Important network security services, Computer Network Security

Assignment Help:

Question:

(a) Consider that you enter the given URL in the address bar of a popular web client and that both the client and server accepts HTTP version 1.1.

i. What can be the initial request made by the client?

ii. Illustrate how HTTP version 1.1 allows 'surfing' experience to be greatly improved.

iii. Give a sample HTTP request message with at least four main header lines that is sent by the web client.

iv. Assume that the web resource is actually found on the server, give at least 3 header lines that you could expect in the sample response HTTP message.

(b) Authentication and Integrity are two important network security services.

i. Describe what you understand by authentication.

ii. Explain one mechanism that you could use to ensure data integrity alone during transmission.

(c) FTP is a popular protocol used to transfer files from one host to another.

i. Describe briefly how it works.
ii. Give three advantages that it has over HTTP for files transfer.

(d) In respect of the ISO/OSI Reference model,

i. Explain important functions handled by Layer 6.
ii. Describe advantage of the layered approach used by such a model.
iii. Illustrate disadvantages of having too many layers in a communication model.


Related Discussions:- Important network security services

Routing protocol for a banking network, You have been asked to design a Ban...

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Html, how to link html with a data base

how to link html with a data base

Datagram reassembly, DATAGRAM REASSEMBLY Recreation of original datagr...

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

Explain how the framework will align to the model, MB Enterprise Systems Lt...

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

Security protocol, which security protocols are predominantly used in web-b...

which security protocols are predominantly used in web-based e-commerce

Simplex data exchange, Simplex data exchange Simplex communication def...

Simplex data exchange Simplex communication defines to communication that happens in one direction only. Two definitions have made over time: a common definition, which is des

Explain briefly how go-back-n operates, Question: a) There are two basi...

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

Information security policy practices and standards, INFORMATION SECURITY P...

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic

Technology, how can you enter the ASVAB practice test on line?

how can you enter the ASVAB practice test on line?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd