....narisetty•Chapter 6—Questions R17 R17. A permanent address for a mobile node is its IP address when it is at its home network. A care-of-address is the one its gets when it is visiting a foreign network. The COA is assigned by the foreign agent (which can be the edge router in the foreign network or the mobile node itself). •Chapter 8—Questions R1, R3, R29. R1. Confidentiality is the property that the original plaintext message can not be determined by an attacker who intercepts the ciphertext-encryption of the original plaintext message.Message integrity is the property that the receiver can detect whether the message sent (whether encrypted or not) was altered in transit. The two are thus different concepts,and one can have one without the other. An encrypted message that is altered in transmit may still be confidential (the attacker can not determine the original plaintext) but will not have message integrity if the error is undetected. Similarly, a message that is altered in transit (and detected) could have been sent in plaintext and thus would not be confidential. R3. In symmetric key systems, the keys of receiver and sender are identical and are secret. In public key systems, a pair of keys is used. One of the keys is known to both receiver and sender, or in other word, to the whole world, while the other key is known only by sender. That’s the major difference between the two systems. R29. Stateful and Stateless IP .. There are several advantages to...
Words: 320 - Pages: 2
...Silvio Kennedy MIS589 Week 5 Homework June 4, 2014 R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address? In mobile network a permanent address for a mobile node is its IP address when it is at its home network. A care-of-address is the one its gets when it is visiting a foreign network In the Mobile Internet Protocol (Mobile IP), a home address is the relatively permanent IP address given to a mobile node. The home address remains unchanged no matter where the mobile node is located. The Internet Engineering Task Force (IETF) defines the home address in RFC 2002, IP Mobility Support, which describes an enhancement to the Internet Protocol (IP) that makes it easier to replug a mobile device into networks other than its home network. Care-of-Address, on the other hand is, is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network. The care-of address identifies a mobile node's current point of attachment to the Internet and makes it possible to connect from a different location without changing the device's home address (permanent IP address). The Foreign Agent that on the visiting or foreign network assigns the Care-Of-Address to the mobile node. R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can...
Words: 538 - Pages: 3
...Reginald Smith Networking concepts and apps Keller school of graduates * R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address? The permanent address is the address of the mobile device this is the home of the device. While the care of address is the address that a mobile device gets when you move into someone else’s network. The take care of address is assigned by whoever network that the device is on. * R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Justify your answer. Message confidentiality us when two or more host communicate under secure circumstances using an encryption. Message integrity is the state of the data that is being transported whether it has been compromised. Yes you can have integrity without confidentiality using hash or sums in your message. You can but what is the point the purpose of the message confidentiality is so it cannot be sniffed out which relates to the integrity of the data . * R3. From a service perspective, what is an important difference between a symmetric-key system and a public-key system? From a service perspective the difference between a symmetric-key system and a public-key system the thing that stands out to me the most is in a symmetric key system both the person sending and the person receiving know the key while in a public...
Words: 309 - Pages: 2
...Kimberly Pulda MIS 589 Week 4 You Decide To me there are a few important issues that need to be addressed. The first issue that needs to be fixed is from John Fischer. He states that his laptop operates at 10 megabits. That is really slow especially since it should have been running at 100 megabits. I would fix this by using a Category 6 UTP 1000 Base F Ethernet because it increases the maximum data transfer rate a hundredfold. For example it will take it from 10 megabits to 1 gigabyte per second! This type of transfer rate would definitely clear up congestion on the network, so there would not be issues in the morning when everyone is online doing attendance and checking emails. Even with the 23 other classrooms added to the network which will solve the principles issues with the slow network and the connection of all the classrooms. This type of bandwidth would make John happy because he is a HVAC Technician, and this will be usefull fort the remote access to his devices from home. This solution should make it easier for network accessories and peripherals such as printers and print servers. By working with such cabling with a built in CSMA/CD (Carrier Sense Multiple Access with Collision Detection) contention-based media access control technique, help address and solve the problem of collisions. To continue on, by assigning each network interface card (NIC) on each personal computer, it will minimize collisions to a number that users will not even see. Seeing...
Words: 587 - Pages: 3
...MIS589_WK4_Mini-case-MegaCorp_PC Questions: MegaCorp is a large manufacturing firm that operates 5 factories in Dallas, 4 factories in Los Angeles, and 5 factories in Albany, New York. It operates a tightly connected order management system that coordinates orders, raw materials, and inventory across all 14 factories. What type of WAN architecture and WAN service would you recommend? Why? Recommendations: When designing a WAN, numerous factors must be considered. Organizations attempting to connect multiple factories or offices and remote personnel must take into account a number of variables that will impact overall costs and network functionality. When designing and implementing wide area networks (WANs) that integrate voice, video, asynchronous and synchronous data and LAN traffic, all aspects of the organization's goals must be factored into the WAN design. Specific attention must also be paid to upfront cost, line charges, network throughput, security, and the inclusion of application and emerging technologies. Requirements will change, depending on whether you are creating a new network, modifying an existing network or integrating an existing network with other networks. Assuming there is an existing network, the next step is to inventory the network, identifying the circuits and all associated hardware (routers, firewalls) and software supporting the network, and summarizing all network-related expenses. Finally, access to network performance statistics (such as throughput...
Words: 622 - Pages: 3
...CHAPTER 2: MINI-CASE I. DEALS-R-US BROKERS (PART 1) Question 1: Classify the two alternatives in terms of what type of application architecture they use. a. The first suggested solution is a client-based architecture since it’s the client that tells the server what data to select to analyze, making the client perform most of the work. b. The later architecture is two-tier Client-Server architecture since it requires an application layer, in this case, a web browser and all processing is done by the server. The server is responsible for the data and the client, the application and presentation. Using the web browser the client will talk to the web server using HTTP standard. Question 2: Outline the pros and cons of the two alternatives and make a recommendation to Fred about which is better. Solution 1: Client-based Pros 1. This method will be much more inexpensive to implement as micro-computers are considerably cheaper versus mainframe. 2. Hardware devices from different manufacturers/platforms can function together on the same network. Solution 1: Client-based Cons 1. Data always flows through the network between the client and the server. 2. So much data traffic on the network between client and host could put a significantly slow down the network thereby affecting performance and response time. Solution 2: Two-Tier Client-Server Pros 1. Performance in this method will be better as processing is distributed to multiple machines (in this case...
Words: 359 - Pages: 2
...Applied Research Course Project Radames Ramirez RRamirez14@my.keller.edu MIS589 – Networking Concepts and Applications Instructor: Lynn Risley 3/10/2016 MIS589 Project Milestone 0Proposal Draft | Cloud infrastructure ServicesKaiser Permanente Hospitals | Prepared by: Radames RamirezDate: 03/03/2016 | Approved by: | 1. Description of the service-summary In an attempt to provide end users with a well maintained network storage that would be easily accessible from any location while maintaining a secured connection. To provide an environment to minimize the use and maintenance of local servers, server space, connectivity, and redundancy. | 2. Intended clients or customers The intended client or customer would be the end users of the company, this end users vary from medical office assistants, physicians, office managers, nurses, administrative assistants, receptionist, finance dept, insurance dept, medical records, and materials management to name a few. | 3. Business objective statementThe business objective is to minimize the cost of maintaining 40+ servers on a specified region, meanwhile providing for data storage, redundancy, and fast access to network files that would be housed in the cloud. | 4. Application architecture descriptionThe application architecture would consist of building a system that in scalable for future growth, it would possibly include emails servers, data servers, instant messaging. | 5. Information provided to the clientsThe clients...
Words: 3576 - Pages: 15
...Drew Tadgerson Networking Concepts & Apps Mini-Case DEAL-R-US BROKERS Part 1 MIS589 January 13, 2013 Shaun Gray MINI CASE – 1 DEAL-R-US BROKERS Questions A. Classify the two alternatives in terms of what type of application architecture they use. The first alternative in terms of application architecture is a client-based architecture. As it states that the downloaded tool will communicate with the DRUB server to select data and analyze, which is very similar to the client-based architecture where the clients tells the server what data to select and analyze and processes data will be sent back to the client for display. The second alternative in terms of application architecture is two-tier client-server architecture. The application logic can be partitioned between the client and the server. The server is responsible for the data and the client, the application and presentation. Using the web browser the client will talk to the web server using a standard called HTTP (Jerry Fitzgerald, 2009). B). Outline the pros and cons of the two alternatives and make a recommendation to Fred about which is better. Solution 1 Client-based architecture: Pros: 1. More inexpensive to implement as microcomputers are considerably cheaper versus mainframe. 2. Hardware of different manufactures or platforms can function together on the same network. Solution 1 Client-based architecture: Cons: 1. Data traffic must be sent and received between client and host. 2. Due to...
Words: 388 - Pages: 2
...MIS589 James Young Professor Gray Assessment of Belmont State Bank (mini case) 10/18/2012 The following document is a risk assessment on the financial institution Belmont State Bank. It will cover some of the findings and suggested solutions to remedy many of the security issues that were observed. Please review the associated cost of the suggestions/ recommendations to that should improve and correct issues with your current network. This report will cover network antivirus solution and pattern updates, desktop security, VPN, wireless access, network monitoring software, router restrictions and vendor access. In compliance with network overall security from malicious code, and to maintain the integrity of the network, listed are two tools to that will perform inventory of all company computers and network peripherals, that will ensure not only updated versions are installed but that all systems are compliant with software licensing: a. Manageengine ServiceDesk Enterprise edition, based on the number of technicians you have on staff of 250, I am recommending the 250 technician licenses that will cover over 3000 nodes, cost $2,995.00 this will scan all devices on your network, push all updates so that all systems are current, and only the updates that are required, these can be performed remotely to various machines, based on region/time zone during non-peak hours or if an emergency upgrade is required. b. Microsoft’s SSCM asset configuration software, much...
Words: 704 - Pages: 3