What is the application layer protocol involved

Assignment Help Computer Network Security
Reference no: EM13713218

Question 1

Router X running RIP has the following routing table:

Destination

Cost

Next Router

Net1

5

A

Net2

3

B

Net3

4

C

Net4

2

D

a) Assuming no other route update message has been received, show the updated routing table after router X has received the RIP message shown below from router C after 200s:

(Net1, 2), (Net2, 2), (Net3, 2), (Net4, 1).

b) Router X does not receive any update for another 90s.  How many periodic, expiration and garbage collection timersare now running in router X?

Question 2

An organisation has been granted a block of addresses starting with the address 172.154.60.0/22.

a) Create 3 subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 10 addresses. (0.5 marks for each correct answer)

b) How many addresses are left?

Question 3

Consider the following TCP header dump:

04210019 000007D0 00000641 50020800 00000000

a) What is the source port number?  

b) What is the destination port number?  

c) What is the sequence number?  

d) What is the acknowledgement number?  

e) What is the length of the header?  

f) What is the type of the segment?  

g) What is the window size?  

Question 4

Using Wireshark tool capture the packets at the same time that you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet. It is recommended that you undertake the packet capture exercises using Wireshark that are scheduled for Weeks 8-9 before you attempt this question. You may not be able to complete this task in any CQUniversity lab.

a) Submit the captured pcap file.  You should filter the file so that only TCP traffic is included.

b) What is the server IP address?

c) What is the application layer protocol involved?

d) What is the client port number for data download?

e) What is the server port number for data download?

f) How many data bytes have been downloaded?

g) What is the size of the downloaded Lecture 1 file?

h) Discuss the difference in your answers to parts f) and g).  You need to consider the packet formats in your discussion.

Question 5

Investigate the emergingwireless broadband services available in Australia and compile a brief report of around 1400 words.  Your references may come from websites, white papers, government documents or published conference or journal papers. Your report should include brief descriptions of underlying technologies and protocols, bandwidth and QoS issues, recommended usages and the geographical areas covered as well as any other relevant information on such networks. Please ensure that you understand the term wireless broadband first before you undertake your literature research.

Your report should include only the body (about 1200 words), conclusion (about 200 words) and the reference list (Do not include the executive summary, table of contents and introduction). Use the sub-headings given in the template and include in-text references in the body of the report. Use Harvard style of referencing for the list of references and in-text references.

Marks allocation:

Body:

1. Underlying technologies and protocols.

2. Bandwidth and QoS.

3. Usages.

4. Geographical areas covered.

5. Any other relevant information.

Conclusion:

A well written coherent conclusion

References:

Adhered to Harvard reference style

Question 6

Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable provide your answers in fully expanded hexadecimal colon notation.

a) What is the full (expanded) address of the abbreviated IPv6 address FDEC::CF:0:FFFF?                   

b) What is the type of block of the abbreviated IPv6 address

2001:A100:FC1::A4B8:AE12:3217:FCBA?            

c) What is the type of address of the abbreviated IPv6 address 0::FFFF:194.42.12.7?                     

Question 7

Answer the following questionsin relation to Wi-Fi Direct technology. Your answers should include in-text references and a reference list.

a) Briefly describe its purpose?

b) What is its transmission distance from radio to radio?

c) Which standard coversthis technology?

d) What is the security method used?

e) Discuss if the creation of a Wi-Fi Direct multi-hop network is possible or not.

Reference no: EM13713218

Questions Cloud

Success of business intelligencein the company : What Big Data is, and the difference between Online and What are technologies available in Big Data and how to select the right Big Data application for your business, project and desired outcomes.
How much work w is done by the electrostatic force : A point charge with charge q1 is held stationary at the origin. A second point charge with charge q2 moves from the point (x1, 0) to the point (x2, y2). How much work W is done by the electrostatic force on the moving point charge.
What is the potential difference across this coil : A coil has 2.85 Ohm resistance and 127 mH inductance. If the current is 3.1A and is increasing at a rate of 3.5A/s, what is the potential difference across this coil at this moment.
What is the net gravitational force on sphere m2 : Three spheres are placed at the corners of a right triangle as shown below. If m1 = 3.00 kg, m2 =5.00 kg, and m3 = 9.00 kg. What is the net gravitational force on m2.
What is the application layer protocol involved : What is its transmission distance from radio to radio - What is the security method used and discuss if the creation of a Wi-Fi Direct multi-hop network is possible or not.
Calculate vapor flow rate through wall and vapor pressure : An outside wall of a building is constructed of 1/2 inch gypsum sheeting, 8 inches of concrete block (hollow, 3 oval core), and 4 inches of common brick. The inside of the building is maintained at 75F dry-bulb temperature and 65F wet-bulb temperatur..
Calculate the current in the resistor : A 2.00-nF capacitor with an initial charge of 4.97 µC is discharged through a 2.04-k Ω resistor. Calculate the current in the resistor 9.00 µs after the resistor is connected across the terminals of the capacitor.
Manufacturing space with an average floor to ceiling height : A large manufacturing space with an average floor to ceiling height of 30 ft has a floor area of 5000 ft^2. The total infiltration rate for the space is estimated to be 1.5 air changes per hour. The inside design temperature and relative humidity are..
What is the initial velocity of the rock : A rock is thrown vertically up to the air. It reaches a maximum 15 m above the point where it was released. What is the initial velocity.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd