Network and Security Assignment: Detailed Solutions Provided

Verified

Added on  2021/06/17

|5
|891
|26
Homework Assignment
AI Summary
This document provides solutions to various questions related to network and security concepts. The assignment covers topics such as the Logical Link Control (LCC) sublayer and its role in flow management and error control within multipoint networks. It explores the necessity of multiple network interface cards (NICs) in routers for network connectivity and redundancy. Furthermore, the document addresses the Address Resolution Protocol (ARP), detailing how MAC addresses are added and removed. It also discusses modifications to Ethernet headers, TCP port numbers, and flow control mechanisms. Additional topics include virtualization types (Type 1 and Type 2), and the evolution of mobile network generations (1G to 4G), including the roles of mobile switching centers and base stations. The document concludes with a bibliography of relevant research papers and patents.
Document Page
NETWORK AND SECURITY
Student name
Affiliation
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Topic 4
Question 5
The LCC sublayer provide the flow management and control, and also the provision of
automatic repeat request which is an error controlling mechanisms which is within the multipoint
network. This are some of the provisions of the multiplexing mechanism therefore the main
reason as to why the LCC is said to be providing the mechanisms.
Question 7
The routers are made up of multiple network interface cards, this is simply because of the
main two reasons. Routers are needed to connect to more than one physical network , for this to
be more viable, the network interface card needed must be more than one so that this can be
facilitated perfectly. Again, there is problems of redundancy in the network, for the routers to
operate well, they need more than one network interface card to reduce redundancy in any case
one NIC card has spoilt, another network card can be used for the same purpose.
Question 19
A new entry for the MAC address is added to the Address Resolution Protocol when the
Internet protocol is mapped to the MAC address successfully. Under normal circumstances, the
entries are always added to the Address Resolution Protocol dynamically. This also allows the
addition of the static entries.
The MAC address can be removed from the address resolution protocol just after the
timeout which was pre determined is over. This can be any time which is set out or after the
disconnection of the network.
Question 20
The modification on the Ethernet header happens to the router in order to accommodate
the newly added address in the destination part.
Document Page
Topic 6
Question 5
The number of bits is which are used storing port number destination are 65536. There
are located from value zero to 65535, therefore counting the number of bits starting from zero it
adds one to the 65535 hence becomes 65536.
Question 8
Each and every connection which are made by opening a new tab in a browser is
allocated a new port on the same computer in a network. Therefore the packet requests does not
mess up since the packets are labelled with the port it will go to.
Question 14
In the first step, the client initiates the connection to the server. Then the server responds
to the connection. Then lastly the clients will acknowledge the response of the server.
Question 15
Flow control is implemented by the TCP window size field. The maximum byte number
as sender receives without acknowledgement is specified, then the receiver can stop or slow the
sending of data from the sender by delaying acknowledgement.
Topic 8
Question 5
Type 1 virtualization , are the virtualization products which operates right on the
firmware whereas the type 2 are products which operates right on the operating system.
Document Page
Question 8
1G only supported voice, with frequency of 30HZ, and having the circuit switching. 2G
supported voice, SMS, MMS, internet access. The circuit switching was for voice and packet for
data. 3G started the high data speed , they were grounded on technologies of CDMA. 4G
comprises of very high rates of data, with LTE being the main technology based on IP
Question 9
The cell is used in the distribution of the network over the land
Mobile switching centre it controls the interface with network and the telephone network
of the public
Base station is used as a fixed communication point on a network for the user mobile
phone.
Question 10
The Mobile switching centre controls and manages the changing of mobile phones from
cell to cell. The base station is where the new traffic of network will be directed after the
transition.
Bibliography
Choyi, V. K., & Vinokurov, D. (2012). U.S. Patent No. 8,191,106. Washington, DC: U.S. Patent
and Trademark Office.
Wang, J. (2009). Computer network security: theory and practice. Springer Publishing Company,
Incorporated.
Satkunanathan, L., Sunkammurali, K., & Watson, E. B. (2012). U.S. Patent No. 8,239,943.
Washington, DC: U.S. Patent and Trademark Office.
Han, W., & Lei, C. (2012). A survey on policy languages in network and security
management. Computer Networks, 56(1), 477-489.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Sankaran, C. B. (2009). Network access security in next-generation 3GPP systems: A
tutorial. IEEE Communications Magazine, 47(2), 84-91.
Choi, M. K., Robles, R. J., Hong, C. H., & Kim, T. H. (2008). Wireless network security:
Vulnerabilities, threats and countermeasures. International Journal of Multimedia and Ubiquitous
Engineering, 3(3), 77-86.
Elliot, H. A., & Elliot, D. (2009). U.S. Patent No. 7,593,512. Washington, DC: U.S. Patent and
Trademark Office.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]