Skip to content

ICTTEN622 Produce ICT network architecture designs

Question 1

Legislation: TELECOMMUNICATIONS INTERCEPTION (AND ACCESS) ACT 1979 is the basic law that governs the framework of ICT network architecture designs. It legalizes exfiltration and provides security intelligence and police access to communications.

Code of practice: it is a set of rules which implies the responsibility and expectations related to the ICT network architecture design (Gupta et. al 2015).

Regulation: the network architecture designs are regulated by the Australian Communications and media authority act 2005.

Standard: ICT has a vital role in attaining interoperability of new emerging technologies.

Workplace procedure: it’s a set of instructions that contains detailed information on how to run a particular program on the computer.

WHS practice: the Health and safety at work etc act 1974 provides the instructions that are to be followed by the employees and taking regular breaks is a safety precaution in it.

Question 2

Access network: it is an end-user network that is connected to the network of a service provider through the router. The most commonly used access network is the Ethernet.

Core network: it is the central element that connects the network that offers services to end user who uses their access network.

Network topologies: it is the logical and physical arrangement of the network devices that are connected. In general, they are of 7 types.

Mobile cellular network: it is a communication network in which to and fro nodes are wireless.

Network protocols and operating systems: it is a set of rules and regulations which contains the format, transmission, and receiving of data from different servers is included. While the operating system is an interface where the software, and hardware work combinedly to run a program.

Optical networks and principles: it’s a method of communication in which light waves contains the information and works as a carrier.

Radiofrequency (RF) technologies and principles: it’s a form of communication by using the wireless electromagnetic signal. Its range varies from 3khz to 300Ghz.

Radiofrequency identification (RFID) hardware and software: it is hardware which having transponders and readers as their components. These also have software elements that provide useful information about the product.

Question 3

Compatibility testing is a process of monitoring and inspecting the development of applications with various browsers. This test had different factors like which operating system the application is going to run, which type of network is being used, which databases are to be used, and lastly the web browsers. Through this process, the behavior of the under-developing application is evaluated in different environments. This helps to ensure compatibility and check whether the requirements are being fulfilled properly or not.

Question 4

Two ways that compatibility issues can be resolved are:

  1. By updating software: Many times compatibility issues arise due to the lower version of any application which restricts some of the newer features in the older one and these types of compatibility issues can be resolved just by updating the software. it also helps to remove the bugs and protect the application from malware attacks.
  2. Patches and service packs: These are used to bring a change in the installed application/software to resolve the issues related to the bugs and security and add new functions.

Patches of Microsoft are known as hotfixes. While the Service pack is the complete package of updates for the OS or installed software(Schindler et. al 2021).

Question 5

Supplier costs for products associated with network architecture design include the following design process: procurement, manufacturing, and finished goods. It involves a structure of the market, estimations, product costs, logistic costs, estimations of overhead quantities, and lastly the cost of sales. This supply chain network design provides a framework for operating the business to make

Question 6

Basically, IP address means Internet Protocol address, it has some rules meant for communication while using the internet or connecting to the server. It is used to identify the device or network on the internet. Its most important function is to maintain the connection with the device that sends the data and receives the information from the internet as searched by the end user. It is unique for every device that is connected to the internet and without this connection, it is not possible to connect with the internet (Clark et. al 2015).

Question 7

Desktop applications are software programs that run on a particular operating system to perform an assigned task by an end-user. These can be downloaded and installed from the internet. they are developed to run without being connected to any other network thus, they possess lesser security concerns (Akinola et. al 2021).

Examples: MS Word, WPS, scanner, paint, etc.

Question 8

The operating system is a type of software that makes it possible to run the computer using hardware, and software combinedly. it works as an interference between the computer hardware and programs. It is now found in almost every computer-based device from mobile phones to super computers.

Example: Microsoft windows, apple iOS, Linux OS.

Question 9

Two types of security protocols are:

i). Authentication Header: it is basically for data integrity and authenticity. it provides no confidentiality. AH provides us with the facility that our data will not tamper with while reaching the destination.

  1. ii) Encapsulation Security Protocol (ESP): it provides integrity, confidentiality, authenticity, and replay resistance. It uses algorithms that are used for encryptions. this minimizes the processing cost and also minimizes the vulnerability to getting attacked(Hassan et. al 2014).

Question 10

Encryption is a process that helps to protect our personal data and it is maintained by the regulator. it is used in almost all digital transactions. it converts large files into cryptic documents which can be deciphered by the authorized person only.

It is of two types:

  1. Symmetric encryption: it uses a single mode of the symmetric key scheme to encrypt and decrypt data. It is highly secured and uses less number of resources. It is useful when the speed of the process is need to be fast.
  2. Asymmetric encryption: uses two modes of separate keys and of these two keys one is for the public ( for everyone) and another is kept private(for authorized) person.


Akinola, O. A., Olopade, S. O., & Afolabi, A. S. (2021). Development of mobile and desktop applications for a fingerprint-based attendance management system. Indones. J. Electr. Eng. Comput. Sci, 24(1), 570-580.

Clark, A., Sun, K., Bushnell, L., & Poovendran, R. (2015, November). A game-theoretic approach to IP address randomization in decoy-based cyber defense. In International conference on decision and game theory for security (pp. 3-21). Springer, Cham.

Gupta, A., & Jha, R. K. (2015). A survey of 5G network: Architecture and emerging technologies. IEEE access, 3, 1206-1232.

Hassan, R., Ahmed, A. S., Othman, N. E., & Sami, S. (2014). Enhanced encapsulated security payload a new mechanism to secure internet protocol version 6 over internet protocol version 4. Journal of Computer Science10(7), 1344.

Schindler, C., Luhana, K. K., & Slany, W. (2021). Towards continuous deployment of a multilingual mobile app. International Journal9(7).

Leave a Reply

Your email address will not be published. Required fields are marked *