Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Benefits & Constraints of Interdependence in Network Types, Topologies, and Devices, Essays (university) of Network Programming

An in-depth analysis of various network types, including LAN, MAN, WAN, WLAN, and VPN. It discusses the benefits and constraints of each network type, as well as the impact of network topology and communication requirements. The document also covers the operating principles of networking devices such as routers, hubs, repeaters, and servers. Furthermore, it explores the interdependence of workstation hardware and networking software.

Typology: Essays (university)

2020/2021

Uploaded on 07/31/2022

tung-pham-son-1
tung-pham-son-1 🇻🇳

1 document

1 / 31

Toggle sidebar

Related documents


Partial preview of the text

Download Benefits & Constraints of Interdependence in Network Types, Topologies, and Devices and more Essays (university) Network Programming in PDF only on Docsity! ASSIGNMENT 1 FRONT SHEET Qualification BTEC Level 5 HND Diploma in Computing Unit number and title Unit 2: Networking Infrastructure Submission date Date Received 1st submission Re-submission Date Date Received 2nd submission Student Name Pham Son Tung Student ID Psgcd201502 Class GCD0905 Assessor name Tran Trong Minh Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student’s signature Tung Grading grid P1 P2 P3 P4 M1 M2 D1  Summative Feedback:  Resubmission Feedback: Grade: Assessor Signature: Date: Lecturer Signature: UNIVERSITY of GREENWICH “BT E Cc sawn IG cnn “« Regional ISP Figure 1: Network Network Type A computer network can be categorized by their size. A computer network is mainly of five types: 1. LAN (Local Area Network) LAN: The network of many computers or computing devices such are PCs, printers, etc., connected together in a small geographical area such as a building for communicating with each other and share their files resources and applications with each other (Mishal Room 2020). Figure 2: LAN • Benefits:  It is easy to share of resources. In LAN, all the computers and other devices are connected together to a single network. If any device needs resources from other device that can be shared between them.  In the LAN, there is the facility to use a single internet connection for all the devices connected in the LAN. In offices, school computer labs, and in the internet café, the only way to connect the internet together is by using LAN technology.  The centralized data. The data of users are located at the integrate server. Moreover, user can access their own data by logging into their accounts.  Since data is stored on a local server, it can be guaranteed to be secure. • Constraints:  Even though LAN saves a lots of money of resource sharing, but initial expenses in setting up is quiet high. The mainly from requirement that is needed to make a server.  The LAN administrator has the authority to check personal data of each and every LAN user. Therefore, this can lead to Policy violations.  LAN often faces hardware problems and system failure. Hence, it requires a special administrator to look after these issues.  It’s limited distance (up to 10km). Most probably it can use in a small areas such as company, school, banks.  Appearance of virus in a LAN based infrastructure is very dangerous. If one computer install and having virus, it can easily spread to another computer in the network. 2. MAN (Metropolitan Area Network): MAN: A metropolitan area network (MAN) is a large computer network that usually spans a city or a large campus. A MAN Network is optimized for a larger geographical area than a LAN, ranging from several blocks of buildings to entire cities. The purpose of MAN (Metropolitan Area Network) is to provide the link to the internet in the long run. MAN Network provides Internet connectivity for LANs in a metropolitan region, and connect them to wider area networks like the Internet (Arasal Jahejo 2018).  Message exchange. With the advancement of Internet of Things (IoT) and LAN, a sudden growth of WAN based devices can be seen. From this communication through messages can be done fast with the help of popular applications such as messenger and whatsapp.  Another biggest plus of WAN is that they offer guaranteed uptime. WAN providers offer uptime weekly, quarterly or annually. It is a part of the SLA.  In order for forming a backbone of a respective network, corporate LAN often often uses leased lines. Using leased lines means that there are more bandwidths compared to a standard broadband connection. Constraints:  Since WAN has more technologies combined to each other, it faces more security issues comparing to LAN and MAN. This can open a security gap which paves the way for malicious attacks and identity thefts.  WANs are on default complicated and complex basically because of their geographical coverage, so they are expensive to setup. Setting up a WAN requires purchasing of routers, switches and security solutions.  Customers often face disconnection issues more frequently because in some areas, especially in remote locations, there is no proper electricity supply or line structure. For getting rid of this customers are required to purchase a dedicated line from the ISP.  In case if those wires gets broken, it can be challenging to fix them since it involves lots of resources.  Maintaining WAN is a difficult task to carry out. It needs assistance from administrators network full time ( 24/7 ). 4. WLAN (Wireless Local Area Network) WLAN: Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network (Pulkitagear 2020). Figure 5: WLAN • Benefits:  As WLAN reduces physical wires so it’s a versatile way of communication.  You’ll also move workstation while maintaining the connectivity.  The direction of connectivity are often anywhere i.e. you’ll connect devices in any direction unless it’s within the range of access point.  Easy installation and you would like don’t need extra cables for installation.  WLAN are often useful in disasters situation e.g. earthquake and fire. WIreless network can connect people in any disaster  It’s economical due to the tiny area access. • Constraints:  If the amount of connected devices increases then data transfer rate decreases.  WLAN uses frequency which may interfere with other devices which use frequency.  If there’s rain or thunder then communication may interfere.  Due to Low security as attackers can get access to the transmitted data.  Signals could also be suffering from the environment as compared to using fiber optics.  Communication isn’t secure and may be accessed by unauthorized users.  ▪ The radiation of WLAN are often harmful to the environment. 5. VPN (Virtual Private Network) VPN: By extending a private network across the Internet, a VPN lets its users send and receive data as if their devices were connected to the private network – even if they’re not. Through a virtual point-to-point connection, users can access a private network remotely (Tim Mocan 2019). Figure 7: TCP/IP 2. HTTP Definition: The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, where hypertext documents include hyperlinks to other resources that the user can easily access, for example by a mouse click or by tapping the screen in a web browser. (Transport Layer Security 2014). Figure 8: HTTP 3. DNS Definition: Domain Name System, which is used to locate computers on a network and is the underlying service on the Internet to match names, such as www.youtube.com and IP addresses for locating Web sites and controlling e-mail delivery (Network World page 42 ). Figure 9: How DNS works Some international standards organizations:  IEC - International Electrotechnical Commission  IEEE - Institute of Electric and Electronic Engineers  IETF - Internet Engineering Task Force  ISO - International Organization for Standardization  ITU - The International Telecommunication Union  ITU-R - ITU Radiocommunications Sector (CCIR)  ITU-T - ITU Telecommunications Sector (CCITT)  IUPAC - International Union of Pure and Applied Chemistry  OASIS - Organization for the Advancement of Structured Information Standards  SI - Systéme International d'Unit's (International System of Units)  W3C - World Wide Web Consortium  Accellera - Accellera Organization Figure 11: Star topology Advantages Disadvantages  Easy to install, configure, manage and expand  Centralized management  Add or remove of device doesn’t affect the whole network  Failure of hub affects entire network  Requires more cable to manage  More expensive Ring Topology: Ring topology is where nodes are arranged in a circle . The data can travel through the ring network in either one direction or both directions, with each device having exactly two neighbors (Staff Contributo 2015). Figure 12: Ring Topology Advantages Disadvantages  Reliable and offers greater speed  No collisions  Need more cabling is required compared to the bus topology  One error device affects the entire network Mesh Topology: A mesh topology is an intricate and elaborate structure of point-to-point connections where the nodes are interconnected. Mesh networks can be full or partial mesh. Partial mesh topologies are mostly interconnected, with a few nodes with only two or threeconnections (Staff Contributo 2015). Figure 13: Mesh Topology Advantages Disadvantages  Improves the error tolerance  Failure of one link does not affect the entire network  Centralized management is not required  Hard to install and manage  It is expensive Tree Topology: The tree topology structure gets its name from how the central node functions as a sort of trunk for the network, with nodes extending outward in a branch-like fashion. Because the tree topology structure is both extremely flexible and scalable, it’s often used for wide area networks to support many spread-out devices (Staff Contributo 2015). Figure 14: Tree Topology Advantages Disadvantages  Design look like a tree so it is easy to expand the network  Fault detection is easy  Difficult to configure  If backbone breaks, entire network goes down  More expensive Hybrid Topology: Hybrid structures are most commonly found in larger companies where individual departments have personalized network topologies adapted to suit their needs and network usage (Staff Contributo 2015). Uses the Media Access Control (MAC) address of the devices to determine the correct port. Refers to MAC table which stores MAC address with corresponding port number. 3. Gateway o Definition: A gateway is the same as a router, except in that it also translates between one network system or protocol and another. It router the traffic from a work station to the outside network that serving the web pages (The General Science Compendium page 197). o Operating principles of a gateway: When two networks want to communicate with each other, the data will be transferred to the gateway -> the destination will receive through the most efficient transmission. A gateway will also store its own security information. 4. Hub o Definition: The most common type of network is the Ethernet network where all nodes are connected to a central device. In its simplest form this central node is called a hub (The General Science Compendium page 197). o Operating principles of a hub: The hub handles all requests from network devices, this type of data is called a frame. And when data is sent from one node, after reaching Hub, all data will move to all connected nodes because it is not able to distinguish the port that will perform the incoming task. So, it will go to all ports, to ensure that it has completed its intended destination. 5.Repeater o Definition: A repeater is an electronic device that simply regenerates a signal. It works at the physical layer of the OSI protocol. Signals travelling across a physical wire travel some distance before they become weak, or get corrupted, and regenerates it (Data Comms & Networks). o Operating principles of a repeater: Principle of repeater is to receive the existing Wi-fi signal, then amplify the signal to other devices. 6. Firewall o Definition: A firewall act as a barrier between a trusted network and untrusted network. It control access to the resources of a network through a passive control model. is a convenient platform for several internet functions that are not security related which include network address translator and a network management function (The General Science Compendium page 197). o Operating principles of a firewall: A firewall defines a single choke point that keeps unauthorized users out of the protected network, prohibits vulnerability and provides protection from spoofing and routing attacks. Sever types: 1. Web server: o Definition: A web server is a computer that runs websites. It's a computer program that distributes web pages as they are requisitioned. These web pages are mostly static content that includes HTML documents, images, style sheets, test etc. Apart from HTTP, a web server also supports SMTP (Simple Mail transfer Protocol) and FTP (File Transfer Protocol) protocol for emailing and for file transfer and storage (The Economic Times 2017). o Operating principles of a web server: The basic objective of the web server is to store, process and deliver web pages to the users. This intercommunication is done using Hypertext Transfer Protocol (HTTP). 2. Email sever o Definition: Email server is essentially a computer system that sends and receives emails. When you send an email, it goes through a series of servers to reach its final destination. Not only works fast and stable, Mail Server also ensures safety with high data recovery ability” (Alassouli 2021, page 5). o Operating principles of a email server:The diagram here below describes the path that email takes from your computer to the intended recipient . This shows the path of the email from sending to receiving ends. There are also many logical machines in the email delivery process. To find the recipient's server, the sender's SMTP server must communicate with DNS (Domain Name Server). when the receiver's IP address is available, the sender's STMP can connect to the receiver's STMP server. 3. DNS sever o Definition: The Domain Name System converts domain names, which can be read by humans, into IP addresses, which in turn can be read by machines. This makes the DNS the “telephone book of the internet” because it is a directory that enables users to access the IP addresses associated with specific addresses in their browsers (The Myra Network Security,2015). o Operating principles of a email server: Each DNS server is operated and managed by a website service provider and each domain and subdomain supports multiple DNS Servers. When external DNS servers attempt to resolve the name of an unmanaged website, the domain's DNS server takes the appropriate actions to respond. 4. DHCP sever o Definition: A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to broadcast queries by clients. (The Cyberattack Battlefield Infoblox). o Operating principles of a DHCP server: The workstation starts with an “empty IP address” that allows communication with DHCP Servers using TCP/IP protocol. The client receives the DHCP Offer message and accepts one of the IP addresses, the client sends a DHCP Request message to request the appropriate IP to the appropriate DHCP Server. V. Discuss the inter-dependence of workstation hardware with relevant networking software. Workstation Hardware: A workstation is a computer dedicated to a user or group of users engaged in business or professional work. It includes one or more high resolution displays and a faster processor than a personal computer. A workstation also has greater multitasking capability because of additional random access memory, drives and drive capacity. A workstation may also have a higher-speed graphics adapters and more connected peripherals (Techopedia,2012). Workstation hardware has the main components: o CPU: Central Processing Unit fabricated on one or more chips, containing the basic arithmetic, logic, and control elements of a computer that are required for processing data (Modern Dictionary of Electronics (Seventh Edition), 1999). o ROM: Read-only memory is a class of storage medium used in computers and other electronic devices. Data stored in ROM can only be modified slowly, with difficulty, or not at all, so it is mainly used to distribute firmware (Modern Dictionary of Electronics (Seventh Edition), 1999). o RAM: Random access memory is a computer's short-term memory, which it uses to handle all active tasks and apps. None of your programs, files, games, or streams would work without RAM. RAM is the super-fast and temporary data storage space that a computer needs to access right now or in the next few moments. o NIC: Network Interface Card is an important hardware component used to provide network connections. 4. IT Release Learn ( Junaid Rehman ) 2018 5. Benefits and Constraints of WLAN ( Geeksforgeeks ) 2020 (https://www.geeksforgeeks.org/advantages-and-disadvantages-of-wlan/ ) 6. Benefits and Constraints of VPN ( Tim Mocan ) 2019 (https://www.cactusvpn.com/vpn/vpnadvantages- disadvantages/ ) 7. TCP/IP Network Administration: Help for Unix System Administrators 2005) 8. Open Networking with OSI (Adrian Tang, Sophia Scoggins) 1992 Transport Layer Security (Steven Turner) 2014 10. Network World 2000 11. Top-Down Network Design, Ch. 5: Designing a Network Topology (Priscilla Oppenheimer) 1999 12. DNS Stuff ( Staff Contributor) 2019 (https://www.dnsstuff.com/what-is-network-topology ) 13. The Definitions of Bandwidth (Andrew Froehlich, West Gate Networks) 14. The General Science Compendium (Disha Experts) 2018 15. Data Comms & Networks (Achyut S. Godbole) 2018 16. The Economic Times, The definitions of Web server(https://economictimes.indiatimes.com/definition/webserver#:~:text=Definition%3A%20A%20web %20server%20is,Hypertext%20Transfer%20Protocol%20(HTTP). ) 17. The Myra Network Security 2015 18. The Cyberattack Battlefield Infoblox E-book Figure 1:https://www.itread01.com/uploads/images/20161011/1476120372-6604.jpg Figure 2:https://www.totolink.vn/public/uploads/img_article/phanbietmanglanwanmanmanglanlagi.png Figure 3:https://www.totolink.vn/public/uploads/img_article/phanbietmanglanwanmanmanlagi.png Figure 4:https://www.totolink.vn/public/uploads/img_article/phanbietmanglanwanmanmangwanlagi.png Figure 5:https://freetuts.net/upload/product_series/images/2020/12/08/1206/wlan-la-gi-2.jpg Figure 6:https://www.totolink.vn/public/uploads/img_article/phanbietmanglanwanmanvpnlagi.png Figure 7:https://upload.wikimedia.org/wikipedia/vi/3/3e/IP_stack_connections.png Figure 8:https://cdn.tgdd.vn/Files/2018/11/10/1130277/giao-thuc-http-https-la-gi-co-gi-khac-nhau-nhung- dieu-can-biet-de-su-dung-internet-an-toan-hon.jpg Figure 9:http://2.bp.blogspot.com/-bdhI9VRD0l8/T7Wy-9v2NNI/AAAAAAAAAWY/2J5gk7zsY- E/s1600/Part+15_DNS.jpg Figure 10:https://www.computerhope.com/jargon/b/bustopol.gif Figure 11:https://www.computerhope.com/jargon/s/star.gif Figure 12:https://www.computerhope.com/jargon/r/ring.gif Figure 13:https://www.computerhope.com/jargon/m/mesh.gif Figure 14:https://media.geeksforgeeks.org/wp-content/uploads/20200526102238/Untitled-Diagram-153- 1.png Figure 15:https://static.javatpoint.com/computer/images/what-is-hybrid-topology.jpg Figure 16:https://www.themetisfiles.com/wp-content/uploads/2012/10/software-defined-networking.png
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved