Hub: Active Hub and Smart Hub.
o Active Hub is a commonly used hub used to amplify incoming and outgoing signals at the
remaining ports, ensuring the required signal level.
o Smart Hub (Intelligent Hub) functions similarly to Active Hub, but has a built-in chip that
automatically detects errors in the network.
Switch
Switch is like a Bridge with multiple ports. Unlike Bridge having only two ports to link two networks
together, Switch is capable of connecting more depending on the number of ports.
Switch stores information about the network through the packets it receives from the network
and uses this information to build the Switch.
In data communications, the switch usually has two main functions: moving frames from source
to destination, and building switch boards.
Switch operates at much higher speed than Repeater and provides more functionality such as
the ability to create virtual LANs (VLANs).
Figure 15. Switch
Router
Router is 3-layer network device in the OSI model. Router connects two or more IP networks
together.
Routers can be connected to different types of networks, from high-speed local Ethernet to
slow-speed telephone lines.
However, Router is slower than Bridge because it needs more computing power to figure out
how to route packets, especially when networks are not connected at the same speed.
Routers are built exclusively on a protocol. Nowadays all commercial routers can handle many
types of protocols. However, the cost is higher.
Gateway
Gateway enables the connection of two networks using different protocols. Computers in these
protocols can connected to each other thank to Gateway.
Gateway not only distinguishes between protocols but also can distinguish applications such as
how users move email from one network to another, convert a remote session.
Cloud Server
is a server that combines many different physical servers and storage systems with
unmatched access speed to help servers run fast, stable, and minimize downtime. Cloud
server is built on cloud computing technology, so it's easy to upgrade each part of the
process without sacrificing server utilisation.
2. Logical Design
3. Physical Design
4. Documentation
Configure Servers
DNS Server:
Email Server:
Web Server:
Configure School Router:
Encapsulate data:
Enable DHCP and assign set of IPs to IP pools (repeat these steps for other data pools of
Student, Staff, Manager and NetAdmin):
References
Al-shawi, M., 2016. CCDA Study Guide. Indianapolis: Pearson Education, Inc..
Burgess, M., 2004. Principles of Network and System Administration. 2nd ed. New York: Wiley.
Dye, M. A., McDonald, R. & Rufi, A. W., 2008. Network Fundamentals: CCNA Exploration Companion
Guide. Indianapolis: Cisco Press.
Posey, B., 2016. Networking Basics: Part 4 - Workstations and Servers. [Online]
Available at: http://techgenix.com/Networking-Basics-Part4/
[Accessed 5 March 2019].