Top-Rated Free Essay
Preview

Week5textbookquestions

Satisfactory Essays
348 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week5textbookquestions
Dameon Hagler
Text book Questions Chapter 6—Questions R17, Chapter 8—Questions R1, R3, R29
R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address?
A permanent address for a mobile node is its IP address when it is at its home network. A care-of-address is the one its gets when it is visiting a foreign network. The COA is assigned by the foreign agent (which can be the edge router in the foreign network or the mobile node itself).
R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Justify your answer.
Message confidentiality means that the message being sent is only known by the sender and the recipient. This differs from message integrity, which means that a message is not tampered with and that the sender and recipient are exactly who they say they are. I believe you can have integrity without confidentiality because your message to each other could be public and yet you could authenticate the sender and recipient.
R3. From a service perspective, what is an important difference between a symmetric-key system and a public-key system?
In symmetric key systems, the keys of receiver and sender are identical and are secret. In public key systems, a pair of keys is used. One of the keys is known to both receiver and sender, or in other word, to the whole world, while the other key is known only by sender. That’s the major difference between the two systems.

R29. Stateful packet filters maintain two data structures. Name them and briefly describe what they do.
Stateful and Stateless IP .. There are several advantages to using a static IP filter. It has a combination of low overhead and high throughput. Stateless IP filters are very inexpensive, and many are free. They are included with router configuration software or are included with most Open Source operating systems. Being that a static IP filter does little more than simply route traffic, it is very good for traffic management.

You May Also Find These Documents Helpful

  • Powerful Essays

    17) Tests both upper and lower motor pathways. The sole of the foot is stimulated with a dull instrument.…

    • 1640 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    5. IP stateful firewall is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known active connection will be allowed by the firewall; others will be rejected.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    If an incoming packet of data (small chunk of data) is flagged by the filters, it is not allowed through. Packets that make it through the filters are sent to requesting system and all others are discarded.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    MKT 571 Quizzes week 1 6

    • 2563 Words
    • 7 Pages

    1 One of the most critical steps in the defining process of market research is…

    • 2563 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    3. With a particular DBMS in mind, design the tables for this revenue process. Note that you will need tables for each resource, event, and agent, as well as tables for each many-to-many relationship.…

    • 422 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    How & why did the economic & social values of white Americans clash with those of Native Americans in the West?…

    • 637 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Chapter One: A casual definition of a quester would be an individual that goes on a quest, or mission, in hopes of looking for something. However, in How to Think like a Professor by Thomas C. Foster, we are challenged to look at this term in a very different and mind stimulating way. Foster challenges our minds to look at quests as everyday things. Foster points out 5 aspects to every quest and how we can find these within everyday situations. These include; the quester, a place to go, said reason to go there, challenges and trials, and the real reason to go. The places do not have to be physical places and can be places within our minds and hypothetical places. With every quest we gain new life experience and knowledge not previously known to ourselves. We gain self-knowledge. In Pride and Prejudice, we can see a quest that Elizabeth Bennet goes on. The place she goes is self- acceptance against her family and to be content with her love for Darcy. Elizabeth continuously goes on a self-battle of whether or not she deserves what she has, including; love, life, and happiness. Austen emphasizes the character of Elizabeth self-deserving attitude early in the novel: “I must learn to be content with being happier than I deserve.” (Austen 76)…

    • 1338 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Summer reading packet

    • 1924 Words
    • 18 Pages

    2. When she attends the dance in brown saddle shoes, she gets embarrassed. The boys want to dance with her, but she is scared to dance with her shoes.…

    • 1924 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    4. How is static filtering different from dynamic filtering of packets? Which is perceived to offer improved security?…

    • 2028 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Windows Firewall: Quiz

    • 436 Words
    • 3 Pages

    IPsec protects data in transit by ___________, in which data packets are encapsulated within other packets for their protection.…

    • 436 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Chapter 1 Questions 1-4

    • 676 Words
    • 3 Pages

    What is the relationship among money, labor cost, profitability, and knowledge in the modern democratic-capitalistic society?…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Communication is sending a message with emotions. The message is sent to another person verbally or nonverbally. You can receive a message through any of the five senses.Communication is the sending and receiving of the message. Sometimes communication can go wrong if the receiver misinterprets it. Misinterpretation happens alot when jargon and confusing words are used.…

    • 235 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Week 5 quiz

    • 870 Words
    • 8 Pages

    ________ is finding the most cost-effective media to deliver the desired number and type of exposures to the target audience.…

    • 870 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Network Security Concepts

    • 1883 Words
    • 8 Pages

    Symmetric and asymmetric encryption differ from each other in that with symmetric encryption, the same key is used for both the encryption and decryption process. With asymmetric encryption, the keys are in pairs but are not the same, and one is used for encryption and another for decryption (Matuszek, 1999). Symmetric encryption is simple and faster than asymmetric encryption, with the security of the key being directly related to the length of the key. Asymmetric encryption has one key that is known only to the person receiving the encrypted data, which does not…

    • 1883 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    2. No, e-mail messages and interoffice memorandums are not interchangeable as communication channels because for example if you need to send some confidential news or information to someone, and e mail would not be appropriate, but a memo would.…

    • 866 Words
    • 4 Pages
    Better Essays