MyAssignmenthelp

Call Now: (+61) 416-195-006

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
post
page
  • Expert Answers
  • Blogs
  • Student Login

Assignment Solution for

MIS102 Data and Networking

MIS102 Data and Networking Online Tutoring

Introduction:

We all are living in the era where data and information exchanged between us everywhere and it is constantly changing since last decades. The networks play very important role in all this. The Xerlasian University Australia is also following the same approach for their other university campus. There are several types of network and topologies which we can use to get our desired results with the giving scenario. On this assessment, I am working as a data and networking engineer so I have to fulfill the system requirements because I am responsible for developing, implementing, maintaining and supporting the system and networks between both campuses of university. I have to create and provide a simple solution which would work very smooth and fast on the application layer even if both campuses are trying to communicate to each other. The OSI (Open Systems Interconnection) will be used to make a successful network for both campuses of university in setting up, supporting, and maintaining local area networks (LANs), wide area networks (WANs), and other networking systems.

Hire PhD Expert Tutors in Australia

If you need assistance with Online Tutoring, our professional Online Tutoring experts are here to help!
WhatsApp Get a Quote

 

Body:

The basic flow of data is very simple and clear because university is using the dedicated servers so the hosting and travel speed of data will be very fast. The concept of traffic flow is also very important here since it may be that packets from one flow need to be handled differently from others, by means of separate queues in switches, routers and network adapters, to achieve traffic shaping, fair queueing or Quality of Service. It is additionally an idea utilized in Queueing Network Analyzers (QNAs) or in bundle following (Whitt, 2001).

In addition, there is strong need to add Network security protocol in the whole system of both campuses so that the outside persons will not be able to reach the data on servers (Zhang, 2004). This is because the protection of data should be our first priority and it should not be leaked anywhere on the network. System security conventions are essentially sort of system convention that guarantees that the respectability and insurance of information in traveling over a system association is maintained. System security conventions characterize the procedures and technique to make sure about system information from any ill-conceived endeavor to audit or concentrate the substance of information (Kleinrock & Short, 1999).

As referenced before, OSI will be used as the primary stack protocol for the two campuses (Sinha, 2017). The OSI Model (Open Systems Interconnection Model) is a theoretical structure used to portray the elements of a systems administration framework. The OSI model describes processing capacities into a widespread arrangement of rules and necessities so as to help interoperability between various items and programming. In the OSI reference model, the correspondences between processing frameworks are dissected into seven diverse deliberation layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application (Zhao, et al., 2018).

Physical Layer

The most minimal layer of the OSI Model is concerned with electrically or optically transmitting raw unstructured information bits over the system from the physical layer of the sending gadget to the physical layer of the accepting gadget (Song, Han, Mok, Lucas, & Nixon, 2008). It can incorporate determinations, for example, voltages, pin format, cabling, and radio frequencies. At the physical layer, one may discover “physical” assets, for example, arrange centers, cabling, and repeaters, organize connectors or modems.

Data Link Layer

At the data link layer, straightforwardly associated hubs are utilized to perform node to node information move where information is bundled into outlines. The information interface layer likewise amends mistakes that may have happened at the physical layer.

The data link layer includes two sub-layers of its own. The second, the coherent connection control (LLC), gives stream and blunder command over the physical medium just as distinguishes line conventions (Alvi, 2015).

Network Layer

The network layer is answerable for getting outlines from the information interface layer and conveying them to their expected goals. It is also dependent on the addresses contained inside the casing. The system layer finds the goal by utilizing consistent locations, for example, IP (web convention) (Srivastava & Motani, 2005). At this layer, switches work as an essential segment that is used to actually course data where it needs to go between networks.

Looking for Online Tutoring?

Hire Qualified Australian Tutors at Low Price
WhatsApp Get a Quote

 

Transport Layer

The transport layer deals with the conveyance and blunder checking of information parcels. It manages the size, sequencing, and eventually the exchange of information among frameworks and hosts. One of the most widely recognized instances of the transport layer is TCP or the Transmission Control Protocol (Di Felice, 2009).

Session Layer

The session layer controls the discussions between various PCs. A meeting or association between machines is set up, oversaw, and terminal is set at layer 5. Session layer benefits additionally incorporate validation and reconnections of the data (Zhao, et al., 2018).

Presentation Layer

The presentation layer arranges or deciphers information for the application layer. It is primarily dependent on the language structure or semantics that the application acknowledges instantly. Along these lines, it is also occasionally called as the syntax layer. This layer can likewise deal with the encryption and decoding required by the application layer (Zhao, et al., 2018).

Application Layer

At this layer, both end clients get connected straightforwardly with the product application. This layer sees organized administrations while carrying it to end-client application. An example can be of an internet browser or MS Office (Zhao, et al., 2018). The application layer distinguishes correspondence accomplices, asset accessibility, and synchronizes correspondence.

Hubs, switches, and routers operate are at the most minimal three layers of the OSI network model: the physical layer, data link layer and network layer. Hubs work at the first or Physical layer (Zhao, et al., 2018). It links all the devices connected to it and forms a single network. Switches operate at the Data Link or second layer. The physical layer consists of hardware while all of the hubs, switches and routers are hardware. The data link layer performs node to node operations in the network protocol.

For the login operations session layer is responsible for all such kind of operations. This layer request for a logical connection which should be established on end user’s requirement. This layer handles all the important log-on or password validation. It is also important to add a security layer after the session layer as this will help to secure user login data more. As we already know that the session layer still has its own security and protection, but if we keep another obstacle between the layers this will secure our data more from the illegal person (Sinha, 2017).

There are some duplication of services at Physical layer and Data Link Layer. Hence, it would be better if we combine both of them into a single layer because both layers would be containing hardware side of protocol. The combination of both layers into one will make the model a little bit more fast and secure (Zhang, 2004).

Conclusion:

While making a network system it was analyzed that making the right choice of a data model is important. Moreover, working on the communication protocol stack was very interesting as it works as the base of your network system. By introducing OSI, the whole communication system will be smoothening out as it will reduce redundancy of records between of the campuses of university.

References

Alvi, S. A. (2015). Internet of multimedia things: Vision and challenges. Ad Hoc Networks, 33, 87-111.

Di Felice, M. (2009). Modeling and performance evaluation of transmission control protocol over cognitive radio ad hoc networks. Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems.

Kleinrock, L., & Short, J. E. (1999). Convention ID badge system. U.S. Patent No. 5,936,542.

Sinha, P. (2017). Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. International Conference on Signal Processing and Communication (ICSPC). IEEE.

Song, J., Han, S., Mok, A., Lucas, M., & Nixon, M. (2008). WirelessHART: Applying wireless technology in real-time industrial process control. IEEE Real-Time and Embedded Technology and Applications Symposium, 377-386.

Srivastava, V., & Motani, M. (2005). Cross-layer design: a survey and the road ahead. IEEE communications magazine, 43(12), 112-119.

Whitt, W. (2001). The queueing network analyzer. The bell system technical journal, 62(9), 2779-2815.

Zhang, Y. (2004). A multilayer IP security protocol for TCP performance enhancement in wireless networks. IEEE Journal on Selected Areas in Communications, 22(4), 767-777.

Zhao, J., Bai, J., Zhang, Q., Yang, F., Li, Z., & Zhang, X. (2018). The Discussion about Mechanism of Data Transmission in the OSI Model. International Conference on Transportation & Logistics, Information & Communication, Smart City (TLICSC 2018).

[citationic]

Great

Online Tutoring Services

2,032

Orders Delivered

4.9/5

5 Star Rating

395

PhD Experts

 

Amazing Features

Plagiarism Free Top Quality
Best Price On Time Delivery
100% Money Back 24 x 7 Support

Recent Posts

  • Expert Tips for APA 7 Citations

    Cracking the Code: Expert Tips for APA 7 Citations

    Navigating the world of academic writing can be...
  • Navigating Harvard Style: A Complete Citation Handbook

    Navigating Harvard Style: A Complete Citation Handbook

    In the world of academic writing, proper citati...
  • Comparing Referencing Styles: Harvard vs. APA 7

    Comparing Referencing Styles: Harvard vs. APA 7

    When it comes to academic writing, referencing ...
  • Navigating the AI Landscape: Top Tools for University Students

    Navigating the AI Landscape: Top Tools for University Students

    Artificial Intelligence (AI) is revolutionizing...
  • The Ultimate Guide to Research Paper Writing: 5 Step Strategy

    The Ultimate Guide to Research Paper Writing: 5 Step Strategy

    Writing a research paper can seem like a daunti...

You may also like

  1. Social Networking Sites Online Tutoring
  2. Online Tutoring on Data Encryption
  3. MIS602 Data Modelling & Database Design
  4. MAT71004 Qualitative Data Online Tutoring
  5. Online Tutoring on 7116IBA Data Resource Management
  6. ECON1555 Business Data Analytics Online Tutoring
Ask a New Question
*
*
*
*
*
*

Disclaimer: Documents provided by MyAssignmenthelp serve as model papers and are not meant to be submitted directly to the university or reuse/resell in any way. They are written for individual research and reference purpose only.

How to Write an Essay

Term Paper Help

Harvard Referencing

Python Online Tutoring

How to prepare for Exams


Case Study Help

Thesis Help

Coursework Help

Business Plan Help

Academic Tutoring Service


College Online Tutoring

Law Online Tutoring

English Online Tutoring

Nursing Online Tutoring

Literature Review Help


Assignment Help Payment Options
myassignmenthelp.com.au

⭐⭐⭐⭐⭐ 20K+ Satisfied Students. Rated 4.9/5

Upload your requirements and see your grades improving

Order Now

MyAssignmenthelp

Top Searches:| Accounting| Nursing | Auditing | Marketing | Management | Economics | Engineering | Finance | Human Resource | Law | Project Management | Social Media | Supply Chain | Operation Management | Change Management | Leadership | Entrepreneurship | Business Management | Business Plan | Literature Review | Coursework | Dissertation | Case Study | Marketing Plan | Essay Writing | Presentation

© 2025. All rights reserved. MyAssignmenthelp Australia

TOP

  Connect on WHATSAPP: +61-416-195006, Uninterrupted Access 24x7, 100% Confidential

Connect Now
X

Order Now and Get 25% off For September-October only

textbox6129
textarea1740
Select FileChangeRemove
fileupload7305

‹›×

    Ask a New Question

    *Minimum 24 hours are required to deliver Solution

    *
    *
    *
    *
    *
    *

    Privacy Policy - Terms and Conditions