country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

ITECH1102 Content Analysis For Network Layer And Cloud For Communication

tag 0 Download6 Pages / 1,264 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: ITECH1102
  • University: Federation University
  • Country: Australia

Questions:

1. Describe and explain the role and function of network connectivity in current computing.
 
2. Describe and explain the principles of communication in networks.
 
3. Describe the role and functionality of hardware and software entities that contribute to network communications.
 
4. Describe and explain the protocols and interactions that implement network communications.
 
5. Describe fundamental aspects of cloud computing.
 
6. Apply networking architecture knowledge to analyze the networking needs for business.
 
 

Answer:

Data Link Layer

The analysis for the data link layer focuses on the role played by the data link layer in the internet model based on networking. Based on the analysis, it has been discussed that the data layer plays a major part based on the communication with the devices within the local network. This kind of communication is also known as hop-to-hop communication. The network could be based within a Wi-Fi network (Lopacinski et al., 2015). The machines could also be connected with the help of a satellite link or long fibre optic. The Data Link Layer forms a major part of the interface between the Physical network and the Network layer.

The two different parts within the Data Link Layer includes the Logical Link Layer and the Media Access Control. The different network interfaces are built in the form of network scanners, routers, printers and many others. The discussion within the presentation have mainly focused on the impact made by network cards, each of which would have a unique MAC address. The discussion focuses on the ways of determination of a MAC address on a Windows and Linux system. The Network Cards (NICs) are also regarded as smart devices that have been helpful for inspecting each packet that would be visible within the local network (Gross & Davie, 2016). The NIC are responsible for the checking of errors within the network system.

Further the discussion also supports the decision of the format of the Ethernet frame. The broadcast addressing within an Ethernet frame is also defined and the ways in which each frames should be processed within machines have been discussed. The analysis also supports about the CSMA/CD protocol and the working functionalities of the protocol (Song et al., 2016). The functioning of ARP is defined within the report. Within this discussion, a demonstration of Wireshark software. It could be analysed that the software is a form of protocol analyser, which could be used for capturing and inspecting the traffic within the network.

 

Topic 2: Transport Layer

In the presentation, the covered topics are based on segmentation, individual application identification based on port numbers, the services offered by the transport layer, the connections made within TCP and the flow of control.

The reassembly and segmentation discusses about the applications that would be able to send larger streams of data based on delivery. This part also discusses about the function of the transport layer that would be able break the large chunks of data into a manageable size of segments based on helping the network layer for handling the data chunks (Turner, 2014). The segmentation of the large chunks of data is discussed along with the reassembling of data at the destination where the packets would be gathered.

The identification of the applications or sockets defined within the transport layer could be defined as the process of allocating each of the client application with a designated port number based on distinguishing them from other networked applications. Each of the host would be identified based on their IP address. Each of the client application based on the host would be identified based on their unique port number (Bhargavan et al., 2015). This discussion also discusses about the different forms of IP addresses, server port numbers and port numbers based on user applications.

This discussion also focuses on stateless protocols. This is a kind of communication protocol that would be able to treat each of the requests as a form of independent transaction that would be different from any previous request. The discussion also supports the benefits support by the TCP, which is defined as a connection oriented protocol, which is responsible for the delivery of data from the sender-side to receiver-side. The process of establishment of the TCP connection and termination of connection has been described. This discussion also discusses about the three-way handshaking method, which is able to facilitate the communication between two ends of a connection. The entire method within the 3-way handshake has been described in brief. The analysis also help in the discussion of the working of acknowledgements based on the Wireshark software application (Dobrilovic et al., 2014). The TCP flow control has also been fully described within the report.

Topic 3: Cloud Computing and Mobile

The discussion within this presentation discusses about the impact of cloud computing and mobile applications. This discussion focuses on cloud computing technologies. The cloud computing could be defined as a practice based on remote servers, which are primarily hosted within the Internet. The platform of cloud computing also discusses about the storage services that would be made to be available by various service providers. These include – Google Drive, Apple’s iCloud, Dropbox, Microsoft OneDrive and many others.

This discussion also puts major focus on the cloud services that are offered by Fed Uni and Azure. The cloud computing platform also focuses on the advantages and disadvantages of cloud based services. The cloud computing platforms mainly depends on Virtualization terminology (Barbarossa, Sardellitti & Di Lorenzo, 2014). In this terminology, the machine hardware that would be running the virtualization software is known as the Host system. The different forms of architecture of virtualization are also discussed within the report. There are two forms of virtualization architecture. These are known as Type 1 virtualization and Type 2 virtualization.

On the other hand, the presentation also discusses about the mobile computing technology within networking. This part discusses the fact that the mobile phone network in underpinned by several kind of technologies. The different technologies have changes over the years and are still in their progressing stages. The discussion also focuses on the evolution of mobile networks from their inception stage. These include the various parameters of 1G, 2G, 3G and 4G networks (Rahimi et al., 2014). The various parameters are discussed in order to gain a clear overview of the mobile networks that have differentiated themselves from the previous generation of networks.  

Within the concluding part of the discussion, the discussion is based on the ways in which the mobile phone networks would move towards the perimeter of cells within the base stations. The approaches based on connectivity within the Mobile Switching Centre have also been discussed. The ways in which the different base stations would communicate with the headsets have also been discussed in brief within the presentation. 

 

References

Barbarossa, S., Sardellitti, S., & Di Lorenzo, P. (2014). Communicating while computing: Distributed mobile cloud computing over 5G heterogeneous networks. IEEE Signal Processing Magazine, 31(6), 45-55.

Bhargavan, K., Delignat-Lavaud, A., Pironti, A., Langley, A., & Ray, M. (2015). Transport Layer Security (TLS) session hash and extended master secret extension (No. RFC 7627).

Dobrilovic, D., Stojanov, Z., Brtka, V., Covic, Z., & Bilinac, N. (2014, September). Software application for analyzing ZigBee network performance in university courses. In Intelligent Systems and Informatics (SISY), 2014 IEEE 12th International Symposium on (pp. 73-77). IEEE.

Gross, J., & Davie, B. (2016). A stateless transport tunneling protocol for network virtualization (STT).

Lopacinski, L., Brzozowski, M., Nolte, J., Kraemer, R., & Buechner, S. (2015, October). Parallel RS error correction structures dedicated for 100 Gbps wireless data link layer. In Ubiquitous Wireless Broadband (ICUWB), 2015 IEEE International Conference on (pp. 1-6). IEEE.

Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., & Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), 133-143.

Song, L., Liao, Y., Bian, K., Song, L., & Han, Z. (2016). Cross-layer protocol design for CSMA/CD in full-duplex WiFi networks. IEEE Communications Letters, 20(4), 792-795.

Turner, S. (2014). Transport layer security. IEEE Internet Computing, 18(6), 60-63.

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Content Analysis For Network Layer And Cloud For Communication. Retrieved from https://myassignmenthelp.com/free-samples/itech1102-content-analysis-for-network-layer-and-cloud-for-communication.

"Content Analysis For Network Layer And Cloud For Communication." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/itech1102-content-analysis-for-network-layer-and-cloud-for-communication.

My Assignment Help (2020) Content Analysis For Network Layer And Cloud For Communication [Online]. Available from: https://myassignmenthelp.com/free-samples/itech1102-content-analysis-for-network-layer-and-cloud-for-communication
[Accessed 26 May 2020].

My Assignment Help. 'Content Analysis For Network Layer And Cloud For Communication' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/itech1102-content-analysis-for-network-layer-and-cloud-for-communication> accessed 26 May 2020.

My Assignment Help. Content Analysis For Network Layer And Cloud For Communication [Internet]. My Assignment Help. 2020 [cited 26 May 2020]. Available from: https://myassignmenthelp.com/free-samples/itech1102-content-analysis-for-network-layer-and-cloud-for-communication.


MyAssignmenthelp.com makes buy assignments online easier for students in Melbourne, Brisbane, Adelaide, Perth, Sydney. Students can get highest quality Assignment Help in Brisbane, Perth, Sydney and other cities of Australia only by completing three steps. Students only need to convey their requirements and our experts craft the assignment in an exact manner that our customers want. In case, they need CDR writing services, they can hire our professional CDR writers for strengthening their chances against other applicants.

Latest Management Samples

MPE781 Economics For Managers 3

Download : 0 | Pages : 14

Answer: 1. The long queues represent the high demand for the given restaurant’s foods and service. The people value the restaurant high and are willing to stand in the waiting lines. The people have high opportunity cost associated with the time spent in the line. On the other hand, the restaurant with empty chairs may have high prices which make their food and services unaffordable to a large number of customers. The owner can increas...

Read More arrow

BUS703 Managing Research 3

Download : 0 | Pages : 4

Answer: Background to the problem: Failures in managing research are mainly associated with the lack of preparation in readiness for a project. This leads to businesses failing to prepare for problems leading to the projects encountering serious management hurdles (Cleden, 2017). To overcome these problems every business must address the following research issues so as to address research problems. Define business and research o...

Read More arrow

BMAC5203 Entrepreneurship For Rectifying Distinct Business Issues

Download : 0 | Pages : 15

Answer: Introduction  In the modern era, there are several organizations that are functioning in the global economy each one of the companies have been performing according to their aims and objectives. The operations of a company is dependent on the style of the entrepreneur and the ability and the mind-set of the entrepreneur determines the process that would be undertaken with the help of which the company can gain competitive edge an...

Read More arrow

SG3034 Introduction To Business And Enterprise

Download : 0 | Pages : 6
  • Course Code: SG3034
  • University: University Of East London
  • Country: United Kingdom

Answer: Introduction The Yeo Valley is one of the most widely known organic dairy firms in the UK. This company works for bringing fresh and new products for all the milk lovers. At the same time, they believe that taking care of nature is also one of the most important activities that they have to carry on. This firm has been set up by the Mead family. They have been living and working in Somerset for a long time period. They had started their...

Read More arrow

BUSN20017 Effective Buisness Communication For Tools And Analysis

Download : 0 | Pages : 18
  • Course Code: BUSN20017
  • University: Central Queensland University
  • Country: Australia

Answer: Introduction: Communication is an important aspect of business management. Every professionals need to develop proper communication skills to enjoy success at workplace mentally and financially. The assignment will first help me identify my issues in communication. Depending on it, a literature review will be conducted which will be followed by an action plan.    Tools and analysis: The first tool that I have used is the ...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,318,775

Orders

4.9/5

Overall Rating

5,074

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1758 Order Completed

99% Response Time

William Martinez

MS in Biology

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

1309 Order Completed

100% Response Time

Gemmie Chen

MSc in Nursing

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

203 Order Completed

97% Response Time

Richard Alpert

PhD in Psychology

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Great job and Great experts! The follow up and process was fantastic. Also, communication with the expert was easy.

flag

User Id: 426409 - 25 May 2020

Australia

student rating student rating student rating student rating student rating

The solution was done in time thank you do much for your efforts but please taking care for grammar is needed there was so many mistakes in grammar thank you

flag

User Id: 371975 - 25 May 2020

Australia

student rating student rating student rating student rating student rating

good to do assignment was what I expected and thanks for that one I will use him again

flag

User Id: 241498 - 25 May 2020

Australia

student rating student rating student rating student rating student rating

Great work in completing my assignment on time, was very helpful and great with communicating with the require details. will definitely use them again!

flag

User Id: 285304 - 25 May 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?