” SIT202课程程序 写作、 写作Algorithm程序、Python程序SIT202 Computer NetworksTrimester 2, 2020Problem Based Learning Task 2Due Date: 8pm Sunday September 27th, 2020This assessment is marked out of 100 marks and is worth 35% of your final unit mark.This assessment task must be completed individually,group work and/or collaboration with other students is prohibited.All work completed/submitted as part of this assessment task must be your own, individual work.Any content drawn from Other materials, including unit materials, must be clearly quoted whereappropriate, and/or clearly referenced. All students should review and be familiar with the contentprovided by the University regarding how to reference other materials: httpss://www.deakin.edu.au/students/studying/study-support/referencingAnd in particular the information provided regarding Academy Integrity: httpss://www.deakin.edu.au/students/studying/academic-integrityUse of IllustrationsNote that several questions below may require you to include an illustration in your answer. Thismust be your own illustration, not a graphic copied from the Internet or any other source(textbook, class slides, etc.). Illustrations from the Internet (whether directly copied orreproduced by you) will not be awarded any marks.There are many illustration programs that you may use for this purpose, including several freeapplications accessible via the Web. If you are unable to use these programs however, you mayinclude a scanned/photographed hand-drawn illustration in as long as that illustration is clearlylegible.HD TasksSIT202课程作业 写作、 写作Algorithm作业、Note that there are one or more HD Tasks identified in the requirements below. These tasks aremore difficult to answer and total 20% of the marks available for this assessment. A HD resultreflects achievement in the unit of a deep understanding of the unit content and ability to extendyour knowledge beyond that Covered in the unit directly. You can expect these tasks will beassessed harder than other tasks reflecting demonstration of this level of achievement.SubmissionAnswers must be Submitted via the unit site (CloudDeakin) to the TurnItIn-enabled folder forProblem Based Learning Task 2. Answers to each question and sub-question must be clearlyidentified in your submission. Acceptable file formats include Word documents, PowerPointdocuments, PDF documents, text and rich text files, and HTML. Compressed files such as ZIP filesor RAR files, or any other format that cannot be processed by TurnItIn cannot accepted and willnot be marked.ExtensionsApplications for an extension can be made before the due date/time via the tool in the unit site(CloudDeakin). The link to the extensions tool can be found by clicking on the Assessments menuat the top of the screen and selecting the Extension Request link. Extension applications mustclearly explain unusual circumstances that have impacted your studies and must contain enoughinformation for the duration of any extension to be determined. Students applying on the basis ofa LAP must at a minimum indicate they are supported by a LAP and indicate that the request foran extension is linked to the disability.Applications for Special consideration can be made at any time including (for a limited time) afterthe due date/time. Information on applying special consideration can be found here: httpss://www.deakin.edu.au/students/studying/assessment-and-results/special-considerationNote: Applying for an extension or special consideration does not guarantee a positive outcome.You should always continue working on the basis that an extension is not granted, such assubmitting any work you have completed by the original due date/time to avoid a late penalty.If an extension is then granted you can resubmit an updated version of your assessment later.Question 1 / Week 6 (12.5 + 8 = 20.5 marks)Computer networks are constructed using a modular architecture known as layering.a) Identify and describe the five different approaches to configuring IPv6 addresses. In youranswer, explain why it may be beneficial to use stateless DHCPv6.b) (HD Task) Consider the following weighted graph:A BD EC 2 234 1 5 1Demonstrate the step-by-step calculation of the least-cost tree starting from node A usingDijkstras Algorithm And draw a figure illustrating the final least-cost tree.Question 2 / Week 7 (12 + 6 = 18 marks)a) Transport protocols usually provide multiplexing and demultiplexing services. Explain howthis works and why it is necessary.b) (HD Task) Sliding-window flow control provides both flow control and error control. TheTCP protocol implements a variant of this, where an acknowledgement can be sent forsegments received without granting permission for additional segments to be sent. If theunderlying IP protocol were modified to provide a reliable service, guaranteeing that allsegments sent by TCP arrived at the destination without error, explain why it would still beuseful to separate The acknowledgement and the granting of permission.Question 3 / Week 8 ((3 + 7 + 5) + (4 + 2) = 21 marks)a) Select three popular Internet domains, examples of which could include amazon.com,facebook.com, google.com, microsoft.com, reddit.com, or any other popular domains ofyour choosing.i. Obtain the SOA records for each of your chosen domains and present their data in atable.ii. Briefly explain the meaning of each field.iii. Discuss how the observed different values will impact other DNS servers.b) (HD Task) We have examined the HTTP protocol in this weeks materials. For constraineddevices such as IoT devices, alternative protocols such as the Constrained ApplicationProtocol (CoAP) are often used instead.i. Describe the CoAP protocol.ii. Explain why CoAP might be preferred for constrained devices.Question 4 / Week 9 (8 + 12 = 20 marks)a) In Week 9 on Slide 6, a figure is shown illustrating SNMP querying how many UDPdatagrams have been received by an agent (the agent could be an individual host or arouter). Explain how such simple data can be made useful.b) One of the problems Encountered for multimedia is jitter. Explain how a playback buffersolves the problem of jitter and discuss whether a playback buffer is useful for live eventssuch as a video call/conference.Question 5 / Week 10 (8 + (5 + 7.5) = 20.5 marks)a) Digital signatures work by generating and signing a digest of a message. Explain why only adigest is signed and why it isnt Necessary to sign the entire message.b) Consider an organisation that Has two sites (offices, branches, etc.), each with a typicalconnection to the Internet via an ISP (such as an NBN connection like many Australianhomes). To secure Communication between the two sites, a site-to-site VPN has beenestablished using IPsec ESP in tunnel mode.i. Draw an illustration showing the two sites and their connection to the Internet, theVPN tunnel, packets travelling between the individual sites and public Internetsites, and packets travelling between the sites.ii. Briefly discuss the advantages of this approach and explain the services provided bythe VPN.如有需要,请加QQ:99515681 或邮箱:99515681@qq.com
“
添加老师微信回复‘’官网 辅导‘’获取专业老师帮助,或点击联系老师1对1在线指导。