Preview

Nt1310 Unit 4 Assignment

Powerful Essays
Open Document
Open Document
1851 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 4 Assignment
ASSIGNMENT 1

FACULTY OF SCIENCE, ENGINEERING AND TECHNOLOGY
SWINBURNE UNIVERSITY OF TECHNOLOGY

Prepared as part of the assessment requirements for
Data Communications and Security
COS20012 & COS70007

Version: 1.0

Author: Alistair Hutchings

Student ID: 4964276

STANDARDS ORGANISATIONS
[1-2 PAGES, EMBED LINKS TO INTERNET RESOURCES WITH YOUR EXPLANATION]
Provide a short summary (including the name) and details of the contribution that each of the following organizations have played in facilitating effective data communication. Summarize the types of standards that would be found at each organization and map those to the layered model used by Kurose Ross.

ITU-T
IETF
ISO
IEEE

RFCS - [1 - 2 PAGES]
WHAT ARE THEY USED
…show more content…
CAPTURE A FRAME USING WIRESHARK FROM YOUR HOME COMPUTING NETWORK. EXPAND THE PART THAT SHOWS THE ETHERNET FRAME. TAKE A SCREEN DUMP (SHIFT PRINT SCREEN / PAINT) AND PASTE IT HERE.
IDENTIFY EACH FIELD IN THE FRAME AND DESCRIBE THEIR PURPOSE. PROVIDE EXAMPLES OF THE EXPECTED VALUES FOR EACH FIELD. RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.

1. SWITCH - [1 PAGE]
EXPLAIN HOW A SWITCH LEARNS ABOUT MAC ADDRESSES. (Detailed answer required with a supporting diagram)

ONCE UPON A TIME SWITCHES WERE CONSIDERED TO BE INSECURE. HAVE THERE BEEN ENHANCEMENTS TO SWITCH TECHNOLOGIES THAT MAKE THEM MORE SECURE. IDENTIFY TWO AND DESCRIBE THEM HERE. FOCUS ON SECURITY ISSUES.

2. ARP - [1 -2 PAGES]

WHEN IS ARP NEEDED?
DESCRIBE IN DETAIL (DOWN TO FIELD LEVEL)
WHAT WOULD BE FOUND IN AN ARP REQUEST, INCLUDE A WIRESHARK TRACE (1 FRAME)
DESCRIBE IN DETAIL WHAT WOULD BE FOUND IN AN ARP RESPONSE (1 FRAME)
(DOWN TO FIELD LEVEL)
EXPLAIN WHY ARP IS NOT A SECURE PROTOCOL? (0.5 – 1
…show more content…
bandwidth [Online]. QuinStreet Inc. Available: http://www.webopedia.com/TERM/B/bandwidth.html [Accessed 10th April 2016].
BEAL, V. modem [Online]. Quinstreet Inc. Available: http://www.webopedia.com/TERM/M/modem.html [Accessed 10th April 2016].
CHAPIN, L. 1992. The Internet Standards Process [Online]. IEFT. Available: https://tools.ietf.org/html/rfc1310 [Accessed 10th April 2016].
CHAWIA, R. S. 2013. Delays in computer networking. In: DELAY.PNG (ed.). com2networks.blogspot.com.
IEFT. 2012. RFC Editorial Guidelines and Procedures [Online]. IEFT. Available: https://www.rfc-editor.org/old/policy.html [Accessed April 2016].
KOZIEROK, C. M. 2005. Performance Measurements: Speed Bandwidth, Throughput and Latency [Online]. Charles M. Kozierok. Available: http://www.tcpipguide.com/free/t_PerformanceMeasurementsSpeedBandwidthThroughputand-2.htm [Accessed April 10th 2016].
LOVETOKNOW, C. nodal processing delay [Online]. LovetoKnow, Corp. Available: http://www.yourdictionary.com/nodal-processing-delay#7kdIyI1CMpD7Hx3q.97 [Accessed 10th April 2016].
NETWORKINFOBLOG. 2016. Transmission Delay - Propgation Delay [Online]. NetworkInfoBlog. Available: http://www.networkinginfoblog.com/post/36/transmission-delay---propagation-delay/ [Accessed April 10th

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1230 Unit 10 Assignment

    • 409 Words
    • 2 Pages

    The company I choose is a small IT company. The company offers all the big major companies technical support. They have to backup client information, finical records, and employee’s information. The company would use the GFS scheme for backing up their information. The GFS scheme comes with a full month backup which is stored offsite, and a weekly and daily backup that is kept onsite as well as offsite. The weekly and daily backups are kept onsite for 30 days then are reused and recycled daily and weekly at the offsite location. The monthly backup that is secured offsite is kept for 3 years depending on the client. Presently for the…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 634 Words
    • 3 Pages

    The skin is an organ composed of three anatomical layers: epidermis, dermis, and hypodermis. These anatomical layers together function to provide the body with a protective barrier, body temperature regulation, sensation, excretion, the outer layer of skin…

    • 634 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1110 Unit 3 Assignment

    • 655 Words
    • 3 Pages

    Server side code will include the portion of opening a socket on a specific port as discussed earlier and in addition to it there will be some if-else construct or a switch case implementation that will interpret the incoming instructions from the client ma-chine and will call the related method associated with the in-struction…

    • 655 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Assignment

    • 532 Words
    • 3 Pages

    There are different ways through which businesses can add value to their products and services.…

    • 532 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Assignment

    • 629 Words
    • 3 Pages

    In a bus configuration, each computer in the network is responsible for carrying out its own communications without the help of a central unit. A common communications cable (the bus) connects all of the computers in the network. As data travels along the cable, each unit performs a query to determine if it is the intended recipient of the message. The bus network is less expensive than the star configuration and is thus widely in use for systems that connect only a few microcomputers and systems that do not emphasize the sharing of common resources.…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 5: The session layer...This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the applications at each end. It deals with session and connection coordination.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The software will be presented in such a way that it is both visually appealing and easy for the user to navigate through the application.…

    • 612 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 361 Words
    • 2 Pages

    According to the standard account, true belief is not sufficient for knowledge. It states that knowledge requires, not only that our beliefs be true, but that we have good reasons for believing them to be true. In standard account, knowledge is justified true belief.…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 883 Words
    • 4 Pages

    Name Entity (NE) is an expression that refers to proper names such as persons, locations, and organizations. For example: Arafat Awajan is a full professor at Princess Sumaya University for Technology in Jordan, then Arafat Awajan, Princess Sumaya University for Technology, and Jordan would be identified as reference to person, an organization, and location, respectively. The task that attempts to locate, extract, and automatically classify named entities into predefined classes or types in open-domain and unstructured texts, such as newspaper articles, was called Name Entity Recognition (NER)[Shaalan 2014].…

    • 883 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 2784 Words
    • 12 Pages

    • In 1970, Corning used pure silica to create a fiber with a loss of…

    • 2784 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 468 Words
    • 2 Pages

    Main Reading: Solomon, M.R. (2011) Consumer behaviour; buying, having and being, 9th edn. New Jersey: Pearson Education Inc…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4

    • 342 Words
    • 2 Pages

    Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN. It can be used for computer network protocol analysis and security auditing. It is capable of intercepting traffic on a network segment, capturing passwords, and conducting active eavesdropping against a number of common protocols.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Default gateways, also known as routers, serve the purpose of allowing message transmission across networks. When an Ethernet frame from a source host is wishing to be sent to a host off network, the source will instead send it to the default gateway, using the router’s MAC address. The default gateway will then forward the message to the intended destination host or the next closest default gateway if still not directly…

    • 538 Words
    • 3 Pages
    Good Essays
  • Best Essays

    About Ietf

    • 1544 Words
    • 7 Pages

    The IETF is best known for its seminal design contributions of the Internet and the applications. The Request for Comments (RFC) that published by IETF is to describe methods,…

    • 1544 Words
    • 7 Pages
    Best Essays
  • Powerful Essays

    Wireless Security

    • 3376 Words
    • 14 Pages

    Eavesdropping and Authentication ,The security of any network is an important issue. No one likes the idea that the possibility exists that someone could be intercepting their Internet traffic, reading their email, ordering items with their credit cards, or sending inappropriate messages to their boss in their name. Security of wired networks is often a…

    • 3376 Words
    • 14 Pages
    Powerful Essays

Related Topics