Question:
Assignment Question:
An office LAN has twenty workstations. The office manager has asked you to replace their 100Mbps (wired) hub with a 100Mbps wireless AP. Will this increase or decrease the bandwidth available to each workstation? Explain your reasoning.
The LAN connection would be the best choice because it uses full duplex connection and the wireless access point uses the half duplex connection for transferring the data packets. In the wireless transmission if two of the nodes connected in the network sends data packets it can cause collision and the packet may be lost (Stuber et al. 2017). In the wireless transmission 50 mbps speed can be obtained. The rate of collision increases with the increase in the nodes but in case of Ethernet connection the data packets are stored in the switch until the transmission is over. Thus and effective 80 mbps transfer speed can be maintained.
What are the difference between a wireless access point and adhoc networks?
The wireless network is created using a wireless access point and it is different from the ad hoc network because there no requirement of an wireless access point for the establishment of connection between the nodes. The ad hoc network can be developed easily and is used for different purpose such as gaming, exchanging data, etc. A peer to peer connection is used for the communication in the ad hoc network and it is similar with the Bluetooth technology (Stuber et al. 2017). The ad hoc network have different issues such as there is more congestion in the ad hoc network and it cannot be extended.
But in case of wireless access point a permanent wireless network is created and can be extended with the installation of repeaters or bridges for connecting more number of wireless devices. The wireless access point is connected to the LAN for establishment of connection between the nodes.
There are two other LANs at GAMPS office, one for the main office (called ADMIN) and one for the admissions gate (called GATE). There are 5 workstations on each LAN. On ADMIN, the workstations connect to a 100Mbps hub. On GATE, the workstations connect to a 100Mbs switch with all ports operating in half-duplex mode. If you connected your laptop to GATE, would it be subject to more, the same or less collisions than if it was connected to ADMIN? You can assume data rates and traffic patterns are the same on each LAN. Justify your answer by explaining the origin of the collisions.
Answer:
The hubs are used as a multiport repeater and it is used for connecting multiple nodes installed in the network. The hubs have limited capability and it cannot find the best path for transferring the data packets for reducing wastage. The switch are used for acting as a buffer and manage the network traffic without impacting on the performance of the network. It have error checking and thus reduces errors in the transmission of the data packets. It can be used for dividing the collision domain and increase the efficiency of the network (Pluta, Stewart and Korson 2017). If a laptop is connected with the GATE network then it would be subject to less collision because it gets connected with the switch and the switch is efficient for management of the traffic in the network and reduces collision to a large extend than the hubs which broadcast the network packets causing wastage of the resources.
The physical topology is used for the demonstration of the communication channels used for communication such as the workstations and the network cables. It consists of the physical network structure while in case of logical network topology, the logics used such as the protocol, IP addressing scheme, VLANs are used for demonstration (Pluta, Stewart and Korson 2017). E.g. For a Local area network the star topology is used and it is called the physical topology and but if the same communication channels is used for the connection of the nodes in the star topology the logical topology is defined as bus.
What are two benefits of fibre-optic cabling over wireless networks?
The two benefits identified over the wireless networks are listed below:
- It is faster than the wireless radio signals because the data are transmitted in the fibre optics cable in the speed of the light but in the wireless network the data is transferred in the speed of the radio signals (Kizza 2017).
- The fibre optics cable are not affected by the interference and it not possible for the wireless network because when there are many devices emitting wireless signals and it can operate in the same frequency causes distortion.
What are the benefits and disadvantage of co-axial cables?
The advantages and disadvantage of the co axial cables are given below:
- The co axial cables can be applied for high frequency transmission because of its tensile strength and less weight of the cable.
- The shields of the co axial cable can reduce the attenuation and thus it is less susceptible to noise when compared with the twisted pair cables.
Disadvantages
- The installation of the co axial cables are difficult for its stiffness and thickness for the long distance transmission
- For the co axial cable a single cable is used for transmission of the data packets and if it breaks it can cause failure for the whole network (Kizza 2017).
When you turn on a computer, it “knows” its MAC address. What type of address does it need to receive messages from the Internet and how does it get this address?
For connecting with the internet an IP address is required which is used for sending and receiving messages. The IP address can be static or dynamic provided by the ISP (internet service provider) or allocated using a DHCP server. The dynamic IP address is used in private networks and suitable protocols are used for mapping the MAC address with the IP address or vice versa (Levin and Schmidt 2014). The MAC address are used for identification of the nodes connected in the network.
Week Two
Your question:
“A MAC address have multiple IP address”. Explain
Your sample answer:
There may be more than one IP address associated with a MAC address and this may occurs for the servers or if the computer is connected with more than one network. For both of the network the IP address would be different but since they are connected to a computer node the MAC address would not change. In case of the server it can be used for providing more than one service and thus for each of the service different IP address are used but the Mac address remain the same (Levin and Schmidt 2014). The server roles can be transferred from one IP address to another and can improve the scalability of the network
Assignment Question:
Explain how it is that IPv4 and IPv6 can co-exist on the same networks and describe two technologies that enable this.
The two technologies that can be applied for co-existing the IPv4 and the IPv6 address at the same network are given below:
- NAT64 and
- Dual Stacking
NAT64 – It is used for the translation of the IPv6 network into Ipv4 without changing the current network infrastructure
Dual Stacking – It is a device used for translating the Ipv4 address into Ipv6 such that the Ipv4 network can understand the Ipv6 packets and enable communication between the Ipv4 and the Ipv6 network (Dao et al. 2015).
The firewall configured with Ipv6 address works similar to the firewall configured with the Ipv4 addressing scheme. There are many firewall devices that are compatible with Ipv6 and it should be tested for meeting the gold standards and working of the firewall depends on the rules set on the firewall for blocking the unknown sources and secure the network from unauthorised access (Dao et al. 2015).
MAC Address |
Port # |
00-25-2A-00-00-0F |
4 |
00-25-2A-00-10-FC |
1 |
00-25-2A-00-00-DD |
2 |
00-25-2A-00-11-21 |
3 |
Port 3 is connected to a hub.
During your testing, the following events occur:
- The entry for 00-25-2A-00-10-FC expires.
- An addition device (00-25-2A-00-10-00) is connected to the hub on port 3.
- A new virtualised machine (00-25-2A-AA-10-0C) is started on the server connected to port 2
- Device (00-25-2A-00-10-00) is disconnected from the hub on port 3 and connected to port 5.
Draw the switching table that you’d expect to see at the end of these events. The order of entries is unimportant:
MAC Address |
Port # |
00-25-2A-00-00-0F |
4 |
00-25-2A-00-00-DD |
2 |
00-25-2A-AA-10-0C |
2 |
00-25-2A-00-10-00 |
5 |
The MAC address can be used for identification of the IP address of a computer. Explain how?
Your sample answer:
With the application of the address resolution protocol the MAC address of a node connected in the network can be found. The IP address is converted into the MAC address using the ARP protocol and it works in the layer 2 Open Systems Interconnection model (Silberschatz, Galvin and Gagne 2014). An ARP cache table is used for correlating the physical address and the IP address of the device and thus it can be used for getting the MAC address of the device from the corresponding IP address.
What are the difference between a wireless access point and adhoc networks?
Assignment Question:
Describe how multiple processes can appear to be run simultaneously on a computer.
The multiple process can run in the computer at the same time utilizing the multitasking option in the operating system. Different methodology is applied for handling multiple tasks at a time such as time slicing and context stitching. In time slicing the CPU time cycles are divided among the process running. The context stitching is utilized for transferring the control to the other process. In the multi-tasking environment an operational overhead is used and the CPU cycles are utilized efficiently. Pre-emptive and co-operative techniques are used. In the pre-emptive technique each of the process are controlled for allocating a time slot for the availability of the CPU (Coronel and Morris 2016). The co-operative technique works by allocating the cpu to a process until it has finished its job.
What is the difference between multiprogramming and multiprocessing?:
Multiprocessing and multiprogramming differs from each other and given below:
Multiprocessing –
- It is used for processing more than one number of request at a time.
- Multiple CPUs are used for processing the request in parallel such that each of the request are completed in less time.
- It is expensive when compared with the multiprogramming environment.
Multiprogramming-
- Single CPU is used and the programs are stored in the main memory for executing concurrently(Silberschatz, Galvin and Gagne 2014).
- Context switching applied for switching between the programs stored in the memory
- It is less expensive compared to the multi-processing environment.
Assignment Question:
You have a 32GB USB stick. You are going to store an 8GB database file on the drive. The database file contains sensitive information. What file system should you format the drive with? Why?
Your answer:
For storing the 8 GB database file on a 32 GB USB stick the drive must be formatted to NTFS format for the following reasons:
- It does not limits the data and supports for transferring large files.
- The files are tracked using the b-tree directory scheme and it does not uses governing table as the FAT for storing the file information, instead it uses a cluster.
- The files are secured because an access control list is used for the files and directories.
- It also supports active directory for establishment of permission for accessing the database file containing sensitive information (Coronel and Morris 2016).
- It have integrated file compression for saving the space on the disk.
ReFs (Resilient File Systems) – It is developed by Microsoft and was introduced with the Windows Server 2012 for resolving the issues that are associated with the NTFS file system. There has been a change in the requirement of storage and is used for data integrity checking, protecting the data from degradation and hard drive failure. The ReFs was introduced for automatically handling the problems associated with the hard drives and it have self-repairing property such as check disk, disk defragmentation, etc. Some of the features present in NTFS are removed such as compression, encryption, etc. and increases the reliability of the physical and the logical disks (Coronel and Morris 2016).
Firewalls can be effective against worms, but are generally of no use for viruses. Why is this? You may need to do some additional research to answer this.
The firewalls are installed in the network as a physical hardware device used for analysing the data packets in the network and take effective decision such as allowing or dropping the data packets depending on the rules set on the firewall. The firewall rules can be set depending on the IP address of the source and destination the protocols used for communication. The firewall cannot be used for checking malicious codes because it is designed for filtering the network traffic (Mahapatra et al. 2017). By filtering the network traffic the firewall can prevent worms coming from unknown networks but the virus can enter into the system from different sources such as portable storage devices, attachment files, etc. Thus firewall are not effective against viruses.
What is the difference between the intrusion detection system and firewall?
Your sample answer:
The firewall is installed in a network for prevention of the unauthorised access by filtering the data traffic in the network. The intrusion detection system is software and hardware that is used for the detection of the intrusion and report against the attempt. The firewall can be used for blocking an unauthorised connection but the IDS cannot block any connection. The packets are sent and received in the network are checked against the rules set in the firewall and if it not matches the packets are dropped while in case of IDS the data flow pattern are analysed and an alert is sent to the network administrator for detection of the unusual pattern(Mahapatra et al. 2017).
References
Borzovs, J., Ilzi?a, I., Keiša, I., Pinnis, M. and Vasi?jevs, A., 2014. Terminology localization guidelines for the national scenario.
Coronel, C. and Morris, S., 2016. Database systems: design, implementation, & management. Cengage Learning.
Dao, N.N., Park, J., Park, M. and Cho, S., 2015, January. A feasible method to combat against DDoS attack in SDN network. In Information Networking (ICOIN), 2015 International Conference on (pp. 309-311). IEEE.
Kizza, J.M., 2017. Guide to computer network security. Springer.
Levin, S.L. and Schmidt, S., 2014. IPv4 to IPv6: Challenges, solutions, and lessons. Telecommunications Policy, 38(11), pp.1059-1068.
Mahapatra, N., Nanda, S., Kaur, G. and Pradhan, B., 2017. Unit-7 Data Security and Management.
Pluta, S., Stewart, R.J. and Korson, J.L., 2017. Radio over fibre technology for shipboard antenna links. Journal of Marine Engineering & Technology, pp.1-12.
Silberschatz, A., Galvin, P.B. and Gagne, G., 2014. Operating system concepts essentials. John Wiley & Sons, Inc..
Stüber, G.L., 2017. Principles of mobile communication (Vol. 3). Springer.
Zhang, H., Chu, X., Guo, W. and Wang, S., 2015. Coexistence of Wi-Fi and heterogeneous small cell networks sharing unlicensed spectrum. IEEE Communications Magazine, 53(3), pp.158-164.