MIS102 | Networking and Data Modeling
Introduction:
We all are living in the era where data and information exchanged between us everywhere and it is constantly changing since last decades. The networks play very important role in all this. The Xerlasian University Australia is also following the same approach for their other university campus. There are several types of network and topologies which we can use to get our desired results with the giving scenario. On this assessment, I am working as a data and networking engineer so I have to fulfill the system requirements because I am responsible for developing, implementing, maintaining and supporting the system and networks between both campuses of university. I have to create and provide a simple solution which would work very smooth and fast on the application layer even if both campuses are trying to communicate to each other. The OSI (Open Systems Interconnection) will be used to make a successful network for both campuses of university in setting up, supporting, and maintaining local area networks (LANs), wide area networks (WANs), and other networking systems. The current topology can be seen in figure below:
Body:
The basic flow of data is very simple and clear because university is using the dedicated servers so the hosting and travel speed of data will be very fast. The concept of traffic flow is also very important here since it may be that packets from one flow need to be handled differently from others, by means of separate queues in switches, routers and network adapters, to achieve traffic shaping, fair queueing or Quality of Service. It is additionally an idea utilized in Queueing Network Analyzers (QNAs) or in bundle following (Whitt, 2001).
In addition, there is strong need to add Network security protocol in the whole system of both campuses so that the outside persons will not be able to reach the data on servers (Zhang, 2004). This is because the protection of data should be our first priority and it should not be leaked anywhere on the network. System security conventions are essentially sort of system convention that guarantees that the respectability and insurance of information in traveling over a system association is maintained. System security conventions characterize the procedures and technique to make sure about system information from any ill-conceived endeavor to audit or concentrate the substance of information (Kleinrock & Short, 1999).
As referenced before, OSI will be used as the primary stack protocol for the two campuses (Sinha, 2017). The OSI Model (Open Systems Interconnection Model) is a theoretical structure used to portray the elements of a systems administration framework. The OSI model describes processing capacities into a widespread arrangement of rules and necessities so as to help interoperability between various items and programming. In the OSI reference model, the correspondences between processing frameworks are dissected into seven diverse deliberation layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application (Zhao, et al., 2018).
Physical Layer
The most minimal layer of the OSI Model is concerned with electrically or optically transmitting raw unstructured information bits over the system from the physical layer of the sending gadget to the physical layer of the accepting gadget (Song, Han, Mok, Lucas, & Nixon, 2008). It can incorporate determinations, for example, voltages, pin format, cabling, and radio frequencies. At the physical layer, one may discover “physical” assets, for example, arrange centers, cabling, and repeaters, organize connectors or modems.
Data Link Layer
At the data link layer, straightforwardly associated hubs are utilized to perform node to node information move where information is bundled into outlines. The information interface layer likewise amends mistakes that may have happened at the physical layer.
The data link layer includes two sub-layers of its own. The second, the coherent connection control (LLC), gives stream and blunder command over the physical medium just as distinguishes line conventions (Alvi, 2015).
Network Layer
The network layer is answerable for getting outlines from the information interface layer and conveying them to their expected goals. It is also dependent on the addresses contained inside the casing. The system layer finds the goal by utilizing consistent locations, for example, IP (web convention) (Srivastava & Motani, 2005). At this layer, switches work as an essential segment that is used to actually course data where it needs to go between networks.
Transport Layer
The transport layer deals with the conveyance and blunder checking of information parcels. It manages the size, sequencing, and eventually the exchange of information among frameworks and hosts. One of the most widely recognized instances of the transport layer is TCP or the Transmission Control Protocol (Di Felice, 2009).
Session Layer
The session layer controls the discussions between various PCs. A meeting or association between machines is set up, oversaw, and terminal is set at layer 5. Session layer benefits additionally incorporate validation and reconnections of the data (Zhao, et al., 2018).
Presentation Layer
The presentation layer arranges or deciphers information for the application layer. It is primarily dependent on the language structure or semantics that the application acknowledges instantly. Along these lines, it is also occasionally called as the syntax layer. This layer can likewise deal with the encryption and decoding required by the application layer (Zhao, et al., 2018).
Application Layer
At this layer, both end clients get connected straightforwardly with the product application. This layer sees organized administrations while carrying it to end-client application. An example can be of an internet browser or MS Office (Zhao, et al., 2018). The application layer distinguishes correspondence accomplices, asset accessibility, and synchronizes correspondence.
Hubs, switches, and routers operate are at the most minimal three layers of the OSI network model: the physical layer, data link layer and network layer. Hubs work at the first or Physical layer (Zhao, et al., 2018). It links all the devices connected to it and forms a single network. Switches operate at the Data Link or second layer. The physical layer consists of hardware while all of the hubs, switches and routers are hardware. The data link layer performs node to node operations in the network protocol.
Hire Expert Writers at
Affordable Price
WhatsApp
Get Assignment Help