Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview This assignment has three major aims: · To help students gain good understanding of all ITECH1102...

1 answer below »
Content Analysis Assignment
ITECH1102 Networking and Security
Content Analysis Assignment
Overview
This assignment has three major aims:
· To help students gain good understanding of all ITECH1102 theoretical and practical material.
· To encourage students to use content analysis summaries to prepare for tests, examinations and to help their understanding of theoretical concepts.
· To encourage students to conduct independent investigation into networking related topics from books, the Internet and through practical investigation.
Engagement with this assignment should help students to prepare for the laboratory test (10%) in week 7, the theory test (0%) in week 8 and the end of semester examination (60%).
Timelines and Expectations
Students are required to analyse three topics based on students’ surname from the weekly lecture material of topics 1 to 8 and create concise content analysis summaries of the theoretical concepts contained in the course lecture slides. The content analysis for each topic should not exceed approximately five (5) A4 sides of paper if that topics content were printed.
Where the lab content or information contained in technical articles from the Internet or books helps to fully describe the lecture slide content, discussion of such theoretical articles or discussion of the lab material should be included in the content analysis.
Suggestions as to possible inclusions in your content analysis will appear in weekly Work Plan documents on Moodle.
The ultimate aim of this assessment task is to help ITECH1102 students to fully comprehend the course material and hence help them to pass tests and the examination.
By the start of week 10 all students should have completed their content analysis for three topics based on the surname.
Learning Outcomes Assessed
The following course learning outcomes are assessed by completing this assessment:
· K1. Describe and explain the role and function of network connectivity in cu
ent computing.
· K2. Describe and explain the principles of communication in networks.
· K3. Describe the role and functionality of hardware and software entities that contribute to network
communications.
· K4. Describe and explain the protocols and interactions that implement network communications.
· K6. Describe fundamental aspects of cloud computing.
· A1. Apply networking architecture knowledge to analyze the networking needs for business.
Assessment Details
At the start of week 10 details will be available in the assessment section of Moodle as to the specific topics each student must submit.
All work submitted must be authored by the student submitting the work or where material from other sources is included it must be referenced using APA referencing.
Students found to have plagiarised will be dealt with according to university regulations.
The specific topics depends on your surname:
· Surnames starting with A - G     Topics 4,5 & 6
· Surnames starting with H - Z     Topics 4,6 & 8
Submission
Students are required to submit a Microsoft word or pdf file to Moodle by 11.55pm on Sunday 27th Jan 2019.
Marking and Marking Guidelines
Marks will be available in Moodle and in FDLMarks by the end of week 12 of semester.
Students required working on three topics marking guide for each topic is as follows:
    Content precisely presented based on references
    10 Marks
    Presentation (Layout, no grammatical e
ors, reads well, etc.)
    3 Marks
    Cited references
    2 Marks
    Total marks for each topic
    15 Marks
    Total marks for three topics
    45 Marks
    Total mark for this assignment
    15 Marks
    CRICOS Provider No. 00103D
    Content Analysis Assignment.docx
    Page 1 of 2
    CRICOS Provider No. 00103D
    Content Analysis Assignment.docx
    Page 2 of 2

PowerPoint Presentation
ITECH1102 Networking and Security
Topic 4 – The Data Link Layer (Layer 2) [Network Interface]
1
ITECH1102 Networking & Security
2
Last week
Last week we looked at:
The Application Laye
Application layer programs are able to interact by virtue of computer networks.
     Examples:
Web Browser (client application) can communicate with a Web Server (Server program)
FTP client (user application) downloading/uploading files from/to an FTP Server (Server program)
Email client accessing Email from an Email server.
Phone App accessing Domino’s Pizza online.
We saw many other categories of Client (user applications) communicating with other application layer programs, including:
BitTo
ent
NTP
POP & others.
2
ITECH1102 Networking & Security
3
Application to Application communications
Client Application
Transport
Network
Data Link
Physical
Server Application
Transport
Network
Data Link
Physical
Actual communications proceeds
down through each layer, across the network then up through each server layer.
3
ITECH1102 Networking & Security
4
Last week (continued)
Last week we also saw:
There are many Application protocols used for data exchange
Examples:
HTTP is used for web traffic
FTP for FTP file transfers
POP for access to email
Protocols define the rules by which communications can take place, for example:
How data is formatted
Who speaks first, then next etc. etc.
4
ITECH1102 Networking & Security
5
Visualization of client HTTP request from Firefox.
Application
Transport
Network
Data Link
User Program
(Firefox)
Physical
Step 1:
User opens
owser and enters URL to a web site.
HTTP request is created at the Application layer.
Step 2:
HTTP request is passed to the Transport layer.
Transport layer information (TCP) is added.
Step 3:
The process continues.
IP information is added at the Network layer.
Step 4:
Ethernet information is added at the Data Link Layer.
Then the resulting frame that is sent to the network media.
The reverse process occurs at the server end.
Headers are removed at each layer as the data moves up through the network layers to the application layer.
This is how layers on the source device communicates with its peer layer on the destination device.
The process of adding headers at each Layer is called encapsulation.
Each layer encapsulates the Protocol Data Unit (PDU) from the previous layer with a header.
Headers pass Addressing and other information between peer layers
5
ITECH1102 Networking & Security
6
This week – Overview of content
The Data Link:
The role of the Data Link
Data Link in the Internet Model of networking
The two parts of the Data Link
The role of the Network Interface Card (NIC)
Identification of NIC’s (MAC addresses)
Network cards are smart devices
Media Access Methods
Local Address Resolution (using ARP)
6
ITECH1102 Networking & Security
7
Role of the Data Link Laye
The Data Layer only communicates with devices on its local network.
Example:
Another PC on your home network
A Printer on your local network
The Router on your local network
This is often described as Hop to Hop communication.
Question.
Wide Area Networks often involve significant distances through fi
e optic or satellite connections. Would communication between two satellite interfaces be considered local networking ?
Yes!!!
Why? Because the two interfaces are on the same Network. This applies to other Wide area network links for instance between Melbourne & Sydney.
The Data Link is only responsible for communication between two machines that are connected to the same network. This network could be your home WiFi network, it could be a section of the university network (for instance all computers in labs 1 & 2), or it could be two machines that are connected at each end of a long fi
e optic or satellite link.
Hence the idea of local when discussing networks at the data link has more to do with the connection to a single network than it does to distance. Two computers connected at each end of a 1 metre cable are considered local as is two routers connected at each end of a geostationary satellite link.
7
ITECH1102 Networking & Security
8
Data Link Layer in the Internet Model
The Internet Model
Application (Layer 5)
Transport (Layer 4)
Internet (Network) (Layer 3)
Network Interface (Data Link) (Layer 2)
Physical (Layer 1)
Data from Application programs passes down through the Transport and Internet layers.
The Data Link Layer is the Interface between the Network layer and the Physical network (Cable, Fi
e, WiFi, Satellite etc.)
Data from the Network media passes up through the network layers to the Application on the receiving host
8
ITECH1102 Networking & Security
9
The two parts of the Data Link layer
Logical Link Layer (LLC)
Media Access Control (MAC)
The LLC is the interface with the upper layer.
It allows IPv4, IPv6, IPX and other protocol transactions concu
ently. (More on this next week)
The Media Access Control layer sends traffic to the network media and receives traffic from the
network media.
This is the Data Link Laye
9
ITECH1102 Networking & Security
10
The role of the Network Interface Card (NIC)
The Network Interface Card is the connection to the Network.
Notebooks and other devices often have multiple connections:
Ethernet connection (via blue Cat 5 or Cat 6 cable)
WiFi connection
Bluetooth connection
Network interfaces are also built into Printers, Network scanners Routers and other network devices.
Routers have one NIC connected to the local network and one or more connected to other networks.
10
ITECH1102 Networking & Security
11
Network Cards have a unique MAC (Media Access Control) address.
All Network Interface cards have a unique 48 bit MAC address.
The MAC address is built into each interface by the manufacturer.
All Data Link data exchanges use the source and destination MAC addresses for any communication.
MAC addresses consist of two parts:
OUI (Organisation unique Identifier) [ first 24 bits ]
Unique 24 bit number [ last 24 bits ]
Hence MAC address are globally unique!
11
ITECH1102 Networking & Security
12
How to determine your MAC address
On a Windows system running the command ipconfig /all will display network setting such as:
IPv4 address
IPv6 address
MAC address (Also called the Physical Address)
12
ITECH1102 Networking & Security
13
Determining the MAC address on a Linux System
The Linux command to determine network settings is ifconfig
The output displays:
MAC address (HWaddr)
IPv4 address (inet addr)
IPv6 address inet6 add
13
ITECH1102 Networking & Security
14
Network cards (NICs) are smart devices
Network cards filter traffic
Networks cards inspect every packet they see on the local network.
Packets that are for other machines are discarded.
Packets for the host device (PC, Router etc) are delivered to the host device.
(To do this the NIC Inte
upts the host and passes the network packet to it.)
Benefits:
    The host machine only deals with important network traffic, not packets that other devices must process. Hence the filtering of traffic by the NIC reduces processing by the host machine and hence does not impede host performance.
14
ITECH1102 Networking & Security
15
The NIC also checks for e
ors
How the Cyclic Redundancy Check (CRC) works
Prior to sending a network packet a NIC performs a 32 bit CRC calculation that characterises the contents of the network packet.
The 32 bit CRC is appended to the end of the packet then sent to the destination.
When the packet a
ives at the destination its NIC does the same CRC calculation on the received data.
If the two CRC values are different then the destination knows the packet is co
upt and so discards it.
This type of e
or checking is common in networking.
15
ITECH1102 Networking & Security
16
Ethernet Frame Format
Answered Same Day Jan 24, 2021 ITECH1102

Solution

Soumi answered on Jan 25 2021
159 Votes
Running Head: CONTENT ANALYSIS ASSIGNMENT    1
CONTENT ANALYSIS ASSIGNMENT         14
ITECH1102 NETWORKING AND SECURITY
CONTENT ANALYSIS ASSIGNMENT
Table of Contents
Topic 4 – The Data Link Layer (Layer 2) [Network Interface]    3
References for Topic 4    6
Topic 5 – The Internet (Network) layer    7
References for Topic 5    10
Topic 8 – Cloud Computing & Mobile    11
References for Topic 8    14
Topic 4 – The Data Link Layer (Layer 2) [Network Interface]
    The Application Layer of the networking architecture facilitates the interaction of end users with the services with the help of the access of network. There are multiple services by which the end user gets interacted. Users could remotely log in from host to client computer and vice versa with the help of Hyper Text Transfer Protocol (HTTP / http). Post Office Protocol (POP) enables user to send and receive emails from any email server. File Transfer Protocol (FTP) is user to download or upload files from any FTP server (Gai, Qiu, Tao & Zhu, 2016).
For example, the user wants to access a web page using Firefox. Firstly, user would enter the URL in the
owser. Here, the Application Layer initiated the HTTP request. Secondly, the Transport Layer handles the HTTP request. Thirdly, the host and the server address are monitored by the Network Layer. Lastly, the Data Link layer divides the information in frames to be sent to the desired address. Users get to see the desired the web page when the reverse process takes place at the server end.
The provided topic on data link layer presents a clear idea on the networking architecture. As mentioned by Al-Jemeli and Hussin (2015), Data Link layer facilitates the transmitting and receiving of packets. The layer also facilitates LLC processing and MAC addressing. However, as argued by Haleplidis et al. (2015), this layer could be termed as Hop-to-Hop communication as it would only communicate with its local network. Data link layer acts as the interface for the Network and the Physical Layer.
This layer comprises of two parts-
a) Logical Layer Link (LLC): LLC is responsible for the transmission of data between computers on a network.
) Media Access Control (MAC): It facilitates the instruction for unique addressing and access control from node to node.
The Data Link layer is implemented in software and hardware with the help of Network Interface Card (NIC). NIC facilitates the connection of the computer or printer to the internet. Every NIC have a unique 48-bit MAC address by the manufacturer. Here, the Data Link layer identifies the host and the client address to exchange data for communication. MAC address could be checked on the computer by running the command ipconfig/all for Windows system and ifconfig for Linux system. As mentioned by Shang et al, (2016), NIC performs Cyclic Redundancy Check (CRC), which helps in reducing the e
or in transmission of the data. To identify the e
oneous, each frame is attached by a 32-bit Frame Check Sequence. Each frame contains packets. Thereby, to identify individual packets, the destination and source MAC addresses needs to be identified. The packets could be traced by the software Wireshark for administrating the network.
As stated by Bello, Zeadally and Badra (2017), MAC sub layer is manages the addressing and channel control between to node in a network. For example, network on a Wi-Fi, which is a shared media, categorised as controlled access and contention based access. Control access is basically transmission done only at a time while in contention based media access, collision occurs if transmission is done simultaneously. Here, the protocols being followed are CSMA/CD and CSMA/CA.
CSMA/CD protocol
Enunciated by Aijaz, Dohler, Aghvami, Friderikos and Frodigh (2017), this protocol is used by Ethernet that connect devices, which are in a network. It works in three steps to detect the collision. Firstly, it is done by ca
ier sense followed by multiple access of devices in the same network. Lastly, detect the collision. However, if a collision occurs, then both devices would wait for some instance for retransmission.
CSMA/CA protocol-
In this protocol, the network traffic is increased as the signal is being sent to the given network before sending the real data. This is done to look for any collision to take place (if any) and inform other devices to stop transmitting for some instance.
    In all this transmission and reception of the date, the address of either devices has to be identified at first. Address Resolution Protocol (ARP) helps to identify MAC address of the devices connected on a network. As discussed by Cziva, Jouet, Stapleton, Tso, and Pezaros (2016), ARP tables are created by Linux and Windows system, which comprises of MAC and IP addresses of the devices communicated. The NIC looks in the ARP table for the MAC and IP address of the device that needs to be connected if not found then if would
oadcast to the network for the new device to record it in the table.
References for Topic 4
Aijaz, A., Dohler, M., Aghvami, A. H., Friderikos, V., & Frodigh, M. (2017). Realizing the tactile internet: Haptic communications over next...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here