Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

KOLEJ PROFESIONAL MARA BERANANG

NETWORKING CONCEPTS (CSC2724)


FINAL ASSIGNMENT

Prepared For:
SITI AZEYRAH BT RAMLI

Prepared By:
MOHAMAD IMRAN BIN MOHAMAD YUSRI
BCS1806-091
DCS6E

1
ACKNOWLEDGEMENT

I would like to express my sincere gratitude to my lecturer, Siti Azeyrah Bt. Ramli the one who gives
me the opportunity to do this assignment and that I can complete my assignment only with her
endless guidance.

2
DECLARATION

I hereby declare that the work on this report is my own except for quotations and summarised which
have been duty acknowledgement.

Date: 20/4/2020 Mohd Imran Bin Mohd Yusri

BCS1806-091

3
Table of Contents
1. Advantages and Disadvantages of Using Network for The Company
2. Types of Network/System That Suitable for the Company and Its Employee
3. Impacts of Using Network Type Explained in Task 2

4. Explanation About Data Transaction in A Network Thought the OSI Layers

5. Explanation of Firewall Functions to The Company and Relation of The Device


with The OSI Layer
6. Types of Topologies That Are Suitable for The Company Network

7. Comparison About the Protocol and Access Method Used in The Suggested
Topology in Task 6
8. Explanation on The Factors That Can Affect Network Performance

9. Distinguish Routed Protocol and Routing Protocol Including Its Function in A


Network and Its Example

4
1. Advantages and Disadvantages of Using Network for The Company

The Advantages

 Productivity
In terms of productivity, the usage of network will help to provide enhanced
communication with the member of the company and as well as finding resource that
will help to increase the productivity of the employees.
 Sharing Resources
In terms of sharing resource, the usage of network provides access of resource
within the company such as the network peripherals as well as the company server
to help the employee share their resource with each other remotely.

The Disadvantages

 Costing
In terms of costing, a network can be very costly due to expenses of equipment, such
as network server, router, network cable and more with the expenses of installation
of this equipment to fully setup the right network infrastructure.
 Sharing Resource
In terms of sharing resource, a down network disable the company main server
which disables their ability to share information resource through the process causing
a significance loss and reduce the productive for the employee.

2. Types of Network/System That Suitable for the Company and Its Employee

a) LAN (Local Area Network)


This type of network is suitable for the company because it able to provide a way to
share resources between employer in the company. It connects devices together in
short distance which is suitable for a company (which is inside a building that is not
far from each other) to provide access to network peripherals and share information
and resources by network cable within the building.

b) WLAN (Wireless Local Area Network)


This type of network is same as LAN, but instead of using network cable, most of the
operation is done wirelessly. It makes use of the wireless technology, such as Wi-Fi.
This will help for more flexible operation for productivity and resource sharing without
the need of worrying installing physical cables.

5
3. Impacts of Using Network Type Explained in Task 2

a) By using LAN, the impact of the network is that the company would have established
a wired network infrastructure that connected their employee personal computers
with the company network peripheral which can make it easier and faster information
and resource sharing throughout the company.

b) By using WLAN, the impact of the network is that the company be able to allow its
employee to perform task with the use of the wireless technology that does not rely
on physical cables. With this, employees able to perform operation and access the
company network peripheral at any place and any time wirelessly.

4. Explanation About Data Transaction in A Network Thought the OSI Layers

What is OSI Layer


The Open System Interconnection or known as OSI, is a model which explains on how
data packets were sent and received over a network infrastructure. This model has
seven layers that has their own responsibility to perform specific task concerning
sending and receiving data.

What can they do?


The OSI model give the software developers a standard for developing communication
software for easy navigations. The OSI model provides the standard for communication
so that different manufactures computer or devices can be used under the same network
infrastructure.

The 7 layers of OSI model

6
The explanation of the 7 layers
 Application (Layer 7)

What is this layer?

For this layer, it supplies network services to end-user applications. Network services
are protocols that work with the user’s data. For example, in a web browser
application, the Application layer protocol HTTP packages the data needed to send
and receive web page content. This layer 7 provides data to and obtains data from
the Presentation layer.

This layers also provides application services for file transfer, e-mail, and other
network software services. Telnet and FTP are application that exist entirely in the
application level.

 Presentation (Layer 6)

Explanation
For this layer, it has the simplest function of any piece within the OSI model. At layer
6, it handles syntax processing of message data such as format conversion and
encryption or decryption needed to support the Application layer.

Not only that, this layer provides independency in terms of data presentation by
translating from application to network format. This allows for the data to be
formatted and encrypted which then can be sent across the network while providing
freedom from compatibility problems.

Also, it is responsible for compressing data it receives from the application layer
before delivering it to layer 5. This helps to improve the speed and the efficiency of
the communication by minimizing the amount of data will be transferred.

7
 Session (Layer 5)

Explanation
For this layer, it manages the sequence and flow of events that initiate and tear down
network connection. At layer 5, it is built to support multiple types of connection that
can be created dynamically and run over individual networks.

What does it do?


Also, this layer also responsible for opening and closing communication between two
devices. The time between when the communication is opened and closed is known
as the session.
It also ensures that the session stays open long enough to transfer all the data being
exchanged, and then promptly closes the session to avoid wasting resources.

 Transport (Layer 4)

Explanation
For this layer, it delivers data across network connections. TCP is the most common
example of a Transport Layer 4 network protocol. Different transport protocol may
support a range of optional capabilities, including error recovery, flow control and
support for re-transmission.

What does it do?


Also, it is responsible for end-to-end communication between the two devices. This
includes taking data from the session layer and breaking it up into chunks called as
segments before sending it to Layer 3. The layer on the receiving device is
responsible for reassembling the segments into data the session layer can consume.

8
Flow and error control
It is also responsible for flow control and error control. Flow control determines an
optimal speed of transmission to ensure that a sender with a fast connection does
not overwhelm a receiver with a slow connection. The transport layer performs error
control on the receiving end by ensuring that the data received is complete and
requesting a retransmission if it is not.

 Network (Layer 3)

Explanation
For this layer, it adds the concept of routing above the Data Link Layer. When data
arrives at the Network layer, the source and destination addresses contained inside
each frame are examined to determine if the data has reached its destination. If the
data has reached the destination, layer 3 formats the data into packet delivered to
the Transport layer. Otherwise, the Network layer updates the destination address
and pushes the frame down to the lower layers.

How does it work?


It is also responsible for facilitating data transfer between two different networks. If
the two devices communicating are the same network, then the network layer is
unnecessary. The network layer breaks up segments from the transport layer into
smaller units called packets, on the sender’s device and reassembling these packets
on the receiving devices.

Other functionality
This layer also finds the best physical path for the data to reach its destination, which
is known as routing. To support routing, the Network layer maintains logical
addresses such as IP addresses for devices on the network. The Network layer also
manages the mapping between these logical addresses and physical addresses.

In IPv4 networking, this mapping is accomplished through the Address Resolution


Protocol or ARP while IPv6 uses Neighbor Discovery Protocol or NDP.

9
 Data Link (Layer 2)

Explanation
As for this layer, when obtaining data from the Physical layer, the Data Link layer
checks for physical transmission errors and packages bits into data frames. The Data
Link layer also manages physical addressing schemes such as MAC addresses for
Ethernet networks, controlling access of network device to the physical medium.

Other functions
Like the network layer, the data link layer also responsible for flow control and error
control in intra-network communication while the transport layer only does flow
control and error control for inter-network communications.

 Physical (Layer 1)

Explanation
For this layer, the layer 1 is responsible for the ultimate transmission of digital data
bits from the Physical layer of the sending or source devices over the network
communication media to the Physical layer of the receiving or destination device.

What else does it do?


This is also the layer where the data gets converted into a bit stream, which is a
string of 1s and 0s. The physical layer of both devices must also agree on a signal
convention so that the 1s can be distinguished from the 0s on both devices.

10
5. Explanation of Firewall Functions to The Company and Relation of The Device
with The OSI Layer
The functions of a firewall
a) Packet Filtering
In packet filtering, sometimes called as static filtering, the firewall operates at the
packet level. This makes the firewall to look at each data packets as it comes to or
leaves the computer network. While it is examining these packets, it uses user-
defined rules to determine whether to accept or reject the packet. In this way, packet
filtering is a type of gatekeeper that determines what can pass through thanks to
system monitoring and the network rules.

b) Application Proxy
Firewall can also act as an application proxy which often referred to as an application
level gateway, where the firewall lives at the application level rather than the packet
level. Packet filtering, however, cannot recognize malware trying to break the system
because it does not have any base for understanding the entire application. A firewall
acting as an application proxy can stop information between your internal network
and the network outside your wall because it understands the application being used.

The discussion of the suitable layer for the firewall

The firewall can operate at layer 3 and layer 4 of the OSI model. Layer 3 is the Network
Layer where IP woks and the Layer 4 is the Transport Layer, where TCP and UDP
usually operates. Sometimes, there are also firewall that is operate under Layer 7.

 Layer 3 Firewalls
Firewalls in this layer is known as the network firewalls. This firewall can accept
traffic from certain IP addresses while blocking all other traffic or known as
whitelisting. Also, this firewall can also blacklist IP address that is known to be known
the source of abuse.
Layer 3 firewalls filter traffic based on the TCP/IP stack. This approach sometimes
also referred to as packet filtering because it essentially allowing and blocking
individual network packets depending on where they originated and which ports they
want to talk to.

11
 Layer 7 Firewalls
Firewalls in this layer is known as the application firewalls. Layer 7 allows for traffic
sorting according which the specific contents of that traffic are. Rather than simply
blocking all traffic on a certain port, this firewall can be used to accept traffic on that
port in general, but blocking any traffic that contains a known vulnerability such as
SQL injection attack or a malicious telnet command.

6. Types of Topologies That Are Suitable for The Company Network

The suitable types of topologies


a) Star Topology
In this topology, every node is connected to a central network device, like a hub,
switch, or a computer. The central network device acts as a server and the peripheral
devices acts as clients. Depending on the type of network card used in each
computer of the star topology, a coaxial cable or an RJ-45 network cable is used to
connect computers together.

b) Bus Topology
In this topology, each computer and network device are connected to a single cable
or backbone. Depending on the type of computer network card, a coaxial cable or an
RJ-45 network cable is used to connect them together.

The suitability of the suggested topologies for the scenario given

 Star Topology
The reason that this topology is suitable is due to the nature of the company. If the
company uses a centralized data machine, then it can be used to be setup as a Star
Topology by connecting the existing devices and peripherals to the central node. This
way can help the to improve and distribute the data which makes sharing resource to
other employees much faster and more productive.

 Bus Topology
The reason that this topology is suitable is due to its simple design, in which it allows
all devices to connect through a single coaxial cable. As for the company, it allows for
the employee’s computers and the network peripheral to connected under the same
network and under the same cable which allow for better performance and cost-
efficient setup.

12
7. Comparison About the Protocol and Access Method Used in The Suggested
Topology in Task 6

Network Protocol Type of topology

Star Topology Bus Topology

Transmission Media  Fiber-optic  Coaxial

 Coaxial  UTP

 UTP

Access Method  CSMA/CD  CSMA/CD

8. Explanation on The Factors That Can Affect Network Performance

a) Bandwidth of a transmission medium


Bandwidth is how the maximum data can be transfer over a network or internet
connection. In terms of bandwidth, if the bandwidth of the transmission medium is
low, thus it can affect the performance of a network, by limiting how much data can
be transfer.

b) Number of users on the network


If the bandwidth of a network is already low, the number of users can increase the
bottleneck of a network by sharing the existing connection to many user which
making the connection bandwidth being divided into a smaller amounts what it
already been.

c) Type of transmission medium


Certain type of transmission medium can affect the network. In this case, for both
wired and wireless. In terms of wired connection, coaxial cable is faster than Wi-Fi,
but fiber-optic cable is a lot faster. The type of cable or network used can affect how
the data was sent.

d) Bad network hardware planning


By having bad hardware planning can drastically affect a network performance. In
this term, only having one router for managing all the devices in a building can cause
slow connection through the device. Simply adding more router or similar device can
help negate this.

13
9. Distinguish Routed Protocol and Routing Protocol Including Its Function in A
Network and Its Example

The functions in a network


 Routed Protocols
It is a network protocol which can be used to send the user data from one network to
another network. It carries user traffic such as e-mails, file transfer, web traffic and
more.

Routed Protocols use an addressing system, for example IP Address which can
address a network and a host, either a computer, server, network printer, and more
inside that network.

 Routing Protocols
It is a network protocol that learns routes or path for a Routed Protocol and IP or
Internet Protocol, IPX or Internetwork Packet Exchange and AppleTalk in which
these are the examples of Routed Protocols.

Routing Protocols are network protocols used to dynamically advertise and learn the
networks connected, and to learn the routes or the network paths in which are
available. Routing protocols running in different routers exchange updates between
each other and most efficient routes to a destination.

List of examples for Routing and Routed Protocols

Type of Protocol

Routed Protocol Routing Protocol

 IP  RIP, IGRP, OSPF, EIGRP

 IPX  RIP, NLSP, EIGRP

 AppleTalk  RMTP, AURP, EIGRP

14

You might also like