This document provides a template for a written assessment submission. It includes instructions for students to fill in their name, student number, and to respond to assignment questions without directly copying from other sources. The template is divided into multiple pages with space for responses. Students are asked to complete tasks such as viewing IP and MAC addresses on their computer and converting them to binary, using ping commands to test network reachability, drawing a basic network diagram, and answering questions about networking concepts. They are instructed to cite any external sources used and are warned that directly copying content will result in lost marks.
Design an Implementation of A Messaging and Resource Sharing Softwarenilabarai
In this article it has been looked how to program using sockets by implementing an echo server along with a client that is used to send and receive string messages. It will start off by giving a quick introduction to TCP/IP fundamentals and then explain how sockets fit into the diagram. Most network application can be divided into two pieces: a client and a server. A client is the side that initiates the communication process, where as the server responds to incoming client requests. There would be contains three types of service from this software, that is Message Transfer service, Voice Transfer service and File Transfer service. All this sorts are the design issue of this software.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
The application layer in TCP/IP model is responsible for providing services to the user. This slide is devoted to the application layer and the services provided by it.
Module 1
Data communication components : Physical media, Packet switching, Circuit switching, Delay, loss and throughput,
Network topology, Protocols and standards, OSI model, Connecting LAN and virtual LAN
Introduction and transport layer services, Multiplexing and Demultiplexing, Connection less transport (UDP), Principles of reliable data transfer, Connection oriented transport (TCP), Congestion control.
Design an Implementation of A Messaging and Resource Sharing Softwarenilabarai
In this article it has been looked how to program using sockets by implementing an echo server along with a client that is used to send and receive string messages. It will start off by giving a quick introduction to TCP/IP fundamentals and then explain how sockets fit into the diagram. Most network application can be divided into two pieces: a client and a server. A client is the side that initiates the communication process, where as the server responds to incoming client requests. There would be contains three types of service from this software, that is Message Transfer service, Voice Transfer service and File Transfer service. All this sorts are the design issue of this software.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
The application layer in TCP/IP model is responsible for providing services to the user. This slide is devoted to the application layer and the services provided by it.
Module 1
Data communication components : Physical media, Packet switching, Circuit switching, Delay, loss and throughput,
Network topology, Protocols and standards, OSI model, Connecting LAN and virtual LAN
Introduction and transport layer services, Multiplexing and Demultiplexing, Connection less transport (UDP), Principles of reliable data transfer, Connection oriented transport (TCP), Congestion control.
Highlighted notes while studying the Course:
Advanced Computer Networks
Article: How Does the Internet Work?
By: Rus Shuler, Pomeroy IT Solutions
FS is a global leading communications hardware and project solutions provider. They are dedicated to helping build, connect, protect and optimize optical infrastructure.
Rus Shuler
Phoenix Cybersecurity
Fort Mill, South Carolina
Years of experience leading development teams and architecting custom IT solutions for clients in a consulting environment. Now a senior security engineer for the US Department of Defense with focuses in data loss prevention, automation and information security.
https://web.stanford.edu/class/msande91si/www-spr04/readings/week1/InternetWhitepaper.htm
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
Adhoc wireless networks become one of the most researchable areas in the studying of routing protocols depending on the Open System Interconnection (OSI Model). This paper use Cisco devices as a reference to enhance the performance of the network. This enhancement will be due to high processing, reliability, average cost, power consumption and accessibility. The aim of this research not only to get the cost down, it also to choose a time to time device to process the data as rapid as it can. Using NAT, Access List and DHCP protocols defined in Cisco (Graphical Unit Interface) GUI of the (Command Line Interface) CLI, the task can be made.
Please follow the data and description 1) An association indicate.pdfKARTIKINDIA
Please follow the data and description :
1) An association indicates that the destination address is for a networking device connected to
one of the ports on the bridge.
So the answer is OPTION B (Indicates that the destination address is for a networking device
connected to one of the ports on the bridge).
2)
The image could not be accessed / visisible, could you replace them.
3) The acronym TCP/IP stands for Transmission Controller Protocol / Internet Protocol is a true
statement.
So the answer is OPTION A (True).
4)
The image could not be accessed / visisible, could you replace them.
5)
Aging Time :
It is the length of time a MAC address remains assigned to a port. The assignment of the MAC
address will be removed if there is no data activity within this time. If the computer with the
assigned MAC address initiates new data activity, the aging time counter is restarted, and the
MAC address remains assigned to the port.
So the answer is OPTION D (Aging Time).
6)
The image could not be accessed / visisible, could you replace them.
7)
ping command :
This is generally used as a network commands that allows you to ping another network IP
address. Pinging another address helps determine if the network card can communicate within
the local network or outside network.
So the answer is OPTIONS (A,B,D).
8)
Private networks can use IP addresses anywhere in the following ranges: 192.168.0.0 -
192.168.255.255 (65,536 IP addresses) 172.16.0.0 - 172.31.255.255 (1,048,576 IP addresses)
10.0.0.0 - 10.255.255.255 (16,777,216 IP addresses).
A routable IP address is one that can be reached (or routed) by anyone on the internet.
So the answer is OPTIONS (C,D).
9)
The use of STP cable includes the resitance to interference, speed, data security, protection from
crosstalk.
So the answer is OPTION E (None of the Above).
10)
Transport Layer :
The layer in the open system interconnection (OSI) model responsible for end-to-end
communication over a network. It provides logical communication between application
processes running on different hosts within a layered architecture of protocols and other network
components.
So the answer is OPTION A (Transport Layer).
Hope this is helpful.
Solution
Please follow the data and description :
1) An association indicates that the destination address is for a networking device connected to
one of the ports on the bridge.
So the answer is OPTION B (Indicates that the destination address is for a networking device
connected to one of the ports on the bridge).
2)
The image could not be accessed / visisible, could you replace them.
3) The acronym TCP/IP stands for Transmission Controller Protocol / Internet Protocol is a true
statement.
So the answer is OPTION A (True).
4)
The image could not be accessed / visisible, could you replace them.
5)
Aging Time :
It is the length of time a MAC address remains assigned to a port. The assignment of the MAC
address will be removed if there is no data activity within this time. If the computer.
1. (TCO A) A ___ defines the format and the order of messages exchanged between 2 or more communicating entities.
2. (TCO A) While the job of the link layer is to move entire frames from one network element to another, The job of the physical layer is to do what?
3. (TCO A) Which of the following is not true about ISO:
4. (TCO A) What are the two fundamental approaches to moving data through a network of links and
Mis 589 Massive Success / snaptutorial.comStephenson185
. (TCO A) A ___ defines the format and the order of messages exchanged between 2 or more communicating entities.
2. (TCO A) While the job of the link layer is to move entire frames from one network element to another, The job of the physical layer is to do what?
3. (TCO A) Which of the following is not true about ISO:
4. (TCO A) What are the two fundamental approaches to moving data through a network of links and switches?
5. (TCO A) The IP protocol works at which layer of the OSI model?
Business communication is the process of communicating with the employees and the organisation. The implementation of the business communication strategies helps to build the communication skills in the employees. In this report the impact, barriers, and solutions to barriers are discussed which help to understand the overall concept of the business communication. For betterment of the organisations improvement of the communication skills is necessary. The effective communication is the management of the employees which help in the management of the employee’s behaviour. Analysis of business communication is essentially effective in determining the potential in professional aspects as well as evaluating personal skills for improvement.
Retail is the kind of market which is the last stop for the supply chain from where customers can access the good and services. Retail market generally purchases the goods from the manufacturer or the middlemen refer to as the Wholesalers. Wholesalers collect the products from the manufacturers worldwide and supply the goods and service to the retailers. So, retailers are the intermediate layer in the supply chain who connects the products from the manufacturer with the targeted customers. Retail market may be offline or online. However, for decades, the online retail market like Flipkart, Amazon etc are grooming faster compared to the offline retail market. The primary reason is the feasibility to the customer as they can view the product from the website by sitting at home and can choose for their purchase. Even they can order for their desired products without going to the physical market. It means such market required the intelligence to attract the customers so that they will buy the product from their market. Generally, customers use to buy their products from such a market where they can find good products, attractive offers and useful recommendations. On the other hand, retailers should keep their inventory management smarter by employing suitable technology so that the supply will be uniform. As this is the era of digital business, retail marketing uses the technology like Data Analytics with the Internet of Things to maintain the inventory, sophistical approach towards checkout system by emphasizing the visibility of the inventory system.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Coit11238 2019-t2
1. WRITTEN ASSESSMENT TEMPLATE - PAGE 1
ASSIGNMENT SUBMISSION
Due date: Friday Week 11 (11:45 PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
While it should not be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using the
Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
2. WRITTEN ASSESSMENT TEMPLATE - PAGE 2
Week One
Assignment Question: Counting with different number systems:
You may know what a number system is: a number system is a way to represent
numbers. For example, we are using the base-10 number system, which is called
decimal. Other common number systems include base-2 (binary). base-16, base-8
(octal), and (hexadecimal). In computer science, information is often stored as base-
2 (binary) but presented as base-10 (decimal) or base-16 (hexadecimal). For
example, IPv4 addresses (and/or IPv6 addresses), MAC (hardware) addresses (see
the diagram below) are usually presented in decimal or hex, but internally computers
store them in binary.
View the IPv4 address and MAC address (Physical Address) of your
computer. Then convert both addresses to binary, showing the calculations for
each conversion. In your answer also include one or more screenshots
showing the addresses on your computer.
Your answer
3. WRITTEN ASSESSMENT TEMPLATE - PAGE 3
The ipconfig/all command is used to check the entire network configuration of the device or specifically of the
computer that is connected to a network. The command ipconfig stand for Internet Protocol Configuration and
it explicitly shows the device IP address and the MAC address (Tiwari, 2012). By executing the command in
own computer, the following result is obtained:
The screenshot is showing the part of details obtained by the command execution of ipconfig/all. It is showing
the following about device address:
IPv4: 192.168.42.24
MAC(Physical Address): 8E-4D-A1-9D-4F-F2
The MAC address is defined here by Physical address. The IPv4 address is denoted here by Decimal and the
MAC address is denoted here by Hexadecimal value. Both these two are to be converted to the Binary and
the steps are as follows:
IPv4 to Binary:
Obtained: 192.168.42.24 Decimal
So, each of the sections will be separately converted to Binary as follows:
So, the IPv4 address in binary becomes to: 11000000.10101000.00101010.00011000
4. WRITTEN ASSESSMENT TEMPLATE - PAGE 4
MAC to Binary:
Obtained: 8E-4D-A1-9D-4F-F2 Hexadecimal
As it is known that, each hexadecimal digit represents 4-binary bits. The above MAC address contains 12
hexadecimal digits and so there will be 48-bit binary bits to represent the MAC address (Yiqin Lu, 2017).
Hence the decoding of the hexadecimal MAC address to the Binary address is as follows:
So, the Binary address of the MAC (in form of Hexadecimal) is
10001110-01001101-10100001-10011101-01001111-11110010
The ipconfig/all command also produced the following outcomes along with the first screenshot result and
those are shown below:
5. WRITTEN ASSESSMENT TEMPLATE - PAGE 5
Your question:
Why MAC address is defined in Hex format?
Your sample answer:
Hexadecimal for mat provides the shortest format to keep a value rather than the other
format like decimal, binary and octal. So, for thus reason mainly MAC address is kept in
Hex format.
6. WRITTEN ASSESSMENT TEMPLATE - PAGE 6
Week Two
Assignment Question:
The ping command is used to test the reachability of a specified destination
computer. The ping command operates by sending several (Internet Control
Message Protocol) messages to a destination computer and waiting for a response
(the messages are referred to as Echo Request and Echo Reply). The output of a
ping command contain two major pieces of information: how many of those
responses are returned, and how long it takes for them to return. The ping command
is one of the most often used networking utilities for troubleshooting network
problems. Complete the following questions:
Assume you want to test the reachability to the Google searching service,
create a ping command with 10 ICMP echo requests, with each echo request
packet size set to 512 bits. Include a single screenshot that shows both the
ping command and its output as your answer.
Explain the difference between “ping www.google.com” and “ping the IP
address of Google server at 172.217.167.68”. You may want to try both and
observe any differences. Your answer should include your explanation; it
doesn’t need to include screenshots.
Your answer:
As per the instruction, the ping is done with its two parameters, namely ICMP
and the Packet Size of each echo request (S. T. Ali, 2015). So, the command
will be like the follows:
ping -n 10 -l 512 www.google.com
Using this ping request, the search is done in the command prompt and the
screenshot is shown below:
With this ping request, the echo is done for 10 times as it is shown in the
7. WRITTEN ASSESSMENT TEMPLATE - PAGE 7
footer result in Sent and Received Packet for 10 times. For each time the
request is transacted, 512 bits are transacted actually. As the internet is
connected, so packet loss is Zero (Tiwari, 2012).
The ping is done in two ways, primarily by using the google domain name and
secondly by providing the IP address of the google server. So, for the first
case, the ping will be as follows:
ping www.google.com
And in the second case, the ping will be as follows:
ping 172.217.167.68
Now, the screenshot for these two pings is as follows:
4
For both two cases, the default transaction is made by sending and receiving packet
4. The time taken for the first case is lesser when compared to the second one. The
average time required for the first ping is 96 ms and for the second case, the
average time required is 308 ms. So, the first one is efficient in terms of time
consumption (A.S.Ahmed, 2015).
Your question:
What is ICMP?
Your sample answer:
This is the Internet Control Message Protocol which is basically used for the error reporting
for the IP if the packet delivery is delayed or any error message is receive any the packet
transaction.
8. WRITTEN ASSESSMENT TEMPLATE - PAGE 8
Week Three
Assignment Question:
Describe is the difference between operating in half-duplex mode or full-duplex
mode. Explain why switches can eliminate collisions in LANs, whereas hubs cannot.
Your answer:
Half Duplex and Full Duplex are basically two modes in Communication. The
difference between these two are described below:
1. In half duplex mode, the data transaction can be done in two direction but
it allows the data to be transacted in one direction at a time only whereas
in the full duplex method, the data can be transacted in both direction and
in simultaneous operation (F. A. Barbhuiya, 2011).
2. In half duplex, the responder can send and receive data but only one
operation can be done at a time but in Full duplex method, these two can
be done simultaneously.
3. Half duplex method is less efficient than full duplex as for the one
directional operation (A.S.Ahmed, 2015).
4. Half duplex can be used in Walkie-Talkie where wo sides have to talk by
turns and the full duplex can be applied in the Telephone where the
person at two sides can talk simultaneously (F. Li, 2016).
Switch, in the network traffic, has its own collision domain and is able to
redirect the data to the specific port. So, if there are four devices are
connected with the switch-1 with its ports -1, 2, 3 & 4 with device ID A,B,C &D
and if it is required to transfer the data from A to C, then the data through the
Switch, should pass port-1 & 3 and it will not go to port-2 & 4 (Fuliang Li,
2017). Thus, by using switch, the possibility of collision is lessened. Hub or
repeater has no such capability of redirection to specific port and thus the
packet will reach to every connected port and this the collision will happen
there (Muniyappa, 2012).
Your question:
Between half and full duplex, which one will be preferable for the network communication?
Your sample answer:
As the Full duplex mode allows the bidirectional packet transaction to be happened
simultaneously and for the networking , the bidirectional transaction is essentially required,
so, Full Duplex will be preferred.
9. WRITTEN ASSESSMENT TEMPLATE - PAGE 9
Week Four
Assignment Question:
Draw a network diagram with the following requirements:
A wired Local Area Network (LAN) with 5 workstations, organized as a star
topology
A wireless LAN with an Access Point (AP) and some laptops and mobile
phones.
A router to link these two LANs to an Internet Service Provider (ISP)
Your answer:
First, the Local Area Network is shown which includes 5 workstations. Those
workstations will be connected in a start topology and that means at the center
of the connection, a server will be there which will maintain the data routing
among the workstations (Fuliang Li, 2017). It is assumed that the workstation
will includes all types of devices and the data from the central router will pass
through a Firewall. The design is shown below:
Next, the Wireless LAN is designed which has the access point and there are
different devices connected with the access point such as the computers and
mobiles (S. T. Ali, 2015). Here the access point works as to share the media
to the preferred devices. The diagram is show below:
10. WRITTEN ASSESSMENT TEMPLATE - PAGE 10
According to the instruction, the last objective of the connection is to connect
these to LAN with an Internet Service Provider or ISP (Tiwari, 2012). The
design is shown below:
Your question:
What is ISP?
Your sample answer:
This is basically represents an organization which facilitate the company for using the
internet connection and to connect to the outer world of networking.
11. WRITTEN ASSESSMENT TEMPLATE - PAGE 11
Week Five
Assignment Question:
ABC Corp.’s facilities in Hermit Park, Townsville, are two office buildings 150 metres
apart, each with its own LAN. To connect the two networks, you plan to dig a trench
and lay cable in conduit between the two buildings. You want to use fibre-optic cable,
but your budget-conscious facilities manager wants to use 100 Mbps Ethernet over
twisted-pair cable. Which of the following reasons can you use to justify fibre-optic
cable in this case, and why?
Twisted pair won’t span a 150-metre distance.
Fiber-optic cable is cheaper and easier to work with than twisted pair.
Twisted pair is a conductive cable and can, therefore, carry current based on
the difference in ground potential between the two buildings.
Fibre-optic cable leaves more room for growth and future needs for increased
bandwidth than twisted pair does.
Your answer:
In this scenario, the communication has to be made between two building which are 150
meters distant. It is to be mentioned that, the Fiber Optic Cable and Twisted Pair Cable
both can provide the bandwidth up to 4.7 GHz and thus it sounds similar. But those two is
differed when the coverage distance will be considered (F. A. Barbhuiya, 2011). The
Twisted Pair Cable can provide the coverage up to 100 meters whereas the Fiber Optic
Cable can provide a coverage up to 80000 meters which is far and far higher than the
Twisted Pair Cable. As the distance is the prime concern in this case, so the Fiber Optic
Cable can be chosen by choosing Reason#1 (Yiqin Lu, 2017). On the other hand, the price
is another concern of the communication. The price is less for the Fiber Optic Cable and
higher in case of Twisted Pair Cable. The Twisted Pair Cable costs for $0.7 per meter
whereas the Fiber Optic Cable costs for $0.3 per meter. So, the basic communication
between these two building will cost higher if the Twisted Pair Cable will be used. So, in that
case, again Fiber Optic Cable is chosen by choosing Resaon#2 (Tiwari, 2012).
.
Your question:
How Fiber Optic Cable transfer data in high speed?
Your sample answer:
Fiber Optic Cable transfer data using the light signal with full internal reflection method.
This method helps the system to keep the data intact and lossless and as the light pulse is
used so the transfer rate is same as the speed of light.
12. WRITTEN ASSESSMENT TEMPLATE - PAGE 12
Week Six
Assignment Question:
Complete the following table by nominating the network layer names and the specific
protocols associated with the following tasks:
Ensure that the information sent by the web server reaches your browser
Route messages between your PC and the server over the Internet
Allow the web browser software and the web server software to understand
the messages sent between them
Encapsulate data in frames
Your answer:
Complete this table:
Task Layer Protocol
Ensure that the information sent by the
web server reaches your browser
Application Layer Hyper Text Transfer
Protocol, File
Transfer Protocol
Route messages between your PC and
the server over the Internet
Network Layer Internet Protocol
Allow the web browser software and the
web server software to understand the
messages sent between them
Network Layer User Datagram
Protocol
Encapsulate data in frames Network Layer via
Data Link Layer
Internet Protocol
Your question:
How IP address ca be converted to MAC address in the network?
Your sample answer:
The network layer uses the MAC address which carries the source address in the data
frame. The IP is converted to MAC address using the AR protocol and transferred through
the Network layer and reaches to the destination.
13. WRITTEN ASSESSMENT TEMPLATE - PAGE 13
Week Seven
Assignment Question:
When you try to ping a server on your local network, your operating system needs to
convert the IP address into a MAC address. Answer the following questions:
1) To resolve a local IP address to a physical MAC address, which protocol can
be used? Which layer of the TCP/IP layered architecture does the protocol
belong to?
2) Briefly discuss how this protocol works, including how the protocol avoids
sending a request across a network for each IP packet that needs to be sent
to the same destination.
Your answer:
1. To resolve a local IP to MAC, the Address Resolution Protocol or ARP is
used. The MAC address shows the physical identification of the network and
the IP address shows the logical device address. When the packet of the data
is received from the user, the packet is transformed to Frame and using the
ARP, the IP is converted to MAC in the Network Layer (Fuliang Li, 2017).
2. When ARP is executed in DOS mode, the following outcomes occurs:
So, it can be seen that, the ARP converts the IP address to the MAC or physical
address. Basically, when a packet is to be transferred to the destination, primarily
the ARP frame is created where all the required information like the source address
and the destination address along with the data description (F. Li, 2016). So, this
14. WRITTEN ASSESSMENT TEMPLATE - PAGE 14
particular frame will be transferred and thus, the frame will be received by a
particular destination only.
Your question:
What are the advantages of MAC address in a Network?
Your sample answer:
IP address shows the logical address of a device but it is unable to identify the interface of
the network which is necessary to communicate in the network to reach to the destination.
The MAC address is enriched with the newer version of the address allocation which is able
to identify the destination device as well as the interface using the Frame or ARP Frame.
Thus, MAC address is advantageous (F. A. Barbhuiya, 2011).
15. WRITTEN ASSESSMENT TEMPLATE - PAGE 15
Week Eight
Assignment Question:
A network diagram shows the connection of four computers and the network devices:
a repeater, two switches and a router. The port numbers (P1, P2, and P3) in the
diagram refers to the ports on the respective switches. The MAC addresses of the
computers and the router (where indicated by the arrow) are given in the diagram.
Network Diagram
If the four computers have been actively communicating with each other, what would
the entries of the switching table be for Switch S2? Fill in the switching table below
with the relevant entries. Any order of entries is acceptable.
MAC Address Port #
16. WRITTEN ASSESSMENT TEMPLATE - PAGE 16
Your answer:
Complete the following table:
VLAN MAC Address Port #
1
(C1)
0A-21-DD-2F-00-22 P2
0A-21-DD-2F-00-33 P3-P2-P1
0A-21-DD-2F-00-44 P3-P2-P3
0A-21-DD-2F-00-11 P1
2
(C2)
0A-21-DD-2F-00-11 P1
0A-21-DD-2F-00-33 P3-P2-P1
0A-21-DD-2F-00-44 P3-P2-P3
0A-21-DD-2F-00-22 P2
3
(C3)
0A-21-DD-2F-00-11 P2-P3-P1
0A-21-DD-2F-00-22 P2-P3-P2
0A-21-DD-2F-00-44 P3
0A-21-DD-2F-00-33 P1
4
(C4)
0A-21-DD-2F-00-11 P2-P3-P1
0A-21-DD-2F-00-22 P2-P3-P2
0A-21-DD-2F-00-33 P1
0A-21-DD-2F-00-44 P3
Your question:
What is the function of a Switch?
Your sample answer:
Switch is used to forward the packet or frame to the destination device. When switch
receives a frame, it checks the MAC table and match the destination location of the frame
and forward the frame to the relevant post so that it can reach to the relevant device only
(Tiwari, 2012).
17. WRITTEN ASSESSMENT TEMPLATE - PAGE 17
Week Nine
Assignment Question:
Visit Digital Attack Map and search the internet to complete the following tasks:
1) Explain what DDoS is;
2) Give two specific examples of real of DDoS attacks
3) What are the top three practices for preventing or stopping DDoS attacks.
Your answer:
1. DDoS: DDoS or Distributed Daniel of Service attach is basically a malicious
attack and this aims the target device to be flooding in the network traffic by
disrupting it. So, the user cannot use the normal traffic through their device.
DDoS not only attacks a single computer but it actually attacks the entire
network to take the traffic under the control of the hackers (Mohamed
Idhammad, 2018). Thus, every device of the network including the devices
connected in IoT, will be acted as the bot, controlled by the hackers and thus
the botnet is created and no normal traffic of the desired organization will be
transacted through the network and hence the network breakdown occurs (T.
Vissers, 2014).
2. In 2018, the github, a developer and repository of the leading programmer,
was hacked with the DDoS and got a record-breaking traffic of 1.5TBPS.
Another major incident was occurred for the security provider “CloudFlare”
with a sudden hit of 400GBPS in the year of 2014 (M. Anagnostopoulos,
2015).
3. There are several ways to prevent or at least avoid the DDoS attack. Three of
those methods are:
i. Developing a response plan for the DDoS attack so that when the
18. WRITTEN ASSESSMENT TEMPLATE - PAGE 18
modification is about to be happened, this will be get reported an thus it
make the alert to the administrator (T. Vissers, 2014).
ii. Installing integrated security plan make the system healthy and less
probable to be attacked by the DDoS. This includes the intrusion
detection technique to be install there along with the firewall and other
security patches (M. Anagnostopoulos, 2015).
iii. Utilizing Cloud network is the safer choice to be get immune from the
DDoS as the cloud has the proven security and high bandwidth.
Your question:
What are the symptoms of DDoS attack?
Your sample answer:
The symptoms are:
Slow file access in remote location or in native device
Unable to locate or to reach to a particular web service for long time
Disconnection of Internet Service
Internet flooding and blockages
Storing enormous amount of spam mail.
19. WRITTEN ASSESSMENT TEMPLATE - PAGE 19
Week Ten
Assignment Question:
You have an idea for a cloud-based IoT application that can monitor your
living/working/studying environments by collecting and demonstrating the data of
temperature, humanity, air quality and so on. You need a development server for
your team members (classmates across several campuses). And then, once the
software is developed and deployed with required hardware, you need a hosting
solution for users to access to the software and users can check their
living/working/studying environments on their tablets and smartphones.
What types of cloud computing service are appropriate to these situations?
Justify your answers.
Your answer:
In this scenario, Infrastructure as a Service will be more appropriate. This
Infrastructure as a Service provides the integration of software ad hardware
usages by the user. As the students have to use the infrastructure for studying
purpose in difference campuses with the software and hardware for the
development purpose, so, Infrastructure as a Service will be better to provide
the service respectively (Sidhu, 2017). By using Infrastructure as a Service,
the students will be able to access the software applications, can manage the
data in runtime, access the middleware and also able to access the operating
system from remotely. So, the students even need not to have a native
system and do not even to bother about the same and can work smoothly
(Zhou, 2016).
Your question:
How many types of cloud services are there?
Your sample answer:
There are basically three types of cloud services for providing the integrated solutions to
the clients through which they can use the resources, provided by the vendors and without
the installation of any software and in many cases, the hardware are also not required up to
high level. Those are:
Infrastructure as a Service
20. WRITTEN ASSESSMENT TEMPLATE - PAGE 20
Software as a Service
Platform as a Service.
References
A.S.Ahmed, R. a. N., 2015. Improvingsecurity forIPv6neighbordiscovery.
ProceedingsoftheInternational ConferenceonElectricalEngineeringandInformatics(ICEEI’15), p.
271–274.
F. A. Barbhuiya, S. B. a. S. N., 2011. “Detection of neighbor solicitation and advertisement spoofing
in IPv6 neighbor discovery protocol. in Proceedings of the 4th International Conference on Security
of Information and Networks (SIN ’11), , pp. 111-118.
F. Li, J. Y. X. W. T. P. C. A. a. J. W., 2016. Characteristics analysis at prefix granularity: A case
study in an IPv6 network. Journal of Network and Computer Applications, Volume 70, p. 156–170.
Fuliang Li, X. W. T. P. a. J. Y., 2017. A Case Study of IPv6 Network Performance: Packet Delay,
Loss, and Reordering. Mathematical Problems in Engineering, p. 10.
M. Anagnostopoulos, G. K. a. S. G., 2015. New facets of mobile botnet: architecture and evaluation.
International Journal of Information Security, 15(5), p. 455–473.
Mohamed Idhammad, K. A. M. B., 2018. Detection System of HTTP DDoS Attacks in a Cloud
Environment Based on Information Theoretic Entropy and Random Forest. Security and
Communication Networks, p. 13.
Muniyappa, V. K., 2012. Performance Analysis of IPv4 versus IPv6 in a Simple Campus Network.
Long Beach.
S. T. Ali, V. S. A. R. a. S. J., 2015. A survey of securing networks using software defined
networking. IEEE TransactionsonReliability, 64(3), p. 1086–1097.
Sidhu, S. S. a. J., 2017. Compliance-based Multi-dimensional Trust Evaluation System for
determining trustworthiness of Cloud Service Providers. Future Generation Computer Systems,
Volume 67, p. 109–132.
T. Vissers, T. S. S. L. P. K. G. a. P. H., 2014. DDoS defense system for web services in a cloud
environment. Future Generation Computer Systems, Volume 37, pp. 37-45.
Tiwari, V. K. a. S., 2012. Routing in IPv6 over Low-Power Wireless Personal Area Networks
(6LoWPAN): A Survey. Journal of Computer Networks and Communications, Volume 2012, p. 10.
Yiqin Lu, M. W. a. P. H., 2017. An SDN-Based Authentication Mechanism for Securing Neighbor
Discovery Protocol in IPv6. Security and Communication Networks , Volume
https://doi.org/10.1155/2017/5838657, p. 9.
Zhou, Z. W. a. Y., 2016. Customized Cloud Service Trustworthiness Evaluation and Comparison
Using Fuzzy Neural Networks,. Proceedings of the 2016 IEEE 40th Annual Computer Software and
Applications Conference (COMPSAC), pp. 433-442.
21. MARKING SHEET - DO NOT DELETE
Assignment Question Student Question
Criteria
0 Incorrect/No Response 0 No question provided or minimal
attempt
0.5 Limited /Partially incorrect
response OR response is
not in the student’s own
words
0.5 Simplistic question/sample answer
that does not demonstrate an
understanding of the topic area OR
sample answer is not in the
student’s own words
1 Correct response but
could have more detail
1 Good question that has some
challenge, but could be more
challenging and/or the sample
answer needs more
detail/explanation
1.5 Excellent response with
good detail
1.5 Excellent and challenging question
with a detailed sample answer
Week Marks Awarded Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
WRITTEN ASSESSMENT TEMPLATE - PAGE 14