FULL REPORT

Project Scenario

1.0          Project Scenario

This scenario of this project is referring to Figure 1. Figure 1 shows the logical network flow from a home network to UTeM facilities. In this figure, a UTeM’s lecture is trying to access the ULearn system located in the UTeM network facilities. The lecturer is using his modem to connect to the public network before able to connect to the UTeM facilities. From the UTeM network, the data then was forwarded to IT Center where the ULearn System server is located.
Figure 1: Logical Network Flow

In term of private addressing scheme, UTeM network is using Class C private addressing scheme which is 192.168.0.0/16. In UTeM facilities, there are 30 different departments. Hence, the network address was segregated by using subnetting concept. Each department is given their network address. In this case, IT Center is being assigned as the 11th available subnet as their network address. From this network address, the ULearn System server is assigned as the 3rd available address. Use this information to identify the address of the ULearn System server. 



OSI Layer Model


To start explaining the OSI layer model we must show the layers and their numbers.
  1. Physical layer (first layer)
  2. Data link layer (second layer)
  3. Network layer (third layer)
  4. Transport layer (fourth layer)
  5. Session layer (fifth layer)
  6. Presentation layer (sixth layer)
  7. Application layer (seventh layer)

A-Sender computer
"the proccess at this point is called encapsulation" 

Application layer (Layer 7): - 

          This layer is the closest to the end user and it provides services to the user and decides which protocol we should follow Let us say that the lecturer will send an email through the app and 
This layer will decide to use SMTP as a protocol (simple mail transfer protocol)
And data will go through firewall at this layer.
PDU = data


1.1 (application layer for sender)


Presentation layer (Layer 6)
This layer formats data in a way that the receiving device will understand (this layer is responsible for the syntax and semantics that we are going to exchange, In our case its most probably going to be ASCII (American Standard Code for Information Interchange) and this layer can add encryption to sensitive data , and since we are sending an email we will encrypt using (AES)
PDU = data



1.2 (presentation layer for sender)

Session layer (Layer 5): - 
A session with the receiving UTEM server is started at this layer which will allow both sides to enter a dialog.
PDU = data




1.3 (session layer for sender)

Transport layer (Layer 4): -
At this layer we decide to use TCP or UDP and for this case its going to be TCP to make sure every packet gets delivered also the source and distention ports are added to the data
PDU = segment


1.4 (Transport layer for sender)

Network layer (Layer 3): - 
The IP address of the UTEM server (logical address) is added as the destination 
And the source IP address is also added to the data 
The data will go through the router at this layer.
PDU = packet



1.5 (network layer for sender)

Data link layer (Layer 2): -
The mac address of the router and the source mac address of the host are added to the data 
Data will go through switches at this layer
PDU = frame


1.6 (data link layer for sender)

Physical layer (Layer 1): -
The data is sent on the network using ethernet 
PDU = Bits



1.7 (physical layer for sender)

B-Receiving server
"the process at this point is called decapsulation"

⦁  Physical layer (Layer 1): -
The data is received from the network using ethernet 
PDU = Bits




2.1 (physical layer for receiver)

Data link layer (Layer 2): -
The mac address of the router and the source mac address of the host are removed from the data
PDU = frame




2.2 (data link layer for receiver)

Network layer (Layer 3): -
The IP address of the UTEM server is removed as will as the source IP address
PDU = packet






2.3 (network layer for receiver)

Transport layer (Layer 4): -
this layer recognizes if UDP OR TCP IS Used and gather the packets into segments accordingly.
PDU = segment




2.4 (transport layer for receiver)

Session layer (Layer 5): -
The session is closed at this layer and no more dialog is allowed between both sides, if further dialog is needed there must be another request done to open a new dialog session.
PDU = data





2.5 (session layer for receiver)

Presentation layer (Layer 6): -
This layer undoes the changes done at the presentation layer of the lecturer computer and decrypt the data using the same encryption method done at the sending side.
PDU = data








2.6 (presentation layer for receiver)

Application layer (Layer 7): -
Reads the data and waits for a request to process, read, or send the data to another destination.
Data will pass through firewall at this layer
PDU = data







2.7 (Application layer for receiver)

The flow of Data


Based on the scenario given, the data transmission between UTeM Lecture who using the internet (Public IP) and UTeM IT Centre where the network using Class C Private to communicate on their LAN Network. There is some technical method involved during this data transmission between public and private IP addresses. Most of the public IP are created by a unique IP Address which will provide by the ISP to communicate on Internet. On this scenario, UTeM Lecture and the main router in UTeM Network contains a unique Public IP address to communicate on internet, whereas the private IP address which assigned on the UTeM Departments and their hosts will communicate Internet using the main router which able to access Internet by requesting transmission from the router.  The reason why Private IP can’t access internet because those Private IP Address are not unique on the Internet, there are some high probability host which having the same IP Address. Based on that issues, the problem may occur is, if a user make request on www.google.com directly to the internet using private IP, then the problem will occur while receive the request from the Internet, where the host which as same IP Address globally will receive the request will made. So, there will be happen some data collision. That is the main why we don’t use Private directly to access Internet. Now going to explain this scenario using OSI Layer Model.

This OSI Layer Model explanation will start from UTeM Lecture which using Home Network (Public IP Address) to Ulearn System Server on their private network (Private IP Address). Assume that the UTeM Lecture is trying to upload a word.docx file on UTeM Ulearn platform. Let’s start from the Application Layer, on here the file which UTeM Lecture willing to upload into Ulearn platform will be providing a service for the data travel such as SMTP, POP3, and etc... Is this case a file transfer protocol (FTP) is be assigned to make the data to travel. Next, on the Presentation Layer, the word.docx will be translate into binary form, then the file compression begun for the purpose of reduces the size of the file. Example is a 5mb file will be compress into 2mb, this technique able to send the file even faster. Lastly, it’s will encrypt the file from the sender for the purpose of data security using SSL or other security protocol. After that, the data will pass to session layer to managing communicate session without any distortion between communicating system. The packet data unit for this three process are Data, on the next the data will be breakdown those data into segments. On this transport layer where the segmentation start. Each the segments contain port number which are source and destination number, and the sequence number. The aim port number is to make the data reach on the correct path and sequence number also the rearrange the segments which misplace. Besides that, error control is one major part on this layer to make whether the segment reach or not, if the segments didn’t reach, then it’s will re-send the segments again. There are two protocol involved on this process which is TCP and UDP. In our case TCP will be used to transfer the word.docx file because TCP will make sure every data packet gets delivered and receive message whether the data has been reach or not. Why we didn’t implement UDP because most of UDP are used video streaming and it’s also won’t reply the message whether the data has been reach or not. Next is on the network layer, this the interesting parts in our data travel based on the scenario due to the communicate between public IP address and private IP address. This layer is responsible for the delivery of packets (PDU) from the original source(Sender) to the final destination (Receiver). The process involved in this layer are logical addressing where every segments will be assign with the destination of IPv4 and routing is where managing the packet to be deliver based on the IP address and subnet mask. On this case, the routing will different due to the public to private IP address where the sender (Public IP address) will be transmit the UTeM main router (Public IP address), then another routing happens inside the UTeM Private IP Address to transmit the data to the host which requested.
Figure 1 : Routing

Next is data link layer, on this layer the MAC address of the hardware is added on the packet and form the frame. The purpose of MAC is for monitoring data packets from one Network Interface Card (NIC) to another across a shared channel (Hop-to-Hop Delivery). Finally, physical layer is responsible for transmitting individual bits form one to the next. Physical layer is also convert the binary into a signal to transmit on a media. In this case, the media used are the wireless and wired media.

            Now the hop-hop delivery process occur from the UTeM Lecturer home modem until the UTeM main router. This process only occurs from layer 1 until layer 3, if the destination source is valid, then it’s will proceed layer 4 until layer 7.
Figure 2 : Hop - to Hop Delivery

Let’s start from physical to application layer to decrypt the word.docx file which the UTeM Lecturer uploaded. Firstly, on the physical layer where the data receive from the wired media, then will proceed to next layer. Secondly on data link layer, where MAC address of the source and destination are removed which is frame becoming a packet. On the network layer, the logical address will be removed if it’s found the valid destination (packet to segments). If destination invalid, then hop-to-hop delivery to next node. On the transport layer, data (segment) will check on the sequence addressing whether data misplace during transmission and port addressing is to identify the whether the is reached or not using error control technique. On the session layer, the session is closed at this layer and no more dialog is allowed between both sides, of further dialog is needed there must be another request done to open a new dialog session. On the presentation layer, the data will translate on original form and decrypt the data using the same encryption method done at the sending side. Finally, on the application layer will the permission to read, write and view the word.docx which send by the UTeM Lecturer from the public network.
Figure 3 : Overall Process in OSI Model Layer Diagram

Network Components
The possible network components involve throughout the communicate are the router, modem, access point and switch. Router will be on this network to public network and also same networks around UTeM Department. Modem is used by the lecturer which using the Ulearn system from their home. Switch is to makes all the hosts to accessible into the UTeM Network. Access Point for guest or student who want to use UTeM Network.


       

IP Address Calculation

The IP address that had been given for UTeM is 192.168.0.0/16 and we need to divide into 30 department. As for the netmask for this IP address is /16.


/ 16 = 11111111.11111111.00000000.00000000


To find the value of available IP address in the /16 by calculate the value of zero and make it as the value of power for based 2.


  216 = 65,536
  65,536 – 2 (for gateway and broadcast IP) = 65,534


The way we divide the available IP according to the department by finding the suitable subnetting through netmask:-
     

65.534/30 = 2184.48


So approximately 2184 IP are available for every department. Then we need to find the value of subnet that contain more than 2000 available IP address but not more than 3000, and have more than 30 subnet suitable for all department.

 

211 = 2048
          = 11111111.11111111.11111000.00000000
          = /21


Then, we have to find the 11th subnet for the IT center.


1-      192.168.0.0 – 192.168.7.255
2-      192.168.8.0 – 192.168.15.255
3-      192.168.16.0 – 192.168.23.255
4-      192.168.24.0 – 192.168.31.255
5-      192.168.32.0 – 192.168.39.255
6-      192.168.40.0 – 192.168.47.255
7-      192.168.48.0 – 192.168.55.255
8-      192.168.56.0 – 192.168.63.255
9-      192.168.64.0 – 192.168.71.255
10-  192.168.72.0 – 192.168.79.255
11-  192.168.80.0 – 192.168.87.255


From the IP address that we got, we need to find the 3rd IP address for the Ulearn System server. As we all know two IP address that we need to reserve as for the first one is for the gateway IP while for the other one is for the broadcast IP.


     Network = 192.168.80.0/21
     Broadcast = 192.168.87.255
     Gateway = 192.168.80.1
     3rd available IP address is = 192.168.80.4


Finally, we will assign the IP address according to the calculation above.

TCP/IP Configuration

To enable TCP/IP setting manually

1) Select start and type Control Panel at search engine


2) After Control Panel been displayed, there are many option such as system and security, programs, user accounts and family safety and others but you need to click on Network and Internet. 


3) And then choose a Network and Sharing Center. After that, you will found on the left side there is a Change Adapter option, click on it



4) The fourth step is you need to choose Local Area Network and click on it and choose properties 




5) The next step is the Local Area Connection Properties will be displayed and you need to scroll down and click on Internet Protocol Version 4 (TCP/IPv4)


6) After that you have to click at 'use the following ip address' for you to inside your ip address, subnet mask and also default gateway.  Then click okay





7) Finish 







Comments

Popular Posts