University Assignment: Computer Networks and Cybersecurity - ENGR8762

Verified

Added on  2023/06/04

|5
|1046
|329
Homework Assignment
AI Summary
Document Page
Running head: COMPUTER NETWORKS AND CYBERSECURITY
Computer Networks and Cybersecurity
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
COMPUTER NETWORKS AND CYBERSECURITY
Answer to question 2:
For the 0 bit insertion after the detection of the 5 consecutive 1s an extra 0 bit is inserted with
the stream of data and it is given below:
Answer to question 3:
Reliability is needed for the management of the flow and if there is no reliability
packet may get lost in the network and it requires retransmission. The application running on
the network can tolerate delay upto a certain level and after that it can cause a delay in the
network. The jitter in the network causes delay and the jitter in the network can cause
variation of the data packet and there are different application that have the requirement of
bandwidth to reach the destination. This are related with the quality of service because it have
a negative impact on the transmission of data packet in the network.
Answer to question 4:
a. Bridge is used for connecting a smaller segment of network and form a large network
and it relays the frame from different LAN. The switch is used for connecting more
segment of network. Switches have buffer while bridge does not have buffer. Error
checking is performed by the switch while the bridge does not have this functionality.
b. Switches are generally preferred than the bridges except for the smaller network since
it have error checking functionality and buffers are used for connecting each link and
the buffer stores the packet for performing a check on the outgoing link. There are
two strategies that are used for storing and forwarding the data packets.
Document Page
2
COMPUTER NETWORKS AND CYBERSECURITY
c. The operation of router is different from the switches because the router operates in
the network layer while the switch operates in the data link layer. It have the
functionality to direct the data to the destination address but the switch allows
multiple devices and management of the security of VLAN.
Answer to question 5:
The singe bit error can occur during the parallel transmission where data bits are sent using
separate transmission wires and here there is least possibility of occurrence of error. In case
of burst error 2 or greater than 2 bits for the data unit are changed from 0 – 1. It is not
necessary that only there is a change in the consecutive bits the burst length error is measured
from the 1st changed to the last changed bits.
a.
Time period 0.1 ms = 1/10000
= 0.0001 sec
A time period of 0.1ms is the same as 1/10000, 0.0001 of a second.
For the transmission of data at 100 Mbps
0.1 ms 10000 bits would be transmitted and thus the burst would be affected.
b. If there is single bit of error the use of the parity bit would resolve the error.
Answer to question 6:
The TCP protocol works with the IP and it is used for providing connection oriented services
for transferring end to end data and guarantee the successful delivery of data packet with the
application of congestion avoidance and flow control. It offers a reliable service.
The UDP protocol operates in the upper layer and is used for sending data packet using a
connection less service. In this protocol there is no recovery, flow control and error detection
mechanism and have faster transmission.
Document Page
3
COMPUTER NETWORKS AND CYBERSECURITY
Answer to question 7:
a. Network address = 192.168.3.192
b. Network broadcast address = 192.168.3.223
c. For the calculation of the number of host the formula 2^n - 2 is used where n is the
number of bits available. For this case n =5 i.e. 2^5 – 2 = 30 hosts are available
Answer to question 8:
a. 2001:eb8:0:1470::200
b. f380::123:4567:89ab:caef
Answer to question 9:
a. For forwarding the decision the router needs to take decision depending on the
information that is available to the router. The other routers in the network does not
contact with the router and the current router takes the decision for forwarding the
data packet. When the data packet is transmitted in the network it is forwarded via the
directly connected interface and the destination address to another router.
b. The distance vector routing works with the router that announces the information of
the directly connected link and shares its routing table with the direct links. The own
routing table is calculated by the neighbour for receiving the data and repeating the
same process. In case of distance vector routing the entire routing table is shared with
the routers without sending the periodical updates.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
COMPUTER NETWORKS AND CYBERSECURITY
Bibliography
Anjum, B. and Perros, H., 2015. Bandwidth estimation for video streaming under percentile
delay, jitter, and packet loss rate constraints using traces. Computer Communications, 57,
pp.73-84.
Frnda, J., Voznak, M. and Sevcik, L., 2016. Impact of packet loss and delay variation on the
quality of real-time video streaming. Telecommunication Systems, 62(2), pp.265-275.
Li, S. and Da Xu, L., 2017. Securing the internet of things. Syngress.
Morgan, S., 2016. One million cybersecurity job openings in 2016. Forbes, January, 2.
Nagurney, A. and Shukla, S., 2017. Multifirm models of cybersecurity investment
competition vs. cooperation and network vulnerability. European Journal of Operational
Research, 260(2), pp.588-600.
Veksler, V.D., Buchler, N., Hoffman, B.E., Cassenti, D.N., Sample, C. and Sugrim, S., 2018.
Simulations in Cybersecurity: A Review of Cognitive Modeling of Network Attackers,
Defenders, and Users. Frontiers in psychology, 9, p.691.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]