What is the application layer protocol involved

Assignment Help Computer Network Security
Reference no: EM13713218

Question 1

Router X running RIP has the following routing table:

Destination

Cost

Next Router

Net1

5

A

Net2

3

B

Net3

4

C

Net4

2

D

a) Assuming no other route update message has been received, show the updated routing table after router X has received the RIP message shown below from router C after 200s:

(Net1, 2), (Net2, 2), (Net3, 2), (Net4, 1).

b) Router X does not receive any update for another 90s.  How many periodic, expiration and garbage collection timersare now running in router X?

Question 2

An organisation has been granted a block of addresses starting with the address 172.154.60.0/22.

a) Create 3 subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 10 addresses. (0.5 marks for each correct answer)

b) How many addresses are left?

Question 3

Consider the following TCP header dump:

04210019 000007D0 00000641 50020800 00000000

a) What is the source port number?  

b) What is the destination port number?  

c) What is the sequence number?  

d) What is the acknowledgement number?  

e) What is the length of the header?  

f) What is the type of the segment?  

g) What is the window size?  

Question 4

Using Wireshark tool capture the packets at the same time that you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet. It is recommended that you undertake the packet capture exercises using Wireshark that are scheduled for Weeks 8-9 before you attempt this question. You may not be able to complete this task in any CQUniversity lab.

a) Submit the captured pcap file.  You should filter the file so that only TCP traffic is included.

b) What is the server IP address?

c) What is the application layer protocol involved?

d) What is the client port number for data download?

e) What is the server port number for data download?

f) How many data bytes have been downloaded?

g) What is the size of the downloaded Lecture 1 file?

h) Discuss the difference in your answers to parts f) and g).  You need to consider the packet formats in your discussion.

Question 5

Investigate the emergingwireless broadband services available in Australia and compile a brief report of around 1400 words.  Your references may come from websites, white papers, government documents or published conference or journal papers. Your report should include brief descriptions of underlying technologies and protocols, bandwidth and QoS issues, recommended usages and the geographical areas covered as well as any other relevant information on such networks. Please ensure that you understand the term wireless broadband first before you undertake your literature research.

Your report should include only the body (about 1200 words), conclusion (about 200 words) and the reference list (Do not include the executive summary, table of contents and introduction). Use the sub-headings given in the template and include in-text references in the body of the report. Use Harvard style of referencing for the list of references and in-text references.

Marks allocation:

Body:

1. Underlying technologies and protocols.

2. Bandwidth and QoS.

3. Usages.

4. Geographical areas covered.

5. Any other relevant information.

Conclusion:

A well written coherent conclusion

References:

Adhered to Harvard reference style

Question 6

Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable provide your answers in fully expanded hexadecimal colon notation.

a) What is the full (expanded) address of the abbreviated IPv6 address FDEC::CF:0:FFFF?                   

b) What is the type of block of the abbreviated IPv6 address

2001:A100:FC1::A4B8:AE12:3217:FCBA?            

c) What is the type of address of the abbreviated IPv6 address 0::FFFF:194.42.12.7?                     

Question 7

Answer the following questionsin relation to Wi-Fi Direct technology. Your answers should include in-text references and a reference list.

a) Briefly describe its purpose?

b) What is its transmission distance from radio to radio?

c) Which standard coversthis technology?

d) What is the security method used?

e) Discuss if the creation of a Wi-Fi Direct multi-hop network is possible or not.

Reference no: EM13713218

Questions Cloud

Success of business intelligencein the company : What Big Data is, and the difference between Online and What are technologies available in Big Data and how to select the right Big Data application for your business, project and desired outcomes.
How much work w is done by the electrostatic force : A point charge with charge q1 is held stationary at the origin. A second point charge with charge q2 moves from the point (x1, 0) to the point (x2, y2). How much work W is done by the electrostatic force on the moving point charge.
What is the potential difference across this coil : A coil has 2.85 Ohm resistance and 127 mH inductance. If the current is 3.1A and is increasing at a rate of 3.5A/s, what is the potential difference across this coil at this moment.
What is the net gravitational force on sphere m2 : Three spheres are placed at the corners of a right triangle as shown below. If m1 = 3.00 kg, m2 =5.00 kg, and m3 = 9.00 kg. What is the net gravitational force on m2.
What is the application layer protocol involved : What is its transmission distance from radio to radio - What is the security method used and discuss if the creation of a Wi-Fi Direct multi-hop network is possible or not.
Calculate vapor flow rate through wall and vapor pressure : An outside wall of a building is constructed of 1/2 inch gypsum sheeting, 8 inches of concrete block (hollow, 3 oval core), and 4 inches of common brick. The inside of the building is maintained at 75F dry-bulb temperature and 65F wet-bulb temperatur..
Calculate the current in the resistor : A 2.00-nF capacitor with an initial charge of 4.97 µC is discharged through a 2.04-k Ω resistor. Calculate the current in the resistor 9.00 µs after the resistor is connected across the terminals of the capacitor.
Manufacturing space with an average floor to ceiling height : A large manufacturing space with an average floor to ceiling height of 30 ft has a floor area of 5000 ft^2. The total infiltration rate for the space is estimated to be 1.5 air changes per hour. The inside design temperature and relative humidity are..
What is the initial velocity of the rock : A rock is thrown vertically up to the air. It reaches a maximum 15 m above the point where it was released. What is the initial velocity.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are the benefits or privacy issues

What are cookies and how do they work? What are the benefits/ privacy issues? Short answer (1 -2 paragraphs).

  Etherpad shared document editing system

Etherpad shared document editing system and community version of the Alfresco Enterprise Content Management System

  Prepare a diagram using rationale

Analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recommendations.

  Design the layout of users

The topology diagram for the different servers and locations and trust domains. For example, where is the firewalls, and where are the users located in the topology.

  Report of network security

Report of network security solutions around 3 to 4 pages . Example and reasons for evertything thats needed for the sercurity.

  Does the resulting scheme satisfy perfect secrecy

Consider the one time pad encryption scheme to encrypt a 1-bit message m with a 1-bit key k. Replace the XOR operation with another operation X. For which X(m,k) does the resulting scheme satisfy perfect secrecy?

  Study of asymmetric and symmetric key cryptography

From your study of Asymmetric and symmetric key cryptography, use your own words

  Research paper on the privacy and on financial services

You need to work on the privacy and on financial services. For example Mint, Its an app also online access to keep track of your financial use in a month.

  Effective biometric systems

Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  Secure hash function

Secure hash function (one-way hash function) is not only used in message authentication but in digit signatures

  Why is security primarily a management issue not a

why is security primarily a management issue not a technological issue? also provide some specific bulleted points on

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd