TECH2100 Introduction to Information Networks Report 1 Sample

Assignment brief

Your Task

This assessment is to be completed individually. In this assessment, you are expected to critically analyse a specific topic from the content covered in Weeks 1 to 3. Your task is to develop a comprehensive tutorial that not only educates learners but also promotes critical thinking about the topic.

Description

This assessment will gauge your depth of understanding and ability to critically evaluate and synthesise key concepts from Weeks 1 to 3. Your tutorial should be presented as a written document that delves into the intricacies of the topic, incorporating advanced insights and promoting deeper thought. You are expected to present content that goes beyond mere description, demonstrating a critical evaluation of the topic in light of current research and developments in the field.

Assessment Instructions

• Your report should be submitted in Word Document or PDF format.

• Your written tutorial should:

1. Begin with a comprehensive introduction to your chosen topic, setting the context and highlighting its significance in the field of data communications and networking.

2. Engage in a detailed discussion of the topic, ensuring clarity, depth, and critical analysis throughout. This should be complemented by a synthesis of existing literature, research, and developments.

3. Incorporate real-world examples or scenarios, but also evaluate their significance and implications in the broader context.

4. Conclude with a comprehensive summary, key takeaways, and potential future developments or implications in the field.

5. Seamlessly integrate diagrams, charts, or visuals where they add depth and clarity to your narrative. Ensure these visuals are critically analysed in the text.

• Ensure that you cite any sources or materials referenced. All citations should adhere to a recognised academic citation style of your choice, but it must be applied consistently throughout your document. KBS recommends using KBS Harvard referencing style.

• Please refer to the assessment marking guide to assist you in completing all the assessment criteria.

Solution

Introduction

Data transmission and networking are fundamentals of today’s information technology systems. These technologies facilitate the wireless transfer of data and information sharing between different equipment. OSI and TCP/IP are two examples of layered network models that prove helpful in establishing the complex relations of communicational processes. FTP, HTTP and SMTP bring order in the actual flow of data because they all need to be compatible. Advanced technologies antecedently identified as Wireless communication transform the efficiency of data communication. Thus, the network models aid in the proper systematic analysis and handling of intricate communication networks. They give logic for the correction and optimization of a network’s functioning. The flow of data helps in improving business interaction, organizational performance as well as, and business relationships internationally. Familiarization with these technologies and models is crucial when considering the strategies of network design and administration.

Discussion

This staple of communication and networking has grown and heavily influenced modern information systems. Network engineers should have a reasonable amount of knowledge of technologies, models, and protocols (Storck and Duarte-Figueiredo, 2020). These models are important building blocks of the models of layered networking such as the OSI and the TCP/IP. The OSI model has divided the communication process into seven layers each having its function and purpose. Thus, the TCP/IP model which is more realistic is utilized in the majority of internet interactions. These models also set the standard for processes and guarantee that integration is offered with the right data transfer. The physical layer of the OSI model then communicates raw data bits through the support of physical entities (Kaur et al. 2023). It includes cables, switches, and even wireless transmitters to make the connections very secure. The data link layer is also responsible for issues such as data framing, error detection and error correction. Ethernet for example is a typical protocol operating at this layer alongside with the LAN. Wireless technologies like Wi-Fi are also here in the hierarchy and offer connections working in a protocol manner for university assignment help.

This layer is responsible for information transfer and routing; one of the main protocols of this layer is IP. IP addresses identify devices/computers and make certain that data packets can be delivered and routed as needed. Routers at this layer also forward the packets and manage the way packets are delivered by increasing efficiency. Optimisation of the path that traffic will take is a very important aspect that if done right will make latency reduce and the effectiveness of the network increase (Khoshkholghi et al. 2020).

Figure 1: Flowing data in the OSI model from client to server
(Source: Acquired from Turotial Material)

The transport layer guarantees data communication by employing TCP and/or UDP. TCP offers connection-based transfer of data and guarantees that the information is in order and has not been altered in any way (Muhammad et al. 2021). Connectionless service is available in UDP which best suits applications that do not require much reliability and it is faster. Analyzing the aspects of the data transfer protocols, their distinctions, and their characteristics is pivotal for comprehending the approaches to network optimization. It deals with the organization of application sessions while the continuity of communication is maintained. It deals with setting up, continuing and closing a session that enables fixed data communication. On the technical level of presentation, there are means for transforming data formats to enable communication between the systems. It deals with data encryption, data compression, and translation which enhances communication on the network.

The application layer provides network services at the end users’ place. This layer encompasses the protocols of HTTP, FTP, and SMTP, for access to the web, file transfer and the sending of mail respectively (Altulaihan et al. 2023). Security related to the existing network is vital to avoid leakage of important information. Every protocol like SSL/TLS ensures that data exchanges are not an open platform to any other party. They are security mechanisms that ensure the delivery of the network traffic between the different network domains separating the trusted and the untrusted ones. Intrusion detection systems are used to provide real-time analysis of network traffic in an endeavour to discover intrusions. Security flaws can be fixed either through updates or the application of patches and should be done as often as possible.

They establish interaction through the use of wireless transmission media such as Wi-Fi and Bluetooth among others (Pahlavan and Krishnamurthy, 2021). It is a wireless technology that transmits internet signals via radio waves in different settings. Bluetooth provides point-to-point wireless connectivity and is good for short-range transferring of data making it very flexible and portable. This paper affirms that security measures for wireless media are necessarily important because the media being transmitted is vulnerable to interception.

Figure 2: Structure of Wireless Communication
(Source: Self-developed)

WPA3 is a security protocol used to extend security in wireless communications than WPA2. Wireless security settings require frequent change since new threats may be developed. Network models that are layered come in handy in reviewing and solving issues within networks that are many (Huang et al. 2021). Skills are organized in this manner to perform layer-specific tasks; the model helps with specific issue resolution and administration. Standards create general procedures to be followed during data exchange, thus making a device to be compatible with another device. It requires updates and referring to the protocol standards to be compliant and fully functional. It is wise that network professionals know about changes and advancements in protocols and technologies in the network.

Advanced wireless technologies boost the process of data transmission with higher efficiency. The network engineers and administrators need to be conversant with these advancements. Security in networks is a dynamic issue of protecting the network against constantly emerging problems. Appropriate security measures as well as staff training are critical elements when it comes to data security and protection. This is why the TCP/IP model is widely used in internet communications since it has a simple and effective design (Bay?lm?? et al. 2022). Wireless technologies are constantly developing and becoming more powerful, and more secure at the same time. Wireless links have become a necessity in various networks; hence it is essential to have secure and efficient wireless networks.

Network models and protocols are the infrastructures in the communication of data. They also make standardized processes that make sure that data will be easily interchangeable. Proficiency in this area requires that a network professional be continuously learning and adapting. Working with these concepts is crucial for the progressive development of communication technologies. New findings and advances condition data communications, both in terms of performance and protection. Incorporating them as an authority in change is crucial for today’s network management. Lack of implementation and management of the protocols enhances the increase in the network’s performance (Alam et al. 2020). This paper reflects on the advancement of wireless technologies that enhance communication and security.

Real World Examples

In this aspect, examples from the actual environment demonstrate the implementation of data communication technologies. The application of the OSI model in the design of enterprise networks guarantees the protocols follow certain norms hence proper communication is achieved (Halenar et al. 2023). For example, networking equipment by Cisco uses these models for interactions and dependability. However, whereas there is a myriad of structures to the Internet it has its foundation rooted in the TCP/IP model. Such protocols are common in websites such as Amazon and Google.

Wireless transmission media in the example of Wi-Fi technology always focus on the significance of mobility. Organization: Starbucks uses WI-FI as a tool that provides Free internet to the customers to increase the level of customer satisfaction. Most wireless headphones including the wireless earbuds use Bluetooth interface, which is a great tool for personal connectivity (Maidment and Amlani, 2020). It is paramount to secure a network since hackers in the current world can attack even big firms. The leaking of data in Equifax is a good example of the existing weaknesses that point to a need for better protection.

SSL/TLS protocols secure internet transactions; hence, e-commerce sites require them to ensure the secure exchange of information. An organization has measures such as a firewall and intrusion detection systems that protect it from unauthorized access and infiltrations. These technologies have remarkable consequences for business processes and individuals’ right to privacy. Contrary to the basic network security tools and techniques, the right implementation and regular updates are crucial to keeping the networks safe and running efficiently.

Conclusion

Thus, knowledge of data communications and networking technologies, models, and protocols is vital for the present IT systems. Both models established a more systematic way of handling and implementing the network in the OSI and TCP/IP models meet the standards of network design and management. Wireless technology such as WLAN, Wi-Fi, and Bluetooth increase connection and communication and network security like SSL/TLS and firewalls ensure data security. The OSI models are illustrated by the real-life practice of Cisco and the usage of Wi-Fi within Starbucks also proves the relevance of discussed concepts. The need to learn and take new knowledge/ skills is inevitable for the network professional since the world is ever-evolving. That is why the proper implementation and management of these elements constitute significant conditions for possessing reliable, effective, and secure networks. 

References

Alam, I., Sharif, K., Li, F., Latif, Z., Karim, M.M., Biswas, S., Nour, B. and Wang, Y., 2020. A survey of network virtualization techniques for Internet of Things using SDN and NFV. ACM Computing Surveys (CSUR), 53(2), pp.1-40. https://www.researchgate.net/profile/Sujit-Biswas-2/publication/340999302_A_Survey_of_Network_Virtualization_Techniques_for_Internet_of_Things_Using_

SDN_and_NFV/links/5ea92663299bf18b95845eca/A-Survey-of-Network-Virtualization-Techniques-for-Internet-of-Things-Using-SDN-and-NFV.pdf

Altulaihan, E., Alismail, A., Hafizur Rahman, M.M. and Ibrahim, A.A., 2023. Email Security Issues, Tools, and Techniques Used in Investigation. Sustainability, 15(13), p.10612. https://www.mdpi.com/2071-1050/15/13/10612/pdf

Bay?lm??, C., Ebleme, M.A., Çavu?o?lu, Ü., Küçük, K. and Sevin, A., 2022. A survey on communication protocols and performance evaluations for Internet of Things. Digital Communications and Networks, 8(6), pp.1094-1104. https://www.sciencedirect.com/science/article/pii/S2352864822000347

Halenar, I., Halenarova, L. and Tanuska, P., 2023. Communication Safety of Cybernetic Systems in a Smart Factory Environment. Machines, 11(3), p.379. https://www.mdpi.com/2075-1702/11/3/379/pdf

Huang, X., Chen, D., Ren, T. and Wang, D., 2021. A survey of community detection methods in multilayer networks. Data Mining and Knowledge Discovery, 35, pp.1-45. https://link.springer.com/content/pdf/10.1007/s10618-020-00716-6.pdf

Kaur, K., Kaur, M., Kaur, K. and Madaan, A., 2023. A comparative study of OSI and TCP/IP models. International Journal Of Engineering And Management Research, 13(2), pp.127-135. https://ijemr.vandanapublications.com/index.php/ijemr/article/download/1168/1009

Khoshkholghi, M.A., Gokan Khan, M., Alizadeh Noghani, K., Taheri, J., Bhamare, D., Kassler, A., Xiang, Z., Deng, S. and Yang, X., 2020. Service function chain placement for joint cost and latency optimization. Mobile Networks and Applications, 25(6), pp.2191-2205. https://link.springer.com/content/pdf/10.1007/s11036-020-01661-w.pdf

Maidment, D.W. and Amlani, A.M., 2020, November. Argumentum ad ignorantiam: smartphone-connected listening devices. In Seminars in Hearing (Vol. 41, No. 04, pp. 254-265). Thieme Medical Publishers, Inc.. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7744166/

Muhammad, S., Chaudhery, T.J. and Noh, Y., 2021. Study on performance of AQM schemes over TCP variants in different network environments. IET Communications, 15(1), pp.93-111. https://ietresearch.onlinelibrary.wiley.com/doi/pdf/10.1049/cmu2.12061

Pahlavan, K. and Krishnamurthy, P., 2021. Evolution and impact of Wi-Fi technology and applications: A historical perspective. International Journal of Wireless Information Networks, 28, pp.3-19. https://link.springer.com/content/pdf/10.1007/s10776-020-00501-8.pdf

Storck, C.R. and Duarte-Figueiredo, F., 2020. A survey of 5G technology evolution, standards, and infrastructure associated with vehicle-to-everything communications by internet of vehicles. IEEE access, 8, pp.117593-117614. https://ieeexplore.ieee.org/iel7/6287639/6514899/09125906.pdf

Fill the form to continue reading
Would you like to schedule a callback?
Send us a message and we will get back to you

Highlights

Earn While You Learn With Us
Confidentiality Agreement
Money Back Guarantee
Live Expert Sessions
550+ Ph.D Experts
21 Step Quality Check
100% Quality
24*7 Live Help
On Time Delivery
Plagiarism-Free
Get Instant Help
University Assignment Help

Still Finding University Assignment Help? You’ve Come To The Right Place!


CAPTCHA
AU ADDRESS
81 Isla Avenue Glenroy, Mel, VIC, 3046 AU
CONTACT