Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview This assignment has three major aims: · To help students gain good understanding of all ITECH1102...

1 answer below »
each topic with 3 pages


Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview This assignment has three major aims: · To help students gain good understanding of all ITECH1102 theoretical and practical material. · To encourage students to use content analysis summaries to prepare for tests, examinations and to help their understanding of theoretical concepts. · To encourage students to conduct independent investigation into networking related topics from books, the Internet and through practical investigation. Engagement with this assignment should help students to prepare for the laboratory test (10%) in week 7, the theory test (0%) in week 8 and the end of semester examination (60%). Timelines and Expectations Students are required to analyse three topics based on students’ surname from the weekly lecture material of topics 1 to 8 and create concise content analysis summaries of the theoretical concepts contained in the course lecture slides. The content analysis for each topic should not exceed approximately five (5) A4 sides of paper if that topics content were printed. Where the lab content or information contained in technical articles from the Internet or books helps to fully describe the lecture slide content, discussion of such theoretical articles or discussion of the lab material should be included in the content analysis. Suggestions as to possible inclusions in your content analysis will appear in weekly Work Plan documents on Moodle. The ultimate aim of this assessment task is to help ITECH1102 students to fully comprehend the course material and hence help them to pass tests and the examination. By the start of week 10 all students should have completed their content analysis for three topics based on the surname. Learning Outcomes Assessed The following course learning outcomes are assessed by completing this assessment: · K1. Describe and explain the role and function of network connectivity in current computing. · K2. Describe and explain the principles of communication in networks. · K3. Describe the role and functionality of hardware and software entities that contribute to network communications. · K4. Describe and explain the protocols and interactions that implement network communications. · K6. Describe fundamental aspects of cloud computing. · A1. Apply networking architecture knowledge to analyze the networking needs for business. Assessment Details At the start of week 10 details will be available in the assessment section of Moodle as to the specific topics each student must submit. All work submitted must be authored by the student submitting the work or where material from other sources is included it must be referenced using APA referencing. Students found to have plagiarised will be dealt with according to university regulations. The specific topics depends on your surname: · Surnames starting with A - G     Topics 4,5 & 6 · Surnames starting with H - Z     Topics 4,6 & 8 Submission Students are required to submit a Microsoft word or pdf file to Moodle by 11.55pm on Sunday 27th Jan 2019. Marking and Marking Guidelines Marks will be available in Moodle and in FDLMarks by the end of week 12 of semester. Students required working on three topics marking guide for each topic is as follows: Content precisely presented based on references 10 Marks Presentation (Layout, no grammatical errors, reads well, etc.) 3 Marks Cited references 2 Marks Total marks for each topic 15 Marks Total marks for three topics 45 Marks Total mark for this assignment 15 Marks CRICOS Provider No. 00103D Content Analysis Assignment.docx Page 1 of 2 CRICOS Provider No. 00103D Content Analysis Assignment.docx Page 2 of 2
Answered Same DayFeb 02, 2021ITECH1102

Answer To: Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview...

Sanjib answered on Feb 02 2021
157 Votes
Running head: NETWORKING
NETWORKING
12
NETWORKING
Table of Contents
Topic 4: The data Link Layer    3
References    5
Topic 6 - The Transport layer (TCP and UDP)    6
References    8
Topic 8 – Cloud computing and mobile    9
References    11
Topic 4: The data Link Layer
The role of the data link layer
    The data link layer can be stated as the second layer, which we related to the OSI model. Identification of the error can
be stated as one of the main functionality, which is related to the data link layer. In the data link layer various activity of the networking aspect are controlled. It can be stated as one of the crucial areas due ot the factor that if errors are included into the sector of network it can directly disrupt the overall functionality of the network. There are different protocols, which are attached to the sector, which deal with the sector of working of the networking layers.
Data link in the internet model of networking
The data link layer in the internet model of networking is related to the functional and requirement which is related to the procedural. Some of the example in the context is linked to the HDLC and the point-to-point protocol. These two aspects are directly linked to the data link layer. Another important function, which is related to the data link layer, is related to the synchronization of the data, which is being passed from one sector of the network to another network.
The two parts of the data link layer
In the context of the IEEE802 local area network, the data link layer can be broadly be divided into two parts which is the media access control and the another one which is LLC which is the logical link layer. Both of the layers directly gives the provision of the IEEE 802.2 LLC, which is one of the aspects of the IEEE 802 MAC for example the token ring, IEEE 802.11 and the Ethernet.
The role of the network interface card (NIC)
The network interface card in the sector of working can be stated to be having the functionality, which is related to the connectivity factor. It directly creates a medium of communication, which directly prevails in the sector of the two devices which are in the sector of communication. It directly haves the functionality which is related to the working of the network so that communication area can be easily be achieved. Another name, which is given to the network interface card, is the network interface controller. This is due to the factor that it directly helps in the sector of working of the different later which is linked to the OSI model.
Identification of the NIC (MAC addresses)
There are different methods, which can be seen in the sector of the identification of the NIC or the MAC address. The table, which is given below directly explains the different sector which is linked to the concept.
    Platform
    Method
    Windows NT/2000
    ipconfig/ all command
    Novell NetWare
    Run the config command.
    Windows 95/98/Me
    winipcfg untility
    Cisco Router
    s hint command
    Linux/some Unix
    Run the ifconfig – a command
Network card are smart devices
The network card can be stated as a devices which directly enhances the functionality which is linked to the sector of working. In this context, it can be stated that the network card is directly put as an USB device in the system, which directly creates network connectivity, which allows the sector of communication in the network.
The network card is considered as a smart device due to the factor that it directly gives access to the sector of connectivity, which enhances the network of the working devices (Deering & Hinden, 2017). In most of the recent computer, devices it can be stated that the network card is pre-installed which can be beneficial in a manner of enhanced functionality.
Media access control
The media access control can be considered as one of the sub layer, which is related to the OSI model. It main control aspect, which is related to the concept, is linked to the sector of the controlling of the different packets of information when it is being transferred from one area to another. It can be stated as one of the crucial activity, which can be directly linked to the sector of working...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here