0% found this document useful (0 votes)
5 views

wwwwSamrat

This document is an assignment on computer networking, covering fundamental concepts such as the OSI and TCP/IP models, data communication processes, network devices, protocols, and security measures. It includes detailed explanations of networking layers, physical media comparisons, data encapsulation and decapsulation, MAC addresses, and the roles of various network devices and protocols. The assignment emphasizes the importance of understanding these topics for building efficient and secure network infrastructures.

Uploaded by

Samrat Bhattarai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

wwwwSamrat

This document is an assignment on computer networking, covering fundamental concepts such as the OSI and TCP/IP models, data communication processes, network devices, protocols, and security measures. It includes detailed explanations of networking layers, physical media comparisons, data encapsulation and decapsulation, MAC addresses, and the roles of various network devices and protocols. The assignment emphasizes the importance of understanding these topics for building efficient and secure network infrastructures.

Uploaded by

Samrat Bhattarai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Subject: Computer network

Instructor: Dipak Adhikari

Academic Year: First Year / First Semester


Declaration of Originality

I declare that this assignment is my original work, and I have referenced all sources as required. All the source that I
have come up to conclusion is mention on reference.

Student’s Name: Samraj Bhattarai

Student ID:

Signature:

Date: 31st January, 2025


TABLE OF CONTENTS

• Networking Fundamentals

• 1.1 OSI Model and TCP/IP Model

• 1.2 Comparison of Physical Media (Copper Cables, Fiber Optics, Wireless Communication)

• Data Communication

2.1 Data Encapsulation and Decapsulation Process

2.2 Media Access Control (MAC) Address and Its Role

• Network Devices and Protocols

3.1 Types of Network Devices (Switches, Routers, Firewalls)

3.2 Common Network Protocols (TCP, UDP, ICMP, ARP, HTTP, HTTPS, FTP, SNMP, DHCP)

• Network Security and Configuration

4.1 Common Cybersecurity Threats and Mitigation Measures

4.2 Cisco Switch Configuration for a Small Office Network

1. Introduction

2. Tasks
➢ Task 1: Networking Fundamentals
➢ Task 2: Data Communication
➢ Task 3: Network Devices and Protocols
➢ Task 4: Network Security and Configuration Network Security and Configuration

3. Conclusion
4. Reference
Introduction

Computer networks enable seamless communication and data exchange between devices, forming the backbone
of modern digital connectivity. This document explores fundamental networking concepts, data communication
processes, essential network devices, protocols, and security measures. It also covers practical configurations,
such as setting up a Cisco switch for a secure office network. Understanding these topics is crucial for building
efficient and secure network infrastructures.

1
Assignment Tasks

Task 1: Networking Fundamentals

1. Explain the seven layers of the OSI model and the four layers of the TCP/IP model. How do these
layers facilitate communication between networked devices?
→ First, OSI model also known as the reference model it is Open System Interconnection (OSI) Reference
Model It have seven layers on it and all the seven layers are mentioned below:
• Application layer
• Presentation layer
• Session layer
• Transport layer
• Network layer
• Data link layer
• Physical layer

Application Layer:
In application layer, the data exchange will be taking place with the help of software
application, as well protocols such as HTTP, FTP, SMTP, DNS used for process-to-process communication.
Presentation layer:

• Mainly encryption compression and decryption are in this layer.


• Convert the High-level language into Human understandable language.
• It provides the common Data transfer representation with Application service.

Session layer:

• In this layers Data segmentation is Done and Data is Segmentate with many different parts.
• Session Checkpoint is handled and undo the case disruption.

Transport layer:

• It gives application processes operating on several hosts direct access to communication services.
• Transport layer is responsible for End-to-end communication data.
• Manage of Dataflow in Transport layer.
Network layer:
2
• Ip address is assigned on Network layers.
• Data can be divided into small numbers called Packet; All the packet were sent through the best
routing.
• Exchange the data over Network on this layer.

Data link Layer:

• Frame control over on datalink layer.


• Known as the second layer of OSI from the bottom.
• It is responsible for Node-to-Node delivery of data from the same Network.

Physical Layer:

• In this layer The Data is transferred based on the physical cable used for sharing or receiving data.
• Transfer through the physical medium in BIT of 0 and 1.
• Transmission medium such as: fiber optics, coaxial, twisted pair cable etc.

Transmission control protocol /Internet protocol (TCP/IP) is a simple OSI reference model commonly
have Four layers which are explained below:
Application Layer:

• In this Layer also same as the OSI reference model because This layer enables to communicate through
the different software application using various protocols.
• For examples: HTTPs for web browsing, FTP for file transferring and SMPT for sending emails and so on.
• This layer is the combination of Application, presentation and session layer.

Transport Layer:

• In this layer Data segmentation is done and send it to the destination address.
• TCP and UDP is used in this layer where TCP for reliable data and UDP for the speed sensitive
application such as live of gaming etc.

Internet Layer:

• It seems like a Network layer in OSI reference model Where, the data is known as packet and the
packet were sent through routing to reach the destination address.
• Data addressed through IPV4 or IPv6
• Data were converted into packet so easy to control the flow of data that's why Flow control is easy and
Data is sent through the internet layer.

Network Interface Layer:

• Main purpose of this Layer in TCP/Ip is to send and receive the data through the physical network.
• It commonly seems like the combination of data link layer and physical layer so basically the use in this
layer is to transfer the data through the medium

3
• For example, for wirelessly through Wi-Fi, and through the fiberoptics cable, twisted pair cable etc.

OSI reference model and TCP/IP model facilitate communication between networked devices by dividing the
process which are mention below:

Encapsulation and Decapsulation:

→ In Encapsulation layer the data will be hide and wrapped and send to the destination address where
Decapsulation unwrapped the given data and received by the user whom the data were received.
→ Four main layers of TCP/IP were focused on their specific function such as:
• Hardware communication was handled by network interface.
• Data routed through network on internet layers
• Check the delivery of TCP or UDP in transport layer.
• Here in application layer helps to serve email, web browsing, file transfer and etc.

Hence in last the following process and their functional work helps to perform easy, reliable and
secured communication over the local network or either the global network.

2. Describe the different types of physical media used in computer networks. Compare the advantages
and disadvantages of copper cables, fiber optics, and wireless communication.

→ Physical media is also known as Guided transmission media where the data and information were
shared and receive through the internet and Guided medium is a pathway to transmit that data and
information.
There are Two type of transmission media Guided and Unguided and the physical media is on guided
medium, there are Three types of physical media used in computer network and i.e.:
1. Twisted pair cable
2. Coaxial cable
3. Fiber optics cable
Twisted pair cable
Advantages

• It is made up of two or four pairs of cable


• It is easy to use and less efficient
Disadvantages
• It basically used for 100 meters of range only so it is used for short distance communication
• Limited bandwidth and Speed of data sharing is slow in this cable

4
Coaxial cable
Advantages
• Basically, the cable used for TV Dish cable of board band
• It is more reliable and efficient use for data communication
• The range of coaxial is higher than the twisted pair cable
Disadvantages
• Slow data transfer as comparing with fiberoptic
• Data will be loss due to the sound disruption and electromagnetic interfere
Fiber optics
Advantages
• The wire of fiberoptics is made-up of glass and the data transmitted through the speed of light
• The range of fiber optics is more than twisted pair and coaxial cable and more reliable than them

Disadvantages
• The chance of damages in cable is possible because it is made up of glass so the fiberoptic cable is not
flexible
• Highly expensive than twisted pair and coaxial so anyone cannot afford it
Wireless communication:

→ Wireless communication is also known as the Unguided transmission where microwave, radio wave and
infare were involved here some of advantages and disadvantages of wireless communication are:
Advantages:
• No need of physical connection of wire for sharing data
• Easy to use and expand the area limits as needed
• Examples such as; satellite, radio signals walkie-talkie etc.
Disadvantages:
• Signal cannot penetrate the walls in the case of microwave and the signals also too weak and slow as
compared to fiberoptics
• Since this is wireless so it can be easily been hacked by the hackers while sharing the important
information so security concern is weak on wireless communication system

In conclusion, All the communication medium are best in their own purpose use each have their own
advantages and their arguments so all the communication is equally important.

5
Task 2: Data Communication

1. Describe the process of data encapsulation and de-capsulation as data travels through the OSI layers during
communication between two devices.

→ Encapsulation refers to the header and where in other side Decapsulation refers to the remove header,
the data user entered and sent it goes through the OSI reference seven layers and it also have the two-
side sender and receiver so sender side it involves the encapsulation then the receiver side it allows to
remove header. In the given below the process of Encapsulation and decapsulation of sender and
receiver side below;

→ Application Layer –In this layer It creates the message through web browsing.

→ Presentation Layer – As we know the use and function of this layer is to encrypting the data and
formatting.

→ Session Layer – main objectives on this are to make the segmentation of data.

→ Transport Layer – it allows data distributed equally into small segments and adds a TCP/UDP header.

→ Network Layer – after the Packet were done it allows to send data through routing to source and
destination.

→ Data Link Layer – Adding of MAC address header and frame control is done in this header.

→ Physical Layer – The data will be converted into Bits form of 0 and 1 and transmitted through the
physical or wireless connection.
6
Here after the sender side of encapsulation the data were transmitted into physically or wirelessly through the
internet, Afterall now the decapsulation receiver side layers and its uses are mention below:
→ Physical Layer – In this layer the raw bits 0 and 1 are received through the network.

→ Data Link Layer – In this layer bits are converted to frame, and removes MAC address header.

→ Network Layer – After the packet were sent in this layer all those are extracted and verify if they reach
at the destination address or not.
→ Transport Layer – Reassemble all the segment and check the data.

→ Session Layer – manage all the session as their function

→ Presentation Layer – Sender header in presentation layer it encrypts the data and in receiver header it
decrypts all the data.
→ Application Layer – Hence, after flowing from all six-layer Cames to application where it delivers to
the web or their software application.
In conclusion, Encapsulation layers Struct for the data communication where Decapsulation check the data
efficiency and be responsible for the data reached to destination address.

2. Briefly explain the concept of Media Access Control (MAC) addresses and their role in network
communication.
→ Media Access Control (MAC) is known as the unique address assigned to the network interface for a
communication it is made up of Hexadecimal number and digits having 48 bits and 6 bytes.
Structure of MAC address is written as in the given example: 00:1A: 3B:0A: G4:7K(also they were
separated by colon:)

Role of the MAC Address in network communication

• Data identification:
Data identification is done in it because Each devices have their unique Mac address so Data can be easily
identified in this point.
• Data transmission:
Data is also transmitted through the mac address not by Ip address so hence the role works for transmitting data
to the unique mac address devices.
• Network security:
The best Favour of MAC address is that it is secured and if any case hackers hacked the system, we know very
easily wo is doing that activities because of the unique address that were assigned for a network.

• Tracking and monitoring:


Having the Unique Mac address helps to address the devices so either the information got hacked we can track
easily with the help of the Mac address.
7
Hence, in conclusion mac address play very important role in networking so it helps to perform secured,
accurate and efficient communication.

Task 3: Network Devices and Protocols

1. Describe the different types of network devices (switches, routers, firewalls) and their roles in a typical
network infrastructure.

→ Network device is simply as my knowing language which helps in transmitting the data and receiving
from one device to another with the secured flow of data. In the given question networking devices
like switches, routers, firewalls are explained below with their roles in networking:
Switch:
Switch is also known as a networking device which is used to connect the multiple computers together at a
single time. Roles in a network are:

• Sent data to only those who were connected to the switch and also sent individually.
• The port of router is only two to three so switch helps to expand the port and share the network
through it.
• It is used to connect nodes phones printer and so on whereas at my collage the IT department uses the
switch to connect the student on their network.
Router:
Router is a medium of providing the internet which is provided by Internet service provider based on Ip
addresses. Roles of Router in Network are as listed below:

• It helps to Route the data through Various network such as teachers network to the internet
• IP addresses is assigned to the network through the use of DHCP.
• For example, Collage Wi-Fi router connect multiple devices of student in internet.

Firewalls:

• Firewall is the network security device which is either hardware or software based which controls all
the incoming and outgoing traffic it follows three rules i.e. Accept, Reject and Drop where Accept
allows all the traffic whereas reject block all the traffic with reply of an unreachable errors and in Drop
it blocks all the traffic without any reply.
Roles of Firewalls in Network are:

• Allow to prevent the Unwanted traffic in a network


• It helps to protect against the hacker and other viruses.
• It can be both hardware and software based
• For example, my laptop firewalls protect my data safe because it protects my files against cyberattack.

In conclusion, Switches, router and firewalls they are most important in network hence they have their own
task and their own functionality which is the backbone of Network.

8
2. Describe common network protocols, such as TCP, UDP, ICMP, ARP, HTTP, HTTPS, FTP, SNMP, and DHCP,
and their roles in data transmission and network management.

→ Protocol Is also a kind of language for a device used to communicate over a network.

Each protocol has their own specific job likewise some have sending, either have receiving and have
securing connection and so on. Some of the major Protocol mention in a question were discuss below:
TCP (Transmission Control Protocol):

• TCP is Specially used in Web browsing, emails, File transferring etc.


• The main role of TCP is it is Userfriendly reliable and Free of error transmission between devices.

UDP (User Diagram Protocol):

• The role is very risky on this protocol because Data will be sent without waiting for the
confirmation so the Data will get loss.
• The best example of UDP is watching the live stream of PUBG mobile and when your network
become weak than some of the clip will be lost.
ICMP (Internet Control Message Protocol):

• The main role of ICMP is used for diagnosing network issues.


• Commonly used for checking the ping of the network and other testing tools.

ARP (Address Resolution Protocol):

• This Protocol Ensure the address of Ip address to the MAC Address for communicating through LAN.
• It is only used for Local network communication.

HTTP (Hypertext Transfer protocol):

• The main role of http is to transfer the data between the browser and server.
• It is commonly used in the website, web application etc.

HTTPS (Secure Hypertext Transfer protocol):

• This is nether like HTTP because it enables more secured and encrypt the data and protect from
cyberthreats.
• Commonly used in Online banking and for changing the security lock of any social media.

FTP (File Transfer Protocol):

• The main role is to transfer the files and document over the network to network.
• It is mostly used in website hosting and sharing the file from one node to another.

DHCP (Dynamic Host Configuration Protocol):

• The main role in network is that it assigned the automatic Ip addresses in a network.
• It is mainly used in personal Wi-Fi, Home Wi-Fi etc.

Overall, in a nutshell each protocol works efficiently for their efficient work and without protocol the network
is not being function.

9
Task 4: Network Security and Configuration
1. Identify and describe at least three common cybersecurity threats that networks face today. What measures
can be taken to mitigate these threats?

Common Cybersecurity Threats and Mitigation Measures

1. Phishing – Tricking Users into Revealing Information


What is Phishing?

Phishing is a cyberattack where attackers impersonate legitimate organizations or individuals to deceive users
into providing sensitive information, such as login credentials, credit card details, or personal data. This is
usually done through fraudulent emails, messages, or fake websites.

Mitigation Measures:

• Verify Senders: Always check the sender's email address and look for signs of fraud.
• Avoid Clicking Suspicious Links: Hover over links to preview the URL before clicking.
• Enable Multi-Factor Authentication (MFA): Adds an extra layer of security even if login credentials are
compromised.
• Use Anti-Phishing Software: Modern web browsers and email providers offer phishing protection
features.
• Employee Training: Educate users on identifying phishing attempts and reporting suspicious activities.
2. Malware – Harmful Software That Infects Systems
What is Malware?
Malware is malicious software, including viruses, worms, ransomware, and spyware, designed to steal,
damage, or lock data. Attackers use malware to gain unauthorized access to systems and exploit
vulnerabilities.
Mitigation Measures:

• Install and Update Antivirus Software: Regularly update security software to detect and remove
malware.
• Keep Operating Systems and Applications Updated: Security patches help close vulnerabilities.
• Avoid Downloading Unknown Files: Only install software from trusted sources.
• Use Firewalls: Network firewalls can block suspicious traffic and unauthorized access.
• Regular Backups: Keep backup copies of critical data to recover from ransomware attacks.
3. DDoS Attacks – Disrupting Network Services

What is a DDoS Attack?


A Distributed Denial-of-Service (DDoS) attack occurs when multiple compromised devices flood a network,
server, or website with excessive traffic, making it unavailable to legitimate users.
Mitigation Measures:
Use DDoS Protection Services: Cloud-based solutions can detect and mitigate attacks in real-time.

Monitor Network Traffic: Unusual spikes in traffic can indicate an impending attack.

10
Configure Firewalls and Load Balancers: Helps filter out malicious traffic and distribute network load efficiently.

Implement Rate Limiting: Restricts the number of requests from a single source to prevent excessive traffic.
Conclusion
Cybersecurity threats continue to evolve, posing significant risks to individuals and organizations.
Implementing robust security measures such as employee awareness, security software, network monitoring,
and data backups can help mitigate these risks. A proactive approach to cybersecurity ensures that sensitive
data and critical systems remain protected against potential attacks.

2. You are tasked with configuring a new Cisco switch for a small office network. The switch will connect 20
workstations and needs to be configured securely.

Configuring a Cisco Switch for a Small Office Network


1. Initial Setup
Connecting to the Switch
Connect a PC to the switch using a console cable.
Use terminal software such as PuTTY to access the switch CLI.
Power on the switch and establish a console session.
2. Basic Configuration
Assigning a Hostname
Switch> enable
Switch# configure terminal
Switch(config)# hostname OfficeSwitch

Securing Access
Set a privileged EXEC mode password:
OfficeSwitch(config)# enable secret StrongPassword123

Configure console access:


OfficeSwitch(config)# line console 0
OfficeSwitch(config-line)# password ConsolePass
OfficeSwitch(config-line)# login
OfficeSwitch(config-line)# exit

Configure virtual terminal (VTY) access:


OfficeSwitch(config)# line vty 0 4
OfficeSwitch(config-line)# password VTYPass
OfficeSwitch(config-line)# login
11
OfficeSwitch(config-line)# exit

3. Configuring Network Settings


Assigning a Management IP Address
OfficeSwitch(config)# interface vlan 1
OfficeSwitch(config-if)# ip address 192.168.1.2 255.255.255.0
OfficeSwitch(config-if)# no shutdown
OfficeSwitch(config-if)# exit

Setting Default Gateway


OfficeSwitch(config)# ip default-gateway 192.168.1.1

4. Enabling Security Features


Disabling Unused Ports
OfficeSwitch(config)# interface range fastEthernet 0/10-24
OfficeSwitch(config-if-range)# shutdown
OfficeSwitch(config-if-range)# exit

Enabling Port Security


OfficeSwitch(config)# interface fastEthernet 0/1
OfficeSwitch(config-if)# switchport mode access
OfficeSwitch(config-if)# switchport port-security
OfficeSwitch(config-if)# switchport port-security maximum 2
OfficeSwitch(config-if)# switchport port-security violation restrict
OfficeSwitch(config-if)# switchport port-security mac-address sticky
OfficeSwitch(config-if)# exit

5. Saving and Verifying Configuration


Save Configuration
OfficeSwitch# write memory

Verify Configuration
OfficeSwitch# show running-config
OfficeSwitch# show ip interface brief

6. Conclusion
The Cisco switch has been securely configured for a small office network with 20 workstations. The
configuration includes security measures such as password protection, port security, and unused port
shutdowns. Regular monitoring and maintenance should be performed to ensure continued security and
efficiency.

12
13
|

Conclusion

Computer networks play a crucial role in modern communication, enabling seamless data exchange between devices.
Understanding key concepts such as the OSI and TCP/IP models, network devices, data communication processes,
and security measures is essential for building efficient and secure networks. Different transmission media, including
copper cables, fiber optics, and wireless communication, offer unique advantages based on network requirements.

Additionally, network protocols like TCP, UDP, HTTP, and DHCP facilitate structured communication, while
cybersecurity threats such as phishing, malware, and DDoS attacks highlight the importance of implementing strong
security practices. Proper configuration of network devices, such as Cisco switches, enhances both performance and
security, ensuring smooth and reliable connectivity.

By mastering these fundamental networking principles and security strategies, individuals and organizations can
optimize their network infrastructure, prevent potential cyber threats, and maintain efficient digital communication.

2
References

References
1. GeeksforGeeks. (n.d.). Computer Networks - Basics, Models, and Security. Retrieved from
https://www.geeksforgeeks.org
2. TutorChase. (n.d.). Networking Fundamentals and Security. Retrieved from https://www.tutorchase.com
3. Cisco Networking Academy https://www.netacad.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy