Functionality of layered computer network models

Assignment Help Computer Networking
Reference no: EM133736648 , Length: word count:1500

Introduction to Information Networks

Assessment - Tutorial evaluation

Your Task

This assessment is to be completed individually. In this assessment, you are expected to critically analyse a specific topic from the content covered in Weeks 1 to 3. Your task is to develop a comprehensive tutorial that not only educates learners but also promotes critical thinking about the topic.

Assessment Description
This assessment will gauge your depth of understanding and ability to critically evaluate and synthesise key concepts from Weeks 1 to 3. Your tutorial should be presented as a written document that delves into the intricacies of the topic, incorporating advanced insights and promoting deeper thought. You are expected to present content that goes beyond mere description, demonstrating a critical evaluation of the topic in light of current research and developments in the field.

Learning outcome 1: Evaluate the main technologies, models and protocols used in data communications and networking.

Learning outcome 2: Explain the purpose and functionality of layered computer network models.

Assessment Instruction

Your report should be submitted in Word Document or PDF format.
Your written tutorial should:

Begin with a comprehensive introduction to your chosen topic, setting the context and highlighting its significance in the field of data communications and networking.

Engage in a detailed discussion of the topic, ensuring clarity, depth, and critical analysis throughout. This should be complemented by a synthesis of existing literature, research, and developments.

Incorporate real-world examples or scenarios, but also evaluate their significance and implications in the broader context.
Conclude with a comprehensive summary, key takeaways, and potential future developments or implications in the field.
Seamlessly integrate diagrams, charts, or visuals where they add depth and clarity to your narrative. Ensure these visuals are critically analysed in the text.
Ensure that you cite any sources or materials referenced. All citations should adhere to a recognised academic citation style of your choice, but it must be applied consistently throughout your document. KBS recommends using KBS Harvard referencing style.

Introduction to Information Networks

Learning Outcome 1: Evaluate the main technologies, models and protocols used in data communications and networking.
Learning Outcome 2: Explain the purpose and functionality of layered computer network models.
Learning Outcome 3: Identify problems that emerge among the networks that constitute today's internet architecture.
Learning Outcome 4: Recommend and apply solutions for common internet architecture problems.

Subject Description

This subject introduces students to the fundamentals of information, communication, and computer networks. Students will learn how to evaluate content related to internet architecture and associated protocols, inclusive of network layer architectures, addressing and routing. By the end of the subject, students will have also gained knowledge and skills pertaining to electronic data communication, advanced industry practices and the diagnosis and resolution of internet architecture problems.

What are Information Networks?
Information networks connect devices to enable the transfer of data and information between nodes or endpoints.
These networks can be either wired or wireless and can span a broad or limited area.
The ultimate objective of information networks is to provide reliable and efficient communication and data exchange for users.

Protocols and Standards
Protocols are communication rules for devices on a network, while standards ensure compatibility between devices and networks.
Examples of protocols and standards used in information networks include TCP/IP, HTTP, SMTP, and DNS.

Activity
Example: Online shopping illustrates the importance of protocols and standards in information networks. The HTTP or HTTPS protocol is used to communicate between a device and an e-commerce website's server. The SSL or TLS protocol encrypts and secures payment transactions. Without these protocols, payment information could be compromised.

Activity: Identify three protocols and three standards used in everyday tasks like online banking, social media, or online gaming. Explain why each one is important and how it contributes to the smooth and secure operation of these tasks.

Types of Information Networks
An information network connects nodes to transfer and share data.
It has three categories: Local Area Networks (LANs), Wide Area Networks (WANs), and Metropolitan Area Networks (MANs).

Local Area Networks (LANs)
A LAN is a local network using Ethernet for data transmission in limited geographical areas like buildings or campuses.

Wide Area Networks (WANs)
WANs cover large geographical areas and use long-distance communication technologies like satellite, microwave, and leased telephone lines.

Metropolitan Area Networks (MANs)
A MAN is a city or regional network operated by a single entity, such as a corporation or government agency.

Components of Information Networks
Nodes are network-connected devices, including computers, printers, and routers.
Links are the channels that connect nodes and can be wired or wireless.
Servers are specialised nodes providing centralised services, such as file sharing, email, and web hosting.

Activity
Form groups and research LANs, WANs, or MANs. In your groups, research and discuss the following points related to the assigned type of network:
Definition and characteristics
Advantages and disadvantages
Typical use cases
Examples of companies or organisations that use this type of network.

Attachment:- Introduction to Information Networks.rar

 

Reference no: EM133736648

Questions Cloud

Explore strategies for compassionately supporting patients : In this discussion post, explore strategies for compassionately supporting patients experiencing disturbed body image due to an ostomy.
What nurse be aware of regarding this clients hearing loss : A nurse is collecting data on a client with otosclerosis. What should the nurse be aware of regarding this client's hearing loss?
Which is the next step the nurse should take : An individual comes into the emergency department complaining of headaches and dizziness. Which is the NEXT step the nurse should take?
What is the correct statistical test to examine association : What is the correct statistical test to examine whether there is an association between treatment group and outcome?
Functionality of layered computer network models : Develop a comprehensive tutorial that not only educates learners but also promotes critical thinking about the topic - Explain the purpose and functionality
Discuss the surgeons operative report must be written : According to Joint Commission standards, the surgeon's operative report must be written or dictated and filed on the patient's health record.
How you implemented or will implement principle in practice : Select one of the five Principles of Aggression Prevention. Include how you have already implemented or will implement this principle in your practice.
Leadership creates culture that celebrates diversity : Inclusive leadership creates a culture that celebrates diversity and provides equal opportunities for women to advance.
Role of your organizations recruiter : Let's consider further the role that benefits play in recruiting. Put yourself in the role of your organization's recruiter,

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd