Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview This assignment has three major aims: · To help students gain good understanding of all ITECH1102...

1 answer below »
i need my assignment at time.


Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview This assignment has three major aims: · To help students gain good understanding of all ITECH1102 theoretical and practical material. · To encourage students to use content analysis summaries to prepare for tests, examinations and to help their understanding of theoretical concepts. · To encourage students to conduct independent investigation into networking related topics from books, the Internet and through practical investigation. Engagement with this assignment should help students to prepare for the laboratory test (10%) in week 7, the theory test (0%) in week 8 and the end of semester examination (60%). Timelines and Expectations Students are required to analyse the weekly lecture material of weeks 1 to 8 and create concise content analysis summaries of the theoretical concepts contained in the course lecture slides. The content analysis should not exceed six (6) A4 sides of paper. Where the lab content or information contained in technical articles from the Internet or books helps to fully describe the lecture slide content, discussion of such theoretical articles or discussion of the lab material should be included in the content analysis. Suggestions as to possible inclusions in your content analysis will appear in weekly Work Plan documents on Moodle. The aim of this assessment task is to help ITECH1102 students to fully comprehend the course material and hence help them to pass tests and the examination. Learning Outcomes Assessed The following course learning outcomes are assessed by completing this assessment: · K1. Describe and explain the role and function of network connectivity in current computing. · K2. Describe and explain the principles of communication in networks. · K3. Describe the role and functionality of hardware and software entities that contribute to network communications. · K4. Describe and explain the protocols and interactions that implement network communications. · K6. Describe fundamental aspects of cloud computing. · A1. Apply networking architecture knowledge to analyse the networking needs for business. Assessment Details All work submitted must be authored by the student submitting the work or where material from other sources is included it must be referenced using APA referencing. Students found to have plagiarised will be dealt with according to university regulations. Submission Students should submit a single word or pdf file. By the start of Week 10, all students should have completed their content analysis. Students are required to submit their content analysis to Moodle by Friday, October 19, 2018, 17:00. Marking Marks will be available in Moodle and in FDLMarks by the end of week 12 of semester. Marking Guidelines Content precisely presented based on references 20 Marks Presentation (Layout, no grammatical errors, reads well, etc.) 5 Marks Cited references 5 Marks Total marks for content analysis assignment 30 Marks Total worth 15 Marks CRICOS Provider No. 00103D Content Analysis ePortfolio Assignment.docx Page 1 of 2 CRICOS Provider No. 00103D Content Analysis ePortfolio Assignment.docx Page 2 of 2 PowerPoint Presentation ITECH1102 Networking and Security Week 2 – Packet Switching & Network Models 1 ITECH1102 Networking & Security 2 Last week Assessment: Course Description Expectations (10 – 12 hours per course per week) Good idea to create a deadline calendar (Include all assessment tasks) Type A/B assessments [Students must get an overall pass in Type B assessments] Hence all students need to fully understand content to be able to answer test/exam questions. Investigated simple eBay purchase Significant technologies involved (we just looked at technology of Cat 6 cables). Number systems Decimal, Binary, Hexadecimal, Octal 2 ITECH1102 Networking & Security 3 This week – overview of content Discuss operation of basic networking hardware: Network Interface Card Hubs/switches/routers Investigate different networks: Home network Campus network (Example: University type network) The Internet Investigate two reference models of networking: The Internet Model (TCP/IP model) OSI Reference Model 3 ITECH1102 Networking & Security 4 Circuit switches vs Packet Switched networks In Circuit Switched networks a dedicated channel is established prior to data being sent. The best example of a circuit switched network is the Plain Old Telephone System (POTS) as used in many businesses and homes. Once the circuit is established, you and the person on the other end of the telephone effectively have a wire connecting both telephones for the duration of the telephone call. This course however is primarily concerned with Packet Switched networks. 4 ITECH1102 Networking & Security 5 Some history of Packet Switched Networks The US defence forces required a communications network that could withstand any part of the network being obliterated by enemy attack. The concern was that in the face of thermo-nuclear warfare their communications could be rendered useless if critical parts were bombed by the enemy. To this end DARPA (Defence Advanced Research Projects Agency) was given the responsibility of creating a network that could withstand such disruption. Using a circuit switched communication the bomb(s) could destroy the phone line. Using a packet switched network packets could be routed around the bombed bits! 5 ITECH1102 Networking & Security 6 Conception of packet switching In the 1960’s the concept of switching small blocks of data (packet switching) was conceived independently in both the USA and in the UK. The individuals involved were: Paul Baran at the RAND corporation in the USA. Donald Davies at the National Physics Laboratory (NPL) in the UK. Davies subsequently incorporated packet switching into the NPL network. 6 ITECH1102 Networking & Security 7 ARPANET (Advanced Research Projects Agency Network) The ARPANET was an early packet switched network that incorporated both packet switching and TCP/IP protocols. Both these technologies underpin the Internet. Funding for the ARPANET came from the US Defence Research Projects Agency. Implementation required the development of devices that could switch packets between networked machines. DARPA sent out a request for quotation for such switching devices. 7 ITECH1102 Networking & Security 8 Interface Message Processors (IMPs) The company contracted to build the network (BBN Technologies) delivered the first IMP to UCLA on 30th August 1969. An IMP was the first implementation of a device that could perform the duties of today’s Internet ROUTERS. From this early start the Internet has developed into the ubiquitous packet switched internetwork of networks that underpins so much of our lives today. 8 ITECH1102 Networking & Security 9 Packet fragmentation and reassembly The network infrastructure of the Internet can only handle relatively small packets of data (up to 1500 bytes in length). The basic concept of packet switching relies on the fragmentation and reassembly of packets. Large messages at the source must be broken up into manageable sized packets for transportation to the destination, each packet free to “find its own way” At the destination reassembly of packets is therefore required. Any given packet might have been unavoidably delayed! Damaged packets or network congestion can cause packets to be lost or delivered out of sequence, hence packet switched networks require mechanisms to deal with such events. We will discuss these issues later in associated sections of ITECH1102. 9 ITECH1102 Networking & Security 10 Packet switching – where is it used Packet switching is used on: Small home networks (WiFi or cable connected) Larger networks (business/university networks) On the Internet (from source (your home PC) to remote resources (web servers)) Mobile telephone systems But how are all these devices interconnected? 10 ITECH1102 Networking & Security 11 Basic networking hardware Network interactions involve 2 or more devices. (Example PC and web server (eBay)) To facilitate networking each device needs a Network Interface Card (NIC) that can be uniquely distinguished from other Network interface cards. Ethernet NIC WiFi Bluetooth Token Ring NIC (old technology) Fibre channel Interface cards Others The NIC transmits and receives (binary) data to and from network media. 11 ITECH1102 Networking & Security 12 Network hub (Ethernet) Ethernet Hubs can be used to connect multiple devices to facilitate data exchange. (4, 8 & 24 port devices were common) Hub traffic from any port is broadcast to all other ports. Hubs are seldom used today (switches are preferred). (Hubs can however be useful for monitoring network traffic) 12 ITECH1102 Networking & Security 13 Network Switch (Ethernet) Network Switches are smart devices. They learn the ports to which each device is connected. Incoming traffic is directed to the specific port of the destination device. Switches find wide usage in today’s networks. The photo shows three switches and associated cabling of a Fed Uni switchroom. 13 ITECH1102 Networking & Security 14 Routers Unlike PC’s and Servers that normally only have one Network card (NIC), Routers have at least two network cards. Routers are networking devices that allow one network to communicate with at least one other network and hence require multiple NIC’s. Routes are the devices that provide Internet connectivity. 14 ITECH1102 Networking & Security 15 Routers connecting two populated networks Router 1 is connected to Network 1 & Network 3 (two NIC’s) Note - the path between populated networks is a network itself. 15 ITECH1102 Networking & Security 16 Reference networks The following three slides show networks layouts that we will refer to frequently throughout the course to demonstrate various networking technologies. Reference networks: Home or small business network Large campus network (for instance the Federation University network) The Internet Many details are missing from these reference networks, such detail will be discussed as we cover associated technologies. 16 ITECH1102 Networking & Security 17 Home or small business network Home networks connect: Personal computers (PC) Tablets Printers Internet TV’s Game consoles Phones Fridge Security camera Etc, etc – the upcoming Internet of Things (IOT) 17 ITECH1102 Networking & Security 18 Common technologies employed The most common technology used in domestic environments is WiFi. Advantages include: Simple connectivity Data is encrypted Low power transmissions Ethernet connectivity is also popular in homes and small businesses. 18 ITECH1102 Networking & Security 19 Reference Home or small business network Home or small Business Network: Such networks typically include: - Internet Access - WiFi connectivity - Ethernet switch - Printer - TV - PC - Tablets - Notebook computers - Mobile Phones - Game consoles - other devices 19 ITECH1102 Networking & Security 20 Campus network (Eg. Fed Uni network) Class Exercise – Form into groups and discuss extra functionality required on campus type networks. Possible answers: Servers, including File Servers, Video streaming servers, email, Learning Management Systems (Moodle), Web Servers, Printers, Faxes, Application servers, Internet firewalls. The network is likely to be divided into multiple sub-networks at different locations separated by routers. For instance the Fed Uni network connects separate locations (sub-networks) together as one network. 20 ITECH1102 Networking & Security 21 Reference Campus network Campus type network Attributes include: Multiple sub-networks (Eg. Mt Helen, Gippsland, SMB, Berwick) Connection to the Internet User devices like PCs, Printers, phones, scanners, faxes etc. in each subnet Various server in each subnet, including: File servers Database server Application servers DHCP, DNS, LDAP servers Learning Management servers Video servers Routers connection the different subnets (Mt Helen) (Gippsland) (Berwick) 21 ITECH1102 Networking
Answered Same DayJan 09, 2021ITECH1102

Answer To: Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview...

Deepti answered on Jan 13 2021
147 Votes
Content Analysis
ITECH 1102    Networking and Security    
Table of Content
1. Introduction
2. Packet Switching and Network Models
2.1. Uses
2.2. Basic Networking Hardware
2.3. OSI Model
2.4. TCP/IP Model
2.5. Models Comparison
3. Application Layer
3.1. Client-Server Architecture
3.2. P2P Architecture
3.3. Host Based Architecture
3.4. Cloud Architecture
4. Data Link Layer
4.1. NIC
4.2. Ethernet Frame Format
4.3. MAC Sublayer
4.3.1. CSMA/CA
4.3.2. CSMA/CD
5. Network Layer
5.1. Features
5.2. ARP
5.3. IP Addressing
5.3.1. IPv4
5.3.2. IPv6
5.4. Subnet Mask
5.5. Domain Name System
5.6. Router’s Role

6. Transport Layer
6.1. Segmentation and Reassembly (SAR)
6.2. Transport Layer Services:
6.2.1. UDP (unreliable service)
6.2.2. TCP (reliable transport service)
6.3. TCP connections
6.4. Flow Control
7. Physical Layer
7.1. Analog & Digital Data
7.2. Manchester Encoding
7.3. Transmission Media
8. References    
1. Introduction
Networking and Security introduces networking technologies and models through which various devices can be connected to a network and can communicate with each other and with different networks in a secure environment. The content analysis in this report discusses all the major aspects of a network, types of architecture which may be selected in building a network and basic hardware required to build them. The analysis majorly elaborates the OSI model of networking with clear details on each layer of the model.
2. Packet Switching and Network Models
The course gives insight on the how the packets and packet switching serves crucial role in making a network model work successfully. With short sized packets, the communication links in between the nodes may be allocated for shorter time periods for a single message transfer during the transmission of single packet thus not requiring a dedicated communication line for transfer. The process of breaking down the communication into packets facilitates many users to share the same data path in the network. Such communication is known as connectionless communication. For example, the internet is a connectionless network. Most of its traffic uses packet switching technique. Contrary to packet switching, another technique where message transfer requires a dedicated communication line such that the resources remain unavailable to other users is circuit switching. For example, telephone network. In 1969, ARPANET (DARPA, 2020) demonstrated sharing of digital resources without depending on demographics of the computers. This caused the revolution of the internet with further development of routers by ARPANET, first built in 1968 in collaboration with BBN Technologies.
2.1. Uses: Packet switching allows the network to be used efficiently. It makes high data transmission easy through the concept of broken bits of a message. Unlike circuit switching, where users are charged for the duration as well as distance of connection, packet switching charges users only for the duration for which the connection is made for transmission. Thus, the latter is used for small and large business networks, home networks and even for telecommunication. An efficient business network requires efficient data communication, access to data from remote sites, low operating costs among the servers, printers, workstations, fax machines and IP phones of the business.
2.2. Basic networking hardware: The basic hardware required for establishing a network requires certain essentials. Two computers simply connected with an ethernet cable can’t serve the purpose. The computers should have sending and receiving wires reversed in order to allow successful communication. This is accomplished by using a switch or hub. The hubs are becoming extinct. The online source (Posey, 2006) shows a switch referred below. Better than a hub, a switch initiates a dedicated logical path between two computers through the use of internal logic circuits, thus allowing the computers to send and receive data without collision.
Figure: Switch referred from (Posey, 2006)
Routers are another basic essential component required to set up a network. It analyses the data and dispatches it through best possible path over the network. Routers connect several networks and their PCs together over a single internet connection thus making it cost effective. Routers further contribute to data protection from security threats. Additional features of routers include router with virtual private network, firewall, IP communication system, etc. (Cisco, 2020)
2.3. OSI Model: Open System Interconnection model is based on the concept of dividing the communication into seven layers stacked one above the other. Each layer is responsible for specific task and remains cognizant with the previous and next layers. This model has become the universal model for computer networking. First, the physical layer transmits raw bit stream of data over the physical medium. Second, data link layer fixes the format of the data on the network. Third, network layer decides which physical path should be taken by the data. Fourth, transport layer performs data transmission using TCP and UDP protocols. Fifth, session layer manages connections and controls sessions and ports. Sixth, presentation layer ascertains that the data in usable format is available for encryption. The last, application layer is the interaction layer of computer with human, where applications access network services.
2.4. The Transfer Control Protocol/Internet Protocol Model: This model allows the application layer to send large amount of data over the network by sending segmented data to transport layer for TCP or UDP. TCP makes it possible by establishing connection through three-way handshake. It first establishes a virtual circuit between source and destination. Then it splits the data into data chunks called segments and sends them to the internet layer. Each segment has a header. The internet layer adds the source IP and destination IP to this header completing it into a packet.
2.5. Models Comparison: The (Oracle, 2019) depicts clear relation between the layers of the two models as shown below:
    OSI Reference Layer Number
    OSI Layer Equivalent
    TCP/IP Layer
    TCP/IP Protocol...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here