Briefly explain the contents of the needs analysis, Computer Network Security

Assignment Help:

QUESTION

(a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design.

(b) Describe on the three ways of improving the performance of a network, with regards to Network Management.

(c) The ASN.1 specification language is an integral part of the OSI Reference Model architecture, and is used in protocols on the Internet. ASN.1 data objects are encoded for transmission using the Basic Encoding Rules. Provide an example of a transmitted byte-stream in hexadecimal by using the subsequent module of data type declarations and its corresponding instances:

Player ::= OCTET STRING, Age ::= INTEGER, Injured ::= BOOLEAN

{Player, "Paul Smith"}, {Age, 21}, {Injured, 0}

(d) Explain the keys used in the process of preparing a Digital Signature, stating the origin of the keys.

(e) Two important system performance parameters are: Reliability and Availability.

i.Determine the MTTR to the nearest hour of a system with an availability of 99% with an average of 3 failures per year.
ii. Determine the MTBF to the nearest hour if the reliability of a system needs to be 99.98% over 30 days.


Related Discussions:- Briefly explain the contents of the needs analysis

Application gateways / firewall-information security, Application Gateways ...

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

ISDN, Explain the architecture of ISDN.....?

Explain the architecture of ISDN.....?

Sequential label and supply, What questions should Iris ask Charlie about t...

What questions should Iris ask Charlie about the new job, about Kelvin''s team, and about the future of the company?

Computer security, Assume that the RSA problem is hard, prove that the RSA ...

Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.

Mr David, why is it that sometime we put password in our account to login o...

why is it that sometime we put password in our account to login or signup and it would not work?

What is network virtual terminal, Network Virtual Terminal It is a set...

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

Intrusion detection and classification, i want to detec and classify networ...

i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence

Ethernet network, QUESTION : a) A datagram of 3000 bytes has to travel...

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

E-commerce, briefly expslain type of e-commerce

briefly expslain type of e-commerce

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd