Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview This assignment has three major aims: · To help students gain good understanding of all ITECH1102...

1 answer below »
here are 3 topic on my surenametransport layer(layer 4), datalink layer(layer 2) and internet(network) layer



Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview This assignment has three major aims: · To help students gain good understanding of all ITECH1102 theoretical and practical material. · To encourage students to use content analysis summaries to prepare for tests, examinations and to help their understanding of theoretical concepts. · To encourage students to conduct independent investigation into networking related topics from books, the Internet and through practical investigation. Engagement with this assignment should help students to prepare for the laboratory test (10%) in week 7, the theory test (0%) in week 8 and the end of semester examination (60%). Timelines and Expectations Students are required to analyse three topics based on students’ surname from the weekly lecture material of topics 1 to 8 and create concise content analysis summaries of the theoretical concepts contained in the course lecture slides. The content analysis for each topic should not exceed approximately five (5) A4 sides of paper if that topics content were printed. Where the lab content or information contained in technical articles from the Internet or books helps to fully describe the lecture slide content, discussion of such theoretical articles or discussion of the lab material should be included in the content analysis. Suggestions as to possible inclusions in your content analysis will appear in weekly Work Plan documents on Moodle. The ultimate aim of this assessment task is to help ITECH1102 students to fully comprehend the course material and hence help them to pass tests and the examination. By the start of week 10 all students should have completed their content analysis for three topics based on the surname. Learning Outcomes Assessed The following course learning outcomes are assessed by completing this assessment: · K1. Describe and explain the role and function of network connectivity in current computing. · K2. Describe and explain the principles of communication in networks. · K3. Describe the role and functionality of hardware and software entities that contribute to network communications. · K4. Describe and explain the protocols and interactions that implement network communications. · K6. Describe fundamental aspects of cloud computing. · A1. Apply networking architecture knowledge to analyze the networking needs for business. Assessment Details At the start of week 10 details will be available in the assessment section of Moodle as to the specific topics each student must submit. All work submitted must be authored by the student submitting the work or where material from other sources is included it must be referenced using APA referencing. Students found to have plagiarised will be dealt with according to university regulations. The specific topics depends on your surname: · Surnames starting with A - G     Topics 4,5 & 6 · Surnames starting with H - Z     Topics 4,6 & 8 Submission Students are required to submit a Microsoft word or pdf file to Moodle by 11.55pm on Sunday 27th Jan 2019. Marking and Marking Guidelines Marks will be available in Moodle and in FDLMarks by the end of week 12 of semester. Students required working on three topics marking guide for each topic is as follows: Content precisely presented based on references 10 Marks Presentation (Layout, no grammatical errors, reads well, etc.) 3 Marks Cited references 2 Marks Total marks for each topic 15 Marks Total marks for three topics 45 Marks Total mark for this assignment 15 Marks CRICOS Provider No. 00103D Content Analysis Assignment.docx Page 1 of 2 CRICOS Provider No. 00103D Content Analysis Assignment.docx Page 2 of 2
Answered Same DayJan 16, 2021ITECH1102

Answer To: Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview...

Deepa answered on Jan 21 2021
140 Votes
CONTENT ANALYSIS
OSI model is a standard model which is used as a medium for the telecommunication between two nodes. In this model, there are seven layers. They are physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer. Each layer has its own function for network communication and administration. The analysis is about the transport layer, data link layer and network layer.

TRANSPORT LAYER
The fourth layer in the OSI model is the transport layer. This layer is responsible for creating a data packets and sending to the receiver with the acknowledgement. It is well known for its end to end communication. This means it checks whether the sent packet is received by the receiver or not. If the packet is not sent then the error message is sent to the sender for resending the packet. This layer provides reliable communication. It acts as an interface between the previous and next layers in the OSI model. In this layer, two protocols such as TCP (Transmission control protocol) and UDP (User Datagram Protocol) are used.
TCP
Transmission Control Protocol or Internet protocol is used for communicating the devices with the internet. It can be used in a private network such as intranet or extranet. In TCP/IP, client and server communication is used. They classify the mechanism into stateless and stateful.
In stateless, there is no particular time for sending and receiving the message and the client can send the packets continuously without the authentication from the receiver.
In stateful, the client sends the packets to the receiver and waits for the packet to be received at the destination. If the packet is not received then it is retransmitted.
There are four layers in the TCP/IP model
· Application layer
· Transport layer
· Internet layer and
· Network access layer
APPLICATION LAYER
The functions of the session layer, presentation layer and application layer in the OSI model is performed in a single layer called application layer in the TCP/IP. The protocols used in this layer are HTTP and HTTPs, File Transfer Protocol, TFTP, Telnet, Secure Shell, Network Time protocol, Simple Message Transfer Protocol and Domain Name Server.
HTTP (Hypertext transfer protocol) is a communication protocol between the server and the browser.
HTTPs stand for Secured-HTTP. In this protocol secure socket layer is combined with HTTP to give secured HTTP.
File Transfer Protocol is used for transferring the files between the client and the server.
Simple Mail Transfer Protocol is used for transferring the mail.
Secure shell is used for establishing the secure TCP/IP connection.
Network Time Protocol is used for synchronizing the time in the computer using the network.
TRANSPORT LAYER
Transport layer performs the end to end and reliable communication. There are two protocols that are used in the transport layer.
TCP:
It is reliable, end-to-end and error-free communication. The sequence and segmentation of data are also performed. The most important feature of TCP is acknowledgement and data flow control. It has many advantages but leads to high cost when overhead is high.
UDP
This protocol does not have reliable communication since there is no acknowledgement feature. It is not connection-oriented protocol. It has no such features similar to TCP.
INTERNET LAYER
In this layer, the function of the network layer in the OSI model is performed. This layer is responsible for the logical transfer of data in the network. The protocols used in this layer are
Internet Protocol is used for sending the packets from the source to the destination using the IP address. There are two versions in IP. They are IPv4 and IPv6.the most commonly used IP is IPv4. The growth of the IPv6 is determined by the minimum number of IPv4 users.
Internet Control Message Protocol is used for sending the information related to the network problems.
Address Resolution Protocol is used for finding the address of the hardware with the help of the IP address. There are many types such as RARP, PARP and IARP.
NETWORK ACCESS LAYER
In this layer, the data link layer and the physical layer of the OSI model is combined. It is used for addressing the hardware and transmission of data. The protocol used in this layer is the Address Resolution Protocol for addressing the hardware.
UDP
User Datagram Protocol is a connectionless communication. It sends datagram as a message. If the network connection is to be established with the low latency UDP can be used. This performs...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here