Prepared by: Dr Wanod Kumar XXXXXXXXXXModerated by: Dr Mohammad Mohammad T1, 2021 Assessment Details and Submission Guidelines Trimester T1 2021 Unit Code BN106 Unit Title Networking Fundamentals...

1 answer below »
BN106


Prepared by: Dr Wanod Kumar Moderated by: Dr Mohammad Mohammad T1, 2021 Assessment Details and Submission Guidelines Trimester T1 2021 Unit Code BN106 Unit Title Networking Fundamentals Assessment Type Assignment 1-Individual Assessment Assessment Title Networking Basics (Assignment one) Purpose of the assessment (with ULO Mapping) This assignment assesses the basic concepts of networking; students should be able to demonstrate their achievements in the following unit learning outcomes: a. Explain the principles of networking protocols and standards; b. Identify reference models and layered architectures in networking Weight Total Weight of the Assignment 1 is 15%.  Assignment 1-Part A: 5%  Assignment 1-Part B: 10% Total Marks  Assignment 1-Part A: 20 Marks  Assignment 1-Part B: 45 Marks Word limit  Assignment 1-Part A: 500 Words  Assignment 1-Part B: 1000 Words Due Date  Assignment 1-Part A: Sunday 11/04/2021 (Week 3)  Assignment 1-Part B: Thursday 06/05/2021 (Week 7) Submission Guidelines  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: https://www.mit.edu.au/about-us/governance/institute-rules-policies- and-plans/policies-procedures-and-guidelines/assessment-policy Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: https://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/AcademicIntegrityPolicyAndProcedure. For further information, please refer to the Academic Integrity Section in your Unit Description. https://www.mit.edu.au/about-us/governance/institute-rules-policies-and-plans/policies-procedures-and-guidelines/assessment-policy https://www.mit.edu.au/about-us/governance/institute-rules-policies-and-plans/policies-procedures-and-guidelines/assessment-policy https://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/AcademicIntegrityPolicyAndProcedure https://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/AcademicIntegrityPolicyAndProcedure BN106 Networking Fundamentals Page 2 of 4 Prepared by: Dr Wanod Kumar Moderated by: Dr Mohammad Mohammad T1, 2021 Assignment Description Assignment 1 is divided into two parts. Part A focuses on communication networks and Part B is about network architectures. A. Communication Networks In this part of the assignment, the student must demonstrate their understanding of common communication networks with suitable diagrams by answering the following topics: 1. James is working from home using a microcomputer, a DSL modem, and a telephone connection to the internet. His company is connected to the Internet and has both local area networks and a mainframe computer. List and discuss the different network connections in this operation. 2. Emma is sitting in the lobby of her hotel. She is accessing her email using her laptop connected to the wireless network available in the hotel. Identify and discuss communication in this scenario. 3. With her new cell phone, Isabella has just taken a snapshot of the Sydney Opera House. Same time, she decides to send this amazing snapshot to the email account of her friend Lisa across the country. Analyse the scenario and discuss the communication networks involved. B. Network Architectures In this part of the assignment, the student must demonstrate their understanding of network architectures answering the following topics: 1. Reflect on the feedback for Part A and discuss how did it help you to accomplish the tasks for the assignment Part B. 2. Identify and discuss two reasons for using layered protocols. Report one possible disadvantage of using layered protocols. 3. Differentiate the OSI reference model and the TCP/IP protocol suite with a suitable diagram. Which layers are missing from the TCP/IP protocol suite? Are they really missing? Justify your answer. 4. Explain, why is flow control required at both data link and transport layers? 5. Report one other network model which exists besides the OSI model and TCP/IP protocol suite. 6. Analyse wired and wireless mediums with suitable examples in terms of cost, speed, expandability & distance, environment, and security. References Must consider at least eight current references (three for part A and five for part B). Must follow the IEEE referencing style. Assignment Instructions:  Do not use Wikipedia as a source or a reference  Make sure you properly reference any diagrams/ graphics used in the assignment. BN106 Networking Fundamentals Page 3 of 4 Prepared by: Dr Wanod Kumar Moderated by: Dr Mohammad Mohammad T1, 2021 Marking Criteria for the Assignment 1 Assignment 1 - Parts Description of the section Marks A. Communication Networks  James is working from home using a microcomputer, a DSL modem, and a telephone connection to the internet. His company is connected to the Internet and has both local area networks and a mainframe computer. List and discuss the different network connections in this operation. [6 Marks]  Emma is sitting in the lobby of her hotel. She is accessing her email using her laptop connected to the wireless network available in the hotel. Identify and discuss communication in this scenario. [6 Marks]  With her new cell phone, Isabella has just taken a snapshot of the Sydney Opera House. Same time, she decides to send this amazing snapshot to the email account of her friend Lisa across the country. Analyse the scenario and discuss the communication networks involved. [6 Marks]  References in IEEE style [2 Marks] 20 B. Network Architectures  Reflect on the feedback for Part A and discuss how did it help you to accomplish the tasks for the assignment Part B. [5 Marks]  Identify and discuss two reasons for using layered protocols. Report one possible disadvantage of using layered protocols. [5 Marks]  Differentiate the OSI reference model and the TCP/IP protocol suite with a suitable diagram. Which layers are missing from the TCP/IP protocol suite? Are they really missing? Justify your answer. [10 Marks]  Explain, why is flow control required at both data link and transport layers? [5 Marks]  Report one other network model which exists besides the OSI model and TCP/IP protocol suite. [5 Marks]  Analyse wired and wireless mediums with suitable examples in terms of cost, speed, expandability & distance, environment, and security. [10 Marks]  References in IEEE style [5 Marks] 45 Total Marks 65 BN106 Networking Fundamentals Page 4 of 4 Prepared by: Dr Wanod Kumar Moderated by: Dr Mohammad Mohammad T1, 2021 Marking Rubric for Assignment 1 Grade Mark HD 80% + D 70%-79% CR 60%-69% P 50%-59% Fail<50% excellent very good good satisfactory unsatisfactory assignment 1- part a /20 marks a very detailed and very clear discussion very clear discussion generally good discussion brief discussion poor discussion with irrelevant information assignment 1- part b /45 marks all sections discussed are pertinent and covered in depth. demonstrated the ability to think critically and make good use of the source material. sections presented are relevant and soundly analysed. sections presented are generally relevant and analysed. sections presented are somewhat relevance and briefly discussed. sections presented are not relevant to the assignment topic. references clear styles with excellent source of references. clear referencing style generally good referencing style unclear referencing style lacks consistency with many errors. excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" assignment="" 1-="" part="" a="" 20="" marks="" a="" very="" detailed="" and="" very="" clear="" discussion="" very="" clear="" discussion="" generally="" good="" discussion="" brief="" discussion="" poor="" discussion="" with="" irrelevant="" information="" assignment="" 1-="" part="" b="" 45="" marks="" all="" sections="" discussed="" are="" pertinent="" and="" covered="" in="" depth.="" demonstrated="" the="" ability="" to="" think="" critically="" and="" make="" good="" use="" of="" the="" source="" material.="" sections="" presented="" are="" relevant="" and="" soundly="" analysed.="" sections="" presented="" are="" generally="" relevant="" and="" analysed.="" sections="" presented="" are="" somewhat="" relevance="" and="" briefly="" discussed.="" sections="" presented="" are="" not="" relevant="" to="" the="" assignment="" topic.="" references="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencing="" style="" generally="" good="" referencing="" style="" unclear="" referencing="" style="" lacks="" consistency="" with="" many="">
Answered 4 days AfterApr 02, 2021BN 106

Answer To: Prepared by: Dr Wanod Kumar XXXXXXXXXXModerated by: Dr Mohammad Mohammad T1, 2021 Assessment Details...

Deepti answered on Apr 06 2021
160 Votes
Part A
1. The network setup possible with the given components is wired network connection. Wired network requires modem, phone and PC. Network adaptor will be installed inside the PC. The modem sends and receives information over the phone. It is required to connect to the Inter
net [3].
Alternate method of connecting to the network is through wireless network. Wireless Network adaptor will be installed inside the PC so that the wired connection between the microcomputer and the DSL modem is not required. The microcomputer should have built-in wirless capabilities to accomplish this connection.
2. Emma is using Wi-Fi network connection of the hotel. This communication allows long distances within carefully controlled environments. The protocol shall work within the hotel premise. Emma avails Internet connectivity through wireless router of the hotel which allows her wi-fi-laptop to interface with the Internet and access her email [1].
3. Isabella is using Wireless Wide Area Network (WWAN) which transmits small packages of information between devices like the snapshot. It uses mobile telecommunication cellular network technologies like LTE, CDPD or GSM to transfer data. The network covers large geographical area as that in star or mesh network.
Wireless Internet Access Points are also used or communicating wirelessly using smart phones and computers as in this case. Isabella’s phone has the necessary built-in wireless capability to communicate the snapshot to her friend. This may use hot spot or mobile wireless network. Hotspot uses free Internet access at some charge from ISP. Mobile wireless network provides high-speed Internet connection within the network’s range [5].
Part-2
2. The reasons for using layered protocols [7] are
· Abstraction: The implementation details remain secure through separation of implementation and specification. Abstraction can change implementation as long as service interface is maintained. The layering techniques hides information which in turn improves overall performance. Right amount of abstraction allows only the information sufficient for achieving good performance. It is the network layer that concatenates set of links to form abstraction of end-to-end link. Transport layer builds abstraction of multiplexed and flow-controlled end-to-end link. Thus, every layer provides abstraction to the layer above.
· Specialization: The layered protocol technique breaks up the complex problem into smaller pieces. Layers compose simple service to provide complex services. Networking protocols are represented in a stack with layers which reinforces division of specialization. Using layered protocols enables the specialists to take up the layer of their specialization and work on that assuming other layers shall be serviced by...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here