Content Analysis ePortfolio Assignment ITECH1102 Networking and Security Content Analysis ePortfolio Assignment Overview This assignment has three major aims: · To help students gain a good...

my surname starts with m i am attaching all the other files with them.


Content Analysis ePortfolio Assignment ITECH1102 Networking and Security Content Analysis ePortfolio Assignment Overview This assignment has three major aims: · To help students gain a good understanding of all ITECH1102 theoretical and practical material. · To encourage students to use content analysis summaries to prepare for tests, examinations and to help their understanding of theoretical concepts. · To encourage students to conduct an independent investigation into networking related topics from books, the Internet and through practical investigation. Engagement with this assignment should help students to prepare for the laboratory test (10%) in week 7, the theory test (0%) in week 8 and the end of semester examination (60%). Timelines and Expectations Students are required to analyse the weekly lecture material of topics 1 to 8, based on the classification given in (a) and create concise content analysis summaries of the theoretical concepts contained in the course lecture slides. The content analysis for each topic should not exceed approximately four (4) A4 sides of the paper if those topics content were printed. In addition, students need to complete the selected questions from the problem sheet associated with each week from 1 to 8, based on the classification given in (b). The selected questions from the problem sheet are given in Appendix A. (a) Each student is required to submit the content from three topics. The specific topics depend on your surname: Surnames starting with A - G Topics 4, 6 & 8 Surnames starting with H - Z Topics 3, 5 & 7 (b) Each student is required to submit the solution to the questions (see Appendix A) from the problem sheet from three topics. The specific topics depend on your surname: Surnames starting with A - G Topics 3, 5 & 7 Surnames starting with H - Z Topics 4, 6 & 8 Where the lab content or information contained in technical articles from the Internet or books helps to fully describe the lecture slide content, discussion of such theoretical articles or discussion of the lab material should be included in the content analysis ePortfolio. Suggestions as to possible inclusions in your content analysis ePortfolio will appear in weekly Work Plan documents on Moodle. The ultimate aim of this assessment task is to help ITECH1102 students to fully comprehend the course material and hence help them to pass tests and the examination. Mahara ePortfolio Students are required to create their content analysis and problem sheet documentation as an ePortfolio in Mahara. Each week’s topic should be on a separate ePortfolio page in order to separate the content into logical sections. For Instance, if your surname starts with B, then your ePortfolio pages will be as follows: 1. ePortfolio problem sheet page for Topic 3 2. ePortfolio content analysis page for Topic 4 3. ePortfolio problem sheet page for Topic 5 4. ePortfolio content analysis page for Topic 6 5. ePortfolio problem sheet page for Topic 7 6. ePortfolio content analysis page for Topic 8 By the end of week 10 (due date) all students should submit their content analysis and problem sheet ePortfolio pages through Moodle for marking. All the steps required to create and submit the ePortfolio pages can be found at the following link: http://studyskills.federation.edu.au/technology/university-systems/mahara/ More guidelines on the use of Mahara ePortfolios is available in the Resources section of the ITECH1102 Moodle site. Learning Outcomes Assessed The following course learning outcomes are assessed by completing this assessment: · K1. Describe and explain the role and function of network connectivity in current computing. · K2. Describe and explain the principles of communication in networks. · K3. Describe the role and functionality of hardware and software entities that contribute to the network communications. · K4. Describe and explain the protocols and interactions that implement network communications. · K6. Describe fundamental aspects of cloud computing. · A1. Apply networking architecture knowledge to analyze the networking needs of business. Assessment Details All work submitted must be authored by the student submitting the work or where material from other sources is included it must be referenced using APA referencing. Students found to have plagiarised will be dealt with according to university regulations. Submission Students are required to submit their ePortfolio to Moodle by 5:00 pm on Friday 18th May 2018. Marking Guidelines Content precisely presented based on references for Content Analysis topics. 25 Marks Presentation (Layout, no grammatical errors and reads well etc.) for Content Analysis topics. 10 Marks Cited References in Content Analysis topics. 5 Marks Total marks for each Content Analysis ePortfolio Page 40 Marks Total marks for each Problem sheet ePortfolio Page with correction solution for each question. (Please note: All questions in Appendix A carries equal marks) 10 Marks In this assignment, each student will have to do three content analysis pages and three problem sheet pages. Based on this, the total marks for this assignment is 150 (= 40 x 3 + 10 x 3) and 15% Weighting for the course. The marks will be available in Moodle and in FDLMarks by the end of week 12 of the semester. Appendix A The following table list out the questions to be answered, in each problem sheet, for the topics from 3 to 8 Topic 3 Topic 4 Topic 5 Topic 6 Topic 7 Topic 8 Question 4 Question 5 Question 10 Question 5 Question 3 Question 5 Question 7 Question 7 Question 12 Question 8 Question 4 Question 8 Question 8 Question 19 Question 14 Question 14 Question 5 Question 9 Question 10 Question 20 Question 18 Question 15 Question 6 Question 10 CRICOS Provider No. 00103D Content Analysis ePortfolio Assignment.docx Page 1 of 3 CRICOS Provider No. 00103D Content Analysis ePortfolio Assignment.docx Page 2 of 3 Faculty of Science & Technology Networking and Security problems (Topic 3) Topic 3 Problems Describe the origins of the term Sneaker Net. Complete the following sentences with regard to networking roles: A Client is a …………………… of network services. A Server is a …………………… of network services. Describe the difference between Clients and Peers as the terms relate to networking. Describe why Peer to Peer networks are less than ideal for campus sized networks. Define the terms: IaaS SaaS Describe the differences between these three different cloud services mentioned in the lecture slides. You have just created an Application Layer client program that uses a new protocol (named ITECH1102) you have developed. Assuming it is a TCP/IP application show the structure of a Data Link frame. What is held in the first 12 bytes of the frame mentioned in the last question? Describe how the ping program works. Using LinuxLite and Wireshark, determine the size of all parts of a ping request frame. (Do this by capturing a ping packet that you generate from your Linux Lite machine). Use the Internet to determine more details about the Protocol that the Ping program uses. CRICOS Provider No. 00103D Page 1 of 1 Faculty of Science & Technology Topic 4 – Problem sheet Q1.Which of the following best describes the role of the Data Link layer: (Choose 1) (i)It deletes entries in the ARP cache (ii)It uses sockets to identify running applications (iii)It provides communication between locally networked devices (iv)It uses sequence numbers to maintain reliability (v)It is layer 3 of the TCP/IP model of networking [ 1 mark ] Q2.Which of the following statements about the Data Link layer are incorrect: (Choose the one or more incorrect statements) (i) The Data Link layer is the interface between the network layer and the physical media. (ii) The Data Link interface to the network is the Network Interface card. (iii) The Data Link layer provides multiplexing of multiple upper layer conversations to the physical media (iv) The Data Link uses the IP address for all communications. [ 1 mark ] Q3.Define the following Data Link acronyms: LLC……………………………………………………………………………………….. MAC……………………………………………………………………………………….. [ ½ + ½ = 1 mark ] Q4.Describe the main role of the Data Link LLC. [ 1 mark ] Q5.The LLC is sometimes described as providing a multiplexed service to upper layer protocols. Describe what this statement means and try to give an example of this in action. [ 2 marks ] Q6.What is the main role of the Media Access Control component of the Data Link Layer? [ 1 mark ] Q7.Describe why routers require at least 2 network cards. [ 1 mark ] Q8.How many binary bits constitute a MAC address? …………………………… [ 1 mark ] Q9.Describe the two constituent parts of a MAC address. [ 1 mark ] Q10.What Windows command will display the MAC address of your computers Ethernet network interface card? [ 1 mark ] Q11.What Linux command will display the MAC address of your computers Ethernet network interface card? [ 1 mark ] Q12.Network cards are said to be smart devices. Justify this statement. [ 1 mark ] Q13.Describe the process that leads to the detection of corrupted frame at the Data Link layer. [ 2 marks ] Q14.An Ethernet frame can contain each of the following: CRC Source MAC address FTP header IP header TCP header Destination MAC address Protocol Type Place the numbers 1 to 7 beside each part to show its order within the frame. Number 1 should indicate the first field in the frame. [ 2 marks for all correct ] Q15.How many bytes constitute the Source MAC address in an Ethernet frame? [ 1 mark ] Q16.How many Hexadecimal digits are required to specify an Ethernet broadcast address? …………………………………. Write that address in the space below. ……………………………………………….. [ 2 marks ] Q17.The following protocols can be categorised as either Controlled access or contention based access. Specify the category of each protocol. FDDI………………………………………………….. Token Ring………………………………………………….. WiFi………………………………………………….. Ethernet………………………………………………….. [ 2 marks ] Q18.Describe how each of the following work: The CSMA/CD protocol of Etherenet The CSMA/CA protocol used in WiFi Token Ring (Note – use the internet to investigate each as required) [ 4 marks ] Q19.Describe when entries are added and removed from the ARP cache. [ 2 marks ] Q20.As a Data Link frame moves through an internetwork the Ethernet frame header is modified at each step. Describe why this must happen at each router. [ 2 marks ] Q21.The number of entries in the ARP cache changes with time. Describe the events that lead to the addition of entries to the cache and events that lead to the removal of ARP cache entries. You discussion should also describe how a ping to a remote address (eg. www.google.com) will affect the arp cache and why. [ 2 marks ] Q22.Describe how to generate an ARP request and reply from your Linux Lite machine. [ 1 mark ] Q23.Generate and capture an ARP request and associated reply. From these packets determine the following: The contents
May 15, 2020ITECH1102
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here