SIT202: Network Security Problem Solving Report - Semester 1

Verified

Added on  2022/10/14

|6
|818
|36
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someoneā€™s learning journey. Share your documents today.
Document Page
Running Head: Internetworking 0
Internetworking
Task
Student name
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network Security 1
Table of Contents
Answer 1......................................................................................................................................................1
1.1............................................................................................................................................................1
1.2............................................................................................................................................................1
1.3............................................................................................................................................................1
1.4............................................................................................................................................................1
Answer 2......................................................................................................................................................1
2.1............................................................................................................................................................1
2.2............................................................................................................................................................2
2.3............................................................................................................................................................2
Answer -3....................................................................................................................................................2
3.1............................................................................................................................................................2
3.2............................................................................................................................................................2
Answer-4.....................................................................................................................................................3
4.1............................................................................................................................................................3
4.2............................................................................................................................................................3
4.3............................................................................................................................................................3
References...................................................................................................................................................4
Document Page
Network Security 2
Answer 1
1.1
Rate of data transfer in a second is known as bit rate. It is based on the medium as well. It is
used for the channel capacity, such as bps, Mbps, and others.
1.2
We can calculate the bit rate using this formula, which is:
signal per level * bandwidth = bit rate
So, according to provides data,
Bitrate = 8*3 = 24
1.3
We can calculate the channel
C = B log2(1+SNR)
SNRdB = 6 dB
Therefore,
SNR= 10 log10(S/R) ļƒ  SNR = 4
C = 3*106 x 1og2(1+4) ā‰ˆ 8 Mbps.
C= 2 Mbps
1.4
A channel is used for transfer the data using a medium. We can provide actual transfer rate of
that medium using data rate. It is a speed of data transfer in a medium between two
workstations (Tanenbaum).
Answer 2.
2.1
Multiplexing: it is a way to combine analog or digital signal into one signal and transfer it over a
shared medium. It is necessary to secure the signal with a high level of frequency and it is also
secure the signal from distortion, attenuation, and noise
Document Page
Network Security 3
When analog or digital signals combined in a single signal and transfer it with a career
frequency then this process is known as multiplexing. It has used to secure the signal from
various transmission impairments, such as attenuation, distortion, and noise (Kenneth C.
Mansfield and Antonakos).
In addition, demultiplexing is reverse process of multiplexing in which combined signals are
separated at the end of workstation.
2.2
1. Packet switching can further be divided into two subcategories ā€“ virtual circuit approach and
the datagram approach.
2. Circuit switching takes places at the physical layer.
3. In packet switching the resources need to be reversed during the setup phases.
2.3
Host A has three options, which are 3,0,1. Therefore, it chose to switch 1 port 1 for outgoing so VCI is b.
after that switch 2 accept it on port 3 as b and transfer that packet from port 2. Therefore, VCI value is e.
now, switch 3 accept it on port 0 and used port 1 for packet transfer. Therefore, VCI at port 1 of switch 3
is h.
Answer -3
3.1
4+1 =5 total length will be 5 bits and only one bit will be add based on the parity in the data word.
Moreover, hamming distance will be 1 and it can correct only 1 bit error from the transfer data .
3.2
Alice and bob communicate with the help of three frames and two routers. They should have specific
link and ip address for the communication. This is the physical links of three frames.
Link-1 has L6 and L2
Link-2 has L4 and L2
Link-3 has L5 and L1
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network Security 4
Router will provide IP address to all the devices at the source and destination (Forouzan).
Answer-4
4.1
Are there packet
collisions
Is carrier sensing
required
Is the number of the
stations fixed
TDMA NO Yes yes
Polling No Yes No
Slotted-ALOHA Yes No Yes
CSMA/CA Yes Yes yes
4.2
These are the wireless technologies in between given choices, which are Bluetooth, 802.11n, ADSL only (
Thakur ).
4.3
True or false
In AMPS, CDMA has been used for
channelization
False
Handoff is used in a cellular system to support
continuous transmission for a mobile station
True
In CDMA-based cellular systems, the
frequency-reuse factor can be 1.
False
CSMA/CD is used for wireless LAN as it can
avoid the hidden node problem (Cowley)
False
Document Page
Network Security 5
References
Thakur , Dinesh. Bluetooth - What is Bluetooth? . 2018. 4 December 2018.
<http://ecomputernotes.com/computernetworkingnotes/communication-networks/bluetooth>.
Cowley, John . Communications and Networking. 2. kingswinford: Springer Science & Business Media,
2012.
Forouzan, A. Behrouz. Data communications & networking . 8th. New Delhi: Tata McGraw-Hill
Education, 2007.
Kenneth C. Mansfield, Jr and James L Antonakos. Computer Networking for LANS to WANS: Hardware,
Software and Security. 1. Bostan: Cengage Learning, 2009.
Tanenbaum, Andrew S. Computer networks. Harlow, Essex: Pearson, 2014.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]