[9 marks] Your small company of less than 200 employees has been assigned a clas
ID: 3907162 • Letter: #
Question
[9 marks] Your small company of less than 200 employees has been assigned a class C network by its ISP. The class C network address assigned to you is 204.45.87.0. You need to divide this into three subnets for the administration group, the accounts team, and the development group. Assume the first and last subnets are usable. i) [4 marks] List the network addresses for the subnets in dotted-decimal slash notation. ii) [2 marks] What is the broadcast addresses for these subnets? ii) 12 marks] Give the subnet mask. iii) [1 mark] How many hosts are in each subnet? a) [3 marks] Compare message delivery in IP to message delivery at the data-link layer. b) 3 marksHow are a network address and a broadcast address represented in an IP address? [3 marks] Packet delivery is unreliable in IP. What four things can happen to packets that make their delivery unreliable? What does IP do when any one of these conditions occur? d) C647 Data Communications 2015 Page 2 of 5 e) [2 marks] Why are the class A addresses 10.x.y.z, the class B addresses 172.16 31.y.z, and the class C addresses 192.168.y.z special? Will packets transmitted through the Internet ever have these as source or destination addresses?Explanation / Answer
Security Principles
a.
Example
You can use threats, attacks, vulnerabilities and countermeasures to organize your security information. Here’s an example of organizing threats, attacks, vulnerabilities and countermeasures for Input/Data validation:
Threats/Attacks for Input/Data Validation
Vulnerabilities for Input/Data Validation
b. Integrity
Message integrity in data communication refres to the content of the message remains intact even if it is transferred from end to other end. To ensure the message integrity one must use cryptographic functions and other cryptographic mesures.
we can use following methods to ensure message integrity
1. Message Digest Technique
2. Checksum Method
3. Hash Function
4. Message Authentication Code
3. Two Factor authentication
A system can be secured in many ways using password protection. The best way to incorporate security is by applying multi factor authentication where password is composed of multi factor such as biometric parameters.
in case of 2 way factor authentication we can use plain text and thumb impression as password when both these paramets match then only we are allowed to use the system.
Note: I need more time to complete this question. Sorry for the inconvinience
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.