diff_months: 20

ITECH2301 Network Architecture and Design Type A

Download Solution Now
Added on: 2022-08-20 00:00:00
Order Code: 432831
Question Task Id: 0

Assessment Objective

  1. This assignment provides an opportunity to understand the techniques and protocols used in the layers of the TCP/IP network (Internet) model
  2. Learning Outcomes Assessed:
    • K3 - Explain the technologies and protocols of physical, data link, network, and transport layers.
    • S1- Analyse data communication and networking technologies on today's Internet.
    • A2 - Analyse data communication and networking technologies on today's Internet.

Requirements

  1. Fig. 1 illustrates how a message is transmitted from the application layer to the physical layer in the Internet model of a data communication network.
    1. With the aid of the diagrams of header formats, explain the main purpose of all fields of the header formats of the transport, network, and data link layers protocols. For example, the main purpose of the source address and destination address of an IP Header is to provide the sender and receiver IP addresses, respectively. Note, for IP header, include IPv4 packet header format only i.e., you do not need to consider IPv6 packet header format.
    2. Use your web browser to connect to a website of a non?Australian university (e.g. in the USA or UK). Using the Wireshark protocol analyzer, capture all packets generated in response to your request for the above web page. For a selected pair of the first HTTP request?response lines, write the hex/decimal values of all fields of the header formats of the transport, network and data link layers protocols whatever is available in your file captured by Wireshark.
  2. 20220801045910AM-292919126-278450250.jpeg

  3. Draw how the bit pattern 0 0 1 1 0 1 1 0 would be sent using
  1. Unipolar signalling
  2. Return to zero (RZ) signalling
  3. Non return to zero (NRZ) signalling
  4. Manchester encoding
  5. Amplitude Modulation (AM)
  6. Frequency Modulation (FM)
  7. Phase Modulation (PM)
  • Answer the following questions on media access control:
    • What is media access control and why is it important?
    • List two examples of controlled access and contention-based media access protocols and their application areas.
    • Under what circumstances do contention-based media access control protocols outperform controlled access protocols and vice versa? Explain
    • Uploaded By : Albert
    • Posted on : August 01st, 2022
    • Downloads : 0
    • Views : 149

    Download Solution Now

    Can't find what you're looking for?

    Whatsapp Tap to ChatGet instant assistance

    Choose a Plan

    Premium

    80 USD
    • All in Gold, plus:
    • 30-minute live one-to-one session with an expert
      • Understanding Marking Rubric
      • Understanding task requirements
      • Structuring & Formatting
      • Referencing & Citing
    Most
    Popular

    Gold

    30 50 USD
    • Get the Full Used Solution
      (Solution is already submitted and 100% plagiarised.
      Can only be used for reference purposes)
    Save 33%

    Silver

    20 USD
    • Journals
    • Peer-Reviewed Articles
    • Books
    • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more