Content Analysis ePortfolio Assignment ITECH1102 Networking and Security Content Analysis ePortfolio Assignment Overview This assignment has three major aims: · To help students gain a good...

1 answer below »
content analysis file you have last problem appendix those problem questions I have attached in the file


Content Analysis ePortfolio Assignment ITECH1102 Networking and Security Content Analysis ePortfolio Assignment Overview This assignment has three major aims: · To help students gain a good understanding of all ITECH1102 theoretical and practical material. · To encourage students to use content analysis summaries to prepare for tests, examinations and to help their understanding of theoretical concepts. · To encourage students to conduct an independent investigation into networking related topics from books, the Internet and through practical investigation. Engagement with this assignment should help students to prepare for the laboratory test (10%) in week 7, the theory test (0%) in week 8 and the end of semester examination (60%). Timelines and Expectations Students are required to analyse the weekly lecture material of topics 1 to 8, based on the classification given in (a) and create concise content analysis summaries of the theoretical concepts contained in the course lecture slides. The content analysis for each topic should not exceed approximately four (4) A4 sides of the paper if those topics content were printed. In addition, students need to complete the selected questions from the problem sheet associated with each week from 1 to 8, based on the classification given in (b). The selected questions from the problem sheet are given in Appendix A. (a) Each student is required to submit the content from three topics. The specific topics depend on your surname: Surnames starting with A - G Topics 4, 6 & 8 Surnames starting with H - Z Topics 3, 5 & 7 (b) Each student is required to submit the solution to the questions (see Appendix A) from the problem sheet from three topics. The specific topics depend on your surname: Surnames starting with A - G Topics 3, 5 & 7 Surnames starting with H - Z Topics 4, 6 & 8 Where the lab content or information contained in technical articles from the Internet or books helps to fully describe the lecture slide content, discussion of such theoretical articles or discussion of the lab material should be included in the content analysis ePortfolio. Suggestions as to possible inclusions in your content analysis ePortfolio will appear in weekly Work Plan documents on Moodle. The ultimate aim of this assessment task is to help ITECH1102 students to fully comprehend the course material and hence help them to pass tests and the examination. Mahara ePortfolio Students are required to create their content analysis and problem sheet documentation as an ePortfolio in Mahara. Each week’s topic should be on a separate ePortfolio page in order to separate the content into logical sections. For Instance, if your surname starts with B, then your ePortfolio pages will be as follows: 1. ePortfolio problem sheet page for Topic 3 2. ePortfolio content analysis page for Topic 4 3. ePortfolio problem sheet page for Topic 5 4. ePortfolio content analysis page for Topic 6 5. ePortfolio problem sheet page for Topic 7 6. ePortfolio content analysis page for Topic 8 By the end of week 10 (due date) all students should submit their content analysis and problem sheet ePortfolio pages through Moodle for marking. All the steps required to create and submit the ePortfolio pages can be found at the following link: http://studyskills.federation.edu.au/technology/university-systems/mahara/ More guidelines on the use of Mahara ePortfolios is available in the Resources section of the ITECH1102 Moodle site. Learning Outcomes Assessed The following course learning outcomes are assessed by completing this assessment: · K1. Describe and explain the role and function of network connectivity in current computing. · K2. Describe and explain the principles of communication in networks. · K3. Describe the role and functionality of hardware and software entities that contribute to the network communications. · K4. Describe and explain the protocols and interactions that implement network communications. · K6. Describe fundamental aspects of cloud computing. · A1. Apply networking architecture knowledge to analyze the networking needs of business. Assessment Details All work submitted must be authored by the student submitting the work or where material from other sources is included it must be referenced using APA referencing. Students found to have plagiarised will be dealt with according to university regulations. Submission Students are required to submit their ePortfolio to Moodle by 5:00 pm on Friday 18th May 2018. Marking Guidelines Content precisely presented based on references for Content Analysis topics. 25 Marks Presentation (Layout, no grammatical errors and reads well etc.) for Content Analysis topics. 10 Marks Cited References in Content Analysis topics. 5 Marks Total marks for each Content Analysis ePortfolio Page 40 Marks Total marks for each Problem sheet ePortfolio Page with correction solution for each question. (Please note: All questions in Appendix A carries equal marks) 10 Marks In this assignment, each student will have to do three content analysis pages and three problem sheet pages. Based on this, the total marks for this assignment is 150 (= 40 x 3 + 10 x 3) and 15% Weighting for the course. The marks will be available in Moodle and in FDLMarks by the end of week 12 of the semester. Appendix A The following table list out the questions to be answered, in each problem sheet, for the topics from 3 to 8 Topic 3 Topic 4 Topic 5 Topic 6 Topic 7 Topic 8 Question 4 Question 5 Question 10 Question 5 Question 3 Question 5 Question 7 Question 7 Question 12 Question 8 Question 4 Question 8 Question 8 Question 19 Question 14 Question 14 Question 5 Question 9 Question 10 Question 20 Question 18 Question 15 Question 6 Question 10 CRICOS Provider No. 00103D Content Analysis ePortfolio Assignment.docx Page 1 of 3 CRICOS Provider No. 00103D Content Analysis ePortfolio Assignment.docx Page 2 of 3
Answered Same DayMay 15, 2020ITECH1102

Answer To: Content Analysis ePortfolio Assignment ITECH1102 Networking and Security Content Analysis ePortfolio...

Dr answered on May 16 2020
147 Votes
TOPIC 4
5. The LLC is sometimes described as providing a multiplexed service to upper layer protocols.
Solution: Logical Link Control (LLC) is a sub layer of the data link layer of OSI reference model. At network layer such as at layer 3 there are so many different protocols such as Internet Protocol (IP), IPX, ARP etc used. When network layer packet of protocol comes to data link layer LCC sub layer th
en as per the protocol of network layer it is required to create frames and multiplex the frame. This multiplexing is taken by LCC sub layer by adding the header Layer 3 protocol type in the LLC header.
Similarly, when the a frame is received from physical layer then LLC looks first the Layer 3 protocol associated with the frame. After that LLC de-multiplex the frame and creates datagram of the appropriate Layer 3 protocol.
For example, IP datagram is currently of a node is receiving the packets from a web host and same node is receiving the ARP reply from its LAN host. Hence, there are 2 different categories of Layer 3 protocols frames are received by node. Here, in this case the node LLC de-multiplex the frames to create datagram for upper layer such as network layer with the received frame upper layer header detection for IP and ARP.
7. Describe why routers require at least 2 network cards.
Solution: A router is network layer device connects two different physical networks. It means that a LAN is connected by router through switch and router again connects another networks. Thus, there are two interfaces for a router is mandatory otherwise if there is one interface then there is no role of router as it forwards the packets of a network to another network. Hence, one interface requires a network card for one end and another interface requires another network card for other end to connect the network for forwarding the packets. Therefore, two network cards must be with a router.
19. Describe when entries are added and removed from the ARP cache.
Solution: When a host sends the ARP request packet to another host of LAN and receiving host reply to the ARP request by ARP reply message to sender host. Now, the sender host ARP module adds the 48 bit MAC address to IP address mapping present with the ARP reply message into the ARP cache.
There is pre-determined time for the deletion or removal of 48 Bit MAC address with the corresponding IP address from the ARP Cache. This pre-determined time is 20 minutes. Hence, when 20 minutes of an ARP entry expires then that ARP entry is removed from the ARP cache.
20. As a Data Link frame moves through an internetwork the Ethernet frame header is modified at each step. Describe why this must happen at each router.
Solution: A data link frame is an Ethernet frame which contains the MAC address. In the Internetworking, routers are responsible to forwards the packets from one network to another router or in destination network router. When a router receives the packet then it must has to remove the L2 header such as Ethernet frame header present in the packet to check the destination address. Without knowing the destination IP address of the packet router will not be able to forward the packet so that it is necessary to remove the Ethernet header information from the receive packet on each of the router. Thus, the removal of Ethernet header information from the packet is mandatory for each of the router to get the packet destination address to route the packet at appropriate link.
TOPIC 6
5. How many bits are used in a UDP header to store the destination port number? Explain how you arrived at this number.
Solution: An UDP header is 32 byte long and there are two different ports addresses available with the UDP header. These two header port addresses are Source port address and destination port address. 2 byte or 16 bits are used for destination port address in the UDP header.
This is obtained as the source port address is 16 bits or 2 byte long and total header length is 32 bits or 4 bytes. It is also fact that there are only two port addresses in first row of UDP...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here