Role Of Network Connectivity And Security In Computing

Principles of Communication in Networks

This section of the report is to focus the importance of the networking and security for the protection of the data which are transmitted from the source to the destination address in an organization. It involves both hardware and software related to the organization. The prime role and function of network and security in current computing is the protection of the network used in an organization and data which is transmitted in an organization. The three fundamental principles of networking security are availability, integrity and confidentiality. The confidentiality is concerned with the prevention of the unauthorized disclosure of essential information (Rawat & Reddy, 2017). The three prime objectives of integrity are prevention from alteration of data, prevention of unauthorized users and availability refers to the uninterrupted access to the information related to the system.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The hardware and software entities associated to networking and securities are cable, firewall, router, DSL modems, VoIP systems and printers. The protocols and interaction involved in the networking and security are DNDSC, Secure Socket Layer (SSL), Transport Layer Security (TLS), secure IP (IPSec), Secure Hypertext transfer protocol (HTTPS), secure e-mail (PGP and S/MIME). Security in cloud computing is very much an essential factor considering the networking and security as the data which are stored in the cloud servers are stored on the basis of the rules and regulation proposed by the cloud service providers. The networking architecture is very much essential considering the networking and security as it gives an idea about the security zones and layers in which the data is stored. Every IT organization have an unique system which dedicatedly works for the network security architecture and it needs to be modified according to the business situation.

The management of the threats and vulnerability in the network of an organization helps in the growth and development of the organization. All the policies and regulations of the company associated with essential data should be developed in such a way that it becomes compatible with the network security of the organization as it will lead to the growth and development of the organization itself.

The role and functions of the different types of networking models are used to describe the type of network used by the organization; the packets which are routed through the networks are examined using the source and destination address. There are specific principles of communication for each of the networking models. The technologies associated with this packet switching are the Local area network (LAN), Wide Area Network (WAN) and the circuit switching technology. This type of networking model is used to group data which is transmitted across a network of an organization into packets.

Hardware and Software Entities Contributing to Network Communications

The basic structure of a packet includes payload and a header (Nozaki et al., 2015). This type of networking model is the most widely used networking models in worldwide computer networks. The data which is present in the header of this model are used by the networking hardware. It is used to direct the packet to its destination where the payload is extracted and are used by the application software.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The two major modes of packet switching are connectionless packet switching and connection oriented packet switching. The format followed in the connectionless packet switching are destination address, source address, total number of pieces and the sequence number and in the connection oriented packet switching, data packets are sent sequentially across a route (Diamantopoulos et al., 2015). Each packet is assigned with a sequence number then transported to the destination address. Packet switched network are used as the networking architecture for this model.

Also known as the layer of abstraction this networking model specifies the shared communication protocols and the interface methods.  This type of standard model is used in both the type of standard models such as the OSI model as well as the TCO/IP model. The application layer is the top most layers present in the OSI model. This TCP/IP models provides the interface between the application and network.

The application layer is used to exchange messages from one destination to another in a network. One of the main functionality of this layer is that it is useful to get access for the global information about the different types of services (Karagiannis et al., 2015). Different types of messages which are sent to the destination folders can be managed with the help of the application layer. The protocol followed in this type of networking layer focuses on the process to process communication across an IP network.

The protocols used in this type of networking are File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Trivial File Transfer Protocol (TFTP), Domain Name System (DNS), Simple Network Management Protocol (SNMP) and Common Management Information Protocol (CMIP). This type of networking model is used to provide a communication interface and end-user service (Collina et al., 2014).

The prime responsibility of this layer is to enable the user of the network to access the network. The support provided by this layer are like shared data management and e-mail.

The main functionality of this layer is that it ensures that the messages which are sent to the destination address from the source are free from any kinds of errors. The other main functions of this layer are managing flow control, framing, access control. The protocols followed in this layer ensure that the speed of the data received do not affect the overall network as both the network have different characteristics (Carthern et al., 2015).

Protocols and Interactions Implementing Network Communications

The data link layer receives the data from the network layer and divides that into smaller fragments known as the frames. The addressing information are provided with the help of the header. The physical addresses of the source and destination machines are added to each of the fames before the transmission process (Lopacinski et al., 2015).

The most common protocols used in the data link layer are ATM, ARCnet, LattisNet, Cisco Discivery Protocol (CDP), Controller Area Network (CAN), Ethernet, Econet, Frame relay, Fiber Distributed Data Interface (FDDI), Ethernet Automatic Protection  Switching (EAPS), High level Data link control (HDLC), StarLan, Token ring, Link Access procedures D channel (LAPD), Link Layer Discovery Protocol (LLDP), Local talk, MIL- STD-1553, Multi-Protocol Label Switching (MPLS), Nortel Discovery Protocol (NDP), Point to Point (PPP), Profibus, Split Multi-link trunking (SMLT), Spanning Tree Protocol, Unidirectional Link Detection (UDLD) and 1-wire.

The architecture followed in this layer are the two layers, logical link control sub layer which multiplexes protocols at the top of the data link layer and media access control sub layer performs the authentication role in the network.

The prime functionality of the network layer is to authenticate each of the different networks which are connected in a private network. This layer helps in forwarding the packets to the network routers. The protocol followed in this layer is based on algorithms which are used to determine the best paths for the data from the source to the destination folder. The paths which are followed in this type of networking model are known as virtual circuits.

The architecture of this layer has different functionalities such as the logical addressing, routing, path determination and fragmentation (Qadir et al., 2015). The IP addressing is also known as logical addressing which is defined as this layer of the OSI model. The method of routing a data from the source and destination is known as routing.

The protocols which operated in the network layer are Routing Information Protocol (RIP), Protocol Independent Multicast (PIM), Open Shortest Path First (OSPF), Internetwork Packer exchange (IPX), IPv4, IPv6 internet protocol, Internet Protocol Security (IPsec), Internet Group Management Protocol (IGMP), Internet Control Message Protocol (ICMP), Enhanced Interior Gateway Routing Protocol (IGRP), Exterior Gateway Protocol (EGP), Datagram Delivery Protocol (DDP) and the Connectionless-mode Network Service (CLNP).

The limitations of the received data are one of the reasons behind the fragmentation process. The other functionality of this model is the path determination which determines the path topology between the two devices.

Fundamental Aspects of Cloud Computing

The main functionalities of this protocol involve the use of TCP, UDP, DCCP, SCTP and RSVP. The architecture of this networking model provides services such as connection oriented communication, flow control, multiplexing and reliability. The connection oriented communication is done using a data stream. The reliability of this model ensures the security of the message which is prone to networking vulnerabilities. The rate of sending messages can be controlled and managed with the help of the flow control; it increases the efficiency of the network. The problem of using more than one network service is managed by the multiplexing capabilities of this model (Rescorla, 2018).

The protocols used in this layer are Apple talk transaction protocol, datagram congestion control protocol, multipath TCP, Reliable data protocol, Reliable user datagram protocol, sequenced packet exchange, structured stream transport, transmission control protocol, user data gram protocol and micro transport protocol.

The protocol of this layer provides host to host communication services for different kinds of communications. The packet header size of UDP is 8 byte. The typical data packet over head is 8 byte.  Datagram is used as the transport layer packet entity in UDP. The checksum size of UDP is 16 bits.

The header packet size of UDP-Lite is 8 bytes. The packet header size of UDP-Lite is 8 bytes. Datagram is used as the transport layer packet entity in UDP-Lite. The checksum size of UDP-Lite is 16 bits.

The packet header size of TCP is between 20-60 bytes and typical data packet overhead is 20 bytes. Segment is used in the transport layer packet entity. The checksum size of TCP is 16 bits.

The packer header size of multi path TCP is between 50-90 bytes. Segment is used as the transport layer packet entity in this type protocol. This is a connection oriented protocol and provides reliable data transmission. The checksum size of the multipath TCP is 16 bits and do not supports partial checksum, it have exquisite features such as flow control and congestion control and supports multiple homing.

The packet header size of SCTP is 12 bytes and the typical data packet overhead is between 44-48 bytes. Datagram is used as a transport layer packet entity. This protocol is a connection oriented protocol and it provides reliable as well as unreliable transport. The checksum size of this type of protocol is 32 bits with no partial checksum. Congestion control with congestion notification is an integral part of this protocol. It supports multiple stream, bundling and multiple homing.

Analyzing Networking Needs for Business

It is a connection oriented protocol which preserves message boundary. The packet header size of this protocol and the typical data packet overhead is either 12 or 16 bytes. Datagram is used as the transport layer packet entity in this type of protocol. It checks data sum and the checksum size of this protocol is 16 bits. Congestion control is present in thgis type of protocol along with the congestion notification.

This is a connection oriented protocol having a packet size of 14 bytes and typical data packet overhead of 14 bytes. Datagram is used as the transport layer packet entity in RUDP. It supports both reliable and unreliable transport. The checksum size of this protocol is 16 bits and it supports flow control but do not support multiple streams and multi homing.

This is the lowest layer among all the different layers of the OSI models; this layer consists of the electronic transmission technologies of a network. The physical layer help in transmitting raw bits rather than logical data packets over the physical data link connecting network nodes. The prime objective of this networking model is the transmission of the logical communications requests from the data link layer to the hardware specific operations (Zou et al., 2015).

The other major tasks of this layer is the modulation, line coding, bit synchronization ,circuit switching, training sequences, bit interleaving, pulse shaping, forward error correction. The architecture associated with this model is concerned with the bit rate, different types of line configurations, communication processes and auto negotiation. The technologies associated with this layer such the DSL, CAN bus, Bluetooth, ARINC 818 and ether loop plays a vital role to play in different kinds of activities in the network (Fay et al., 2016).

The fundamental equipment required for this technology are repeater, Ethernet hub, modem and fiber media converter. The physical layer helps in the providing procedural, electrical, mechanical interface to the transmission medium. The network equipment of this layer is network interface controller, repeater, Ethernet hub, modem, fiber media converter.

Based on the above discussion the importance of the different networking models can be acknowledged. Since most of the industries are now interconnected with private networks which the role of connectivity is increasing every day. Network connectivity is one of the ways by which an organisation can maintain the security and privacy of their personal networks.

The most common connectivity devices used are the NIC, Hub, switch, bridge, transceivers, wireless access points, router and gateway (Sinha et al., 2017). The hybrid networking devices used in current computing is multilayer switches, protocol converters, bridge routers, proxy servers and firewalls. The different types of hardware networking devices are Ethernet adapters, file server, database server, storage areas, and network services. There are different kinds of protocols used in the network communications such as the network communication protocols, network management protocols and network security protocols.

Network security protocols are the data communication protocols such as the TCP/IP and HTTP. Each of the network models discussed in this report have different specifications and services, each layers have to be maintained and managed by the organisation so that there are no issues related to the network as it is of the most used medium for the growth and development of the organisation.

Reference

Carthern, C., Wilson, W., Bedwell, R., & Rivera, N. (2015). Data Link Layer. In Cisco Networks (pp. 35-48). Apress, Berkeley, CA.

Collina, M., Bartolucci, M., Vanelli-Coralli, A., & Corazza, G. E. (2014, September). Internet of Things application layer protocol analysis over error and delay prone links. In Advanced Satellite Multimedia Systems Conference and the 13th Signal Processing for Space Communications Workshop (ASMS/SPSC), 2014 7th (pp. 398-404). IEEE.

Diamantopoulos, N. P., Hayashi, M., Yoshida, Y., Maruta, A., Maruyama, R., Kuwaki, N., … & Kitayama, K. (2015). Mode-selective optical packet switching in mode-division multiplexing networks. Optics express, 23(18), 23660-23666.

Fay, L., Michael, L., Gómez-Barquero, D., Ammar, N., & Caldwell, M. W. (2016). An overview of the ATSC 3.0 physical layer specification. IEEE Transactions on Broadcasting, 62(1), 159-171.

Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A survey on application layer protocols for the internet of things. Transaction on IoT and Cloud Computing, 3(1), 11-17.

Lopacinski, L., Brzozowski, M., Nolte, J., Kraemer, R., & Buechner, S. (2015, October). Parallel RS error correction structures dedicated for 100 Gbps wireless data link layer. In Ubiquitous Wireless Broadband (ICUWB), 2015 IEEE International Conference on (pp. 1-6). IEEE.

Nozaki, K., Lacraz, A., Shinya, A., Matsuo, S., Sato, T., Takeda, K., … & Notomi, M. (2015). All-optical switching for 10-Gb/s packet data by using an ultralow-power optical bistability of photonic-crystal nanocavities. Optics express, 23(23), 30379-30392.

Qadir, J., Ali, A., Yau, K. L. A., Sathiaseelan, A., & Crowcroft, J. (2015). Exploiting the power of multiplicity: a holistic survey of network-layer multipath. IEEE Communications Surveys & Tutorials, 17(4), 2176-2213.

Rawat, D. B., & Reddy, S. R. (2017). Software defined networking architecture, security and energy efficiency: A survey. environment, 3(5), 6.

Rescorla, E. (2018). The transport layer security (TLS) protocol version 1.3 (No. RFC 8446).

Sinha, P., Jha, V. K., Rai, A. K., & Bhushan, B. (2017, July). Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. In Signal Processing and Communication (ICSPC), 2017 International Conference on (pp. 288-293). IEEE.

Zou, Y., Zhu, J., Wang, X., & Leung, V. C. (2015). Improving physical-layer security in wireless communications using diversity techniques. IEEE Network, 29(1), 42-48.