ITECH2301 Network Architecture and Design Type A
- Subject Code :
ITECH2301
- University :
Federation University Exam Question Bank is not sponsored or endorsed by this college or university.
- Country :
Australia
Assessment Objective
- This assignment provides an opportunity to understand the techniques and protocols used in the layers of the TCP/IP network (Internet) model
- Learning Outcomes Assessed:
- K3 - Explain the technologies and protocols of physical, data link, network, and transport layers.
- S1- Analyse data communication and networking technologies on today's Internet.
- A2 - Analyse data communication and networking technologies on today's Internet.
Requirements
- Fig. 1 illustrates how a message is transmitted from the application layer to the physical layer in the Internet model of a data communication network.
- With the aid of the diagrams of header formats, explain the main purpose of all fields of the header formats of the transport, network, and data link layers protocols. For example, the main purpose of the source address and destination address of an IP Header is to provide the sender and receiver IP addresses, respectively. Note, for IP header, include IPv4 packet header format only i.e., you do not need to consider IPv6 packet header format.
- Use your web browser to connect to a website of a non?Australian university (e.g. in the USA or UK). Using the Wireshark protocol analyzer, capture all packets generated in response to your request for the above web page. For a selected pair of the first HTTP request?response lines, write the hex/decimal values of all fields of the header formats of the transport, network and data link layers protocols whatever is available in your file captured by Wireshark.
- Draw how the bit pattern 0 0 1 1 0 1 1 0 would be sent using
- Unipolar signalling
- Return to zero (RZ) signalling
- Non return to zero (NRZ) signalling
- Manchester encoding
- Amplitude Modulation (AM)
- Frequency Modulation (FM)
- Phase Modulation (PM)
- What is media access control and why is it important?
- List two examples of controlled access and contention-based media access protocols and their application areas.
- Under what circumstances do contention-based media access control protocols outperform controlled access protocols and vice versa? Explain