Answer To: Content Analysis Assignment ITECH1102 Networking and Security Content Analysis Assignment Overview...
Soumi answered on Jan 25 2021
Running Head: CONTENT ANALYSIS ASSIGNMENT 1
CONTENT ANALYSIS ASSIGNMENT 14
ITECH1102 NETWORKING AND SECURITY
CONTENT ANALYSIS ASSIGNMENT
Table of Contents
Topic 4 – The Data Link Layer (Layer 2) [Network Interface] 3
References for Topic 4 6
Topic 5 – The Internet (Network) layer 7
References for Topic 5 10
Topic 8 – Cloud Computing & Mobile 11
References for Topic 8 14
Topic 4 – The Data Link Layer (Layer 2) [Network Interface]
The Application Layer of the networking architecture facilitates the interaction of end users with the services with the help of the access of network. There are multiple services by which the end user gets interacted. Users could remotely log in from host to client computer and vice versa with the help of Hyper Text Transfer Protocol (HTTP / http). Post Office Protocol (POP) enables user to send and receive emails from any email server. File Transfer Protocol (FTP) is user to download or upload files from any FTP server (Gai, Qiu, Tao & Zhu, 2016).
For example, the user wants to access a web page using Firefox. Firstly, user would enter the URL in the browser. Here, the Application Layer initiated the HTTP request. Secondly, the Transport Layer handles the HTTP request. Thirdly, the host and the server address are monitored by the Network Layer. Lastly, the Data Link layer divides the information in frames to be sent to the desired address. Users get to see the desired the web page when the reverse process takes place at the server end.
The provided topic on data link layer presents a clear idea on the networking architecture. As mentioned by Al-Jemeli and Hussin (2015), Data Link layer facilitates the transmitting and receiving of packets. The layer also facilitates LLC processing and MAC addressing. However, as argued by Haleplidis et al. (2015), this layer could be termed as Hop-to-Hop communication as it would only communicate with its local network. Data link layer acts as the interface for the Network and the Physical Layer.
This layer comprises of two parts-
a) Logical Layer Link (LLC): LLC is responsible for the transmission of data between computers on a network.
b) Media Access Control (MAC): It facilitates the instruction for unique addressing and access control from node to node.
The Data Link layer is implemented in software and hardware with the help of Network Interface Card (NIC). NIC facilitates the connection of the computer or printer to the internet. Every NIC have a unique 48-bit MAC address by the manufacturer. Here, the Data Link layer identifies the host and the client address to exchange data for communication. MAC address could be checked on the computer by running the command ipconfig/all for Windows system and ifconfig for Linux system. As mentioned by Shang et al, (2016), NIC performs Cyclic Redundancy Check (CRC), which helps in reducing the error in transmission of the data. To identify the erroneous, each frame is attached by a 32-bit Frame Check Sequence. Each frame contains packets. Thereby, to identify individual packets, the destination and source MAC addresses needs to be identified. The packets could be traced by the software Wireshark for administrating the network.
As stated by Bello, Zeadally and Badra (2017), MAC sub layer is manages the addressing and channel control between to node in a network. For example, network on a Wi-Fi, which is a shared media, categorised as controlled access and contention based access. Control access is basically transmission done only at a time while in contention based media access, collision occurs if transmission is done simultaneously. Here, the protocols being followed are CSMA/CD and CSMA/CA.
CSMA/CD protocol
Enunciated by Aijaz, Dohler, Aghvami, Friderikos and Frodigh (2017), this protocol is used by Ethernet that connect devices, which are in a network. It works in three steps to detect the collision. Firstly, it is done by carrier sense followed by multiple access of devices in the same network. Lastly, detect the collision. However, if a collision occurs, then both devices would wait for some instance for retransmission.
CSMA/CA protocol-
In this protocol, the network traffic is increased as the signal is being sent to the given network before sending the real data. This is done to look for any collision to take place (if any) and inform other devices to stop transmitting for some instance.
In all this transmission and reception of the date, the address of either devices has to be identified at first. Address Resolution Protocol (ARP) helps to identify MAC address of the devices connected on a network. As discussed by Cziva, Jouet, Stapleton, Tso, and Pezaros (2016), ARP tables are created by Linux and Windows system, which comprises of MAC and IP addresses of the devices communicated. The NIC looks in the ARP table for the MAC and IP address of the device that needs to be connected if not found then if would broadcast to the network for the new device to record it in the table.
References for Topic 4
Aijaz, A., Dohler, M., Aghvami, A. H., Friderikos, V., & Frodigh, M. (2017). Realizing the tactile internet: Haptic communications over next...