SlideShare a Scribd company logo
1 of 21
WRITTEN ASSESSMENT TEMPLATE - PAGE 1
ASSIGNMENT SUBMISSION
Due date: Friday Week 11 (11:45 PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
While it should not be necessary to use literature/online resources to complete this
assignment, please ensure you cite and reference any such materials using the
Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
WRITTEN ASSESSMENT TEMPLATE - PAGE 2
Week One
Assignment Question: Counting with different number systems:
You may know what a number system is: a number system is a way to represent
numbers. For example, we are using the base-10 number system, which is called
decimal. Other common number systems include base-2 (binary). base-16, base-8
(octal), and (hexadecimal). In computer science, information is often stored as base-
2 (binary) but presented as base-10 (decimal) or base-16 (hexadecimal). For
example, IPv4 addresses (and/or IPv6 addresses), MAC (hardware) addresses (see
the diagram below) are usually presented in decimal or hex, but internally computers
store them in binary.
 View the IPv4 address and MAC address (Physical Address) of your
computer. Then convert both addresses to binary, showing the calculations for
each conversion. In your answer also include one or more screenshots
showing the addresses on your computer.
Your answer
WRITTEN ASSESSMENT TEMPLATE - PAGE 3
The ipconfig/all command is used to check the entire network configuration of the device or specifically of the
computer that is connected to a network. The command ipconfig stand for Internet Protocol Configuration and
it explicitly shows the device IP address and the MAC address (Tiwari, 2012). By executing the command in
own computer, the following result is obtained:
The screenshot is showing the part of details obtained by the command execution of ipconfig/all. It is showing
the following about device address:
IPv4: 192.168.42.24
MAC(Physical Address): 8E-4D-A1-9D-4F-F2
The MAC address is defined here by Physical address. The IPv4 address is denoted here by Decimal and the
MAC address is denoted here by Hexadecimal value. Both these two are to be converted to the Binary and
the steps are as follows:
IPv4 to Binary:
Obtained: 192.168.42.24  Decimal
So, each of the sections will be separately converted to Binary as follows:
So, the IPv4 address in binary becomes to: 11000000.10101000.00101010.00011000
WRITTEN ASSESSMENT TEMPLATE - PAGE 4
MAC to Binary:
Obtained: 8E-4D-A1-9D-4F-F2  Hexadecimal
As it is known that, each hexadecimal digit represents 4-binary bits. The above MAC address contains 12
hexadecimal digits and so there will be 48-bit binary bits to represent the MAC address (Yiqin Lu, 2017).
Hence the decoding of the hexadecimal MAC address to the Binary address is as follows:
So, the Binary address of the MAC (in form of Hexadecimal) is
10001110-01001101-10100001-10011101-01001111-11110010
The ipconfig/all command also produced the following outcomes along with the first screenshot result and
those are shown below:
WRITTEN ASSESSMENT TEMPLATE - PAGE 5
Your question:
Why MAC address is defined in Hex format?
Your sample answer:
Hexadecimal for mat provides the shortest format to keep a value rather than the other
format like decimal, binary and octal. So, for thus reason mainly MAC address is kept in
Hex format.
WRITTEN ASSESSMENT TEMPLATE - PAGE 6
Week Two
Assignment Question:
The ping command is used to test the reachability of a specified destination
computer. The ping command operates by sending several (Internet Control
Message Protocol) messages to a destination computer and waiting for a response
(the messages are referred to as Echo Request and Echo Reply). The output of a
ping command contain two major pieces of information: how many of those
responses are returned, and how long it takes for them to return. The ping command
is one of the most often used networking utilities for troubleshooting network
problems. Complete the following questions:
 Assume you want to test the reachability to the Google searching service,
create a ping command with 10 ICMP echo requests, with each echo request
packet size set to 512 bits. Include a single screenshot that shows both the
ping command and its output as your answer.
 Explain the difference between “ping www.google.com” and “ping the IP
address of Google server at 172.217.167.68”. You may want to try both and
observe any differences. Your answer should include your explanation; it
doesn’t need to include screenshots.
Your answer:
 As per the instruction, the ping is done with its two parameters, namely ICMP
and the Packet Size of each echo request (S. T. Ali, 2015). So, the command
will be like the follows:
ping -n 10 -l 512 www.google.com
Using this ping request, the search is done in the command prompt and the
screenshot is shown below:
With this ping request, the echo is done for 10 times as it is shown in the
WRITTEN ASSESSMENT TEMPLATE - PAGE 7
footer result in Sent and Received Packet for 10 times. For each time the
request is transacted, 512 bits are transacted actually. As the internet is
connected, so packet loss is Zero (Tiwari, 2012).
 The ping is done in two ways, primarily by using the google domain name and
secondly by providing the IP address of the google server. So, for the first
case, the ping will be as follows:
ping www.google.com
And in the second case, the ping will be as follows:
ping 172.217.167.68
Now, the screenshot for these two pings is as follows:
4
For both two cases, the default transaction is made by sending and receiving packet
4. The time taken for the first case is lesser when compared to the second one. The
average time required for the first ping is 96 ms and for the second case, the
average time required is 308 ms. So, the first one is efficient in terms of time
consumption (A.S.Ahmed, 2015).
Your question:
What is ICMP?
Your sample answer:
This is the Internet Control Message Protocol which is basically used for the error reporting
for the IP if the packet delivery is delayed or any error message is receive any the packet
transaction.
WRITTEN ASSESSMENT TEMPLATE - PAGE 8
Week Three
Assignment Question:
Describe is the difference between operating in half-duplex mode or full-duplex
mode. Explain why switches can eliminate collisions in LANs, whereas hubs cannot.
Your answer:
 Half Duplex and Full Duplex are basically two modes in Communication. The
difference between these two are described below:
1. In half duplex mode, the data transaction can be done in two direction but
it allows the data to be transacted in one direction at a time only whereas
in the full duplex method, the data can be transacted in both direction and
in simultaneous operation (F. A. Barbhuiya, 2011).
2. In half duplex, the responder can send and receive data but only one
operation can be done at a time but in Full duplex method, these two can
be done simultaneously.
3. Half duplex method is less efficient than full duplex as for the one
directional operation (A.S.Ahmed, 2015).
4. Half duplex can be used in Walkie-Talkie where wo sides have to talk by
turns and the full duplex can be applied in the Telephone where the
person at two sides can talk simultaneously (F. Li, 2016).
 Switch, in the network traffic, has its own collision domain and is able to
redirect the data to the specific port. So, if there are four devices are
connected with the switch-1 with its ports -1, 2, 3 & 4 with device ID A,B,C &D
and if it is required to transfer the data from A to C, then the data through the
Switch, should pass port-1 & 3 and it will not go to port-2 & 4 (Fuliang Li,
2017). Thus, by using switch, the possibility of collision is lessened. Hub or
repeater has no such capability of redirection to specific port and thus the
packet will reach to every connected port and this the collision will happen
there (Muniyappa, 2012).
Your question:
Between half and full duplex, which one will be preferable for the network communication?
Your sample answer:
As the Full duplex mode allows the bidirectional packet transaction to be happened
simultaneously and for the networking , the bidirectional transaction is essentially required,
so, Full Duplex will be preferred.
WRITTEN ASSESSMENT TEMPLATE - PAGE 9
Week Four
Assignment Question:
Draw a network diagram with the following requirements:
 A wired Local Area Network (LAN) with 5 workstations, organized as a star
topology
 A wireless LAN with an Access Point (AP) and some laptops and mobile
phones.
 A router to link these two LANs to an Internet Service Provider (ISP)
Your answer:
 First, the Local Area Network is shown which includes 5 workstations. Those
workstations will be connected in a start topology and that means at the center
of the connection, a server will be there which will maintain the data routing
among the workstations (Fuliang Li, 2017). It is assumed that the workstation
will includes all types of devices and the data from the central router will pass
through a Firewall. The design is shown below:
 Next, the Wireless LAN is designed which has the access point and there are
different devices connected with the access point such as the computers and
mobiles (S. T. Ali, 2015). Here the access point works as to share the media
to the preferred devices. The diagram is show below:
WRITTEN ASSESSMENT TEMPLATE - PAGE 10
 According to the instruction, the last objective of the connection is to connect
these to LAN with an Internet Service Provider or ISP (Tiwari, 2012). The
design is shown below:
Your question:
What is ISP?
Your sample answer:
This is basically represents an organization which facilitate the company for using the
internet connection and to connect to the outer world of networking.
WRITTEN ASSESSMENT TEMPLATE - PAGE 11
Week Five
Assignment Question:
ABC Corp.’s facilities in Hermit Park, Townsville, are two office buildings 150 metres
apart, each with its own LAN. To connect the two networks, you plan to dig a trench
and lay cable in conduit between the two buildings. You want to use fibre-optic cable,
but your budget-conscious facilities manager wants to use 100 Mbps Ethernet over
twisted-pair cable. Which of the following reasons can you use to justify fibre-optic
cable in this case, and why?
 Twisted pair won’t span a 150-metre distance.
 Fiber-optic cable is cheaper and easier to work with than twisted pair.
 Twisted pair is a conductive cable and can, therefore, carry current based on
the difference in ground potential between the two buildings.
 Fibre-optic cable leaves more room for growth and future needs for increased
bandwidth than twisted pair does.
Your answer:
In this scenario, the communication has to be made between two building which are 150
meters distant. It is to be mentioned that, the Fiber Optic Cable and Twisted Pair Cable
both can provide the bandwidth up to 4.7 GHz and thus it sounds similar. But those two is
differed when the coverage distance will be considered (F. A. Barbhuiya, 2011). The
Twisted Pair Cable can provide the coverage up to 100 meters whereas the Fiber Optic
Cable can provide a coverage up to 80000 meters which is far and far higher than the
Twisted Pair Cable. As the distance is the prime concern in this case, so the Fiber Optic
Cable can be chosen by choosing Reason#1 (Yiqin Lu, 2017). On the other hand, the price
is another concern of the communication. The price is less for the Fiber Optic Cable and
higher in case of Twisted Pair Cable. The Twisted Pair Cable costs for $0.7 per meter
whereas the Fiber Optic Cable costs for $0.3 per meter. So, the basic communication
between these two building will cost higher if the Twisted Pair Cable will be used. So, in that
case, again Fiber Optic Cable is chosen by choosing Resaon#2 (Tiwari, 2012).
.
Your question:
How Fiber Optic Cable transfer data in high speed?
Your sample answer:
Fiber Optic Cable transfer data using the light signal with full internal reflection method.
This method helps the system to keep the data intact and lossless and as the light pulse is
used so the transfer rate is same as the speed of light.
WRITTEN ASSESSMENT TEMPLATE - PAGE 12
Week Six
Assignment Question:
Complete the following table by nominating the network layer names and the specific
protocols associated with the following tasks:
 Ensure that the information sent by the web server reaches your browser
 Route messages between your PC and the server over the Internet
 Allow the web browser software and the web server software to understand
the messages sent between them
 Encapsulate data in frames
Your answer:
Complete this table:
Task Layer Protocol
Ensure that the information sent by the
web server reaches your browser
Application Layer Hyper Text Transfer
Protocol, File
Transfer Protocol
Route messages between your PC and
the server over the Internet
Network Layer Internet Protocol
Allow the web browser software and the
web server software to understand the
messages sent between them
Network Layer User Datagram
Protocol
Encapsulate data in frames Network Layer via
Data Link Layer
Internet Protocol
Your question:
How IP address ca be converted to MAC address in the network?
Your sample answer:
The network layer uses the MAC address which carries the source address in the data
frame. The IP is converted to MAC address using the AR protocol and transferred through
the Network layer and reaches to the destination.
WRITTEN ASSESSMENT TEMPLATE - PAGE 13
Week Seven
Assignment Question:
When you try to ping a server on your local network, your operating system needs to
convert the IP address into a MAC address. Answer the following questions:
1) To resolve a local IP address to a physical MAC address, which protocol can
be used? Which layer of the TCP/IP layered architecture does the protocol
belong to?
2) Briefly discuss how this protocol works, including how the protocol avoids
sending a request across a network for each IP packet that needs to be sent
to the same destination.
Your answer:
1. To resolve a local IP to MAC, the Address Resolution Protocol or ARP is
used. The MAC address shows the physical identification of the network and
the IP address shows the logical device address. When the packet of the data
is received from the user, the packet is transformed to Frame and using the
ARP, the IP is converted to MAC in the Network Layer (Fuliang Li, 2017).
2. When ARP is executed in DOS mode, the following outcomes occurs:
So, it can be seen that, the ARP converts the IP address to the MAC or physical
address. Basically, when a packet is to be transferred to the destination, primarily
the ARP frame is created where all the required information like the source address
and the destination address along with the data description (F. Li, 2016). So, this
WRITTEN ASSESSMENT TEMPLATE - PAGE 14
particular frame will be transferred and thus, the frame will be received by a
particular destination only.
Your question:
What are the advantages of MAC address in a Network?
Your sample answer:
IP address shows the logical address of a device but it is unable to identify the interface of
the network which is necessary to communicate in the network to reach to the destination.
The MAC address is enriched with the newer version of the address allocation which is able
to identify the destination device as well as the interface using the Frame or ARP Frame.
Thus, MAC address is advantageous (F. A. Barbhuiya, 2011).
WRITTEN ASSESSMENT TEMPLATE - PAGE 15
Week Eight
Assignment Question:
A network diagram shows the connection of four computers and the network devices:
a repeater, two switches and a router. The port numbers (P1, P2, and P3) in the
diagram refers to the ports on the respective switches. The MAC addresses of the
computers and the router (where indicated by the arrow) are given in the diagram.
Network Diagram
If the four computers have been actively communicating with each other, what would
the entries of the switching table be for Switch S2? Fill in the switching table below
with the relevant entries. Any order of entries is acceptable.
MAC Address Port #
WRITTEN ASSESSMENT TEMPLATE - PAGE 16
Your answer:
Complete the following table:
VLAN MAC Address Port #
1
(C1)
0A-21-DD-2F-00-22 P2
0A-21-DD-2F-00-33 P3-P2-P1
0A-21-DD-2F-00-44 P3-P2-P3
0A-21-DD-2F-00-11 P1
2
(C2)
0A-21-DD-2F-00-11 P1
0A-21-DD-2F-00-33 P3-P2-P1
0A-21-DD-2F-00-44 P3-P2-P3
0A-21-DD-2F-00-22 P2
3
(C3)
0A-21-DD-2F-00-11 P2-P3-P1
0A-21-DD-2F-00-22 P2-P3-P2
0A-21-DD-2F-00-44 P3
0A-21-DD-2F-00-33 P1
4
(C4)
0A-21-DD-2F-00-11 P2-P3-P1
0A-21-DD-2F-00-22 P2-P3-P2
0A-21-DD-2F-00-33 P1
0A-21-DD-2F-00-44 P3
Your question:
What is the function of a Switch?
Your sample answer:
Switch is used to forward the packet or frame to the destination device. When switch
receives a frame, it checks the MAC table and match the destination location of the frame
and forward the frame to the relevant post so that it can reach to the relevant device only
(Tiwari, 2012).
WRITTEN ASSESSMENT TEMPLATE - PAGE 17
Week Nine
Assignment Question:
Visit Digital Attack Map and search the internet to complete the following tasks:
1) Explain what DDoS is;
2) Give two specific examples of real of DDoS attacks
3) What are the top three practices for preventing or stopping DDoS attacks.
Your answer:
1. DDoS: DDoS or Distributed Daniel of Service attach is basically a malicious
attack and this aims the target device to be flooding in the network traffic by
disrupting it. So, the user cannot use the normal traffic through their device.
DDoS not only attacks a single computer but it actually attacks the entire
network to take the traffic under the control of the hackers (Mohamed
Idhammad, 2018). Thus, every device of the network including the devices
connected in IoT, will be acted as the bot, controlled by the hackers and thus
the botnet is created and no normal traffic of the desired organization will be
transacted through the network and hence the network breakdown occurs (T.
Vissers, 2014).
2. In 2018, the github, a developer and repository of the leading programmer,
was hacked with the DDoS and got a record-breaking traffic of 1.5TBPS.
Another major incident was occurred for the security provider “CloudFlare”
with a sudden hit of 400GBPS in the year of 2014 (M. Anagnostopoulos,
2015).
3. There are several ways to prevent or at least avoid the DDoS attack. Three of
those methods are:
i. Developing a response plan for the DDoS attack so that when the
WRITTEN ASSESSMENT TEMPLATE - PAGE 18
modification is about to be happened, this will be get reported an thus it
make the alert to the administrator (T. Vissers, 2014).
ii. Installing integrated security plan make the system healthy and less
probable to be attacked by the DDoS. This includes the intrusion
detection technique to be install there along with the firewall and other
security patches (M. Anagnostopoulos, 2015).
iii. Utilizing Cloud network is the safer choice to be get immune from the
DDoS as the cloud has the proven security and high bandwidth.
Your question:
What are the symptoms of DDoS attack?
Your sample answer:
The symptoms are:
 Slow file access in remote location or in native device
 Unable to locate or to reach to a particular web service for long time
 Disconnection of Internet Service
 Internet flooding and blockages
 Storing enormous amount of spam mail.
WRITTEN ASSESSMENT TEMPLATE - PAGE 19
Week Ten
Assignment Question:
You have an idea for a cloud-based IoT application that can monitor your
living/working/studying environments by collecting and demonstrating the data of
temperature, humanity, air quality and so on. You need a development server for
your team members (classmates across several campuses). And then, once the
software is developed and deployed with required hardware, you need a hosting
solution for users to access to the software and users can check their
living/working/studying environments on their tablets and smartphones.
 What types of cloud computing service are appropriate to these situations?
Justify your answers.
Your answer:
 In this scenario, Infrastructure as a Service will be more appropriate. This
Infrastructure as a Service provides the integration of software ad hardware
usages by the user. As the students have to use the infrastructure for studying
purpose in difference campuses with the software and hardware for the
development purpose, so, Infrastructure as a Service will be better to provide
the service respectively (Sidhu, 2017). By using Infrastructure as a Service,
the students will be able to access the software applications, can manage the
data in runtime, access the middleware and also able to access the operating
system from remotely. So, the students even need not to have a native
system and do not even to bother about the same and can work smoothly
(Zhou, 2016).
Your question:
How many types of cloud services are there?
Your sample answer:
There are basically three types of cloud services for providing the integrated solutions to
the clients through which they can use the resources, provided by the vendors and without
the installation of any software and in many cases, the hardware are also not required up to
high level. Those are:
Infrastructure as a Service
WRITTEN ASSESSMENT TEMPLATE - PAGE 20
Software as a Service
Platform as a Service.
References
A.S.Ahmed, R. a. N., 2015. Improvingsecurity forIPv6neighbordiscovery.
ProceedingsoftheInternational ConferenceonElectricalEngineeringandInformatics(ICEEI’15), p.
271–274.
F. A. Barbhuiya, S. B. a. S. N., 2011. “Detection of neighbor solicitation and advertisement spoofing
in IPv6 neighbor discovery protocol. in Proceedings of the 4th International Conference on Security
of Information and Networks (SIN ’11), , pp. 111-118.
F. Li, J. Y. X. W. T. P. C. A. a. J. W., 2016. Characteristics analysis at prefix granularity: A case
study in an IPv6 network. Journal of Network and Computer Applications, Volume 70, p. 156–170.
Fuliang Li, X. W. T. P. a. J. Y., 2017. A Case Study of IPv6 Network Performance: Packet Delay,
Loss, and Reordering. Mathematical Problems in Engineering, p. 10.
M. Anagnostopoulos, G. K. a. S. G., 2015. New facets of mobile botnet: architecture and evaluation.
International Journal of Information Security, 15(5), p. 455–473.
Mohamed Idhammad, K. A. M. B., 2018. Detection System of HTTP DDoS Attacks in a Cloud
Environment Based on Information Theoretic Entropy and Random Forest. Security and
Communication Networks, p. 13.
Muniyappa, V. K., 2012. Performance Analysis of IPv4 versus IPv6 in a Simple Campus Network.
Long Beach.
S. T. Ali, V. S. A. R. a. S. J., 2015. A survey of securing networks using software defined
networking. IEEE TransactionsonReliability, 64(3), p. 1086–1097.
Sidhu, S. S. a. J., 2017. Compliance-based Multi-dimensional Trust Evaluation System for
determining trustworthiness of Cloud Service Providers. Future Generation Computer Systems,
Volume 67, p. 109–132.
T. Vissers, T. S. S. L. P. K. G. a. P. H., 2014. DDoS defense system for web services in a cloud
environment. Future Generation Computer Systems, Volume 37, pp. 37-45.
Tiwari, V. K. a. S., 2012. Routing in IPv6 over Low-Power Wireless Personal Area Networks
(6LoWPAN): A Survey. Journal of Computer Networks and Communications, Volume 2012, p. 10.
Yiqin Lu, M. W. a. P. H., 2017. An SDN-Based Authentication Mechanism for Securing Neighbor
Discovery Protocol in IPv6. Security and Communication Networks , Volume
https://doi.org/10.1155/2017/5838657, p. 9.
Zhou, Z. W. a. Y., 2016. Customized Cloud Service Trustworthiness Evaluation and Comparison
Using Fuzzy Neural Networks,. Proceedings of the 2016 IEEE 40th Annual Computer Software and
Applications Conference (COMPSAC), pp. 433-442.
MARKING SHEET - DO NOT DELETE
Assignment Question Student Question
Criteria
0 Incorrect/No Response 0 No question provided or minimal
attempt
0.5 Limited /Partially incorrect
response OR response is
not in the student’s own
words
0.5 Simplistic question/sample answer
that does not demonstrate an
understanding of the topic area OR
sample answer is not in the
student’s own words
1 Correct response but
could have more detail
1 Good question that has some
challenge, but could be more
challenging and/or the sample
answer needs more
detail/explanation
1.5 Excellent response with
good detail
1.5 Excellent and challenging question
with a detailed sample answer
Week Marks Awarded Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
WRITTEN ASSESSMENT TEMPLATE - PAGE 14

More Related Content

What's hot

Java Network Programming
Java Network ProgrammingJava Network Programming
Java Network Programming
backdoor
 
Intrebari si raspunsuri CCNA1
Intrebari si raspunsuri CCNA1Intrebari si raspunsuri CCNA1
Intrebari si raspunsuri CCNA1
Adrian Preda
 

What's hot (20)

Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Software
 
TCP / IP Services and Standards
TCP / IP Services and StandardsTCP / IP Services and Standards
TCP / IP Services and Standards
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Network Testing ques
Network Testing quesNetwork Testing ques
Network Testing ques
 
Internet
InternetInternet
Internet
 
Cs556 section3
Cs556 section3Cs556 section3
Cs556 section3
 
Java Network Programming
Java Network ProgrammingJava Network Programming
Java Network Programming
 
Bt0076, tcpip
Bt0076, tcpipBt0076, tcpip
Bt0076, tcpip
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
 
IMPROVING IPV6 ADDRESSING TYPES AND SIZE
IMPROVING IPV6 ADDRESSING TYPES AND SIZEIMPROVING IPV6 ADDRESSING TYPES AND SIZE
IMPROVING IPV6 ADDRESSING TYPES AND SIZE
 
net work iTM3
net work iTM3net work iTM3
net work iTM3
 
Intrebari si raspunsuri CCNA1
Intrebari si raspunsuri CCNA1Intrebari si raspunsuri CCNA1
Intrebari si raspunsuri CCNA1
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 

Similar to Coit11238 2019-t2

The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
 
Pears
PearsPears
Pears
thips
 
Simplified Networking and Troubleshooting for K-12 Teachers
Simplified Networking and Troubleshooting for K-12 TeachersSimplified Networking and Troubleshooting for K-12 Teachers
Simplified Networking and Troubleshooting for K-12 Teachers
webhostingguy
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
Lakeisha Jones
 
Machine Problem 1: Let's chat
Machine Problem 1: Let's chatMachine Problem 1: Let's chat
Machine Problem 1: Let's chat
butest
 
Please follow the data and description 1) An association indicate.pdf
Please follow the data and description 1) An association indicate.pdfPlease follow the data and description 1) An association indicate.pdf
Please follow the data and description 1) An association indicate.pdf
KARTIKINDIA
 
Megalodon-Challenge-Solution
Megalodon-Challenge-SolutionMegalodon-Challenge-Solution
Megalodon-Challenge-Solution
Philip Storey
 

Similar to Coit11238 2019-t2 (20)

The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
 
NP-lab-manual (1).pdf
NP-lab-manual (1).pdfNP-lab-manual (1).pdf
NP-lab-manual (1).pdf
 
NP-lab-manual.pdf
NP-lab-manual.pdfNP-lab-manual.pdf
NP-lab-manual.pdf
 
Pears
PearsPears
Pears
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Simplified Networking and Troubleshooting for K-12 Teachers
Simplified Networking and Troubleshooting for K-12 TeachersSimplified Networking and Troubleshooting for K-12 Teachers
Simplified Networking and Troubleshooting for K-12 Teachers
 
Chapter 14 Important questions
Chapter 14 Important questionsChapter 14 Important questions
Chapter 14 Important questions
 
How Does the Internet Work? : Notes
How Does the Internet Work? : NotesHow Does the Internet Work? : Notes
How Does the Internet Work? : Notes
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
Machine Problem 1: Let's chat
Machine Problem 1: Let's chatMachine Problem 1: Let's chat
Machine Problem 1: Let's chat
 
HHS_TOC_Glossary EMERSON EDUARDO RODRIGUES
HHS_TOC_Glossary EMERSON EDUARDO RODRIGUESHHS_TOC_Glossary EMERSON EDUARDO RODRIGUES
HHS_TOC_Glossary EMERSON EDUARDO RODRIGUES
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Please follow the data and description 1) An association indicate.pdf
Please follow the data and description 1) An association indicate.pdfPlease follow the data and description 1) An association indicate.pdf
Please follow the data and description 1) An association indicate.pdf
 
Megalodon-Challenge-Solution
Megalodon-Challenge-SolutionMegalodon-Challenge-Solution
Megalodon-Challenge-Solution
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 
Bcs 052 solved assignment
Bcs 052 solved assignmentBcs 052 solved assignment
Bcs 052 solved assignment
 
Mis 589 Success Begins / snaptutorial.com
Mis 589  Success Begins / snaptutorial.comMis 589  Success Begins / snaptutorial.com
Mis 589 Success Begins / snaptutorial.com
 
Mis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.comMis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.com
 

More from Subhadeep Chakraborty

IoT Applications in Retail
IoT Applications in RetailIoT Applications in Retail
IoT Applications in Retail
Subhadeep Chakraborty
 

More from Subhadeep Chakraborty (16)

MA2439-Effective business communication in the workplace
MA2439-Effective business communication in the workplaceMA2439-Effective business communication in the workplace
MA2439-Effective business communication in the workplace
 
Clt83410 document
Clt83410 documentClt83410 document
Clt83410 document
 
IoT Applications in Retail
IoT Applications in RetailIoT Applications in Retail
IoT Applications in Retail
 
Mits5003 aah62 report-2
Mits5003 aah62 report-2Mits5003 aah62 report-2
Mits5003 aah62 report-2
 
Mits5003 report
Mits5003 reportMits5003 report
Mits5003 report
 
MITS5003 Wireless Networks & Communication
MITS5003 Wireless Networks & CommunicationMITS5003 Wireless Networks & Communication
MITS5003 Wireless Networks & Communication
 
MITS5003 Wireless Networks & Communication
MITS5003 Wireless Networks & CommunicationMITS5003 Wireless Networks & Communication
MITS5003 Wireless Networks & Communication
 
MITS5003 Wireless Networks & Communication
MITS5003 Wireless Networks & CommunicationMITS5003 Wireless Networks & Communication
MITS5003 Wireless Networks & Communication
 
Draft%20 mani copy
Draft%20 mani   copyDraft%20 mani   copy
Draft%20 mani copy
 
Itech7407 tobacco-delivered-23-9-19
Itech7407 tobacco-delivered-23-9-19Itech7407 tobacco-delivered-23-9-19
Itech7407 tobacco-delivered-23-9-19
 
Air passenger report
Air passenger reportAir passenger report
Air passenger report
 
Itech7407 cardio arrack-deliered-18-9-19
Itech7407  cardio arrack-deliered-18-9-19Itech7407  cardio arrack-deliered-18-9-19
Itech7407 cardio arrack-deliered-18-9-19
 
Itech 7407 report
Itech 7407 reportItech 7407 report
Itech 7407 report
 
Indian e-Business Anslysis using SPSS
Indian e-Business Anslysis using SPSSIndian e-Business Anslysis using SPSS
Indian e-Business Anslysis using SPSS
 
So692 cyber security-document
So692 cyber security-documentSo692 cyber security-document
So692 cyber security-document
 
Amazon seniment
Amazon senimentAmazon seniment
Amazon seniment
 

Recently uploaded

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
Poster_density_driven_with_fracture_MLMC.pdf
Poster_density_driven_with_fracture_MLMC.pdfPoster_density_driven_with_fracture_MLMC.pdf
Poster_density_driven_with_fracture_MLMC.pdf
Alexander Litvinenko
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
Benefits and Challenges of OER by Shweta Babel.pptx
Benefits and Challenges of OER by Shweta Babel.pptxBenefits and Challenges of OER by Shweta Babel.pptx
Benefits and Challenges of OER by Shweta Babel.pptx
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Poster_density_driven_with_fracture_MLMC.pdf
Poster_density_driven_with_fracture_MLMC.pdfPoster_density_driven_with_fracture_MLMC.pdf
Poster_density_driven_with_fracture_MLMC.pdf
 
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Implanted Devices - VP Shunts: EMGuidewire's Radiology Reading Room
Implanted Devices - VP Shunts: EMGuidewire's Radiology Reading RoomImplanted Devices - VP Shunts: EMGuidewire's Radiology Reading Room
Implanted Devices - VP Shunts: EMGuidewire's Radiology Reading Room
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 

Coit11238 2019-t2

  • 1. WRITTEN ASSESSMENT TEMPLATE - PAGE 1 ASSIGNMENT SUBMISSION Due date: Friday Week 11 (11:45 PM AEST) Part: Written Assessment Weighting: 30% of total assessment. Submission: Electronic (see course website for details) Instructions While it should not be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. DO NOT copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words! Please complete your assignment using this submission template file, inserting your responses where indicated. DO NOT delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers. Please fill in the following details: Student Name Student Number
  • 2. WRITTEN ASSESSMENT TEMPLATE - PAGE 2 Week One Assignment Question: Counting with different number systems: You may know what a number system is: a number system is a way to represent numbers. For example, we are using the base-10 number system, which is called decimal. Other common number systems include base-2 (binary). base-16, base-8 (octal), and (hexadecimal). In computer science, information is often stored as base- 2 (binary) but presented as base-10 (decimal) or base-16 (hexadecimal). For example, IPv4 addresses (and/or IPv6 addresses), MAC (hardware) addresses (see the diagram below) are usually presented in decimal or hex, but internally computers store them in binary.  View the IPv4 address and MAC address (Physical Address) of your computer. Then convert both addresses to binary, showing the calculations for each conversion. In your answer also include one or more screenshots showing the addresses on your computer. Your answer
  • 3. WRITTEN ASSESSMENT TEMPLATE - PAGE 3 The ipconfig/all command is used to check the entire network configuration of the device or specifically of the computer that is connected to a network. The command ipconfig stand for Internet Protocol Configuration and it explicitly shows the device IP address and the MAC address (Tiwari, 2012). By executing the command in own computer, the following result is obtained: The screenshot is showing the part of details obtained by the command execution of ipconfig/all. It is showing the following about device address: IPv4: 192.168.42.24 MAC(Physical Address): 8E-4D-A1-9D-4F-F2 The MAC address is defined here by Physical address. The IPv4 address is denoted here by Decimal and the MAC address is denoted here by Hexadecimal value. Both these two are to be converted to the Binary and the steps are as follows: IPv4 to Binary: Obtained: 192.168.42.24  Decimal So, each of the sections will be separately converted to Binary as follows: So, the IPv4 address in binary becomes to: 11000000.10101000.00101010.00011000
  • 4. WRITTEN ASSESSMENT TEMPLATE - PAGE 4 MAC to Binary: Obtained: 8E-4D-A1-9D-4F-F2  Hexadecimal As it is known that, each hexadecimal digit represents 4-binary bits. The above MAC address contains 12 hexadecimal digits and so there will be 48-bit binary bits to represent the MAC address (Yiqin Lu, 2017). Hence the decoding of the hexadecimal MAC address to the Binary address is as follows: So, the Binary address of the MAC (in form of Hexadecimal) is 10001110-01001101-10100001-10011101-01001111-11110010 The ipconfig/all command also produced the following outcomes along with the first screenshot result and those are shown below:
  • 5. WRITTEN ASSESSMENT TEMPLATE - PAGE 5 Your question: Why MAC address is defined in Hex format? Your sample answer: Hexadecimal for mat provides the shortest format to keep a value rather than the other format like decimal, binary and octal. So, for thus reason mainly MAC address is kept in Hex format.
  • 6. WRITTEN ASSESSMENT TEMPLATE - PAGE 6 Week Two Assignment Question: The ping command is used to test the reachability of a specified destination computer. The ping command operates by sending several (Internet Control Message Protocol) messages to a destination computer and waiting for a response (the messages are referred to as Echo Request and Echo Reply). The output of a ping command contain two major pieces of information: how many of those responses are returned, and how long it takes for them to return. The ping command is one of the most often used networking utilities for troubleshooting network problems. Complete the following questions:  Assume you want to test the reachability to the Google searching service, create a ping command with 10 ICMP echo requests, with each echo request packet size set to 512 bits. Include a single screenshot that shows both the ping command and its output as your answer.  Explain the difference between “ping www.google.com” and “ping the IP address of Google server at 172.217.167.68”. You may want to try both and observe any differences. Your answer should include your explanation; it doesn’t need to include screenshots. Your answer:  As per the instruction, the ping is done with its two parameters, namely ICMP and the Packet Size of each echo request (S. T. Ali, 2015). So, the command will be like the follows: ping -n 10 -l 512 www.google.com Using this ping request, the search is done in the command prompt and the screenshot is shown below: With this ping request, the echo is done for 10 times as it is shown in the
  • 7. WRITTEN ASSESSMENT TEMPLATE - PAGE 7 footer result in Sent and Received Packet for 10 times. For each time the request is transacted, 512 bits are transacted actually. As the internet is connected, so packet loss is Zero (Tiwari, 2012).  The ping is done in two ways, primarily by using the google domain name and secondly by providing the IP address of the google server. So, for the first case, the ping will be as follows: ping www.google.com And in the second case, the ping will be as follows: ping 172.217.167.68 Now, the screenshot for these two pings is as follows: 4 For both two cases, the default transaction is made by sending and receiving packet 4. The time taken for the first case is lesser when compared to the second one. The average time required for the first ping is 96 ms and for the second case, the average time required is 308 ms. So, the first one is efficient in terms of time consumption (A.S.Ahmed, 2015). Your question: What is ICMP? Your sample answer: This is the Internet Control Message Protocol which is basically used for the error reporting for the IP if the packet delivery is delayed or any error message is receive any the packet transaction.
  • 8. WRITTEN ASSESSMENT TEMPLATE - PAGE 8 Week Three Assignment Question: Describe is the difference between operating in half-duplex mode or full-duplex mode. Explain why switches can eliminate collisions in LANs, whereas hubs cannot. Your answer:  Half Duplex and Full Duplex are basically two modes in Communication. The difference between these two are described below: 1. In half duplex mode, the data transaction can be done in two direction but it allows the data to be transacted in one direction at a time only whereas in the full duplex method, the data can be transacted in both direction and in simultaneous operation (F. A. Barbhuiya, 2011). 2. In half duplex, the responder can send and receive data but only one operation can be done at a time but in Full duplex method, these two can be done simultaneously. 3. Half duplex method is less efficient than full duplex as for the one directional operation (A.S.Ahmed, 2015). 4. Half duplex can be used in Walkie-Talkie where wo sides have to talk by turns and the full duplex can be applied in the Telephone where the person at two sides can talk simultaneously (F. Li, 2016).  Switch, in the network traffic, has its own collision domain and is able to redirect the data to the specific port. So, if there are four devices are connected with the switch-1 with its ports -1, 2, 3 & 4 with device ID A,B,C &D and if it is required to transfer the data from A to C, then the data through the Switch, should pass port-1 & 3 and it will not go to port-2 & 4 (Fuliang Li, 2017). Thus, by using switch, the possibility of collision is lessened. Hub or repeater has no such capability of redirection to specific port and thus the packet will reach to every connected port and this the collision will happen there (Muniyappa, 2012). Your question: Between half and full duplex, which one will be preferable for the network communication? Your sample answer: As the Full duplex mode allows the bidirectional packet transaction to be happened simultaneously and for the networking , the bidirectional transaction is essentially required, so, Full Duplex will be preferred.
  • 9. WRITTEN ASSESSMENT TEMPLATE - PAGE 9 Week Four Assignment Question: Draw a network diagram with the following requirements:  A wired Local Area Network (LAN) with 5 workstations, organized as a star topology  A wireless LAN with an Access Point (AP) and some laptops and mobile phones.  A router to link these two LANs to an Internet Service Provider (ISP) Your answer:  First, the Local Area Network is shown which includes 5 workstations. Those workstations will be connected in a start topology and that means at the center of the connection, a server will be there which will maintain the data routing among the workstations (Fuliang Li, 2017). It is assumed that the workstation will includes all types of devices and the data from the central router will pass through a Firewall. The design is shown below:  Next, the Wireless LAN is designed which has the access point and there are different devices connected with the access point such as the computers and mobiles (S. T. Ali, 2015). Here the access point works as to share the media to the preferred devices. The diagram is show below:
  • 10. WRITTEN ASSESSMENT TEMPLATE - PAGE 10  According to the instruction, the last objective of the connection is to connect these to LAN with an Internet Service Provider or ISP (Tiwari, 2012). The design is shown below: Your question: What is ISP? Your sample answer: This is basically represents an organization which facilitate the company for using the internet connection and to connect to the outer world of networking.
  • 11. WRITTEN ASSESSMENT TEMPLATE - PAGE 11 Week Five Assignment Question: ABC Corp.’s facilities in Hermit Park, Townsville, are two office buildings 150 metres apart, each with its own LAN. To connect the two networks, you plan to dig a trench and lay cable in conduit between the two buildings. You want to use fibre-optic cable, but your budget-conscious facilities manager wants to use 100 Mbps Ethernet over twisted-pair cable. Which of the following reasons can you use to justify fibre-optic cable in this case, and why?  Twisted pair won’t span a 150-metre distance.  Fiber-optic cable is cheaper and easier to work with than twisted pair.  Twisted pair is a conductive cable and can, therefore, carry current based on the difference in ground potential between the two buildings.  Fibre-optic cable leaves more room for growth and future needs for increased bandwidth than twisted pair does. Your answer: In this scenario, the communication has to be made between two building which are 150 meters distant. It is to be mentioned that, the Fiber Optic Cable and Twisted Pair Cable both can provide the bandwidth up to 4.7 GHz and thus it sounds similar. But those two is differed when the coverage distance will be considered (F. A. Barbhuiya, 2011). The Twisted Pair Cable can provide the coverage up to 100 meters whereas the Fiber Optic Cable can provide a coverage up to 80000 meters which is far and far higher than the Twisted Pair Cable. As the distance is the prime concern in this case, so the Fiber Optic Cable can be chosen by choosing Reason#1 (Yiqin Lu, 2017). On the other hand, the price is another concern of the communication. The price is less for the Fiber Optic Cable and higher in case of Twisted Pair Cable. The Twisted Pair Cable costs for $0.7 per meter whereas the Fiber Optic Cable costs for $0.3 per meter. So, the basic communication between these two building will cost higher if the Twisted Pair Cable will be used. So, in that case, again Fiber Optic Cable is chosen by choosing Resaon#2 (Tiwari, 2012). . Your question: How Fiber Optic Cable transfer data in high speed? Your sample answer: Fiber Optic Cable transfer data using the light signal with full internal reflection method. This method helps the system to keep the data intact and lossless and as the light pulse is used so the transfer rate is same as the speed of light.
  • 12. WRITTEN ASSESSMENT TEMPLATE - PAGE 12 Week Six Assignment Question: Complete the following table by nominating the network layer names and the specific protocols associated with the following tasks:  Ensure that the information sent by the web server reaches your browser  Route messages between your PC and the server over the Internet  Allow the web browser software and the web server software to understand the messages sent between them  Encapsulate data in frames Your answer: Complete this table: Task Layer Protocol Ensure that the information sent by the web server reaches your browser Application Layer Hyper Text Transfer Protocol, File Transfer Protocol Route messages between your PC and the server over the Internet Network Layer Internet Protocol Allow the web browser software and the web server software to understand the messages sent between them Network Layer User Datagram Protocol Encapsulate data in frames Network Layer via Data Link Layer Internet Protocol Your question: How IP address ca be converted to MAC address in the network? Your sample answer: The network layer uses the MAC address which carries the source address in the data frame. The IP is converted to MAC address using the AR protocol and transferred through the Network layer and reaches to the destination.
  • 13. WRITTEN ASSESSMENT TEMPLATE - PAGE 13 Week Seven Assignment Question: When you try to ping a server on your local network, your operating system needs to convert the IP address into a MAC address. Answer the following questions: 1) To resolve a local IP address to a physical MAC address, which protocol can be used? Which layer of the TCP/IP layered architecture does the protocol belong to? 2) Briefly discuss how this protocol works, including how the protocol avoids sending a request across a network for each IP packet that needs to be sent to the same destination. Your answer: 1. To resolve a local IP to MAC, the Address Resolution Protocol or ARP is used. The MAC address shows the physical identification of the network and the IP address shows the logical device address. When the packet of the data is received from the user, the packet is transformed to Frame and using the ARP, the IP is converted to MAC in the Network Layer (Fuliang Li, 2017). 2. When ARP is executed in DOS mode, the following outcomes occurs: So, it can be seen that, the ARP converts the IP address to the MAC or physical address. Basically, when a packet is to be transferred to the destination, primarily the ARP frame is created where all the required information like the source address and the destination address along with the data description (F. Li, 2016). So, this
  • 14. WRITTEN ASSESSMENT TEMPLATE - PAGE 14 particular frame will be transferred and thus, the frame will be received by a particular destination only. Your question: What are the advantages of MAC address in a Network? Your sample answer: IP address shows the logical address of a device but it is unable to identify the interface of the network which is necessary to communicate in the network to reach to the destination. The MAC address is enriched with the newer version of the address allocation which is able to identify the destination device as well as the interface using the Frame or ARP Frame. Thus, MAC address is advantageous (F. A. Barbhuiya, 2011).
  • 15. WRITTEN ASSESSMENT TEMPLATE - PAGE 15 Week Eight Assignment Question: A network diagram shows the connection of four computers and the network devices: a repeater, two switches and a router. The port numbers (P1, P2, and P3) in the diagram refers to the ports on the respective switches. The MAC addresses of the computers and the router (where indicated by the arrow) are given in the diagram. Network Diagram If the four computers have been actively communicating with each other, what would the entries of the switching table be for Switch S2? Fill in the switching table below with the relevant entries. Any order of entries is acceptable. MAC Address Port #
  • 16. WRITTEN ASSESSMENT TEMPLATE - PAGE 16 Your answer: Complete the following table: VLAN MAC Address Port # 1 (C1) 0A-21-DD-2F-00-22 P2 0A-21-DD-2F-00-33 P3-P2-P1 0A-21-DD-2F-00-44 P3-P2-P3 0A-21-DD-2F-00-11 P1 2 (C2) 0A-21-DD-2F-00-11 P1 0A-21-DD-2F-00-33 P3-P2-P1 0A-21-DD-2F-00-44 P3-P2-P3 0A-21-DD-2F-00-22 P2 3 (C3) 0A-21-DD-2F-00-11 P2-P3-P1 0A-21-DD-2F-00-22 P2-P3-P2 0A-21-DD-2F-00-44 P3 0A-21-DD-2F-00-33 P1 4 (C4) 0A-21-DD-2F-00-11 P2-P3-P1 0A-21-DD-2F-00-22 P2-P3-P2 0A-21-DD-2F-00-33 P1 0A-21-DD-2F-00-44 P3 Your question: What is the function of a Switch? Your sample answer: Switch is used to forward the packet or frame to the destination device. When switch receives a frame, it checks the MAC table and match the destination location of the frame and forward the frame to the relevant post so that it can reach to the relevant device only (Tiwari, 2012).
  • 17. WRITTEN ASSESSMENT TEMPLATE - PAGE 17 Week Nine Assignment Question: Visit Digital Attack Map and search the internet to complete the following tasks: 1) Explain what DDoS is; 2) Give two specific examples of real of DDoS attacks 3) What are the top three practices for preventing or stopping DDoS attacks. Your answer: 1. DDoS: DDoS or Distributed Daniel of Service attach is basically a malicious attack and this aims the target device to be flooding in the network traffic by disrupting it. So, the user cannot use the normal traffic through their device. DDoS not only attacks a single computer but it actually attacks the entire network to take the traffic under the control of the hackers (Mohamed Idhammad, 2018). Thus, every device of the network including the devices connected in IoT, will be acted as the bot, controlled by the hackers and thus the botnet is created and no normal traffic of the desired organization will be transacted through the network and hence the network breakdown occurs (T. Vissers, 2014). 2. In 2018, the github, a developer and repository of the leading programmer, was hacked with the DDoS and got a record-breaking traffic of 1.5TBPS. Another major incident was occurred for the security provider “CloudFlare” with a sudden hit of 400GBPS in the year of 2014 (M. Anagnostopoulos, 2015). 3. There are several ways to prevent or at least avoid the DDoS attack. Three of those methods are: i. Developing a response plan for the DDoS attack so that when the
  • 18. WRITTEN ASSESSMENT TEMPLATE - PAGE 18 modification is about to be happened, this will be get reported an thus it make the alert to the administrator (T. Vissers, 2014). ii. Installing integrated security plan make the system healthy and less probable to be attacked by the DDoS. This includes the intrusion detection technique to be install there along with the firewall and other security patches (M. Anagnostopoulos, 2015). iii. Utilizing Cloud network is the safer choice to be get immune from the DDoS as the cloud has the proven security and high bandwidth. Your question: What are the symptoms of DDoS attack? Your sample answer: The symptoms are:  Slow file access in remote location or in native device  Unable to locate or to reach to a particular web service for long time  Disconnection of Internet Service  Internet flooding and blockages  Storing enormous amount of spam mail.
  • 19. WRITTEN ASSESSMENT TEMPLATE - PAGE 19 Week Ten Assignment Question: You have an idea for a cloud-based IoT application that can monitor your living/working/studying environments by collecting and demonstrating the data of temperature, humanity, air quality and so on. You need a development server for your team members (classmates across several campuses). And then, once the software is developed and deployed with required hardware, you need a hosting solution for users to access to the software and users can check their living/working/studying environments on their tablets and smartphones.  What types of cloud computing service are appropriate to these situations? Justify your answers. Your answer:  In this scenario, Infrastructure as a Service will be more appropriate. This Infrastructure as a Service provides the integration of software ad hardware usages by the user. As the students have to use the infrastructure for studying purpose in difference campuses with the software and hardware for the development purpose, so, Infrastructure as a Service will be better to provide the service respectively (Sidhu, 2017). By using Infrastructure as a Service, the students will be able to access the software applications, can manage the data in runtime, access the middleware and also able to access the operating system from remotely. So, the students even need not to have a native system and do not even to bother about the same and can work smoothly (Zhou, 2016). Your question: How many types of cloud services are there? Your sample answer: There are basically three types of cloud services for providing the integrated solutions to the clients through which they can use the resources, provided by the vendors and without the installation of any software and in many cases, the hardware are also not required up to high level. Those are: Infrastructure as a Service
  • 20. WRITTEN ASSESSMENT TEMPLATE - PAGE 20 Software as a Service Platform as a Service. References A.S.Ahmed, R. a. N., 2015. Improvingsecurity forIPv6neighbordiscovery. ProceedingsoftheInternational ConferenceonElectricalEngineeringandInformatics(ICEEI’15), p. 271–274. F. A. Barbhuiya, S. B. a. S. N., 2011. “Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol. in Proceedings of the 4th International Conference on Security of Information and Networks (SIN ’11), , pp. 111-118. F. Li, J. Y. X. W. T. P. C. A. a. J. W., 2016. Characteristics analysis at prefix granularity: A case study in an IPv6 network. Journal of Network and Computer Applications, Volume 70, p. 156–170. Fuliang Li, X. W. T. P. a. J. Y., 2017. A Case Study of IPv6 Network Performance: Packet Delay, Loss, and Reordering. Mathematical Problems in Engineering, p. 10. M. Anagnostopoulos, G. K. a. S. G., 2015. New facets of mobile botnet: architecture and evaluation. International Journal of Information Security, 15(5), p. 455–473. Mohamed Idhammad, K. A. M. B., 2018. Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest. Security and Communication Networks, p. 13. Muniyappa, V. K., 2012. Performance Analysis of IPv4 versus IPv6 in a Simple Campus Network. Long Beach. S. T. Ali, V. S. A. R. a. S. J., 2015. A survey of securing networks using software defined networking. IEEE TransactionsonReliability, 64(3), p. 1086–1097. Sidhu, S. S. a. J., 2017. Compliance-based Multi-dimensional Trust Evaluation System for determining trustworthiness of Cloud Service Providers. Future Generation Computer Systems, Volume 67, p. 109–132. T. Vissers, T. S. S. L. P. K. G. a. P. H., 2014. DDoS defense system for web services in a cloud environment. Future Generation Computer Systems, Volume 37, pp. 37-45. Tiwari, V. K. a. S., 2012. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Survey. Journal of Computer Networks and Communications, Volume 2012, p. 10. Yiqin Lu, M. W. a. P. H., 2017. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6. Security and Communication Networks , Volume https://doi.org/10.1155/2017/5838657, p. 9. Zhou, Z. W. a. Y., 2016. Customized Cloud Service Trustworthiness Evaluation and Comparison Using Fuzzy Neural Networks,. Proceedings of the 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), pp. 433-442.
  • 21. MARKING SHEET - DO NOT DELETE Assignment Question Student Question Criteria 0 Incorrect/No Response 0 No question provided or minimal attempt 0.5 Limited /Partially incorrect response OR response is not in the student’s own words 0.5 Simplistic question/sample answer that does not demonstrate an understanding of the topic area OR sample answer is not in the student’s own words 1 Correct response but could have more detail 1 Good question that has some challenge, but could be more challenging and/or the sample answer needs more detail/explanation 1.5 Excellent response with good detail 1.5 Excellent and challenging question with a detailed sample answer Week Marks Awarded Marks Awarded 1 2 3 4 5 6 7 8 9 10 TOTAL Comments: WRITTEN ASSESSMENT TEMPLATE - PAGE 14