Skip to main content

ASSIGNMENTSUBMISSION

ASSIGNMENTSUBMISSION

 

Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)

 

Instructions

While it should not be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format.

DO NOT copy content directly from either the text or Internet resources:  this assignment is to be in your own words.You will lose marks if you do not use your own words!

Please complete your assignment using this submission template file, inserting your responses where indicated.

DO NOT delete the marking criteria page – changes are permitted to the formatting of other pages including the headers and footers.

 

 

 

 

Please fill in the following details:
Student Name
Student Number

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Week One

 

Assignment Question:

 

A ping messagecan be used to test the reachability of a host (such as Google with IPaddress 8.8.8.8) on an Internet Protocol (IP) network.

 

List the steps aping message takes to get to a host and what layer of the network communication process each step relates to.

 

 

Your answer:

 

 

 

 

 

 

 

 

 

 

Your question:

 

 

 

Your sample answer:

 

 


Week Two

 

Assignment Question:

 

NQ-Real Estate has 8 workstations in a wired LAN with a 100 Mbps switch. It was suggested to the admin officer to replace the switch with awireless Access Point (AP) that uses the 802.11ac standard and operates at 1 Gbps. Assuming all workstations were simultaneously using the LAN, would the AP deliver faster or slower speeds to the users? Explain your reasoning by including estimates of effective bandwidth for each case.

 

 

 

Your answer:

 

 

 

 

 

 

 

 

 

 

Your question:

 

 

Your sample answer:

 

 

Week Three

 

Assignment Question:

 

Describe the difference between a network’s physical topology and its logical topology and explain the advantages and disadvantages of a physical star topology.

 

 

 

Your answer:

 

 

 

 

 

 

 

 

 

 

 

 

Your question:

 

 

Your sample answer:

 


Week Four

 

Assignment Question:

 

NQ-Real Estate’s facilities in Hermit Park, Townsville, are two office buildings 150 meters apart, each with its own LAN. To connect the two networks, the budget-conscious facilities manager suggestsusingCategory 6 of Unshielded Twisted-Pair Cable.

 

  • Explain why this is not a suitable advice
  • Give two other media connectivity options, outline their advantages and disadvantages

 

 

 

 

 

 

 

Your answer:

 

 

Your question:

 

 

Your sample answer:

 

 

 

Week Five

 

Assignment Question:

 

Complete the following table by nominating the network layer names and the protocols associated with the following tasks:

 

  • Ensure that the information sent by the web server reaches your browser
  • Route messages between your PC and the server over the Internet
  • Allow the web browser software and the web server software to understand the messages sent between them
  • Encapsulate data in frames

 

 

Your answer:

 

Complete this table:

 

Task Layer Protocol
Ensure that the information sent by the web server reaches your browser
Route messages between your PC and the server over the Internet
Allow the web browser software and the web server software to understand the messages sent between them
Encapsulate data in frames

 

 

 

 

 

 

 

 

Your question:

 

 

Your sample answer:

 

 


Week Six

 

Assignment Question:

 

Internet Protocol version 6 (IPv6), the most recent version of the Internet Protocol (IP), is the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.As of 31 December 2017, the percentage of users reaching Google services with IPv6 reached 22.6% for the first time in regular measurements, growing at about 5.8% per year, although varying widely by region. As of December 2017, about 33% of Alexa Top 500 web servers support IPv6.

 

 

Explain how it is that IPv4 and IPv6 can co-exist (dual-stack IP implementation)in the same network and describe two technologies that enable this.

 

 

 

 

 

 

Your answer:

 

 

 

Your question:

 

 

Your sample answer:

 

 

Week Seven

 

Assignment Question:

 

A switching table below has the following entries:

 

MAC Address Port #
00-25-2A-00-00-01 4
00-25-2A-00-10-FC 1
00-25-2A-00-00-2B 2
00-25-2A-00-11-21 3
00-25-2A-00-10-0F 3

 

Port 3 is connected to a hub.

 

The following events occur:

 

  • The entry for 00-25-2A-00-00-01 expires.
  • An additional device (00-25-2A-00-10-5D) is connected to the hub on port 3.
  • A new virtualised machine (00-25-2A-00-10-6C) is started on the server connected to port 2.
  • Device (00-25-2A-00-10-0F) is disconnected from the hub on port 3 and connected to port 5.

 

Draw the switching table at the end of these events.  The order of entries is unimportant:

 

Your answer:

 

Complete the following table:

 

 

MAC Address Port #

 

 

 

Your answer:

 

 

Your question:

 

 

Your sample answer:

 

Week Eight

 

Assignment Question:

 

It is well known that, the wireless signal of a Wi-Fi network is not confined to a cable as in a traditional network but instead is broadcast through the air. Recently, public Wi-Fi hotspots can be found everywhere, such as airports, hotels and coffee shops. Users can log onto the Internet with their mobile device. Along with convenience, public Wi-Fi hotspots can also provide an easy way for some attackers, like identity thieves and cybercriminals, to attack the wireless network or the users.

 

Please state two kinds of attacks that may occur in public Wi-Fi networks and provide an effective way for users to address the security issues when they access public Wi-Fi on their computer or mobile device.

 

 

Your answer:

 

 

 

 

 

 

 

Your question:

 

 

Your sample answer:

 

 

 

Week Nine

 

 

Assignment Question:

 

Cloud computing is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility.

 

Cloud-computing providers offer their “services” according to different models. Explain the three basic service models including one example for each.

 

Your answer:

 

 

Your question:

 

 

Your sample answer:

 

 


Week Ten

 

Assignment Question:

 

NQ-Real Estate has special management software that only runs on Windows.  The admin officer has a problem that his desktop was replaced by a MacBook Pro running macOS.  How could virtualisation help to solve this problem?  What type of virtualisation would be used?  Give an example of the name of a product that could be used.

 

 

 

 

 

 

Your answer:

 

 

Your question:

 

 

Your sample answer:

 

 

 

MARKING SHEET – DO NOT DELETE

 

  Assignment Question Student Question
Criteria 0 Incorrect/No Response 0 No question provided or minimal attempt
0.5 Limited /Partially incorrect responseOR response is not in the student’s own words 0.5 Simplistic question/sample answer that does not demonstrate an understanding of the topic areaORsample answer is not in the student’s own words
1 Correct response but could have more detail 1 Good question that has some challenge, but could be more challenging and/or the sample answer needs more detail/explanation
1.5 Excellent response withgood detail 1.5 Excellent and challenging question with a detailed sample answer
Week Marks Awarded Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:

 

The post ASSIGNMENTSUBMISSION appeared first on My Assignment Tutor.



Logo GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS  CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com

Comments

Popular posts from this blog

Should pit bull terriers be banned in my community

 Discussion Forum: Counterarguments (Should pit bull terriers be banned in my community) You created a question about the topic for your W6 Rough Draft. For this discussion, you will give an answer to that question in the form of a thesis statement. "Dieting Makes People Fat" Main Post: Share your thesis statement with your classmates. Please note: As with last week’s discussion, nothing here is set in stone. Be open to changing everything about your topic, including your position and audience, as you research it and get feedback from your classmates. Topic + Position/Purpose + Supporting Points =Thesis Statement Example: Suppose the question you posed in the Week 5 discussion was something like, “Should pit bull terriers be banned in my community?” After doing some preliminary research, you have concluded that pit bulls, if raised properly, are no more dangerous than other breeds of dogs. Your thesis statement can be something like, “Pitbulls should not be banned

Controversy Associated With Dissociative Disorders

 Assignment: Controversy Associated With Dissociative Disorders The  DSM-5-TR  is a diagnostic tool. It has evolved over the decades, as have the classifications and criteria within its pages. It is used not just for diagnosis, however, but also for billing, access to services, and legal cases. Not all practitioners are in agreement with the content and structure of the  DSM-5-TR , and dissociative disorders are one such area. These disorders can be difficult to distinguish and diagnose. There is also controversy in the field over the legitimacy of certain dissociative disorders, such as dissociative identity disorder, which was formerly called multiple personality disorder. In this Assignment, you will examine the controversy surrounding dissociative disorders. You will also explore clinical, ethical, and legal considerations pertinent to working with patients with these disorders. Photo Credit: Getty Images/Wavebreak Media To Prepare · Review this week’s Learning

CYBER SECURITY and how it can impact today's healthcare system and the future

 Start by reading and following these instructions: Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling. Assignment: Recommendations Document Due Week 6 (100 pts) Main Assignment Recommendations Document The 1250 to 1500-word deliverable for this week is an initial draft of your recommendations. Note that this is a working document and may be modified based on insights gained in module eight and your professor's feedback. This document should contain the following elements: Summary of your problem or opportunity definition A list of possible recommendation alternatives. In this section, you are not yet at the point of suggesting the best set of recommendations but you are trying to be creative and explore all the different ways that the problem or opportunity might best be addressed. The end result here will be a list of alternatives among which you will choose your final recom