Arrangement of self-learning switches, Computer Network Security

Assignment Help:

QUESTION

a) Consider the speed of propagation of an electrical signal is same to 2x108m/s, evaluate the ratio of the propagation delay to the transmit time for the given types of data link and 1000 bytes of data.

i) 100 m of UTP cable at a transmission rate of 1 Mbps
ii) 2.5 km of coaxial cable and transmission rate of 10 Mbps
iii) A geostationary satellite VSAT link and a transmission of 512 kbps.

b) Consider the arrangement of self-learning switches given in the figure below. Consider all forwarding table are initially empty, provide the forwarding tables for each of the 3 switches after the subsequent consecutive transmissions:

i) Host A to Host F
ii) Host C to Host G
iii) Host E to Host H
iv) Host D to Host E

1982_Consecutive transmission.png

c) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in some protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules. Provide an example of a transmitted byte-stream in hexadecimal by using the subsequent module of data type declarations and its corresponding instances:

name ::= OCTET STRING
number ::= INTEGER
active ::= BOOLEAN
{name, "Stevie G"}
{number, 8}
{active, 1}

d) In relation to network management, explain the following terms:

i) SNMPv1 Trap message
ii) Management Information Base.

e) In respect to wireless network,
i) Give one advantage of using IEEE 802.11a over the other flavours.
ii) Give one advantage of using IEEE 802.11g over the other flavours.
iii) Describe how Frequency Hopping Spread Spectrum works in relation to Bluetooth.
iv) Consider that you have a wireless access point that is using WEP, explain two ways in which you could make your wireless network more secure.


Related Discussions:- Arrangement of self-learning switches

How will network datagrams be protected at network layer, (a) Consider the...

(a) Consider the subsequent authentication options: A. Using password. B. Using pin and fingerprint Which option A or B provides stronger security and why? (b) Give

Different architectures for wireless networks, (a) What are the different a...

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

Introduction to network protocol, In this assignment, you are required to e...

In this assignment, you are required to emulate the operation of a link layer and network layer protocols in a small computer network. Your program should behave like a single node

Keystroke-based access control model, Suppose you are working for one of th...

Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem

Explain the concept behind digital signature, Question: a) Differenti...

Question: a) Differentiate between ‘Gross Settlement' and ‘Multilateral Net Settlement' providing suitable examples where necessary to support your answer. b) Differentia

Local talk, LOCAL TALK Apple discovered the LAN technology that uses b...

LOCAL TALK Apple discovered the LAN technology that uses bus topology. Its interface is added with all Macintosh computers. It has very low speed i.e. 230.4Kbps. Also it is ch

Hashing, Hashing is the transformation of a string of characters into a g...

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

Representation of a tcp header, (a) Figure is a representation of a TCP hea...

(a) Figure is a representation of a TCP header. For each of the fields lettered from A to G, state the name of the field and provide a brief explanation for the function of each fi

It service support within the itil framework, Problem (a) IT Service Suppo...

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Example of a public key algorithm, Question : (a) There are two approa...

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd