ITECH1102 Networking: Detailed Content Analysis of Network Layers

Verified

Added on  2023/04/25

|8
|1636
|75
Report
AI Summary
This assignment presents a content analysis focusing on key networking concepts: the Data Link Layer, Transport Layer, and Cloud Computing with Mobile implications. The Data Link Layer analysis emphasizes its role in local network communication, MAC addresses, and the CSMA/CD protocol, including a demonstration using Wireshark. The Transport Layer section covers segmentation, application identification via port numbers, TCP connections, and flow control, also using Wireshark for analysis. Finally, the discussion on Cloud Computing and Mobile technology explores cloud services, virtualization architectures (Type 1 and Type 2), and the evolution of mobile networks (1G to 4G), including connectivity approaches within Mobile Switching Centers. This detailed analysis provides a comprehensive overview of these critical networking topics.
Document Page
Running head: CONTENT ANALYSIS FOR NETWORK LAYER AND CLOUD
Content Analysis for Network Layer and Cloud
Name of the Student
Name of the University
Author’s note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CONTENT ANALYSIS FOR NETWORK LAYER AND CLOUD
Table of Contents
Topic 1: Data Link Layer................................................................................................................2
Topic 2: Transport Layer.................................................................................................................3
Topic 3: Cloud Computing and Mobile...........................................................................................4
References........................................................................................................................................6
Document Page
2CONTENT ANALYSIS FOR NETWORK LAYER AND CLOUD
Topic 1: Data Link Layer
The analysis for the data link layer focuses on the role played by the data link layer in the
internet model based on networking. Based on the analysis, it has been discussed that the data
layer plays a major part based on the communication with the devices within the local network.
This kind of communication is also known as hop-to-hop communication. The network could be
based within a Wi-Fi network (Lopacinski et al., 2015). The machines could also be connected
with the help of a satellite link or long fibre optic. The Data Link Layer forms a major part of the
interface between the Physical network and the Network layer.
The two different parts within the Data Link Layer includes the Logical Link Layer and
the Media Access Control. The different network interfaces are built in the form of network
scanners, routers, printers and many others. The discussion within the presentation have mainly
focused on the impact made by network cards, each of which would have a unique MAC
address. The discussion focuses on the ways of determination of a MAC address on a Windows
and Linux system. The Network Cards (NICs) are also regarded as smart devices that have been
helpful for inspecting each packet that would be visible within the local network (Gross & Davie,
2016). The NIC are responsible for the checking of errors within the network system.
Further the discussion also supports the decision of the format of the Ethernet frame. The
broadcast addressing within an Ethernet frame is also defined and the ways in which each frames
should be processed within machines have been discussed. The analysis also supports about the
CSMA/CD protocol and the working functionalities of the protocol (Song et al., 2016). The
functioning of ARP is defined within the report. Within this discussion, a demonstration of
Document Page
3CONTENT ANALYSIS FOR NETWORK LAYER AND CLOUD
Wireshark software. It could be analysed that the software is a form of protocol analyser, which
could be used for capturing and inspecting the traffic within the network.
Topic 2: Transport Layer
In the presentation, the covered topics are based on segmentation, individual application
identification based on port numbers, the services offered by the transport layer, the connections
made within TCP and the flow of control.
The reassembly and segmentation discusses about the applications that would be able to
send larger streams of data based on delivery. This part also discusses about the function of the
transport layer that would be able break the large chunks of data into a manageable size of
segments based on helping the network layer for handling the data chunks (Turner, 2014). The
segmentation of the large chunks of data is discussed along with the reassembling of data at the
destination where the packets would be gathered.
The identification of the applications or sockets defined within the transport layer could
be defined as the process of allocating each of the client application with a designated port
number based on distinguishing them from other networked applications. Each of the host would
be identified based on their IP address. Each of the client application based on the host would be
identified based on their unique port number (Bhargavan et al., 2015). This discussion also
discusses about the different forms of IP addresses, server port numbers and port numbers based
on user applications.
This discussion also focuses on stateless protocols. This is a kind of communication
protocol that would be able to treat each of the requests as a form of independent transaction that
would be different from any previous request. The discussion also supports the benefits support
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4CONTENT ANALYSIS FOR NETWORK LAYER AND CLOUD
by the TCP, which is defined as a connection oriented protocol, which is responsible for the
delivery of data from the sender-side to receiver-side. The process of establishment of the TCP
connection and termination of connection has been described. This discussion also discusses
about the three-way handshaking method, which is able to facilitate the communication between
two ends of a connection. The entire method within the 3-way handshake has been described in
brief. The analysis also help in the discussion of the working of acknowledgements based on the
Wireshark software application (Dobrilovic et al., 2014). The TCP flow control has also been
fully described within the report.
Topic 3: Cloud Computing and Mobile
The discussion within this presentation discusses about the impact of cloud computing
and mobile applications. This discussion focuses on cloud computing technologies. The cloud
computing could be defined as a practice based on remote servers, which are primarily hosted
within the Internet. The platform of cloud computing also discusses about the storage services
that would be made to be available by various service providers. These include – Google Drive,
Apple’s iCloud, Dropbox, Microsoft OneDrive and many others.
This discussion also puts major focus on the cloud services that are offered by Fed Uni
and Azure. The cloud computing platform also focuses on the advantages and disadvantages of
cloud based services. The cloud computing platforms mainly depends on Virtualization
terminology (Barbarossa, Sardellitti & Di Lorenzo, 2014). In this terminology, the machine
hardware that would be running the virtualization software is known as the Host system. The
different forms of architecture of virtualization are also discussed within the report. There are
two forms of virtualization architecture. These are known as Type 1 virtualization and Type 2
virtualization.
Document Page
5CONTENT ANALYSIS FOR NETWORK LAYER AND CLOUD
On the other hand, the presentation also discusses about the mobile computing
technology within networking. This part discusses the fact that the mobile phone network in
underpinned by several kind of technologies. The different technologies have changes over the
years and are still in their progressing stages. The discussion also focuses on the evolution of
mobile networks from their inception stage. These include the various parameters of 1G, 2G, 3G
and 4G networks (Rahimi et al., 2014). The various parameters are discussed in order to gain a
clear overview of the mobile networks that have differentiated themselves from the previous
generation of networks.
Within the concluding part of the discussion, the discussion is based on the ways in
which the mobile phone networks would move towards the perimeter of cells within the base
stations. The approaches based on connectivity within the Mobile Switching Centre have also
been discussed. The ways in which the different base stations would communicate with the
headsets have also been discussed in brief within the presentation.
Document Page
6CONTENT ANALYSIS FOR NETWORK LAYER AND CLOUD
References
Barbarossa, S., Sardellitti, S., & Di Lorenzo, P. (2014). Communicating while computing:
Distributed mobile cloud computing over 5G heterogeneous networks. IEEE Signal
Processing Magazine, 31(6), 45-55.
Bhargavan, K., Delignat-Lavaud, A., Pironti, A., Langley, A., & Ray, M. (2015). Transport
Layer Security (TLS) session hash and extended master secret extension (No. RFC 7627).
Dobrilovic, D., Stojanov, Z., Brtka, V., Covic, Z., & Bilinac, N. (2014, September). Software
application for analyzing ZigBee network performance in university courses.
In Intelligent Systems and Informatics (SISY), 2014 IEEE 12th International Symposium
on (pp. 73-77). IEEE.
Gross, J., & Davie, B. (2016). A stateless transport tunneling protocol for network virtualization
(STT).
Lopacinski, L., Brzozowski, M., Nolte, J., Kraemer, R., & Buechner, S. (2015, October). Parallel
RS error correction structures dedicated for 100 Gbps wireless data link layer.
In Ubiquitous Wireless Broadband (ICUWB), 2015 IEEE International Conference
on (pp. 1-6). IEEE.
Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., & Venkatasubramanian, N. (2014). Mobile
cloud computing: A survey, state of art and future directions. Mobile Networks and
Applications, 19(2), 133-143.
Song, L., Liao, Y., Bian, K., Song, L., & Han, Z. (2016). Cross-layer protocol design for
CSMA/CD in full-duplex WiFi networks. IEEE Communications Letters, 20(4), 792-795.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CONTENT ANALYSIS FOR NETWORK LAYER AND CLOUD
Turner, S. (2014). Transport layer security. IEEE Internet Computing, 18(6), 60-63.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]