Professional Documents
Culture Documents
NWEG5111A1
NWEG5111A1
NWEG5111_A1
ST10252399
NWEG5111
BCAD1
5/30/2023
PHUMEZO NTLATYWA
TABLE OF CONTENTS
QUESTION 1 .......................................................................................................................................................... 2
QUESTION 2 .......................................................................................................................................................... 3
QUESTION 3 .......................................................................................................................................................... 5
QUESTION 4 .......................................................................................................................................................... 6
QUESTION 5 .......................................................................................................................................................... 8
QUESTION 6 .......................................................................................................................................................... 9
QUESTION 7 ........................................................................................................................................................ 11
1
NWEG5111_A1 ST10252399
QUESTION 1
2
NWEG5111_A1 ST10252399
QUESTION 2
Q.2) What are the most common groups of network utility software?
ANTIVIRUS SOFTWARE
(Haygot Technologies, Ltd., 2020)
McAfee Antivirus, Quickheal Antivirus, Windows Defender, and other antivirus
programs are examples of an antivirus software. The antivirus is a utility software
that assists in keeping your device virus-free. It warns you when an unsafe file is
found and prevents it. Additionally, it investigates every new device connected to the
computer and removes any viruses found. The system constantly gets monitored for
risks and removes them.
BACKUP SOFTWARE
(Haygot Technologies, Ltd., 2020)
The backup utility software assists in creating backups of files, directories,
databases, or whole drives. Furthermore, backup refers to replicating disk info so
that it may be recovered in the event of data loss. Network managers are allowed to
safely back up files of data that have been kept on a server's hard drive. This backup
frequently writes to a tape system, although there are alternative options, such as
making a backup to a distant site through the Internet. Many backup systems may be
totally automated such that the program runs when there are few, if any, users on
the system, such as in the earliest hours of the day.
3
NWEG5111_A1 ST10252399
NETWORK-MONITORING SOFTWARE
(Haygot Technologies, Ltd., 2020)
This utility software features a rather wide range of network support tools. There's
also software that can track servers and report on CPU utilization, network activity,
and server demands. The most prevalent network-monitoring tool is the Simple
Network Management Protocol (SNMP).
4
NWEG5111_A1 ST10252399
QUESTION 3
Q.3) Show the sequence of start, data, and stop bits that are generated
during asynchronous transmission of the character string “LUNCH.”
(White, 2016, pg. 109,411)
“L”
Start bit: 0
Data bit: 01001100
Stop bit: 1
“U”
Start bit: 0
Data bit: 01010101
Stop bit: 1
“N”
Start bit: 0
Data bit: 01001110
Stop bit: 1
“C”
Start bit: 0
Data bit: 01000011
Stop bit: 1
“H”
Start bit: 0
Data bit: 01001000
Stop bit: 1
5
NWEG5111_A1 ST10252399
QUESTION 4
Q.4) Using EBCDIC, ASCII, and Unicode character code sets, what are
the binary encodings of the message “Hello, World”?
(White, 2016, pg. 51-53)
Therefore the binary encoding of the message “Hello, World” in ASCII code is :
01001000 01100101 01101100 01101100 01101111 00101100 00100000 01010111
01101111 01110010 01101100 01100100
6
NWEG5111_A1 ST10252399
UNICODE
“H”: 01001000 “space”: 00100000
“e” : 01100101 “W” : 01010111
“l” : 01101100 “o” : 01101111
“l” : 01101100 “r” : 01110010
“o” : 01101111 “l” : 01101100
“,” : 00101100 “d” : 01100100
Therefore the binary encoding of the message “Hello, World” in Unicode code is :
01001000 01100101 01101100 01101100 01101111 00101100 00100000 01010111
01101111 01110010 01101100 01100100
7
NWEG5111_A1 ST10252399
QUESTION 5
Q.5) Using a laptop computer with a wireless connection into the
company’s local area network, you download a Web page from the
Internet. List all the different network connections involved in this
operation.
(Studocu, n.d.) Wireless Connection (Wi-Fi): This is the first step to connect to a
business’s local area network with a wireless connection. The laptop connects
wirelessly to the organization’s Wi-Fi network. The laptop may access the Internet
and the local are network with this connection. (Studocu, n.d.) Local Area Network
(LAN): Through the wireless connection, the laptop joins the business's LAN. Within
the walls of the business, the local area networks offer connection and an internal
infrastructure. (Studocu, n.d.) Internet Service Provider (ISP): The LAN is linked to
the ISP, which gives the business an internet connection. The ISP acts as a gateway
between the local area network and the general internet. (Studocu, n.d.) Wide Area
Network (WAN): A computer must have a wide area network (WAN) to access the
internet or find a particular website on there. The LAN is connected by the ISP to the
WAN, that links networks all over the world and spanning several locations. The
WAN makes it easier for the LAN and the internet to communicate with each other.
(Studocu, n.d.) Internet Backbone: Backbone internets makes sure that data is
transmitted efficiently across various regions of the internet. The downloaded web
page travels across several internet backbone networks, which are high-capacity
networks that connect ISP and networks around the world.
8
NWEG5111_A1 ST10252399
QUESTION 6
Q.6) Using a computer network to perform an application, many pieces
come together to assist in the operation. A network architecture or
communication model places the appropriate network pieces in layers.
ii. List the layers of the TCP/IP Protocol and describe the duties of each
layer.
TRANSPORT LAYER
(afteracademy.com, n.d.) This layer employs the TCP (Transmission Control
Protocol) to guarantee fully error-free end-to-end connections. The transport layer
establishes a secure data link between two devices that are communicating.
(Bodnar, 2021) It's the same as shipping a secured package: the transport layer
separates the data into packets, recognizes packets received on behalf of the
sender, and guarantees that the receiver recognizes the packets being received.
9
NWEG5111_A1 ST10252399
NETWORK LAYER
(afteracademy.com, n.d.) The network layer, often referred to as the Internet layer or
IP layer, regulates traffic movement and routing to guarantee that data is being
transferred quickly between and within networks. (Bodnar, 2021) This layer also
happens to be in control of reassembling the data packet once it arrives at its final
location. If there is an excessive amount of traffic over the internet, the data link layer
may take a bit longer to transfer a file, but the chances of a mistake damaging that
file are lower.
10
NWEG5111_A1 ST10252399
QUESTION 7
Q.7) List the OSI layer that performs each of the following functions:
a. Data compression
b. Multiplexing
c. Routing
d. Definition of a signal’s electrical characteristics
e. E-mail
f. Error detection
g. End-to-end flow control.
For each of the functions, list the TCP/IP protocol suite layer that
performs that function.
(White, 2016, pg. 18)
11
NWEG5111_A1 ST10252399
REFERENCE LIST
12