logo

Advance Computer Networks

   

Added on  2023-04-08

13 Pages2785 Words408 Views
Running head: ADVANCE COMPUTER NETWORKS
ADVANCE COMPUTER NETWORKS
Name of the Student
Name of the University
Author Note

ADVANCE COMPUTER NETWORKS 1
SECTION A
TASK 1:
OSI model:
The term OSI stands for ‘Open systems Interconnection’ is a reference model that
describes how the communication happens between the existing applications over a network.
A reference model is basically a conceptual framework to understand about the relationships
(Xylomenos et al., 2014). The main purpose of this model is to provide guideline to the
developers as well as to the vendors, so the software programs and products that they created
for digital communication can interoperate and for facilitating a framework which is able to
describe about the functions of a telecommunication or networking system. In 1974 the OSI
model was developed by International Organization of Standardization (ISO) (Kreutz et al.,
2015).

2ADVANCE COMPUTER NETWORKS
Fig 1: OSI model diagram
Layers: OSI model an architecture of 7 layers where each layer have different functionality
for performing. The layers are as follows:
1. Physical layer: It provides functional, procedural and electrical characteristics for
activating, deactivating and maintaining the physical links that send bit stream
transparently.
2. Data link layer: It provides procedural and functional means to the data transferring
and information between the entities of network. It also provides to activate, maintain
and deactivate the data link connection.
3. Network layer: It decides via which router/path the data should take. it transforms
outgoing messages to packets and combine the incoming messages for higher security
(Ensafi et al., 2014).
4. Transport layer: Depending on requirements of a network it can be so complex. This
layer does segmenting, multiplexing or splitting on data.
5. Session layer: It synchronizes and manages conversation between various application
6. Presentation layer: It performs data encryption, data compression and data
conversation.
7. Application layer: This layer provides directory services, mail services and network
resource.
SECTION B
TASK 2:
Benefits of creating VLANs: After proper implementation of VLANs, it can give benefits to
the business through stronger security, simplicity and experience improvement of the users

3ADVANCE COMPUTER NETWORKS
(Nunes et al., 2014). One of the best things exist in VLANs is that VLANs simplifies the
management. By grouping the users logically into one virtual network makes it easy for
setting up as well as to control the policies of management at group level. The use of VLANs
also can help in improvement of security of a network by reducing external and internal
threats. Internally the separating users can improve privacy and security by ensuring that only
these users have right to access the network. The threats that are external are minimized too.
Use of VLANs provides easier fault management. Troubleshooting of the problems on a
network can be faster and simpler when several groups are isolated and segmented from each
other. VALNs can also help in improvement in the quality of services. It manages the traffic
of the network more efficiently for betterment in user experience. The users will be having
very few latency problems on their network as well as more reliability for the critical
applications. It makes the prioritizing traffic easier too.
Functionality of trunk port in VLANs: A trunk port is basically a port which is assigned for
carrying traffic for each VLANs accessible from a specific switch. An ethernet interface can
function either as an access port or a trunk port, but not the both at same time.
TASK 3:
The common conclusion comes at time of trouble shooting application, system issues
and odd PC is ‘It must be a network issue’. The 5 best tools for troubleshooting the networks
are as following.
1. Subnet and IP calculator: One of the most important tools for troubleshooting of a
network is the IP calculator. The Ip calculator is to be used for insuring an IP
selection that is correct along with this configuration of a correct IP address. But this
tool is mainly used by the network engineers of senior level. Most of the information

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Design and Troubleshooting
|19
|3677
|24

Network Layer
|7
|1165
|27

Networking System - Assignment
|5
|1151
|108

OSI Model and TCP/IP Protocol Suite
|7
|1495
|490

Assignment on Networking - Layers of OSI and TCP/IP model
|7
|1292
|19

Advance Computer Network Assignment
|17
|3904
|40