Professional Documents
Culture Documents
NT Assignment Phase 5
NT Assignment Phase 5
Prepared For:
SITI AZEYRAH BT RAMLI
Prepared By:
MOHAMAD IMRAN BIN MOHAMAD YUSRI
BCS1806-091
DCS6E
1
ACKNOWLEDGEMENT
I would like to express my sincere gratitude to my lecturer, Siti Azeyrah Bt. Ramli the one who gives
me the opportunity to do this assignment and that I can complete my assignment only with her
endless guidance.
2
DECLARATION
I hereby declare that the work on this report is my own except for quotations and summarised which
have been duty acknowledgement.
BCS1806-091
3
Table of Contents
1. Advantages and Disadvantages of Using Network for The Company
2. Types of Network/System That Suitable for the Company and Its Employee
3. Impacts of Using Network Type Explained in Task 2
7. Comparison About the Protocol and Access Method Used in The Suggested
Topology in Task 6
8. Explanation on The Factors That Can Affect Network Performance
4
1. Advantages and Disadvantages of Using Network for The Company
The Advantages
Productivity
In terms of productivity, the usage of network will help to provide enhanced
communication with the member of the company and as well as finding resource that
will help to increase the productivity of the employees.
Sharing Resources
In terms of sharing resource, the usage of network provides access of resource
within the company such as the network peripherals as well as the company server
to help the employee share their resource with each other remotely.
The Disadvantages
Costing
In terms of costing, a network can be very costly due to expenses of equipment, such
as network server, router, network cable and more with the expenses of installation
of this equipment to fully setup the right network infrastructure.
Sharing Resource
In terms of sharing resource, a down network disable the company main server
which disables their ability to share information resource through the process causing
a significance loss and reduce the productive for the employee.
2. Types of Network/System That Suitable for the Company and Its Employee
5
3. Impacts of Using Network Type Explained in Task 2
a) By using LAN, the impact of the network is that the company would have established
a wired network infrastructure that connected their employee personal computers
with the company network peripheral which can make it easier and faster information
and resource sharing throughout the company.
b) By using WLAN, the impact of the network is that the company be able to allow its
employee to perform task with the use of the wireless technology that does not rely
on physical cables. With this, employees able to perform operation and access the
company network peripheral at any place and any time wirelessly.
6
The explanation of the 7 layers
Application (Layer 7)
For this layer, it supplies network services to end-user applications. Network services
are protocols that work with the user’s data. For example, in a web browser
application, the Application layer protocol HTTP packages the data needed to send
and receive web page content. This layer 7 provides data to and obtains data from
the Presentation layer.
This layers also provides application services for file transfer, e-mail, and other
network software services. Telnet and FTP are application that exist entirely in the
application level.
Presentation (Layer 6)
Explanation
For this layer, it has the simplest function of any piece within the OSI model. At layer
6, it handles syntax processing of message data such as format conversion and
encryption or decryption needed to support the Application layer.
Not only that, this layer provides independency in terms of data presentation by
translating from application to network format. This allows for the data to be
formatted and encrypted which then can be sent across the network while providing
freedom from compatibility problems.
Also, it is responsible for compressing data it receives from the application layer
before delivering it to layer 5. This helps to improve the speed and the efficiency of
the communication by minimizing the amount of data will be transferred.
7
Session (Layer 5)
Explanation
For this layer, it manages the sequence and flow of events that initiate and tear down
network connection. At layer 5, it is built to support multiple types of connection that
can be created dynamically and run over individual networks.
Transport (Layer 4)
Explanation
For this layer, it delivers data across network connections. TCP is the most common
example of a Transport Layer 4 network protocol. Different transport protocol may
support a range of optional capabilities, including error recovery, flow control and
support for re-transmission.
8
Flow and error control
It is also responsible for flow control and error control. Flow control determines an
optimal speed of transmission to ensure that a sender with a fast connection does
not overwhelm a receiver with a slow connection. The transport layer performs error
control on the receiving end by ensuring that the data received is complete and
requesting a retransmission if it is not.
Network (Layer 3)
Explanation
For this layer, it adds the concept of routing above the Data Link Layer. When data
arrives at the Network layer, the source and destination addresses contained inside
each frame are examined to determine if the data has reached its destination. If the
data has reached the destination, layer 3 formats the data into packet delivered to
the Transport layer. Otherwise, the Network layer updates the destination address
and pushes the frame down to the lower layers.
Other functionality
This layer also finds the best physical path for the data to reach its destination, which
is known as routing. To support routing, the Network layer maintains logical
addresses such as IP addresses for devices on the network. The Network layer also
manages the mapping between these logical addresses and physical addresses.
9
Data Link (Layer 2)
Explanation
As for this layer, when obtaining data from the Physical layer, the Data Link layer
checks for physical transmission errors and packages bits into data frames. The Data
Link layer also manages physical addressing schemes such as MAC addresses for
Ethernet networks, controlling access of network device to the physical medium.
Other functions
Like the network layer, the data link layer also responsible for flow control and error
control in intra-network communication while the transport layer only does flow
control and error control for inter-network communications.
Physical (Layer 1)
Explanation
For this layer, the layer 1 is responsible for the ultimate transmission of digital data
bits from the Physical layer of the sending or source devices over the network
communication media to the Physical layer of the receiving or destination device.
10
5. Explanation of Firewall Functions to The Company and Relation of The Device
with The OSI Layer
The functions of a firewall
a) Packet Filtering
In packet filtering, sometimes called as static filtering, the firewall operates at the
packet level. This makes the firewall to look at each data packets as it comes to or
leaves the computer network. While it is examining these packets, it uses user-
defined rules to determine whether to accept or reject the packet. In this way, packet
filtering is a type of gatekeeper that determines what can pass through thanks to
system monitoring and the network rules.
b) Application Proxy
Firewall can also act as an application proxy which often referred to as an application
level gateway, where the firewall lives at the application level rather than the packet
level. Packet filtering, however, cannot recognize malware trying to break the system
because it does not have any base for understanding the entire application. A firewall
acting as an application proxy can stop information between your internal network
and the network outside your wall because it understands the application being used.
The firewall can operate at layer 3 and layer 4 of the OSI model. Layer 3 is the Network
Layer where IP woks and the Layer 4 is the Transport Layer, where TCP and UDP
usually operates. Sometimes, there are also firewall that is operate under Layer 7.
Layer 3 Firewalls
Firewalls in this layer is known as the network firewalls. This firewall can accept
traffic from certain IP addresses while blocking all other traffic or known as
whitelisting. Also, this firewall can also blacklist IP address that is known to be known
the source of abuse.
Layer 3 firewalls filter traffic based on the TCP/IP stack. This approach sometimes
also referred to as packet filtering because it essentially allowing and blocking
individual network packets depending on where they originated and which ports they
want to talk to.
11
Layer 7 Firewalls
Firewalls in this layer is known as the application firewalls. Layer 7 allows for traffic
sorting according which the specific contents of that traffic are. Rather than simply
blocking all traffic on a certain port, this firewall can be used to accept traffic on that
port in general, but blocking any traffic that contains a known vulnerability such as
SQL injection attack or a malicious telnet command.
b) Bus Topology
In this topology, each computer and network device are connected to a single cable
or backbone. Depending on the type of computer network card, a coaxial cable or an
RJ-45 network cable is used to connect them together.
Star Topology
The reason that this topology is suitable is due to the nature of the company. If the
company uses a centralized data machine, then it can be used to be setup as a Star
Topology by connecting the existing devices and peripherals to the central node. This
way can help the to improve and distribute the data which makes sharing resource to
other employees much faster and more productive.
Bus Topology
The reason that this topology is suitable is due to its simple design, in which it allows
all devices to connect through a single coaxial cable. As for the company, it allows for
the employee’s computers and the network peripheral to connected under the same
network and under the same cable which allow for better performance and cost-
efficient setup.
12
7. Comparison About the Protocol and Access Method Used in The Suggested
Topology in Task 6
Coaxial UTP
UTP
13
9. Distinguish Routed Protocol and Routing Protocol Including Its Function in A
Network and Its Example
Routed Protocols use an addressing system, for example IP Address which can
address a network and a host, either a computer, server, network printer, and more
inside that network.
Routing Protocols
It is a network protocol that learns routes or path for a Routed Protocol and IP or
Internet Protocol, IPX or Internetwork Packet Exchange and AppleTalk in which
these are the examples of Routed Protocols.
Routing Protocols are network protocols used to dynamically advertise and learn the
networks connected, and to learn the routes or the network paths in which are
available. Routing protocols running in different routers exchange updates between
each other and most efficient routes to a destination.
Type of Protocol
14