Explain the data plaao operation of the network layer.

Assignment Help Computer Networking
Reference no: EM132990262

SIT202 Secure Networking

Learning objactive

How tha data balng transported in tha IP network.

You should be able to:
1. Describe "Internet Protocol"
2. Explain the data plane operation of the Network layer.
2. Build a simple network in Cisco Packet Tracer and simulate the network you built.

This class activity is designed to be worked through aEtive participation and collaborating with peers under the guidance of the teaching team in the c lass. The active classes are designed to be interactiva, and they are here for you to extend your learning. However, thesa classes will only holp you to enhance your learning if you come prepared. To worh on tha class actlvi€las, you wlll ba axpactad to hava complHad sha Matwork Layar-Data Plana Modula. You need to have a basic understanding of layered model. TCP/IP, and data plane operation of the network layor. If you are not familiar with any of the above, please head back to the Cloudoeakin unit site and complete the relevant modules before sta rting this act ive class.

The activa classas are related to assessment tasks on OnTrack. AfEer learning about different concepts from the content proc ided in the unit site, you will expand on this knowledge by working on activities designed to put these concepts in practice during the active classes and submiE the completed task to OnTrack in the sama week. The teaching team will guide and support your learning during these activities. This will help you manage your time and tasks botter to avoid tasks piling up towards the deadlines. If you do not complete these activities in class, you will noed to work oa them in your own time, with limited support from us available.

The class act ivitios are split into throw parts. First, you will analyse IP data grams using Wireshark. Then. you will conduct a group discussion and a role pla y to understand IP and data plane operation of the network layer. Finally, you will use Cisco Packet Tracer to build a small network and simulate the network to undorstaod the packet forwarding, IP configuration and subaet ma sk.

Activity 1: Analyzing IP uslng Wireshark

Ncrw you are familiar with Wireshark. Therefore, you should be able Eo analyze protocols and packets with less instructions provided. Today, you are going to anal yze IP (proEo<ol). You nead to first capture the packets of a couple of network applications (web browsing, MSTeams).
Then. select DHS/HTTP request message/ TCP /UDP packet that is sent from your davico and expand Ehe Internet Protocol part of the packet in the packet details window.

Lesson Reviews

At the completion of Network Layer-Data Plane Module, you are required to fill a lesson review to tell us what you have learnt and how you have learnt it by providing evidence of your learning. Your tutor will then review your submission and will give you feedback. If your submission is incomplete, then your tutor will ask you to include missing parts. You tutor may ask follow-up questions, either to clarify something, or to double check your understanding of certain concepts.
The lesson review must contain three parts:

1. Module Summary
Please provide an overview of what you have learnt in Network Layer-Data Plane Module. Throughout the activities and resources on the unit site, you will find prompts that help you fill this part. More specifically, you need to answer the following questions:
• Summarising the content
To make it easier to summarise the content of the module, you can break down these questions by learning objective, or by activity, as is suggested on the unit site and in the activity sheet.
• Summarise the main points in this module. Make sure that you include references to the learning objectives.
• How is this useful?

• Reflecting on the content
Provide a reflection by answering the following questions:
• What is the most important thing you learnt in this module?
• How does this relate to what you already know?
• Why do you think your course team wants you to learn the content of this module?

2. Evidence of Learning
Provide evidence of your work on this module. This can contain notes that you took, activities and analyses you have done in the active classes rated to this module, and any other work that you produced. You can take screenshots of your analyses and simulations and include in here. If you have developed an application/ program (for example using Python), then please also provide the code along with the submission labelling the code. If you used external resources in your learning, please include links to them. Please also make sure to include short comments together with your evidence. You can,

• Provide references to activities that you have done to highlight your learning on the key learning objectives of this module and active class. Make sure that you provide evidence for the all the activities you have done in the relevant Active Classes.
• Provide references to any specific content that you found difficult, how you overcame these difficulties, and what you learnt from them.
• Include questions where you made mistakes and comment what you learnt from those mistakes, or how you overcame them.

1. Evidence of self-assessment, with a sufficient score (at least 90%).
Please include evidence that you reached the minimum required score at the self-assessment. On the results page of the self-assessment, you can use print/ save page as pdf option in your browser to save the results into a pdf file. You can then upload this file as your evidence.

Remember, anytime you submit a task to OnTrack, it is a good practice to check the status of any existing tasks, and the future tasks you are expected to complete. If you have received feedback on previous tasks, you may need to fix and resubmit some of your work. You want to check out why, so that you can learn from this and make it faster and easier to accomplish later work to the required standard.

Attachment:- Secure Networking.rar

Reference no: EM132990262

Questions Cloud

Expression of bacterial proteins in plant species : Expression of bacterial proteins in plant species for resistance to lepidopteran insect pest.
Prepare the journal entries to record : These 100,000 shares were forfeited by the management on 20 November 2020. Prepare the journal entries to record the above
What is the overall tax rate on crocker and company pre-tax : At the end of the year, CC distributed all its after-tax earnings to Jimmy, What is the overall tax rate on Crocker and Company's pre-tax income?
What portion of the total contract price would be recognized : Assuming the same facts as those above except that Hamilton uses the completed-contract method of accounting, what portion of the total contract price
Explain the data plaao operation of the network layer. : Describe Internet Protocol and Explain the data plane operation of the Network layer - Build a simple network in Cisco Packet Tracer and simulate the network
How much income will be allocated to reagan : How much income will be allocated to Reagan? Roberto and Reagan are both 25 percent owner/managers for Bright Light Enterprises.
Heuristics affects managers escalation of commitment : Describe how framing heuristics affects a managers' escalation of commitment.
Explain how albany corp can reduce ita economic exposure : All other expenses are in U.S. dollars. Explain how Albany Corp. can reduce ita economic exposure to exchange rate fluctuations
How much income will be allocated to roberto : A combined $83,500 profit from the remaining stores. If Bright Light Inc. is an S corporation, how much income will be allocated to Roberto?

Reviews

len2990262

9/16/2021 12:21:14 AM

All these PDF are different pages of a single module all you have to do is go through each pages and have to write the reflection of each pages and give the title accordingly. There would be a camera icon for exercise and you have to answer that as well. If it includes wireshark or dev tools you have to include the screenshot as well. And there is one more PDF saying active class just answer the questions and give out a reflection. Since I haven’t attended the active class you can skip role play questions. PFA Ok make sure all the reflection and exercise and active class exercise are done

Write a Review

Computer Networking Questions & Answers

  Determine the code words for each of the decimal digits

Determine the code words for each of the 10 decimal digits in the weighted code (6 31 1). The code should be self-complementing.

  Network consultation for designit

Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to complete this assignment.

  How does video traffic compare to voip traffic

How does video traffic compare to VoIP traffic? Which two devices can be used to configure a WLAN using controller-based Aps? What would an attacker do to perform a switch spoofing attack?

  Develop a personal definition of middleware

Diagram middleware using a variety of resources (minimum of three), depicting four different types captioned by their definitions. Develop a personal definition of middleware based on your research

  Describe at least one example use of each technology

Describe at least 1 example use of each technology that utilizes the strengths of that technology. What clarification do you need regarding the posting?

  What is the data rate for gigabit ethernet

What improvements will CAT6 and CAT7 cable provide? What is a benefit of using shielded twisted-pair cabling?

  Provide a scenario for using point to point topology

Wireless communication, generally, useless three configuration topologies (1) point to point; (2) point to multipoint; and (3) multi-point to point. In this paper, (a) define each topology, (b) provide a scenario for using each topology.

  Write guideline on how you might go about securing data

Using the Asset Identification table found in this chapter or a similar table of your own design, identify the most valuable data in your organization.

  BN321 Advanced Network Design Assignment

BN321 Advanced Network Design Assignment Help and Solution, Network Requirement analysis and Design Assessment Writing Service - Apply concepts and theories

  The tcp/ip model is more or less complicated

Do you feel that the TCP/IP model is more or less complicated than the OSI model. Why

  how VPN can advantageous for securing computer communication

Discuss how VPN can be advantageous for securing computer communications. Address the issue of VPN security in details as described in section 3

  Assignment on mister network engineer

Use IP addresses to describe your configuration. Explain the impact that each of your configurations has on the security of the entire network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd