Understand the techniques and protocols

Assignment Help Computer Networking
Reference no: EM132882494

ITECH2301 Network Architecture and Design - Federation University

Assessment Objective

- This assignment provides an opportunity to understand the techniques and protocols used in the layers of TCP/IP network (Internet) model

Learning Outcome 1: Explain the technologies and protocols of physical, data link, network and transport layers.
Learning Outcome 2: Analyse data communication and networking technologies in today's Internet.
Learning Outcome 3: Analyse data communication and networking technologies in today's Internet.

Requirements

1. Fig. 1 illustrates how a message is transmitted from the application layer to the physical layer in the Internet model of a data communication network.

a. With the aid of the diagrams of header formats, explain the main purpose of all fields of the header formats of the transport, network, and data link layers protocols. For example, the main purpose of the source address and destination address of an IP Header is to provide the sender and receiver IP addresses, respectively. Note, for IP header, include IPv4 packet header format only i.e., you do not need to consider IPv6 packet header format.

Using the Wireshark protocol analyser, capture all packets generated in response to your request for the above web page. For a selected pair of the first HTTP request-response lines, write the hex/decimal values of all fields of the header formats of the transport, network and data link layers protocols whatever available in your file captured by Wireshark.

Note, HTTP request packet and response packet are identified by the following ways:
HTTP Request - GET / HTTP/1.1 HTTP Response- HTTP/1.1 200 OK

However, if you use Wi-Fi (WLAN) and are not in monitor mode, Wireshark does not show HTTP protocols. Note, monitor mode is not supported by WinPcap, and thus not by Wireshark or TShark, on Windows (https://wiki.wireshark.org/CaptureSetup/WLAN). In this case, any sorts of packets, such as from the client to the server (e.g., Client Hello) and from the server to the client (Server Hello) will be accepted as request packet and response packets, respectively.

• The application Layer uses the HTTP protocol

• The transport layer uses the TCP (Transmission Control) Protocol
• The network layer uses The IP (Internet) Protocol
• The data link layer of the LANs typically uses the Ethernet protocol
• Protocol Data Units

2036_transmission through layers.jpg

Fig. 1: Message transmission through layers.

2. Signaling (Encoding) and Modulation Techniques
Draw how the bit pattern 0 1 0 0 1 1 0 1 would be sent using
a. Unipolar signalling
b. Return to zero (RZ) signalling
c. Non return to zero (NRZ) signalling
d. Manchester encoding
e. Amplitude Modulation (AM)
f. Frequency Modulation (FM)
g. Phase Modulation (PM)

N.B. You can draw the bit pattern on papers and insert them as pictures into your document.

Which of the above mentioned signaling (encoding) techniques [refer to 2.1 (a)-(d)] you think is the best? Please justify your answers with some supporting evidence.

3. Answer the following question on media access control:

a. List two examples of controlled access and contention-based media access protocols and their application areas.

4. Briefly describe why you think the Web of Things will change the way people live.

Attachment:- Network Architecture.rar

Reference no: EM132882494

Questions Cloud

Explore the changes brought during and after 2010 : 1. Describe why the UK system of industrial or employment relations is considered most important & why?
Identify a middle-range theory within conceptual model : Identify a middle-range theory within her conceptual model. Clearly identify how she defines the concepts and propositions between them.
What is the change in inventory during the period : The unit product cost under variable costing and absorption costing is P12 and P14, respectively. What is the change in inventory during the period
Find an instrument in the literature that could be used : Find an instrument, survey, or tool in the literature that could be used to measure the concept. Knowledge as a component of the socio-cultural orientation
Understand the techniques and protocols : Explain the technologies and protocols of physical, data link, network and transport layers and Analyse data communication and networking technologies
Find a concept within watson theory of caring : How a person reading about a theory can be influenced in their understanding of a theory if they have a different definition of a concept than the author.
Discuss policy for the treatment of government grants : Discuss in detail whether the company's policy for the treatment of government grants meets the definition of a liability in MASB Conceptual Framework
Identify an outcome of nursing practice in area of practice : Identify an outcome of nursing practice in your area of practice that can be improved. For example, if you work in home health, you may identify
Information about mental health disorders and treatment : Jackie was a very bright young woman. During high school and college, she excelled at computer science and exhibited a love and flair for fashion. The summer th

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd