ITECH1102 Networking and Security Content Analysis

Verified

Added on  2025/09/03

|9
|2206
|146
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
ITECH1102
NETWORKING AND SECURITY
CONTENT ANALYSIS ASSIGNMENT
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction......................................................................................................................................3
Week 1st...........................................................................................................................................3
Introduction to Networking and Security....................................................................................3
Week 2nd...........................................................................................................................................4
Packet Switching & Network Models.........................................................................................4
Week 3rd...........................................................................................................................................5
The Application Layer.................................................................................................................5
Week 4th...........................................................................................................................................5
The Data-Link Layer...................................................................................................................5
Week 5th...........................................................................................................................................6
The Network layer.......................................................................................................................6
Week 6th...........................................................................................................................................7
The Transport Layer....................................................................................................................7
Week 7th...........................................................................................................................................7
The Physical Layer......................................................................................................................7
Conclusion.......................................................................................................................................8
References........................................................................................................................................9
Document Page
Introduction
Networking seems to be important because it helps you to communicate with multiple systems to
exchange information and documents with everyone. Whenever it comes to simple channels,
safety is extremely essential when channels are all at possibility of threats. Effective network
threats provide an opportunity for hackers to ruin, modify, disclose, deactivate, grab or acquire
illegal access to data. All this has been discussed in this report in order to develop the knowledge
and skill of an individual.
Week 1st
Introduction to Networking and Security
Computer networking seems to be an electronics skill aimed at studying and analyzing the
mechanism of interaction between different connected or integrated machines or
network applications in order to communicate data and assets and files. Computers had been
created first by the physiological safety strategies provided by cybersecurity to control access for
all not only a few approved people (Fisch et al. 2017). The security of entire network developed
across the world depends on 3 basic principles which have been listed below:
Privacy
Reliability
Accessibility
All these are important within the communication as well as network management in order to
achieve the security & safety of entire network as well as the communication channel connected
together. Different types communication or the sharing of information, as well as data, include
streaming of live videos, playing online songs, communication over video-conferencing, sending
and receiving emails, exchange of files, uploading or downloading of files and many others. One
of the most significant security steps implemented within the network and the communication
channel is utilization of CAT 6 wires for the connections. The Cat 6 requirement offers a
high output (i.e. 250 MHz) which can be used for the long-distance (i.e. approx. 100 meters
or 500 MHz). In the year 2002, the definition of Cat 6 was 1st published throughout the TIA /
EIA-568-B.2-1 paper configuration for the Communication industry or the organization (Naqvi
et al. 2017).
Document Page
Week 2nd
Packet Switching & Network Models
Network equipment is a channel system's independent element accountable for information
transmission as well as for the functioning of the communication network. Even if a system
includes several other equipment parts, the full implementation of a channel scheme consists of
many other fundamental classifications. The development of entire network consist of multiple
sub-devices in order to complete the network for utilization. Some of the major sub-devices of
the network has been listed below:
NIC: Used to link every device to the developed network to obtain data containers with
system modem. The input pads specify the regional zone channel (i.e. LAN) facilities and
enable the connection to be connected to all other devices.
Switches: Switches function like modems, which can duplicate data from one field of the
channel to another. Channel buttons furthermore comprise several interfaces that allow
users to duplicate data images from one hardware-port to another port.
Routers: A hardware system linked via a system gateway to various stations for separate
networks. It is generally situated inside channel strata, which specify the way information
is transferred, with the help of router functioning as the data signal handling device.
In the year 1960s, both countries i.e. United States, as well as the UK, devised an idea for low
data frames (i.e. packet switching) separately in order to overcome the concern related with
circuit switching. One of the best examples of packet switching technique has been selected as
ARPANET which works on TCP/IP as well as packet switching methodology. It is used in
multiple areas such as home network connectivity such as Wi-Fi, business connectivity networks
and others (Amante, 2019). In order to understand the basic concept and working fundamentals
of the developed networks and their layers two famous protocols known as OSI and TCP/IP have
been developed which helps the user to understand each of the layers as well as their working
fundamentals within the network.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 3rd
The Application Layer
User apps allow us to communicate on either the web or the local channel of millions of facilities
and equipment. Such apps are made possible by their networking capability. The method utilized
in application layer is frequently known as "sneaker web," which means everyone was wearing a
kind of shoes which is known as sneakers during that moment. It consists of different
architectures stated for the effective development of this layer which consists of different
structures such as architectures based on Client/Server working, architecture of peer-to-peer
connection and architecture based on host & cloud-based. In the client/server model, server
works on the basis of request/command sent by the client device and perform the request in order
to fulfil the requirement of client. On the other hand, the modelling of peer-to-peer connection
done is such a way that each of the devices or equipment attached within the network can work
as server or the client depending on the requirement. In the current world, the famous model
which has been utilized by different organizations, as well as service providers for effective
communication and networking, is based on host or cloud structure. Host model was used earlier
which is nor replaced by the latest and advanced cloud-based structures which provide vast range
of efficiency as well as services to perform multiple functions and operation with high-speed and
security (Karagiannis et al. 2015). Further, the cloud-based design has been classified into
multiple sub-services such as IaaS, PaaS and SaaS.
Week 4th
The Data-Link Layer
It is a layer within the developed network for the communication and helps to establish the
communication in-between two connected devices and lies in-between Network as well as
Physical layer. It helps to identify the MAC address of connected devices with the help of ARP.
The role of NIC working on this layer helps to establish the connection with the network with
which device is connected along with identification of addresses (i.e. MAC) for the attached
ports so that exchange or sharing of information or the communication can be done properly. It
also helps to check or identify the errors with addresses leading to failure or incorrect
communication so that errors can be fixed before the real connection or communication within
two devices (Armstrong et al. 2016). On the basis of frames and rules developed for construction
Document Page
or framing of message or communication packets consist of different sub-frames such as header,
destination address, information, type of communication, senders address, etc. Depending on the
receivers address attached with the data frame helps the connected network or the devices to
establish the correct connection to share the file of the data packets and if the address has value
of 1 it will get routed to each of the devices connected within the network as address consist of
1’s acts as broadcasting address. Also, different control models and standards implemented
within the network connection in order to control and manage the media communication or
sharing of media files which resulted in the development of protocols such as CSMA/CD or
CSMA/CA.
Week 5th
The Network layer
For the establishment of effective communication in-between two connected devices in a
network, determination of MAC address for the connected devices plays significant role to wake
up the receiver’s devices or the machine in order to accept the information sent by the other
device and all these works done by ARP available in the data-link layer. Once the connection in-
between two connected device has been established, network layer get activated in order to carry
the circulation of communication or message within the connected network which works on IP
address of the connected network.
IP address: This IP address is developed for each of the devices which is unique and different
from each other so that any of the device connected within the network can be identified using
their unique IP address. The formation of IP address defines the version utilized for the network
or the connected device such as IPv4 address consist of 32-bits of the binary address (Ghali et al.
2019). The operation of IP address assigned to different devices configured by the device either
manually or automatically based on the configuration of devices as well as network and the
identification of IP address done with the help of a mechanism known as “Sub-netting” which
divides the entire IP address into two distinct portion to diagnose the network used for
communication as well as device linked for the communication.
Document Page
Week 6th
The Transport Layer
The main aim of development of this transport layer within the network is to provide access to
each of the device connected with the network and manage them in a unique way so that each of
the device will get identified independently within the network also to help the communication
between devices without any error. It helps to manage the entire flow of data or the
communication within the network and works on two different services such as UDP as well as
TCP. It divides complete message or the data into multiple small frames of customized size so
that transfer or communication can be done properly within minimum error and connected
network can handle the load of data in small sizes which is referred as the multiplexing
mechanism. In the configuration of the network layer, UDP offers elementary transportation
services for the network and especially utilized for the live streaming of videos as well as audios
in order to provide better speed and high-efficiency for the users (Qadir et al. 2015).
Stateless: One of a protocol referred as “Stateless” utilized ineffective communication in order to
manage each of the command received as an indented request to perform the action or fulfil the
demand of the requester. As a result, it signifies the correct result based on the request or the
demand made by the system so that correct action n can take place within the system or the
connected network. It has several benefits over the network in comparison with other techniques
such as reliable communication, effective and accurate data transfer and many others.
Week 7th
The Physical Layer
In the field of communication and networking, mainly two types of data used for the
communication which are “Analog” or “Digital”. Both data types play a significant role in the
transfer of files, communication, data sharing and many other activities. The data which is
transferred in the waveform of normal signals are referred to “Analog” while the signals
transferred in the form of 0 or 1 (i.e. Binary digits) are referred to “Digital”. These signals are
transferred through the wires or connected cables along with different mechanism such as
multiplexing implemented to provide effective strength as well as efficiency for the transferred
signals in order to reach at receivers end without error. Different security measures like coding,
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
encryptions, etc. also implemented in order establish the secure communication over the cables
such as Optical-fiber cable, Coaxial cable, Microwave signals and other depending upon the
length and requirement of the communication as well as connected network (O’Shea & Hoydis,
2017).
Cloud Technology: With the development of latest technologies and virtual application, cloud
services made revolutionary changes in the current networking and communication field where
application and resources developed by any third- party utilized by industries and organizations
to manage its performance as well as services in an effective way.
Conclusion
Detailed analysis and explanation about the network as well as their security arrangement have
been elaborated in this report to develop the effective concept and skills of an individual related
to the field of communication and their management. Different layers along with their
fundamentals have been explained resulted in successful completion of this report.
Document Page
References
Amante, S. (2019). U.S. Patent Application No. 16/193,697.
Armstrong, W. J., Basso, C., Chang, C. J., Gusat, M., Lynch, J. J., Minkenberg, C. J., & Valk, K.
M. (2016). U.S. Patent No. 9,231,870. Washington, DC: U.S. Patent and Trademark Office.
Fisch, E. A., White, G. B., & Pooch, U. W. (2017). Computer system and network security. CRC
press.
Ghali, C., Tsudik, G., & Uzun, E. (2019). In Content We Trust: Network-Layer Trust in Content-
Centric Networking. IEEE/ACM Transactions on Networking.
Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A survey on
application layer protocols for the internet of things. Transaction on IoT and Cloud
computing, 3(1), 11-17.
Naqvi, S. H. R., Matera, A., Combi, L., & Spagnolini, U. (2017). On the transport capability of
LAN cables in all-analog MIMO-RoC fronthaul. In 2017 IEEE Wireless Communications and
Networking Conference (WCNC) (pp. 1-6). IEEE.
O’Shea, T., & Hoydis, J. (2017). An introduction to deep learning for the physical layer. IEEE
Transactions on Cognitive Communications and Networking, 3(4), 563-575.
Qadir, J., Ali, A., Yau, K. L. A., Sathiaseelan, A., & Crowcroft, J. (2015). Exploiting the power
of multiplicity: a holistic survey of network-layer multipath. IEEE Communications Surveys &
Tutorials, 17(4), 2176-2213.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]