Multiplexing mechanisms, routers, TCP window size, cellular networks and security in computer networks

Verified

Added on  2023/06/11

|4
|792
|163
AI Summary
This article discusses various topics related to computer networks such as multiplexing mechanisms, routers, TCP window size, cellular networks and security. It covers the error control mechanism provided by multiplexing mechanisms in the LCC sublayer, the use of multiple network interface data cards in routers, the mapping of MAC address with internet protocol, allocation of new ports, TCP window size and cellular networks. It also touches on network and access security in computer networks. The bibliography includes sources such as U.S. patents, academic journals and tutorials.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
NETWORK AND SECURITY
Student name
Affiliation
Date

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Topic 4.
Question 5.
The multiplexing mechanisms in the LCC sublayer within a multipoint network provides the error
control mechanism through provision of repetitive requests automatically with the flow control and
management.
Question 7.
To be able to connect to different physical networks, routers are made with several network
interface data cards that help in the reduction of the redundancy in the network and data. In the
event that one NIC is corrupted, the other functions in its place to reduce data redundancy.
Question 19.
During the internet connection, the MAC address is successfully mapped with the internet protocol,
and an entry, that is new, is added to the address resolution protocol. The addition of entries is
dynamic to allow static entries to be added. The MAC address, using a predetermined time, can be
removed from the address resolution protocol using a set time depending on the disconnection
status of the network.
Question 20.
The header of the Ethernet is modified following the addition of a new address on the router to send
the data packets to the new destination.
Topic 6.
Question 5.
Located from 0 to 65535, storing port number destinations are counted and therefore one is added
to the maximum value 65535 to determine the number of bits to be used as storing port destination
number 65536.
Question 8.
A new port is allocated when a new tab is opened on the web browser and a network connection is
attempted each time. Because the data packets are labelled specifically for each port, the data is not
interrupted nor modified.
Question 14.
The handshake process is carried in 3 steps.
The steps are:
The client attempts a connection to the server via the network.
The server acknowledges the connection by giving a feedback.
The client acknowledges the response from the server.
Document Page
Question 15.
The TCP window size field implements the flow control. The client specifies the maximum byte that
can be received without acknowledgment, the receiver meanwhile slows or stops data sending
through delaying the acknowledgement.
Topic 8.
Question 5.
Type 1 virtualization products are found on the firmware while type 2 products are located on the
operating system.
Question 8.
1G cellular networks supported only voice and had a frequency of 30Hz.
2G networks allowed switching between voice and data with the support of voice, data, short
messaging and multimedia messaging.
3G supports high data speeds basing on the CDMA technology.
4G allows very high data transfer speeds and mostly utilizes the LTE technology based on IP.
Question 9.
To distribute the cellular network over a wide geographical area, cells are used.
The mobile switching centre controls and manages the network interfaces and telephone services
allocation to the public.
Base station is the network’s communication point that is fixed.
Question 10.
The mobile switching centre manages and controls the user devices allowing them to shift from one
cell to another. The base station then receives the new traffic after changing from one cell to the
other.
Bibliography
Choyi, V. K., & Vinokurov, D. (2012). U.S. Patent No. 8,191,106. Washington, DC: U.S.
Patent and Trademark Office.
Wang, J. (2009). Computer network security: theory and practice. Springer Publishing
Company, Incorporated.
Satkunanathan, L., Sunkammurali, K., & Watson, E. B. (2012). U.S. Patent No. 8,239,943.
Washington, DC: U.S. Patent and Trademark Office.
Document Page
Han, W., & Lei, C. (2012). A survey on policy languages in network and security
management. Computer Networks, 56(1), 477-489.
Sankaran, C. B. (2009). Network access security in next-generation 3GPP systems: A
tutorial. IEEE Communications Magazine, 47(2), 84-91.
Choi, M. K., Robles, R. J., Hong, C. H., & Kim, T. H. (2008). Wireless network security:
Vulnerabilities, threats and countermeasures. International Journal of Multimedia and
Ubiquitous Engineering, 3(3), 77-86.
Elliot, H. A., & Elliot, D. (2009). U.S. Patent No. 7,593,512. Washington, DC: U.S. Patent
and Trademark Office.
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]