Learning Outcomes Assessed
The collection of several computers, scanners, printers and similar other equipment which are connected to each other in such a network that every kind of possible communication is possible between them is known as Computer Networking (Padmavathi & Shanmugapriya 2009). It allows the computers in network to exchange data and information, such as Netflix videos, Google Search Query, making phone calls using Viber and so on (Charles & Christian, 2014).
There are two ways networking is configured:
Peer-to-peer networking is generally used in short networks where less than 10 computers are present in the network. Each computer in the network possesses the equal status. In this kind of networking security is not too strict (Padmavathi & Shanmugapriya 2009).
Client/Server networking is for wide network areas. In this a special computer acts as the center computer which is referred as the Server that stores the location of all applications and files need to be shared on the network (Charles & Christian, 2014). Server is also responsible for controlling the network access of client computers which are connected to the server. The server is controlled by a Network Administrator with strict access logins and only client computers with limited access are provided for end users (Marin, 2016).
To initiate communication on network there are some methods and principles that enables transmission of data from one end point to another (Ohta, & Chikaraishi, 2011). These methods are:
Packet Switching
Circuit Switching and
Message Switching
Circuit switching is the oldest way to establish connection. To connect two hosts a link is set up amidst every node and is maintained through the entire transmission of data. In case the link is broken or crashed, the connection breaks too (Dowd & McHenry, 2016). Cable Phone is the best example of this kind of switching where a cable is allotted to one user after a number has been dialed and cannot be used for other purposes. Hence this method costs to be very expensive only with one benefit that receivers address has not be specifically mentioned.
In Message Switching, the two hosts are not connected in a real sense. Every piece of information gets transferred independently so it does require complete information about its destination (Marin, 2016). Any node in the path must be able to configure the entire message and transfer it in the right direction. If none of the nodes work as desired the message is failed and gets back to its origin but as there are many paths to route the message it doesn’t happens generally. But in case of too many hosts which the network might not be able to handle a serious congestion can occur (Dowd & McHenry, 2016).
Figure 1: Message Switching Process
Packet Switching is a special combination of both above, the circuit switching and the message switching. In it, the data is transferred in the form of fixed length small packets. The entire information is divided into these small packets and a destination is attached to every packet. This is the fastest way to deliver message and also the amount of storage area required is very less in compare to others (Kartalopoulos, 2009).
Computer Networking Definition
There are various ways to attach the designated address with the information. It can be done using
Content (for example object with value A),
Address (for example object at location B),
Name (for example object C),
Group Identifier (for example each of object related to D),
Route (for example object that will be present at the end of path E), and so on
In every case it is mandatory to map the name A to E with the actual destination which can only be achieved through a particular space also called as Context. Such as to get the destination of some computer A, it can be resolved using its address B and the name B can act as a context to another layer and so on (Charles & Christian 2014).
To transmit the data successfully it is necessary that the represented information is supported by the receiver’s CPU’s configuration(Charles & Christian 2014).. Hence depending upon the different kinds of CPU’s existence there are different techniques to represent data. The problem may arise due to different factors such as order of bytes in a word, size of bytes, character set, and size of pointers, So standard rules have been made to solve each of this problem. For example: A byte can always consist of 8 bits, no more any less (Charles & Christian 2014)..
Also there are many kinds of data representation techniques which are understandable by computers such as ASCII, Hexadecimal Number system, Binary and many more.
The OSI Seven Layer Reference Model
The OSI’s seven layers define the hardware and software entities that make the communications possible through the process of networking. Each layer in the model serves its own unique purpose with the help of a different protocol (Christina, Skouloudi & Katsikas, 2015). Protocols will be discussed in the later sections.
The seven layers in the OSI model are as follows:
This layer is responsible for handling a possible communication amongst Server and the Client processes (Ahmad, 2015). Several protocols services at this layer to transmit different kind of data: SMTP, FTP, HTTP and DNS. These protocols help in establishing consistent rules amidst receiver and the sender. It specifies the structure and types of the message and also handles message dialogue (Christina et al., 2015).
This layer is in charge for representing the data for an application in a meaningful way. Depending upon the configurations of the CPU and OS it performs the encoding (Salqan, 2007). This makes the communication possible for application layer without knowing the in between representations
This layer works in case of open systems and helps in data exchange in an orderly fashion. The purpose of this layer is to create, manage and terminate the information flow amongst end users.
The work of this layer is to transport information amongst processes on different systems over the internet. It uses TCP and UDP protocols for this purpose. There are two major problems that are fixed using these protocols i.e. unreliability of transmitted data and problem of blocks going out of order because of multiple routes (Salqan, 2007).
Peer-to-Peer and Client/Server Networking
This layer helps in simplifying the delivery for the transport layer. If an email has been sent across any network, this layer ensures delivery of data blocks from sender’s system to the system on which sender’s mail server software is running. After this the only task left for transport layer is data which needs to be delivered (Warfield, 2011).
This ensures the error free data transportation amongst sender and receiver’s system. It acts as a shield to hide the complexity for the upper layers that concerns the physical transmission. DLL provides services such as flow control, framing and media management. This can be acknowledged, un-acknowledged or connectionless (Warfield, 2011).
This layer serves the purpose of actual transmission of information by encoding bits on some transportation medium. The bits encoded are based upon the type of media to fasten the rate of transmission and to lessen the noise sensitivity (Warfield, 2011).
The rules and pacts associated with communication amongst network devices are defined as Network Protocols. They consist of tools for systems to recognize and make associations with each other, and also arrangements that indicate how information is bundled into messages received and sent (Warfield, 2011).
There are three kinds for Network Protocols
Internet Protocols is a family of set of higher level protocols like FTP, HTTP, UDP, TCP and IP itself (Adeyinka, 2008). They all are integrated together to deliver added competences. There are some lower level protocols too associated with IP which are ICMP and ARP. Web browsers mostly uses high level protocols while lower levels are generally for network adapters and similar other hardware (Adeyinka, 2008).
These deals with the roaming mobile devices and problems like network security and variable data rates (MaKai, Kang & Chen, 2018).
Its purpose is to classify further routers, management of routes and decisions related to routing. Ex: BGP, OSPF and EIGRP (MaKai et al., 2018).
User can individually establish capabilities of computing, like network storage and server time as required naturally, not requiring interaction of humans with every service provider (Daya, 2014).
Capacities are accessible through the system which can be accessed via general provisions.
A multi-tenant model is used for the purpose of serving multiple consumers with the help of resource pooling, achieved by various virtual and physical resources that are dynamically allotted depending upon customer’s demand (Serpanos, & Voyiatzis, 2012).
Abilities can be flexibly provisioned and discharged, sometimes naturally, proportional quickly outward and internal similar with request (Adeyinka, 2008).
The system that are associated with cloud automatically controls and optimizes the resource usage by utilizing a metering capacity at some level of reflection fitting to the sort of administration (Serpanos, & Voyiatzis, 2012).
- Providing remote access to the staff in order to access their applications and central files when they are not present in the office network (Wright & Harmening, 2016).
- Storing Files Centrally: After the network has been set up, administrator could save all employee’s work to a secure, central, recurrently backed up hardware (Daya, 2014).
- Centralized Applications: When a computer network is available, centralized applications such that software is used by many at a time works best (Wright & Harmening, 2016).
- Collaboration tools, Permissions Controls and Shared resources are few more networking needs for business (Daya, 2014).
References
Adeyinka,O. (2008). Internet Attack Methods and Internet Security Technology, Modeling&Simulation. AICMS 08. Second Asia International Conference on, vol., no., pp.77?82, 13?15.
Ahmad, A. (2015). Type of Security Threats and its Prevention, Int.J.Computer Technology & Applications, Vol3 (2), 750-752.
Charles, J., & Christian, A. (2014). Christiansen, ?Network Security Over watch Layer: Smarter Protection for the Enterprise?, Sponsored by: Trend Micro
Christina, E., Skouloudi, S., & Katsikas, K. ( 2015). A simulation platform for evaluating DoS attacks in wireless sensor networks. IEEE Conference Paper.
Daya, B. (2014). Network Security: History, Importance, and Future?, University of Florida Department of Electrical and Computer Engineering.
Dowd, P.W., & McHenry, J.T. (2016). Network security: it’s time to take it Seriously, Computer, vol.31, no.9, pp.24? 28.
Kartalopoulos, S. V. (2009). Differentiating Data Security and Network Security, Communications. ICC ’08. IEEE International Conference on, pp.1469?1473, 19?23.
MaKai, X., Kang, W., & Chen, X. (2018). Research on the access control protocol prices design of network privacy protection, Cluster Computers.
Marin,G.A. (2016). Network security basics, Security& Privacy, IEEE , vol.3, no.6, pp. 68?72.
Ohta, T., & Chikaraishi, T. (2011). Network security model, Networks, 1993. International Conference on Information Engineering ’93, Proceedings of IEEE Singapore International Conference on, vol.2, no., pp.507?511 vol.2, 6?11.
Padmavathi, D.G., & Shanmugapriya, D. (2009). A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, (IJCSIS) International Journal of Computer Science and Information Security,Vol. 4, No. 1 &2.
Salqan, Y.Y. (2007). Future trends in Internet security, Distributed Computing Systems, Proceedings of the Sixth IEEE Computer Society Work shop on Future Trends of, vol., no., pp.216?217, 29?31.
Serpanos, D. N., & Voyiatzis, A.G. (2012). Secure network design: A layered approach, Autonomous Decentralized System, The 2nd International Workshop on, vol., no., pp. 95?100, 6?7.
Warfield, M. (2011). Security Implications of IPv6, Internet Security Systems White Paper,documents.iss.net/whitepapers/IPv6.pdf.
Wright, J., & Harmening, J. (2016). Computer and Information Security, Handbook Morgan, Kaufmann Publications, Elsevier Inc p. 257.