COM712 Networks Assignment Sample 2024
Part 1
Literature Review:
In networking, the words “protocol stack” or “central node.” The network layer is the third stage of the OSI Model which offers data networking paths for connectivity in the network. The OSI paradigm defines a conceptual layer uniformity of features in data transmission (Zhao, J. et.al, 2018). In the connection between connected devices, each layer sets its own functionality and interacts only with the above and lower level.
As the diagram above shows, a series of network layers and their interaction is described by network models. The numerous network models depend on which business or entity it starts. The two primary ones are:
TCP/IP Model – Often the DOD is named as it has been configured for the intelligence community. The web model is often named because TCP/IP is the interface used on the web.
OSI Network Architecture- The OSI has developed its standard, the reference architecture OSI (Open Networks Interconnection). This is architectural of 7 layers which are defined in the following section. (Ikechukwu, U.I., 2017)
The World Standard Association Open System Integrated Circuit Model (ISO/OSI), the standard architecture for network protocols and remote systems, is the ISO/OSI communication network. Seven advance directives are specified.
OSI Layers’ Features: There is a two-tier distinction between the seven levels of the OSI comparison model: top and bottom. The OSI model’s top layers fix implementation problems and are rarely found in applications in general. The device layer is next to the average consumer, the largest layer (Khan, K., 2020). Both consumers and internet protocol processes communicate with telecommunications component device applications. The upper layer concept is occasionally used to apply to a layer of the OSI model above every layer.
Data transport challenges are discussed at the lower stages of the OSI model. In hardware and applications, the core network and data communication layer are applied. The lower layer, the area network, is nearest to the medium of the network topology (e.g., network structured wiring). The layer contains information about the medium (Howser, G., 2020).
Further information-The standard OSI Network Structure
The OSI model layers of the system are structured from the lowest levels from the conscious plane upwards (hardware).
- The system hardware – Physical Layer.
- Surface Data Link – Method for data transmission (802x ethernet). Enter data into frames and ensure free transfer of errors. The pacing of the transfer is also monitored. Adds details about the type of frame, address, and error management (Danesh, A., 2017). This layer was separated into two sections by IEEE.
- Link-layer control (LLC) – Maintain a connection between two devices via a set of Service Entry Points (SAPs). 802.2 of IEEE.
- MAC – Used to manage data transfer between devices. Digital Rights Control (MAC). This layer is subject to 802.3, 4, 5, and 12 requirements. Hearing anyone speaking to a network card’s Wi-Fi router, they refer to the card’s targeted device.
- IP link layer – control plane. The highest quality road routes texts.
- Layer of TCP, UDP Transport Layer- Helps sure that the transmission is transcribed and error-free.
- Layer of the session – The user’s network client. Refers to how long it can be used and whether the session is initiated or opened. Data communication during the session is monitored. Supports encryption and name check that can find machines.
- Layer of Presentation – Data syntax for ASCII or EBCDIC. Allows the data form invisible to the underlying layers. Used to pass data to a particular computer format like byte sorting. Compression can be used. Based on the way the data travels, it schedules the data for the system or the software.
- Layer Framework – Offers software systems software providers require. Offers the ability to communicate with the network for consumer apps.
Many arrays of parameters overlap the boundaries of the model in 7 layers by running on several model layers. The File Transfer Protocol (FTP) and telnet operate both on the process layers, on the program.
The Site, TCP / IP, DOD:
The DOD model is often referred to as the intelligence community because it was developed the four-layer TCP/IP network or the web service is also named (Huang, J. and Cai, L., 2018). The layers are as follows:
Link – Interpret data and access information that maps the OSI model’s data connection and data link.
Network — Refers to the OSI model protocol stack which comprises protocols IP, ICMP, and IGMP.
Transportation – refers to the transportation layer which involves protocols TCP and UDP.
Application – Applies to the session, display, and service layer, including FTP, Telnet, l-dap, connect, TFTP, SMTP, SNMP and DNS, programming, and other details.
The four-level TCP/IP protocol should be remembered. There is a collection of data generated in each substrate:
- The Connection layer fits the hardware with the application driver and the adapter card. Based on the network form is used, including the ARC-net, Token ring, or Modem, the link layer is connected with digital data. We’re going to learn about wireless connections in our situation.
- The core network controls the network flow of packets with IP, ICMP, and IGMP. It is committed to ensuring the shipments enter their targets and that mistakes are recorded if they do not.
- The transport layer is the information sharing system between two computers. The transportation systems of TCP and UDP are two kinds of strategies. There are several kinds of strategies for networks other than TCP/IP, but in this paper, we will cover TCP and UDP.
- Operating system refers to critical thinking and problem solving which support different services like FTP, Telnet, BOOTP, etc. In order to prevent misunderstanding, a protocol like FTP, telnet, ping, and others built for particular purposes is usually resorted to by the higher layers and is subject to those parameters that are set with RFC. You can create a program that you send to your communicating parties so long as both the user and the database computer recognize the protocol by executing the game. If the socket is opened to a separate system, the software uses the TCP protocol, so the information you send relies on how it is structured.
Comparison of models:
The present paper aims to define the simple models of comparison, e.g., OSI and TCP/IP. The benefits and drawbacks of both such models are certain. The most popular model in networked computers, rather than all the factors, is the OSI comparison model. OSI describes layer wisdom while TCP/IP is more protocol-based. As connections increased, a paradigm came into being to represent the TCP/IP model applications (Anand, M.V., 2018). This paradigm is modified over time as emerging innovations change. One of these prototypes we cannot refuse because they are both similarly relevant and commonly used around the world.
Methodology:
Graphic Virtual Environment (GNS3) simulates different basic IPv6 networks used for integrating various internet services including addressing and connectivity; routing; mainly traversing and two-stack transitional strategies, service consistency, IPSec and IPv6 for access control, for instance, Telnet, SSH, and SNMP.
- The pathways to numerous networks with static and RIPng were used to know the configuration
- Transmission and IPsec utilizing topology have been introduced
- Connectionless loss: an Iperf UDP test was assessed.
- Delay: was measured under Ping control (Response Time or RTT)
- Jitter (variation of latency): a UDP test Iperf was measured.
ICMP messages were transmitted via the ping command to a subnet once the address has been allocated. Zip1 application fas0/0 has successfully transmitted data graphs to the fas0/0 application ZIP2. By allowing IPv6 to send unicast packets of data, IPv6 static routes have been introduced. Static routing is almost difficult, though, for standard operating networks. The connections to various networks have been used to learn from RIPng. (Rayes, A. and Salam, S., 2017)
Summary:
IPv6 confronts the same vulnerability mechanisms but is not outlandish in different directions and solutions. IPSec functions with IPv6 very effectively since it is a core architecture factor. In particular, in the Afri-NIC and AFRINIC areas, the increasing adoption of IPv6 is sluggish. In order to improve the pace of acceptance of the next version protocol, this study suggests that customers need IPv6 products from ISPs. Thus, the system engineer is assisted by layered network design models for the implementation of the system of switches and routers.
Part 2
Scheduling algorithms are used by adapters to relay IP packets over and beyond a system to their correct targets. IPv6 relay nodes are identical to IPv4, but the routing changes have to transmit more detail since the suffix of IPv6 is four times greater than the default of IPv4. RIPng, Embedded IS-IS, BGP-4, and MPLS are part of IPv6 routing protocols. (Ashraf, S., Muhammad, D. and Aslam, Z., 2020)
The host will roam through numerous links without missing connections or IP address by IPv6 flexibility. Mobile IPv6 offers an IPv6 gateway to keep the same IPv6 address as it roams across channels and ensures consistent connections and communication. In Wireless IPv6, mobile IP implementation is feasible with IPv6 main memory without updating the architecture of the device or using any foreign agent in a wider area. Each sensor host has a persistent IP address. This is named home description which does not change in the system (Dukes, D. et.al, 2019). DNS servers to IP-addresses are resolved. A record saves an IPV4 address when it records IPV6 address details which are also known as the Quad-A record. Next is a header for IPv6 in DNS:
Subnet Description | Subnet Id | IPv6 Network Prefix /Prefix Length |
HQ LAN1 | FE80::201:64FF:FE70:C6A2 | |
HQ LAN 2 | FE80::201:64FF:FE70:C6A2 | |
Branch IoT LAN | FE80::201:64FF:FE70:C6A2 | |
Branch CCTV LAN | FE80::201:64FF:FE70:C6A2 |
Network Device | Interface | MAC Address | Global IPv6 Address/Prefix Length | Link-Local Address |
HQ
BR1 |
G0/0 | 0003.E498.9E01 | FE80::201:64FF:FE70: | 10.254.254.4.10 |
G0/1 | 0003.E498.9E02 | FE80::201:64FF:FE70: | 10.254.254.4.10 | |
Branch | G0/0 | 0001.632C.B901 | FE80::201:64FF:FE70: | 10.254.254.4.10 |
BR2 | G0/1 | 0001.632C.B902 | FE80::201:64FF:FE70: | 10.254.254.4.10 |
End Device | MAC Address | IPv6 Device Address /Prefix Length | Link-Local Address |
HQ1 | 00D0.BCD.315B | FE80::201:64FF:FE70:C6A2 | 10.254.254.4.10 |
HQ2 | 0060.473E.585C | FE80::201:64FF:FE70:C6A2 | 10.254.254.4.10 |
HQ server | 0060.47C8.7111 | FE80::201:64FF:FE70:C6A2 | 10.254.254.4.10 |
BR IoT Device | 00D0.58A6.7034 | FE80::201:64FF:FE70:C6A2 | 10.254.254.4.10 |
BR CCTV Camera | 0060.5CDD.DE36 | FE80::201:64FF:FE70:C6A2 | 10.254.254.4.10 |
observer | 0030.A328:56A0 | FE80::201:64FF:FE70:C6A2 | 192.168.0l1 |
References:
Ashraf, S., Muhammad, D. and Aslam, Z., 2020. Analyzing challenging aspects of IPv6 over IPv4. Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, 6(1), pp.54-67.
Danesh, A., 2017. SWOT Analysis for Open Systems Interconnection (OSI) Reference Model. technology, 5, p.4.
Filsfils, C., Dukes, D., Previdi, S., Leddy, J., Matsushima, S., and Voyer, D., 2019. IPv6 segment routing header (SRH). IETF internet-draft, available: https://tools. IETF. org/HTML/draft-IETF-6man-segment-routing-header-18.
Howser, G., 2020. The OSI Seven Layer Model. In Computer Networks and the Internet (pp. 7-32). Springer, Cham.
Huang, J. and Cai, L., 2018, April. Research on TCP/IP network communication based on Node. js. In AIP Conference Proceedings (Vol. 1955, No. 1, p. 040115). AIP Publishing LLC.
Ikechukwu, U.I., 2017. A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers. Global Journal of Computer Science and Technology.
Khan, K., 2020. The Media Layers of the OSI (Open Systems Interconnection) Reference Model: A Tutorial. Global Journal of Computer Science and Technology.
Ponmaniraj, S., Rashmi, R. and Anand, M.V., 2018, September. IDS-based network security architecture with TCP/IP parameters using machine learning. In 2018 International Conference on Computing, Power and Communication Technologies (GUCON) (pp. 111-114). IEEE.
Rayes, A. and Salam, S., 2017. The Internet in IoT—OSI, TCP/IP, IPv4, IPv6, and Internet Routing. In the Internet of Things from Hype to Reality (pp. 35-56). Springer, Cham.
Zhao, J., Bai, J., Zhang, Q., Yang, F., Li, Z., Zhang, X., Zhu, X. and Bai, R., 2018, December. The Discussion about Mechanism of Data Transmission in the OSI Model. In 2018 International Conference on Transportation & Logistics, Information & Communication, Smart City (TLICSC 2018) (pp. 1-4). Atlantis Press.
Know more about UniqueSubmission’s other writing services: