Computer Networks and Security: A Comprehensive Report

Verified

Added on  2025/09/04

|10
|2399
|462
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
CONTENT ANALYSIS ASSIGNMENT
Student Name:
Student Id:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction................................................................................................................................3
Week 1st......................................................................................................................................4
Introduction to networking and security................................................................................4
Week 2nd.....................................................................................................................................4
Packet Switching & Network Models....................................................................................4
Week 3rd......................................................................................................................................5
Application layer....................................................................................................................5
Week 4th......................................................................................................................................6
Datalink layer.........................................................................................................................6
Week 5th......................................................................................................................................6
Network or Internet layer.......................................................................................................6
Week 6th......................................................................................................................................7
Transport layer.......................................................................................................................7
Week 7th......................................................................................................................................7
Physical layer.........................................................................................................................7
Optical Fibre...........................................................................................................................8
Week 8th......................................................................................................................................8
Cloud computing and Mobile security...................................................................................8
Mobile networking and wireless communication..................................................................8
Conclusion..................................................................................................................................9
References................................................................................................................................10
Document Page
Introduction
In this Report, content analysis will be done. There are 8 different weeks which contain 8
different topics. This first week contains the introduction to networking. The second week
contains the topic of packet switching networking models. The third week contains the
application layer. The fourth and fifth week contain the layers. In forth there will be a
discussion on the Data link layer and in the fifth discussion will be on the Internet layer. In
the sixth week and seventh discussion will be on the transport layer and Physical layer. The
last earth week discuss the Cloud mobile.
Document Page
Week 1st
Introduction to networking and security
1. What is computer networking?
According to the author (Ali et al., 2015), computer networking can be defined as the method
to analyse or to learn the procedure elaborate in the communication process among the
various computers that are connected with each other or connected through wireless systems.
These systems are being connected with each other in order to process or to exchange
information between the computers only through a network or linked together with a wireless
network. The main idea before implementing the computer network is to implement the
theoretical knowledge into a practical one.
2. Number Systems
There are four different kinds of number systems like:
Decimal system: - The decimal system is the first kind of number system which has a base
value of 10. The ten numbers from 1 to 9 can be chosen in this system. For e.g. 221 is
made as (2*102) + (2*101) + (1*100) = 221
Binary System: - When talking about the binary system it generally carries 2 as its base.
The two values are only used in a binary system that is 0 and 1. Like for e.g., 2 is written
as 0010. The o is taken as a condition of ON and 1 is taken as the condition of OFF.
Octal System: - The next kind of system is called as the octal system in which the base
values is taken as 8. The octal system can be used as shorthand for Binary.
Hexadecimal System: - The next system is called as the Hexadecimal system in which the
base value is taken as 16. The digits that can be used in the hexadecimal system is
0,1,2,3,4,5,6,7,8,9 and letters A, B, C, D, E, F.
Week 2nd
Packet Switching & Network Models
1. Network interface card
According to the author (Botta et al., 2016) the network interface card is called to be a
hardware module which is basically a chip that is used in the computer system. The network
interface card is said to be a hardware system which can be used to connect a network with
the computer system.
2. Circuit-switched and packet switching networks
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
When talking about the packet-switching network, it generally uses to move the data in the
smaller blocks and these blocks are separated. These, when received, are form into a proper
sequence so that the message can be read. On the other hand, Circuit switching network uses
the point to point linking while making a call. The calls can be made only if the connections
are established between them (Rappaport, 2015).
3. ARPANET: - It stands for Advanced Research Project Agency Network is used for the
purpose of doing both the things like using the packet switching and TCP/IP protocols. IT
was developed under the US advance research project agency (Ranjan., 2016).
4. Interface Message Processors: - The interface message processor has used the packet
switching node in order to connect with the other networks like ARPANET.
5. Routers: - Routers are said to use for the purpose of connecting to a modem and generates
the private area network in surroundings like a home, office or working place.
6. TCP/IP model: - It stands for the Transmission Control Protocol/Internet Protocol, is used
for the purpose of connecting the networked device with each other over a network. It
provides the facility of connecting the devices with each other.
7. OSI Reference model: - It is called as the theoretical framework which shows how the
relationship is done between the networked layers. This model is being used by the
companies or the developers in the company which can provide the idea that how the
connection will be established between the different layers and how it will work (Chen,
2016).
Week 3rd
Application layer
The very first kind of layer is called the Application layer. In the application, it ensures that
the connection between the layers should be established in a better way. This layer is used to
provide the service for applications and its program, to establish the connection between the
two or more application programs. It is a component which provides the connection between
the layers. The application layer has different kinds of functions like: -
The application layer makes sure that another system is ready to accept the data, identified
as well and can easily be reached.
It provides extra security to the layer if needed for the purpose of the authentication.
It provides the data to end sure and make sure that data is reached.
Document Page
Week 4th
Datalink layer
Datalink layer makes it possible to see whether the data is moving from one end to another
end. The linking of the data layer and the application is there. The data link is called as the
protocol layer which makes it sure of moving of the data between the layers. Data bits are
first encoded and then decoded which then organize before sending to the WAN port or to
LAN in the data link layer (Fu, 2018). This is the data link layer which is being divided into
two different ways: -
1. Logical link control sublayer: - The very first kind is LLC is used for providing the
notification regarding the flow of the message, provide the regular acknowledgement and
information regarding the error as well (Tourani, 2017).
2. Media access control sublayer: - This layer is being used for the purpose of providing
information regarding who will going to access the media. The access of media will be
happening for one at a time. E.g. for this can be CSMA/CD.
It is a software called the Network Interface Card where the Data link layer is implemented.
The connection between the application layer and the data link layer is too close because of
which the exact data link layer skill will implement and called as the Ethernet cards and
Token ring cards.
Week 5th
Network or Internet layer
The internet layer or network layer is used for the delivering and accepting of the packets
from the sender and receiver side for a particular network. The network layer uses the
Internet protocol (IP), internet control message protocol (ICMP) and the Address Resolution
Protocol (ARP).
The IP addressing is a part of IP protocol which includes the IPv4 and IPv6 addressing. host-
to-host communication is also being decided by the IP. The path followed by the packet in
order to reach the destination is decided by IP. The Datagrams are the packets which are
assembled by IP. The Fragmentation of the packets is done with the help of IP in which if the
packet is too big for transfer than it will be divided into smaller size packets.
The ARP protocol is said to exist between the network layer and the data link layer. The main
work of this is to show the path to datagrams and to guide them to reach the destination.
Document Page
ICMP stands for Internet Control Message Protocol in which the errors are being detected
and it reports for the same. The reporting method in ICMP is different like called as Dropped
packet detection, Connectivity failure and redirection failure as well. These are different
kinds of error shown under ICMP.
Week 6th
Transport layer
The transport layer is the main layer which ensures the end to end communicating can be
established over a preferred network. Not only this. The transport layer is responsible to solve
the errors, providing the quality and make it possible, for providing the readability to the
users. The data which is being by the user is made sure from the transport layer that the data
is error-free and there is no problem in the data as well.
The transmission control protocol is used for the purpose of making a reliable connection
between the applications. The applications program is the case of TCP do not do much of the
work as TCP ensures that the content which was sent by the user or the transition that was
made is error-free, no packets are lost during the transmission and to rectify the lost packets
in the case of transmission. The flow control is also being managed by the TCP. If the flow of
data is too much then it will ensure to control it and maintain the flow.
The use of data protocol is just the opposite of the TCP. When the request of data is seen by
the UDP it just sends the data without looking for the corrections and even without checking
the same. Although this system creates lots of problems but still in the case of VOIP it is used
(Nykolaychuk et al., 2016).
Week 7th
Physical layer
It is a physical layer which actually interacts with the full mechanism of signalling and the
actually used hardware. When it needs to connect with the physical connection of two or
more different stations than the physical layer is being used. The layer used in this includes
the wiring, pulse seeing, frequencies and the maintenance of pulse to make it represent the
binary values. The way of working is like the physical layer is used to provide the services to
the data layer. Now once the service is being used by it, then the data link layer sends the
frame to the physical layer. The physical layers convert them into the binary data and now
this data is sent over the network.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Optical Fibre
Fibre optics also called as the optical fibre is used to send the information from one point to
the another. The information is sending in the form of light pulses in the plastic or fibre
medium. This method is useful in the case long-distance sending of data and provides the
facility of high execution data networking.
Week 8th
Cloud computing and Mobile security
The cloud computing is the bringing of computing facilities which provide the facility of
providing the storage facility, databases, networking and analysis of the system. These are
some kinds of facility that is being provided by a cloud. The speed becomes more, cost
reduced to half, productivity and performance increases because of cloud computing
(Velazquez-Benitez, et. al., 2015).
Mobile security can be defined as the way of protecting mobile devices like tablets,
smartphones, laptops and other devices from harmful threats, vulnerabilities and potential
threats.
Mobile networking and wireless communication
The mobile networking can be explained as the message network which is spread all over the
world which enables to connect over the phone and this is all done with the help of
transmitter and receivers. The transceivers are located at a fixed place and the mobile
network consists of the two different parts like the PSTN and MTSO. PSTN is defined as
Public Switched Telephone Network and MTSO is defined as Mobile Telephone Switching
Office. This is the network which uses the wireless form of connection in order to establish
the connection.
The wireless communication can be defined as the method of sending the data from one place
to another or establishing the connection between the sender and receiver with the help of
wireless communication. The wires, cables, or different kinds of electrical electrodes are not
used in this. The wireless communication makes it possible to connect with anyone around
the world without the help of wire or any other medium under wireless communication
(Winzer., 2015).
Document Page
Conclusion
This report covers all the Weekly studied material. The brief analysis of each and every topic
is done here. Starting from the introduction to the networking, then packet switching is being
discussed here. The TCP/IP model is discussed here which involves the application, data link
layer, network layer, transportation layer. Cloud computing with wireless communication is
also discussed in the end.
Document Page
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities
and challenges. Information sciences, 305, 357-383.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future generation computer systems, 56, 684-700.
Chen, M., Qian, Y., Mao, S., Tang, W., & Yang, X. (2016). Software-defined mobile
networks security. Mobile Networks and Applications, 21(5), 729-743.
Fu, X., Kutscher, D., Misra, S., & Li, R. (2018). Information-Centric Networking
Security. IEEE Communications Magazine, 56(11), 60-61.
Nykolaychuk, Y. M., Kasianchuk, M. M., & Yakymenko, I. Z. (2016). Theoretical
foundations of the modified perfect form of residue number system. Cybernetics and Systems
Analysis, 52(2), 219-223.
Ranjan, R., & Varma, S. (2016). Challenges and implementation on cross layer design for
wireless sensor networks. Wireless personal communications, 86(2), 1037-1060.
Rappaport, T. S., MacCartney, G. R., Samimi, M. K., & Sun, S. (2015). Wideband
millimeter-wave propagation measurements and channel models for future wireless
communication system design. IEEE Transactions on Communications, 63(9), 3029-3056.
Tourani, R., Misra, S., Mick, T., & Panwar, G. (2017). Security, privacy, and access control
in information-centric networking: A survey. IEEE communications surveys &
tutorials, 20(1), 566-600.
Velazquez-Benitez, A. M., Alvarado, J. C., Lopez-Galmiche, G., Antonio-Lopez, J. E.,
Hernández-Cordero, J., Sanchez-Mondragon, J., ... & Amezcua-Correa, R. (2015). Six mode
selective fiber optic spatial multiplexer. Optics letters, 40(8), 1663-1666.
Winzer, P. J. (2015). Scaling optical fiber networks: challenges and solutions. Optics and
Photonics News, 26(3), 28-35.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]