What is ntp and what are clock strata

Assignment Help Computer Networking
Reference no: EM13325726

Question 1

On modern networked computers, maintaining the correct time on each machine is important. Computers on a LAN or WAN with di erent times can cause problems. In about a page and in your own words explain why it is important for computers to maintaining the correct time and more importantly explain how do they do it.

In your explanation make certain to include discussions on the following linked topics:

The computer's hardware clock (also called the Real Time Clock or RTC)
 The computer's software clock (also called the kernel or system clock)
 In Linux, how they are syncronised and why do they need to be syncronised? (See Exercise 2.35 from the Study Book)  What is UTC and why is it used? (UTC: Coordinated Universal Time, or Temps Universel Coordonne, and if you want|you can explain what is going on with the acronym!)

What is NTP and what are \clock strata"?

Notes:

a. The topics above are linked to each other and the question, they are not independent of each other. They are provided as a minimal guide only. Do not simply write an unconnected paragraph on each without linking the concepts together.

b. List all resources used in answering this question.

c. Please do not cut and paste slabs of text from a Wikipedia article. The question explicitly says in your own words!

d. Please do not fall into the trap of answering the question by using unexplained technical terms|you must explain all technical terms used especially if they have not been used anywhere else in the course.

Question 2

A user comes to you and explains that she needs some form of encrypted le system to store sensitive information on a Flash drive. The Flash drive will be used to transport the sensitive data between work and home and she is worried about loosing the drive and having the data stolen. Both machines, the one at home and the one at work, use the same Linux OS.

She has the following requirements:

She does not want to encrypt individual les as she has to deal with a large number of les.

She wants it to be as transparent as possible.

She thinks she will only need about 64MB at most.

She wants to also use the ash disk for transporting unencrypted les. Files that can be read on machines apart from her work and home machines.

A 64MB le that contains an encrypted le system, stored on the Flash drive would appear to be ideal|

a. Create a 64MB encrypted le system in a leon a Flash drive so that it can be used with the cryptmount command.

Document and explain in your own words every command you use (plus any command line options) and any con guration les you modify or create. Your descriptions of each operation need to show you understand the purpose of the operation.

Note: If you are uncertain why a particular command or command line option is required|ask! There is at least one step and command line option that you cannot understand from the information in the man page alone! It will require some research!

b. Things you must also address and explain:

how to ensure that the Flash drive has exactly the same mount point each time it is used on di erent machines. If it does not have the same mount point then how do you con gure cryptmount paths? Hint: Experiment with \labelled" le-systems (see the command e2label or dosfslabel) or UUIDs in conjunction with the le /etc/fstab how to manage the le-system encryption keys.

c. Write an instruction sheet for the user so that she can make the modi cations to her home machine so that she can access the le on the  ash drive containing the encrypted le system. Also explain how she would use the lesystem in her day-to-day work.

You may assume that she has root access to be able to con gure her home machine to mount an encrypted le-system.

a. Do not use the tool cryptmount-setup or the tool installed by the package cryptsetup.
b. Manually create les and con guration les.
c. Follow the steps outlined in the cryptmount man page| explaining the purpose of every step!
d. List all resources used in answering the question.
e. Do not explain how you installed the cryptmount package|it should already be installed on the Virtual Debian.

Question 3

You have been asked to install an SVN repository on a server. The SVN will be remotely accessed using the svnserve dmon that is supplied with SVN (please note that this is not the most secure way to access an SVN repository) Install the distributed revision control system subversion from the Debian package of the same name. After installation you will need to con gure subversion to be usable.

Tasks that will need to be done:

a. Install the subversion package.

b.  Write and install an init.d script to automatically start and stop svnserve (the subversion server) at boot/shut-down (in dmon mode| do not use inetd mode, do not use an ssh encrypted tunnel). (Hint: Use the example init script /etc/init.d/skeleton and remember to
explain your changes.)

c.  Create an SVN repository at /usr/local/svn/

d.  Con gure the repository and de ne the repository usernames and passwords.

e.  Implement con guration and runtime options that increase security|explaining why your choices increase security.

f.  Test your con guration, repository and running server by creating a project in the repository. Show that you can check in and check out documents from the repository.

(Note: this is supposed to be a remote repository so all tests must be done via the svn server.)

g.  Document and explain in your own words the steps required to get the subversion system working. Include an explanation of every command you use (plus any command line options) and any les you modify or create. Your descriptions of each operation need to show you understand the purpose of the operation.

Reference no: EM13325726

Questions Cloud

Find the acceleration of the rocket : A 125-kg (including all the contents) rocket has an engine that produces a constant vertical force (the thrust) of 1720 N. Inside this rocket, Find the acceleration of the rocket
Define what is the final temperature of the mixture : If you have 410.0 mL of water at 25.00 °C and add 140.0 mL of water at 95.00 °C, what is the final temperature of the mixture. Use 1.00 g/mL as the density of water.
Calculate the magnitude of the force on the proton : A proton moving with a speed of 4.00 · 105 m/s in the positive y-direction enters a uniform magnetic field of 0.400 T pointing in the positive x-direction
Finance and budgeting within the organization : Ethical considerations related to finance and budgeting within the organization and technological considerations for improving the efficiency or effectiveness of finance and budgeting within the organization
What is ntp and what are clock strata : Write an instruction sheet for the user so that she can make the modi cations to her home machine so that she can access the le on the  ash drive containing the encrypted le system. Also explain how she would use the lesystem in her day-to-day ..
Explain stretched rubber band touch the relaxed rubber : Stretched rubber band Touch the relaxed rubber band briefly to your upper lip. Quickly stretch your rubber band and immediately touch the stretched rubber band to your upper lip again
Obtain the magnitude of the normal force : A small block with mass 0.0525kg slides in a vertical circle of radius 0.0750m on the inside of a circular track. What is the magnitude of the normal force that the track exerts on the block when it is at the top of its path
Explain the reaction is expected to be spontaneous : the reaction: 2C2H6(g) + 7O2(g)-----> 4CO2(g) + 6H2O(g) is exothermic. predict under what conditions of temperature (low, high, all or none) the reaction is expected to be spontaneous

Reviews

Write a Review

Computer Networking Questions & Answers

  Conduct a research on network address translation

Research network address translation (NAT). While conducting your research, consider purpose of NAT, compatibility with IPv6, and functions of automatic IP assignment and automatic name resolution.

  Compute total end-to-end delay to send packet of length l

Assuming that switches user store-and-forward packet switching, what is the total end-to-end delay to send a packet of length L? (Ignore queuing, propagation delay, and processing delay.)

  Implementable wlan design solution for office

Give a most implementable WLAN design solution for office with 20 wireless employees, using WLAN capable laptops to access email, Internet, small accounting applications.

  Search the web for security education and training program

Search the Web for security education and training program in your area. Keep a list and see which category has the most examples. See if you can determine the costs associated with example. Which do you think would be more cost-effective in terms of..

  What are the characteristics of tcp-ip- http protocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols?

  Building a payroll program for a large organization

Application Architecture. You have been tasked with building a payroll program for a large organization with offices spread across the United States.

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Divide network in two vlans for clients and server

In your network, you could use layer 3 switch, divide the network in two VLANs, one for clients, another one for  server and route between them using routing capabilities.

  Compute data transmission rate in bits per second

Assume that airliner carries 10,000 kg of those floppies at speed of 1000 km/h over distance of 5000 km. Compute data transmission rate in bits per second of this system?

  Will the system be based cluster architecture for the server

Is there a need for a network to be built for connecting the servers and users, will data go across the WAN or will it stay local to the LAN?

  Design flowchart and pseudo-code for application

You will design a flowchart and pseudo-code for the application given below. Program will accept user input to store student's first and last name. If name is ZZZ, then the program will end.

  What is meant by a nondeterministic protocol

What is meant by a nondeterministic protocol and what are the various combinations of circuit switched and packet switched networks and connection-oriented and connectionless network applications?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd