You are on page 1of 9

KOLEJ POLY-TECH MARA BATU PAHAT

TNW2053

CISCO DISCOVERY 1

LAB ASSIGNMENT 1

PREPARED BY:

1.MUHAMMAD AIEMANARIF BIN MOHAMAD NORAZIAN


BPJ201010602 DCSN-1/3

2.SITI AISYAHTUNNISA BINTI MOHD SHUKUR BPJ201010015


DCSN-1/3

3.MUHAMMAD ABQARY BIN KHAHAR BPJ201010657 DCSN-1/3

PREPARED FOR:

MADAM NORAISAH BINTI KAMARUDIN

SUBMISSION DATE:

10 SEPTEMBER 2020
NUMBER CONTENT PAGE
1 INTRODUCTION TO NETWORK ACCESS LAYER 1
2 REFERENCES 3
3 CONCLUSION 4
4 Visualization of Terminating a Straight-Through Ethernet Cable Activity 5
5 CONCLUSION 7
Network access layer

Introduction

The network access layer of the TCP/IP model combines layers 1 (physical) and 2 (data link) of
the OSI model. It describes layer 1 issues such as energy, bits, and the medium used to carry
them (copper, fiber, wireless, etc.). It also describes layer 2 issues like converting bits into
protocol units such as Ethernet frames, MAC addresses, and network interface cards (NICs).

Contents

The Network Access Layer is the lowest layer of the TCP/IP protocol hierarchy. The protocols in
this layer provide the means for the system to deliver data to the other devices on a directly
attached network. It defines how to use the network to transmit an IP datagram. Unlike higher-
level protocols, Network Access Layer protocols must know the details of the underlying
network (its packet structure, addressing, etc.) to correctly format the data being transmitted to
comply with the network constraints. The TCP/IP Network Access Layer can encompass the
functions of all three lower layers of the OSI reference Model (Network, Data Link, and
Physical).

The Network Access Layer is often ignored by users. The design of TCP/IP hides the function of
the lower layers, and the better known protocols (IP, TCP, UDP, etc.) are all higher-level
protocols. As new hardware technologies appear, new Network Access protocols must be
developed so that TCP/IP networks can use the new hardware. Consequently, there are many
access protocols—one for each physical network standard.

Functions performed at this level include encapsulation of IP datagrams into the frames
transmitted by the network, and mapping of IP addresses to the physical addresses used by the
network. One of TCP/IP’s strengths is its universal addressing scheme. The IP address must be
converted into an address that is appropriate for the physical network over which the datagram
is transmitted.

1
Two examples of RFCs that define network access layer protocols are:

 RFC 826, Address Resolution Protocol (ARP), which maps IP addresses to Ethernet
addresses
 RFC 894, A Standard for the Transmission of IP Datagrams over Ethernet Networks,
which specifies how IP datagrams are encapsulated for transmission over Ethernet
networks

Implementations of the protocols in this layer often appear as a combination of device drivers
and related programs. The modules that are identified with network device names usually
encapsulate and deliver the data to the network, while separate programs perform related
functions

The TCP/IP model

TCP/IP (Transmission Control Protocol/Internet Protocol) is a popular network model that was
created by the U.S. Defense Advanced Research Projects Agency in the 1970s

Although TCP and IP receive top billing, TCP/IP as a whole is actually a suite of protocols
including UDP and ICMP (Internet Control Message Protocol), among many others.such as
address mapping.

TCP

TCP is a reliable layer 4 protocol. TCP uses a three-way handshake to create reliable
connections across a network. TCP can reorder segments that arrive out-of-order and
retransmit missing segments.

UDP

UDP is a simpler and faster cousin to TCP. UDP is commonly used for applications that are
“lossy” (can handle some packet loss), such as streaming audio and video. It is also used for
query-response applications, such as DNS queries

2
References

3
Conclusion

Wireless radio communications represent a real additive value for the railway domain.

It implies challenges and opportunities for present and future railway applications.All

railway services are impacted, from the critical applications regarding train control

to the services to passengers. LTE and future 5G technologies represent a good

opportunity to provide a framework for radio convergence that would enable to offer

all the services over a converged media, keeping high Quality of Service and ensuring

required security levels.

Many works still have to be done to change mentalities and way to think in a

railway environment that evolves very slowly. The objectives of reduction of costs,

which became a priority these last years, will push more and more to rely on innovative

radio technologies. The program and objectives fixed by the Joint Undertaking

Shift2Rail will support all these new technologies to reduce costs, enhance capacity

and interoperability, improve reliability, reduce environmental footprint and support

competitiveness of the sector.

4
Visualization of terminating a Straight-Through Ethernet Cable Activity

tools and materials used during the activity cut the cable shield to remove it

Cutting the backbone of the cable unravel the cable ties

5
Arranging the color code level the cable

Connect the cable to rj45 tighten the cable 6


Conclusion

the activity went smoothly. the cable was successfully made and successfully pinged on the real
device. although there are errors when making the cable, but all of them can be solved without
any problems

You might also like