Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview This assignment has three major aims: · To help students gain good understanding of all ITECH1102...

1 answer below »
Make sure it should be plagiarism free


Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview This assignment has three major aims: · To help students gain good understanding of all ITECH1102 theoretical and practical material. · To encourage students to use content analysis summaries to prepare for tests, examinations and to help their understanding of theoretical concepts. · To encourage students to conduct independent investigation into networking related topics from books, the Internet and through practical investigation. Engagement with this assignment should help students to prepare for the laboratory test (10%) in week 7, the theory test (0%) in week 8 and the end of semester examination (60%). Timelines and Expectations Students are required to analyse three topics based on students’ surname from the weekly lecture material of topics 1 to 8 and create concise content analysis summaries of the theoretical concepts contained in the course lecture slides. The content analysis for each topic should not exceed approximately five (5) A4 sides of paper if that topics content were printed. Where the lab content or information contained in technical articles from the Internet or books helps to fully describe the lecture slide content, discussion of such theoretical articles or discussion of the lab material should be included in the content analysis. Suggestions as to possible inclusions in your content analysis will appear in weekly Work Plan documents on Moodle. The ultimate aim of this assessment task is to help ITECH1102 students to fully comprehend the course material and hence help them to pass tests and the examination. By the start of week 10 all students should have completed their content analysis for three topics based on the surname. Learning Outcomes Assessed The following course learning outcomes are assessed by completing this assessment: · K1. Describe and explain the role and function of network connectivity in current computing. · K2. Describe and explain the principles of communication in networks. · K3. Describe the role and functionality of hardware and software entities that contribute to network communications. · K4. Describe and explain the protocols and interactions that implement network communications. · K6. Describe fundamental aspects of cloud computing. · A1. Apply networking architecture knowledge to analyze the networking needs for business. Assessment Details At the start of week 10 details will be available in the assessment section of Moodle as to the specific topics each student must submit. All work submitted must be authored by the student submitting the work or where material from other sources is included it must be referenced using APA referencing. Students found to have plagiarised will be dealt with according to university regulations. The specific topics depends on your surname: · Surnames starting with A - G     Topics 4,5 & 6 · Surnames starting with H - Z     Topics 4,6 & 8 Submission Students are required to submit a Microsoft word or pdf file to Moodle by 11.55pm on Sunday 27th Jan 2019. Marking and Marking Guidelines Marks will be available in Moodle and in FDLMarks by the end of week 12 of semester. Students required working on three topics marking guide for each topic is as follows: Content precisely presented based on references 10 Marks Presentation (Layout, no grammatical errors, reads well, etc.) 3 Marks Cited references 2 Marks Total marks for each topic 15 Marks Total marks for three topics 45 Marks Total mark for this assignment 15 Marks CRICOS Provider No. 00103D Content Analysis Assignment.docx Page 1 of 2 CRICOS Provider No. 00103D Content Analysis Assignment.docx Page 2 of 2 PowerPoint Presentation ITECH1102 Networking and Security Topic 4 – The Data Link Layer (Layer 2) [Network Interface] 1 ITECH1102 Networking & Security 2 Last week Last week we looked at: The Application Layer Application layer programs are able to interact by virtue of computer networks. Examples: Web Browser (client application) can communicate with a Web Server (Server program) FTP client (user application) downloading/uploading files from/to an FTP Server (Server program) Email client accessing Email from an Email server. Phone App accessing Domino’s Pizza online. We saw many other categories of Client (user applications) communicating with other application layer programs, including: BitTorrent NTP POP & others. 2 ITECH1102 Networking & Security 3 Application to Application communications Client Application Transport Network Data Link Physical Server Application Transport Network Data Link Physical Actual communications proceeds down through each layer, across the network then up through each server layer. ITECH1102 Networking & Security 4 Last week (continued) Last week we also saw: There are many Application protocols used for data exchange Examples: HTTP is used for web traffic FTP for FTP file transfers POP for access to email Protocols define the rules by which communications can take place, for example: How data is formatted Who speaks first, then next etc. etc. ITECH1102 Networking & Security 5 Visualization of client HTTP request from Firefox. Application Transport Network Data Link User Program (Firefox) Physical Step 1: User opens browser and enters URL to a web site. HTTP request is created at the Application layer. Step 2: HTTP request is passed to the Transport layer. Transport layer information (TCP) is added. Step 3: The process continues. IP information is added at the Network layer. Step 4: Ethernet information is added at the Data Link Layer. Then the resulting frame that is sent to the network media. The reverse process occurs at the server end. Headers are removed at each layer as the data moves up through the network layers to the application layer. This is how layers on the source device communicates with its peer layer on the destination device. The process of adding headers at each Layer is called encapsulation. Each layer encapsulates the Protocol Data Unit (PDU) from the previous layer with a header. Headers pass Addressing and other information between peer layers ITECH1102 Networking & Security 6 This week – Overview of content The Data Link: The role of the Data Link Data Link in the Internet Model of networking The two parts of the Data Link The role of the Network Interface Card (NIC) Identification of NIC’s (MAC addresses) Network cards are smart devices Media Access Methods Local Address Resolution (using ARP) ITECH1102 Networking & Security 7 Role of the Data Link Layer The Data Layer only communicates with devices on its local network. Example: Another PC on your home network A Printer on your local network The Router on your local network This is often described as Hop to Hop communication. Question. Wide Area Networks often involve significant distances through fibre optic or satellite connections. Would communication between two satellite interfaces be considered local networking ? Yes!!! Why? Because the two interfaces are on the same Network. This applies to other Wide area network links for instance between Melbourne & Sydney. The Data Link is only responsible for communication between two machines that are connected to the same network. This network could be your home WiFi network, it could be a section of the university network (for instance all computers in labs 1 & 2), or it could be two machines that are connected at each end of a long fibre optic or satellite link. Hence the idea of local when discussing networks at the data link has more to do with the connection to a single network than it does to distance. Two computers connected at each end of a 1 metre cable are considered local as is two routers connected at each end of a geostationary satellite link. 7 ITECH1102 Networking & Security 8 Data Link Layer in the Internet Model The Internet Model Application (Layer 5) Transport (Layer 4) Internet (Network) (Layer 3) Network Interface (Data Link) (Layer 2) Physical (Layer 1) Data from Application programs passes down through the Transport and Internet layers. The Data Link Layer is the Interface between the Network layer and the Physical network (Cable, Fibre, WiFi, Satellite etc.) Data from the Network media passes up through the network layers to the Application on the receiving host ITECH1102 Networking & Security 9 The two parts of the Data Link layer Logical Link Layer (LLC) Media Access Control (MAC) The LLC is the interface with the upper layer. It allows IPv4, IPv6, IPX and other protocol transactions concurrently. (More on this next week) The Media Access Control layer sends traffic to the network media and receives traffic from the network media. This is the Data Link Layer ITECH1102 Networking & Security 10 The role of the Network Interface Card (NIC) The Network Interface Card is the connection to the Network. Notebooks and other devices often have multiple connections: Ethernet connection (via blue Cat 5 or Cat 6 cable) WiFi connection Bluetooth connection Network interfaces are also built into Printers, Network scanners Routers and other network devices. Routers have one NIC connected to the local network and one or more connected to other networks. ITECH1102 Networking & Security 11 Network Cards have a unique MAC (Media Access Control) address. All Network Interface cards have a unique 48 bit MAC address. The MAC address is built into each interface by the manufacturer. All Data Link data exchanges use the source and destination MAC addresses for any communication. MAC addresses consist of two parts: OUI (Organisation unique Identifier) [ first 24 bits ] Unique 24 bit number [ last 24 bits ] Hence MAC address are globally unique! ITECH1102 Networking & Security 12 How to determine your MAC address On a Windows system running the command ipconfig /all will display network setting such as: IPv4 address IPv6 address MAC address (Also called the Physical Address) ITECH1102 Networking & Security 13 Determining the MAC address on a Linux System The Linux command to determine network settings is ifconfig The output displays: MAC address (HWaddr) IPv4 address (inet addr) IPv6 address inet6 addr ITECH1102 Networking & Security 14 Network cards (NICs) are smart devices Network cards filter traffic Networks cards inspect every packet they see on the local network. Packets that are for other machines are discarded. Packets for the host device (PC, Router etc) are delivered to the host device. (To do this the NIC Interrupts the host and passes the network packet to it.) Benefits: The host machine only deals with important network traffic, not packets that other devices must process. Hence the filtering of traffic by the NIC reduces processing by the host machine and hence does not impede host performance. ITECH1102 Networking & Security 15 The NIC also checks for errors How the Cyclic Redundancy Check (CRC) works Prior to sending a network packet a NIC performs a 32 bit CRC calculation that characterises the contents of the network packet. The 32 bit CRC is appended to the end of the packet then sent to the destination. When the packet arrives at the destination its NIC does the same CRC calculation on the received data. If the two CRC values are different then the destination knows the packet is corrupt and so discards it. This type of error checking is common in networking. ITECH1102 Networking & Security 16 Ethernet Frame Format There is a strict format for Ethernet Frames. A Ethernet frame
Answered Same DayJan 26, 2021ITECH1102

Answer To: Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview...

Kuldeep answered on Jan 27 2021
142 Votes
ITECH1102 Networking and Security
ITECH1102 Networking and Security
Student Name
University Name
Unit Name
Unit Code
Contents
Topic 4 – The Data Link Layer    3
Topic 5 – The Internet (Network) layer    5
Topic 6 – The Transport Layer (TCP & UDP)    8
References    12
Topic 4 – The Data Link Layer
The role of the Data Link
Data Link Layer makes a most consistent node-to-n
ode information or data transfer. This creates a framework based on the packet obtained from a network layer as well as provides them with a physical layer. Synchronize to transmit information to this information. The control error is easy. Encoded data is then sent to physical data.
Data link layer uses error detection bits. It corrected the error. Outgoing messages are grouped together in frames. After that, the system waits the receipt for the receipt after the launch. Message sending is trustworthy ("Analytical Review of Error Control in Data Link Layer", 2018).
Two parts of the Data Link
The Logical Link Layer (LLC) LLC layer is also called logical link control. It is clear from the name itself for the Data Linked Layer that LLC layer data aims to multiplex and endow error control and multiplexed protocols across the flow level on the Mac layer.
The Media Access Control layer is also known as Media Access Layer. This name is clear that for a data link layer, the MAC layer works for managing media access on different devices.
Role of the Network Interface Card (NIC)
The NIC is known as the network interface controller, a NIC card, an expansion card, a computer circuit board, a network card, a LAN card, a network adapter, or a network adapter cardx.
Network cards are smart devices
The network card checks each packet they see on a local network. Packets for different computers will be dropped. Packets of the host device are transferred to host device
Media Access Methods
Media access control involves arbitrating access to the network. In controlled access, only one station can send at a time. Devices that want to transmit must wait for their turn. Token Ring and FDDI are two examples of using such media access control. Both are called deterministic protocols because they guarantee the lowest level of access to the media (Heng & Ji, 2011).
Local Address Resolution (using ARP)
LLC is sometimes described as providing multiplexing services to upper layer protocols. This statement implies and attempts to illustrate this because LLC provides a multiplexing mechanism that enables multiple network protocols (IP, IPX) to coexist in a multipoint network and transmit their respective data. This feature of LLC is sometimes described as providing multiplexing services to upper layer protocols (Okdem, 2015).
The router needs at least 2 NICs: the router needs at least two NICs because the router needs to process requests from internal, private and external networks (i.e. public networks). Therefore, a network card is required to handle the internal network, and one network handles the external network (Zhongzhi, 2011).
Topic 5 – The Internet (Network) layer
ARP (Address Resolution Protocol): ARP Protocol Internet Protocol Address (IPDP) mapping is the physical machine address and is commonly known in a local network such as, in IP version 4, a most common level of IP is utilized today, and the address is about 32 bit long.
Arp on Linux
The ARP kernel handles the IPv4 network or displays the cache along the side. They can add entries to the table delete one or display current content. The RRP address is the Resolutions Protocol, which is used to search for a given IPv4 address at the network neighbour’s address.
Network level role
It translates logical network addresses into physical addresses. The system has been...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here