Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

[9 marks] Your small company of less than 200 employees has been assigned a clas

ID: 3907162 • Letter: #

Question

[9 marks] Your small company of less than 200 employees has been assigned a class C network by its ISP. The class C network address assigned to you is 204.45.87.0. You need to divide this into three subnets for the administration group, the accounts team, and the development group. Assume the first and last subnets are usable. i) [4 marks] List the network addresses for the subnets in dotted-decimal slash notation. ii) [2 marks] What is the broadcast addresses for these subnets? ii) 12 marks] Give the subnet mask. iii) [1 mark] How many hosts are in each subnet? a) [3 marks] Compare message delivery in IP to message delivery at the data-link layer. b) 3 marksHow are a network address and a broadcast address represented in an IP address? [3 marks] Packet delivery is unreliable in IP. What four things can happen to packets that make their delivery unreliable? What does IP do when any one of these conditions occur? d) C647 Data Communications 2015 Page 2 of 5 e) [2 marks] Why are the class A addresses 10.x.y.z, the class B addresses 172.16 31.y.z, and the class C addresses 192.168.y.z special? Will packets transmitted through the Internet ever have these as source or destination addresses?

Explanation / Answer

Security Principles

a.

Example

You can use threats, attacks, vulnerabilities and countermeasures to organize your security information. Here’s an example of organizing threats, attacks, vulnerabilities and countermeasures for Input/Data validation:

Threats/Attacks for Input/Data Validation

Vulnerabilities for Input/Data Validation

b. Integrity

Message integrity in data communication refres to the content of the message remains intact even if it is transferred from end to other end. To ensure the message integrity one must use cryptographic functions and other cryptographic mesures.

we can use following methods to ensure message integrity

1. Message Digest Technique

2. Checksum Method

3. Hash Function

4. Message Authentication Code

3. Two Factor authentication

A system can be secured in many ways using password protection. The best way to incorporate security is by applying multi factor authentication where password is composed of multi factor such as biometric parameters.

in case of 2 way factor authentication we can use plain text and thumb impression as password when both these paramets match then only we are allowed to use the system.

Note: I need more time to complete this question. Sorry for the inconvinience

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote