Assessment item 2 - Networking Fundamentals back to top Value: 15% Due Date: 14-Apr-2020 Return Date: 07-May-2020 Submission method options: Alternative submission method TASK back to top Task This...

1 answer below »

Assessment item 2 - Networking Fundamentals



back to top


Value:15%Due Date:14-Apr-2020Return Date:07-May-2020Submission method options:Alternative submission method
TASK

back to top

Task


This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding of the next assessment items as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the textbook and any additional material you have used in your answers.


Note that the guide for APA referencing is provided in the resources section of the Interact site of this subject.


Answers MUST be written in your own words. No marks will be awarded for any answer that contains more than 10% direct quote (referenced or unreferenced). One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated. For mathematical questions, it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand, if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.


Question 1 [2 Marks]

What is a link-layer frame? A network layer datagram? A transport-layer segment? an application-layer message?

Question 2 [2 Marks]

Is it possible for an application to enjoy reliable data transfer even when the application runs over UDP? If so, how?





Question 3 [3 Marks]


Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also, suppose that Subnet 1 is required to support at least 60 interfaces, Subnet 2 is to support at least 90 interfaces, and Subnet 3 is to support at least 12 interfaces. Provide three network addresses (of the form a.b.c.d/x such as 223.1.17/24) that satisfy these constraints, and how the steps of how to obtain your answers.






Question 4 Case study [8 Marks]


In this problem, you need to put together what you have learned about Internet protocols. Suppose you walk into a room outside CSU campuses, connect to Ethernet, and want to download Slides published in a Web page of the ITC 542 site in Interact 2. What are all the protocol steps that take place, starting from powering on your PC to getting the CSU Web page? Assume there is nothing in our DNS or browser caches when you power on your PC. (Hint: the steps include the use of Ethernet, DHCP, ARP, DNS, TCP, and HTTP protocols.) Explicitly indicate in your steps how you obtain the IP and MAC addresses of a gateway router.








RATIONALE

back to top
SUBJECT LEARNING OUTCOMES

This assessment task will assess the following learning outcome/s:



  • be able to analyse IP addressing requirements and design an addressing scheme.

  • be able to analyse the requirements of IP routing and choose appropriate routing methods.

  • be able to demonstrate how internetworking devices obtain their network configuration.

  • be able to explain how data flows through the internet.

  • be able to ascertain and evaluate selection of applications and protocols for transferring data across the internet.


GRADUATE LEARNING OUTCOMES

This task also contributes to the assessment of the followingCSU Graduate Learning Outcome/s:



  • Information and Research Literacies (Skill) - CSU Graduates demonstrate the skills required to locate, access and critically evaluate existing information and data.

  • Professional Practice (Knowledge) - CSU Graduates possess the knowledge and understanding of the discipline and the nature of professionalism required for the given profession or discipline in contemporary societies.


MARKING CRITERIA AND STANDARDS
Answered Same DayApr 12, 2021ITC542Charles Sturt University

Answer To: Assessment item 2 - Networking Fundamentals back to top Value: 15% Due Date: 14-Apr-2020 Return...

Amaan answered on Apr 13 2021
132 Votes
1. ANSWER 1
•    Link layer frame
Frames are got by encapsulation of the network layer packet, the packet from the layer three (network layer) becomes the actual data or the payload in the frames at layer 2 (data link layer). The fram
es consists of 7 bytes of preamble, here the data consists of alternate 1’s and 0’s, preamble tells us about the beginning of the frame, followed by 1 byte of SFD, start frame delimiter, this has the octet value of 10101011, SFD tells us about the start of the actual data in the frame. We then have the 6 bytes Destination MAC address and 6 bytes of Source MAC address. Next is the type field of 2 bytes, type field tells us about the upper layer protocols. Then comes the actual data or the real payload, varying from 42 bytes to 1500 bytes in size. Followed by 4 bytes of CRC, cyclic redundancy check, an algorithm used to run at sender and the receiver ends to check the integrity of the data.
•    Network layer datagram
A network layer packet is got when the layer 4 segments are encapsulated with the Ip header at layer 3 (network layer). The ipv4 header has various fields and tells how the packet is to be processed. ipv4 header in detail is something as follows. First field is the version 4bits, specifies version of the Ip address (ipv4 /ipv6). Next comes the header length of 4bits and it specifies the length of the header fields. Next is the TOS (type of service) of 8 bits, this gives us the quality of the service (QoS), about priority, delay, reliability, throughput and cost. Next comes the total length field of 16bits and it tells us the total length of the Ip packet, including the header length and the real payload (data). Next filed is the identification of 16bits and it identifies the group of fragments of a single packet. Next comes the flags of 3 bits, they are reserved bit always set to 0, DF bit (do not fragment) it tells a packet is not to b fragmented, and last bit in the flag is the MF bit (more fragment) this tells if the packet is to be followed by another fragmented packet. Next field is the fragmented offset of 13bits and it represents the number of data bytes ahead of the fragment of the same data packet specified in terms of number of 8 bytes. Next field is the time to live field of 8 bits it prevents looping of the data packet by having a dead...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here