Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

NWEG5111 ST10252399

NWEG5111_A1

ST10252399

NWEG5111

BCAD1

5/30/2023

PHUMEZO NTLATYWA

I hereby declare that I did not plagiarise the content of this


assignment and that this is my own work.

Assignment submitted via SafeAssign: ☒(Tick the Box)


NWEG5111_A1 ST10252399

TABLE OF CONTENTS

TABLE OF CONTENTS .......................................................................................................................................... 1

QUESTION 1 .......................................................................................................................................................... 2

QUESTION 2 .......................................................................................................................................................... 3

QUESTION 3 .......................................................................................................................................................... 5

QUESTION 4 .......................................................................................................................................................... 6

QUESTION 5 .......................................................................................................................................................... 8

QUESTION 6 .......................................................................................................................................................... 9

QUESTION 7 ........................................................................................................................................................ 11

REFERENCE LIST ............................................................................................................................................... 12

1
NWEG5111_A1 ST10252399

QUESTION 1

Q.1) What is the difference between baseband coaxial and broadband


coaxial cable?

BASEBAND COAXIAL CABLE

• (Gupta, 2020) Frames or packets are used to transfer digital signals.


• (Gupta, 2020) Can simply transfer a single data stream at one time.
• (Gupta, 2020) The direction of transmission is bidirectional, which means that
the same channel can be used for both transmitting and receiving signals, and
each device uses the exact same channel for communication.
• (Gupta, 2020) The data transmission mediums for baseband coaxial cable are
through copper cables, twisted-pair coaxial cable and wires.
• (Gupta, 2020) The structure of baseband coaxial cable is very simple. There
is no specific equipment needed for implementation.

BROADBAND COAXIAL CABLE

• (Gupta, 2020) Radio waves are used to transfer analog signals.


• (Gupta, 2020) Can transfer several signal waves at one time.
• (Gupta, 2020) The direction of transmission is unidirectional, which means
that two separate channels are required to transmit and receive signals - one
for transmitting and another for receiving.
• (Gupta, 2020) The data transmission mediums for broadband coaxial cable
are through coaxial cables, radio waves and optical fiber cables.
• (Gupta, 2020) The structure of broadband coaxial cable is much more
complex than baseband cables. Very special and unique equipment is
necessary for implementation.

2
NWEG5111_A1 ST10252399

QUESTION 2
Q.2) What are the most common groups of network utility software?

ANTIVIRUS SOFTWARE
(Haygot Technologies, Ltd., 2020)
McAfee Antivirus, Quickheal Antivirus, Windows Defender, and other antivirus
programs are examples of an antivirus software. The antivirus is a utility software
that assists in keeping your device virus-free. It warns you when an unsafe file is
found and prevents it. Additionally, it investigates every new device connected to the
computer and removes any viruses found. The system constantly gets monitored for
risks and removes them.

BACKUP SOFTWARE
(Haygot Technologies, Ltd., 2020)
The backup utility software assists in creating backups of files, directories,
databases, or whole drives. Furthermore, backup refers to replicating disk info so
that it may be recovered in the event of data loss. Network managers are allowed to
safely back up files of data that have been kept on a server's hard drive. This backup
frequently writes to a tape system, although there are alternative options, such as
making a backup to a distant site through the Internet. Many backup systems may be
totally automated such that the program runs when there are few, if any, users on
the system, such as in the earliest hours of the day.

CRASH PROTECTION SOFTWARE


(Haygot Technologies, Ltd., 2020)
The goal of this utility software is to prevent the system to crash or to try to keep the
operating system functioning for a while to conduct an elegant exit. To use this
software, a business must have the program downloaded on both the client's
workstations and the network server. When an individual's workstation is going to
crash, it sends a signal to the operating system indicating that it is having problems
and must be turned down. A crash protector captures this notification and attempts
to resolve the issue while the program is still operating. Also, a crash protector
causes an operational delay since it operates in the background all the time. Most
crash protectors now reduce overall efficiency of the system by 2 to 8 percent.

3
NWEG5111_A1 ST10252399

NETWORK-MONITORING SOFTWARE
(Haygot Technologies, Ltd., 2020)
This utility software features a rather wide range of network support tools. There's
also software that can track servers and report on CPU utilization, network activity,
and server demands. The most prevalent network-monitoring tool is the Simple
Network Management Protocol (SNMP).

REMOTE ACCESS SOFTWARE


(Haygot Technologies, Ltd., 2020)
This software is allowing a user to have access to all personal computer
workstation’s feature from a remote or mobile location. There are two sorts of users
that make use of this utility software: Nomadic user and support personnel. A
nomadic user is someone who remotely accesses the software while working from
home or on vacation. Support personnel are the ones who use remote access to the
computer to troubleshoot problems.

4
NWEG5111_A1 ST10252399

QUESTION 3
Q.3) Show the sequence of start, data, and stop bits that are generated
during asynchronous transmission of the character string “LUNCH.”
(White, 2016, pg. 109,411)

“L”
Start bit: 0
Data bit: 01001100
Stop bit: 1

“U”
Start bit: 0
Data bit: 01010101
Stop bit: 1

“N”
Start bit: 0
Data bit: 01001110
Stop bit: 1

“C”
Start bit: 0
Data bit: 01000011
Stop bit: 1

“H”
Start bit: 0
Data bit: 01001000
Stop bit: 1

5
NWEG5111_A1 ST10252399

QUESTION 4
Q.4) Using EBCDIC, ASCII, and Unicode character code sets, what are
the binary encodings of the message “Hello, World”?
(White, 2016, pg. 51-53)

EBCDIC (The Extended Binary Coded Decimal Interchange Code)


“H”: 11001000 “space”: 01000000
“e” : 10000101 “W” : 11100110
“l” : 10010110 “o” : 10010110
“l” : 10010110 “r” : 10011001
“o” : 10010110 “l” : 10010011
“d” : 10000100
Therefore the binary encoding of the message “Hello, World” in EBCDIC code is :
11001000 10000101 10010110 10010110 10010110 01000000 11100110
10010110 10011001 10010011 10000100

(White, 2016, pg. 51-53)

ASCII (The American Standard Code for Information Interchange)


“H”: 01001000 “space”: 00100000
“e” : 01100101 “W” : 01010111
“l” : 01101100 “o” : 01101111
“l” : 01101100 “r” : 01110010
“o” : 01101111 “l” : 01101100
“,” : 00101100 “d” : 01100100

Therefore the binary encoding of the message “Hello, World” in ASCII code is :
01001000 01100101 01101100 01101100 01101111 00101100 00100000 01010111
01101111 01110010 01101100 01100100

6
NWEG5111_A1 ST10252399

(White, 2016, pg. 51-53)

UNICODE
“H”: 01001000 “space”: 00100000
“e” : 01100101 “W” : 01010111
“l” : 01101100 “o” : 01101111
“l” : 01101100 “r” : 01110010
“o” : 01101111 “l” : 01101100
“,” : 00101100 “d” : 01100100

Therefore the binary encoding of the message “Hello, World” in Unicode code is :
01001000 01100101 01101100 01101100 01101111 00101100 00100000 01010111
01101111 01110010 01101100 01100100

7
NWEG5111_A1 ST10252399

QUESTION 5
Q.5) Using a laptop computer with a wireless connection into the
company’s local area network, you download a Web page from the
Internet. List all the different network connections involved in this
operation.
(Studocu, n.d.) Wireless Connection (Wi-Fi): This is the first step to connect to a
business’s local area network with a wireless connection. The laptop connects
wirelessly to the organization’s Wi-Fi network. The laptop may access the Internet
and the local are network with this connection. (Studocu, n.d.) Local Area Network
(LAN): Through the wireless connection, the laptop joins the business's LAN. Within
the walls of the business, the local area networks offer connection and an internal
infrastructure. (Studocu, n.d.) Internet Service Provider (ISP): The LAN is linked to
the ISP, which gives the business an internet connection. The ISP acts as a gateway
between the local area network and the general internet. (Studocu, n.d.) Wide Area
Network (WAN): A computer must have a wide area network (WAN) to access the
internet or find a particular website on there. The LAN is connected by the ISP to the
WAN, that links networks all over the world and spanning several locations. The
WAN makes it easier for the LAN and the internet to communicate with each other.
(Studocu, n.d.) Internet Backbone: Backbone internets makes sure that data is
transmitted efficiently across various regions of the internet. The downloaded web
page travels across several internet backbone networks, which are high-capacity
networks that connect ISP and networks around the world.

8
NWEG5111_A1 ST10252399

QUESTION 6
Q.6) Using a computer network to perform an application, many pieces
come together to assist in the operation. A network architecture or
communication model places the appropriate network pieces in layers.

i. Draw and list the layers of the OSI model.

(White, 2016, pg. 17)

7 LAYERS OF THE OSI MODEL


7 APPLICATION LAYER
6 PRESENTATION LAYER
5 SESSION LAYER
4 TRANSPORT LAYER
3 NETWORK LAYER
2 DATA LINK LAYER
1 PHYSICAL LAYER

ii. List the layers of the TCP/IP Protocol and describe the duties of each
layer.

APPLICATION LAYER (TOP LAYER)


(afteracademy.com, n.d.) The application layer is a collection of apps that allow
users to connect to the network. For a lot of us, this includes email, chat applications,
and cloud storage services. (Bodnar, 2021) When delivering and receiving data, this
is what the end-user is seeing and interacting with.

TRANSPORT LAYER
(afteracademy.com, n.d.) This layer employs the TCP (Transmission Control
Protocol) to guarantee fully error-free end-to-end connections. The transport layer
establishes a secure data link between two devices that are communicating.
(Bodnar, 2021) It's the same as shipping a secured package: the transport layer
separates the data into packets, recognizes packets received on behalf of the
sender, and guarantees that the receiver recognizes the packets being received.

9
NWEG5111_A1 ST10252399

NETWORK LAYER
(afteracademy.com, n.d.) The network layer, often referred to as the Internet layer or
IP layer, regulates traffic movement and routing to guarantee that data is being
transferred quickly between and within networks. (Bodnar, 2021) This layer also
happens to be in control of reassembling the data packet once it arrives at its final
location. If there is an excessive amount of traffic over the internet, the data link layer
may take a bit longer to transfer a file, but the chances of a mistake damaging that
file are lower.

DATA LINK LAYER


(afteracademy.com, n.d.) The data link layer is the second lowest layer of the TCP/IP
protocol suite and is also known as the network access layer. This layer oversees
the physical infrastructure that allows computers to interact on the Internet. (Bodnar,
2021) This involves ethernet connections, networks that are wireless, network
interface cards, device drivers in your personal computer, and more. (Bodnar, 2021)
The data link layer consists of the technological infrastructure that allows network
connections to be made, such as code that translates digital data into transmitted
signals.

PHYSICAL LAYER (BOTTOM LAYER)


(afteracademy.com, n.d.) The Physical Layer is the TCP/IP model's bottom layer. It
is concerned with data in the form of bits. This layer mainly manages network
communication between hosts. It specifies the medium for transmitting and the
mechanism of communication between both devices. The mode can be either
simplex, half-duplex, or full-duplex, and the media may be either wired or wireless.
The physical layer's functioning differs from network to network. This layer makes no
use of any protocols. It also determines the type of network line configuration (point-
to-point or multiport), data rate (the number of bits delivered per second), and
topology.

10
NWEG5111_A1 ST10252399

QUESTION 7
Q.7) List the OSI layer that performs each of the following functions:
a. Data compression
b. Multiplexing
c. Routing
d. Definition of a signal’s electrical characteristics
e. E-mail
f. Error detection
g. End-to-end flow control.

For each of the functions, list the TCP/IP protocol suite layer that
performs that function.
(White, 2016, pg. 18)

FUNCTIONS OSI LAYER TCP/IP LAYER


Data compression Presentation Application
Layer Layer
Multiplexing Transport Layer Data link Layer
Routing Network Layer Network Layer
Definition of a signal’s electrical Physical Layer Data link Layer
characteristics
Email Application Layer Application
Layer
Error detection Data link Layer Transport Layer
End-to-end-flow control Transport Layer Transport Layer

11
NWEG5111_A1 ST10252399

REFERENCE LIST

✓ Gupta, P. (2020). Baseband vs Broadband | Top 8 Differences You Should


Know. [online] EDUCBA. Available at: https://www.educba.com/baseband-vs-
broadband/.
✓ afteracademy.com. (n.d.). What is the TCP/IP model and how it works?
[online] Available at: https://afteracademy.com/blog/what-is-the-tcp-ip-model-
and-how-it-works/#:~:text=1.- [Accessed 30 May 2023].
✓ Bodnar, D. (2021). What Is TCP/IP? [online] What Is TCP/IP? Available at:
✓ https://www.avg.com/en/signal/what-is-tcp-
ip#:~:text=There%20are%20four%20layers%20of.
✓ Studocu. (n.d.). [Solved] Using a laptop computer with a wireless connection
into the - Network Engineering 1A (NWEG5111) - Studocu. [online] Available
at: https://www.studocu.com/en-us/messages/question/2230120/using-a-
laptop-computer-with-a-wireless-connection-into-the-companyslocal-area-
network-you.
✓ White, C.M. DATA COMMUNICATIONS AND COMPUTER NETWORKS: a
business user’s approach. (2016). S.L.: Cengage Learning Custom P.
✓ Haygot Technologies, Ltd. (2020). [online] Toppr: On a mission to personalize
education for every child. Available at:
https://www.toppr.com/guides/computer-science/computer-
fundamentals/software-concepts/utility-software/ [Accessed 29 May 2023].

12

You might also like