UML 91.561 Computer & Network Security I HomeWork 1 Name – Nrupen Abnave Student ID -01382247 1.1 (a) Describe the major structure of a TCP packet and explain the main functions of the TCP headers. - TCP is a transport layer protocol and is connection oriented. Its reliable connection, has error checking and flow control. TCP Headers: 32bits Source and Destination Ports – Each 16bit number. Indicate which application is using the communicating stream. Used by most common…
frames and the time required to transmit a message once the medium access is granted, along with traffic behavior are essential factors to determine whether the existing internetwork is in good shape to support new enhancements. 2-When considering protocol…
latencies due to TCP connection structure. HTTP only transfers larger amount of data, and needs a genuine mechanism. DNS requests are short packets that issues the IP address for a name and maybe some other dependable name server addresses. The reliable protocol semantics of TCP would be costly in the DNS case. b) What could happen in DNS if its UDP based request or response packet is lost If DNS request packet are lost, the resolver would devote that there is a short-term failure in name…
In each scenario mentioned in previous section, we formulate network topologies as undirected graph $\mathcal{G}=(\mathcal{V},\mathcal{E})$ with $n$ nodes and $m$ edges having demand at a node $i$ in $\mathcal{V}$ given by $d_i$. Here, $\mathcal{V}$ indicates set of nodes and $\mathcal{E}$ indicates set of edges in the topology. A link would exist in the topology between node $i$ and node $j$, if they are in the communication range of each-other satisfying constraint, \begin{equation} P_i…
This protocol is classified into rounds; every round composed of two phases; Set-up Phase (1) Advertisement Phase (2) Cluster Set-up Phase Steady Phase (1) Schedule Creation (2) Data Transmission A. Setup Phase: Every node selects independent of other nodes if it will become a CH or not. This selection takes into consideration when the node behaved as a CH for the last time. In the advertisement phase, the CHs inform their neighboring node with an advertisement packet that they become CHs.…
variety of network cable types. Whereas in some other cases, a very basic network may only utilise one kind of network cable. The cable needed varies according to the client’s needs for example the size of the network (PAN, LAN, MAN, WAN), the network protocols and even the network topology. Different cables have different characteristics and it is important to learn about the different cables available on a network to develop a successful network. In this report I will be discussing and…
capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel. Since IPv4 VPN puts the remote host on a private network, the natural choice for the IPv6 tunnel is the ISATAP (Intra-Site Automatic Tunnel Addressing Protocol), which is suitable for communication within a location. However, in practice, we can use any type of IPv6 tunnel as long as it is supported by the host and while the gateway is set up within the private network for it. Configurations for…
Design Analysis A connection is recognized in the optical layer regulates to carry the information among the clients in the network. The optical connection is preserved between a source node, s and destination node, d is known as an light path. The problem in finding a route for a light path with wavelength assigned to the light path is submitted as the routing and wavelength assignment problem (RWA). The problem of RWA is divided into two parts : Routing and Wavelength Assignment. In the…
implements an access control policy among two networks. Example: “Allows: http, mails etc. Keeps out: intruders, denial of services attacks etc.” 1.10.1 Firewall work: The protocol that computers use to be in touch on the internet is called TCP/IP. Each computer on the Internet has a only one of its kind internet protocol and each computer has a run of ports used to be in touch with other computers “Ex: http (web pages) – port 80 FTP (file) – port 21” 1.10.2 Need of firewall: We…
An IP address, or internet protocol address, identifies a person online by where they are in the world and more specifically, acts as that individual’s online identity (IP Address). However, these advertisements that companies show only reflect what a person has left traces of online…