Documentos de Académico
Documentos de Profesional
Documentos de Cultura
When submitting evidence for assessment, each student must sign a declaration confirming that
the work is their own.
Issue date: 25 June 2020 Submission date: 16 July Submitted on: 22 Jul. 20
2020
Unit: 2 Networking
Assignment number and title: 1 of 2: Demonstrate Presentation, Planning, Teamwork, self-analysis and
personal development planning skills. (For Industrial Attachment Students)
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students
who break the rules, however innocently, may be penalised. It is your responsibility to ensure
that you understand correct referencing practices. As a university level student, you are
expected to use appropriate references throughout and keep carefully detailed notes of all your
sources of materials for material you have used in your work, including any material
downloaded from the Internet. Please consult the relevant unit lecturer or your course tutor if
you need any further advice.
Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
1. Network.....................................................................................3
2. Network Types.............................................................................3
3. Network Standards........................................................................6
4. Network Topology.........................................................................9
5. Networking Devices.....................................................................15
6. Server & Its Types.......................................................................18
7. Interdependence of Networking Hardware & Software.............................21
Unit 2 – Networking Assignment 1
1. Network
Computer Network is a collection of computers linked by cables,
separate links or optical fibres, so that several different machines on the
same network can communicate with each other.
2. Network Types
Computer network mainly has three types they are categorised
according to their size.
They are:
Local area networks are the most common type of network and the
simplest. It is a collection of computers connected within a short distance
to share information or resources using a means of communication such
as cables such as coaxial cables, twisted pairs etc.
3. Network Standards
The IEEE has many standards of which we are studying IEEE 802
standard.
IEEE 802
The Ethernet, Token Ring, Token Bus, and Wireless LAN (Wi-Fi) are the
most widely used protocols. In each field the emphasis is given by a
specific working party. The classes are numbered between 802.1 and
802.12.
1) Ethernet (802.3)
Token bus is a network that executes the protocol for token ring over a
virtual ring in LAN. The physical media has a topology for a bus or a tree
and connects using coaxial cables.
That node must know the address of its neighbouring node in the ring,
and it needs a protocol to warn the other nodes of connections and
disconnections from the ring.
4. Network Topology
Bus Topology
Star Topology
Types of
Topology Ring Topology
Mesh Topology
1) Bus Topology:
Uses:
Communication:
There is one single main cable in bus topology to which all the other
devices are connected. There are two terminals one on each end of the
backbone cable that absorbs the signal to ensure that the signal does not
reflect back. The cables used here are copper plated coaxial cables.
The data is sent through the main backbone cable and reaches the
destination by checking the address. When the data is sent it goes
through all the nodes but when it reaches a node, it checks for the
address. If the address matched the destination only then is the data
processed by the system.
Transmission Mode:
The transmission mode used in bus topology is the Half- Duplex. All
of the stations will send or receive data here but not at the same time.
When one station is sending data, others can only receive the data and is
same the other way around. What happens here is that when one station
is sending a message it waits for an empty data frame, when it gets that
it inserts a token that indicates transferring of data into the frame. Then
inserts the data to be sent with a destination identity on the data frame.
When the data reaches the destination address it is processed by the
system and then the data frame is empty for other stations to use.
2) Star Topology:
Uses:
Communication:
In star topology all the devices are connected to the main switch or
hub with an individual connection for each. When it comes to
communication there is a difference in the method while using switch or
hub. While using a switch when a computer is sending a message to
another computer, the message first goes to the switch which has a table
containing address of all devices known as Content Addressable Memory
(CAM) table. So, the switch will check the destination address and send
the message to that particular computer. While using a hub it does not
keep track of address as it has no own memory. So, it uses a protocol
known as Address Resolution Protocol where it asks all the connected
devices for their addresses and then sends the data to the matched
destination.
Transmission Mode:
In star topology the data transmission takes place where the hub or
switch has the main part as the devices in the network cannot transmit
the data directly to each other. The data is first transmitted to the main
central hub/switch then the central hub or switch transmits it to the
destination computer.
3) Ring Topology:
Uses:
They are often used in small offices, schools with less devices and
want low cost networks.
Communication:
Transmission Mode:
4) Mesh Topology:
Within a partial mesh topology only some of the network systems are
connected to each other.
In full mesh topology, all the network systems are connected to one
another.
Uses:
Communication:
A basic mesh network uses a flood system, where the data flows
continuously across the network. When a computer sees data with its
address it will automatically pick up the file. It functions because of the
Time to Live (TTL), a property where signals can only transfer hops across
the mesh until they are removed.
Transmission Mode:
In Mesh Topology, devices can transmit data in all the Simplex, Half
Duplex and the Full Duplex mode because multipoint connections are
used in mesh and the other topologies use point to point connection to
transmit data across the network.
5. Networking Devices
Networking devices or equipment are the devices needed to
interact, communicate, and mediate the transmission of data between
different devices on a network.
Hubs:
They are the most basic device in networking that are used to connect
multiple ethernet devices together. It has the least intelligence as it does
not have routing tables. Hubs can mostly detect errors like a collision. It
just broadcasts information to all the ports.
Hubs are not used that much these days as it can create bottlenecks
and security issues. They were popular in the past because of being cheap
than a router or switch.
Types of Hubs:
Active Hubs:
This type of hub is used for renewing and amplifying the signals. They
consume electricity while working.
Passive Hubs:
This type of hub is used for getting the signal that is coming from the
previous ports and just distributing it ahead. It does not amplify or renew
the signal hence does not need electricity.
Intelligent Hubs:
Working of a Hub:
On receiving the data frame sent by the host, the hub simple forwards
it to all the ports. Although it forwards the frame to all the ports, a station
only agrees to take the ones whose MAC address matches the MAC
address of the destination and all the rest data frames are discarded.
Switches:
Working of a Switch:
Switches work similar to the hub but the major difference in the way
the packets of data are handled. They are smart as they have memory in
which hardware address table is maintained. In a switch when data is
received it determines the target destination and then sends it directly to
that device meaning that bandwidth is conserved making the network
more efficient.
Routers:
Routers are the devices of the network layer where the data is known
as packets. They forward packets for one network to another rather than
only on local computers. Routers are common in houses and business as
they are the one that connect our network to other as well as the
internet. They maintain a routing table containing the IP address of the
next network with the help of which packet routing is maintained.
Types of Router:
Working of a Router:
routing table with the help of which it finds out that a packet is received
and to which network the packet should be sent.
Types of Servers:
a) Application Servers:
1) DHCP Server –
2) DNS Server –
b) Virtualized Servers:
1) Hypervisor Server –
2) Cloud-based Server –
c) Physical Servers:
1) On Premises -
Network Cabling:
Twisted Pair cables – Two types of twisted pair cable exist: shielded
and unshielded. Usually twisted pair cable is used by many ethernet
networks. These 'wires’ are made of four sets of thin wires located within
the cable's insulation or outer sheath. Each pair gets twisted through a
few more twists. These twists are designed to avoid interference from
other nearby devices and other cables.
therefore the method of choice for just about any device which sends
massive quantities of information.
Network Servers:
A single server may support multiple clients, and multiple servers can
be used by one single client. A client process can run on the same
computer, or link to a server on another computer through a network. A
server is designed to monitor, store, transmit, and process data 24 hours
a day, requiring greater durability than a desktop computer, and offering
a range of software and equipment not usually found in the traditional
desktop computer.
Networking Software:
It would also make it possible for the client machines to reach the
memory that is shared and the services administered by the server
system. That's the operating system on the Network. Is specifically
designed to allow several clients to exchange documents and programs
across a network. These are two main forms of operating system:
Protocol Suite:
1. Application layer
2. Presentation layer
3. Session layer
4. Transport layer
5. Network layer
6. Data link layer
7. Physical layer
b. TCP / IP Model:
The OSI model that we just discussed is just a logical construct. This
was structured by splitting the communication process into smaller and
simplified parts to define the functions of the communication system. So,
as we speak of the TCP / IP interface, it was planned and developed in the
1960s by the Defence Department (DoD), and is based on common
protocols. It stands for Transmission Control Protocol / Internet Protocol.
1. Application layer
2. Transport layer
3. Internet layer
4. Network Access layer
5. Physical layer
Network Communications:
Network Security:
iii. Firewalls:
They work differently from standard hard disk drives. There are no
moving pieces and a physical malfunction is less possible. You are faster
too. The downside is that they are more costly than "normal" drives and
have a reduced storage space.
2. Multi-core Processors:
To store and process the data it utilizes multiple internal hard drives.
There are various types of RAID systems. You can either have multiple
drives running the files, based on the type of device, or you can have
replicated drives, ensuring that if one drive crashes, the other drive will
always operate.
o Network Security –
o Workstation –
o Network Security –
o Network Cabling –
Bibliography