ITECH1002/5002 Networking Assignment
Semester 1 - 2017
This assignment has three major aims:
1. To help students gain good understanding of all ITECH1002/5002 theoretical and practical material
2. To encourage students to use summaries to help prepare for invigilated assessments like theory tests, laboratory tests and examinations.
3. To encourage students to conduct independent investigation into networking related topics.
Engagement with this assignment should help students to prepare for the week 7 lab test, the week 7 theory test and the end of semester examination.
The assignment requires students to summarize the lecture material of topics 1-5 and answer a series of topic related questions.
The material covered in ITECH1002/5002 is practically based and as such students will benefit from putting their theoretical knowledge into practice. To this end all students are advised to make use of the lab computers to experiment with Linux and Windows 8.1. Keen students may also like to set up VirtualBox with associated virtual images on their own hardware so they have their own copy of the operating systems being studied. The Moodle site has instructions to assist students to set up VirtualBox in a similar way to lab machines.
Submission requirements
All submissions must be a single word or pdf document and must be submitted electronically via the associated Moodle Assignment link.
Submission deadline:
This must be submitted to the Moodle by 4:00pm on Thursday of week 6.
See your course description for actual submission dates.
Assessment value:
This assignment is worth 10 marks (10% of ITECH1002/5002 assessment)
Students may bring an unaltered printout of their submission to the week 7 lab test as reference material for the lab test.
Topic summary requirements
Each topic summary should meet the following requirements:
Each topic’s summary should be no greater than one (1) A4 side in length. The aim of this assignment is to condense the lecture material into a concise form that encapsulates the material without being too verbose. You could for instance make good use of tables, dot points or diagrams to summarise important aspects of the lecture material as you feel appropriate.
Students are also required to answer specific questions relating to the topic as outlined in the assignment specification. There is no page limit for the question answers however more than 2 A4 pages would be considered excessive.
A wealth of information on all topics we cover is available on the Internet. For instance there is a multitude of Linux tutorials and YouTube videos that cover introductory Linux. Engaging with such material will have positive effects on your understanding of the course material.
A primary aim of this assignment is to assist you to fully comprehend the lecture material we cover over the semester, please try to keep that in mind when you are preparing the report.
As with all academic reports the material you submit must be your own work and definitely not copied and pasted material from the lecture slides, notes pages, the Internet or elsewhere.
Any material sourced from the Internet or other sources must be referenced using APA referencing. If you do not source any material from the Internet or other sources then there will be no need to use referencing in this assignment.
Topics covered
The assignment covers the following areas:
• IP networking
• Number system
• File systems
• Linux
Topic 1 : Introduction
Topic 1 summary (Maximum length 1 A4 side)
The topic 1 summary should describe the main areas covered in the week 1 lecture, in particular your summary should cover the following areas:
• Virtualization
• Number Systems
• IP Addressing
The summary you produce must be entirely your own work and written using your own sentence structure. This will ensure your work meets all plagiarism guidelines. Summarizing the ideas presented in the lecture material into your own language should help you to consolidate deeper understanding of the material.
Topic 1 questions
T1.1 The VirtualBox Interface has two panes, the Right Hand pane contains a list of the Virtual Machine’s generic (old) hardware.
Describe how this helps solve many driver issues with Guest Operating Systems running on new hardware.
T1.2 Using the Windows Calc program complete the following table.
Number of balls
(Decimal) Equivalent quantity
(Binary – 8 bit) Equivalent quantity
(Hexadecimal) Equivalent quantity
(Octal)
37
76
1011 1011
672
0xC7
240
255
Note – In the theory test or exam you will be required to complete such conversions by hand (without the use of a calculator). To test your skills at converting between number systems by hand, try doing some conversions for some of the lines of equivalent values in the above table.
T1.3 Show the workings of how to convert the decimal number 1177 to binary, octal and hexadecimal by hand.
T1.4 Determine the largest 4 digit number of each of the following number systems along with the decimal equivalent of each four digit number:
• Octal number
• Binary number
• Hexadecimal number
T1.5 Describe why there are less class B IPv4 networks than class C IPv4 networks, and also describe why those class C networks have far fewer nodes associated with them than class B networks.
Topic 2 : Configuring IP in Windows & Linux
Topic 2 summary (Maximum length 1 A4 side)
Complete a summary of the week’s lecture material as per the “Topic summary requirements”.
Make sure your summary briefly describes the roles of an IP address, subnet mask, default gateway, DHCP servers and DNS servers.
You should also explain why IPv6 tunnels are required at this point in history and how the two types of IPv6 tunnels differ. – Note: The answer has nothing to do with the relative numbers of IP addresses available in IPv4 compared with IPv6.
You should describe the infrastructure and operation of the world’s IPv4 DNS infrastructure highlighting why it is critical to the operation of the Internet.
Briefly explain the function of Network Address Translation as used in consumer home networks.
Topic 2 questions
T2.1 It is possible to access remote web sites without using a DNS server, however the involvement of a DNS server makes the process far simpler for computer users.
Fully explain the role of a DNS server and hence comment on the above statement.
T2.2 Convert the following IPv4 address/subnet mask pairs to their equivalent CIDR notation.
Also determine the IP network address of each IP addresses listed below:
• 141.132.196.31 255.255.0.0
• 192.168.235.63 255.255.255.0
• 192.168.235.17 255.255.192.0
• 192.168.235.19 255.255.248.0
T2.3 Convert the first 4 hexadecimal characters of the following IPv6 address categories into their binary equivalent:
• teredo IPv6 address
• 6to4 IPv6 address
• Link local address
T2.4 Describe how a Network Card determines if two computers are on the same IP network or are on different IP networks.
T2.5 If a network card determines that two machines are on different IP networks. Explain what the network card does with network packets destined for the other machine?
T2.6 What command is used to establish if two machines can communicate with one another? (assume firewalls are not an issue)
T2.7 List the function of each of the following Linux commands:
• ifconfig
• route
• cat /etc/resolv.conf
Topic 3 : Introducing Linux
Topic 3 summary (Maximum length 1 A4 side)
Complete a summary of the week’s lecture material as per the “Topic summary requirements”.
Topic 3 questions
T3.1 The Linux cp command can copy files from anywhere in the Linux file system to anywhere else.
Determine a series of Linux commands that will copy a file named test1.file from /home/ubuntu to the following series of directories:
• /root
• /mnt
• the file system root directory (Note – not /root )
Note – To make sure the commands work try them out on a Linux system while logged in as the root user.
T3.2 Determine a series of chmod commands that will change the permissions of the file /home/ubuntu/test2 from initial permissions of rwxr-xr-x to the following:
(Note – Use octal notation)
• rwxr-xrwx
• rw-r-xrwx
• r-xrwx-wx
(Now repeat the exercise using symbolic notation)
Try both sets of command on a Linux system to determine everything works as expected.
T3.3 Create your own 6 line summary for each of the following commands. Your four 6 line summaries should give sufficient detail for you or another person to use that command along with at least 1 of its options.
• ls
• pwd
• mv
• rm
Topic 4 : File Systems
Topic 4 summary (Maximum length 1 A4 side)
Complete a summary of the week’s lecture material as per the “Topic summary requirements”.
Topic 4 questions
T4.1 Create a description of the mount command. Your description should describe what the mount command does, then describe each part of the mount command and its part in providing the mount command the information it requires to mount a file system.
T4.2 Describe the differences between Absolute and Relative addresses as used in Linux.
Give at least 5 examples of each type.
T4.3 Create a one (1) A4 page description of how wildcards ( *,? ) regular expressions ( [] ) and the . and .. notations can be used in file system references on a Linux machine. Your description should include many examples.
Topic 5 : Linux Internals
Topic 5 summary (Maximum length 1 A4 side)
Complete a summary of the week’s lecture material as per the “Topic summary requirements”.
Topic 5 questions
T5.1 The Linux command ifconfig | grep eth0 –A 1 | grep Mask | awk –F " " '{print $2}' can be broken down into the following 4 parts:
• ifconfig
• ifconfig | grep eth0 –A 1
• ifconfig | grep eth0 –A 1 | grep Mask
• ifconfig | grep eth0 –A 1 | grep Mask | awk –F " " '{print $2}'
You should progressively try out each part of command on a Linux system to determine exactly how the command works and determine its output.
Then you are required to describe how each of the 4 parts of the command works.
T5.2 Describe how the following command works on a Linux system.
ps – A | grep gnome
T5.3 When the following three commands are run in turn, the permissions on file1 change after each command. Fully explain the effect of each command to make it clear how the three commands affect the permissions of file1.
touch file1 | chmod 5555 file1
chmod u-x,o-x file1
chmod u-s,g+s file1
Assessment Criteria
Marks will be allocated as follows:
1. Topic summaries (50% of marks)
2. Topic questions (50% of marks)
Suggestion for your consideration
Summaries can play a significant role to help some people understand conceptual material. If you feel you are one of those people you may find it beneficial to create your own summary of topics 6 – 10 as part of your study regime for the end of semester examination.
You may also find using summaries beneficial in other courses.