What is the ethernet standard used in such a vlan

Assignment Help Computer Networking
Reference no: EM13302486

Q1. Answer the following in relation to medium access control.

a) Explain in detail with the help of diagrams the CSMA/CD media access control technique used in Ethernet.

b) Explain in detail with the help of diagrams the CSMA/CA media access control technique used in IEEE 802.11 wireless LANs.

c) Compare the techniques described in a) and b).

Q2. Following questions relate to WLAN security.

Part-I

Briefly describe the following techniques/standards used for WLAN security.
- MAC address filtering
- SSID hiding
- Wired Equivalent Privacy (WEP)
- Wi-Fi Protected Access (WPA)
- IEEE 802.11i (WPA2)

Part-II

Note: The war-walking activity (part a) can be done together by a group of 2-3 students. Give the full names and student Ids of team members. The report (part b) must be written individually.

a) Use the inSSIDer package installed on your laptop to perform a War-Walking activity at a shopping centre, state the centre. Visit the shopping centre with your laptop sniffing the details of available wireless networks. Record the wireless networks available in three different spots. Include the inSSIDer screenshots. Compile the gathered information in a table, listing the available access points with their technical characteristics like channel number, RSSI, 802.11 standard, security, supported data rate, etc.

b) Write a report on your observations analyzing the data collected in previous step. Your analysis can investigate into following aspects:

i. Channel occupancy - crowded and free channels.

ii. Interference from neighboring access points and its effects.

iii. Dual band WiFi and its advantages.

iv. The security situation of the discovered wireless networks.

v. How easy (or hard) is it to break into those networks.

vi. Any other aspect of your own choice.

Q3. Use Internet resources to search for the information of Australia's Academic and Research Network (AARNet) and answer the following questions:

a. Describe briefly the history and purposes of Australia's Academic and Research Network (AARNet).

b. Tabulate the data speed capacity between Australian capital cities (Adelaide,Canberra, Melbourne, Perth and Sydney). Note that the speed capacity between two points in a serial path is equal to the slowest speed segment. For example, the speed capacity between points A and C in the path from A to B to C will be the slower link between points A to B or points B to C.

c. Tabulate international links and speed capacity from AARNet PoPs to overseas. 

Q4. Consider an example of a multi-switch Virtual Local Area Network (VLAN) presented in the figure below.

889_Purposes of Australias Academic and Research Network.png

a. What is the Ethernet standard used in such a VLAN? List the fields in the VLAN Tag and describe their purpose. Describe in detail the VLAN-tagging system and how it is implemented in Ethernet frames.

b. Give a step by step explanation of the flow of packets when a computer with an IP address 165.40.10.101 (connected to switch 1) sends a packet to a computer with an IP address 165.40.30.11 (connected to switch 3).

Assume that all the devices have just been switched on, all PC were configured with static IP addresses.

Reference no: EM13302486

Questions Cloud

Determine is there a chance that cavitation will occur : Temperature is 20°C. A constriction in the pipeline causes velocity to increase to 13 m/s within the constriction. Assuming that Bernoulli's equation applies (i.e. p + ½ ? v2 = constant), is there a chance that cavitation will occur
Describe the structure of the plasma membrane : How does the term fluid mosaic describe the structure of the plasma membrane?
How much heat must be supplied to the gas : The volume of 9 mol of a monatomic gas is increased from 3 L to 6 L at constant pressure. The initial temperature of the gas is 31?C. How much heat must be supplied to the gas
Describe the digestion and absorption of dietary fat : Beginning with the mouth, describe the digestion and absorption of dietary fat. What is the final fate of fat in the human body?
What is the ethernet standard used in such a vlan : Explain in detail with the help of diagrams the CSMA/CD media access control technique used in Ethernet and write a report on your observations analyzing the data collected in previous step.
State the properties of the image : An object is located 75.0 cm in front of a mirror and on the principle axis. The mirror is concave with a radius of curvature 50.0 cm. State the properties of the image
Write usevehicle class to instantiate one vehicle object : Write a UseVehicle class to instantiate one Vehicle object, one Car object, one MotorCycle object, and display each object’s values.
Estimate orlando cost of equity in thailand : However, Orlando Co. is considering a stock offering in Thailand that is denominated in Thai baht and targeted at Thai investors. Estimate Orlando's cost of equity in Thailand that would result from issuing stock in Thailand.
Find formula for mutual inductance for loop-wire combination : A rectangular loop of N close-packed turns is positioned near a long straight wire, find the formula for the mutual inductance M for the loop-wire combination

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the role of client - server

Identify and describe the processes involved in the Windows Client Server environment - Explain the role of client/server in the networking environment.

  Explain the steps take to stop cybersquatter

You are a owner of the register trademark, and you just found that domain name is being held hostage for large sum of money. In around 300 words, Explain the steps which you would take to stop cybersquatter.

  Disadvantages of building three separate models

Write down the advantages and disadvantages of building these three separate models? What representations are used for each of these models?

  Given that alpha is a primitive root mod p

Given that alpha is a primitive root mod p. Prove prove alpha^x is congruent to alpha^y mod p if and only if x is congruent to y mod p-1

  Write three tcp and udp connections from netstat

Write three TCP and three UDP connections from netstat -a output, and corresponding translated port numbers from netstat -an output.

  Managing intrusion detection environment

As security manager at XYZ Corporation, you are responsible for managing intrusion detection environment. If you were given the ability to build the environment from scratch, would you use network based IDS, host based IDS, or a combination?

  Write a temperature conversion program usin constructor

Write a temperature conversion program. The GUI and event handling setup should be done in the constructor of the class that implements the GUI.

  Basic requirements for data communications and networking

List some of the basic requirements for the data communications and networking required to support the business information needs? Discuss in scholarly detail. Your answer should be of 300 words.

  Document risk event-impact-probability and impact

Identify the top three risks in this situation. For each risk, document its risk event, impact, probability, impact rating/risk exposure, and mitigation strategy.

  Use a straight-through cable to connect to hub

Assuming you use a straight-through (not a crossover) cable, what port on hub A will you use to connect it to hub B?

  Where are wlan technologies going in the future

Where are WLAN technologies going in the future? Research what the next versions of the 802.11 standards are, and provide your educated opinion on how these technologies will be used.

  Tools and processes for scanning vulnerabilities

Write down the tools and processes for scanning and removing possible vulnerabilities?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd