ITECH1102: Analysis of Networking Security Concepts and Protocols

Verified

Added on  2021/05/31

|5
|829
|27
Homework Assignment
AI Summary
This assignment solution addresses various networking security concepts and protocols. It begins by comparing peer-to-peer networks to larger networks, highlighting their administration differences. The solution then dissects the ITECH1102 application client program protocol, detailing its structure, including flags, addresses, control, information, and FCS. It explains how the ping program functions using the TCP/IP protocol to determine network delays and the use of MAC addresses in the data link layer for accurate communication. Furthermore, the assignment includes examples of IP and MAC addresses. It explains the role of DNS servers and the process of resolution, followed by a comparison of half and full duplex communication. The solution also touches upon statistical time division multiplexing and Manchester encoding, explaining how they improve bandwidth utilization and data transmission. Finally, the solution discusses the application of terrestrial microwave links.
Document Page
Networking Security
Student Name
Affiliation
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Topic 3
Question 4
Peer to peer networks is considered more ideal since the with thin network architecture, the
network management duties are supplied between each peer administrator, this is because each
and every peer who is connected to the network can be the server. But for the case of the larger
networks like the campus networks, the administration of the network can never be supplied the
same was the peer network does.
Question 7
The following is the structure of the ITECH1102 which is the new application client program
protocol.
The Flag which delimits the frame at each and both ends.
The address, this identifies the receiver of the frame.
Thee control , this specifies various types of the frame.
The Information. This is the data which is shared to the client by the server.
The FCS this is used to detect errors and the sequence of the frame.
Question 8
This is how the ping program works. The Internet Protocol address is set using the concord to all
the time show the computer. Therefore the ping to the Internet Protocol address set will all the
time ping the computer hence reducing the delay.
Question 9
The ping uses the TCP/IP protocol in its operation and workings.
Topic 5
Question 10
The data link layer will use the MAC address which is similar to the network so that the
destination and the source can accurately and correctly connect for the purpose of
communication.
Question 12
Computer A
Address:
12.12.12.12/3
MAC : aa.aa.aa.aa
Computer B
Address:
12.12.12.12/3
MAC : bb.bb.bb.bb
Document Page
Question 14
i. The interface entry contains the IP address for router which can receive the fastest
data packet.
ii. The next hop contains the most close router which the packet can go over.
iii.
Destination Network Interface Next Hop
141.132.128.0 141.132.128.1 141.132.128.1
141.132.32.0 141.132.32.1 141.132.32.1
141.132.96.0
141.132.64.0
iv.
Destination Network Interface Next Hop
141.132.128.0
141.132.32.0
141.132.96.0 141.132.96.7 141.132.96.7
141.132.64.0 141.132.64.1 141.132.64.1
Question 18
If resolution is not possible then the DNS will request the assistance of the DNS servers which
creates the part of the DNS servers which are in the world wide pyramid. This is because the
solution of the name is needed every time the Internet names are entered in the browsers since
the Internet protocols addresses are all needed for the communication of the network to happen.
Topic 7
Question 3
The half duplex permits the flow of data in all directions, though this is only allowed one flow of
data at ago whereas the full duplex permits the flow of data in all directions at the same time.
Question 4
The statistical time division multiplexing is able to allocate many admission to the devices which
are needed by it. This also helps to reduce the channel bandwidth waste.
Question 5
Document Page
With the Manchester encoding , the components of the direct current signals does not carry any
information. This helps the standards which under normal conditions does not carry power, they
are able to transmit the information.
Question 6
The terrestrial microwave link is utilized for the lengthy haul telecommunications and also the
petite point to point links. The links are used where the coaxial fiber cables cannot be placed
since this is an alternative of the cable. The areas includes the mountain areas.
Bibliography
Choyi, V. K., & Vinokurov, D. (2012). U.S. Patent No. 8,191,106. Washington, DC: U.S. Patent
and Trademark Office.
Choi, M. K., Robles, R. J., Hong, C. H., & Kim, T. H. (2008). Wireless network security:
Vulnerabilities, threats and countermeasures. International Journal of Multimedia and Ubiquitous
Engineering, 3(3), 77-86.
Elliot, H. A., & Elliot, D. (2009). U.S. Patent No. 7,593,512. Washington, DC: U.S. Patent and
Trademark Office.
Han, W., & Lei, C. (2012). A survey on policy languages in network and security
management. Computer Networks, 56(1), 477-489.
Satkunanathan, L., Sunkammurali, K., & Watson, E. B. (2012). U.S. Patent No. 8,239,943.
Washington, DC: U.S. Patent and Trademark Office.
Sankaran, C. B. (2009). Network access security in next-generation 3GPP systems: A
tutorial. IEEE Communications Magazine, 47(2), 84-91.
Wang, J. (2009). Computer network security: theory and practice. Springer Publishing Company,
Incorporated.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]