Free Essay

Mis589

In:

Submitted By nostalgic
Words 418
Pages 2
Review Questions -Answers
Answer R3: * The primary service provided by data link layer is to transport data between different and adjacent nodes over the same network segment. Possible services provided by link layer protocol are * Framing: Link layer protocol encapsulates the network layer data into frames to be transmitted over the communication link. The frame consist of data field which homes the network layer data along with source and destination hardware address of the nodes. Framing of the network layer data continues at the each hop until the network layer data is delivered to the destination. * Link access: This service provided by Data link layer’s sub layer called as media access control (MAC) is responsible for deciding how the frames are transmitted on the link. This service makes more relevance where multiple nodes or devices share the same media or bandwidth. Thus it regulates the use of the same link by devices by allowing devices to transmit when the media is idle or no other devices are transmitting. * Reliable delivery: This service of Data link layer guarantees delivery of network layer datagram to be delivered across the link without errors. This service is generally used for links which are prone to higher bit error rates like wireless networks but for wired networks this service is seldom used. * Error detection and correction: This service takes care of the bit errors introduced by signal attenuation and electromagnetic noise during transmission between the nodes. The sending node includes an error detection bit in the header for the receiving node to perform error check as it would eliminate the need to forward frames with error. Error detection at the data link layer is implemented at the hardware level. In error correction, receiving node not only detects when the bit error occurred but also detects where in the frame that bit error occurred and corrects it eventually.
Reliable delivery service provided by data link layer is similar to transport layer (TCP) through acknowledgements and retransmission.
Error detection services provided by data link layer is provided by Network layer and transport layer through Internet checksum.
Answer R4: The probability of collision is higher as there is no form of access control in place and both nodes are transmitting at a rate L/R which is greater than the propagation delay DPROP which appears to be the only factor that could have avoided the collision.

Answer R9: * MAC address space is 48 bits * IPV4 address space is 32 bits * IPV6 address space is 128 bits

Similar Documents

Premium Essay

Mis589 Week5

....narisetty•Chapter 6—Questions R17 R17. A permanent address for a mobile node is its IP address when it is at its home network. A care-of-address is the one its gets when it is visiting a foreign network. The COA is assigned by the foreign agent (which can be the edge router in the foreign network or the mobile node itself). •Chapter 8—Questions R1, R3, R29. R1. Confidentiality is the property that the original plaintext message can not be determined by an attacker who intercepts the ciphertext-encryption of the original plaintext message.Message integrity is the property that the receiver can detect whether the message sent (whether encrypted or not) was altered in transit. The two are thus different concepts,and one can have one without the other. An encrypted message that is altered in transmit may still be confidential (the attacker can not determine the original plaintext) but will not have message integrity if the error is undetected. Similarly, a message that is altered in transit (and detected) could have been sent in plaintext and thus would not be confidential. R3. In symmetric key systems, the keys of receiver and sender are identical and are secret. In public key systems, a pair of keys is used. One of the keys is known to both receiver and sender, or in other word, to the whole world, while the other key is known only by sender. That’s the major difference between the two systems. R29. Stateful and Stateless IP .. There are several advantages to...

Words: 320 - Pages: 2

Premium Essay

Mis589 Week 5 Essay

...Silvio Kennedy MIS589 Week 5 Homework June 4, 2014 R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address? In mobile network a permanent address for a mobile node is its IP address when it is at its home network. A care-of-address is the one its gets when it is visiting a foreign network In the Mobile Internet Protocol (Mobile IP), a home address is the relatively permanent IP address given to a mobile node. The home address remains unchanged no matter where the mobile node is located. The Internet Engineering Task Force (IETF) defines the home address in RFC 2002, IP Mobility Support, which describes an enhancement to the Internet Protocol (IP) that makes it easier to replug a mobile device into networks other than its home network. Care-of-Address, on the other hand is, is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network. The care-of address identifies a mobile node's current point of attachment to the Internet and makes it possible to connect from a different location without changing the device's home address (permanent IP address). The Foreign Agent that on the visiting or foreign network assigns the Care-Of-Address to the mobile node. R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can...

Words: 538 - Pages: 3

Free Essay

Mis589 W5-6

...Reginald Smith Networking concepts and apps Keller school of graduates * R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address? The permanent address is the address of the mobile device this is the home of the device. While the care of address is the address that a mobile device gets when you move into someone else’s network. The take care of address is assigned by whoever network that the device is on. * R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Justify your answer. Message confidentiality us when two or more host communicate under secure circumstances using an encryption. Message integrity is the state of the data that is being transported whether it has been compromised. Yes you can have integrity without confidentiality using hash or sums in your message. You can but what is the point the purpose of the message confidentiality is so it cannot be sniffed out which relates to the integrity of the data . * R3. From a service perspective, what is an important difference between a symmetric-key system and a public-key system? From a service perspective the difference between a symmetric-key system and a public-key system the thing that stands out to me the most is in a symmetric key system both the person sending and the person receiving know the key while in a public...

Words: 309 - Pages: 2

Free Essay

Mis589 Week 4 You Decide

...Kimberly Pulda MIS 589 Week 4 You Decide To me there are a few important issues that need to be addressed. The first issue that needs to be fixed is from John Fischer. He states that his laptop operates at 10 megabits. That is really slow especially since it should have been running at 100 megabits. I would fix this by using a Category 6 UTP 1000 Base F Ethernet because it increases the maximum data transfer rate a hundredfold. For example it will take it from 10 megabits to 1 gigabyte per second! This type of transfer rate would definitely clear up congestion on the network, so there would not be issues in the morning when everyone is online doing attendance and checking emails. Even with the 23 other classrooms added to the network which will solve the principles issues with the slow network and the connection of all the classrooms. This type of bandwidth would make John happy because he is a HVAC Technician, and this will be usefull fort the remote access to his devices from home. This solution should make it easier for network accessories and peripherals such as printers and print servers. By working with such cabling with a built in CSMA/CD (Carrier Sense Multiple Access with Collision Detection) contention-based media access control technique, help address and solve the problem of collisions. To continue on, by assigning each network interface card (NIC) on each personal computer, it will minimize collisions to a number that users will not even see. Seeing...

Words: 587 - Pages: 3

Premium Essay

Mis589 Wk4 Mini-Case Mega Corp

...MIS589_WK4_Mini-case-MegaCorp_PC Questions: MegaCorp is a large manufacturing firm that operates 5 factories in Dallas, 4 factories in Los Angeles, and 5 factories in Albany, New York. It operates a tightly connected order management system that coordinates orders, raw materials, and inventory across all 14 factories. What type of WAN architecture and WAN service would you recommend? Why? Recommendations: When designing a WAN, numerous factors must be considered. Organizations attempting to connect multiple factories or offices and remote personnel must take into account a number of variables that will impact overall costs and network functionality. When designing and implementing wide area networks (WANs) that integrate voice, video, asynchronous and synchronous data and LAN traffic, all aspects of the organization's goals must be factored into the WAN design. Specific attention must also be paid to upfront cost, line charges, network throughput, security, and the inclusion of application and emerging technologies. Requirements will change, depending on whether you are creating a new network, modifying an existing network or integrating an existing network with other networks. Assuming there is an existing network, the next step is to inventory the network, identifying the circuits and all associated hardware (routers, firewalls) and software supporting the network, and summarizing all network-related expenses. Finally, access to network performance statistics (such as throughput...

Words: 622 - Pages: 3

Premium Essay

Mis589 Chapter 2: Mini-Case I. Deals-R-Us Brokers (Part 1)

...CHAPTER 2: MINI-CASE I. DEALS-R-US BROKERS (PART 1) Question 1: Classify the two alternatives in terms of what type of application architecture they use. a. The first suggested solution is a client-based architecture since it’s the client that tells the server what data to select to analyze, making the client perform most of the work.   b. The later architecture is two-tier Client-Server architecture since it requires an application layer, in this case, a web browser and all processing is done by the server. The server is responsible for the data and the client, the application and presentation. Using the web browser the client will talk to the web server using HTTP standard. Question 2: Outline the pros and cons of the two alternatives and make a recommendation to Fred about which is better. Solution 1:   Client-based Pros 1. This method will be much more inexpensive to implement as micro-computers are considerably cheaper versus mainframe. 2. Hardware devices from different manufacturers/platforms can function together on the same network. Solution 1:   Client-based Cons 1. Data always flows through the network between the client and the server. 2. So much data traffic on the network between client and host could put a significantly slow down the network thereby affecting performance and response time. Solution 2:   Two-Tier Client-Server Pros 1. Performance in this method will be better as processing is distributed to multiple machines (in this case...

Words: 359 - Pages: 2

Free Essay

Applied Reserach Course Project

...Applied Research Course Project Radames Ramirez RRamirez14@my.keller.edu MIS589 – Networking Concepts and Applications Instructor: Lynn Risley 3/10/2016 MIS589 Project Milestone 0Proposal Draft | Cloud infrastructure ServicesKaiser Permanente Hospitals | Prepared by: Radames RamirezDate: 03/03/2016 | Approved by: | 1. Description of the service-summary In an attempt to provide end users with a well maintained network storage that would be easily accessible from any location while maintaining a secured connection. To provide an environment to minimize the use and maintenance of local servers, server space, connectivity, and redundancy. | 2. Intended clients or customers The intended client or customer would be the end users of the company, this end users vary from medical office assistants, physicians, office managers, nurses, administrative assistants, receptionist, finance dept, insurance dept, medical records, and materials management to name a few. | 3. Business objective statementThe business objective is to minimize the cost of maintaining 40+ servers on a specified region, meanwhile providing for data storage, redundancy, and fast access to network files that would be housed in the cloud. | 4. Application architecture descriptionThe application architecture would consist of building a system that in scalable for future growth, it would possibly include emails servers, data servers, instant messaging. | 5. Information provided to the clientsThe clients...

Words: 3576 - Pages: 15

Premium Essay

Prosandcons

...Drew Tadgerson Networking Concepts & Apps Mini-Case DEAL-R-US BROKERS Part 1 MIS589 January 13, 2013 Shaun Gray MINI CASE – 1 DEAL-R-US BROKERS Questions A. Classify the two alternatives in terms of what type of application architecture they use. The first alternative in terms of application architecture is a client-based architecture. As it states that the downloaded tool will communicate with the DRUB server to select data and analyze, which is very similar to the client-based architecture where the clients tells the server what data to select and analyze and processes data will be sent back to the client for display. The second alternative in terms of application architecture is two-tier client-server architecture. The application logic can be partitioned between the client and the server. The server is responsible for the data and the client, the application and presentation. Using the web browser the client will talk to the web server using a standard called HTTP (Jerry Fitzgerald, 2009). B). Outline the pros and cons of the two alternatives and make a recommendation to Fred about which is better. Solution 1 Client-based architecture: Pros: 1. More inexpensive to implement as microcomputers are considerably cheaper versus mainframe. 2. Hardware of different manufactures or platforms can function together on the same network. Solution 1 Client-based architecture: Cons: 1. Data traffic must be sent and received between client and host. 2. Due to...

Words: 388 - Pages: 2

Free Essay

Is589 Mini Case Chapter 11

...MIS589 James Young Professor Gray Assessment of Belmont State Bank (mini case) 10/18/2012 The following document is a risk assessment on the financial institution Belmont State Bank. It will cover some of the findings and suggested solutions to remedy many of the security issues that were observed. Please review the associated cost of the suggestions/ recommendations to that should improve and correct issues with your current network. This report will cover network antivirus solution and pattern updates, desktop security, VPN, wireless access, network monitoring software, router restrictions and vendor access. In compliance with network overall security from malicious code, and to maintain the integrity of the network, listed are two tools to that will perform inventory of all company computers and network peripherals, that will ensure not only updated versions are installed but that all systems are compliant with software licensing: a. Manageengine ServiceDesk Enterprise edition, based on the number of technicians you have on staff of 250, I am recommending the 250 technician licenses that will cover over 3000 nodes, cost $2,995.00 this will scan all devices on your network, push all updates so that all systems are current, and only the updates that are required, these can be performed remotely to various machines, based on region/time zone during non-peak hours or if an emergency upgrade is required. b. Microsoft’s SSCM asset configuration software, much...

Words: 704 - Pages: 3