Professional Documents
Culture Documents
SEPTEMBER 2021
Assignment 1
Student
Photo :
Name Ziyan Nifail Noraina Suria Partiban A/L Seertinban Tharani A/P
: Amiera Tharmalingam A/L Gopalakrishna
Norazman Vijayendran n
Program
: DIT DIT DIT DCF DIT
TAS
K2
CHAPTER:
Chapter 1 – Introduction: Computer networking
Chapter 2 – TCP/IP and OSI Model
WEIGHTAGE: 20%
Group of three students – 100 marks
INSTRUCTION:
1. Report MUST contain minimum 10 pages.
2. Submission in word file format to Eklas.
a. Date of Submission and presentation: 12 October 2021
b. Each student need to print presentation rubric. (Individual)
c. Each group need to print only on report rubric. (Group)
Task1:
1. Open System Interconnection (OSI) model is the standardization for the data
movement among all nodes in a network. Explain OSI model?
4. Explain the two types of services: Connection oriented and connectionless and give a
protocol for each type.
(60 marks)
Task 1
In addition, the OSI model has many advantages. The OSI Model can help
network managers figure out what hardware and software they'll need to
develop their network. It also encourages hardware makers to develop
networking products that can interact with one another through the internet.
The OSI Model is a teaching tool for understanding how networking
components communicate with one another. Furthermore, it decomposes a
complicated function into simpler components. Finally, the OSI Model
simplifies troubleshooting since network administrators may troubleshoot
issues faster and more efficiently by focusing on the layer that is causing
the problem rather than searching the entire network. Finally, the OSI
model makes troubleshooting easier because network administrators can
solve problems faster and more efficiently by looking at a layer that is
causing the problem rather than finding it across the network.
There are seven layers in the OSI Model. Each layer is responsible for a
specific network function The OSI model divides the procedure into seven
more manageable steps. Each layer is given a certain task. Each layer is
self-contained, enabling for the completion of each layer's activities
independently.
There are two layers to the OSI model. Such as, upper layers and lower layers.
The OSI model's upper layer mostly works with application-related difficulties,
which are exclusively implemented in software. The application layer is the
one with the most contact with the end user. The application layer is the one
with the most contact with the end user. The layer just above another is
referred to as an upper layer.
The OSI model's lowest layer deals with data transmission difficulties. Then,
hardware and software are used to construct the data link and physical layers.
Hardware and software are used to construct the data link and physical layers.
The physical layer is primarily in charge of transferring data to the physical
medium.
Diagram 2: Upper Layers and Lower Layers of OSI Model
There are seven layers in the OSI model. Each layer has a distinct purpose. The
following is a list of seven layers:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1. Physical Layer
The main job of the physical layer is to transport individual bits from one node to
another. It is the bottom layer of the OSI model. The physical link is also established,
maintained and deactivated as a result. Then the specifications of the mechanical,
electrical and procedural network interface are specified. Line configuration is one of
the functions of a physical layer. It specifies how two or more devices can be
physically connected. Then there is the data transmission. It specifies the
transmission mode between two network devices as simplex, half-duplex or full-
duplex. In addition, the topology specifies how network devices are connected.
Finally, the type of signal used to send information is determined by the signals
Data Link Layer is responsible for ensuring that data frames are transferred
without error. It specifies the format of data on the network. It allows two or
more devices to communicate reliably and efficiently. In particular, it is
responsible for the specific identity of each device that resides on a local
network.
3. Network Layer
The Network Layer takes up the third layer of the OSI model. This layer adds a
logical address to the data segment that was created by the Transport layer.
Network partition and host partition are the two components of a logical
address. The network partition is used to group networking components,
whereas the host partition is utilized to uniquely identify a network system. The
IP address is the logical address of a computer. The segment becomes the
packet after the logical address and other associated information are included.
This layer determines if the packet is for a local or remote system. It also sets
the standards and methods for moving data packets across networks. An IP
address is a type of logical address. The segment becomes the packet once
the logical address and other relevant information are added to it. This layer
determines if the packet is intended for a local or remote system. It also lays
out the standards and techniques for transporting data packets across
networks. A router is used to transport data packets between two separate
networks. The logical address is used by routers to make routing decisions.
Routing is the process of moving data packets from one location to another.
Network layer protocols are the protocols that are used to route network traffic.
IP and IPv6 are two examples of protocols.
DIAGRAM 5: NETWORK LAYER OF OSI REFERENCE MODEL
4. Transport Layer
The transport layer is the OSI model's fourth layer and It comes with a lot of
features. The segmentation is one of the example. The data stream is broken
up into smaller parts on the sending computer. The process of splitting the
data stream into smaller parts is known as segmentation, and each piece is
known as a segment. It connects all segments on the receiving computer to
reconstitute the original data stream. Then there's the data delivery. This layer
creates a logical link between the sending and receiving systems and then
leverages that link to enable end-to-end data transfer. There are two protocols
involved in this procedure TCP and UDP are two examples. For secure data
transmission, the TCP protocol is utilised. Transmission Control Protocol
(TCP) is a connection-oriented protocol. In addition, for unstable data
transmission, the UDP protocol is employed. UDP is a protocol that does not
require a connection. Furthermore, the key distinction between a connection-
less and a connection-oriented protocol is that the latter ensures dependable
data delivery. The three-way handshake protocol, acknowledgments,
sequencing, and flow management are all used to ensure dependable data
delivery. Finally, with the usage of port numbers, this layer offers connection
multiplexing. Multiple apps can send and receive data at the same time thanks
to connection multiplexing.
DIAGRAM 6: TRANSPORT LAYER OF OSI REFERENCE MODEL
5. Session Layer
It is the OSI model's fifth layer. The Session layer is responsible for
establishing, maintaining, and synchronising communication between devices.
The Session Layer only has a few functionalities. Such as, the dialogue
control. The session layer is a dialogue controller that produces a dialogue
between two processes, or more precisely, it facilitates communication
between two processes that can be half-duplex or full-duplex. After that,
there's the synchronisation. When transmitting data in a sequence, the
Session layer adds some checkpoints. If a data transmission fault happens in
the middle of the process, the transmission will be restarted from the
checkpoint.
6. Presentation Layer
The Presentation layer is the sixth layer of the OSI model. Local applications may or
may not understand the format used to send data across the network. The
presentation layer performs the role of a translator. It translates data received from
the Application layer into a format that can be delivered over the network. When it
receives data from the Session layer, it re-formats it so that the application that will
use it can comprehend it. Information is sent between two systems in the form of
character strings, integers, and other data. The presentation layer manages
interoperability between various encoding methods used by different computers. It
translates data from a sender-dependent format to a common format and then back
to a sender-dependent format at the receiving end. To guarantee privacy, encryption
is required. Encryption is the process of transforming information sent by the sender
into a different format and sending the resulting message through the network.
Finally, data compression is the practise of reducing the amount of data that is
stored. Furthermore, data compression is critical in multimedia, such as text, audio,
and video.
How does TCP/IP works? TCP/IP uses the client-server model of communication
during which a user is provided a service, like sending a webpage, by another
computer within the network example a server .TCP/IP suite of protocols is assessed
as stateless, which suggests each client request is taken into account new because
it's different to previous requests. Being stateless frees up network ways in order that
they are often used constantly.The OSI reference model defines how applications
can communicate over a network. The TCP/IP show differs slightly from the seven-
layer Open Frameworks Interconnection (OSI) organizing show outlined after it. The
OSI reference support characterizes how applications can communicate over a
organize. TCP/IP are often utilized to provide inaccessible login over the organize, for
intuitively record exchange, to supply mail, to supply webpages over the arrange and
to remotely get to a server host's record framework. Most broadly, it's utilized to talk
to how informationchanges form because it voyages over a arrange, from the
concrete physical layer to the unique application layer. It details the basic protocols,
or methods of communication at each layer as information pass through.
How to see the diffrents between TCP and IP model.TCP can control the size and
flow rate of data. It ensures that networks are free of any press that could block the
receipt of data. With TCP, only a single request to send an entire data stream.TCP
handles the rest. Unlike IP, TCP can detect problems that arise in IP and request
recommit of any data packets that were lost.TCP can also reorganize packets so they
get transmitted in the proper order IP is limited by the amount of data that it can
send. The biggest size of a single IP data packet, which contains both the header
and the data, is between 20 and 24 bytes long. This means that longer strings of data
must be separate into multiple data packets that must be independently sent and
then reorganized into the correct arrangement after they are sent.
In contrast to IP, TCP/IP is a higher-level smart communications protocol that can do
a lot more. TCP/IP still uses IP as a the transporting data packets, but it also
connects computers, applications, webpages and web servers. TCP understands
holistically the whole streams of data that these assets require in order to operate,
and it makes sure the entire volume of data needed is sent the first time. TCP also
runs checks to make sure the data is delivered.
Usual protocol of TCP/IP model are HTTP (Hyper Text Transfer Protocol) handles
the communication between a web server and a web browser.FTP (File Transfer
Protocol) handles transmission of files between computers and HTTPS (Secure
HTTP) handles secure communication between a web server and a web browser.
There are few pros and cons for TCP/IP model:
Supports communication
Transport between diverse devices across
diverse networks
The two most important protocols in the Transport Layer are Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP). TCP provides reliable data
delivery service with end-to-end error detection and correction. UDP provides low-
overhead, connectionless datagram delivery service. Both protocols deliver data
between the Application Layer and the Internet Layer. Applications programmers can
choose whichever service is more appropriate for their specific applications.
The internet protocol (IP) is the primary protocol in the TCP/IP model Network
layers. All layers need to go through IP as they are passed through the TCP/IP
protocol stack. It defines the protocols for logical transmission of data over the
network. The main protocol in this layer is IP and it is supported by the protocols
ICMP, IGMP, RARP, and AR.
Layers 4 : Network Layers
It is the lowest layer that is concerned with the physical transmission of data. TCP/IP
does not specifically define any protocol here but supports all the standard
protocols.TCP/IP makes use of existing Data Link and Physical Layer standards
rather than defining its own.
3. Explain the differences between physical and logical addresses.
When a programme is running, the CPU generates a logical address. The logical
address is virtual since it does not exist physically. As a result, it's often referred to as
a Virtual Address. This address serves as a reference to the actual memory location.
The collection of all logical addresses generated by a program's perspective is
referred to as Logical Address Space. The Memory-Management Unit is a hardware
component that converts logical addresses to physical addresses. During build and
load time, MMU's address-binding algorithms generate identical logical and physical
addresses. At runtime, however, the address-binding algorithms provide a variety of
logical and physical addresses. When a programme runs, the Central Processing
Unit creates a logical address, which is also referred to as a physical address
because it does not exist physically but only virtually. This virtual address can be
used to access the central processing unit's physical memory location, and the set of
all the logical addresses generated by the central processing unit is known as logical
address space, with the mapping of these logical addresses to physical addresses
performed by a hardware device known as memory management unit.
Every company may have a number of networks. A single website may be associated
with many VLANs, each of which is connected to a different network. Alternatively,
depending on the requirements, there may be many websites, each of which is
connected to a distinct network or networks. There will be hosts connected to the
networks, and each of these hosts will be associated with a NIC, with physical
addresses known as MAC addresses burned into the NICs. The second layer's
physical addresses are used to transfer data frames from one host to another on the
same network. The third tier is made up of logical addresses allocated to it via DHCP.
The hosts of one network will communicate with the hosts of other networks using
third layer addresses. When a host on one network tries to connect with a host on
another, it looks for the target host's third layer address and compares it to its own. If
the hosts' addresses are found to be on the same network, the host will try to find the
target network's second layer address and send the data frame straight to the target
host's second layer. The gateway locates a route destination host on a different
network using a third layer address, and the packet is routed through this gateway to
the target network. The physical addresses of data frames are lost when they are
transmitted across different networks. Physical addresses are stored in frame
headers, while logical addresses are used to extract the physical address from the
header and erase it, allowing logical addresses to send data frames to the
destination network.
Over the internet, computers interact with one another. Data transmitted from one
computer must traverse several local area networks (LAN) and wide area networks
(WAN) before reaching the destination computer. For such communications to take
place between computers, we need a global addressing scheme, often known as
logical addressing or logical address. The internet protocol (IP) address is used to
refer to logical addresses in any TCP or IP layer network. Internet addresses are 32
bits long. As a result, there are only two raise to the power of 32 addresses, which
are known as internet protocol version 4 (IPv4) addresses.
The physical address designates a memory location. The physical address for each
logical address is determined by the MMU (Memory-Management Unit). In order to
compute physical addresses, MMU uses logical addresses as well. The physical
address is never displayed to the user. Instead, the user accesses the physical
address through its logical equivalent. The user programme generates the logical
address and assumes that this is where the application is running. The programme,
on the other hand, requires physical memory to run. As a result, the logical address
must be mapped to the physical address before they can be used. Memory-
Management Unit is used to convert a logical address to a physical address,
hardware is employed. The collection of all physical addresses that correspond to the
logical addresses in a logical address space is referred to as the Physical Address
Space. In computer networks, the MAC address (acronym for Media Access Control)
is used to identify devices. It's a 48-bit identifier made up of six hexadecimal blocks
that identifies a network card or device uniquely. It's also known as a physical
address. It's unique to each device in use. The OUI is used by both the IEEE (last 24
bits) and the manufacturer (first 24 bits) to determine and configure it.
The first three octets (in transmission order) identify the company that issued the
identity and are referred to as an organisational unique identifier (OUI). In
accordance with the notion of uniqueness, this organisation assigns the three (MAC-
48 and EUI-48) or five (EUI-64) octets below at its discretion. According to the IEEE,
the MAC-48 space will be finished before 2100, and the EUI-64 space will not be
depleted anytime soon. Because this code has been agreed upon by each device
maker, we can determine, as if it were a fingerprint, from which network device the
data packet was transmitted even if the IP address changes.
A network device's MAC address is used to identify it. This might be used to
automate the process of validating network connections. MAC address filtering,
which limits the connection of unregistered devices and prevents them from stealing
your home Wi-Fi, is one of the most common applications of the MAC address.
Enable your router's MAC address filtering features and input the MAC addresses of
your PCs, mobile devices, and tablets to achieve this.
References Following APA Some of them APA A few of them Not followed
reference style reference style
Total /60
Task 2
During class time, in a group of 4-5 Students, prepare a short presentation (3-5 Min) on
Asynchronous Transfer Mode (ATM) protocol architecture.
Body Disinterested body Body language was Some fidgeting by Appropriate body
4. language. distracting. speaker. language
language
Total
/40