Desklib - Online Library for Study Material with Solved Assignments, Essays, Dissertations
Verified
Added on 2023/06/12
|20
|3043
|495
AI Summary
Desklib is an online library that provides study material with solved assignments, essays, dissertations, and more. It covers a wide range of subjects, courses, and universities. The content analysis includes cloud services, mobile networks, transport layer, and data link layer.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1Running Head:CONTENT ANALYSIS Topics 8, 6 and 4 Institution Date Name Cloud services
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2CONTENT ANALYSIS Q.The word cloud in the term “Cloud computing” could arguably be replaced with the wordinternet Q.Numerous organizationsprovide Cloud Storage Services to the domestic market. The name of some such services are: OneDrive Is hosted by Microsoft. They offer 5GB space for free Dropbox is hosted by the American company Dropbox, Inc., headquartered in San Francisco. They offer 2GB of free space Google Drive is hosted by Google, Inc., It offers the first 15GB as free storage. iCloud is hosted by Apple, Inc., and it offers 5GB as free storage (Hashem, Yaqoob, Anuar, Mokhtar, Gani, & Khan, 2015) For each of them determine the company that hosts the service and the number of Mbytes of storage that is available for free. (Use the Internet as required). Q.WhatvirtualizationsoftwareisusedatFedUni.tohostguestserver operating systems? VMware virtualization software (ESX 5) Q.There are three ways to describe hosted cloud services: SaaS, IaaS & PaaS. Give one example of type of service. SaaS Software as a Service (SaaS), speak to the biggest cloud market and is yet developing rapidly. SaaS utilizes the web to convey applications that are overseen by
3CONTENT ANALYSIS an outsider seller and whose interface is accessed from the customers' side. Most SaaS applications can be run straightforwardly from a web program with no downloads or establishments required, however, some require modules. Example: Amazon IaaS Example: Workstation Management InfrastructureasaService(IaaS),areself-benefitmodelsforgettingto, checking, and overseeing remote data center foundations, for example, computing (virtualized or exposed metal), stockpiling, neworking, and nework administrations (e.g. firewalls). Rather than purchasing equipment through and through, clients can buy IaaS in view of consumption, just like power or other utility charging PaaS Example: Apprenda PlatformasaService(PaaS),areutilizedforapplications,andother advancement, while giving cloud elements to software. What engineers pick up with PaaS is a structure they can expand upon to create or modify applications. PaaS makes the development, testing, and launching of apps brisk, straightforward, and savvy. With this innovation, enterprise tasks, or an outsider supplier, can oversee OSes, virtualization, servers, stockpiling, networks, and the PaaS program itself. Engineers, nonetheless, deal with the applications. Q.Describe the differences between type 1 and type 2 Virtualization. Virtualization items that run specifically on the equipment are depicted as type 1
4CONTENT ANALYSIS virtualization frameworks. (Uncovered metal virtualization) while the virtualization items that keep running on a working framework (eg. Windows, Linux, Mac) are type 2 virtualization items. Q.What is another name given to Type 1 virtualization systems? Hipervisor Mobile networks Q.The first generation of mobile phones usedAnalogtechnologies and only supported voice. Select the correct answer from the following: Digital Analog Q.The switching technologies used for mobile communications has changed throughout the mobile phone technologies 1G through to 4G. Describe the changes that have occurred. 1G - Cloud Switching
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5CONTENT ANALYSIS 2G - Circuit switching for voice, Packet and for data (Jain,Jain,Kurup& Gawade, 2014) Q.Describe the roles of the following elements of the mobile phone network: Cell - They hold the Base Station & Radio frequency Transmitter/Receiver. Base station - Controls communication with mobile devices in its cell. Mobile switching center - controls the transition of a mobile phone as it moves from one cell to another. It also controls the interface with the Internet and the Public telephone network (Stüber, 2017). Q.Describe the roles of the Base station and the Mobile switching center as a mobile phone moves from one cell to another. The change from one cell to the new cell is controlled by the Mobile Switching Center. After transition all network (voice) traffic to the phone is directed through the new Base Station (Gómez-Cuba,Erkip, Rangan& González-Castaño, 2018). Q.Three common multiplexing techniques used for communication between mobile devices and Base stations are: Define each acronym. TDMA - Time division multiple access FDMA - Frequency division multiple access. CDMA - Code Division Multiple Access. Briefly describe how each technology works. 2 paragraphs each will suffice.
6CONTENT ANALYSIS FDMA FDMA is the best way of separating one channel or the speed of transfer into numerous groups that are singular, for utilization by a single client. All of the individual bands and/or channels are sufficiently wide to suit the flag spectra of the transmissions to be propagated. The information to be transmitted is regulated on to each subcarrier, and every one of them are straightly combined. This method is utilized as a part of fiber optic correspondences frameworks. A solitary fiber optic link has colossal transfer speed that can be subdivided to give FDMA. Diverse information or data sources are each doled out an alternate light recurrence for transmission. TDMA TDMA is an advanced digital procedure that partitions a solitary channel or band intoscheduleslots.Eachschedulevacancyisutilizedtotransmitsomebyte computerized portion of each flag in consecutive serial information design. This system functions admirably with moderate voice information signals, but on the other hand it's valuable for compacted video and other rapid information. A decent case is the broadly utilized T1 transmission framework, which has been utilized for quite a long time in the telecomm business. T1 lines convey up to 24 singular voice telephone calls on a solitary line. Each voice flag ordinarily covers 300 Hz to 3000 Hz and is digitized at a 8-kHz rate, which is slightly more than the
7CONTENT ANALYSIS insignificant Nyquist rate of two times the most astounding recurrence segment expected to hold all the analog content CDMA CDMA is another unadulterated digital strategy. It is otherwise called spread spectrum since it takes the digitized adaptation of an analog flag and spreads it out on a more extensive data transmission at a lower power level. This strategy is called direct sequence spread spectrum (DSSS. The digitized and compacted voice motion in serial information frame is spread by handling it in a XOR circuit alongside a chipping signal at a substantially higher recurrence. In the cdma IS-95 standard, a 1.2288-Mbit/s chipping signal spreads the digitized compacted voice at 13 kbits/s (Ebrahim,2016). The third era (3G) PDA innovation called wideband CDMA (WCDMA) utilizes a comparative strategy with compacted voice and 3.84-Mbit/s chipping codes in a 5- MHz channel to enable various clients to have a similar band. References Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges.Information sciences,305, 357-383. Ebrahim, Z. A. (2016). Code division Multiple Access (CDMA) Implementation by MATLAB. Gómez-Cuba, F., Erkip, E., Rangan, S., & González-Castaño, F. J. (2018). Capacity Scaling of Cellular Networks: Impact of Bandwidth, Infrastructure Density and
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8CONTENT ANALYSIS NuGómez-Cuba, F., Erkip, E., Rangan, S., & González-Castaño, F. J. (2018mber of Antennas.IEEE Transactions on Wireless Communications,17(1), 652-666. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues.Information Systems,47, 98-115. Jain, V. S., Jain, S., Kurup, L., & Gawade, A. (2014). Overview on Generations of Network: 1G, 2G, 3G, 4G, 5G.IOSR Journal of Electronics and Communication Engineering,9(3). Stüber, G. L. (2017).Principles of mobile communication(Vol. 3). Springer. Topic 6 Transport Layer Q. What type of addressing is used at the following layers? Networking- IP address is used at this layer Transport – ports address individual application sessions. Entities addressed in each cases. Networking- local and remote hosts Transport- ports
9CONTENT ANALYSIS Q. The data unit (called Protocol Data Unit (PDU)) is called different names at the different layers of the TCP/IP model. What are the PDU’s called at each of the following layers? Data Link: Frameframe- Ethernet Network Layer: IP Datagram Transport (TCP): segment Transport (UDP): UDP Datagram Physical layer:Bits Q. Describe Multiplexing as it relates to the Transport layer. This is the process where large amounts of data are broken down for easy handling by the network layer therefore many applications can access the network. Q. What constitutes a Socket? Associated port number and Host IP How do server sockets and client sockets differ?
10CONTENT ANALYSIS Server sockets are identified by the IP address while Client sockets are identified by a specific port number Q. How many bits are used in a UDP header to store the destination port number? 16 bits Explain how you arrived at this number. 1 byte are equal 8 bits Q. What range of port numbers are reserved for server applications and what is this range of port numbers called? 0-1023 Called individual identification of applications Q. What server port numbers are normally used for the following applications? FTP-Data- 20 FTP-Control - 21 SSH - 22
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
11CONTENT ANALYSIS HTTP- 80 Q. It is common place for two tabs on a browser to be concurrently connected to the same web server. Discuss how the data meant for one browser tab is never mixed up with that of the other tab. This is due to ability of the transport layer to do multiplexing where each application can access the network after being given a port number. Q. Which of the following fields are parts of a UDP header? Source IP address Destination port number MAC address Q. Describe the difference between a stateless protocol and a stateful protocol.
12CONTENT ANALYSIS Stateless protocol treats each request as an independent transaction that is not related to any other whereas stateful protocol treats a transaction as if it is related to a previous one. Q. Which of the following fields are parts of a TCP header? Source IP address Sequence Number Flags Q. Describe the role of TCP Timers It uses timers to detect any loss of segments Q. Define the meaning of the following TCP Flags: FIN – means a close connection ACK – stands for acknowledgement segment SYN – Synchronize sequence numbers Q. Describe the 3-way handshake process. Your description should make it clear the Flags that are exchanged at each step and the meaning of each of those flags.
13CONTENT ANALYSIS The client starts a connection in the first step which sends an Initial Sequence Number (ISN) to the intended destination. Sets the SYN flag to indicate the TCP segment is initiating a connection. The next step server gives a responds by acknowledging the clients request. It then sends its ISN to the client. The SYN and the ACK flags are set. The last stagethe client acknowledges the response from the server and the ACK flag is set Q. Describe how flow control is achieved in a TCP connection. The flow control is implemented by the window size field in a method called sliding windows flow control. References Duke, M., Blanton, E., Zimmermann, A., Braden, R., & Eddy, W. (2015). A roadmap for transmission control protocol (TCP) specification documents. Lopez, J. A., Sun, Y., Blair, P. B., & Mukhtar, M. S. (2015). TCP three-way handshake: linking developmental processes with plant immunity.Trends in plant science,20(4), 238-245. Wessels, D., Heidemann, J., Zhu, L., Mankin, A., & Hoffman, P. (2016). Specification for DNS over Transport Layer Security (TLS).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
14CONTENT ANALYSIS Topic 4 Data Link Layer Q1. Roles of Data Link Layer Is to provide communication between devices that are locally connected. Q2. Incorrect statements about Data Link The Data Link uses the IP addresses for all communications. Q3. Data Link acronyms LLC stands for Logical Link Control MAC stands for Media Access Control Q4. Main role of Data Link LLC It link services such as flow control and reliability. Q5. LLC provides multiplexed service to upper layer protocols It interfaces with Network layer as it handles multiple protocols of layer 3 such as multiplexing and de-multiplexing and it takes protocols such as IP and IPX. Q6. The main role of the media access control component of Data Link Layer It sends and receive traffic to and fro the network media
15CONTENT ANALYSIS Q7. Routers require at least two network cards because To provide physical connections to the networks involved Q8. Binary bits in MAC address 48 bits Q9. Constituent parts of MAC address Organizational unique identifier The hexadecimal characters that has not been used before Q10. Window command that will display the MAC address of the computer Ethernet network interface card ipconfig/all Q11. Linux command that will display the MAC address of the computer Ethernet network interface card Ipconfig Q12. Why Network cards are said to be smart devices
16CONTENT ANALYSIS They filter traffic by inspecting every packet they see on the local network and check for errors Q13. Process that leads to the detection of the corrupted frame at the Data Link Layer Cyclic Redundancy Check (CRC) and, Parity Check Q14. Ethernet Frame Format TCP header FTP header Destination MAC address Source MAC address Protocol type IP header CRC Q15. Size of source MAC address in an Ethernet frame 6 bytes field
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
17CONTENT ANALYSIS Q16. Hexadecimal digits for Ethernet broadcast address 12- Digit hexadecimal FF FF FF FF FF FF Q17. Protocols Control access protocols- Token Ring, Ethernet Contention based access protocols- FDDI, WiFi Q18. Works The CSMA/CD protocol does carrier transmission access such that any device can try to send a from at any given time The CSMA/CA protocol in WiFi allows transmission only when the channel is detected to be idle in wireless networks. Token Ring is a protocol use in local area network communication with a method that provide equal access to all stations and help in avoiding collision. Q19. When entries are added and removed from the ARP cache The timer of ARP cache removes an entry that has not been used for some time.
18CONTENT ANALYSIS The entries are added when the computer wants to establish a communication link Q20. Ethernet frame header is modified at each step. This is done to determine an interface that will be configured for the network and to for the maintenance of ARP Q21. Changes in ARP cache Events that leads to addition of ARP cache entries. This event happens when you want to reduce available network overhead which are in forms of ARP replies and requests. And the same ARP cache entries are removed when they appear inactive. The ping to a remote address affects ARP cache since the system has to turn IP address into a MAC address. Q22. The machine follows four steps; a)Looks in the ARP cache b)If the entry is not found it sends a broadcast to the network asking who has the IP address 192.168.12.14 (for example)
19CONTENT ANALYSIS c)The machine with that IP address will respond with its MAC address d)The ARP cache is updated with the new entry Q23. Q24. The Data Link Layer software provides access to the media where various media access controls are required when the destination address is a remote network. References Bailey, B. T., Romer, J., Doyle, C., Gifford, J., & Zibart, K. (2015).U.S. Patent No. 8,943,574. Washington, DC: U.S. Patent and Trademark Office. Loo, J., Mauri, J. L., & Ortiz, J. H. (Eds.). (2016).Mobile ad hoc networks: current status and future trends. CRC Press.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.