ITECH2301 Network Architecture and Design Assignment

Assignment Help Computer Networking
Reference no: EM132501379

ITECH2301 Network Architecture and Design - Federation University

Network Architecture

Assessment Objective

This assignment provides an opportunity to understand the techniques and protocols used in the layers of TCP/IP network (Internet) model

Learning Outcome 1 - Explain the technologies and protocols of physical, data link, network and transport layers.
Learning Outcome 2 - Analyse data communication and networking technologies in today's Internet.
Learning Outcome 3  - Analyse data communication and networking technologies in today's Internet.

Requirements

Question 1. Fig. 1 illustrates how a message is transmitted from the application layer to the physical layer in the Internet model of a data communication network.

a. With the aid of the diagrams of header formats, explain the main purpose of all fields of the header formats of the transport, network, and data link layers protocols. For example, the main purpose of the source address and destination address of an IP Header is to provide the sender and receiver IP addresses, respectively. Note, for IP header, include IPv4 packet header format only i.e., you do not need to consider IPv6 packet header format.

b. Use your web browser to connect to one of the following websites whose number in the number list is equal to the first non-zero digit of your student ID. Let your student ID be 32684567. Since the first digit of your student ID is 3, you need to select (3rd item) of the attached list:

Using the Wireshark protocol analyser, capture all packets generated in response to your request for the above web page. For a selected pair of the first HTTP request-response lines, write the hex/decimal values of all fields of the header formats of the transport, network and data link layers protocols whatever available in your file captured by Wireshark.

1984_Message transmission through layers.jpg

Fig. 1: Message transmission through layers.

Question 2. Draw how the bit pattern 1 0 1 1 0 0 1 1 would be sent using
a. Unipolar signalling
b. Return to zero (RZ) signalling
c. Non return to zero (NRZ) signalling
d. Manchester encoding
e. Amplitude Modulation (AM)
f. Frequency Modulation (FM)
g. Phase Modulation (PM)

Question 3. Answer the following questions on media access control:

a. What is media access control and why is it important?
b. List two examples of controlled access and contention-based media access protocols and their application areas.

Question 4. Briefly describe the Web of Things (WoT). List four examples of WoT applications.

Attachment:- Network Architecture and Design.rar

Reference no: EM132501379

Questions Cloud

Importance of Cultural Differences for the Global MNC : The Importance of Cultural Differences for the Global Multi-National Corporation (MNC) Do cultural differences really matter in an increasingly globalised world
MITS5002 Software Engineering Methodology Assignment : MITS5002 Software Engineering Methodology Assignment Help and Solution - Research Report, Victorian Institute of Technology - Assessment Writing Service
How does open banking affect customer-centricity : Question - Consider the concept of open banking discussed in class. How does open banking affect customer-centricity
How a sonnet makes an argument : Using the concepts of formalism, explain in an essay how a sonnet makes an argument. Use the sonnet given in the attachment.
ITECH2301 Network Architecture and Design Assignment : ITECH2301 Network Architecture and Design Assignment help and Solution, Federation University - Assessment Writing Service
Approaches for mitigating security risk : Critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk
Determine the free-energy change : Determine the free-energy change and what temperature is the reaction is spontaneous - Report your final answer to the correct number of significant figures
CRJ 410 Advanced Policing Innovations Assignment : CRJ 410 Advanced Policing Innovations Assignment help and Solution, California State University - Homework Help - Implementing Police Innovations Paper
Develop ideas using conceptualisation frameworks : Investigate cases of disruptive innovation in different business and social contexts by applying lean entrepreneurship principles.

Reviews

len2501379

4/27/2020 7:31:22 AM

Please read the assignment specification and marking criteria carefully and complete the assignment and need to submit on Turnitin as well. Thank you.

Write a Review

Computer Networking Questions & Answers

  Use of virtual private network and a tunneling protocol

Two banks want to establish an electronic link between themselves over which they can transmit money transfers using EDI/XML techniques. Can they use virtual private network and a tunneling protocol or is a better technique available? Defend your ans..

  Evaluate the technology and connectivity

You are to write a memo covering 15 points on which you will evaluate the technology, connectivity, and functioning of the company's computer networks

  What is value in the identification field and the ttl field

What is the value in the Identification field and the TTL field - How many fragments were created from the original datagram?

  Define the outbound data traffic

What is an expected percentage utilization for a network?

  Describe the open systems interconnection

Describe the Open Systems Interconnection (OSI) protocol model. Identify the advantages and disadvantages of circuit switching and packet switching (X.25, Frame Relay, Asynchronous Transfer Mode, and Transmission Control Protocol/Internet Protocol

  Create an arrow on node network activity diagram

Create an AON (Arrow on Node) network activity diagram illustrating the project activities with two paths to complete the project and a defined critical path. Again if you're using Word you will use textboxes and arrows to create an AON network ac..

  A company with headquarters at 1 talavera rd north ryde

a company with headquarters at 1 talavera rd north ryde wishes to obtain internet access. they require unlimited data

  Described a layered model of networking

Described a layered model of networking along with details of physical implementations that together support a wide range of possible networking scenarios.

  Compare and contrast bri and pri isdn

Compare and contrast BRI and PRI ISDN.- What is a 2B+D?-  How does MPLS work?- Compare and contrast circuit-switched services, dedicated-circuit services, and packet-switched services.

  Write paper that includes security concerns for enterprise

Write a 2 to 3-page paper that includes the Security concerns for the enterprise, suggestions for additional information to be documented with examples and consideration of network bandwidth capacity considerations in the design documents.

  How you would subsequently optimize the network

Identify the possible causes of the problem. How you would subsequently optimize the network? Create an action plan to isolate the causes for the problems

  Provide a reference to the article you found

Provide a reference to the article you found. Is there anything missing from the set of barriers in your list? If so, what? How are the barriers tied to risks versus rewards for the organization?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd