Important network security services, Computer Network Security

Assignment Help:

Question:

(a) Consider that you enter the given URL in the address bar of a popular web client and that both the client and server accepts HTTP version 1.1.

i. What can be the initial request made by the client?

ii. Illustrate how HTTP version 1.1 allows 'surfing' experience to be greatly improved.

iii. Give a sample HTTP request message with at least four main header lines that is sent by the web client.

iv. Assume that the web resource is actually found on the server, give at least 3 header lines that you could expect in the sample response HTTP message.

(b) Authentication and Integrity are two important network security services.

i. Describe what you understand by authentication.

ii. Explain one mechanism that you could use to ensure data integrity alone during transmission.

(c) FTP is a popular protocol used to transfer files from one host to another.

i. Describe briefly how it works.
ii. Give three advantages that it has over HTTP for files transfer.

(d) In respect of the ISO/OSI Reference model,

i. Explain important functions handled by Layer 6.
ii. Describe advantage of the layered approach used by such a model.
iii. Illustrate disadvantages of having too many layers in a communication model.


Related Discussions:- Important network security services

Security policies, implementing password policy in organisation

implementing password policy in organisation

Mobile wireless networks , Is standard TCP effective in mobile wireless net...

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

Log file monitors-information security, LOG FILE MONITORS Log file monit...

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

#title.TIPS., 1. For this project, assume that an organization has five ser...

1. For this project, assume that an organization has five servers. Server 1 has a TCO of $25,000, Servers 2 and 3 have a TCO of $37,000 each, and the remaining two servers— Servers

Explain about structure of management information, Question 1 a) What is a...

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

Incident response, Incident Response: Complete the following sections as id...

Incident Response: Complete the following sections as identified from your Incident Response template (in MS Word format): Update the table of contents (autogenerated) Separate

Digital certificates, A Certificate presents an organization in an official...

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

Ring topology, RING topology all computers are connected in loop. A ring ...

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

Address resolution techniques, Address resolution algorithms may be grouped...

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

What do you meant by network address translation, Problem: (a) What do ...

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd