Networking Architecture
Networking Architecture
Pearson
Higher National Diploma in
Computing
Unit1: Networking
1|Page
Table of Figures
Figure 1 Simplex ....................................................................................................................... 12
Figure 2 Half Duplex ................................................................................................................. 13
Figure 3 Full Duplex.................................................................................................................. 14
Figure 4 Web Servers ............................................................................................................... 15
Figure 5 Proxy Server ............................................................................................................... 16
Figure 6 FTP Server .................................................................................................................. 16
Figure 7 Mail Server ................................................................................................................. 17
Figure 8 Database Server ......................................................................................................... 18
Figure 9 Network Cables .......................................................................................................... 20
Figure 10 Network Interface Card (NIC) .................................................................................. 21
Figure 11 Hub ........................................................................................................................... 22
Figure 12 Modem ..................................................................................................................... 23
Figure 13 Router ...................................................................................................................... 24
Figure 14 Gateway ................................................................................................................... 25
Figure 15 Bridge ....................................................................................................................... 26
Figure 16 Repeater................................................................................................................... 27
2|Page
LO1: Explain Networking Devices and Operations
Introduction
In this report, I am going to discuss about Networking devices and their protocols. Also, I will
discuss the referred information part by part. We find a lot of information with these research
and lot of knowledge. And, in the first part. I’m going to discuss what OSI model, and their
layers of OSI, network protocols etc... And the second part I will explain about Servers, their
types, Functions and suitable server for BCAS. And, the last part I will explain about network
components and I will explain important components needed to form a network and also, I
will explain about some network devices. Further, I make this report based on analytical
information.
3|Page
Part 1
The OSI is an Open System Interconnected model was formed in 1984 by International
Organization for Standardization (ISO). This standard sought after the yearning goal of having
the objective to interconnect systems from various sources so they could trade data with no
sort of obstruction because of the protocols with which they worked in their own specific
manner as indicated by their manufacturer. The OSI Model is essentially a conceptual tool for
organizing broadcast communications. It universalizes the manner by which data is shared
between computer networks or electronic frameworks, regardless of its s geographical
beginning, business or different conditions that could make it hard to communicate the data.
The OSI is involved of seven layers. Every one of these levels will have its own functions so
together they can achieve their final objective. Precisely this division into levels makes
possible the intercommunication of various protocols by assembling specific functions at each
level of operation.
Something else to remember is that the OSI model isn't the meaning of a topology or a
network model itself. Nor does it indicate or characterize the protocols utilized in
communication, since these are implemented freely of this model. What OSI truly does is
define their functionality to accomplish a standard.
Basically, the function of the OSI depends straightforwardly upon its seven layers, into which
it separates the complicated process of digital communication. By compartmentalizing it, it
allocates very specific functions to each layer, inside a fixed hierarchical structure.
Accordingly, every communication protocol uses these layers completely or just some of
them, yet by complying with this set of rules, it ensures that communication between
networks is effectual and, most importantly, that it happens on same terms.
4|Page
2 Layers of OSI Model
i. Physical Layer
It is liable for sending the data bits through the line or medium utilized for transmission. It
manages the physical properties and electrical attributes of the different components, with
the transmission speed, regardless of whether it is unidirectional or bidirectional (simplex,
duplex or full-duplex). Likewise, of mechanical parts of the connections and terminals,
including the interpretation of electrical signals. As an abstract of the tasks of this layer, we
can say that it is accountable for changing a packet of binary data into a succession of driving
forces appropriate to the physical medium utilized in the transmission.
It deals with physical redirection, error detection, access to the medium and control of the
flow during communication, being part of the creation of basic protocols to regulate the
connection between computer systems. Further, this level is in charge of providing the
functional means to establish the communication of the physical elements. The typical
elements that we all know to serve as an example to this layer are the switch or also the
network router.
This layer is in charge of identifying the routing between more connected networks. This level
will allow the data to arrive from the transmitter to the receiver, being able to make the
necessary switching and routing for the message to arrive. The most popular protocol that
handles this is IP. And, the objective of this layer is to ensure that data reaches its destination,
even if it involves using intermediate devices, such as routers or routers.
5|Page
iv. Transport Layer
It is where the data found within each package is transported, from the source computer to
the destination one, regardless of the physical medium used for it. Its work is done through
logical ports and shapes. Further, this level is responsible for carrying out the transport of the
data found within the transmission packet from the origin to the destination. This is done
regardless of the type of network that the lower tier detected. The best-known protocols are
UDP and TCP.
v. Session Layer
It is responsible for controlling and maintaining the link between the computers that
exchange data, making sure that, once communication between both systems is established,
the data transmission channel can be resumed in case of interruption. These services can
become partially or totally dispensable, depending on the case.
This layer deals with the representation of the information, that is, its translation, ensuring
that the data received at any end of the network is fully recognizable, regardless of the type
of system used. It is the initial layer that deals with the content of the transmission, rather
than the way it is established and sustained. In addition, it allows the encryption and encoding
of data, as well as its compression, its adaptation to the machine that receives it (a computer,
a telephone, etc.).
(cloudflare, 2020)
6|Page
3 Network Protocols
(comptia, 2019)
The TCP / IP protocol is the basic communication protocol of the Internet and consists of two
protocols, TCP and IP. The goal is for computers to communicate easily and transmit
information through the network. This is a communications-oriented protocol and offers
reliable data transmission. TCP is in charge of assembling data from the upper layers to
standard packets, ensuring that the data transfer is carried out correctly.
This protocol is based on www (World Wide Web) which transmits messages over the
network. This protocol allows information retrieval and indexed searches that allow
intertextual jumps efficiently. Furthermore, they allow the transfer of texts of the most varied
formats, not just HTML. The HTTP protocol was developed to solve the problems arising from
the hypermedia system distributed at various points on the network.
7|Page
iii. FTP (File Transfer Protocol)
This is used when making remote file transfers. What it allows is to send digital files from a
local place to another that is remote. Generally, the local place is the PC while the remote one
the server. This is used when making remote file transfers. What it allows is to send digital
files from a local place to another that is remote or vice versa. Generally, the local location is
the PC while the remote location is the server.
The user datagram protocol is intended for connectionless communications that do not have
mechanisms to transmit datagrams. This is in contrast to TCP which is intended for
connection-oriented communications. This protocol can be unreliable except if the
applications used have a reliability check.
This protocol was developed to improve security in Internet communications, this is achieved
by eliminating the sending of unencrypted passwords and by encrypting all the information
that is transmitted. The SSH eliminates the sending of those passwords that are not encrypted
and encrypting all the transferred information.
(educba, 2020)
8|Page
3.2 Functions of Protocols
for the most part it is essential to break the data blocks into small units equal in size, and this
cycle is called division. The fundamental square of segment in a specific layer of a protocol is
called PDU (Protocol Data Unit). The need to utilize a block is for:
ii. Addressing
each station or transitional storage device must have a remarkable address. Thus, in every
terminal or end framework there might be a few agents or programs that utilization the
network, so every one of them has a related port. In addition, these global addresses, each
station or terminal on a subnet must have a subnet address (for the most part at the MAC
level).
There are times when a connection identifier is utilized. This is done when two stations set up
a virtual circuit and that association is numbered (with an association identifier known to
both). The utilization of this identifier simplifiers the mechanism for sending data since, for
instance, it is simpler than global addressing. Sometimes it is necessary for an issuer to issue
to several entities at the similar time and for that a comparative address is assigned to every
one of them.
The sending of PDUs can prompt the difficult that if there are a few possible paths, they show
up at the collector out of order or repeated, so the recipient must have a mechanism to
reorder the PDUs. There are frameworks that have a numbering mechanism with modulo
some number. this makes the modulus sufficiently high that it is unimaginable for there to
be two segments on the network simultaneously and with a similar number.
9|Page
iv. Connection Control
There are just control data blocks and other data and control blocks. When datagrams are
utilized, all blocks incorporate control and data as each PDU is treated as free. In virtual
circuits there are control blocks that are answerable for setting up the connection of the
virtual circuit. There are simpler protocols and others more complex, so the protocols of the
senders and receivers must be viable in any event.
In addition, the sender’s establishment stage (in virtual circuits) there is the exchange phase
and the connection cut-off phase. In the event that virtual circuits are utilized, the PDUs
should be numbered and a control must be kept at the sender and receiver of the numbers.
(afteracademy, 2019)
10 | P a g e
4 Data Flow
The data flow diagram is a visual method to show the operation of data over an information
framework. It presents how information enters and leaves the framework, which route it goes
through, where it is stored and the sources and objections of that information. Organizations
couldn't work without systems and cycles, and effectiveness is fundamental to accomplish
goals. There are various approaches to study this effectiveness, yet the data flow diagram
outperforms the others.
A DFD (Data Flow Diagram) shows how cycles flow in a system. It is a graphical portrayal to
show a system and, thus, can help solve where there are issues and inefficiencies. In a DFD,
the length of the cycles isn't appeared or if those cycles work in operate in series or in parallel.
There are no loops or ties, as there are in a network diagram, there are no decision points, as
there are in a flow diagram.
Flowcharts are utilized to design, analyze, document or manage a program or process, being
generally used in totally different fields, for example, programming, cognitive psychology or
economics and financial markets. This outcome in a wide scope of flow diagrams and a need
to divide by types and classifications.
They show the client supplier interfaces and the exchanges completed in them,
making it simpler for employees to analyze them.
They are an amazing tool to train new employees and furthermore the individuals
who build up the task, when enhancements are made in the process.
Like the pseudocode, the flow chart for programming algorithm examination
purposes can be executed on a computer, with an Ide, for example, Free DFD.
They permit the identification of issues and opportunities for development of the
cycle. Steps, re-measure flows, authority conflicts, responsibilities and decision
points are identified.
(lucidchart, 2020)
11 | P a g e
4.1 Types of Dataflow
4.1.1 Simplex
Simplex or unidirectional transmission is what happens one direction only, impairing the
recipient from reacting to the transmitter. Simplex transmission isn't typically utilized where
human-machine interaction is required. Instances of simplex transmission are Television,
Radio broadcasting, Keyboard to computer etc.
Figure 1 Simplex
12 | P a g e
4.1.2 Half-Duplex
A regular example of half-duplex is the civil band radio (CB) where the administrator can send
or receive, yet cannot yet can perform the both directions all the while on a similar channel.
At the point when the administrator has finished the transmission, the other party should be
prompted that it can start transmitting (example by saying "change").
13 | P a g e
4.1.3 Full-Duplex
Full-duplex transmission permits transmission in the both directions, however at the similar
time on a same channel. There are two frequencies, one to communicate and one to receive.
Instances of this sort have large amounts of the field of broadcast communications, the most
common case is telephony, where the transmitter and the receiver communicate at the
similar time utilizing a same channel, yet using two frequencies.
14 | P a g e
Part 2
5 Servers
A server is a PC that is important for a network and that provides types of services to different
computers, which are called clients: "The portal doesn't work: the server is down". Servers
are regularly used to store digital files. Clients, thusly, interface through the network to the
server and access this information. In some cases, a computer can satisfy the functions of
server and client at the similar time. Among the various types of servers, file servers (which
store documents and distribute them to network clients), mail servers (which is save receive
and send emails) and web servers (which is store documents) can be featured. that are
accessible over the Internet.
With respect to the classification of computer servers, it is possible to recognize two huge
groups: those dedicated, entirely at the service of network clients; the non-dedicated ones,
which can, in turn, function as local workstations.
(computerhope, 2020)
The main task of a web server is to save and organize web pages and deliver them to clients
such as network browsers. The communication between the server (software) and the client
is based on HTTP, the encrypted variant. As a rule, HTML documents and the elements
embedded in them, such as images, style sheets or scripts, are transmitted. The most popular
web servers are the Apache HTTP server, Microsoft Internet Information Services (ISS), etc.
15 | P a g e
5.2 Proxy Server
It is a computer whose primary function is to complete the requests made by different clients,
so as to make a task executable. Utilizing a proxy server, access to the internet is blocked or
permitted on a particular site. In detail, this is a server that goes about as an intermediate
between an Internet browser, for example, Explorer, Firefox and the Internet. This implies the
server that gets the request doesn't know who the client is that is requesting the information.
It is this connection between these two components that relies upon whether clients can get
to the data.
FTP is a form of File Transfer Protocol. This sort of server is utilized to move files between
computers, that is, from one client to another. The cycle happens when client 1 sends a
request to the FTP server and this sends a document to client 2 to be downloaded. For this,
the two clients probably installed a program called FTP.
FTP servers are utilized to transfer information from pages to web servers, for example, files,
pictures, videos, backup copies, among others.
16 | P a g e
5.4 Mail Server
Mail servers are computer applications that permit the interchange of messages through
electronic communication frameworks, which started to be created since 1971. These work
like the postal service, the enormous difference is that as opposed to taking days or weeks
to send huge packages and paper documents, they send digital information and electronic
data surprisingly fast, permitting practically quick communication.
All together for these services to work properly, it is basic to utilize various type of network
protocols, which are fundamentally the guidelines or rules that permit data to flow on a
computer network. The most well-known are the HTTP, SMTP, POP and IMAP protocols.
17 | P a g e
5.5 Database Server
These are computers that are set up to offer storage services, host and manage databases
that are utilized by at least one client. These servers additionally perform tasks identified with
data analysis and manipulation, storage, among others.
18 | P a g e
6 Recommend Server for BCAS
In my view I would recommend File Server for BCAS. File Server is commonly used to transfer
files from one computer to another over the network. It uses the File transfer protocol (FTP)
for that transfer. If you take BCAS, there are a lot of Departments inside BCAS. Admin
department, reception, a department for registration, a department for payment, etc. So, by
using this server, the required information or files can be easily transferred from one
department to another department using computers.
For example, if a student's payment details are required by the Admin Department, the
information can be retrieved immediately from the payment department computers using
this server. Not only that but the BCAS has branches in different places. Through this server
they can make a connection and exchange information/ Files.
19 | P a g e
Part 3
7.1 Cables
A cable is a cord that is comprised of various conductors, which are protected from one
another. This cord is normally secured by a wrap that gives it strength and flexibility. A
network, then again, is a network comprised of various nodes. It is known as a network cable
or connection cable to the physical component that permits connecting various computers
and other computing devices to one another. Network cables can connect two computers
straightforwardly or make the connection between a device and a router or switch.
At present we go over the existence of different types of network cables, among which the
accompanying stick out, as the most broadly utilized: 5, which has a speed of 100 Mbps; the
5e, which offers 1 Gbps; 6th, 1 Gbps and 6th, which ensures a speed of 10 Gbps. It should be
noticed that there are various types of connectors on cables. The most famous standards are
identified as RJ (Registered Jack). The most well-known network cable connector utilized for
connecting computers is RJ-45, which has eight pins.
(Totalcommstraining, 2020)
20 | P a g e
7.2 NIC Card (Network Interface Card)
A NIC card is a class of card planned to be inserted into the motherboard of a computer or
connected with one of its ports to permit the machine to join a network and can share your
resources, (for example, documents, Internet connection or a printer). It plays out the
procedure known by the name of buffering. This term is utilized to define the information
storage task completed by said network interface card so later those data can be sent and
transferred utilizing the corresponding cables or wireless systems.
It is interesting to highlight the presence of wireless network interface cards, which satisfy a
similar function yet without the need to utilize cables, since they utilize radio waves to
communicate information. The speed with which the data is communicated varies depending
on the type of network interface card. The most current cards uphold a speed of 1000
Mbps/10000 Mbps. At higher newest, more data can be transmitted in less time.
For instance, Network interface cards permit two computers to have a similar Internet
connection in an office or permit users of such computers to work with documents stored on
the hard drive of both of the two computers.
(Rouse, 2019)
21 | P a g e
7.3 Hub
In the field of computing, a hub is a device used to think the wiring of a network and extend
it. The hub can work at the media access layer in a TCP/IP model or at the primary layer (the
physical layer) of an Open Systems Interconnection (OSI) model. After getting an incoming
packet, the hub sends it to a different port. Since you can utilize some other port past the
input port, collisions can happen that influence the flow of data traffic. As a rule, these devices
can detect when excessive collisions are generated.
Presently hubs are not generally utilized, since switches are preferred. For this situation, the
switch manages to connect various sections of the network to blend them into a similar
network.
In the field of transport, on the other hand, a hub is a distribution center or connection for
the transit of goods or people. In aviation, for instance, a hub is an airport that an airline uses
as a reference point. In these types of hubs, various air connections can be made to reach
multiple destinations. For this reason, many flights stop at the hub, allowing the exchange of
aircraft according to the needs of the passenger.
(Beal, 2020)
Figure 11 Hub
22 | P a g e
7.4 Modem
In computers, the modem is an input / output peripheral that can be both inside and outer.
It permits you to connect a telephone line to the PC and access various networks, for example,
the Internet. Fundamentally its operating system while building up communication is as per
the following: the main thing is to proceed to identify the tone of the line, at that point the
relating number is dialed and the connection is built up third and last.
On account of Internet connection by phone, the modem gets analog information, deals with
demodulating it and changes over it into digital. The device additionally perform reverse
process, permitting communications.
(ls.erf-est.org, 2020)
Figure 12 Modem
23 | P a g e
8 Networking Devices
8.1 Router
The router is a device that works in layer three of level 3. In this way, it permits a different
networks or PCs to interface with one another and, for instance, share a same Internet
connection. A router utilizes a routing protocol, which permits it to communicate with
different routers and offer data with one another to discover which is the quickest and most
suitable route to send data. The router has numerous more complex employments. In its most
normal use, a router permits numerous computers in an office to exploit a same Internet
connection. In this sense, the router works as a recipient of the network connection with be
liable for conveying it to all the PCs connected with it. Along these lines, a network or Internet
is connected with another in the local area.
(Rouse, 2019)
Figure 13 Router
24 | P a g e
8.2 Gateway
Essentially, a gateway is a hardware or software system that goes about as a bridge between
two contradictory applications or networks so that data can be moved between various
computers. In this manner, its purpose is to translate the data from the protocol utilized in a
network to the protocol utilized in the objective network. At the point when a client interfaces
with the Internet, he is really connecting with a server that gives him the Web pages. Both
the client, a local PC to a LAN, and the server are host nodes on a network, not gateways.
Thusly, it will be the device that interconnects them that performs out this capacity, on
account of a local network it will be the Router.
It should be explained that a similar physical component can play out a different function, for
example, the previously mentioned Router that, going about as a gateway between the LAN
and the Internet, generally also supports a Switch as a switch. Moreover, the Router has a
"firewall" function as it only forwards the traffic that really needs to go through it. This
eliminates the possibility that, through the Router, traffic overloads propagate, broadcast,
and transmitting packets from unsupported protocols, or packets destined for unknown
networks.
(whatismyipaddress, 2020)
Figure 14 Gateway
25 | P a g e
8.3 Bridge
A bridge plays out its operations at the data link or layer 2 level of the OSI (Open Systems
Interconnection) model. What it does is interface network fragments, transferring data with
one sector then onto the next based on the objective physical address found in every one of
the packets. By connecting the spans, the network bridge makes a subnet. It claims to MAC
addresses to connect the segments, joining groups without falling back on a router or switch.
These network bridges duplicate the frame to transmit data starting with one node then onto
the next.
Network bridges can be local (when they link two networks that are physically near one
another) or remote (if the networks are over a huge region). As per the interface, then again,
the network bridges are homogeneous (utilizes the MAC protocol of layer 1) or
heterogeneous (works with various interfaces, for example, Ethernet and Wi-Fi).
Figure 15 Bridge
26 | P a g e
8.4 Repeater
A repeater is a device on the subnet that takes electrical signs from the physical medium and
recovers them. The repeater contracts with the physical level and doesn't "know anything"
about the meaning of the signals. Used to expand the range of a subnet fragment.
The disadvantage of this device is that it can't filter traffic. A piece that is seen on one port of
the repeater is sent to all different ports. As an ever-growing number of nodes are added to
the network, traffic levels increment. Accordingly, a network with numerous repeaters
probably won't have optimal performance.
(Shekhar, 2016)
Figure 16 Repeater
27 | P a g e
Conclusion
I have learned about many things through this report. This assignment provides clarity on
what data flow is, how they work and also got a clarification about network protocols. Not
only this, we got knowledge on all the components that are required when form a network.
28 | P a g e
9 References
afteracademy, 2019. afteracademy. [Online]
Available at: https://afteracademy.com/blog/what-are-protocols-and-what-are-the-key-
elements-of-protocols
[Accessed 12 September 2020].
29 | P a g e
ls.erf-est.org, 2020. ls.erf-est.org. [Online]
Available at: https://ls.erf-est.org/6549-m-dem.html
[Accessed 16 September 2020].
30 | P a g e