Documente Academic
Documente Profesional
Documente Cultură
Ans:-
Peer-based :-In this network all computer are connected with each other via the internet and they
can transfer or shear file directly between system on the network without any central server .
Low cost
Simple to configure or setup
User has full accessibility of the computer
Client-server:- In this network all workstation and personal mobile, computer ,printer are connected
with server via hub and internet. Clients can access all data and run any program from server.
Cloud based network:-It is a type of networking which gets their access from a third-party provider
using Wide Area Networking (WAN) and in this networking the network can be shared as well as the
computing resources.
Cost efficiency
Mobility
Reliability
Control
Compatibility
Downtime
Centralized network:- In this network all users are connect to a central server. This network work as
an agent for all communications. User account information and communication both would store in
this server.
Centralized system
Easy to use
Easy to control
Security problem
Virtualized network:- virtualized network’s main focus is to enable a data center or internet service
provider to provision the most suitable and efficient network for the application server.
Reduce of spending
Easy to maintain
High cost
Security risk
IEEE 802.1X network:- This network is part of the IEEE 802.1 group of networking protocols and IEEE
standard for port-based network access control.
Easy to management
Easy to use
Scalability
Security
Network access
High cost
Conceptual network:- A conceptual network is an analytical tool with many variations and contexts.
It may be applied in several classes of work wherever an overall image is required. it's wont to create
abstract distinctions and organize concepts.
The situation is avoided whereby standards area unit developed on a patchwork basis,
wherever a specific accounting problem is recognized as having emerged, and resources were
then channeled into standardization.
As explicit above, the development of sure standards (particularly national standards) are
subject to considerable political interference from interested parties. wherever there's a
conflict of interest between user teams on that policies to settle on, policies account from a
abstract framework will be less open to criticism that the standard-setter buckled to external
pressure.
Financial statements are supposed for a spread of users, and it's not certain that a single
abstract framework is devised which will suit all users.
Given the range of user needs, there is also a necessity for a variety of accounting standards,
every made for totally different purpose (and with different ideas as a basic).
It isn't clear that an abstract framework makes the task of preparing and so implementing
standards any easier than while not a framework
For P2 - Explain the impact of network topology, communication and bandwidth requirements.
Ans:- The volume of data that may be transferred across a network at a given time is named its
bandwidth. a rich, high bandwidth network is able to transfer data is faster than a low bandwidth one.
The bandwidth is established by the kinds of network cards and modems used also as the amount and
kind of cable used.
Also, the approach in which computers are connected together to form a network has a massive
impact on its speed and potency. There are a number of various ways that to connect computers in a
network - however these are the most common network topology-
Fig:-Bus topology
Advantages:
Cheap
Easy to Expand
Disadvantages:-
Ring Topology:- In this each computer is connected to the next computer with the last one connected
to the first.
Fig:-Ring Topology
Advantages:-
Disadvantages:-
Difficult to troubleshoot
Star Topology:-All the wires from the computers go to a center location having a device called Hub.
Advantages:-
Easy to use
Disadvantages:-
Mesh Topology:-In this each device has a dedicated point to point link to every other device.
Advantages:-
No traffic problem
Disadvantages:-
Expensive
Advantages:-
Disadvantages:-
Expensive
Advantages:
Disadvantages:-
Expensive
Complex structure
For P3 - Discuss the operating principles of networking devices and server types.
Router:-It’s a networking device. it’s forwards data packets between computer networks.
Fig: Router
Switch: it’s a computer networking device and its connect devices together on a computer network
by using packet switching to receive, process and forward data to the destination device.
Fig:- Switch
Firewall:- A firewall is a system designed to stop unauthorized access to or from a non-public network.
It’s a specialized version of router.
Fig:- Firewall
Fig:-Wireless Device
Access point:-Access point is allows wireless devices to connect to it by means of the antennas.
Fig:-Access Point
Terminal:-It is a hardware interface between a computer and ISDN line. A terminal adapter slight like
a modem.
Client server:- In this network all workstation and personal mobile, computer ,printer are connected
with server via hub and internet. Clients can access all data and run any program from server.
How does it works:- suppose a client sitting at a restaurant. he's waiting for the server to come by and
take his order. a similar rules apply in a client-server network; the client, which may be a laptop
computer, desktop, a smartphone, or just about any computerized device, will create a request from
the server. The consumer uses the network as the way to connect with and speak to the server. even
as the client speaks to his server, the consumer uses the network to send and receive communications
about its order, or request. The server can take the request and confirm that the request is valid. If
everything checks out okay, then the server can fetch the request and serve the consumer. The server
will create a request from the consumer also. it may want to check up on the status of the consumer,
or ask if it has received any security patches, or if it still desires resources from the server. If not, the
server can shut the connection in order to unlock network traffic.
Application server:- A server that exposes business logic to client applications through varied
protocols as well as communications protocol. To deliver varied applications to a different device, it
permits everybody in the network to run software package off of a similar machine.
How does it work:- An application server consists of a server operating system (OS) and server
hardware that work along to supply computing-intensive operations and services to the residing
Fig:-Application Server
Changes to the application configuration, like a move of database server, or system settings,
will surface centrally.
Application servers saves a lot of time compared to installing a replica on each client machine.
easy to manage software licenses to make sure only the allowed number of users will run the
application at any one time.
Application servers software patches and security updates may be simply deployed.
Expensive
FTP server:- FTP is used to transfer files between two computers over a network and web. FTP is a
method of exchanging data between two computers or a computer and a server. FTP or file transfer
protocol works by following commands to upload and download files.
Fig:-FTP Server
How does it’s work:- FTP works once you have successfully opened the server command port twenty
one and established a connection between the consumer and FTP server. Then you'll transfer or access
keep files through basic commands. To connect and execute commands, the user is typically needed
to authenticate by entering an username and password.
Mail server:- With the clicking of a mouse button, you can send an email from one purpose of the
world to a different in a matter of seconds. Most people take this method for granted, giving very little
thought to how it truly works. it is easy to know how normal snail-mail gets from purpose A to purpose
B - but how will an email message build its approach from a sender to a recipient? the solution to that
question revolves around something known as a mail server.
Fig:-Mail Server
How does Mail Server Works:- The sender composes a message exploitation the e-mail consumer
on their computer. When the user sends the message, the e-mail text and attachments are uploaded
to the SMTP (Simple Mail Transfer Protocol) server as outgoing mail. All outgoing messages wait within
the outgoing mail queue whereas the SMTP server communicates with the DNS (Domain Name
Server–like a phone book for domain names and server ip addresses) to find out wherever the
recipient’s email server is found. If the SMTP server finds the recipient’s email server, it'll transfer the
message and attachments. If the recipient’s server can’t be found, the sender can get a “Mail Failure”
notification in their inbox. The next time the recipient clicks “Send & Receive,” their email consumer
can download all new messages from their own email server. You’ve got mail!
For P4 - Discuss the inter-dependence of workstation hardware with relevant networking software.
Ans:
Network Interface Card: A Network interface card is an device that connects a pc to a computer
network, typically a local area network. it's considered a bit of computer hardware. most up-to-date
computers support an internal network interface controller embedded within the motherboard
directly instead of provided as an external element. Network cards let a pc exchange information with
a network. to achieve the connection, network cards use an appropriate protocol, as an example
CSMA/CD. Network cards typically implement the first 2 layers of the OSI model, that's the physical
layer, and also the data link layer. There are a unit older network protocols like ARCNET, introduced
in 1977, Local Talk or Token Ring, but today, most network cards use ethernet.
Cabling:- A structured cabling system could be a complete system of cabling and associated hardware,
that provides a comprehensive telecommunications infrastructure. This infrastructure serves a large
vary of uses, like to provide phone service or transmit information through a electronic network. It
Most file systems have ways to assign permissions or access rights to specific users and teams of users.
These permissions control the flexibility of the users to look at, change, navigate, and execute the
contents of the filing system.
Fig:-Cabling
Permissions :-Two kinds of permissions are terribly wide used: traditional UNIX operating system
permissions date back several decades to the earliest days of UNIX operating system. they're
universally available on all UNIX operating system and Linux derived platforms. Access control Lists
(ACLs) are more modern in origin and area unit universally used on Microsoft Windows based mostly
filing systems wherever the file system supports user permissions , and are currently commonly used
and wide offered in most typical UNIX system and Linux based mostly systems, although not
essentially all. they're typically capable of much more detailed fine-tuning of permissions than the
traditional UNIX operating system permissions, and allow a system of access control that traditional
ACLs cannot provide. On UNIX operating system and Linux based mostly systems, the standard kind
of ACL is that defined by the POSIX standard (POSIX ACLs) but alternative variants exist like NFS v3 and
v4 ACLs, that work slightly differently (NFSv3 ACLs or NFSv4 ACLs).Where multiple systems are
available inside a similar package, there's sometimes some way to specify which is able to be used for
any given filing system, and how the system ought to handle attempts to access or modify permissions
that area unit controlled by one of these, exploitation commands designed for an additional. the
standard resolution is to make sure at least some degree of awareness and inter-operability between
the different commands and methods.
Client software :-The client software package is optional and not needed for basic logging, however,
it will give users with access to advanced options. These options include:-
1.Real-time feedback to the user as well as their account balances and event messages like
"print job denied" reasons.
2.Access to the account selection popup therefore users will allocate print jobs to shared
accounts - as an example, accounts representing departments, projects, clients, etc. this can
be notably necessary in an exceedingly business setting.
Server software :-Server software may be a kind of software that's designed to be used, operated and
managed on a computing server. It provides and facilitates the harnessing of underlying server
computing power to be used with an array of high-end computing services and functions. Server
software is primarily designed to act with a server’s hardware infrastructure, as well as the processor,
Each of the higher than kinds of server software utilizes the server for various functions and services,
however all focus their primary objective on using inherent pc capability and resources. Moreover,
server software is also for a physical or virtual/cloud server built on a physical server.
Client Operating System:- A desktop computer doesn't need any networks or external elements to
operate properly. The client operating system is that the system that works inside computer desktops
and varied portable devices. this technique is totally different from centralized servers as a result of it
solely supports a single user. Smartphones and small pc devices are ready to support client operating
systems. The system is in a position to manage totally different elements of the device like printers,
monitors, and cameras. every pc usually has a specific kind of operating system. Some computers have
the power to contain multiple operating systems. this can be called a dual boot configuration. once a
pc is designed during this way, it can be set up to run a particular device for every operating system
configuration. this allows flexibility for software that's designed for a particular package. once
somebody has 2 operating systems, they will have access to additional difficult software programs. In
this day and age, there are lots of completely different types of operating systems created for client
computers. a number of samples of this are Windows, Android, Mac, and Linux. every operating
system is supposed to function with a certain kind of hardware. Hardware compatibility could be a
major concern once selecting a system for client computers. There are many freeware versions
available for desktop computers. This client operating system offers multiprocessing power for a
reasonable price. Most of the Linux system configurations would like an explicit level of system
engineering information. the method of installing this system isn't meant for a beginner with
computers . Windows is maybe the most widely used client operating system these days. This
operating system has fully grown in quality ever since the discharge of Windows 95. several businesses
around the world use Windows office suite for his or her word processing wants and without the
Windows operating system it can’t be operate.The Windows operating system wants special
hardware so as to run. That hardware should be designed to support that individual application.
Server operating system:- A server operating system, additionally known as a server OS, is an
operating system specifically designed to run on servers, that are specialized computers that operate
among a client/server design to serve the requests of client computers on the network. The server
operating system, or server OS, is that the software layer on top of that alternative software programs,
or applications, will run on the server hardware. Server operating systems facilitate enable and
facilitate typical server roles like web server, mail server, file server, database server, application
server and print server. Popular server operating systems include Windows Server, mac OS X Server,
and variants of Linux like Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise Server.
Network operating system :- A Network Server pc offers its services to a bunch of Network client
devices. A Server pc usually has a lot of computing resources like Processors Power, a lot of Physical
Memory (RAM), a lot of storage space etc., compared to client computers. The Server pc machine runs
on Server operating system, additionally called as Network operating system (NOS), that usually has
more options and process capabilities compared with the client computer's operating system. The
server is also installed with special software, to perform as a Server Role. The special software allows
a Server pc to function a particular server role, sort of a file server, Web Server, Mail Server, Directory
Server etc.A Network operating system (NOS) includes far more capabilities than a standard client
workstation (or Desktop) operating system. most well liked Network operating Systems are listed
below.
Windows NT
Windows 2000
Windows 2003
UNIX operating system -Oracle Solaris, IBM AIX, HP UX, FreeBSD, NetBSD, OpenBSD, SCO UNIX etc.
Linux operating system-RedHat Enterprise Linux, Debian Linux, SUSE Enterprise, Ubuntu Server,
CentOS Server, Mandriva, Fedora etc.
For M1 - Compare common networking principles and how protocols enable the effectiveness of
networked systems.
Ans:-An application layer protocol defines however application processes (clients and servers),
running on completely different end systems, pass messages to every alternative. particularly, an
application layer protocol defines:
The syntax of the varied message sorts, for example, the fields within the message and the way the
fields are delineated.
The semantics of the fields. for example, the that means of the data that the sector is supposed to
contain;
Rules for determining once and how a method sends messages and responds to messages.
The TCP/IP protocol that supports electronic mail on the net is called simple Mail Transfer Protocol
(SMTP).
SMTP transfers messages from senders' mail servers to the recipients' mail servers using transmission
control protocol connections.
SMTP provides services for mail exchange between users on constant or completely different
computers.
SMTP has 2 facets: a client side that executes on a sender's mail server, and server aspect that
executes on recipient's mail server.
Both of the client and server sides of simple mail transfer protocol run on every mail server.
When a mail server receives mail (from alternative mail servers) it acts as an SMTP server.
TELNET is client-server application that enables a user to log onto remote machine and lets the user
to access any applications programmed on a remote pc.
TELNET uses the Network Virtual Terminal system to encode characters on the local operating system.
On the server (remote) machine, NVT decodes the characters to a type acceptable to the remote
machine.
TELNET may be a protocol that gives a general, bi-directional, eight-bit byte orientated
communications facility.
Fig:-HTTP
This is a protocol used in the main to access information on the world Wide web (www).
The hypertext Transfer Protocol (HTTP) the Web's main application-layer protocol although current
browsers will access alternative kinds of servers
A repository of data spread all over the planet and joined together.
The HTIP protocol transfer data within the kind of plain text, hyper text, audio, video and so on.
it's a synchronous protocol that works by making both persistent and no persistent connections.
HTTP is for websites using extra safety features like certificates. HTTPS is used once web transactions
are needed to be secure. HTTPS uses a certificate based technology like VeriSign.
Certificate-based transactions provide a mutual authentication between the client and the server.
HTTPS, additionally to using certificate-based authentication, encrypts all data packets sent during a
session.
Because of the encryption, confidential user information cannot be compromised. To use HTTPS, a
web website should purchase a certificate from a third-party vendor like VeriSign, Carto, united states
postal service, or alternative certificate providers. when the certificate is issued to an online website
from a third-party vendor, the online website is using trusted communication with the client. The
communication is trusted because the third party isn't biased toward either the online website or the
client. to view a certificate throughout a HTTPS session, simply double-click the lock icon within the
lower-right area of the online browser. HTTPS operates on port 443 and uses transmission control
protocol for communication.
Historically, one technique of talking about the various layers of network communication is that the
OSI model. OSI stands for Open Systems Interconnect.
Fig:-OSI Model
This model defines seven separate layers. The layers during this model are:
Application:- The application layer is that the layer that the users and user-applications most
frequently interact with. Network communication is mentioned in terms of availability of resources,
partners to communicate with, and information synchronization.
Presentation:- The presentation layer is responsible for mapping resources and making context. it's
wont to translate lower level networking data into data that applications expect to see.
Transport: -This layer is responsible for handing the layers on top of it a reliable connection. during
this context, reliable refers to the ability to verify that a bit of data was received intact at the other
end of the connection.
This layer will resend data that has been dropped or corrupted and may acknowledge the receipt of
data to remote computers.
Network:- The network layer is used to route information between totally different nodes on the
network. It uses addresses to be ready to tell which pc to send information to. This layer may also
break apart larger messages into smaller chunks to be reassembled on the opposite end.
Data Link:- This layer is enforced as a technique of creating and maintaining reliable links between
totally different nodes or devices on a network using existing physical connections.
Physical:- The physical layer is responsible for handling the particular physical devices that are wont
to create a connection. This layer involves the bare software that manages physical connections also
because the hardware itself (like Ethernet).
As you'll see, there are many various layers that may be discussed based on their proximity to bare
hardware and also the functionality that they provide.
TCP/IP Model:-The TCP/IP model, a lot of commonly known as the internet protocol suite, is another
layering model that's less complicated and has been widely adopted. It defines the four separate
layers, a number of that overlap with the OSI model:
Application:- During this model, the application layer is responsible for making and transmitting user
information between applications. The applications is on remote systems, and may seem to operate
as if locally to the end user.
Transport:- This layer is responsible for communication between processes. This level of networking
utilizes ports to address totally different services. It will build up unreliable or reliable connections
depending on the kind of protocol used.
Internet:- The internet layer is used to move information from node to node in a network. This layer
is attentive to the endpoints of the connections, however doesn't worry about the particular
connection required to get from one place to a different. IP addresses are outlined during this layer
as the way of reaching remote systems in an addressable manner.
As you'll see, the TCP/IP model, may be a bit a lot of abstract and fluid. This created it easier to
implement and allowed it to become the dominant way that networking layers are classified.
For M2 - Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimization.
Ans:
Virtual servers:- Virtual dedicated servers or Infrastructure as a Service as it´s usually known is a
method of getting your own machine and while the top result's similar, the thanks to order one is
completely different. You start by registering an account (here at city Cloud), and once you have
confirmed your email and identity, you get access to our control board. From there, you only click on
“New VM”, choose the operating system and/or image (some of them come with pre-installed
software package ready to go) and wait a couple of minutes. That´s right, once a couple of minutes
you get a brand new virtual machine that may be accessed by SSH or VNC. The IP address is assigned
automatically therefore you have everything you need to begin installing software package.
Fig:-Virtual Server
The pros and Cons of Virtual Servers:-Virtualization is that the act of inserting multiple "virtual
servers" on physical instrumentation. this enables physical server resources to be split between
multiple workloads for optimum efficiency and cost savings. Virtualization usually happens within the
cloud or on servers that are owned, maintained, and located offsite. Hiring a hosting vendor who
offers secure cloud services is that the most typical method that organizations switch to virtualization.
Access to skilled help on setup, configuration, maintenance, and software system licenses.
Potential for higher recurring monthly prices, as opposed to higher upfront investment.
Possible problems with application compatibility, that are best mentioned with a
knowledgeable vendor.
Not all vendors are amenable to scaling your agreement up or down in tiny increments, that
mostly depends on vendor policies and repair level agreements (SLAs).
No longer severally in control of your physical server and therefore the applications running
on them.
Cost and system Requirement of Virtual Server: 1 – 16 core server, 32 GB of RAM, several 4-port
ethernet cards, 1 TB – 2 TB disk, for a complete of $45,196
physical servers:- A physical server is simply as the name says, a server (physical computer) on that
an operating system, like Windows or Linux runs even as on any other pc. The physical servers are in
the majority aspects like desktop computers, with several improvements that desktop PCs lack
featuring things like redundant power provides, raid controllers, multiple network cards etc. The
physical servers are larger in size with rather more powerful elements in general. all of them need a
separate space in the server rack. Most of the servers even have two or more physical CPUs with
multiple cores each.
IT team has full access to your dedicated server resources 24/7/365, which might be
advantageous for high-demand or business-critical operations.
IT employees will totally customize and configure the server to your specifications and
business needs.
Relatively high price of server purchase, maintenance, and in the case of hardware failure,
replacement.
IT employees are to blame for setup, configuration, and maintenance on a continual basis.
May need to rent a contractor or vendor for facilitate if you've got problem with configuration
or repairs.
Users cannot scale storage in tiny increments once reach the maximum work, since you buy
and own the hardware.
Cost and system requirement of Physical Server: -eight dual-core servers, 4 GB RAM, 1-2 ethernet
ports, 150 GB disk for $1,339 each, for a complete of $10,172
Tomcat:- Apache tomcat, is an open source net server and servlet container developed by the Apache
Software Foundation. Basically, it implements the Java Servlet and also the Java Server Pages (JSP)
specifications from Sun Microsystem, and provides a "pure Java" http net server surroundings for Java
code to run in. within the simplest configuration tomcat runs in a very single operating system
method. Runs a Java virtual machine (JVM) and each single http request from a browser to tomcat is
processed within the tomcat process in a very separate thread. Apache tomcat includes tools for
configuration and management, however may be configured by editing XML configuration files.
Apache:- Apache HTTP Server may be a freely-available web server software package that's
distributed under associate open source license. Apache HTTP server was formerly called Apache web
Server and has been offered since 1995 through the Apache software Foundation. The software offers
an extensible and secure net server with services in set with modern HTTP standards. HTTP Server is
compatible with most UNIX-based operating systems (such as mac OS, Linux, Solaris, Digital UNIX
system, and AIX), on alternative UNIX/POSIX-derived systems and on Microsoft Windows. Apache
HTTP Server was the most popular webserver from 1996 till June of 2016.While Apache still remains
one in every of the world’s most heavily-used webservers it lost market share to NGINX, Microsoft
and others since 2016.
For D1 - Considering a given scenario, identify the topology protocol selected for the efficient
utilization of a networking system.
Singh, C. (2018). Types of Network Architecture. [online] The Practical Dev. Available at:
https://dev.to/cadellsinghh_25/types-of-network-architecture-56i7 [Accessed 19 Nov. 2018].
Managed Services and IT Support Houston TX | Intellegens Inc. (2018). Pros and Cons of different
types of network topologies • Managed Services and IT Support Houston TX | Intellegens Inc. [online]
Available at: http://intellegensinc.com/pros-and-cons-of-different-types-of-network-topologies/
[Accessed 19 Nov. 2018].
Shekhar, A. (2018). Different Networking Devices And Hardware Types — Hub, Switch, Router,
Modem, Bridge, Repeater. [online] Fossbytes. Available at: https://fossbytes.com/networking-devices-
and-hardware-types/ [Accessed 19 Nov. 2018].
Stroud, F. (2018). What is a Server Operating System? Webopedia Definition. [online] Webopedia.com.
Available at: https://www.webopedia.com/TERM/S/server_operating_system.html [Accessed 19 Nov.
2018].
Beal, V. (2018). The 7 Layers of the OSI Model - Webopedia Study Guide. [online] Webopedia.com.
Available at: https://www.webopedia.com/quick_ref/OSI_Layers.asp [Accessed 19 Nov. 2018].