This content covers various topics related to computer networks and cybersecurity, including baud, bits/second, reliability, delay, jitter, bandwidth, bridges, switches, routers, error types, TCP, UDP, network addressing, routing protocols, and more. It also includes references for further reading.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Networking1 Computer Networks and Cybersecurity By (Name) Name of the class (course) Professor Name of the school (university) Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Networking2 Q1 a)Baud- number of symbols in a second. If in a second it transmits 1500 symbols, data rate is 1500 baud. b)Bits/second- 4 bits represent 16 levels.1 symbol represent 4 data bits hence, we get 1500*4= 6000bits per second. c)10 Q2 Zero inserted after the consecutive five 1’s.Zero is added and in byte 2 it is added after continuous 5 ones. Not added in byte 3 because no continuous 5 ones but added in byte 4. Byte 1byte 2byte 3byte 4 01110011111101110111111001001101
Networking3 Q3 Reliability- This characteristic is measured by the rate at which failures occur and the time it takes to recover from those failures. The performance of the network to the users should be great without any problem (Marina, Das and Subramanian 2010). Delay- applications can persevere delay at different magnitude. Delayed data is of no use hence for good performance systems should deliver data in a timely manner (Marina, Das and Subramanian 2010). Jitter- It is the variation in delay of packets in the same flow. This can be caused by congestion in the network or improper queuing of packets. The variation of packets should remain constant for better performance (Marina, Das and Subramanian 2010). Bandwidth- Different files need different bandwidths. Some require a lot of speed to refresh, unlike others. Q 4 a)A bridge operates in physical and data link layer while switches operate in data link layer. A bridge has only two ports that connects two LANs and controls the flow of data between them while a switch contains many ports. It understands which machine device is connected to its port by using its IP address (Stallings 2017). b)Switches have many ports like hundreds, unlike bridges which has only sixteen ports. Switches support full duplex communication while bridges support half duplex.
Networking4 Bridges are software based while switches are hardware-based which make filtering decisions with the help of ASICs chip. c)A router can use IP address, unlike a switch which uses MAC address. A router reviews the destination IP address before forwarding a packet (Stallings 2017). Q5 In single bit error, one bit of data is replaced either by 0 or 1 and vice versa while in burst error more than two bits in data unit are changed. The likelihood of single bit error to occur in serial transmission is very low while that of burst error is high. Single bit error happens in parallel transmission because all data bits are transmitted using separate wire medium while burst error the bits need not be consecutively changed (Yan, Şekercioğlu and Narayanan 2010). a)If 0.1 ms is equivalent to 0.0001 of a second and are being transmitted at a rate of 100mbps, within 0.1ms, transmission of 10,000 bits will occur and burst will affect them. b)The use of parity bits is appropriate if only single bit errors are being expected.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Networking5 Q6 a)TCP works above IP and offers a connection reliable oriented service where data is transferred to destination with congestion control and control of flow while UDP provides connectionless unreliable protocol which does not have error detection, and control of flow provided by UDP. It is also a service with great effort (Krutz and Vines 2010). b) i.File transfer- TCP, error detection and correction is required because losing data cannot be allowed. ii.Watching a real stream video- UDP, the delay may be critical and there is not enough time to get retransmission of any errors. iii.Web browsing-TCP, web pages should be uploaded without errors hence error detection and correction are required. iv.A voice over IP (VoIP) telephone conversation- UDP, the timing of telephone conversation requirements for data transfer is strict and if we seek the retransmission of errors, it may lead to delay (Halsall,1996). c)They both provide services to many higher layer protocols which can be combined into one layer of TCP or UDP. They use port numbers which are 16 bit in size. The port numbers then pinpoint a particular higher level
Networking6 protocol for the destination of a certain data stream (Marina, Das and Subramanian 2010). Q7 a)Network address- Since network mask is 255.255.255.224, the address of network is 192.168.3.192 b)Broadcast address- is shown by putting as 1s all the bits belonging to the host portion and therefore it is 192.168.3.223 c)Hosts- formula 2n-2 Hence 25-2=30 (Taneja and Kush 2010) Q8 A double colon can replace any single string of one or more hextets consisting of all 0s. Leading zeros can be omitted. a)2001:EB8:0:1470::200 b)F380::123:4568:89AB:CDAF Q9 a)Forwarding decisions need to be done fast where routers are supposed to make decisions to use the current information. In this stage, other routers are not notified about the forwarding decisions by the current router. Packets then
Networking7 leave the current router and may be passed on to another router or delivered to their destination (Singh, Singh and Singh 2010). b)This protocols work via routers giving information of links which are directly connected and they forward routing tables to neighboring routers. They repeat the process after receiving the information after calculating their own routing tables. The whole routing table information is send whether updated or not (Singh, Singh and Singh 2010).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Networking8 References Halsall, F., 1996.Data communications, computer networks and open systems(Vol. 347). Harlow: Addison-Wesley. Krutz, R.L. and Vines, R.D., 2010.Cloud security: A comprehensive guide to secure cloud computing. New jersey:Wiley Publishing. Marina, M.K., Das, S.R. and Subramanian, A.P., 2010. A topology control approach for utilizing multiple channels in multi-radio wireless mesh networks.Computer networks,54(2), pp.241- 256. Singh, S.K., Singh, M.P. and Singh, D.K., 2010. Routing protocols in wireless sensor networks– A survey.International Journal of Computer Science & Engineering Survey (IJCSES),1(2), pp.63-83. Stallings, W., 2017.Cryptography and network security: principles and practice(p. 743). Upper Saddle River, NJ: Pearson. Taneja, S. and Kush, A., 2010. A survey of routing protocols in mobile ad hoc networks.International Journal of innovation, Management and technology,1(3), p.279. Yan, X., Şekercioğlu, Y.A. and Narayanan, S., 2010. A survey of vertical handover decision algorithms in Fourth Generation heterogeneous wireless networks.Computer networks,54(11), pp.1848-1863.