Explain why there are three mac addresses

Assignment Help Computer Networking
Reference no: EM133004888

Physical Connections and Protocols

The learning objective of this class is to learn about different physical layer connections and how all different computer network protocols and concepts we learned in each module work together to facilitate a simple (but most usable) network application.

At the end of this activity, you should be able to

1. Describe the behind-the-scenes process of accessing a web page.

2. Explain and analyse different physical layer connection and relevant link layer protocols.

This class activity is designed to be worked through active participation and collaborating with peers under the guidance of the teaching team in the class. The active classes are designed to be interactive, and they are here for you to extend your learning. However, these classes will only help you to enhance your learning if you come prepared. To work on the class activities, you will be expected to have completed the all the modules in the unit. You need to have a good understanding of TCP/IP protocol stack starting from application layer to physical layer. If you are not familiar with any of the above, please head to the CloudDeakin unit site and complete it before starting this active class.

The active classes are related to assessment tasks on OnTrack. After learning about different concepts from the content provided in the unit site, you will expand on this knowledge by working on activities designed to put these concepts in practice during the active classes and submit the completed task to OnTrack in the same week. The teaching team will guide and support your learning during these activities. This will help you manage your time and tasks better to avoid tasks piling up towards the deadlines. If you do not complete these activities in class, you will need to work on them in your own time, with limited support from us available.

To carry out the class activities, you need to form a group of four people. The class activities are split into three parts.

Activity 1: Behind the scenes process of a web page request

We have now learned about all the layers in TCP/IP protocol stack, and we fully understand the behind-the-scenes process of accessing a web page. In Module 7, we have looked at the process and networking protocols involved in a simple web page request.

Consider a scenario where you have just turned on your laptop and first thing you want to do is, access SIT202 CloudDeakin site . You have a similar network configuration to the example we reviewed in Module 7; however, your laptop is connected via

Wi-Fi to a home network that does not use NAT, rather than an Ethernet cable as we discussed in the sample scenario.
1. Outline the major steps used by your laptop after it is first powered on until it downloads the page from CloudDeakin.
2. For each of the major steps you have identified, identify the network protocols that are used and explain what functionality they provide in achieving this task.
3. Explain what would change in your answers to the above questions if the home network used NAT.
If you understood the entire process of accessing a web page. Well done! You have learned the fundamentals of computer networking.

Activity 2: Wireshark, explain the process

In this activity, we are going to use our good old friend, Wireshark to analyse the process you discussed in Activity 1.
1. Use ipconfig in your command prompt/ terminal to empty the DNS cache in your host ipconfig /flushdns. (MacOS Mojave use: sudo killall -HUP mDNSResponder)
2. Open Google Chrome and empty your browser cache.
3. Turn off your network connection (turn your WiFi off, disconnect your ethernet cable)
4. Open Wireshark and start packet capture (remember to select your typical network interface). You will see an empty window.
5. Turn on your network connection again.
6. Open your browser, visit the web page: and stop packet capture.
7. Now, you can start analyzing the packet capture.
a) list down the order of protocols used and their messages.
b) Explain the use of each protocol indicating which layer each of these protocols belong to.
c) Check the details of each packet such as ARP, DHCP, DNS, and HTTP. Make sure you include screenshots in your submission that capture key details of your analysis.
8. Compare the results of your analysis in the above step (7) with the findings of Activity 1.

Activity 3: Wireless network Vs wired networks/ connectivity

In this activity, you explore more on wired and wireless LANs. Implement the above network in Cisco Packet Tracer. You need to use static IP configuration to configure hosts and router interfaces. Make sure to take screenshots of your findings as you will need to include those in the task submissions.
1. Use the simulation mode and send a simple PDU,
a. From PC1 to PC0
b. From Laptop 1 to Tablet 0
2. Note down the similarities and differences you observed in 1.a and 1.b. You may check the details of PDUs in each device. Explain the reasons behind the differences you observed.
3. Check the details of PDUs in both wired and wireless LANs. The PDUs of wired LAN, you can find source and destination MAC addresses. However, there are three MAC addresses listed in the PDUs of Wireless LAN as shown below.
4. Explain why there are three MAC addresses listed in 802.11 Wireless PDUs?

Above and Beyond Tasks:

Those who are targeting for Credit and above can complete the following task as a part of Task 4.1C and 5.2D to demonstrate your deeper understanding on physical layer.

There are two types of Ethernet cables used in computer network, i.e., straight through and crossover cables. Explain,
• What is a straight through Ethernet cable? When do we need to use a straight through Ethernet cable?
• What is a crossover Ethernet cable? When do we need to use a crossover Ethernet cable?
• How do you identify the type of an Ethernet cable?

Attachment:- Physical Connections and Protocols.rar

Reference no: EM133004888

Questions Cloud

Standard deviation of the population mean : Describe the difference between the standard deviation of the population mean and the standard error of the sample mean.
Two-year and three-year spot rate : The one year, the two-year and three-year spot rate is 8%, 9%, and 10% respectively. The price of Bond X is closest to:
Calculate the dear for the two currencies : Choice Bank has determined that its inventory of yen (¥) and Swiss franc (SF) denominated securities is subject to market risk. The spot exchange rates are ¥95.
How to conduct a sensitivity analysis : How to Conduct a sensitivity analysis.
Explain why there are three mac addresses : Explain why there are three MAC addresses listed in 802.11 Wireless PDUs and Compare the results of your analysis in the above step (7) with the findings of Act
Newspaper article that presents an accounting fraud case : Locate a case study, court case, YouTube video, or newspaper article that presents an accounting fraud case in which the employee's rights were violated during
Employee rights were violated during an interrogation : Locate a case study, court case, YouTube video, or newspaper article that presents an accounting fraud case in which the employee's rights were violated during
Explain how much would the firm revenue change : Explain How much would the firm's revenue change if it lowered the price from $4 to $2? Is demand elastic or inelastic in this range?
Loan estimate and the closing disclosure : Why do you think consistency is so important between the loan estimate and the closing disclosure?

Reviews

Write a Review

Computer Networking Questions & Answers

  Information systems security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall.

  Describe the most likely domain model

There are five other locations that are each organized using two subnets, each using static IPv4 addresses: Los Angeles, CA; Reno, NV; San Diego, CA; Seattle, WA; and Portland, OR. Describe the most likely domain model for the organization.

  Scenario for network design assessment tasks

COIT20264 Network Design - Scenario for Network Design Assessment Tasks - List the business goals of the scenario given in the assignment.

  Which networking model can the network now support

In Question 11, suppose one computer is upgraded from Windows 7 Professional to Windows Server 2012 R2. Which networking model can the network now support.

  Determine the value of frame transmission time

Determine the value of the frame transmission time, i.e., time it takes to transmit frame from when device starts sending first bit of frame until it finishes sending last bit?

  Why do internet telephony protocols run on top

Why do Internet telephony protocols run on top of UDP rather than on TCP - UDP is use because a connection is not needed to be maintained by some internet telephony applications.

  Analyze the general trend and trends within two subsets

Analyze the general trend and trends within two subsets of the area (i.e., security has subsets of physical, perimeter, monitoring) over the last three years.

  Maintaining current employers connection to internet

Assume you are responsible for selecting and maintaining your current employers connection to the Internet. Take some time to research routing protocols

  How to assign ip addresses to various subnets

Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets?

  Analyzing the companys e-commerce operations

Read and analyze the Risk Factors section in the company's report to investors (Item 1.A). This section is a professionally written risk analysis

  Adobe creative suite software

While this project is a design assignment, you may use any Adobe Creative Suite software or combinations thereof to produce it, as long as the final art is "press ready" as both an InDesign and a PDF print document when completed. (Final size shou..

  Plan and implement various application servers

Plan and implement various application servers for an organisation and Manage servers and resources to support enterprise information systems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd