COS20012 Data Communication and Security Assignment

Assignment Help Computer Networking
Reference no: EM132510961

COS20012 Data Communication and Security - Swinburne University of Technology

Section A: Trace Review

Please review the WireShark traces given in the resource folder and answer the following questions.
All answer worth 1 mark unless shown below <marks in brackets>

Problem A.
Use the TCP Trace to answer the following questions.
1. Examine packets 1 & 2, what is the MSS for packet 1, what is the MSS for packet 2, why are they different. <2>
2. What does the ACK field, in message 5, tell the receiver?
3. Which bytes for the HTTP packet 27 are contained in other segments?
4. What object has been requested at packet 4.
5. What is the win value in packet 2 and what does it tell the receiver? <2>
6. Which three packets are used to open the TCP connection?
7. Which four packages close the TCP connection?
8. Does this trace indicate that there is congestion? If so describe how.
9. What browser is being used by the client?
10. What server is delivering the web pages?
11. What does the CName record for pgaead2.googl.com contain Examine packets 5 to 12
12. What is the average RTT - show calculation <2>
13. How many bytes were sent be the server?
14. What is the approximate transmission rate = show calculation <2> Examine packet 38
15. What does the E_tag field tell the receiver?
16. What do the time-out values tell the receiver? <2>

Problem B.
Use the Wi-Fi Trace to answer the following questions.
Examine Packet 1
17. Does this frame come from a host or from an access point? What details in the trace support your answer? <2>
18. There are a lot of beacon frames used. Research what a beacon frame is and describe the expected fields in a Beacon Frame. Connect your answer with packet 571 <4>
Examine Frame 700
19. What Transmissions rates are supported?
20. What encryption protocol is being used?
21. What is the PWR MGT filed used for?
22. What is a cipher suite list?

Problem C

Use the OSPF Trace to answer the following questions.
Examine Frame 19
23. What sub net is being advertised?
24. How many hosts are in this subnet?
25. What is a "stub network"
26. What does the "Metric" tell the receiver of this advertisement?
27. What is an AS?
28. Is this router on the boundary of an AS, provide supporting evidence for your answer?
29. What is the ID of the Router that generated the advertisement? Review frame 24.
30. You will notice that the frame destination is name IPv4mcast_00:00:05. Is this address special? Explain your answer. <2>
31. The packet seems to contain different types of headers. What is the purpose of the first header in the OSPF Section of the packet? <2>
Examine frame 31
32. What is the purpose of the OSPF part?
33. Read the packet, under what circumstances would a router be dead?
34. What is the backup designated router used for?

35. What is the active neighbour field telling a receiver of this packet?
36. Draw a network diagram including nodes and ip addresses and costs where they can be derived from the trace. The drawing should represent the network state just after packet 31 has been sent. <3>

Problem D.
Use the Mal Formed Packet to answer the following questions.
Wireshark has identified a mal formed packet.
37. What is the packet number of the malformed pack?
38. What precisely is wrong with the packet?
39. What is the name given for this type of malware? Some IP fields are associated with "ECN capable transport".
40. What is ECN capable transport? <2> Examine Frame 8
41. What fields does the checksum apply to?
42. How is the checksum calculated? <2>
43. What response will a router have to a checksum error?
44. How is a checksum different from a HASH?

Enhancement Email Encryption

Your task here is to write a guide (no more than 3 pages) for encrypting email.
This guide must be written so a person who is not an ICT expert (my grandfather) could use your guide to send and receive encrypted email.
Encryption is to be achieved during transmission and when the email is stored. Pictures should be included and will not count in the 3 page limit.

Section B Programming

Assignment 2: UDP Pinger

In this programming assignment, you will write a client ping program. Your client will send a simple ping message to a server, receive a corresponding pong message back from the server, and determine the delay between when the client sent the ping message and received the pong message. This delay is called the Round Trip Time (RTT). The functionality provided by the client and server is similar to the functionality provided by standard ping program available in modern operating systems. However, standard ping programs use the Internet Control Message Protocol (ICMP). Here we will create a nonstandard (but simple!) UDP-based ping program.

Your ping program is to send 10 ping messages to the target server over UDP. For each message, your client is to determine and print the RTT when the corresponding pong message is returned. Because UDP is an unreliable protocol, a packet sent by the client or server may be lost. For this reason, the client cannot wait indefinitely for a reply to a ping message. You should have the client wait up to one second for a reply from the server; if no reply is received, the client should assume that the packet was lost and print a message accordingly.

This is a console application. No graphical user interface is required. The ping messages will be sent by the user. The PingClient should ask the user whether they want to send ping to PingServer. The program should be able to send multiple ping messages. The program should generate sequence number for the ping messages. That means as soon as one ping message is sent the user can send another ping message before the arrival of previous pong message.
Both PingClient and PingServer should print the status messages.
A sample sequence of the program from command line may look like (please note the sequence of output will vary depending on the response from server):
• PIngServer
"Server started... waiting for client" "Incoming ping: pong sent" "Incoming ping: pong sent" "Incoming ping: pong sent" "Waiting for client"

• PingClient
"Client started..."
"Do you want to ping the server? (y/n)" ◊ y "pinging server (ping 1)...."
"Do you want to ping the server? (y/n)" ◊ y "RTT for ping 1 <value>"
"pinging server (ping 2)...."
"Do you want to ping the server? (y/n)" ◊ y "pinging server (ping 3)...."
"RTT for ping 2 <value>"
"Do you want to ping the server? (y/n)" ◊ n "Do you want to close the program? (y/n)" ◊ y

Enhancement File Encryption
To enhance your UDP pinger program you can enhance your server side code so that it randomly does not respond (no pong) to some ping messages. The client should be able to detect the failures and print messages accordingly.

Attachment:- Data Communication and Security.rar

Reference no: EM132510961

Questions Cloud

Shape of a protein relate to its function : How does the shape of a protein relate to its function?
What is the relationship between dna-codons : What is the relationship between DNA, codons, and proteins?
Non-exempt employees of employers of certain size : The FLSA provides for pay standards for non-exempt employees of employers of a certain size.
ITC595 Information Security Assignment : ITC595 Information Security Assignment Help and Solution - Charles Sturt University, Australia - Assessment Writing Service
COS20012 Data Communication and Security Assignment : COS20012 Data Communication and Security Assignment Help and Solution, Swinburne University of Technology - Assessment Writing Service
What examples of biotechnology does the article discuss : What examples of biotechnology does the article discuss? Explain.
IRAC Scenario : The government restriction must seek to implement a substantial government interest, it must directly advance that interest
Identify the most appropriate control the researchers : Glucose is the preferred carbon source for Escherichia coli bacteria. Researchers isolated E. coli-M, a strain of E. coli with a single mutation that inactivate
Why might higher oxygen levels have allowed insects : Why might higher oxygen levels have allowed insects to grow larger than they are today?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd