6 Assignment Brief Logical IT network PDf
6 Assignment Brief Logical IT network PDf
ACADEMY
Page 1 of 21
AL SHABAKA TECHNICAL INSTITUTIONAL ACADEMY
Learner Name
Assessor Name
Any piece of student’s work without signed declaration will not be accepted for marking.
LEARNER DECLARATION
1) This assignment is the product of individual work.
2) I am aware of what plagiarism / collusion is and the penalties that I/we would suffer if I am found to have committed
plagiarism / collusion.
3) The work submitted is the product of my original work and where material and ideas have been taken from the
published and unpublished work of others, reference to all original sources has been made in the text and via the
reference, bibliography or notes sections, or by some other means.
4) I adhere to the given time period and understand that any kind of late submission is not acceptable.
LEARNER SIGNATURE FOR RECEIVING THE ASSIGNMENT
(Signature should not exceed the box)
Draw neat diagrams in large scale wherever necessary and write proper diagram headings.
TASK 1
Page 3 of 21
TASK 2
Page 4 of 21
TASK 3
Page 5 of 21
TASK 1
1.1. A logical network is a distinct entity, despite the fact that it could be either a composite of multiple
networks or a subset of a larger network.
The IP addressing scheme defines a logical network.
Features of logical network
1. Subnetworks (such as: IP addresses and subnet masks)- A logical partition of an IP network
into many, smaller network pieces are known as a subnet.
2. Routers and Firewalls- In networking, a router is referred to as the connecting device. It is used
to find the shortest path for a packet to reach its destination. A firewall examines data packets and
provides filtering and blocking of data packets through data encryption.
3. Routing protocols that are unique- A routing protocol describes the way routers communicate with
one another to exchange data that enables them to choose routes between nodes on the computer
networks.
Example: Distance Vector Routing Protocol- Distance Vector Protocols (DVPs) announce their
routing tables at specific intervals to every directly connected
4. The flow of traffic through gateways- A gateway is a network node that joins two networks with
differing transmission protocols.
5. Domain of routing- A routing domain is a group of networked systems that exploit common
routing protocols under the control of a single administration.
Example: There could be a group of routers under the management of an organization, some of
which operate at corporate networks, others at branch offices, and yet others in data center
networks.
6. Logical Topologies: The network protocols that guide how data moves across a network are
connected to logical topologies.
Example: Ethernet is a logical bus topology and IBM is a logical Star topology
Page 6 of 21
1.2) Network architecture refers to the way network devices and also solutions are structured to offer the
connectivity demands of client’s devices.
There are two types of network architecture.
Page 7 of 21
1.3) The Open System Connection Model (OSI) version explains 7 layers that computer systems use to
connect over a network.
The 7 layers adheres to:
1. Physical layer:
Functions:
1. Bit synchronization: The physical layer supplies a clock that controls both senders as well as receivers
hence supplying synchronization at bit level.
2. Bit rate control: The number of bits sent per second.
3. Physical topologies: Physical layer specifies the way in which the different, devices/nodes
are organized in a network i.e. bus, star topology etc.
4. Transmission mode: The different transmission modes used are Simplex, half-duplex, and full duplex.
1.Framing: It a technique for a sender to send a collection of bits that are significant to the receiver. This
can be achieved by attaching special bit patterns to the beginning and end of the frame.
2. Physical addressing: The layer adds physical addresses (MAC address) of sender and/or receiver in the
header of each frame.
3. Error control: Identifies and retransmits corrupted or lost frames. This entails two processes error
detection and error correction.
4. Flow Control: Manages amount of information that can be sent prior to receiving acknowledgement to
prevent the corruption of data.
5. Access control: MAC sub-layer assists to establish which device has control over the channel at
a provided time, when a communication channel is shared by multiple devices.
3. Network Layer
Functions
1. Routing: Identifies the best path(route) suitable from source to destination.
2. Logical Addressing: An addressing scheme to identify the device uniquely and universally. The sender
& receiver's IP addresses are placed in the header by the network layer.
4. Transport layer
Functions
1. Segmentation and Reassembly: This layer accepts the message from the
( session) layer, breaks the message into smaller segments. Each of the sections created has a header
associated with it. The transport layer at the destination reconstructs the message.
Page 8 of 21
2. Service Point Addressing: The transport layer header consists of a service point address or port address.
Therefore by defining this address, the transportation layer ensures that the message is delivered to the
correct process.
5. Session layer
Functions
1) Session facility, maintenance, and discontinuation of sessions:
The layer makes it possible to build, use, and also terminate a link between the two processes.
2) Synchronization: This allows the layer to place checkpoints called synchronization points to discover
the mistake and also resynchronize the corrupted information. Even if an information has any mistakes
the whole data is not discarded. Just the information corrupted after the checkpoint will be retransmitted.
3) Dialog Controller: The session layer makes it possible for two systems to communicate in half-duplex
or full duplex.
6. Presentation Layer
Functions
1. Translation: Translating a code of character to another characters. ASCII values to EBCDIC.
2. Encryption/ Decryption: Encryption is translating data into other forms or codes, creating ciphertexts.
Decrypted data is the plain text
3. Compression: Minimizes the number of bits that need to be sent on the network.
7.Application Layer
Functions
1) Network Virtual Terminal- A user can log on to a remote host. The application completes this by
creating a software emulation on the remote system. The computer system of the individual
communicates with the software application terminal, which connects with the host.
2) FTAM (File transfer gain access to and administration)- It specifies the way files in a distributed
network are accessed and managed.
3) Mail Services- An application layer sets up Email forwarding and also storage.
4) Directory services- A distributed data source that allows access to global information about various
objects and also services.
Page 9 of 21
OSI MODEL
IP ADDRESS
Page 10 of 21
Subnet Masking
• A subnet mask is a number that defines a series of IP addresses offered within a network. It is a 32-
bit number produced by setting host bits to all 0s and also setting network bits to all ones.
• In this way, the subnet mask divides the IP address into the network and host addresses.
• Example: 11000000.10101000.01111011.10000100 -- IP address (192.168.123.132)
11111111.11111111.11111111. 00000000 -- Subnet mask (255.255.255.0)
The first 24 bits are the network address, with the last 8 bits being the host address.
11000000.10101000.01111011. 00000000 -- Network address (192.168.123.0)
00000000.00000000.00000000.10000100 -- Host address (000.000.000.132)
Page 11 of 21
TASK 2
2.1) Rules of network protocols and communication:
A set of rules, specifications, and data formats that govern how devices transmit data across networks are
known as network protocols.
All communication techniques have 3 elements in common:
- Source or sender
- Destination or receiver
- Network or media
Protocols control all techniques of communication.
Rules of network protocols
1. Encodes the message: Each bit is encoded into a pattern of sounds, light waves, or electrical impulses
depending on the network media. The location host obtains as well as translates the signals in order to
translate the message.
2. Formatting and encapsulating the message: Each computer system message is enveloped in a certain
style, called a framework, before it is sent out over the network. The message has the senders and the
receiver’s address.
3. Dividing the size of the message: long messages should also be broken into smaller sized pieces to
take a trip throughout a network. Each item is separated frameworks containing their won address.
4. Timings of the message: Accessibility control- Hosts on a network requirement to recognize when to
start sending out messages and just how to respond when accidents occur.
Flow Control - Resource and destination hosts utilize this to work out proper timing to prevent
crowding of the location and confirm information is received .
Action Timeout - Hosts on the network have policies that specify the length of time to await reactions
and what activity to take if a response timeout takes place.
5. Providing the delivery choices of the message: Unicast (one-to-one delivery), multicast (one-to
several shipment) or broadcast(one-to-all delivery).
Page 12 of 21
2.2)
Page 13 of 21
2.3) Requirement for WAN and LAN topologies and a Data Link layer protocol
• Each protocol performs media access control (MAC) for specified Data Link layer logical
topologies.
• The protocol used for a specific network topology is identified by dimension of the network - in
terms of the variety of hosts and also the geographical extent - as well as the solutions to be
provided over the network.
• A LAN typically makes use of a high bandwidth technology that can supporting lots of hosts. A
LAN's fairly little geographic area (a single building or a multi-building campus) and also its high
density of users makes this modern technology cost-effective.
• Example for LAN : ALOHA is a part of Random Access Protocol that is designed for LAN which
allows several stations to send data at the same time.
• Using a high bandwidth capacity is normally not economical for WANs that cover large
geographic locations (cities or multiple cities, as an example). The cost of the long-distance
physical links as well as the technology made use to carry the signals over those ranges usually
results in lower bandwidth capacity.
• Difference in bandwidth typically results using different protocols for LANs and WANs.
Page 14 of 21
2.4)
1 The network layer is responsible for The transport layer takes care of the
getting frames from the data link layer, distribution as well as handles the Error data
converting into packets and supplying packages.
them to their intended destinations .
2 Network layer uses logical addressing Transport layer uses service point address or
(IP Address) to send the packets from port address to send the message to the correct
the host to the destination. process.
3 Services provided are switching and Services provided are connection oriented
routing . service and connection less services.
4. The data in network layer is called The data in network layer is called segments.
packets .
5. Main functions are routing (find the best 5. Main functions include segmentation and
path possible for the data) and providing service point addressing (port address to ensure
IP Address for unidue identification of the delivery of message to correct process)
the packets.
Page 15 of 21
2.5) Establish network design considerations
Network design is the planning, design, and also application of a network facilities that will meet the data
transfer requirements of a company.
Network Design Consideration
1) Connectivity and security of a network-
Taking into consideration where data is stored, either internal or offsite with cloud-based options,
what kinds of info should come, who can gain access to it, and which kinds of devices can be
included. Firewall and access servers requires to be secure without slowing down operations.
2) Cost.
Tools and also maintenance costs are frequently the very first consideration in network style. Price
of hubs, routers, and also switches and other products that need to be thought consists of cabling
and labor.
3) Design your network geography.
Physical network layout: Running copper and also fiber cabling,number of ports needed, WIFI
access point positioning, network topology(Bus, star, ring, etc.).
Logical network layout: IP addressing/subnetting
VLANs- (Virtual LAN) is a subnetwork that can group together collections of devices on separate
physical LANs.)
Information flow: simplex, half-duplex, or full-duplex.
Layout approach -OSI Version or TCP/IP design.
Page 17 of 21
TASK 3
3.1) Network security explains the hardware and software, processes, or policies as well as arrangements
associating with network usage, ease of access, as well as general threat security.
Security requirements of a network:
1. Confidentiality: The data sent out by the sender (resource node) need to be comprehensible only to
the intended receiver (destination node). One of the popular techniques utilized for making certain
discretion is information file encryption.
2. Integrity: Data during transmission should not be tampered by kind of malicious node in the
network.
3. Availability: The network should stay functional regularly. It has to be robust enough to endure
web link failures and also can surviving different attacks installed on it and provide the service to
authorized access.
4. Non-repudiation: non-repudiation is a mechanism to assure that the sender of a message cannot
later on reject having actually sent the message which the recipient cannot reject having actually
received the message. Example: Digital signatures.
5. Accessibility Control: Access control specifies the people or teams and the devices that have
accessibility to network applications and also systems thus rejecting unsanctioned accessibility,
and also possibly dangers.
6. Verification :Assurance of identification of individual or originator of data.
3.2)Threats
1. Virus: An infection is a destructive, downloadable file that can lay inactive that replicates itself by
altering other computer system programs with its own code. Once it spreads the documents are
contaminated as well as can spread out from one computer to another, and/or corrupt or destroy
network data.
2. Trojan: A trojan is a backdoor program that produces an entranceway for destructive individuals
to access the computer system by utilizing what appears like a genuine program, however swiftly
turns out to be harmful.
Worms: Can reduce local area network by consuming data transfer along with slowing down the
the performance of your computer system to process information. A worm is a standalone
malware that can propagate as well as function separately of various other data.
3. Ransomware: This is a sort of trojan cyber ware that is designed to obtain cash from the individual
or. Organization’s computer system on which it is installed by encrypting data to ensure that it is
unusable, blocking accessibility to the customer's system.
Page 18 of 21
4. Spyware: Just like its name, spyware is a virus that collects information regarding a person.
or organization without their express expertise and may send out the information gathered to a
third party without the clients consent.
5. Adware: Can reroute your search requests to marketing web sites and gather advertising
information concerning you in the process so that personalized promotions will certainly be
displayed based upon your search.
IPSec
• IPSec is IP security which provides authentication, integrity, and data privacy between any two IP
entities. Management of cryptographic keys and security associations can be done manually or
dynamically using an IETF-defined key management protocol called Internet Key Exchange
(IKE). IKE is the automatic key management protocol used for IPsec.
• Features
• IPsec protects the entire packet presented to IP layer including higher layer headers.
IPsec header
• AH (Authetication Header): Provides authentication and integrity to the data without encryption)
• IKE(Internet Key Exchange): AH and ESP needs shared secret key between peer ,so it provides
peer authentication of automated generated key.
• ESP(Encapsulation Security payload):Provides the message integrity and privacy and includes
anti -replay Mechanism.
ii. VPN
• With IPSec, you can create virtual private networks (VPN). A VPN enables an enterprise to extend its
private network across a public network, such as the Internet, through a secure tunnel called a security
association.
• IPSec VPNs enable the secure transfer of data over the public Internet for same-business and business-
to-business communications, and protect sensitive data within the enterprise's internal network.
Page 19 of 21
Network security IPSec
Page 20 of 21
References
2.Geekofgeeks.com
3. www.baeldung.com
4.electronicspot.com
5.stackoverflow.com
6.ecomputer notes.com
7.herzing.com
8.google images
Page 21 of 21