Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Network Fundamentals: Types, Protocols, Topology, and Communication, Cheat Sheet of Public Law

A comprehensive overview of network fundamentals, covering key concepts such as network types, protocols, topology, and communication. It explains the different types of networks, including lan, man, wan, and pan, and delves into the importance of network protocols like tcp/ip, http, dns, and dhcp. The document also explores network topology, highlighting the advantages and disadvantages of various topologies like mesh, bus, ring, and star. It emphasizes the impact of network topology on communication and bandwidth requirements, providing insights into how different topologies affect data flow and network performance. The document concludes with a discussion of network devices, including switches, routers, gateways, and dhcp servers, explaining their roles in network infrastructure and management.

Typology: Cheat Sheet

2024/2025

Uploaded on 03/27/2025

do-quang-anh-fgw-hcm
do-quang-anh-fgw-hcm 🇻🇳

1 document

1 / 22

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
07.03-BM/ĐT/HDCV/FE 1/0 1/22
Higher Nationals - SummativeAssignmentFeedback Form
Student Name/ID
DO QUANG ANH/ GCS210748
Unit Title
Unit 2: Networking Infrastructure
Assignment Number
1
Assessor
NGO QUOC ANH
Submission Date
10/3/2025
Date Received 1st
submission
Re-submission Date
Date Received 2nd
submission
Grading grid
P1
P2
P3
P4
M1
M2
D1
Assessor Feedback:
*Please note that constructive and useful feedback should allow students to understand:
a)
Strengths of performance
b)
Limitations of performance
c)
Any improvements needed in future assessments
Feedback should be against the learning outcomes and assessment criteria to help students understand how
these inform the process of judging the overall grade.
Feedback should give full guidance to the students on how they have met the learning outcomes and
assessme nt criteria.
Grade:
Assessor Signature:
Date:
Resubmission Feedback:
*Please note resubmission feedback is focussed only on the resubmitted work
Grade:
Assessor Signature:
Date:
Internal Verifier’s Comments:
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16

Partial preview of the text

Download Network Fundamentals: Types, Protocols, Topology, and Communication and more Cheat Sheet Public Law in PDF only on Docsity!

  1. 03 -BM/ĐT/HDCV/FE 1/0 1 / 22 Higher Nationals - SummativeAssignmentFeedbackForm Student Name/ID DO^ QUANG^ ANH/^ GCS Unit Title Unit^ 2:^ Networking^ Infrastructure Assignment Number^1 Assessor NGO^ QUOC^ ANH Submission Date 10/3/2025 (^) Date Received 1st submission Re-submission Date Date Received 2nd submission Grading grid P1 P2 P3 P4 M1 M2 D Assessor Feedback: *Please note that constructive and useful feedback should allow students to understand: a) Strengths of performance b) Limitations of performance c) Any improvements needed in future assessments Feedback should be against the learning outcomes and assessment criteria to help students understand how these inform the process of judging the overall grade. Feedback should give full guidance to the students on how they have met the learning outcomes and assessment criteria. Grade: Assessor Signature: Date: Resubmission Feedback: *Please note resubmission feedback is focussed only on the resubmitted work Grade: Assessor Signature: Date: Internal Verifier’s Comments:
  1. 03 -BM/ĐT/HDCV/FE 1/0 2 / 22 Signature & Date:
  • Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment.
  1. 03 -BM/ĐT/HDCV/FE 1/0 4 / 22

P1.Discuss the benefits and constraints of different

network types and standards.

1. Networks and Their Types

Definition of Network:

A network is a collection of computers, servers, mainframes, network devices, or other devices connected to one another to allow the sharing of data and resources. Networks facilitate communication and collaboration by enabling data transfer and resource sharing.

Types of Networks:

1. Local Area Network (LAN):

  • Benefits:
  • High data transfer rates due to limited distance.
  • Easy to set up and manage.
  • Cost-effective for small areas.
  • Enhanced security as it is confined to a smaller physical area.
  • Constraints:
  • Limited to a small geographical area.
  • Limited scalability without significant reconfiguration.
  • Potentially higher maintenance for individual devices.

2. Metropolitan Area Network (MAN):

  • Benefits:
  • Covers larger areas than LANs, such as cities or large campuses.
  1. 03 -BM/ĐT/HDCV/FE 1/0 5 / 22
  • Can connect multiple LANs, facilitating resource sharing across larger distances.
  • More efficient and cost-effective for large urban areas. 5
  • Constraints:
  • More complex and expensive to set up and maintain than a LAN.
  • Requires management of higher amounts of data traffic. 3. Wide Area Network (WAN):
  • Benefits:
  • Covers very large geographical areas, such as countries or continents.
  • Connects multiple LANs and MANs, enabling long-distance communication and resource sharing.
  • Essential for large organizations with multiple locations.
  • Constraints:
  • Expensive to set up and maintain.
  • Lower data transfer rates compared to LANs and MANs due to long distances.
  • Higher latency and potential for data loss over vast distances.

4. Personal Area Network (PAN):

  • Benefits:
  • Typically involves short-range wireless communication, such as Bluetooth.
  • Ideal for connecting personal devices like smartphones, tablets, and laptops.
  • Easy to set up and use.
  • Constraints:
  • Limited range (a few meters).
  • Limited number of devices can be connected simultaneously.
  • Lower data transfer rates compared to LAN.
  1. 03 -BM/ĐT/HDCV/FE 1/0 7 / 22
  • Purpose: Used for transmitting hypertext over the internet, enabling web browsing.
  • Benefits: Foundation of data communication for the World Wide Web.
  • Constraints: Stateless protocol; each request is independent, which can lead to inefficiencies. 3. DNS (Domain Name System):
  • Purpose: Translates human-friendly domain names to IP addresses.
  • Benefits: Simplifies internet navigation for users.
  • Constraints: DNS servers can be targets for attacks, such as DNS spoofing. 4. DHCP (Dynamic Host Configuration Protocol):
  • Purpose: Automatically assigns IP addresses to devices on a network.
  • Benefits: Simplifies network administration, reduces configuration errors.
  • Constraints: Central point of failure; if the DHCP server goes down, new devices cannot join the network. 5. ICMP (Internet Control Message Protocol):
  • Purpose: Used by network devices to send error messages and operational information.
  • Benefits: Helps diagnose network problems, such as unreachable hosts.
  • Constraints: Can be used for malicious purposes, such as DDoS attacks. International Standard Organizations and Networking Standards
  1. 03 -BM/ĐT/HDCV/FE 1/0 8 / 22

3.International Standard Organizations:

1. IEEE (Institute of Electrical and Electronics Engineers):

  • Standards:IEEE 802.3 (Ethernet), IEEE 802.11 (Wi-Fi).

2. ISO (International Organization for Standardization):

  • Standards:ISO/IEC 7498-1 (OSI Model).

3. IETF (Internet Engineering Task Force):

  • Standards: RFCs (Request for Comments), such as RFC 791 (IP), RFC 793 (TCP).

4. ITU (International Telecommunication Union):

  • Standards:ITU-T G.992 (ADSL), ITU-T H.323 (VoIP). These organizations develop and maintain standards to ensure interoperability, reliability, and compatibility across various networking technologies and protocols. They play a critical role in the evolution and implementation of network technologies, ensuring that devices and systems from different manufacturers can work together seamlessly.

P2.Explain the impact of network topology,

communication and bandwidth requirements.

1.Network Topology

Definition of Network Topology: Network topology refers to the arrangement of various elements (links, nodes, etc.) in

  1. 03 -BM/ĐT/HDCV/FE 1/0 10 / 22 -Failure of one node doesn’t affect the rest of the network. Disadvantages: -Central hub is a single point of failure; if it fails, the entire network goes down. -Requires more cable than some other topologies (e.g., bus topology). Bus Topology: Advantages: -Easy and inexpensive to set up for small networks. -Requires less cable than star topology. Disadvantages: -Difficult to troubleshoot; a failure in the main cable stops all transmission. -Limited cable length and number of nodes. Ring Topology: Advantages: -Data packets travel in one direction, reducing the chance of data collisions. -Can offer better performance than bus topology under heavy load. Disadvantages: -Failure of a single node or link can disrupt the entire network. -More complex to install and manage than bus or star topologies Tree Topology: Advantages: -Hierarchical, easy to manage and scale. -Combines characteristics of star and bus topologies. Disadvantages:
  1. 03 -BM/ĐT/HDCV/FE 1/0 11 / 22 -If the backbone line breaks, the entire segment goes down. -More cabling and more complex than bus topology

2.Network Communication and Bandwidth Requirements

Definition of Network Communication: -Network communication refers to the exchange of data between devices in a network. This involves sending and receiving data packets following specific rules and protocols. Rules in the Network: -Network rules, also known as protocols, are essential to ensure proper communication and data transfer between devices. These rules govern how data is formatted, transmitted, received, and acknowledged. Common Rules/Protocols: -TCP/IP: Manages how data is packetized, addressed, transmitted, routed, and received. -HTTP: Governs the transmission of web pages. -DNS: Translates domain names to IP addresses. -DHCP: Automatically assigns IP addresses to devices. Why These Rules are Needed: -Ensure reliable data transmission. -Facilitate communication between devices from different manufacturers. -Prevent data collisions and errors. -Manage network traffic efficiently.

  1. 03 -BM/ĐT/HDCV/FE 1/0 13 / 22 Understanding these elements is crucial for designing efficient and robust networks that can meet specific communication and bandwidth needs.

P3.Discuss the operating principles of networking

devices and server types.

1.Networking Devices:

1. Switches: Switches operate at the Data Link layer (Layer 2) of the OSI model. They are used to connect devices within a LAN (Local Area Network). A switch receives data packets, processes them, and forwards them to the intended destination device based on MAC (Media Access Control) addresses. Operation: Packet Switching: Switches use packet switching to receive, process, and forward data packets. MAC Address Table: Switches maintain a MAC address table to keep track of the MAC addresses associated with each port. Collision Domains: Each port on a switch creates a separate collision domain, reducing collisions and improving network efficiency. Advantages: -Enhances network performance by reducing collisions. -Supports full-duplex communication, allowing simultaneous send and receive operations.

  1. 03 -BM/ĐT/HDCV/FE 1/0 14 / 22

2. Routers: Routers operate at the Network layer (Layer 3) of the OSI model. They are used to connect multiple networks, such as connecting a LAN to a WAN (Wide Area Network). Routers determine the best path for data packets to travel from the source to the destination based on IP addresses. Operation: Routing Table: Routers use routing tables to determine the best path for data packets. Routing Protocols: Routers utilize protocols like OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol) to communicate with other routers and update routing tables. Packet Forwarding: Routers examine the destination IP address of a packet, consult the routing table, and forward the packet to the appropriate next hop. Advantages: -Connects different network architectures. -Facilitates efficient data routing across large and complex networks.

2.Other Common Networking Devices:

1. Gateway: A gateway operates at multiple layers of the OSI model and acts as a bridge between different networks that use different protocols. It can translate data formats, protocols, or both. Use: Connecting a company’s intranet to the internet.

  1. 03 -BM/ĐT/HDCV/FE 1/0 16 / 22 Example: When a user types a web address in their browser, the DNS server translates it into an IP address that the browser uses to fetch the web page.

3. Web Server: A web server stores, processes, and delivers web pages to clients (browsers) using the HTTP or HTTPS protocols. Use: Hosts websites and web applications. Example: A company’s website is hosted on a web server, making it accessible to users via the internet. 4. File Server: A file server provides a centralized location for storing and managing files, allowing users to share files over a network. Use: Facilitates file sharing and collaboration within an organization. Example: Employees can access shared documents and files stored on a file server. 5. Mail Server: A mail server handles the sending, receiving, and storage of email messages. Use: Manages email communications for organizations and individuals. Example: An organization’s mail server ensures that emails are delivered to the appropriate recipients and stores messages for later retrieval. Understanding the roles and operations of these networking devices and server types is crucial for designing and maintaining efficient, secure, and scalable networks. Each device and server type serves specific functions that collectively ensure smooth and reliable network operations.

  1. 03 -BM/ĐT/HDCV/FE 1/0 17 / 22

P4.Discuss the inter-dependence of workstation

hardware with relevant networking software.

Explain the meaning of the inter-dependence

Interdependence refers to a relationship where the needs of one subject can be met by the resources of another, with resource transfer occurring in both directions. This means both parties rely on each other to satisfy their needs. Such relationships are common in many areas, as humans often require the assistance of others to thrive. In the business world, organizations depend on each other in various ways.

Real example of Interdependence

Take the flour industry as an example. One person focuses on growing crops, another on milling, another on packing, distributing, and eventually selling the flour. They all rely on each other to produce the final product. If the mill stops operating one day, everyone in the chain is impacted. This illustrates their interdependence.

Definition of workstation

A computer network consists of multiple computers that share resources hosted on or provided by network nodes. These computers communicate with each other using standard communication protocols over digital connections.

  1. 03 -BM/ĐT/HDCV/FE 1/0 19 / 22

Discuss and explain the inter-dependencies of workstation hardware with

networking software.

The inter-dependencies between workstation hardware and networking software refer to the close relationship between a computer's physical components and the software that facilitates network connectivity and communication. The performance and capabilities of the workstation's hardware significantly influence the efficiency and effectiveness of the networking software, which, in turn, depends on the hardware to operate correctly. Let's explore the main inter-dependencies, providing illustrations to enhance the explanation.

  1. 03 -BM/ĐT/HDCV/FE 1/0 20 / 22 Explain the figure : Hardware and software are mutually dependent in their interaction. Computers can only produce useful results when both work together. Using software necessitates the use of hardware. In software, users interact with hardware similarly to how they do on a computer. Often, hardware and software are closely linked, with each expected to collaborate to provide valuable results for the computer. Any hardware device must be supported for a program to function; without proper instructions, the hardware becomes inoperable (2022).