The analysis for the data link layer focuses on the role played by the data link layer in the internet model based on networking. Based on the analysis, it has been discussed that the data layer plays a major part based on the communication with the devices within the local network. This kind of communication is also known as hop-to-hop communication. The network could be based within a Wi-Fi network (Lopacinski et al., 2015). The machines could also be connected with the help of a satellite link or long fibre optic. The Data Link Layer forms a major part of the interface between the Physical network and the Network layer.
The two different parts within the Data Link Layer includes the Logical Link Layer and the Media Access Control. The different network interfaces are built in the form of network scanners, routers, printers and many others. The discussion within the presentation have mainly focused on the impact made by network cards, each of which would have a unique MAC address. The discussion focuses on the ways of determination of a MAC address on a Windows and Linux system. The Network Cards (NICs) are also regarded as smart devices that have been helpful for inspecting each packet that would be visible within the local network (Gross & Davie, 2016). The NIC are responsible for the checking of errors within the network system.
Further the discussion also supports the decision of the format of the Ethernet frame. The broadcast addressing within an Ethernet frame is also defined and the ways in which each frames should be processed within machines have been discussed. The analysis also supports about the CSMA/CD protocol and the working functionalities of the protocol (Song et al., 2016). The functioning of ARP is defined within the report. Within this discussion, a demonstration of Wireshark software. It could be analysed that the software is a form of protocol analyser, which could be used for capturing and inspecting the traffic within the network.
In the presentation, the covered topics are based on segmentation, individual application identification based on port numbers, the services offered by the transport layer, the connections made within TCP and the flow of control.
The reassembly and segmentation discusses about the applications that would be able to send larger streams of data based on delivery. This part also discusses about the function of the transport layer that would be able break the large chunks of data into a manageable size of segments based on helping the network layer for handling the data chunks (Turner, 2014). The segmentation of the large chunks of data is discussed along with the reassembling of data at the destination where the packets would be gathered.
The identification of the applications or sockets defined within the transport layer could be defined as the process of allocating each of the client application with a designated port number based on distinguishing them from other networked applications. Each of the host would be identified based on their IP address. Each of the client application based on the host would be identified based on their unique port number (Bhargavan et al., 2015). This discussion also discusses about the different forms of IP addresses, server port numbers and port numbers based on user applications.
This discussion also focuses on stateless protocols. This is a kind of communication protocol that would be able to treat each of the requests as a form of independent transaction that would be different from any previous request. The discussion also supports the benefits support by the TCP, which is defined as a connection oriented protocol, which is responsible for the delivery of data from the sender-side to receiver-side. The process of establishment of the TCP connection and termination of connection has been described. This discussion also discusses about the three-way handshaking method, which is able to facilitate the communication between two ends of a connection. The entire method within the 3-way handshake has been described in brief. The analysis also help in the discussion of the working of acknowledgements based on the Wireshark software application (Dobrilovic et al., 2014). The TCP flow control has also been fully described within the report.
The discussion within this presentation discusses about the impact of cloud computing and mobile applications. This discussion focuses on cloud computing technologies. The cloud computing could be defined as a practice based on remote servers, which are primarily hosted within the Internet. The platform of cloud computing also discusses about the storage services that would be made to be available by various service providers. These include – Google Drive, Apple’s iCloud, Dropbox, Microsoft OneDrive and many others.
This discussion also puts major focus on the cloud services that are offered by Fed Uni and Azure. The cloud computing platform also focuses on the advantages and disadvantages of cloud based services. The cloud computing platforms mainly depends on Virtualization terminology (Barbarossa, Sardellitti & Di Lorenzo, 2014). In this terminology, the machine hardware that would be running the virtualization software is known as the Host system. The different forms of architecture of virtualization are also discussed within the report. There are two forms of virtualization architecture. These are known as Type 1 virtualization and Type 2 virtualization.
On the other hand, the presentation also discusses about the mobile computing technology within networking. This part discusses the fact that the mobile phone network in underpinned by several kind of technologies. The different technologies have changes over the years and are still in their progressing stages. The discussion also focuses on the evolution of mobile networks from their inception stage. These include the various parameters of 1G, 2G, 3G and 4G networks (Rahimi et al., 2014). The various parameters are discussed in order to gain a clear overview of the mobile networks that have differentiated themselves from the previous generation of networks.
Within the concluding part of the discussion, the discussion is based on the ways in which the mobile phone networks would move towards the perimeter of cells within the base stations. The approaches based on connectivity within the Mobile Switching Centre have also been discussed. The ways in which the different base stations would communicate with the headsets have also been discussed in brief within the presentation.
Barbarossa, S., Sardellitti, S., & Di Lorenzo, P. (2014). Communicating while computing: Distributed mobile cloud computing over 5G heterogeneous networks. IEEE Signal Processing Magazine, 31(6), 45-55.
Bhargavan, K., Delignat-Lavaud, A., Pironti, A., Langley, A., & Ray, M. (2015). Transport Layer Security (TLS) session hash and extended master secret extension (No. RFC 7627).
Dobrilovic, D., Stojanov, Z., Brtka, V., Covic, Z., & Bilinac, N. (2014, September). Software application for analyzing ZigBee network performance in university courses. In Intelligent Systems and Informatics (SISY), 2014 IEEE 12th International Symposium on (pp. 73-77). IEEE.
Gross, J., & Davie, B. (2016). A stateless transport tunneling protocol for network virtualization (STT).
Lopacinski, L., Brzozowski, M., Nolte, J., Kraemer, R., & Buechner, S. (2015, October). Parallel RS error correction structures dedicated for 100 Gbps wireless data link layer. In Ubiquitous Wireless Broadband (ICUWB), 2015 IEEE International Conference on (pp. 1-6). IEEE.
Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., & Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), 133-143.
Song, L., Liao, Y., Bian, K., Song, L., & Han, Z. (2016). Cross-layer protocol design for CSMA/CD in full-duplex WiFi networks. IEEE Communications Letters, 20(4), 792-795.
Turner, S. (2014). Transport layer security. IEEE Internet Computing, 18(6), 60-63.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2020). Content Analysis For Network Layer And Cloud For Communication. Retrieved from https://myassignmenthelp.com/free-samples/itech1102-content-analysis-for-network-layer-and-cloud-for-communication.
"Content Analysis For Network Layer And Cloud For Communication." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/itech1102-content-analysis-for-network-layer-and-cloud-for-communication.
My Assignment Help (2020) Content Analysis For Network Layer And Cloud For Communication [Online]. Available from: https://myassignmenthelp.com/free-samples/itech1102-content-analysis-for-network-layer-and-cloud-for-communication
[Accessed 26 May 2020].
My Assignment Help. 'Content Analysis For Network Layer And Cloud For Communication' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/itech1102-content-analysis-for-network-layer-and-cloud-for-communication> accessed 26 May 2020.
My Assignment Help. Content Analysis For Network Layer And Cloud For Communication [Internet]. My Assignment Help. 2020 [cited 26 May 2020]. Available from: https://myassignmenthelp.com/free-samples/itech1102-content-analysis-for-network-layer-and-cloud-for-communication.
MyAssignmenthelp.com makes buy assignments online easier for students in Melbourne, Brisbane, Adelaide, Perth, Sydney. Students can get highest quality Assignment Help in Brisbane, Perth, Sydney and other cities of Australia only by completing three steps. Students only need to convey their requirements and our experts craft the assignment in an exact manner that our customers want. In case, they need CDR writing services, they can hire our professional CDR writers for strengthening their chances against other applicants.
Answer: 1. The long queues represent the high demand for the given restaurant’s foods and service. The people value the restaurant high and are willing to stand in the waiting lines. The people have high opportunity cost associated with the time spent in the line. On the other hand, the restaurant with empty chairs may have high prices which make their food and services unaffordable to a large number of customers. The owner can increas...Read More
Answer: Background to the problem: Failures in managing research are mainly associated with the lack of preparation in readiness for a project. This leads to businesses failing to prepare for problems leading to the projects encountering serious management hurdles (Cleden, 2017). To overcome these problems every business must address the following research issues so as to address research problems. Define business and research o...Read More
Answer: Introduction In the modern era, there are several organizations that are functioning in the global economy each one of the companies have been performing according to their aims and objectives. The operations of a company is dependent on the style of the entrepreneur and the ability and the mind-set of the entrepreneur determines the process that would be undertaken with the help of which the company can gain competitive edge an...Read More
Answer: Introduction The Yeo Valley is one of the most widely known organic dairy firms in the UK. This company works for bringing fresh and new products for all the milk lovers. At the same time, they believe that taking care of nature is also one of the most important activities that they have to carry on. This firm has been set up by the Mead family. They have been living and working in Somerset for a long time period. They had started their...Read More
Answer: Introduction: Communication is an important aspect of business management. Every professionals need to develop proper communication skills to enjoy success at workplace mentally and financially. The assignment will first help me identify my issues in communication. Depending on it, a literature review will be conducted which will be followed by an action plan. Tools and analysis: The first tool that I have used is the ...Read More
Just share Requriment and get customize Solution.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Great job and Great experts! The follow up and process was fantastic. Also, communication with the expert was easy.
The solution was done in time thank you do much for your efforts but please taking care for grammar is needed there was so many mistakes in grammar thank you
good to do assignment was what I expected and thanks for that one I will use him again
Great work in completing my assignment on time, was very helpful and great with communicating with the require details. will definitely use them again!