Describe ipsec and how it can be used to create vpns

Assignment Help Computer Engineering
Reference no: EM133544421

Assignment: Computer Science

Question I. Define and contrast the following terms: subnet, prefix, and BGP route?

Question II. Consider a datagram network using 16-bit host addresses. Suppose a router uses longest prefix matching and has the following forwarding table:

Prefix Match

Interface

1

0

11

1

111

2

Otherwise

3

For each of the following 5 host addresses, give the matched interface # using above forwarding table.

11100000

10111111

10110000

10111111

11010000

10111111

01110000

10111111

10000000

10111111

Question III. How big is the MAC address space? The IPv4 address space? The IPv6 address space? Note: The size of an address space is the maximum number of different addresses it can have.

Question IV. In CSMA/CD, after the 5th collision, what is the probability that a node chooses K=4? The result K=4 corresponds to a delay of how many seconds on a 100 Mbps Ethernet?

Question V. List the serious security flaws of Wired Equivalent Privacy (WEP) for 802.11 wireless networks. How are those security flaws addressed by WiFi Protected Access (WPA)?

Question VI. Describe IPsec and how it can be used to create virtual private networks (VPNs).

Question VII. What is the difference between a permanent address and a care-of address? Who assigns a care-of address?

Question VIII. Identify and describe at least three common network vulnerabilities?

Question IX. What is an important difference between a symmetric key system and a public key system?

Question X. True or False, explain why?

i. Ethernet and 802.11 uses the same frame structure.
ii. The addresses in an Ethernet frame header are IP addresses.

Question XI. Complete the Wireshark Lab: SSL. The answers to all the questions in the lab are posted in Canvas. Follow all the steps in the lab and try to answer all the questions. Then check your answers using the solution file provided. There is no need to submit your answers to me for grading. You only need to submit a screenshot to show me that you opened the trace file and did the lab.

Question XII. Conduct a survey on routing protocols, select one protocol and discuss how it works, identify its advantages and disadvantages. The length of your review should be no more than 2 pages in length.

Reference no: EM133544421

Questions Cloud

What difference between physical and logical network diagram : What is the difference between physical and logical network diagrams? What network components would you include in a physical diagram of a Local Area Network?
Does your project involve improving health inequality : What kind of project are you planning to do for your scholarly project? Does your project involve improving health inequality or inequity?
List at least two possible obstacles you might face : List at least two possible obstacles you might face while building or enhancing IT governance, along with ways to remediate them.
Detail the common causes of conflict among nurses : Detail the common causes of conflict among nurses and their patients and families.
Describe ipsec and how it can be used to create vpns : MMIS 653- Describe IPsec and how it can be used to create virtual private networks (VPNs). Identify and describe at least three common network vulnerabilities?
Definition of healthcare quality to the work : Define healthcare quality and apply that definition of healthcare quality to the work of one major quality pioneer falls,
Explain why christianity emphasizes belief over ritual : Explain why Christianity emphasizes belief over ritual. Explain the key characteristics of early Christianity's followers,
Explain why judaism has elements of universalism : Explain why Judaism has elements of universalism, and explain the key themes of the Exodus story central to Judaism.
Provided details about innovative models of care delivery : Provided details about "Innovative Models of Care Delivery", pick one of the models and discuss why the model you selected is important

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is length in the real world

What is length in the real world and How does it generalize to higher dimension? Does the basis in which x is defined matter?

  Describe and explain the types of control procedures that

in this assignment you will apply the knowledge gained about ethics and security to evaluate security risks and control

  What is the S-N ratio at the end of a fifty-meter channel

Answer the following questions: What is the S/N ratio at the end of a 50-meter channel? What s the S/N ratio at the end of a 1-kilometer channel?

  By assessing the itsec tcsec and also other assessment

the normal criteria was instituted to bring together the different safety assessment systems available in the world. by

  Create your mysql database and php scripts

By now you should have created your MySQL database and PHP scripts that can be used to query, insert, and delete data. The objective of Phase 3 is to make it.

  Write the racket function perfect

Write the Racket function PERFECT, which consumes a positive integer n and produces true if and only if n is perfect.

  The pros and cons of using sessions

What are the advantages and disadvantages of using cookies? What are the advantages and disadvantages of using sessions? Is one more secure than the other and why?

  Give an example of a nonporous item and what method you

1.give an example of a nonporous item and what method you would use to process it. where might you expect to find

  Assign the number of lines as class constant variable

Write a program to create the following figure by using of nested for loops. Assign the number of lines as class constant variable in order to change the size.

  Describe the key elements of your chosen e-commerce

Create a Gantt chart for your e-commerce company project. Describe the key elements of your chosen e-commerce company's information systems infrastructure.

  Discuss how understanding and being able to apply a

discuss how understanding and being able to apply a variety of technologies for distance and digital learning will help

  How many bits are needed to digitally record 2 minutes

How many bits are needed to digitally record 2 minutes of your favorite music tune? The sampling rate commonly used for music is 44.1 kHz (i.e. 44100 Hz)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd