Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assessment: Networking Fundamentals

Task

This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the resources section of Interact site of this subject.

Answers MUST be written in your own words. No marks will be awarded for any answer that contains more than 10% direct quote (referenced or unreferenced). One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated. For mathematical questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.

Question 1

Compare and contrast the OSI reference model with the TCP/IP networking model. Which one do you think is more useful when working with and describing networks and why?

Question 2

Complete the following Hands-On Projects from the prescribed textbook (Pyles, Carel&Tittel 2017)

• Hands-On Project 2-3
• Hands-On Project 2-5

In order to complete this activity, students should insert screenshots in the assignment document along with a short description of each step taken to complete the project.

Question 3

Briefly describe the Address Resolution Protocol (ARP). What is the purpose of the ARP Cache?

Question 4 Case study task

In your role as a Solutions Architect at Foreshore IT Solutions, you are leading a team of several system administrators. Foreshore IT Solutions is a medium sized organization and is currently expanding its operations. The company has acquired six sites across Adelaide to accommodate its various departments. You have been asked to design a network by utilizing 10.0.0.0 private IP address. Your designed network should span six sites with a router at each site to interconnect the entire network. It is assumed that each site will have its own single subnet. Company expects approximately 1200 workstation across all the sites with approximate numbers in each building as follows:

Finance Office - 260 workstations
IT Call Centre - 520 workstations
Research and Development Office - 120 workstations
Marketing Department - 40 workstations
Information technology - 130 workstations
Head Office - 60 workstations

TASK - Write an 800 words (+/- 10%) (Max) report explaining:

a. The detailed design of a simple addressing solution (with diagram(s) and step by step workout of the calculations) that leaves room for growth, is easy to administer and has the minimum wastage of available IP address space.

b. Explain what happens to your design if the number of hosts per network jumps to over 1,024 per building.

Rationale

This assessment aims to assess the following learning objectives of this subject:

• be able to analyze IP addressing requirements and design an addressing scheme;
• be able to analyze the requirements of IP routing and choose appropriate routing methods;
• be able to demonstrate how internetworking devices obtain their network configuration;
• be able to explain how data flows through the internet; and
• Be able to ascertain and evaluate selection of applications and protocols for transferring data across the internet.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92765068

Have any Question?


Related Questions in Computer Network & Security

Suppose alice wants to communicate with bob using symmetric

Suppose Alice wants to communicate with Bob using symmetric key cryptography with a session key KS. They have no public key cryptography and they intend to use a key distribution center (KDC). The KDC is a server that sh ...

Suppose that third national bank has reserves of 20000 and

Suppose that Third National Bank has reserves of $20,000 and check able deposits of $200,000. The reserve ratio is 10 percent. The bank sells $20,000 in securities to the Federal Reserve Bank in its district, receiving a ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Compare the importance of three categories described in the

Compare the importance of three categories described in the article: 1. window of exposure, 2. full public disclosure, 3. reasonable disclosure for three types of software applications: 4. military, 5. medical, 6. educat ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Question suppose public-key cryptography is used to encrypt

Question : Suppose public-key cryptography is used to encrypt the communications between Alice and Bob. Alice's public key is eA, private key is dA; Bob's public key is private key is de. Now Bob wants to send a message ...

Describe 2 variables a government will look at to predict

Describe 2 variables a government will look at to predict where the economy will be in the next six months.

What comparison of means test was used to answer the

What comparison of means test was used to answer the question I need it now is there a relationship between parents highest level of education and socioeconomic status\need the entire script

There are standards in network communication through which

There are standards in network communication through which data is transferred from one system to another. Discuss why these standards are important. Do you think it would be easier to purchase different equipment and so ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As