Question 1
In any form of data transmission, the path used to transfer the signal from the transmitter to the receiver device is known as the transmission medium. This medium determines the transmission outcomes of a signal including the existing limitations (UNISA, 2009). Now, a transmission impairment is an attribute or property of a transmission medium that causes the transmitted signals to be distorted. Let’s focus on three types of impairments; attenuation, distortion and noise.
Attenuation
A measure of the energy lost by a signal through absorption or radiation as its travels through a medium. It’s a function of distance and is always radiated at a constant rate, therefore is smaller in shielded and shorter mediums. In itself, attenuation will occur because the signal will always spread out on the shell of the transmission medium which expands the amount of power radiated (Bourbie & Nur, 1984). Moreover, this impairment is also facilitated by impurities within the medium, which will always decrease the amplitude of the transmitted signal. Furthermore, it directly distorts the frequency of the transmitted signal while varying the phase shift.
Distortion (harmonic)
This type of impairment causes a signal to change its shape more so when a signal is made up of different frequencies i.e. different signals. Moreover, this phenomenon will occur when the signal has a varying frequency response as compared to the bandwidth of the transmission medium (IEEE). Distortions will shift the phase of a signal where the input will have varying amplifications as compared to the output signal. Moreover, it will cause varying amplifications of signal frequencies based on the filters used. In addition to this, it will result in a non-linear amplitude output i.e. an amplitude which is non-linear to the input signal.
Noise
A random and unwanted fluctuation in communication signals. Noise is also seen as an unwanted signal that is added to the intended communication signal. Noise lowers the efficeny of the communication medium by lowering the frequency and amplitude of the transmitted signal by amplifying those of the unwanted signals (Kang & Kupinski, 2012).
Question 2
File transfer protocol is a common standard used to transfer files between computers using the TCP/IP model across the internet. As a communication standard, it will use a client-server based protocol to transmit signals across two different channels. One of these channels is used as the data channel while the other is used as the control medium (Egli, 2015).
Before, outlining the processes that occur at each layer of the TCP/IP model, let’s examine a general operation of the FTP protocol. First, the FTP completely relies on the TCP (transmission control protocol) to establish the connections used to communicate. Therefore, the FTP sessions are made possible by TCP connections that establish a medium between the server and the client.
Operation procedure (using TCP/IP model)
From here, the client’s initial command reaches the destination (server) and a reply is sent through the same process in reverse. This reply establishes the connection and the actual transfer of files is initiated (Egli, 2015). On completion, the original sender (client) sends out a termination command to the TCP connection which ends the transmission.
Question 3
In this question we are given the following values: Bandwidth 3 MHz
SNR 110
We could use Nyquist formula to get the bit rate, where
Bit rate = 2 x Bandwidth x Log2 Signal level (L)
However, we lack the signal level and in its place we have SNR. Therefore, the Shannon capacity formal applies:
Capacity = bit rate = B x Log2 (1 + SNR)
= B x Log2 SNR = 3,000,000 x Log2 110
= 20344079.14 = 20.3441 MHz
Signal level: 20344079.14 = 6,000,000 x Log2 L
3.390679857 = Log2 L, therefore, L = 23.390679857
= 10.48808848 Levels
Question 4
Link-local addresses are IP version 6 unicast addresses that are automatically acquired by all connected interfaces configured using the IPv6 addressing. These addresses (link local) are configured using the prefix (link-local) of FE80:: /10 which basically represent 1111 1110 10 in binary notation. Furthermore, unlike other addresses, they are not bound to the physical addresses (MAC) as they are configured using the EUI-64 format. Nevertheless, they also can be configured manually using the same prefix format seen above (FE80::/10) but with the link-local command (Cisco, 2011). In comparison with other addresses (more so, ULA), these addresses are unique to a given network link. Therefore, they cannot be routed which prevents routers from forwarding them to other networks.
On the other hand, unique local addresses (ULA) are a consequence of the industrial disapproval of site local addresses which failed to meet the needs of the industry. In comparison to link local addresses, they are routable which means they can be used in different networks and segments, unlike link-local addresses that are designated as single network schemes. However, this routeing is only performed within a given network domain and not the internet. Moreover, ULA holds similar functions to IPv4 addresses that fall within the RFC1918 addressing standard. In addition to this, ULA enables organisations or users to map and number their resources based on unique addresses that fall only within their mandated domain that they administrate. However, these addressing scheme is never tied to routeing policies which simplifies the interaction with a service provider (ISP) (Study CCNA, 2017).
Question 5
Despite its tremendous functionalities, the IP protocol cannot outline the fate of data packets nor can it provide diagnostic data on transferred information. In place for these deficiencies is the Internet Control Message Protocol (ICMP), a diagnostic and control tool used to configure and deposit IP packets (Shichao, 2017). Now, ICMPv4 and ICMPv6 are the different versions of ICMP that are used in the industry based on the addressing scheme/version used i.e. ICMPv4 for IPv4 and ICMPv6 for IPv6. A general overview of the two will outline the integral role played by ICMPv6 on IPv6 operations as compared to ICMPv4.
For one, ICMPv6 is used for other purposes beyond the overall duty of reporting and signalling error messages. ICMPv6 is used to discover neighbours a role that is similar to IPv4 ARP (address resolution protocol). Moreover, it is also used to discover routes using the router discovery functionalities. Finally, it also used to manage and monitor hand-offs in mobile communication (in IPv6). On its end, ICMPv4 is only concerned with error detection and control, a role also accomplished by ICMPv6 (Shukla, 2009).
ICMP will always report errors to the original sender or source of information, this operation principle is facilitated by the source addresses usually stored in the IP structure. Moreover, ICMP will only report errors for other (higher protocols) to manage and correct.
Type:
Question 6
First, peer to peer (P2P) network is a communication network that enables devices to connect directly to each other without the need of a central server (regulatory device). Therefore, the devices involved in the network have equal rights and privileges acting both as the server and client based on the communication instance (Munirathinam, 2009). Furthermore, these networks (P2P) have advanced due to technological advancement which has resulted into the different types seen today. The decentralised P2P network is the absolute representation of non-centralised networks where devices (peers) are connected extensively to form infinitely long networks without using a central management system. Moreover, each peer has a partial outlook which limits their view to a few devices which they are allowed to exchange services. In addition to this, the size of the network (which is infinitely long) is usually determined by the size and number of layers of the participating computers.
On the other hand, centralised P2P networks will use a central server to manage the connections established by the participating computers. However, the devices involved will still have equal rights establishing direct connections with other devices but a central device is used as a directory to store the information contained in each computer (Lupu, 2010). Therefore, the central item is used as a record to store all the information contained in each of the participating computers. Furthermore, it will facilitate communication by directing peers to their intended recipients and sources.
Types of decentralised P2P networks
References
Bourbie. T & Nur. A. (1984). Effects of attenuation on reflections: Experimental test. Journal of geophysical research. Retrieved 03 May, 2017, from: https://onlinelibrary.wiley.com/doi/10.1029/JB089iB07p06197/abstract
Cisco. (2011). Understanding IPv6 Link Local Address. Retrieved 03 May, 2017, from: https://www.cisco.com/c/en/us/support/docs/ip/ip-version-6-ipv6/113328-ipv6-lla.pdf
IEEE. RF, RFIC & Microwave theory, design. Retrieved 03 May, 2017, from: https://www.ieee.li/pdf/essay/phase_noise_basics.pdf
Kang. D & Kupinski. M. (2012). Effect of noise on modulation amplitude and phase in frequency-domain diffusive imaging. Journal of biomedical optics. Retrieved 03 May, 2017, from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4098065/
Rodrigues. R & Druschel. P. (2010). Peer-to-Peer Systems. Communication of the ACM. Retrieved 03 May, 2017, from: https://cacm.acm.org/magazines/2010/10/99498-peer-to-peer-systems/fulltext
Scottish Qualifications Authority. (2010). TCP/IP Model Layers. LO4: Implement Basic Networks and Security. Retrieved 03 May, 2017, from: https://www.sqa.org.uk/e-learning/HardOSEss04CD/page_06.htm
Shichao. (2017). Chapter 8. ICMPv4 and ICMPv6: Internet Control Message Protocol. Retrieved 03 May, 2017, from: https://notes.shichao.io/tcpv1/ch8/
Shukla. R. (2009). Icmp V4 And Icmp V6. Retrieved 03 May, 2017, from: https://www.slideshare.net/engineerrd/icmp-v4-and-icmp-v6
Study CCNA. (2017). IPv6 unique local addresses. Retrieved 03 May, 2017, from: https://study-ccna.com/ipv6-unique-local-addresses/
UNISA. (2009). Transmission media. Chapter 4. Retrieved 03 May, 2017, from: https://www.di-srv.unisa.it/~vitsca/RC-0809I/ch04.pdf
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download