Q.1.1 Identify a suitable network scenario/ case that can be used to explain and discuss the relationship of concepts in the exhibit. Ensure that you provide details of the following aspects of the scenario: • Description of the scenario; • Why the scenario is considered a network system.
Q.1.2 As part of the requirements analysis, list the requirements for each component or related area presented in the exhibit. Include the following components or network areas: • Network systems and related network protocols; • Network systems and related network traffic; • Network systems and related embedded systems. (15)
Q.1.3 Using Q.1.1 and Q.1.2 above, discuss the relationship between the concepts as presented in the exhibit. In particular, explain the importance of understanding these relationships in network systems design.
Q.1.1 ANSWER
Let us consider the scenario of an academic institution.
In this case, The functional requirements of the network system mainly involves the allowing the user or
students to be able to access the network resources anytime possible, remotely accessing the academic resources
and the computer system to run the experiments. This also include allowing the students to download or upload the
academic resources, checking their examinations transcripts, and also allowing users like Lecturers to upload the assignments.
This scenario is considered a network system because, it will consist a group of computers and devices.
Being connected to the network can communicate. information exchange And equipment Network sharing
"network that has multiple dimensions.
Q.1.2 ANSWER
Requirements analysis consists of identifying, gathering, and understanding system requirements and their characteristics, and developing thresholds for performance to distinguish services (low-, high-performance, specified services etc.) Fundamental to network design.
i. A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design. Examples of standard network protocols are TCP (Transmission Control Protocol), UDP (User Datagram Protocol), IP (Internet Protocol), ARP (Address Resolution Protocol), HTTP (Hypertext Transfer Protocol), FTP (File Transfer Protocol) (Simple Mail Transfer Protocol)etc
ii. Network traffic is the amount of data moving across a computer network at any given time. Network traffic, also called data traffic, is broken down into data packets and sent over a network before being reassembled by the receiving device or computer. Operators often distinguish three broad types of network traffic: Sensitive, Best-Effort, and Undesired.
ii. An embedded system is a microprocessor-based computer hardware system with software that is designed to perform a dedicated function, either as an independent system or as a part of a large system. At the core is an integrated circuit designed to carry out computation for real-time operations.
Complexities range from a single microcontroller to a suite of processors with connected peripherals and networks; from no user interface to complex graphical user interfaces. The complexity of an embedded system varies significantly depending on the task for which it is designed. Embedded Systems can be classified into four types based on the performance and functional requirement.
Q.1.3
i. Embedded Systems Provides resource sharing (sharing of files, applications or hardware, an Internet connection, etc.)
They also provides Communication support (email, live discussions, etc.) Processes Communication (communication between industrial computers)
ii. Protocols and standards make networks work together. Protocols make it possible for the various components of a network to communicate with each other, and standards make it possible for different manufacturers' network components to work together.
iii. Network traffic analysis is an essential way to monitor network availability and activity to identify anomalies, maximize performance, and keep an eye out for attacks.
Comments
Leave a comment