

















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Computer Systems Networking and Telecommunications
Typology: Summaries
1 / 25
This page cannot be seen from the preview
Don't miss anything!
Student Name/ID Number: Md Tauhidul Alam/ Unit Number and Title: Unit 2: Networking Academic Year: 2021- Unit Assessor: Steve Benge Assignment Title: Assignment 1 Internal Verifier Name: Roger Francis Date: 27/01/
Network (MAN). MAN is used by the government agencies to connects the citizens with its private industries. RS-232, Frame Relay, ISDN are some of popular protocol used in MAN. WAN: - Wide Area Network is known as WAN. It is a type of network, which develops over an immense topical area like as states or countries. Although, WAN is not limited to a compact location. The largest WAN in the world is the Internet.
Distinct types of networks have numerous advantages and disadvantages (www.elprocus.com, 2021). Advantages: - Several types of networks upgrades communications and accessibility of information. It authorizes appropriate resource sharing. It is immensely flexile. Using distinct types of networks is cost effective. It helps to increase the storage capacity. Disadvantages: - Distinct types of networks permit viruses and malware. Every network needs an efficient machinist. Every network needs a full set-up. Every network generates difficulties in terms of security. In today's marketplace there are three mediums used for internet connections ( smallbiztrends.com, 2015), which are: - Copper wired network: - The exercise of cooper cabling started 100 years ago. The copper wire is flawless enough for a voice signal. The problem with the copper wired network is that it provides limited bandwidth. Fiber optic cable network: - In fiber optic cable network, the data will be transmitted via narrow strands of an exceedingly transparent material, which could be either glass or plastic. The data transmission via fiber optic is faster. The cable of fiber optic is waterproof, and it is hard to break the cable. Wireless network: - It is a technique of internet connection broadcasting over radio waves and is a wide expression, which represents numerous distinct technologies. Wireless networks are cost effective. The main problem of wireless networks is that it demeaned the signal of network with distance. IEEE 802.3: - Ethernet standard is known as IEEE 802.3. All design of data network uses these ethernet standards, which connect wi-fi hubs of home with business data
networks. The speed of IEEE 802.3 will grow based on the speed of data communication. There are so many diverse types of standards, which come under the banner of IEEE 802.3. The IEEE 802.3 standards explain various aspects of Ethernet wrapping the physical layer as well as data link layer’s media access control (MAC) of wired network. (www.electronics-notes.com, 2021). IEEE802.3 standard has experienced a lot of additions as well as it’s an on-going process, which authorizes the ethernet standard to stay with current developments and endure a predecessor in data communication as well as connectivity platform. IEEE 802.11: - IEEE 802.11 is the standard for Wi-Fi. IEEE 802.11 standard explain all the elements needed by a system for interworking, Such as. Security, quality of service, hotspot, roaming and so on. 802.11 points to a wireless interface in the middle of devices, which manage packet traffic. A bit of familiar specifications of 802.11 are 802.11a, 802.11b, 802.11e, 802.11g, 802.11i, 802.11k, 802.11n. (www.anixter.com,
The IEEE 802 standards mostly assist the internet services as well as technologies to follow a set of suggested exercise practices. As a result, all the network devices can work with each other calmly.
On a specific network for a particular device IP (internet protocol) exploit as an identifier. Internet protocol address is also known as IP numbers or internet address. The scientific layout of the addressing as well as packets formula will be specified by IP address. A virtual link will be established in the middle of a destination as well as a source with the help of IP addresses. IP addresses are four types: Public , Private , Static , and Dynamic. IPv4: - It is the first version of IP addresses and that is used to pick out a network device with the help of an addressing system. 94% of internet traffic conveyed by IPv4, which employs 32-bit address scheme. IPv4 has some features (www.guru99.com, 2021). Such as, Video libraries as well as conferences are offered by IPv IPv4 provides a protocol, which is connectionless. IPv4 needs little memory IPv6: - The Internet Protocol has the latest version, which is known as IPv6. The purpose of the IPv6 is to settle the issues which are related to IPv4. IPv6 employs 128- bit address space. IPv6 is also known as Internet Protocol next generation (IPng) IPv6 has some features (www.guru99.com, 2021). Such as, Configurations are two types: stateful as well as stateless
(techdifferences.com, 2021) Comparison between DNS and DHCP: DNS DHCP It’s a technique that is used for address resolving It’s a protocol for allocating IP address Related Protocols are UDP & TCP Related Protocol is UDP Decentralized working methodology Centralized working methodology Number of ports used in DNS is 53 The number of ports DHCP use either 67 or 68
At the time of creating a network a designer must settle a set of laws, which decide how data transmission will work between distinct devices in the same network. That is the network protocol. Here are some common protocols (www.manageengine.com, 2021) for networking: Internet control Message protocol (ICMP): - It’s a network supporting protocol, which is used by network appliances to dispatch faulty messages as well as information of operation. A designer uses ICMP to make a report on network errors, congestion and timeouts. It also gives assistance in protocol of troubleshooting. Network issues will be diagnosed by using ICMP. The flaw of ICMP is that network traffic will be increased, as ICMP sends a lot of messages. File Transfer Protocol (FTP): - FTP permits a designer to shift files from one device to another. A designer can use FTP at the time of transferring program files, text files, multimedia files and documents. It allows a designer to recover
lost data. On the other hand, Security and encryption capabilities will be deprived because of FTP. Hyper Text Transfer Protocol (HTTP): - HTTP is used to shift a hypertext amid two or more systems. HTTP is outlined based on the client server principles. HTTP authorizes a client system to develop a link with the server machine to make a request. Then the server will respond based on the request it accepts from the client. (www.w3schools.in, 2021) Simple Mail Transfer Protocol (SMTP): - SMTP is a kind of push protocol. SMTP shifts emails in the middle of systems as well as alert on incoming emails. A client uses the same network during transferring an email to another client. Installation is not difficult as well as there is no restriction to connect with any network in SMTP. POP3: - Post Office Protocol is a type of email protocol. This protocol is used by the user to download an email on their own email client from the mail server. As soon as the email is downloaded locally, then the user doesn’t need any internet connection to read that email. The latest version of the Post Office Protocol is POP3. The capacity of high storage isn’t needed in POP3. Secure Sockets Layer (SSL): - SSL develops a secure connection to transmit and encrypt the data in between a web server as well as browser. There are two different keys used by SSL. One is public keys another one is private keys. SSL plays a key role when a user enters confidential information into websites. (www.whitehatsec.com, 2021)
There are few models used in network protocol. Such as, Osi 7 layers model: - This model explains there are seven layers, which can utilize by a computer system for communicating upon a network. This model is an extensively used model, which assists to see and liaise how networks work. It’s also assisting in terms of isolating and troubleshooting network problems. Here is an explanation of OSI 7 layers model (www.imperva.com, 2021) :
1. Physical layer: - Transfer raw bit stream atop the physical standard. 2. Data Link Layer: - In this layer, data format on the network will be defined. 3. Network Layer: View the physical footpath that will take the data. 4. Transport Layer: - In this layer, data will be transferred utilizing transmission protocols like TCP & UDP 5. Session Layer: - Retains connections as well as is accountable for supervising ports and sessions 6. Presentation Layer: - In this layer it is secure that data is ready for use, as a result the data encryption can proceed.
(www.linkedin.com, 2021) Comparison between OSI 7 layers model and TCP/IP model: -
(www.imperva.com, 2021) TCP/IP Model OSI 7 Layer Model This model can give a solution to a particular communication problem This Model explain all types of network communication. Almost all applications use all the 4 layers of TCP/IP models. Most Application used layer 1,2 and 3 , as those layers are compulsory for data communication.
Network topology is the portrait of a plan of the logical as well as physical components of a communication network. Here are some distinct types of networks topology (www.omnisci.com, 2021): Bus Topology: - In this topology all the devices are linked to the main cable by using drop lines. This topology is reliable as well as much simpler than any other topology. Unsuccessful operation of a station will not impact on the operation of other stations.
(www.kencorner.com , 2021) Star Topology: - Star topology also known as hub and spoke network topology, in where each device in the network is directly linked with a central hub. Communication between the devices will take place indirectly by the central hub. Star networks are usually seen on the access layer of enterprise networks.
(www.bbc.co.uk, 2021) Mesh Topology: - It’s a kind of network, where all the networking devices have an interconnection with one another. The purpose of the mesh network is to dispatch the data efficiently in the middle of devices and clients. This topology raises flexibility of the network.
Data can transmit in LAN and MAN in the speed of bandwidth 100 Mbps. Both LAN and MAN are auto diplomatic as their speed of connection is between the adapter and device which they are connected to.
For signal the type of communication is dependent on the band frequency which is essential for communication. Communication can be done through talking, texting, using internet etc. in mobile phone. For example, if we talk to other people through telephone or mobile phone VoIP uses bandwidth to convert our voice to digital data. It requires bandwidth 100 Kbps Up and Down and speed of 3 Mbps up and down for a minimum of one call. For calling the bandwidth needs to be high but for texting, low bandwidth can be used. The 802.11 Wi-Fi standards specify a bandwidth of 22 MHz and channels are on a 5 MHz incremental step.
Network Servers are dynamic computers, which are used as a central repository for data as well as numerous programs that are shared by the users in the same network. (www.serverwatch.com, 2021). In system administration, network servers are used to help simplify various tasks.
Here are some distinct types of networking server (www.networkstraining.com, 2021) Web Server: - This category of server is based on serving web content to its clients. Usually, web server grasps two requests from its clients, which are “GET” and “POST”. In most cases the nature of web server are “headless” types. Some well-liked Web servers are Microsoft IIS, Apache, Nginx etc. Lowest price foe a web server starts from £349. File server: - A file server isn’t the same as FTP server. In most cases, file server can “Mapping” networking files onto drives- and its more modern as well. This server allows a user to upload and download the shared files. Normally, we can see the use of file servers in an active directory environment or in Linux environments. Database server: - In most cases, a database server works in tandem accompanied by a second type of server. This type of server is usually used to store data in groups. A programmer can design databases on these servers
utilizing scripting database language. MySQL, MariaDB, Microsoft SQL, Oracle Database are some of the examples of database server. The Price of a database server is start from £29. Combination server: - Prior to virtualization, Servers are released from the excellence model of a lone server operating system, which is installed on a hardware machine. A server doesn't need its own storage, if it has network- attached storage. Mirroring and clustering authorize pieces of hardware to merge into more powerful servers. (www.paessler.com, 2021) Virtualization server: - This server is a chunk of a physical server. All online “servers” are virtual servers. By spending only tiny amounts of the cost of a physical server, a designer can rent the virtual servers. Usually, Virtual hardware is used by virtual servers. Terminal Services server: - This server is also known as communication server. It’s a server, which provides terminals like PCs, Printers and different devices to make a usual connection point to a local or wide area network. Windows server operating system have the extended potentiality to be act as a terminal server.
In the case of complex websites or when the website receives a lot of visitors, at that time it is impossible for a single server to cope with the situation. In today's world, the network designer prefers leasing or buying a server instead of building a datacenter in house, as leasing or buying a server is more cost effective. A user needs to consider some factors (phoenixnap.com, 2021) at the time of choosing the set up for the right server. Like Users must make a list of tools and software going to use on the server. Try to predict potential workloads Make sure the money user is going to spend for server does not exceed the benefits server will bring Make sure the user provided online service meets the client's demand.
A server requires software as well. I will use windows server for myself. To add a new user in windows server 2008 and windows server 2012&2016 are not same. For the client I'll use Windows 10. Windows 10 consists of online versions of OneNote, excel, word as well as PowerPoint from the Microsoft office. Using windows 10 has some advantages (softwarelicense4u.com, 2021) as well. Like: Windows 10 updated the system for extended periods. The virus protection of windows 10 is excellent
Firewall: - A firewall is a computer network security system that restricts internet traffic in, out, or within a private network. Prices usually around £75 -£ HIDS: - HIDS stands for Host based intrusion detection which helps to utilize a combination of signature-based and anomaly-based detection methods. Prices usually around £75 -£ Bridges: - Bridge helps to connect single or multiple devices together to form a large network for communication. Prices start from £ Wireless devices: - It helps to transfer data from one device to another without any connection like wires, cables, etc. Prices start from £ Access Point (Wired and Wireless): - It helps to connect many wireless devices altogether to form a networking communication. Content Filter: - It is used in different organizations to exclude objectional webpages. For a single device per annually fee is £ Load Balancer: - It helps to balance works between devices without using protocols. For new account it offers free tier Modem: - It helps to convert signals from one device to another. Prices start at £ Packet Shaper: - It helps to detect and automatically classify an extensive collection of applications and protocols. Different shapes of license charge differently. VPN Concentrator: - It establishes multiple encrypted VPN tunnels at the same time and provides a secure and encrypted connection between different VPN nodes. Prices start from £180. As soon as the workstation, which is computer connects with the home network, it permits the workstation to access over the internet, attached devices as well as networked printers on the same network. Ethernet wired networks and Wi-Fi wireless networks are the two types of connection that are used by the workstation to connect with the network. When I'm going to set up an Ethernet Wired network, I need an ethernet modem, a router as well as ethernet cables. Although, If I want to set up a Wi-Fi wireless network, I need an Ethernet Modem, a router which is wireless-enabled and some ethernet cables as well to connect modem with routers. Unless my computer is built up with wireless card, then each computer needs a separate wireless adapter. Ethernet wired networks: - Connecting the internet coaxial cable to the internet or cable port of my modems. My modem has a built-in router. Use an ethernet cable to connect each computer ethernet port with the open ports on the modem.
Then I will click on the network icon in the system tray to test for the wired connection. Open a web browser and connect to a website. If the site isn't loaded that means the connection isn’t completed. Then I must check modem user manuals to check further guidelines. Wi-Fi wireless networks: - Connecting the internet coaxial cable to the internet or cable port of my modems. Then I will click on the network icon in the system tray to find the list of wireless networks. Then I'll select the network and click connect. Then I must provide the network security key. Open a web browser and connect to a website. If the site isn't loaded that means the connection isn’t completed. Then firstly I must check the entered network security key is correct. I can check the further guidelines on my user's manual. Creating Homegroups: - A home group needs to be created, which allows the computer in the same network to connect to each other and share files as well. The way of creating homegroups: I have to select control panel from my power user menu Then i must select network and internet, followed by Homegroup Click create and then follow by Next Then i must choose libraries, devices as well as the files that I want to share with other computers on the same network. After that I must click on Next When it shows write the homegroup password, then I write it down. Finally, I will click Finish. Without installing network interface cards on the computer, a computer can't connect to the internet as well as cannot connect with the other computers on the network. A network cable will be used to connect NIC with Modem. Active Directory is a directory service and that is based on Lightweight Directory Access Protocol (LDAP). In a windows domain network active directory is liable for verifying as well as authorizing all users and computers (www.agileit.com, 2022). AD stow information regarding objects on the network and creates a straightforward way for administrators and users to find and use that information. AD utilizes an organized data store. Active Directories are seven different types.