Está en la página 1de 30

STUDENT ASSESSMENT SUBMISSION AND DECLARATION

When submitting evidence for assessment, each student must sign a declaration confirming that
the work is their own.

Student name: Aniruddha Deshmukh Assessor name: Neha Jaiswar Nandgaonkar

Issue date: 25 June 2020 Submission date: 16 July Submitted on: 22 Jul. 20
2020

Programme: Pearson BTEC Level 5 HND in Computing (Application Development)

Unit: 2 Networking

Assignment number and title: 1 of 2: Demonstrate Presentation, Planning, Teamwork, self-analysis and
personal development planning skills. (For Industrial Attachment Students)

Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students
who break the rules, however innocently, may be penalised. It is your responsibility to ensure
that you understand correct referencing practices. As a university level student, you are
expected to use appropriate references throughout and keep carefully detailed notes of all your
sources of materials for material you have used in your work, including any material
downloaded from the Internet. Please consult the relevant unit lecturer or your course tutor if
you need any further advice.

Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.

Student signature: Date: 22 Jul. 20

Pearson Education 2018


Higher Education Qualifications
Contents

1. Network.....................................................................................3
2. Network Types.............................................................................3
3. Network Standards........................................................................6
4. Network Topology.........................................................................9
5. Networking Devices.....................................................................15
6. Server & Its Types.......................................................................18
7. Interdependence of Networking Hardware & Software.............................21
Unit 2 – Networking Assignment 1

1. Network
Computer Network is a collection of computers linked by cables,
separate links or optical fibres, so that several different machines on the
same network can communicate with each other.

The key use of a network is the sharing of resources, data and


applications among various devices.

In networking there are several types of networks that vary from


simple to complex level and follow different network standards.

2. Network Types
Computer network mainly has three types they are categorised
according to their size.

They are:

1. Local Area Network (LAN).

Local area networks are the most common type of network and the
simplest. It is a collection of computers connected within a short distance
to share information or resources using a means of communication such
as cables such as coaxial cables, twisted pairs etc.

Building a LAN is inexpensive as the hardware required like ethernet


cables, network adapters are not that costly. The data transfer speed in a
LAN is extremely fast and provides higher security.

Commonly, enterprises maintain and operate LANs. LANs link to a


wide area network using routers for fast and secure data transfer.

Sr.no Benefits Constrains


.
1 Communication is simple and LAN cover limited area as they
inexpensive, because data are restricted in size like a
can be quickly exchanged single building or a single
with the other network- office.
connected computers.
2 As it is stored on the cloud LAN administrator can access
computer, data will be more any user's personal data on the
stable, it will be easier to network that cause privacy
handle data because it is only breaches.
at one location.
3 The LAN offers the ability to LAN initial setup cost can be

IN0719A04H Aniruddha Deshmukh Page | 3


Unit 2 – Networking Assignment 1

share a single internet high as making the server


connection with all computers needs special software and
connected to that network. In devices like routers, ethernet
school laboratories, for cables are costly.
example, computer cafes etc.
4 LAN also provides the ability LAN risks data security because
to share computer resources unauthorized users will access
like printers, scanners with sensitive data if the
the devices connected to the administrator does not protect
network. a server hard disk properly.

2. Metropolitan Area Network (MAN).

A network of metropolitan areas covers a whole large geographic


area such as a city or a town by interconnecting a different LAN to form a
bigger network. They are bigger than LANs but smaller than WANs, and
have both elements. These have lengths wider than the LANs.

State organizations use MAN to communicate with residents and


the private sectors. In MAN, several LANs are interconnected through a
telephone exchange cable. MANs are generally owned, managed and
maintained by a single person or a firm.

In general, they are used to communicate between banks, colleges


in a region, airline reservations and even in the military.

Sr.no Benefits Constrains


.
1 MAN has higher speed as MAN is difficult to handle as
fiber optics are used and file LANs are growing in number
and database transfer rates and scale.
are high, data speeds can
reach 1000 Mbps.
2 Users will share their access Establishing a MAN needs
to the Internet with MANs extremely skilled people,
installation. By so doing, including network managers
many users can use the same and trouble-shooters.
high-speed internet.
3 MANs are of a better degree MAN requires more wires than
of reliability than WANs. LAN, since it is a combination of
multiple LANs.
4 Attaching MAN with WAN is MANs speed is affected by
less expensive & it gives good copper wires. So, using high
data efficiency. cost fibre optics is needed.
3. Wide Area Network (WAN).

IN0719A04H Aniruddha Deshmukh Page | 4


Unit 2 – Networking Assignment 1

A wide area network is not restricted to a specific location and


connects computers around a vast geographic area, such as state or
nations, using cable or satellite fiber optics connections and much wider
and more complex than LAN.

It allows computers and smaller machines to connect to each other


directly over one wide network and communicate even though they are
miles apart.

The internet is the world's most powerful WAN. A WAN is widely


used in government, business, and education. This is managed and
operated by various operators or the public, since it has a wide scope.

Sr.no Benefits Constrains


.
1 It is wide spread as it covers Setting up a WAN is very
a huge geographic area of expensive in the initial setup
more than 1000km. because of different devices like
routers, switches, security
software, etc.
2 WANs have high bandwidth WANs need firewall and anti-
than MAN & LAN covering virus software as it faces
such large geographic area. security issues like virus and
hackers.
3 Software and resources can WAN needs maintenance that
be shared with other users on requires full-time highly skilled
the internet. network technicians and
supervisors.
4 Data is centralized using WAN As WAN cover large area, it
as sharing the data with becomes very difficult to fix
connected devices also helps problems in the network. The
in keeping backup, getting wires in WANs go through the
support, etc. sea and any fault in the line
would need a lot of hard work
to be fixed.

3. Network Standards

IN0719A04H Aniruddha Deshmukh Page | 5


Unit 2 – Networking Assignment 1

Network standards refer to a series of classifications for networks that


are issued by various systems. These standards state how networks are
supposed to work.

The Institute of Electrical and Electronic Engineering (IEEE), is one of


the international associations responsible for the worldwide provision and
development of networking technology specifications. These specifications
for the networking technology are known as network standards.

The IEEE has many standards of which we are studying IEEE 802
standard.

 IEEE 802

IEEE 802 is an IEEE standards organization devoted to urban area


networks and local area networks. The number "802" has no particular
meaning it was just the next appropriate number IEEE could assign to the
project of standards, while "802" is also related to the date of their first
meeting in February 1980. IEEE 802 standards are established by the LAN
/ MAN Standards Committee (LMSC) of IEEE 802.

The Ethernet, Token Ring, Token Bus, and Wireless LAN (Wi-Fi) are the
most widely used protocols. In each field the emphasis is given by a
specific working party. The classes are numbered between 802.1 and
802.12.

1) Ethernet (802.3)

IEEE 802.3 is an Ethernet LAN protocol and a working group of


Institute of Electrical and Computer Engineers (IEEE) specifications
established by a working group specifying the Network Access Control
(MAC) of wired Ethernet connectivity for the physical layer and data link
layer.

It refers to physical cabling, and it is called Carrier Sense Multiple


Access / Collision Detection (CSMA / CD) how data is transmitted through
the cable. Through this transmitting system only one computer can be
distributed on the network at a time. If some other system already
detects that a connection is in the wire, it must wait. It is a technology
that follows the network architecture of IEEE 802.1, which also specifies
the form of LAN connectivity using CSMA / CD.

Sr.no Benefits Constrains


.

IN0719A04H Aniruddha Deshmukh Page | 6


Unit 2 – Networking Assignment 1

1 Creating an ethernet doesn't It is not appropriate for the


require much cost and is fairly client – server architecture,
affordable compared to other because the network cannot
networks. determine the packets priority.
2 Administration & maintenance It is not suitable for traffic-
is simple as they do not intensive applications because
require hubs and switches. it decreases when traffic on the
ethernet increases efficiency.
3 It does have a good quality of It's not a good choice for
data transfer. It won't interactive applications as they
degrade because they're need to transfer small data
robust to noise. quickly and ethernet limits
frame size to 46 bytes.
4 Data transmission rates of Ethernet does not fit
gigabit network that vary applications in real time,
from 1 to 100 Gbps. because it offers non-
deterministic service.

2) Token Ring (802.5)

Token ring is a local area network communication protocol where all


stations are connected in ring topology and pass one or more channel
possession tokens. A token is a special 3-byte container, passing around
the station loop. A station can submit data frames while it is carrying a
token. Such tokens are issued after the data frame being successfully
received.

Sr.no Benefits Constrains


.
1 Stations can be added and The hardware is expensive.
deleted easily.
2 Collisions cannot occur. It is slow
3 Error are internally detected The technology used is old.
and corrected.

3) Wireless LAN (802.11)

Wireless LAN Network standard specifies interaction between a


wireless client or computer and an access point, or two wireless clients or
computers. Using the 2.4GHz frequency band the 802.11 standard
transmits data up to 2 Mbps.

Sr.no Benefits Constrains


.

IN0719A04H Aniruddha Deshmukh Page | 7


Unit 2 – Networking Assignment 1

1 Reduces cost of wiring as less Maintenance is required


wire is needed. periodically.
2 Efficient coding techniques Network maintenance &
are used. security needed to ensure
security.
3 Less cost effectiveness. Traffic disruptions take place.
4 Installation is very easy. Any Wi-Fi activated computer in
that area could catch data
transmission over radio waves.

4) Token Bus (802.4)

Token bus is a network that executes the protocol for token ring over a
virtual ring in LAN. The physical media has a topology for a bus or a tree
and connects using coaxial cables.

A token is passed around the nodes of the network, and the


processing nodes are then the only ones to be transmitted. If a node has
nothing to send on the virtual ring, the token is then passed on to the
next node.

That node must know the address of its neighbouring node in the ring,
and it needs a protocol to warn the other nodes of connections and
disconnections from the ring.

4. Network Topology

IN0719A04H Aniruddha Deshmukh Page | 8


Unit 2 – Networking Assignment 1

Network topology is essentially the precise structure of the different


contact network stations, connections, etc. This continues to be used to
describe or represent the direction of operation of different forms of
information communication networks, including command and control
radio systems, existing field transports, and PC systems.

It is the topological structure of a system which should be honestly or


legally represented. It is just network layout. Functional topology is the
state of the different parts of a system, while logical topology indicates
how knowledge flows within a system.

This is a type of map theory where conveyor devices are displayed as


hubs, and the relationships between the gadgets are shown as
connections or lines between both the hubs.

Types of Network Topology:

Bus Topology

Star Topology
Types of
Topology Ring Topology

Mesh Topology
1) Bus Topology:

Bus Topology is a type of network in which a single connection links


each PC and device gadget. It transmits the information to the next single
direction from one end to the next. Bus topology does not have a
bidirectional dimension. It has a main backbone to which other computers
are attached by adding cables. The backbone has terminals on each end
to ensure the signal gets absorbed and is not reflected back.

Sr.no Advantages Disadvantages


.

IN0719A04H Aniruddha Deshmukh Page | 9


Unit 2 – Networking Assignment 1

1 It is very cost-efficient, If the main backbone cable fails


because the cable used costs then the entire system crashes.
less than other topologies of
the network.
2 Used mainly in smaller When heavy network traffic
networks, and readily exists collisions in the network
expandable. increases.
3 Cable requirement is least. Cable length is limited.

Uses:

 They are used in a small ethernet network like in Cyber cafes.


 Devices like scanners & printers can be added in offices using bus
topology.
 Connection between two different floors using a single cable falls
under bus topology.

Communication:

There is one single main cable in bus topology to which all the other
devices are connected. There are two terminals one on each end of the
backbone cable that absorbs the signal to ensure that the signal does not
reflect back. The cables used here are copper plated coaxial cables.

The data is sent through the main backbone cable and reaches the
destination by checking the address. When the data is sent it goes
through all the nodes but when it reaches a node, it checks for the
address. If the address matched the destination only then is the data
processed by the system.

Transmission Mode:

The transmission mode used in bus topology is the Half- Duplex. All
of the stations will send or receive data here but not at the same time.
When one station is sending data, others can only receive the data and is
same the other way around. What happens here is that when one station
is sending a message it waits for an empty data frame, when it gets that
it inserts a token that indicates transferring of data into the frame. Then
inserts the data to be sent with a destination identity on the data frame.
When the data reaches the destination address it is processed by the
system and then the data frame is empty for other stations to use.

IN0719A04H Aniruddha Deshmukh Page | 10


Unit 2 – Networking Assignment 1

2) Star Topology:

There is a central station in star topology which can be a hub or


switch, and all the stations are connected to the main station individually.
This method is used most commonly. If a station wants to contact to
other station it’s message first goes to the central node and then the
other station.

Sr.no Advantages Disadvantages


.
1 Set-up, Modification & Network output is dependent
Troubleshooting is easy. on central node / hub capacity.
2 Due to lower network traffic The cost of installation is high,
and fewer nodes the and use is expensive.
performance is fast.
3 All the node work smoothly If the main node/hub fails then
and only the node that has the whole network will stop.
failed is affected.

Uses:

 This is the most used topology these days.


 Mostly used in offices, and places where there is a main router or
hub providing an individual connection to each device.
 Lowers the probability of mass network disruption.

Communication:

In star topology all the devices are connected to the main switch or
hub with an individual connection for each. When it comes to
communication there is a difference in the method while using switch or
hub. While using a switch when a computer is sending a message to
another computer, the message first goes to the switch which has a table
containing address of all devices known as Content Addressable Memory
(CAM) table. So, the switch will check the destination address and send
the message to that particular computer. While using a hub it does not
keep track of address as it has no own memory. So, it uses a protocol
known as Address Resolution Protocol where it asks all the connected
devices for their addresses and then sends the data to the matched
destination.

Transmission Mode:

IN0719A04H Aniruddha Deshmukh Page | 11


Unit 2 – Networking Assignment 1

In star topology the data transmission takes place where the hub or
switch has the main part as the devices in the network cannot transmit
the data directly to each other. The data is first transmitted to the main
central hub/switch then the central hub or switch transmits it to the
destination computer.

3) Ring Topology:

Each computer is connected to another computer in ring topology and


the last one is connected to the first computer thus creating a ring
structure. Every device unit has two neighbours, exactly.

Sr.no Advantages Disadvantages


.
1 Installation and expanding is It is difficult to troubleshoot.
low cost.
2 As only those nodes that have Even if one device crashes, the
tokens can transmit data, whole network gets affected.
high traffic does not affect
the transmitting network.
3 Collision possibility is Addition or deletion of a
minimum in this topology. computer from the network can
affect the whole network
activity.

Uses:

 They are often used in small offices, schools with less devices and
want low cost networks.

Communication:

In ring topology, token is used for communication. The token ring is


used to transmit data which goes station to station in a ring. If a
computer wants to transmit data it will use the empty token and send the
data to the other device. If it does not want to transmit the token will
continue to the next device in the ring. A device can send data to another
device only when it has an empty token. If other devices want to send
data they will have to wait for the empty token.

Transmission Mode:

IN0719A04H Aniruddha Deshmukh Page | 12


Unit 2 – Networking Assignment 1

Ring topology ca have two types of data flow which are


unidirectional and bidirectional. In unidirectional the data can flow in a
single direction whichever side it may be clockwise or anticlockwise hence
showing Half Duplex mode and in bidirectional the data can flow on both
the directions hence showing Full Duplex mode.

4) Mesh Topology:

In mesh topology each network computer is connected to another


network computer. The data is transmitted through the network where
other devices act as a convoy for other devices.

Mesh topology consists of two types:

1) Partial Mesh Topology-

Within a partial mesh topology only some of the network systems are
connected to each other.

2) Full Mesh Topology-

In full mesh topology, all the network systems are connected to one
another.

Sr.no Advantages Disadvantages


.
1 Diagnosis of faults is easy. Wiring is required in bulk.
2 Privacy and security are Cost of cabling is more.
provided.
3 Each link can be holding its It is a robust topology.
own data load.

Uses:

 Smart houses containing multiple devices like the alarms,


cameras, smart TVs, refrigerators that communicate with each
other to give the best experience to the owner use mesh topology.
 Loss of data cannot be afforded in the military departments.
Hence mesh topology is most used here.

Communication:

IN0719A04H Aniruddha Deshmukh Page | 13


Unit 2 – Networking Assignment 1

Networks interact in Mesh topology in two ways: either by routing


the data or by flooding data. When you route a packet through a mesh
network, it travels along a specific path, hopping from device to device
before reaching the destination.

A basic mesh network uses a flood system, where the data flows
continuously across the network. When a computer sees data with its
address it will automatically pick up the file. It functions because of the
Time to Live (TTL), a property where signals can only transfer hops across
the mesh until they are removed.

To create these routes, the network must be constantly linked and


configured, and the paths must be usable. In other words, it will have to
try to identify broken routes and develop self-curing algorithms to create
route tables. Given that the network has a lot of traffic at layer 2 (MAC)
to set up this route, mesh networks will be less efficient than star
networks.

Transmission Mode:

In Mesh Topology, devices can transmit data in all the Simplex, Half
Duplex and the Full Duplex mode because multipoint connections are
used in mesh and the other topologies use point to point connection to
transmit data across the network.

Sr. Topologies Bandwidth


No.
1 Bus Topology The expected rate of data
transmission is 10Mbps and coaxial
cables are used in bus topology.
2 Star Topology Rate of transmission can range from
1 to 100Mbps in star topology.
3 Ring Topology Depending upon the current two
token ring rates available, using a RJ-
45 the data rate can be 4Mbps and
16Mbps.
4 Mesh Topology Rate of transmission can range from
1 to 65Mbps in mesh topology.

Difference between Bandwidth and Throughput:

IN0719A04H Aniruddha Deshmukh Page | 14


Unit 2 – Networking Assignment 1

Sr. Bandwidth Throughput


No.
1 It is the maximum It is the actual amount of
amount of data that can data that can pe transferred
travel through a through a network. (Real
network. (Theoretical) World)
2 Measurement of Measurement of throughput
bandwidth is always can be cone at any OSI
done as a physical layer Layer.
property.
3 It is measured in bits It is measured using any unit
per second. computable that is relating to
the process.
4 Latency on the link Latency on the link can affect
does not affect the throughput.
bandwidth.

5. Networking Devices
Networking devices or equipment are the devices needed to
interact, communicate, and mediate the transmission of data between
different devices on a network.

Types of Networking Devices:

 Hubs:

They are the most basic device in networking that are used to connect
multiple ethernet devices together. It has the least intelligence as it does
not have routing tables. Hubs can mostly detect errors like a collision. It
just broadcasts information to all the ports.

IN0719A04H Aniruddha Deshmukh Page | 15


Unit 2 – Networking Assignment 1

Hubs are not used that much these days as it can create bottlenecks
and security issues. They were popular in the past because of being cheap
than a router or switch.

Types of Hubs:

 Active Hubs:

This type of hub is used for renewing and amplifying the signals. They
consume electricity while working.

 Passive Hubs:

This type of hub is used for getting the signal that is coming from the
previous ports and just distributing it ahead. It does not amplify or renew
the signal hence does not need electricity.

 Intelligent Hubs:

This network type is mostly utilised by admins for monitoring the


network traffic and each port on the hub is individually configurable.

Working of a Hub:

On receiving the data frame sent by the host, the hub simple forwards
it to all the ports. Although it forwards the frame to all the ports, a station
only agrees to take the ones whose MAC address matches the MAC
address of the destination and all the rest data frames are discarded.

 Switches:

Switch is a hardware component that can filter packets and forward


them. It helps the sharing of data by connecting all the devices like
servers, computers, printers, etc. together in a network. They are smarter
than hubs but not as advanced as a router. These devices can share and
talk to one another no matter where they are in the network.

IN0719A04H Aniruddha Deshmukh Page | 16


Unit 2 – Networking Assignment 1

Working of a Switch:

Switches work similar to the hub but the major difference in the way
the packets of data are handled. They are smart as they have memory in
which hardware address table is maintained. In a switch when data is
received it determines the target destination and then sends it directly to
that device meaning that bandwidth is conserved making the network
more efficient.

 Routers:

Routers are the devices of the network layer where the data is known
as packets. They forward packets for one network to another rather than
only on local computers. Routers are common in houses and business as
they are the one that connect our network to other as well as the
internet. They maintain a routing table containing the IP address of the
next network with the help of which packet routing is maintained.

Types of Router:

 Wireless Router – distributes packets between wirelessly, often


used in regular household.
 Core Router – distributes packets within a network.
 Edge Router - distributes packets between 1 or more network
but does not within a network.

Working of a Router:

When router receives a packet that is travelling from one network


to another, it analyses the information and forwards to the destination
network. It has its storage memory that has routing algorithms and a

IN0719A04H Aniruddha Deshmukh Page | 17


Unit 2 – Networking Assignment 1

routing table with the help of which it finds out that a packet is received
and to which network the packet should be sent.

Comparison between Hub, Switch & Router:

Sr. Hub Switch Router


No
.
1. Hubs are physical Switches are OSI Routers are OSI Model
layer OSI System Model Data Linking Network-layer machines.
devices. Layer tools.
2. Hubs are often found Switches are often Routers are used in all
in networks within found in LANs. local, metropolitan and
the local area. wide area networks.
3. Hubs transmit in half Switches are Routers communicate in
duplex mode. transmitted in both full duplex mode.
half-duplex and full
duplex mode.
4. Hubs depend on Switches also use Routers use IP address
MAC address for the MAC address to for data transmission.
transmitting data. convey data.
5. Hub speed can reach They have speed Wireless router speeds
till 10Mbps. that range from 1 to range from 1 to 100Mbps
100Mbps. Some and wired routers can
switches can also reach till 1 Gbps.
have 1Gbps speed.

6. Server & Its Types


A Server is a networking device that provides information, data,
facilities, or programs over a network to other machines, called clients. In
definition they are known as servers because they are computers that
share space with the client machines.

Types of Servers:

There are several server types such as:

a) Application Servers:

This type of servers has hardware and software that gives an


environment to run programs. These servers are designed to run
applications.

IN0719A04H Aniruddha Deshmukh Page | 18


Unit 2 – Networking Assignment 1

1) DHCP Server –

A DHCP Server is a network server that supplies and assigns


dynamically IP addressed client computers, as well as other network
parameters. To respond to client-specific transmission requests, it relies on
the Dynamic Host Configuration Protocol or DHCP protocol.

DHCP server dynamically provides the network parameter values


required for clients to interact successfully over the network. Each client
who enters the network must be manually set up by the system
administrator, that can be laborious, particularly in large networks. Servers
normally give each client a different dynamic IP address, which switches
after the client's IP address lease has expired.

2) DNS Server –

The Domain Name System or DNS is an Internet phonebook. When


users enter a domain name like 'amazon.com' or 'google.com' into a web
browser, it is the duty of the DNS Server to find the right IP address for
those domains.

Then browsers use those addresses to communicate with servers of


origin to access information about that website. The servers that has all
these records of IP address and their hostnames does this for the network
it is connected in.

b) Virtualized Servers:

In contrast to traditional servers installed on machine hardware as an


operating system, virtual servers only exist as defined in specialized
software.

1) Hypervisor Server –

A hypervisor is a program that generates and runs VMs, also known as


a virtual machine monitor or VMM. By digitally exchanging its resources,
for example memory and computation, a hypervisor allows one host
computer to accommodate multiple virtual guest machines.

Every hypervisor can run hundreds of virtual servers, or even


thousands, at once. The hypervisor introduces the server with virtual
hardware, as if this is actual physical hardware.

IN0719A04H Aniruddha Deshmukh Page | 19


Unit 2 – Networking Assignment 1

The virtual server normally uses the virtual hardware, and the


hypervisor transfers the specific processing and memory requirements
onto the underlying physical hardware used by all other virtual servers.

2) Cloud-based Server –

A cloud-based server is a powerful physical or virtual network server,


which stores information and applications. Cloud servers are created to
divide a physical server into multiple virtual servers using a virtualization
software.

Organizations use an infrastructure-as-a-service (IaaS) model for


processing information and storing workloads. They can remotely access
the virtual server functions via an online interface.

c) Physical Servers:

A physical server or 'bare-metal server' is a single-tenant database


server which means that a particular physical server is reserved for a
specific person. Many users don't share the same storage space and
materials.

1) On Premises -

An on-premise server is a physical server that is present on-site in a


company and has to be individually maintained and managed by the
company.

2) Co-hosted or Co-location server -

Co-location server is a server which is typically a web server that


is located at a dedicated resource-designed facility which includes a
secure storage or cabinet, controlled electricity, dedicated Internet
access, security and support services.

Such co-location facilities provide the customer with a safe place to


physically store their hardware and equipment, in contrast to storing it in
their offices where there is much higher risk for theft, fire or
vandal damage.

IN0719A04H Aniruddha Deshmukh Page | 20


Unit 2 – Networking Assignment 1

7. Interdependence of Networking Hardware & Software


Networking Hardware:

 Network Interface Card (NIC):

A network interface card (NIC) is a hardware component of networking


that plays an essential role in linking the computer to the internet. It is
basically a circuit board mounted in a computer that provides a direct
network link to the computer. Many of the other names include network
interface controller, network adapter or LAN adapter.

The network interface card offers wired as well as wireless access. It


allows interaction amongst machines via Internet Protocol over both the
local area network and the large network. NIC functions as a physical
layer tool as well as data link layer. It does provide the required hardware
components so that physical layer processes and some data link layer
processes can operate on it.

 Network Cabling:

Computers, routers, switches, and networks use network cables in the


storage area to connect and transfer data and information. In reality, the
carrier or media from which data flows are those cables. There are
different connectivity cables available and the right kind to use will
depend on the overall design and topology of the network architecture.

The networking cable that is most used is governed by what is


recognised as the "twisted pair cable." In local area networks; usually
office facilities, retail and industrial locations, cabling of copper
commination, i.e., The most commonly used cabling is twisted pair cable.

Twisted Pair cables – Two types of twisted pair cable exist: shielded
and unshielded. Usually twisted pair cable is used by many ethernet
networks. These 'wires’ are made of four sets of thin wires located within
the cable's insulation or outer sheath. Each pair gets twisted through a
few more twists. These twists are designed to avoid interference from
other nearby devices and other cables.

Fibre Optic cables - Optical fiber cabling is chosen where higher


bandwidths could be required specifically in the setting of data centres at
which larger capacity seems to be necessary for installation, generally
airports, hospital, banks. However, optical fibre cabling is fast and is

IN0719A04H Aniruddha Deshmukh Page | 21


Unit 2 – Networking Assignment 1

therefore the method of choice for just about any device which sends
massive quantities of information.

Coaxial cables - They have a single conductor in the middle made


of copper. A plastic sheet provides for the shielding between the coiled
metal shield and the middle conductor. The metal shield prevents motors,
electric lamps, as well as other devices from external disturbances. There
are two coaxial cable types are thin coaxial, and thick coaxial.

This type of cabling is highly resistant to signal interference although it


is difficult to install. Compared to the twisted pair cable it can handle
large cable distances between network devices.

 Network Servers:

A network server is a database system that is used as a central data


and applications store, that can be accessed by users within a network.
Servers could have various features and functions, also called "services,"
like the sharing information and data among multiple users or executing
calculations of a client.

A single server may support multiple clients, and multiple servers can
be used by one single client. A client process can run on the same
computer, or link to a server on another computer through a network. A
server is designed to monitor, store, transmit, and process data 24 hours
a day, requiring greater durability than a desktop computer, and offering
a range of software and equipment not usually found in the traditional
desktop computer.

The minimum system requirements for Network Server  Installation are


as follows:

 Minimum of 4 GB disk space available, 2 GB RAM (recommended 4


GB) for installation of enterprise servers.

 Minimum of 1.4 GHz (2.0 GHz or higher recommended) processing


speed;

IN0719A04H Aniruddha Deshmukh Page | 22


Unit 2 – Networking Assignment 1

Networking Software:

 Networking Operating System:

Operating System of the network enables different autonomous


computers to communicate and organize over a network. A standalone
computer with its own internal memory, hardware, and operating system
is an autonomous Computer. Capable of running and restoring single user
applications on its own. They that operate similar or completely separate
operating system.

It operates primarily on a powerful machine running the server


software. It enables the protection and management capacity of records,
user, community, device, and other functionalities of the network. The
biggest benefit of using a network operating system is that it enables
resource and memory sharing among the network's autonomous
computers.

It would also make it possible for the client machines to reach the
memory that is shared and the services administered by the server
system. That's the operating system on the Network. Is specifically
designed to allow several clients to exchange documents and programs
across a network. These are two main forms of operating system:

1) Peer to Peer - Peer-to - Peer Network is an operating system


wherein all nodes are technically and operationally identical to each other.
Everybody is equal. They are both capable of executing identical tasks.

2) Client - server - The Client-Server Networking operating system


runs within the network of one host and several client computers. Client
operating system runs on the client machine and on the host machine the
Network Operating System is installed.

 Protocol Suite:

A protocol is a law or specification for data transmission which is


implemented by each device. Protocol Suite is a series of interrelated
protocols that are designed for computer networks.

IN0719A04H Aniruddha Deshmukh Page | 23


Unit 2 – Networking Assignment 1

The two well-known Suites for the Protocol are −

a. OSI Model (Open System Interconnections):

The OSI Model is a computational model that characterizes and


standardizes the communication functions of a computer network, without
regard to the internal configuration and the underlying technologies. The
objective is compatibility using simple protocols of communication
between various information sharing systems.

The different layers in OSI Model:

1. Application layer
2. Presentation layer
3. Session layer
4. Transport layer
5. Network layer
6. Data link layer
7. Physical layer

b. TCP / IP Model:

The OSI model that we just discussed is just a logical construct. This
was structured by splitting the communication process into smaller and
simplified parts to define the functions of the communication system. So,
as we speak of the TCP / IP interface, it was planned and developed in the
1960s by the Defence Department (DoD), and is based on common
protocols. It stands for Transmission Control Protocol / Internet Protocol.

The TCP / IP configuration is a standard OSI concision variant. This


consists of four layers, unlike seven layers in the OSI model.

The layers are as follows:

1. Application layer
2. Transport layer
3. Internet layer
4. Network Access layer
5. Physical layer

IN0719A04H Aniruddha Deshmukh Page | 24


Unit 2 – Networking Assignment 1

 Network Communications:

Network connectivity, or internetworking, describes a series of


protocols that permit computer programs to link up with each other
irrespective of the computer hardware and operating systems they
function on. Communication software is a group of programs and services
that allow users to share files and email, audio, and video data from a
range of devices over a server or local network. Email, speak, and
Messaging applications are the most popular tools.

Internetworking helps computer applications to operate regardless of


their links to the physical network. The goal is to connect the users all
over the world via their cell phones, laptops, etc. Most email details are
stored on a single computer system or network, but the others typically
have access points to other computer systems which allow users to
digitally send emails anywhere around the world.

 Network Security:

Network security is a wide and diverse term that accommodates a


range of structures, methods, and processes. It is a series of rules and
settings at its simplest word, intended to safeguard computer systems
and information privacy, security and usability utilizing both software &
hardware technology. Whatever organisation, irrespective of its scale,
sector or technology, needs a tier of network protection to protect it from
the cyber threats that are now rising in today's world.

There are many layers to consider when discussing network security


within an organization. Breaches can occur at any point in the network
security layer architecture, and the system security hardware,
applications & policies must always be optimized to handle that area.

Generally, network security consists of three distinct controls: physical,


technical & administrative. Below is a short overview of the various forms
of network protection and how each control operates:

a) Physical Network Security:

Physical security protocols are designed to deter unauthorized staff


from gaining actual access to physical network elements such as routers,
cabling cabinets etc. User authentication, such as biometric, simple locks
and other methods, is important for any organization.

IN0719A04H Aniruddha Deshmukh Page | 25


Unit 2 – Networking Assignment 1

b) Technical Network Security:

Technical security measures secure information that is contained on the


network or that is transiting in or outside of the network. Safety is two-
fold; it should also protect files and hardware from unwanted employees
and it should also secure against staff from bad practices.

c) Administrative Network Security:

Administrative security measures include compliance policies and


regulations that supervise user ’s behaviour, how people are authorized,
their level of access, and how members of staff incorporate modifications
in facilities.

Methods used for Network security:

i. Virtual Private Networks (VPNs):

VPNs create a link from another location to this source of the network.


Users operating from home, will generally link up with a VPN to connect
to the network of the company. Data is encrypted amongst the 2 places
so the user will need to authenticate to facilitate connectivity between
their system and the network. Most effective VPNs allow companies to
easily build VPNs and secure all locations using their next level solution.

ii. Anti-malware and Antivirus Software:

Such kinds of software protect a company against different threats like


trojans, malware, viruses and ransomware. The best software not only
scans files when they enter the network, but also scans and monitors data
constantly.

iii. Firewalls:

As their name suggests, firewalls serve as protection between the


insecure external network and the secure private internal network.
Usually, administrators organise a set of specified regulations that
prohibit or authorize network traffic. Many organizations provide
transparent and tightly controlled network traffic management, whether it
be physical, automated or cloud.

Workstation VS Regular Desktop

IN0719A04H Aniruddha Deshmukh Page | 26


Unit 2 – Networking Assignment 1

Starting with the cost many company computers cost as little as


₹35000 or $450 and go as high as ₹75000 $1000, while for a high-end
computer like a workstation will start at ₹1 Lakh or $1,500 and go as high
as ₹2 Lakh or $3000.

When we compare performance, a regular desktop has ample capacity


to handle certain functions such as fax, Web browsing, and word
processing. Yet there is more power to a workstation. It can handle the
development and editing of CAD, animations, data processing, and photo
- realistic renditions, as well as video and audio. A workstation 's inner
operations are kept to a higher degree than a PC's. Each part is built with
the expectation that it is going to be worked hard all day.

Mostly workstations work on tasks in certain situations after all of


individuals have gone home. They are left overnight to compress huge
files, or create and render animations. This major difference can be seen
due to better hardware and durability of workstations which is worth the
price tag.

The features that differentiate a workstation are:

1. Use of Solid-State Drives (SSD):

They work differently from standard hard disk drives. There are no
moving pieces and a physical malfunction is less possible. You are faster
too. The downside is that they are more costly than "normal" drives and
have a reduced storage space.

2. Multi-core Processors:

More the processor core means better the capacity to load. But it won't


necessarily mean boosts in efficiency. To take advantage of that, software
can be used, so it can have some benefit.

3. Error Correcting Code RAM (ECC RAM):

It's the memory that makes the machine authentic. It addresses


memory bugs, avoids glitches and saves downtime by fixing the errors
before they arise.

4. Use of Redundant Array of Independent Disks (RAID):

IN0719A04H Aniruddha Deshmukh Page | 27


Unit 2 – Networking Assignment 1

To store and process the data it utilizes multiple internal hard drives.
There are various types of RAID systems. You can either have multiple
drives running the files, based on the type of device, or you can have
replicated drives, ensuring that if one drive crashes, the other drive will
always operate.

5. Use of optimized Graphics Processing Unit (GPU):

All computers have to exit to a screen. Using a higher end GPU means


the CPU would have less video output work to do. For certain cases, the
GPU can in turn take over some of the load of the CPU, making it all
work faster. The disadvantage would be that high-end GPUs are pricey.

Interdependence of Software and Hardware in Networking:

 Server related interdependence:

o Network Operating System –

The network OS is needed by the server to communicate and


allow multiples computers that belong in a network with access
to the files and the resources that are shared and the access to
the devices like scanners and printers throughout the network.
The server is the host for other devices.

o Network Interface Card –

It provides the server with connection to a network without


which the server would not be able to communicate.

 Network Operating System related interdependence:

o Network Security –

The network security of the OS is increased by using various


security software which helps protect it by doing scans for
malware and viruses.

o Workstation –

IN0719A04H Aniruddha Deshmukh Page | 28


Unit 2 – Networking Assignment 1

It supports linking several computers so they can exchange


data, files and hardware devices. Provide basic features of the
operating system, such as CPU assistance, protocols, automated
hardware identification, and allow multi-application processing.
The workstations are mostly the clients to the server.

 Workstation related interdependence:

o Network Security –

Firewalls and various other security software protect the NOS


from being accessed by any attacker that might try to cause
harm by getting control of the workstation.

o Network Interface Card –

It provides with the basic hardware that is needed to access


any network and is crucial for overall network connectivity.

 Network Interface Card related interdependence:

o Network Cabling –

The cabling is the essential part of any device and network. It


connects all the systems and devices together and plays a main
role in the network. Without the cabling there can not be any
data transmission and communication.

Bibliography

IN0719A04H Aniruddha Deshmukh Page | 29


Unit 2 – Networking Assignment 1

DNSstuff. 2020. What Is Network Topology? Best Guide To Types &


Diagrams - Dnsstuff. [online] Available at:
<https://www.dnsstuff.com/what-is-network-topology> [Accessed 20
July 2020].

Atlanta. 2020. NETWORK SERVER TYPES EXPLAINED. [online] Available


at: <https://www.nhgeorgia.com/blog/network-server-types-explained-
6> [Accessed 20 July 2020].

www.blackbox.be, B., 2020. 3780 - Networking Standards. [online] Black


Box. Available at: <https://www.blackbox.be/en-
be/page/22037/Resources/Technical-Resources/Black-Box-
Explains/networking-standards> [Accessed 19 July 2020].

beginnersbook.com. 2020. Computer Network Topology - Mesh, Star,


Bus, Ring and Hybrid. [online] Available at:
<https://beginnersbook.com/2019/03/computer-network-topology-mesh-
star-bus-ring-and-hybrid/> [Accessed 17 July 2020].

ComputerNetworkingNotes. 2020. Computer Networking Devices


Explained With Function. [online] Available at:
<https://www.computernetworkingnotes.com/networking-
tutorials/computer-networking-devices-explained-with-function.html>
[Accessed 19 July 2020].

IN0719A04H Aniruddha Deshmukh Page | 30

También podría gustarte