Important network security services, Computer Network Security

Assignment Help:

Question:

(a) Consider that you enter the given URL in the address bar of a popular web client and that both the client and server accepts HTTP version 1.1.

i. What can be the initial request made by the client?

ii. Illustrate how HTTP version 1.1 allows 'surfing' experience to be greatly improved.

iii. Give a sample HTTP request message with at least four main header lines that is sent by the web client.

iv. Assume that the web resource is actually found on the server, give at least 3 header lines that you could expect in the sample response HTTP message.

(b) Authentication and Integrity are two important network security services.

i. Describe what you understand by authentication.

ii. Explain one mechanism that you could use to ensure data integrity alone during transmission.

(c) FTP is a popular protocol used to transfer files from one host to another.

i. Describe briefly how it works.
ii. Give three advantages that it has over HTTP for files transfer.

(d) In respect of the ISO/OSI Reference model,

i. Explain important functions handled by Layer 6.
ii. Describe advantage of the layered approach used by such a model.
iii. Illustrate disadvantages of having too many layers in a communication model.


Related Discussions:- Important network security services

A small isp requests your help, QUESTION A small ISP requests your help...

QUESTION A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provide

What is network address translation, Question: (a) What is Network Add...

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Lan topologies, Network can be distinguished by shape. According to which t...

Network can be distinguished by shape. According to which there are three most popular methodologies, which are shown as follows; Star Ring Bus

Introduction to planning for security, INTRODUCTION TO PLANNING FOR SECURIT...

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

Security services, (a) Mention the five main security services. (b) What...

(a) Mention the five main security services. (b) What is a passive attack? Give an example of passive attack? (c) What four types of active attacks and mention their respecti

Arrangement of self-learning switches, QUESTION a) Consider the speed ...

QUESTION a) Consider the speed of propagation of an electrical signal is same to 2x10 8 m/s, evaluate the ratio of the propagation delay to the transmit time for the given typ

Function of key secrecy and algorithm secrecy in security, What is the func...

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

Host-based ids, Host-Based IDS A host-based IDS (HIDS) resides on a part...

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Cryptographic hash functions, (a) (i) Bob has public RSA key (n = 77, e...

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

What is an autonomous system, QUESTION 1: a) Differentiate between a r...

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd