Explain briefly the role of the physical layer, Computer Network Security

Assignment Help:

a) Calculate the CRC for the frame below:

Frame: 1101011011

Generator: 10011

Message after appending 4 zero bits: 11010110110000

b) OSI refers to a system in which any number of standards or protocols may be used to address one or more of the functions with any of the layers of the model.

i. State the three responsibilities of the data link layer.

ii. Layer 4, the transport layer provides an additional connection beneath the session layer. What are the 4 considerations that the transport layer ensures?

iii. Explain briefly the role of the physical layer.

c) In the context of IP addressing:

i. What does the message which has only 1's in the address imply?

ii. Which IP address is used by hosts when they are being booted and not used afterwards?

iii. Specify the range of host addresses in a Class D network.

iv. Give the Class E IP address format.


Related Discussions:- Explain briefly the role of the physical layer

Extended euclidean algorithm, (a) Using the extended Euclidean algorithm, ...

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Risk control strategies-risk management, Risk Control Strategies Once th...

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •    Apply safeguards wh

Udp communication semantics, UDP COMMUNICATION SEMANTICS:  UDP needs I...

UDP COMMUNICATION SEMANTICS:  UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or

Packet filtering firewall-stateless packet filtering, Stateless Packet Filt...

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

Using icmp reachability, USING ICMP TO TEST REACHABILITY:  ICMP can a...

USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P

Future threats to network security and planning for those th, I need a help...

I need a help on how to write good assignment on the above topic

Name the various layers of the osi model, Problem (a) Name the various ...

Problem (a) Name the various layers of the OSI model. (b) Show, by means of a diagram, how  the TCP/IP  reference model  is different from the OSI-7 reference model? Why is

Describe phishing attacks, QUESTION (a) (i) Describe Phishing attacks. ...

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

Function of key secrecy and algorithm secrecy in security, What is the func...

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

CNSS Security model, "Using the CNSS Model, examine each of the cells and w...

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd