Network Engineering Report 1
Network Engineering Report 1
NETWORK ENGINEERING 1B
PoE Part 1
Nivad Ramdass
By submitting this assignment, I acknowledge that I have read and understood all the rules as
per the terms in the registration contract, in particular the assignment and assessment rules
in The IIE Assessment Strategy and Policy (IE009), the intellectual integrity and plagiarism
rules in the Intellectual Integrity and Property Rights Policy (IE023), as well as any rules
and regulations published in the student portal.
Plagiarism Statements
A. Imagine a simple network system that tracks a client's location in real-time. The system
could be implemented via software on the client's cellphone. The location will be stored on
a centralized server. The network traffic in this system will only be from the client to the
server and data flow will be across multiple layers that follow standard protocols.
B. The example involves a variety of protocols at different layers (e.g., HTTP/HTTPS at the
application layer, TCP/IP at the transport and network layers, Wi-Fi/Cellular at the data link
layer). These protocols form a protocol stack, enabling communication between the
client's cellphone and the centralized server. The system manages the transmission of
data packets across the network. The client's location data is encapsulated into packets
by the protocol stack and transmitted to the server. The server then processes these
packets and potentially sends responses back to the client. The network system includes
memory for storing data. The centralized server, for instance, must have memory to store
the real-time location data received from clients. Additionally, the client’s device itself
temporarily stores data before transmission.
Both the client device and the centralized server require processing power to handle
protocol processing. The client’s cellphone must process GPS data, manage TCP
connections, and handle encryption/decryption for secure communication. The server, on
the other hand, processes incoming location data, updates its database, and manages
network protocols to communicate with multiple clients.
The client’s cellphone and the centralized server are equipped with network interfaces.
The cellphone has interfaces for Wi-Fi and cellular networks, allowing it to attach to the
internet. The server also has network interfaces (e.g., Ethernet or wireless) to connect to
the broader network infrastructure.
Q1.2
A. Network systems utilize a protocol stack, the protocol will dictate how the systems
functional requirements will be met. The requirement for the related network protocols will
be fast data transfer for accurately tracking in real time, a low latency for reduced packet
loss and low computing requirements to save the clients battery power. Standard
protocols such as HTTPS at the application layer, TCP at the transport layer, IPv6 at the
network layer, cellular 4G/5G at the data link layer and the user’s GPS (inside the cellular
phone) at the physical layer.
B. The number of clients is a known estimate and thus the network traffic is determined by
the number of users and the interval of data transfer. The performance requirements of the
system are based on the network traffic of the system. The traffic is required to move from
the client’s device to the centralized server using a protocol stack and is limited by the
performance requirements. The network traffic must be transferred using a consistent
data format confined to the communication protocols.
C. The embedded system is the client’s cellphone and is used for the processing of raw
data and is responsible for the initial stages of data handling. It captures GPS coordinates,
processes them into a format suitable for transmission, and manages communication with
the centralized server. This involves handling GPS data acquisition, encoding the data into
packets, and managing the protocols for secure and efficient transmission. The
cellphone’s embedded system also plays a crucial role in maintaining the connection with
the server, ensuring data is sent at the required intervals and adapting to changes in
network conditions. By performing these tasks, the cellphone ensures that the real-time
location tracking system operates smoothly and efficiently, contributing to the overall
performance and accuracy of the network system.
Q1.3
Protocols such as HTTPS, TCP, IPv6, and cellular 4G/5G operate at different layers of the
protocol stack and are essential for meeting the functional requirements of the network
system. HTTPS ensures secure data transfer, TCP guarantees reliable delivery, IPv6
provides addressing and routing capabilities, and cellular protocols support wireless
communication. The choice of these protocols directly impacts the system’s ability to
achieve fast data transfer, low latency, and minimal computing demands, which are
crucial for real-time location tracking and efficient operation.
Network Traffic refers to the amount of data transferred between clients and the server. It
is influenced by the number of clients and the frequency of data updates. The performance
requirements of the system, such as response time and throughput, are closely tied to the
volume and characteristics of network traffic. Understanding this relationship helps in
designing a network that can handle expected traffic loads while meeting performance
benchmarks. Proper management of traffic flow and efficient data handling are vital for
maintaining system performance and ensuring real-time capabilities.
Embedded Systems in this context are the client’s cellphones that handle GPS data
processing and communication tasks. The implementation requirements for these
systems involve managing resource constraints such as battery life, processing power,
and data storage. Embedded systems must be designed to efficiently process data and
communicate with the server while adhering to these constraints. The relationship
between embedded systems and implementation requirements is crucial for optimizing
performance and ensuring that the client’s device can support the network system’s
demands without excessive resource consumption.
Properly selecting and configuring protocols ensures that the system meets functional
requirements such as real-time data transfer, low latency, and minimal computing
demands. This alignment is crucial for achieving the desired performance and user
experience. By understanding how network traffic affects performance requirements,
designers can plan for scalability, load balancing, and efficient data handling. This ensures
that the network can accommodate varying traffic loads and maintain performance levels.
Recognizing the constraints and capabilities of embedded systems helps in designing
devices that are both powerful and energy-efficient. This leads to better overall system
performance and longer device operation times.
Activity 2
A. Introduction
The original internet architecture has several limitations namely; lack of security, poor
quality of service, limitations in scalability and limitations to support emerging paradigms.
As a result, there is a pressing need to explore alternative networking models and
technologies that can better support these emerging paradigms. Peer-to-peer (P2P)
networking, with its decentralized approach and inherent flexibility, presents a compelling
solution to some of these challenges.
Internet architecture refers to the fundamental design and structure that governs how data
is transmitted and managed across the global network (Serpanos & Wolf, 2011). At its core,
the client-server model is a key component of this architecture, where clients (such as web
browsers or applications) request resources or services from servers (which host and
provide these resources). The client-server interaction relies on protocols like HTTP or FTP
to facilitate communication between the two parties. Servers are typically centralized,
handling multiple client requests and managing data storage and processing. This model
supports scalability and resource sharing but can introduce limitations related to security,
scalability, and performance, especially as network demands and technologies evolve.
Peer-to-peer (P2P) networks integrate the functions of both client and server within each
peer node, allowing all participants to serve and access resources. Unlike the client-server
model, where a centralized server distributes information, P2P networks enable peers to
connect and share data directly with each other. This type of communication can be
implemented with current networking technology, requiring only modifications to the
application layer on the end systems (Serpanos & Wolf, 2011).
P2P networks are self-organizing, the network dynamically adjusts and reorganizes as
peers join and leave the network (Kanade, 2023). P2P networks utilize resource sharing,
direct communication, fault tolerance and redundancy.
In a P2P network, there is no central server that can be targeted for attacks. Each peer acts
as both a client and a server, which can distribute the risk and make the system more
resilient to single points of failure. Many P2P systems implement end-to-end encryption
directly within the protocol. This means that data is encrypted between the sender and
receiver, reducing the reliance on external security measures like firewalls or intrusion
detection systems.
In some P2P systems, peers can negotiate resources and bandwidth among themselves.
This dynamic allocation can help manage QoS better by adjusting based on current
network conditions and peer availability. By distributing data across multiple peers, P2P
networks can reduce the load on any single node, potentially mitigating issues of network
congestion and improving overall service quality.
P2P networks scale more effectively by leveraging the resources of all participating peers.
This distributed approach can handle many nodes without the same constraints faced by a
centralized system. While traditional IP version 4 (IPv4) addressing is limited, P2P networks
often use overlay networks and other mechanisms to handle addressing in a more scalable
way. Some P2P systems use unique identifiers or hashing techniques to manage node
identities without relying solely on IP addresses.
P2P networks are inherently better suited for content-centric paradigms because they can
distribute and cache content across multiple peers. This can lead to more efficient content
retrieval and distribution compared to traditional client-server models.
E. Conclusion
Overall, while P2P networking can address some of the shortcomings of the traditional
Internet architecture, it also introduces its own challenges, such as managing trust and
ensuring network reliability. The effectiveness of P2P networks in overcoming these
limitations depends on the specific implementation and the context in which they are
used.
Activity 3
Q3.1
Link Interface: Responsible for the physical connection to the network such as ethernet
cables or wireless signals. When you send an email, the Link Interface converts the data
into Ethernet frames, which are then transmitted over the network cables to reach the
router. It also manages collision detection and frame addressing to ensure data is
correctly sent and received.
Processing Element (PE): Handles tasks related to data transfer and protocol functions. It
ensures that data is correctly formatted for transmission and performs necessary protocol
operations. When your computer receives data from the network, the PE processes this
data to ensure it follows the TCP/IP protocol, checks for errors, and prepares the data to be
handed over to the computer’s operating system.
DMA Unit: The DMA unit allows data to be transferred directly between the network
adapter and the computer’s memory without involving the CPU, which speeds up data
transfer and reduces CPU load. During a large file download, the DMA unit transfers data
directly from the network interface to the computer’s memory, allowing the CPU to
perform other tasks while the download is in progress.
Memory: Memory is the data storage unit of the adapter. When a packet arrives at the
network adapter, it is stored in the memory until the PE can process it. If the packet is too
large for a single buffer, it is divided across multiple buffers and linked together in a logical
queue.
End System Interface: The interface between the adapter and the end system (i.e., the
computer). When your computer needs to send data to the network, the End System
Interface ensures that the data is correctly transferred from the computer’s memory to the
network adapter for transmission. And when receiving data, it transfers data from the
network adapter to the computer’s memory.
References
Serpanos, D., & Wolf, T. (2011). Architecture of Network Systems. Elsevier.
Kanade, V, (2023). What Is Peer-To-Peer? Meaning, Features, Pros, and Cons. Spiceworks.
Available at: https://www.spiceworks.com/tech/networking/articles/what-is-peer-to-
peer/#:~:text=P2P%20networks%20are%20decentralized%2C%20meaning,a%20central
%20point%20of%20control.