Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Consider the situation where a natural disaster has occurred in a remote area an

ID: 3891728 • Letter: C

Question

Consider the situation where a natural disaster has occurred in a remote area and there is a requirement to land aircraft carrying aid and supplies, at night, in an area outside air-traffic control and without any accurate information relating to airfield elevation or atmospheric conditions. There is no on-ground technology working that experimental, ruggedized devices that are self-powered, have a built-in GPS, WiFi and an RF transmitter; they can be dropped from the aircraft and transmit elevation and atmospheric information to the aircraft. They can also detect each other and, if the conditions are suitable, form a network with each other and exchange information. Describe, listing the networking architectures, layers and general components, the network path created from the moment a ruggedized device is activated on the ground to the moment the first GPS-information packet is received by the aircraft [4 marks] Describe any threats to resilience in this path and mitigation techniques to ensure maximum resilience for the least cost and least human interaction [8 marks] Describe the mechanisms that could be used to ensure that only authorised ruggedized devices connect to the WiFi network and that the WiFi network is not overloaded [4 marks]

Explanation / Answer

1] A network can be difined as an environment in which the different components are connected to each other. In short we can say that network architecture is the architecture saying or mentiioning how the components are connected to each other.

If we talk about the networking architectures, we have two types peer to peer and client server architecture. Baiscally if we want to select the proper network for particular scneario we need to know what the architecture specializes in. Lets describe the two archiectures Peer-to-Peer architecture is the one in which all the computers connected are treated as equal and all the work is equally divided among all the computers. There is a proper communication between all the computers through the help of proper software installled on all the machines. These types of network can specially be used for file sharing but it also has some problem that it doesnt have any centralized computer to control all the operations. Because in these network all computers are working independently, of the task given or alloted to them.

Client Sever architecture is the one that overcomes the drawback of peer-to peer architecture, because the name itself says, client server architecture where we have client and server both. The name itself signifies that clinet is the one who is requesting for the content and server is the one that gives the response to particular request. Altogether server is the place where all data is stored and also server is the one to respond to all the clinets, which means we have a computer that is responsible for controlling all the operations.

If we include the networks for particualr area we can also go for LAN(Local Area Network), MAN(Metropolitan Area Network), WAN(Wide area network). LAN connects a group of computers in samll area, MAN covers cities or towns and WAN covers relativel larger area for example Internet. WAN can also be considered as collection of LAN's.

Coming to the layers we have seven layers in an archiecture model and that are Physical, Datalink, Network, Transport, Session, Presentationa and Application layer. Every layer itself has its own function. Physical layer provides the hardware means which are responsible for sending and recieving the data or else we can say streaming. Datalink layer is used for frame synchronization and handling the errors in Physical layer.

Network layer is responsibe for addressing, routing or else forwarding. Tansport layer is responsible for sending the packets or frames from source to the destionation or end to end error recovery. Session layer is used for maintaining the coversations, exchanges between the two ends. Data presentation takes place in Presentation Layer, it may also include the encryption and decryption of data. Application layer supports end user processes for example file sharing, email, network software services.

2] Quality of Networking architectures depends upon trustworthiness and tolerance. The other factors that comes under these are dependability, security, performability, survivability, disruption tolerance, and traffic tolerance. There can be many threats to these factors for example a hacker can hack the system and gets an access to the message transmitted to avoid these we can use encrytption techniques. Also man can also steal the information, so to avoid these threat we can have only computers for performing any operation and saving the information. To avoid the interference of any other network or computer we can have firewalls. Or else we can also have different mitigation techniques that will avoid the interference from a radio transmitter. To make the least human interaction we can have only computers to handle all the task and make them fully automatic and multitasking.

3] To ensure that only the authorised devices are connected to the wifi network, we can used passwords for wifi or wireless connections. So only those users or devices that knows the proper password can get connected. Another way is we can give a name to the wifi or SSID(Sevice set identifier) to provide more security. We can change the settings as and when required and also we can list the different devices that can be connected to the wifi along with the different authorisation rights.