Tutor Quora

SIT202 Computer Networks

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

SIT202 Computer Networks

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

SIT202 Computer Networks

0 Download9 Pages / 2,097 Words

Course Code: SIT202
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Question:
Consider two processes communicating over a TCP/IP network using the TCP protocol on an Ethernet network. As data from a sending process moves through the protocol stack each layer will encapsulate the payload and generate a Protocol Data Unit (PDU)which is then passed down to the next lower layer. Prepare a diagram illustrating the layers, direction of data flow, peer layer communication, and identify the PDU name and the structure of components (structure) of the PDU and explain encapsulation stepsfor each layer. 
Answer:
The Ethernet connection is based on the media access methods to relay and convey data from sender to receiver. The Ethernet has several capabilities which include the transmission of data frames and receiving them, decoding of the data frames and confirming the validity of the address before conveying them to preceding (Upper) layers of the IOS model. In addition, it also detects errors on the network or within the frames (Geier et al.,2015).

Data moves down through the layer on the sender computer through the Ethernet cables to the receiver. The application support layer enhances permits communication by the receiver and the unrelated software systems. The transport layer ensures the transmission is appropriate while the network layer is concerned with moving data across the devices. Each layer in the sender receives information from the layer above it, adds its own information and passes the whole package to the layer below it. When it reaches the physical layer, it is transformed into an electromagnetic signal and convey through the physical link.
For the data to travel from one layer to the other, each layer must communicate to its peer on the other end, during this peer-to-peer process the protocols of the two layers communicate to one another; the source must communicate to its peer in the next layer, the destination layer. The layers exchange information known as Protocol Data Communication (PDU). The dependency function of each layer is aided by the service layer below it. To make the service a success, the lower layer uses encapsulation to put the PDU from the upper layer to its data field. It then adds the necessary headers the layers need to perform its function. As the data move, additional headers are added. They are grouped into segments.
The layers use their own layer protocols to communicate with their peer layer in the other end. Each layer’s protocol communicates to one another using protocol data units (PDUs), between peer layers. The peer-layer protocol communication is attained by using the function provision of the layers beneath it. The transport layer will insure that data is kept segmented from one another. The Transport Control Protocol/ Internet Protocol commonly known as by its abbreviations (TCP/IP) has four layers namely Application, Transport, Internet and Network Access Layer which perform different functions to in aiding the data communication processes.
In encapsulation, PDUs are created by each protocol which entails the data and the header that is to be transmitted. These data become the Service Data Unit (SDU) of the layer below it. From the diagram above, the uppermost layer,7, PDU has a layer 7 header and application data. When it is conveyed to 6 it becomes 6 SDU. The 6 layer attachés the data at the beginning of L6H to give rise to layer 6 PDU which is later on passed to layer number 5. The encapsulation process continues up to layer number 2 which initiate layer 2PDU, it transformed into bits and forwarded to layer number 1
The receiver will synchronize with the digital signals until it’s done and receives the whole frame. Once complete, it will pass it to the Data link layer which is above it. The data link will check if there is an error in the data through the Cyclic Redundancy Check (CRC). The data link layer will remove any information that was initially put any the remote system’s data link layer thus moving to Network layer to form packets. The IP address is checked in the Network layer, then strips off from packets and passes the rest to the Transport layer to form segments.
The transport layer processes the segment and rebuilds the stream. Thus the process of encapsulation is reversed from the Layer 2, 2PDU back to layer 6.
Switches use an application specific integrated circuit to build and maintain MAC address tables. When the circuit is powered on, the switch has no any destination address on it. When the device transmits data for the first time, the switch will store the destination MAC address. It will broadcast the frames to all the port in the switch apart from that of the switch. When the switch receives frames it compares the MAC address with that in its table in order to determine the destination of the address. If the MAC address is not found in the table, the switch will opt to flood the frame hence allowing forwarding of the frame.  
When host F on LAN 2 sends the frame to host A on LAN 1, Hub 2 will receive the frame at the interface of the hub where it connects to F. It’s obvious it will not find the MAC address of A in LAN1 in its filter table. It will flood the frame to all the ports apart from that of the source thus the same copy of the frames will be received in both switch 1 and switch 2 which in turn will do the same: i.e. flooding the frame to all its port apart from that of the source in search of the MAC address of A. This will result to increase in copies of the frame in the network since the frames will keep circulating in the network. Eventually, the network will completely break down as a result of unnecessary broadcast storm chewing the network bandwidth.
At the sender node, Alice encapsulates the packets for transmission on the ongoing link. At the intermediate node, the frame is decapsulated and forwarded to the network layer which then determines the routing. The link type involves in this transmission include the point-to-point between two devices dedicated link and broadcast. Data Link Control (DLC) and Media Access Control (MAC) are also used as sublayers. The network layer address stores the IP address of the device which is unique across all nodes in all interconnected networks and is the source destination. The link address locally identifies the device and stores address of the destination source.
Alice node has the IP datagram to Bob’s node, though in moving the frame the link address is used to move to the next address. The Address Resolution Protocol is used to deduce if the destination is local or remote. Once the destination of Bob has been identified as remote, the ARP is used to determine the default gateway which is the router which in turn is responsible in forwarding to Bob’s node via data link layer. Router R1 and Router R2 communicate via point to point connection. Alice IP (ARP Alice)requests  for Bob’s MAC address, the ARP at Alice creates an ARP packet an forward it to the link of Alice. Data link of Alice makes a frame, which is basically the packets in the data link, as shown in the frame link 1 and broadcasts the frame to frame in link 2. In the frame link 3, ARP at Bob makes packet reply ARP sends it data link layer including the Bob’s MAC address. Bob’s data link checks the type fields which denote ARP protocol and decapsulates the frame.
Point-To-Point-Protocol is considered very secure in respect to WAN. It has the capabilities of being hidden from view; it has a way to encapsulate datagram multiprotocol datagrams.
The Link Control Protocol (LCP) is a core fundamental protocol that aid in the Point-to-point communication in a network. It is used to create and establish logical links between the two points; the source and the destination of the data. It is also responsible in Point-to-Point links for complete operations for suit protocols inside the data-link layer of the OSI. It uses a set of frames to control, manage and terminate the point-to-point links. It establishes and configures the verification peer identification through the link configuration. It maintains the link by estimating packets size and eliminates any configuration error. It also terminates the connection of the link when the available resources exceed the requirement.
The Password Authentication Protocol (PAP) is used for access granting of devices connected in point-to-point network. It is an authentication protocol that is primarily used in validating the users by supporting three types of authentications of varying security levels. PAP makes this complete by using network server to request password from the clients’ device and share the retrieved password to the relevant server without encrypting the password. It’s often considered as least secure.
The Challenge-Handshake Authentication Protocol (CHAP) is used in authenticating network hosts to point-to-point networks. It provides a secure connection since it provides protection against playback attacks through a variable change value. In requests passwords in network sever access which sends password a unique message to the clients device, the client device will then encrypt the message and send it back to the access server, the authentic is successful when the user’s response match.
The Network Control Program (NCP) is used to request for extra configurations and facilities for the network in point-to-point networks. It makes possible for the devices connected in point-to-point network to communicate, access remote devices and share/transmit files between the devices. It provides the middle layer which aid computer network protocol suit in running host computers. It uses the simplex protocol which utilizes the two ports (the UDP and TCP port numbers) to establish two connections of the point-to-point devices, for two way communication.
The Internet Protocol Control Protocol (IPCP) is used establishing, configuring and managing Internet Protocols (IP) in devices connected in point-to-point network.  It configures the IP address by enabling and disabling the modules of the internet protocol on both ends of the point-to-point network. The IPCP packets are transmitted when the PPP reaches the network layer protocol phase. Each device in the point to point network sends its own configuration requests since the direction of PPP connection and Transport Control Protocol/ Internet Protocol (TCP/IP) option are not dependable to each other’s (Sarkar et al.,2016).
Question 5(1).
Mobile telephony entails communication phone services which allow one to be mobile rather than fixed in one position. Cellar phones connect to base transceiver stations. Due to the effect of some unavoidable negative factors such as the attenuation, there is need to modulate digital signals before transmitting them. This is because the frequency of the baseband e.g. that of your voice is so weak that it cannot withstand the extent of transmission (i.e. distance to cover), hence the heightening of the frequency to the order of MHz disguised in the bosom of the carrier until it gets to its destination then demodulated. When transmission distance increases the signal tends to lose, so carrier signal is added along with the message signal to strengthen the original message signal.
A bandpass is a channel whose resultant bandwidth does not start form 0. The data is transmitted in form of amplitude modulated signals; the stream of data is modulated while switching the amplitude and frequency in together with the incoming data (Al-Fuqaha et al., 2015). The bandpass signals are analyzed by equivalent envelope representation. The signal received is later on filtered with a bandwidth filter of equal bandwidth signal which entails converting narrowband noise from the white noise. The received signal complexity representation will be observed by the receiver for some time and make appropriate equivalently for binary data. At the receiver, the data is then reconverted to its initial state i.e. from analog to digital.
We have a total of 8 collisions:
A switch cause one collision per pair devices so we will have collisions between pc-5 and switch 1, p-6 and switch 3, switch 1 and switch 2, switch 2 and switch 3, switch 2 and router thus making a total of 5 collisions based on the switch.
Devices that are connected to a hub have one resultant collision, thus in our diagram, we will have collision one collision as a result of pc-1, pc-2, hub 4, hub 5 and hub 3. The second collision involving a hub is between hub 2 and pc-3 while the last collision involving a hub is between pc-4 and hub 1.
Bridge forward and filters incoming frames, it determines the destination address of the frame. It has the capability of storing Ethernet frames in memory thus preventing collisions from happening. Thus, no collision will be around the bridge.
References
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347-2376.
Geier, J. (2015). Designing and Deploying 802.11 Wireless Networks: A Practical Guide to Implementing 802.11 n and 802.11 ac Wireless Networks For Enterprise-Based Applications. Cisco Press.
Sarkar, S. K., Basavaraju, T. G., & Puttamadappa, C. (2016). Ad hoc mobile wireless networks:principles, protocols, and applications. CRC Press.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 9 pages

PAY 6 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2020). Computer Networks. Retrieved from https://myassignmenthelp.com/free-samples/sit202-computer-networks/transceiver-stations.html.

“Computer Networks.” My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/sit202-computer-networks/transceiver-stations.html.

My Assignment Help (2020) Computer Networks [Online]. Available from: https://myassignmenthelp.com/free-samples/sit202-computer-networks/transceiver-stations.html[Accessed 18 December 2021].

My Assignment Help. ‘Computer Networks’ (My Assignment Help, 2020) accessed 18 December 2021.

My Assignment Help. Computer Networks [Internet]. My Assignment Help. 2020 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/sit202-computer-networks/transceiver-stations.html.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

You can now automatically cite your documents in MLA style by using free MLA citation generator from MyAssignmenthelp.com. You will not have to check through each line to cite your documents manually. The MLA citation maker tools will do that for you. Besides using the citation machine, if you want to know proper MLA format and other essentials, you can talk to our experts. They will give you their superior guidance to referencing help you understand the various aspects of the MLA style citation and format.

Latest Management Samples

div#loaddata .card img {max-width: 100%;
}

MPM755 Building Success In Commerce
Download :
0 | Pages :
9

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More

SNM660 Evidence Based Practice
Download :
0 | Pages :
8

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :
7

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 

Next

Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

11174 Introduction To Management

Free Samples 11174 Introduction To Management .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} 11174 Introduction

Read More »