Briefly describe the five ieee 802.11i phases of operation

Assignment Help Electrical Engineering
Reference no: EM13751023

Question 1: Consider the enhanced protocol of Kerberos. This protocol introduces an additional structure using Ticket Granting Server (TGS) to perform identity verification in addition to Authentication server.

(a) Discuss the advantages of the new structure as compared with the simple protocol. Explain how the TGS helps in the process.

(b) The enhanced protocol uses two tickets, Ticket1 and Ticket2. Explain the functions of the two Tickets. Explain how encryption and decryption are carried out on the two Tickets.

(c) There are still some shortcomings in the enhanced protocol, for example, there is still a need for the user to authenticate the servers. Propose how this can be implemented.

Question 2: SSH can be used to secure and protect both Internet and Web traffic through port forwarding techniques such as Local Forwarding and Remote Forwarding. Consider a scenario where you wish to access your company's SharePoint/File Server, located at office, from your home laptop. The Server is located behind the company's firewall and will not accept any incoming connection request from your home computer.

(a) Which port forwarding technique will you use to access your work server from home?

(b) Explain briefly, the steps taken to accomplish this scenario.

(c) In the SSH Transport layer protocol, the Server host key is used during key exchange to authenticate the identity of the host. What are the trust models for a client to have prior knowledge of the server's public host key? State the advantages or disadvantages of each trust model.

Question 3:

(a) The key management phase of the IEEE802.11i RSN involves the generation of cryptographic keys for the use of AP and the STA. By applying the IEEE802.1X standard, show how these keys are generated.

(b) Briefly describe the five IEEE 802.11i phases of operation

Question 4: Alice sends to Bob a signed and encrypted PGP email message.

(a) Explain the process to sign and encrypt the message.(8 marks)

(b) Illustrate the detailed format of the transmitted PGP message with a description of its comprising components. Also, show clearly the parts of the message that are encrypted, compressed and encoded.

Question 5: In IPSEC, ESP provides confidentiality, data origin authentication, connectionless integrity, anti-replay service and limited traffic flow confidentiality.

(a) Explain traffic flow confidentiality and what it protects against.

(b) Explain how the anti-replay service is implemented in IPSEC

(c) In IPSEC, why is there a need to combine security associations? Examine the basic approaches to combine security associations into bundles? Illustrate your answers with the aid of diagrams.

Reference no: EM13751023

Questions Cloud

Write essay on the secession crisis and the jim crow world : Write an essay on the following topics- Antebellum White Society, The Secession Crisis, Free Labor and Violence in Reconstruction and The Jim Crow World.
Explain the retirement plans : Use the following hypothetical questions/situations to explain the retirement plans in further detail.
Traditional and nontraditional project teams : Write a journal entry that explores the topics or assignments covered in this module. Traditional and nontraditional project teams
Decisions about capital budgeting : Prepare a 1-3 page paper on the role of the financial manager in making decisions about Capital Budgeting, Capital Structure and Working Capital Management. Explain and discuss the importance of each of those topics (CO 1)
Briefly describe the five ieee 802.11i phases of operation : The key management phase of the IEEE802.11i RSN involves the generation of cryptographic keys for the use of AP and the STA. By applying the IEEE802.1X standard, show how these keys are generated. Briefly describe the five IEEE 802.11i phases of op..
Design of contemporary organizational forms : What are some of the principle reasons that alternative teams are becoming key elements in the design of contemporary organizational forms
Which strategy is the most relevant : Bardach's book, "A Practical Guide for Policy Analysis," he outlines four strategies for gathering data. What are the four strategies? Write a brief description of each. Which strategy is the most relevant to your work?
Write an essay on american art project : Write an essay on AMERICAN ART PROJECT.
What are the various crisis management software : What are the various crisis management software packages available, features of each, usability and how can they best be implemented

Reviews

Write a Review

Electrical Engineering Questions & Answers

  What is the rms magnitude of the voltage at the source end

A group of small appliances on a 60Hz system requires 20 kVA at 0.85 pf lagging when operated at 125V (rms). The impedance of the feeder supplying the appliances is 0.01 + j0.08 Ohms. The voltage at the load end of the feeder is 125V (rms).

  Estimate aproximate area of effective aperture of consumer

The onboard antenna has EIRP=60dB. Estimate aproximate area of effective aperture of the consumer receiving ground dish antenna without taking into account additional losses such as polarization loss, atmospheric absorptions.

  Calculate and plot the required current and current

Calculate and plot the required current and the resulting voltage Va that should be applied to the armature terminals of the machine. As intermediate steps, calculate and plot Ea, the required electromagnetic torque Tem from the motor, and the cur..

  Create looping structure pseudocode that prompts the user

Create looping structure pseudocode that prompts the user for employee data; the application continues to accept data for new employees until the user enters 0 for an ID number to indicate the desire to quit.

  How much energy does the battery deliver in 80h interval

The manufacturer of a 9V dry-cell flash light battery says that the battery will deliver 20mA for 80 continuous hours. During that time the voltage will drop from 9V to 6V.Assuming the drop in voltage is linear with time.

  Determine the laplace transform ys of the step response

consider a continuos LTI system with step response given by ys(t) = tu(t) - (t - 2)u(t - 2). A. Determine the laplace transform X(s) of the input signal x(t) = u(t). B. Determine the Laplace transform Ys(s) of the step response.

  Show the relative uncertainty in volumetric flowrate

Water is flowing out of a tube at a near constant volumetric flowrate, V .If a graduated cylinder is used to collect a certain volume, v , of the water, and a timer is used to measure the time, t, required to collect the volume of water, the volum..

  Design a collision free circuit for a router

A network router connects multiple computers together and allows them to send messages to each other. If two or more computers send messages simultaniously, they collide and the messages must be resent. Design a collision free circuit for a router..

  Write an instruction sequence to subtract the 6-byte number

Write an instruction sequence to subtract the 6-byte number stored at $800-$805 from the 6-byte store a $810-$805, and save the result at $900-$905

  How hot would a conventional pipe have to get to burst

How hot would a conventional pipe have to get to burst and why Does it vary according to what material the pipe is made of Which are the strongest What are weak ones

  Sketch the bode plot of the magnitude of the open loop gain

If this op amp is used in a non-inverting amplifier having a closed loop dc gain of 100, sketch the bode plot of the magnitude of the closed loop gain to scale. Repeat for a closed-loop dc gain of 10.

  Determine the output voltage for op-amp comparator circuit

Determine the output voltage for an op-amp comparator circuit with a non-inverting input reference voltage of + 2 VDC and an inverting input signal of - 1 VDC. The op amp reaches output saturation voltages of + or -13 V at the limits.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd