Friday, August 21, 2020

Basic Concepts of Checksum or CRC Integrity Checks, Checksum and CRC C Assignment

Basic Concepts of Checksum or CRC Integrity Checks, Checksum and CRC C Assignment Basic Concepts of Checksum or CRC Integrity Checks, Checksum and CRC Checks Inadequacy for Security â€" Assignment Example > The paper “ Basic Concepts of Checksum or CRC Integrity Checks, Checksum and CRC Checks Inadequacy for Security” is an informative example of an assignment on logic and programming. Advantages of TCP for a proposed application layer protocol It is independent of the operating system It supports multiple routing. TCP for proposed application layer protocol allows networking to other firms TCP for the proposed application layer protocol allows multiple computers to set up. Disadvantages of TCP for a proposed application layer protocol Set up requires complex knowledge while management of TCP for proposed application layer protocol requires trained employees. TCP for proposed application layer protocol is slower than IPX TCP for proposed application layer protocol has higher overhead Advantages of UDP for a proposed application layer protocol UDP allows both multicast and broadcast connections/ transmission. UDP for proposed application layer protocol allows faster operation Disadvantages of UDP for a proposed application layer protocol It is not reliable since there is the possibility of failure of UDP to deliver a packet, first time, second time or failure completely Requires manual breaking of the data into packets It has no flow control Part (b) â€" In PowerPoint slides Question 2The functionality of the following socket API calls for writing a client-server application using TCP is briefly explained as: accept()- This socket API call is used to accept incoming connections from the client. The server calls accept() and incoming calls are accepted. this is blocking socket as it waits for the response of the network before returning. The example is: bind()- this ensures that a certain port is reserved and associated with a certain socket and is only used by that port. The exampleclose()- this closes the socket by closing the connection. This will ensure that the port in use is freed for other uses. Example: connect() â€" this helps the client connect with the server. He calls to connect () and a connection is established. This socket API call does block as it does return immediately and it can be used in receiving or sending. The example Ilisten()- this ensures that TCP protocol to listen for any networking being made. This socket API call does not block as it returns immediately and it can not be used in receiving or sending. examplerecv()-this ensures that TCP protocol to receive a connection from the client. This socket API call does block as it returns immediately data has been received. Examplesend()this ensures that TCP protocol sends a connection from client. This socket API call does block as it returns immediately data has been sentsocket()-socket call is made in closing the socket that will be used for any function. The example is Question 3The link from Router A to Router B has historically shown data integrity errors at a rate of approximately 0.01% packets discarded on both ends of the link. In the last month, these have climbed to over 3% of packets discarded. Reviewing the IT support documentation repository, one of the networks team identifies that new Wiki software was installed on the webserver at the same time (connected to Router A). The likely causesThe new Wiki software has caused network intrusion leading to the breach of security. The software installed was designed to gather some information even it is no harmless. The management should uninstall the software since it is causing network problems. This technology can fundamentally allow for the division of networks into three componentsâ€" the network, subnet address, and host. There are several advantages offered by subletting. It can cut down on network traffic because broadcasting to hosts becomes restrained to individual subnets. It affords flexibility by way of allowing the customization of the number of hosts and subnets for every organization. Subnets improve address utilization, minimally impacts on externally located routers, and also reflects the physical network

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.