Important network security services, Computer Network Security

Assignment Help:

Question:

(a) Consider that you enter the given URL in the address bar of a popular web client and that both the client and server accepts HTTP version 1.1.

i. What can be the initial request made by the client?

ii. Illustrate how HTTP version 1.1 allows 'surfing' experience to be greatly improved.

iii. Give a sample HTTP request message with at least four main header lines that is sent by the web client.

iv. Assume that the web resource is actually found on the server, give at least 3 header lines that you could expect in the sample response HTTP message.

(b) Authentication and Integrity are two important network security services.

i. Describe what you understand by authentication.

ii. Explain one mechanism that you could use to ensure data integrity alone during transmission.

(c) FTP is a popular protocol used to transfer files from one host to another.

i. Describe briefly how it works.
ii. Give three advantages that it has over HTTP for files transfer.

(d) In respect of the ISO/OSI Reference model,

i. Explain important functions handled by Layer 6.
ii. Describe advantage of the layered approach used by such a model.
iii. Illustrate disadvantages of having too many layers in a communication model.


Related Discussions:- Important network security services

Risk identification-information security, Risk Identification Risk manag...

Risk Identification Risk management comprises of identifying, classifying and prioritizing organization’s information assets, threats and vulnerabilities also. Risk Identificati

Tree decomposition, (a) Define what you understand by the following terms ...

(a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of the above, expla

Explain the term quality of service in networks, QUESTION (a) One of th...

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

Mobile wireless networks , Is standard TCP effective in mobile wireless net...

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

Describe the procedure known as byte stuffing, Question: (a) For the b...

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

Designing and coding of job search mechanism, Designing and coding of Job s...

Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

Define bridges, Bridges perform both in the data link layers and physical...

Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the

ISDN, Explain the architecture of ISDN.....?

Explain the architecture of ISDN.....?

Algorithm, algorithm on simple intrest

algorithm on simple intrest

Secure a wireless network, Secure a Wireless Network WIRELES Most onli...

Secure a Wireless Network WIRELES Most online retailers provide some type of privacy statement. Many statements are long, and appear in small print, and many appear to be simi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd