ITECH1102 Networking and Security: Cloud, Mobile, Data Link Analysis

Verified

Added on  2023/06/12

|20
|3043
|495
Homework Assignment
AI Summary
This assignment solution covers key concepts in networking and security, focusing on cloud computing, mobile networks, and the data link layer. It addresses topics such as cloud storage services (OneDrive, Dropbox, Google Drive, iCloud), virtualization software (VMware ESX 5), and different types of cloud services (SaaS, IaaS, PaaS) with examples. The document also explores mobile network technologies, including the evolution from analog to digital, switching technologies (circuit switching, packet switching), and the roles of cell towers, base stations, and mobile switching centers. Multiplexing techniques like TDMA, FDMA, and CDMA are defined and explained. Furthermore, the assignment delves into the transport layer, covering addressing, protocol data units (PDUs), multiplexing, sockets, UDP and TCP headers, stateless vs. stateful protocols, TCP flags, and the 3-way handshake process. Finally, it examines the roles and functions of the data link layer, including LLC and MAC, and their relationship to upper-layer protocols. Desklib offers more resources like this to aid students in their studies.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
1Running Head: CONTENT ANALYSIS
Topics 8, 6 and 4
Institution
Date
Name
Cloud services
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2CONTENT ANALYSIS
Q. The word cloud in the term “Cloud computing” could arguably be replaced
with the word internet
Q. Numerous organizations provide Cloud Storage Services to the domestic
market. The name of some such services are:
OneDrive Is hosted by Microsoft. They offer 5GB space for free
Dropbox is hosted by the American company Dropbox, Inc., headquartered in
San Francisco. They offer 2GB of free space
Google Drive is hosted by Google, Inc., It offers the first 15GB as free storage.
iCloud is hosted by Apple, Inc., and it offers 5GB as free storage (Hashem,
Yaqoob, Anuar, Mokhtar, Gani, & Khan, 2015)
For each of them determine the company that hosts the service and the number of
Mbytes of storage that is available for free. (Use the Internet as required).
Q. What virtualization software is used at Fed Uni. to host guest server
operating systems?
VMware virtualization software (ESX 5)
Q. There are three ways to describe hosted cloud services: SaaS, IaaS & PaaS.
Give one example of type of service.
SaaS
Software as a Service (SaaS), speak to the biggest cloud market and is yet
developing rapidly. SaaS utilizes the web to convey applications that are overseen by
Document Page
3CONTENT ANALYSIS
an outsider seller and whose interface is accessed from the customers' side. Most SaaS
applications can be run straightforwardly from a web program with no downloads or
establishments required, however, some require modules.
Example: Amazon
IaaS
Example: Workstation Management
Infrastructure as a Service (IaaS), are self-benefit models for getting to,
checking, and overseeing remote data center foundations, for example, computing
(virtualized or exposed metal), stockpiling, neworking, and nework administrations
(e.g. firewalls). Rather than purchasing equipment through and through, clients can
buy IaaS in view of consumption, just like power or other utility charging
PaaS
Example: Apprenda
Platform as a Service (PaaS), are utilized for applications, and other
advancement, while giving cloud elements to software. What engineers pick up with
PaaS is a structure they can expand upon to create or modify applications. PaaS
makes the development, testing, and launching of apps brisk, straightforward, and
savvy. With this innovation, enterprise tasks, or an outsider supplier, can oversee
OSes, virtualization, servers, stockpiling, networks, and the PaaS program itself.
Engineers, nonetheless, deal with the applications.
Q. Describe the differences between type 1 and type 2 Virtualization.
Virtualization items that run specifically on the equipment are depicted as type 1
Document Page
4CONTENT ANALYSIS
virtualization frameworks. (Uncovered metal virtualization) while the virtualization
items that keep running on a working framework (eg. Windows, Linux, Mac) are type
2 virtualization items.
Q. What is another name given to Type 1 virtualization systems?
Hipervisor
Mobile networks
Q. The first generation of mobile phones used Analog technologies and only
supported voice.
Select the correct answer from the following:
Digital
Analog
Q. The switching technologies used for mobile communications has changed
throughout the mobile phone technologies 1G through to 4G.
Describe the changes that have occurred.
1G - Cloud Switching
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5CONTENT ANALYSIS
2G - Circuit switching for voice, Packet and for data (Jain, Jain, Kurup &
Gawade, 2014)
Q. Describe the roles of the following elements of the mobile phone network:
Cell - They hold the Base Station & Radio frequency Transmitter/Receiver.
Base station - Controls communication with mobile devices in its cell.
Mobile switching center - controls the transition of a mobile phone as it moves
from one cell to another. It also controls the interface with the Internet and the Public
telephone network (Stüber, 2017).
Q. Describe the roles of the Base station and the Mobile switching center as a
mobile phone moves from one cell to another.
The change from one cell to the new cell is controlled by the Mobile Switching
Center. After transition all network (voice) traffic to the phone is directed through the
new Base Station (Gómez-Cuba, Erkip, Rangan & González-Castaño, 2018).
Q. Three common multiplexing techniques used for communication between
mobile devices and Base stations are: Define each acronym.
TDMA - Time division multiple access
FDMA - Frequency division multiple access.
CDMA - Code Division Multiple Access.
Briefly describe how each technology works. 2 paragraphs each will suffice.
Document Page
6CONTENT ANALYSIS
FDMA
FDMA is the best way of separating one channel or the speed of transfer into
numerous groups that are singular, for utilization by a single client. All of the
individual bands and/or channels are sufficiently wide to suit the flag spectra of the
transmissions to be propagated. The information to be transmitted is regulated on to
each subcarrier, and every one of them are straightly combined.
This method is utilized as a part of fiber optic correspondences frameworks. A
solitary fiber optic link has colossal transfer speed that can be subdivided to give
FDMA. Diverse information or data sources are each doled out an alternate light
recurrence for transmission.
TDMA
TDMA is an advanced digital procedure that partitions a solitary channel or band
into schedule slots. Each schedule vacancy is utilized to transmit some byte
computerized portion of each flag in consecutive serial information design. This
system functions admirably with moderate voice information signals, but on the other
hand it's valuable for compacted video and other rapid information.
A decent case is the broadly utilized T1 transmission framework, which has been
utilized for quite a long time in the telecomm business. T1 lines convey up to 24
singular voice telephone calls on a solitary line. Each voice flag ordinarily covers 300
Hz to 3000 Hz and is digitized at a 8-kHz rate, which is slightly more than the
Document Page
7CONTENT ANALYSIS
insignificant Nyquist rate of two times the most astounding recurrence segment
expected to hold all the analog content
CDMA
CDMA is another unadulterated digital strategy. It is otherwise called spread
spectrum since it takes the digitized adaptation of an analog flag and spreads it out on
a more extensive data transmission at a lower power level. This strategy is called
direct sequence spread spectrum (DSSS. The digitized and compacted voice motion in
serial information frame is spread by handling it in a XOR circuit alongside a
chipping signal at a substantially higher recurrence. In the cdma IS-95 standard, a
1.2288-Mbit/s chipping signal spreads the digitized compacted voice at 13 kbits/s
(Ebrahim, 2016).
The third era (3G) PDA innovation called wideband CDMA (WCDMA) utilizes
a comparative strategy with compacted voice and 3.84-Mbit/s chipping codes in a 5-
MHz channel to enable various clients to have a similar band.
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing:
Opportunities and challenges. Information sciences, 305, 357-383.
Ebrahim, Z. A. (2016). Code division Multiple Access (CDMA) Implementation by
MATLAB.
Gómez-Cuba, F., Erkip, E., Rangan, S., & González-Castaño, F. J. (2018). Capacity
Scaling of Cellular Networks: Impact of Bandwidth, Infrastructure Density and
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8CONTENT ANALYSIS
NuGómez-Cuba, F., Erkip, E., Rangan, S., & González-Castaño, F. J. (2018mber
of Antennas. IEEE Transactions on Wireless Communications, 17(1), 652-666.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U.
(2015). The rise of “big data” on cloud computing: Review and open research
issues. Information Systems, 47, 98-115.
Jain, V. S., Jain, S., Kurup, L., & Gawade, A. (2014). Overview on Generations of
Network: 1G, 2G, 3G, 4G, 5G. IOSR Journal of Electronics and Communication
Engineering, 9(3).
Stüber, G. L. (2017). Principles of mobile communication (Vol. 3). Springer.
Topic 6 Transport Layer
Q. What type of addressing is used at the following layers?
Networking- IP address is used at this layer
Transport – ports address individual application sessions.
Entities addressed in each cases.
Networking- local and remote hosts
Transport- ports
Document Page
9CONTENT ANALYSIS
Q. The data unit (called Protocol Data Unit (PDU)) is called different
names at the different
layers of the TCP/IP model.
What are the PDU’s called at each of the following layers?
Data Link: Frame frame- Ethernet
Network Layer: IP Datagram
Transport (TCP): segment
Transport (UDP): UDP Datagram
Physical layer: Bits
Q. Describe Multiplexing as it relates to the Transport layer.
This is the process where large amounts of data are broken down for easy
handling by the network layer therefore many applications can access the
network.
Q. What constitutes a Socket?
Associated port number and Host IP
How do server sockets and client sockets differ?
Document Page
10CONTENT ANALYSIS
Server sockets are identified by the IP address while Client sockets are
identified by a specific port number
Q. How many bits are used in a UDP header to store the destination port
number?
16 bits
Explain how you arrived at this number.
1 byte are equal 8 bits
Q. What range of port numbers are reserved for server applications and
what is this range of
port numbers called?
0-1023
Called individual identification of applications
Q. What server port numbers are normally used for the following
applications?
FTP-Data- 20
FTP-Control - 21
SSH - 22
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
11CONTENT ANALYSIS
HTTP- 80
Q. It is common place for two tabs on a browser to be concurrently
connected to the same web
server.
Discuss how the data meant for one browser tab is never mixed up
with that of the other tab.
This is due to ability of the transport layer to do multiplexing where each
application can access the network after being given a port number.
Q. Which of the following fields are parts of a UDP header?
Source IP address
Destination port number
MAC address
Q. Describe the difference between a stateless protocol and a stateful
protocol.
Document Page
12CONTENT ANALYSIS
Stateless protocol treats each request as an independent transaction that
is not related to any other whereas stateful protocol treats a transaction as if it
is related to a previous one.
Q. Which of the following fields are parts of a TCP header?
Source IP address
Sequence Number
Flags
Q. Describe the role of TCP Timers
It uses timers to detect any loss of segments
Q. Define the meaning of the following TCP Flags:
FIN – means a close connection
ACK – stands for acknowledgement segment
SYN – Synchronize sequence numbers
Q. Describe the 3-way handshake process. Your description should make
it clear the Flags that
are exchanged at each step and the meaning of each of those flags.
Document Page
13CONTENT ANALYSIS
The client starts a connection in the first step which sends an Initial
Sequence Number (ISN) to the intended destination.
Sets the SYN flag to indicate the TCP segment is initiating a connection.
The next step server gives a responds by acknowledging the clients
request. It then sends its ISN to the client.
The SYN and the ACK flags are set.
The last stage the client acknowledges the response from the server and
the ACK flag is set
Q. Describe how flow control is achieved in a TCP connection.
The flow control is implemented by the window size field in a method
called sliding windows flow control.
References
Duke, M., Blanton, E., Zimmermann, A., Braden, R., & Eddy, W. (2015). A
roadmap for transmission control protocol (TCP) specification documents.
Lopez, J. A., Sun, Y., Blair, P. B., & Mukhtar, M. S. (2015). TCP three-way
handshake: linking developmental processes with plant immunity. Trends in plant
science, 20(4), 238-245.
Wessels, D., Heidemann, J., Zhu, L., Mankin, A., & Hoffman, P. (2016).
Specification for DNS over Transport Layer Security (TLS).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
14CONTENT ANALYSIS
Topic 4 Data Link Layer
Q1. Roles of Data Link Layer
Is to provide communication between devices that are locally connected.
Q2. Incorrect statements about Data Link
The Data Link uses the IP addresses for all communications.
Q3. Data Link acronyms
LLC stands for Logical Link Control
MAC stands for Media Access Control
Q4. Main role of Data Link LLC
It link services such as flow control and reliability.
Q5. LLC provides multiplexed service to upper layer protocols
It interfaces with Network layer as it handles multiple protocols of layer 3
such as multiplexing and de-multiplexing and it takes protocols such as IP and
IPX.
Q6. The main role of the media access control component of Data Link Layer
It sends and receive traffic to and fro the network media
Document Page
15CONTENT ANALYSIS
Q7. Routers require at least two network cards because
To provide physical connections to the networks involved
Q8. Binary bits in MAC address
48 bits
Q9. Constituent parts of MAC address
Organizational unique identifier
The hexadecimal characters that has not been used before
Q10. Window command that will display the MAC address of the computer
Ethernet network interface card
ipconfig/all
Q11. Linux command that will display the MAC address of the computer
Ethernet network interface card
Ipconfig
Q12. Why Network cards are said to be smart devices
Document Page
16CONTENT ANALYSIS
They filter traffic by inspecting every packet they see on the local network
and check for errors
Q13. Process that leads to the detection of the corrupted frame at the Data Link
Layer
Cyclic Redundancy Check (CRC) and,
Parity Check
Q14. Ethernet Frame Format
TCP header
FTP header
Destination MAC address
Source MAC address
Protocol type
IP header
CRC
Q15. Size of source MAC address in an Ethernet frame
6 bytes field
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
17CONTENT ANALYSIS
Q16. Hexadecimal digits for Ethernet broadcast address
12- Digit hexadecimal
FF FF FF FF FF FF
Q17. Protocols
Control access protocols- Token Ring, Ethernet
Contention based access protocols- FDDI, WiFi
Q18. Works
The CSMA/CD protocol does carrier transmission access such that any
device can try to send a from at any given time
The CSMA/CA protocol in WiFi allows transmission only when the
channel is detected to be idle in wireless networks.
Token Ring is a protocol use in local area network communication with a
method that provide equal access to all stations and help in avoiding collision.
Q19. When entries are added and removed from the ARP cache
The timer of ARP cache removes an entry that has not been used for some
time.
Document Page
18CONTENT ANALYSIS
The entries are added when the computer wants to establish a communication
link
Q20. Ethernet frame header is modified at each step.
This is done to determine an interface that will be configured for the
network and to for the maintenance of ARP
Q21. Changes in ARP cache
Events that leads to addition of ARP cache entries.
This event happens when you want to reduce available network overhead which
are in forms of ARP replies and requests. And the same ARP cache entries are
removed when they appear inactive.
The ping to a remote address affects ARP cache since the system has to turn IP
address into a MAC address.
Q22. The machine follows four steps;
a) Looks in the ARP cache
b) If the entry is not found it sends a broadcast to the network asking who
has the IP address 192.168.12.14 (for example)
Document Page
19CONTENT ANALYSIS
c) The machine with that IP address will respond with its MAC address
d) The ARP cache is updated with the new entry
Q23.
Q24. The Data Link Layer software provides access to the media where various
media access controls are required when the destination address is a remote network.
References
Bailey, B. T., Romer, J., Doyle, C., Gifford, J., & Zibart, K. (2015). U.S. Patent
No. 8,943,574. Washington, DC: U.S. Patent and Trademark Office.
Loo, J., Mauri, J. L., & Ortiz, J. H. (Eds.). (2016). Mobile ad hoc networks:
current status and future trends. CRC Press.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
20CONTENT ANALYSIS
chevron_up_icon
1 out of 20
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]