MIS102 Data and Networking Online Tutoring
Introduction:
We all are living in the era where data and information exchanged between us everywhere and it is constantly changing since last decades. The networks play very important role in all this. The Xerlasian University Australia is also following the same approach for their other university campus. There are several types of network and topologies which we can use to get our desired results with the giving scenario. On this assessment, I am working as a data and networking engineer so I have to fulfill the system requirements because I am responsible for developing, implementing, maintaining and supporting the system and networks between both campuses of university. I have to create and provide a simple solution which would work very smooth and fast on the application layer even if both campuses are trying to communicate to each other. The OSI (Open Systems Interconnection) will be used to make a successful network for both campuses of university in setting up, supporting, and maintaining local area networks (LANs), wide area networks (WANs), and other networking systems.
[hbupro_banner id=”6296″]
Body:
The basic flow of data is very simple and clear because university is using the dedicated servers so the hosting and travel speed of data will be very fast. The concept of traffic flow is also very important here since it may be that packets from one flow need to be handled differently from others, by means of separate queues in switches, routers and network adapters, to achieve traffic shaping, fair queueing or Quality of Service. It is additionally an idea utilized in Queueing Network Analyzers (QNAs) or in bundle following (Whitt, 2001).
In addition, there is strong need to add Network security protocol in the whole system of both campuses so that the outside persons will not be able to reach the data on servers (Zhang, 2004). This is because the protection of data should be our first priority and it should not be leaked anywhere on the network. System security conventions are essentially sort of system convention that guarantees that the respectability and insurance of information in traveling over a system association is maintained. System security conventions characterize the procedures and technique to make sure about system information from any ill-conceived endeavor to audit or concentrate the substance of information (Kleinrock & Short, 1999).
As referenced before, OSI will be used as the primary stack protocol for the two campuses (Sinha, 2017). The OSI Model (Open Systems Interconnection Model) is a theoretical structure used to portray the elements of a systems administration framework. The OSI model describes processing capacities into a widespread arrangement of rules and necessities so as to help interoperability between various items and programming. In the OSI reference model, the correspondences between processing frameworks are dissected into seven diverse deliberation layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application (Zhao, et al., 2018).
Physical Layer
The most minimal layer of the OSI Model is concerned with electrically or optically transmitting raw unstructured information bits over the system from the physical layer of the sending gadget to the physical layer of the accepting gadget (Song, Han, Mok, Lucas, & Nixon, 2008). It can incorporate determinations, for example, voltages, pin format, cabling, and radio frequencies. At the physical layer, one may discover “physical” assets, for example, arrange centers, cabling, and repeaters, organize connectors or modems.
Data Link Layer
At the data link layer, straightforwardly associated hubs are utilized to perform node to node information move where information is bundled into outlines. The information interface layer likewise amends mistakes that may have happened at the physical layer.
The data link layer includes two sub-layers of its own. The second, the coherent connection control (LLC), gives stream and blunder command over the physical medium just as distinguishes line conventions (Alvi, 2015).
Network Layer
The network layer is answerable for getting outlines from the information interface layer and conveying them to their expected goals. It is also dependent on the addresses contained inside the casing. The system layer finds the goal by utilizing consistent locations, for example, IP (web convention) (Srivastava & Motani, 2005). At this layer, switches work as an essential segment that is used to actually course data where it needs to go between networks.
[hbupro_banner id=”6299″]
Transport Layer
The transport layer deals with the conveyance and blunder checking of information parcels. It manages the size, sequencing, and eventually the exchange of information among frameworks and hosts. One of the most widely recognized instances of the transport layer is TCP or the Transmission Control Protocol (Di Felice, 2009).
Session Layer
The session layer controls the discussions between various PCs. A meeting or association between machines is set up, oversaw, and terminal is set at layer 5. Session layer benefits additionally incorporate validation and reconnections of the data (Zhao, et al., 2018).
Presentation Layer
The presentation layer arranges or deciphers information for the application layer. It is primarily dependent on the language structure or semantics that the application acknowledges instantly. Along these lines, it is also occasionally called as the syntax layer. This layer can likewise deal with the encryption and decoding required by the application layer (Zhao, et al., 2018).
Application Layer
At this layer, both end clients get connected straightforwardly with the product application. This layer sees organized administrations while carrying it to end-client application. An example can be of an internet browser or MS Office (Zhao, et al., 2018). The application layer distinguishes correspondence accomplices, asset accessibility, and synchronizes correspondence.
Hubs, switches, and routers operate are at the most minimal three layers of the OSI network model: the physical layer, data link layer and network layer. Hubs work at the first or Physical layer (Zhao, et al., 2018). It links all the devices connected to it and forms a single network. Switches operate at the Data Link or second layer. The physical layer consists of hardware while all of the hubs, switches and routers are hardware. The data link layer performs node to node operations in the network protocol.
For the login operations session layer is responsible for all such kind of operations. This layer request for a logical connection which should be established on end user’s requirement. This layer handles all the important log-on or password validation. It is also important to add a security layer after the session layer as this will help to secure user login data more. As we already know that the session layer still has its own security and protection, but if we keep another obstacle between the layers this will secure our data more from the illegal person (Sinha, 2017).
There are some duplication of services at Physical layer and Data Link Layer. Hence, it would be better if we combine both of them into a single layer because both layers would be containing hardware side of protocol. The combination of both layers into one will make the model a little bit more fast and secure (Zhang, 2004).
Conclusion:
While making a network system it was analyzed that making the right choice of a data model is important. Moreover, working on the communication protocol stack was very interesting as it works as the base of your network system. By introducing OSI, the whole communication system will be smoothening out as it will reduce redundancy of records between of the campuses of university.
References
Alvi, S. A. (2015). Internet of multimedia things: Vision and challenges. Ad Hoc Networks, 33, 87-111.
Di Felice, M. (2009). Modeling and performance evaluation of transmission control protocol over cognitive radio ad hoc networks. Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems.
Kleinrock, L., & Short, J. E. (1999). Convention ID badge system. U.S. Patent No. 5,936,542.
Sinha, P. (2017). Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. International Conference on Signal Processing and Communication (ICSPC). IEEE.
Song, J., Han, S., Mok, A., Lucas, M., & Nixon, M. (2008). WirelessHART: Applying wireless technology in real-time industrial process control. IEEE Real-Time and Embedded Technology and Applications Symposium, 377-386.
Srivastava, V., & Motani, M. (2005). Cross-layer design: a survey and the road ahead. IEEE communications magazine, 43(12), 112-119.
Whitt, W. (2001). The queueing network analyzer. The bell system technical journal, 62(9), 2779-2815.
Zhang, Y. (2004). A multilayer IP security protocol for TCP performance enhancement in wireless networks. IEEE Journal on Selected Areas in Communications, 22(4), 767-777.
Zhao, J., Bai, J., Zhang, Q., Yang, F., Li, Z., & Zhang, X. (2018). The Discussion about Mechanism of Data Transmission in the OSI Model. International Conference on Transportation & Logistics, Information & Communication, Smart City (TLICSC 2018).
[citationic]