Arrangement of self-learning switches, Computer Network Security

Assignment Help:

QUESTION

a) Consider the speed of propagation of an electrical signal is same to 2x108m/s, evaluate the ratio of the propagation delay to the transmit time for the given types of data link and 1000 bytes of data.

i) 100 m of UTP cable at a transmission rate of 1 Mbps
ii) 2.5 km of coaxial cable and transmission rate of 10 Mbps
iii) A geostationary satellite VSAT link and a transmission of 512 kbps.

b) Consider the arrangement of self-learning switches given in the figure below. Consider all forwarding table are initially empty, provide the forwarding tables for each of the 3 switches after the subsequent consecutive transmissions:

i) Host A to Host F
ii) Host C to Host G
iii) Host E to Host H
iv) Host D to Host E

1982_Consecutive transmission.png

c) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in some protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules. Provide an example of a transmitted byte-stream in hexadecimal by using the subsequent module of data type declarations and its corresponding instances:

name ::= OCTET STRING
number ::= INTEGER
active ::= BOOLEAN
{name, "Stevie G"}
{number, 8}
{active, 1}

d) In relation to network management, explain the following terms:

i) SNMPv1 Trap message
ii) Management Information Base.

e) In respect to wireless network,
i) Give one advantage of using IEEE 802.11a over the other flavours.
ii) Give one advantage of using IEEE 802.11g over the other flavours.
iii) Describe how Frequency Hopping Spread Spectrum works in relation to Bluetooth.
iv) Consider that you have a wireless access point that is using WEP, explain two ways in which you could make your wireless network more secure.


Related Discussions:- Arrangement of self-learning switches

What is the main security vulnerability of ipv4, Question: (a) What is...

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

Function of key secrecy and algorithm secrecy in security, What is the func...

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

CNSS Security model, "Using the CNSS Model, examine each of the cells and w...

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

Packet filtering firewall-stateless packet filtering, Stateless Packet Filt...

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

Cipher methods-cryptography, Cipher Methods There are 2 methods of encry...

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

Network design approach, Problem a) Give three reasons why traditional ...

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Host-based ids, Host-Based IDS A host-based IDS (HIDS) resides on a part...

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Understanding a business model of a spammer, The first and foremost need of...

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

Describe how access control is implemented, Question: (a) How can you ...

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Draw the network layout, Question : a) Below is a capture of an Etherne...

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd