This document covers various topics related to computer networks and cybersecurity, including error detection, reliability, switches, routers, protocols, IPv6, and routing. It also includes a bibliography of relevant sources.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: COMPUTER NETWORKS AND CYBERSECURITY Computer Networks and Cybersecurity Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 COMPUTER NETWORKS AND CYBERSECURITY Answer to question 2: For the 0 bit insertion after the detection of the 5 consecutive 1s an extra 0 bit is inserted with the stream of data and it is given below: Answer to question 3: Reliability is needed for the management of the flow and if there is no reliability packet may get lost in the network and it requires retransmission. The application running on the network can tolerate delay upto a certain level and after that it can cause a delay in the network. The jitter in the network causes delay and the jitter in the network can cause variation of the data packet and there are different application that have the requirement of bandwidth to reach the destination. This are related with the quality of service because it have a negative impact on the transmission of data packet in the network. Answer to question 4: a.Bridge is used for connecting a smaller segment of network and form a large network and it relays the frame from different LAN. The switch is used for connecting more segment of network. Switches have buffer while bridge does not have buffer. Error checking is performed by the switch while the bridge does not have this functionality. b.Switches are generally preferred than the bridges except for the smaller network since it have error checking functionality and buffers are used for connecting each link and the buffer stores the packet for performing a check on the outgoing link. There are two strategies that are used for storing and forwarding the data packets.
2 COMPUTER NETWORKS AND CYBERSECURITY c.The operation of router is different from the switches because the router operates in the network layer while the switch operates in the data link layer. It have the functionality to direct the data to the destination address but the switch allows multiple devices and management of the security of VLAN. Answer to question 5: The singe bit error can occur during the parallel transmission where data bits are sent using separate transmission wires and here there is least possibility of occurrence of error. In case of burst error 2 or greater than 2 bits for the data unit are changed from 0 – 1. It is not necessary that only there is a change in the consecutive bits the burst length error is measured from the 1stchanged to the last changed bits. a. Time period 0.1 ms = 1/10000 = 0.0001 sec A time period of 0.1ms is the same as 1/10000, 0.0001 of a second. For the transmission of data at 100 Mbps 0.1 ms 10000 bits would be transmitted and thus the burst would be affected. b.If there is single bit of error the use of the parity bit would resolve the error. Answer to question 6: The TCP protocol works with the IP and it is used for providing connection oriented services for transferring end to end data and guarantee the successful delivery of data packet with the application of congestion avoidance and flow control. It offers a reliable service. The UDP protocol operates in the upper layer and is used for sending data packet using a connection less service. In this protocol there is no recovery, flow control and error detection mechanism and have faster transmission.
3 COMPUTER NETWORKS AND CYBERSECURITY Answer to question 7: a.Network address = 192.168.3.192 b.Network broadcast address = 192.168.3.223 c.For the calculation of the number of host the formula 2^n- 2 is used where n is the number of bits available. For this case n =5 i.e. 2^5 – 2 = 30 hosts are available Answer to question 8: a.2001:eb8:0:1470::200 b.f380::123:4567:89ab:caef Answer to question 9: a.For forwarding the decision the router needs to take decision depending on the information that is available to the router. The other routers in the network does not contact with the router and the current router takes the decision for forwarding the data packet. When the data packet is transmitted in the network it is forwarded via the directly connected interface and the destination address to another router. b.The distance vector routing works with the router that announces the information of the directly connected link and shares its routing table with the direct links. The own routing table is calculated by the neighbour for receiving the data and repeating the same process. In case of distance vector routing the entire routing table is shared with the routers without sending the periodical updates.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 COMPUTER NETWORKS AND CYBERSECURITY Bibliography Anjum, B. and Perros, H., 2015. Bandwidth estimation for video streaming under percentile delay, jitter, and packet loss rate constraints using traces.Computer Communications,57, pp.73-84. Frnda, J., Voznak, M. and Sevcik, L., 2016. Impact of packet loss and delay variation on the quality of real-time video streaming.Telecommunication Systems,62(2), pp.265-275. Li, S. and Da Xu, L., 2017.Securing the internet of things. Syngress. Morgan, S., 2016. One million cybersecurity job openings in 2016.Forbes, January,2. Nagurney,A.andShukla,S.,2017.Multifirmmodelsofcybersecurityinvestment competition vs. cooperation and network vulnerability.European Journal of Operational Research,260(2), pp.588-600. Veksler, V.D., Buchler, N., Hoffman, B.E., Cassenti, D.N., Sample, C. and Sugrim, S., 2018. Simulations in Cybersecurity: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.Frontiers in psychology,9, p.691.