Explain briefly the role of the physical layer, Computer Network Security

Assignment Help:

a) Calculate the CRC for the frame below:

Frame: 1101011011

Generator: 10011

Message after appending 4 zero bits: 11010110110000

b) OSI refers to a system in which any number of standards or protocols may be used to address one or more of the functions with any of the layers of the model.

i. State the three responsibilities of the data link layer.

ii. Layer 4, the transport layer provides an additional connection beneath the session layer. What are the 4 considerations that the transport layer ensures?

iii. Explain briefly the role of the physical layer.

c) In the context of IP addressing:

i. What does the message which has only 1's in the address imply?

ii. Which IP address is used by hosts when they are being booted and not used afterwards?

iii. Specify the range of host addresses in a Class D network.

iv. Give the Class E IP address format.


Related Discussions:- Explain briefly the role of the physical layer

What are the intermediate systems and how they work, Question: a) Expla...

Question: a) Explain what the following intermediate systems are and how they work? i. Repeater ii. Bridge b) A service is formally specified by a set of primitives (op

What do you meant by the term bastion host, Question : (a) What do you...

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Describe how the encapsulated security header protocol, Question: (a) ...

Question: (a) Give 2 benefits of using IPsec. (b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (

encrypt and decryption using rsa with the prime numbers, Problem (1) -...

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

How to create a security policy, Five years ago, Calgary Kids' Cloth Ltd wa...

Five years ago, Calgary Kids' Cloth Ltd was just a small retail store in downtown Calgary. The company started their own factory in SE Calgary to produce outdoor clothes for kids.

Fuckkkkk, Ask question #Minimum.. 100 words accepted#

Ask question #Minimum.. 100 words accepted#

Explain the main stages in the penetration testing process, Question: (...

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

Illustrate the term file carving, QUESTION (a) Illustrate the term fil...

QUESTION (a) Illustrate the term file carving. (b) What are the basic three main techniques for image steganography? (c) Distinguish between vector graphics and raster

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd