...ASSIGNMENT # 03 (DATA COMMUNICATION AND NETWORKS) ANS 1: WIRESHARK:- As we all know well that networking and communication of computers happens worldwide in the terms of packets. Data divides into the packets like IP packets and then these packets travels over a network and then reaches its end point where packets then reassembled and the data or information is delivered to the destination. But there is a requirement of packet analyzers to analyze and captures the packet which reaches to the machine. Wireshark is the best open source packet analyzers available in market now a days. Wireshark is the best GUI based open source packet analyzer. Wireshark provides some following features: • It is available for windows and UNIX operating system. • It...
Words: 579 - Pages: 3
...White Paper Food Service and Data Synchronization Sponsored by June 2006 Acknowledgements The International Food Distributors Association (IFDA) and GS1 US™ would like to thank the EFR/GS1 US Committee for their work on this paper. Additionally, the following participants of the committee were critical to the development of this document. Data Synchronization Committee Mark Barnekow Todd Brindley Allan Eklund Jodi Miller Pam Tann Lela Tripp Janet Zlokovich Amphire ConAgra Foods United Foodservice Purchasing Co-op, LLC Land O’ Lakes, Inc. SYSCO, Inc Tyson Foods, Inc Answers Systems, Inc IFDA is a Washington, D.C. based trade organization representing foodservice distributors throughout the U.S., Canada, and internationally. IFDA’s 130+ members include broadline, systems, and specialty foodservice distributors that supply food and related products to restaurants, institutions, and other food away from home foodservice operations. IFDA members operate more than 550 facilities, and sell more than $75 billion in food and related products to the fastest growing sector in the food industry. GS1 US is a not-for-profit organization dedicated to the adoption and implementation of standards-based, global supply chain solutions. GS1 US-based solutions, including business processes, GS1 Business Message Standards using Extensible Markup Language (XML), Electronic Data Interchange (EDI), and the bar code identification standards of the GS1 System, formerly the EAN...
Words: 6802 - Pages: 28
...R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address? Answer: A permanent address is the home address and care of address is the given address of the device such as mobile. Permanent address is where mobile devices live. Care of address is given to the mobile device by the foreign agent when a device entire to another network area. Permanent address will get all the derive data and then the home agent forward data/messages onto the other network via the care of address. After that mobile device directly responds to the correspondent. R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Justify your answer. Answer: Confidentiality is the property that the original plaintext message cannot be determined by an attacker who intercepts the cipher text-encryption of the original plaintext message. Message integrity is the property that the receiver can detect whether the message sent (whether encrypted or not) was altered in transit. The two are thus different concepts, and one can have one without the other. An encrypted message that is altered in transmit may still be confidential but will not have message integrity if the error is undetected. Similarly, a message that is altered in transit (and detected) could have been sent in plaintext and thus would not be confidential Message confidentiality...
Words: 528 - Pages: 3
...Having a secure WLAN is very important, I would even go to say more important than a normal LAN. One way to secure a WLAN is to use encryption. This uses a key that will encrypt and decrypt data on the WLAN so only people what the key would be able to connect to the network. The encryption needs to be strong or a sniffer will crack the key so using a WPA2 would be best. Another way would be to simple change the SSID or ESSID. The reason this is a good way to secure a WLAN is because in most cases if you didn’t change the SSID a hack would think that you didn’t do anything to your network, making it easier to hack. “Though knowing the SSID does not allow anyone to break into your network, it usually indicates that the person hasn't taken any steps to protect their network, thus these networks are the most common targets” ("How to secure," 2007). The ramification of your WLAN being breached could be many things. The first thing I can think of is data theft and by that personal or secret information if someone can get on your WLAN. Also they could be trying to disrupt your network to cause damage or just want to ride on your wireless to gain access to the Internet. I think that stolen information would be the biggest threat. Reference: How to secure a wlan. (2007, February 15). Retrieved from...
Words: 254 - Pages: 2
...Source Address | Destination | Payload | Week 3 The Network Intrusion Detection Engine Network based IDS engines process a stream of time sequential TCP/IP packets to determine a sequence of patterns. Patterns are also known as signatures. Most network signatures are based on the contents of the packets (Packet Content Signature = Payload of a packet). Patterns are also detectable in the header and flow of the traffic, relieving the need for looking into packets. Operational Concept Two primary operational modes 1. Tip off - Look for something new, something not previously classified. 2. Surveillance - Look for patterns from "targets" Forensic work bench * Same tool as in surveillance * Monitor online transactions * track network growth - PCs; mobile devices * System services usage * Identify unexpected changes in the network Benefits of a Network IDS 1. Outsider Deterrence - Make life hard for the hackers 2. Detection - Deterministic; Stochastic 3. Automated Response and Notification - Notifications(email, SNMP, pager, onscreen, audible) Response: Reconfigure router/firewalls; Doing a counter attack is not smart; Lose the connection. Challenges for network based technologies 1. Packet reassembly - Broken packets might not be enough detection. Pattern broken into different packets. 2. High Speed Networks - Flooding and dropping of packets 3. Anti Sniff (Sniffer Detection) - Designed by hackers to detect IDS. Find...
Words: 360 - Pages: 2
...Kudler Fine Foods Integrated Network Design Project Network’s fundamental characteristics and network components The company I chose to do my paper on is Kudler Fine Foods they have three different locations the home office is La Jolla, a Del Mar store, and the Encinitas store on their network that are interconnected on a WAN through a T3 line. The La Jolla stores network is built around a 100baseT environment the main server is an IBM blade server system C3000 that uses UNIX, and backed up with a10TB NAS, and 5KVA APD UPS that provides power backup. This server runs the corporate SAP ERP SW, the network services, e-mail, storage control, printer/file services, and the Internet. The retail store uses NCR Real POS 82XRT POS terminals and systems. At this time they have 19 Dell Vostro computers that share 3 HP networked printers these components are used by corporate management and other admin personnel. The communication that comes in or out of the La Jolla store runs through 2 cisco routers, and firewalls they help to provide an inter-store dedicated network and a separate 25Mbps link to the Ethernet. This location also has 19 VOIP phones. Del Mar and Encinitas Store Networks both are basically the same as the La Jolla store the only differences are they both have 6 Dell Vostro computers with 1 HP laser jet multifunction networked printer...
Words: 4397 - Pages: 18
...Chapter 1 Data Communications Introduction 1 Chapter Objectives: Defined data communications Introduced data communications needs Communications model Overview of networks Introduce Internet 2 Data, Data Communication Data is an entity that convey some meaning based on some mutually agreed upon rules/conventions between a sender and a receiver. Data Communication deals with the transmission of signals in a reliable and efficient manner 3 Data Communication Topics covered include: Signal Transmission Transmission Media Signal Encoding Interfacing Data link control Multiplexing 4 Computer Science and Data Communications Merger In 1970s and 1980s The computer communications revolution has produced several remarkable facts. There is no fundamental difference between data processing (computers) and data communications (transmission and switching equipment). There is no fundamental difference among data, voice, and video communications. The distinction among single processor computer, multiprocessor computer, local network, metropolitan network, and long-haul network has blurred. 5 Today’s Trends Three different forces have consistently driven the architecture and evolution of data communications and networking facilities: Traffic growth Development of new services Advances in technology 6 Communication Traffic Both local (within a building or building complex) and Long distance having transmission of Voice, video and data The increased emphasis on office automation...
Words: 2260 - Pages: 10
...KFF Network Design NTC/362 – Fundamentals of Networking Tom Krawczyk September 12, 2015 Primer Information technology is an essential part of many businesses today, and this is evident in the ways many companies are increasingly relying on their computers to optimize their businesses. It is also not uncommon for businesses of distinct sizes to utilize multiple computers in their offices, with these computers interconnected through networks to allow information sharing between computers. Computer networking is even more required in businesses with multiple offices, and these locations could sometimes cut across different geographical boundaries. Kudler Fine Foods (KFF) epitomizes such business concerns that optimize its with computer networking. The company, located in San Diego, was founded in June 18, 1998, and it is a local specialty food store with three locations within the USA. However, the organization has evolved since its formation and seems to have outgrown its present network infrastructure. As such, to successfully compete in ever challenging business climate, KFF requires enterprise upgrade, and the goals of proposed network are modern technologies for data collection, information protection, and enterprise communication coupled with optimal data speeds and network access. This upgrade will not only enable transform KFF into a 21st century organization, but it will also enhance its productivity and giving it...
Words: 4257 - Pages: 18
...DATA COMMUNICATIONS First Semester 2012-2013 CMSC 137 Data Communications and Networking ICS-UPLB JAC Hermocilla Data Communications ● Communication involves information sharing : local or remote Telecommunication – communication at a distance – ● telephony, telegraphy, television ● Data communications – the exchange of data between devices via some form of transmission medium such as wire cable – data - information presented in whatever form agreed upon by parties creating and using data ● Devices must be part of a data communications system (DCS) , a combination of hardware and software First Semester 2012-2013 CMSC 137 Data Communications and Networking ICS-UPLB JAC Hermocilla Effective DCS ● Delivery – Must deliver data to the correct destination Must deliver data accurately Must deliver data in a timely manner Must consider variations in the packet arrival time CMSC 137 Data Communications and Networking ICS-UPLB JAC Hermocilla ● Accuracy – ● Timeliness – ● Jitter – First Semester 2012-2013 Components of a DCS (1) ● Message – Information to be communicated Device that sends the message: computer, phone Device that receives the message: computer, phone Physical path by which a message travels from sender to receiver: twisted-pair wire, coaxial cable, fiber optics, radio waves A set of rules that govern data communications An agreement between the communicating devices ● ...
Words: 2060 - Pages: 9
...Kudler Fine Foods Integrated Network Design Project Network’s fundamental characteristics and network components The company I chose to do my paper on is Kudler Fine Foods they have three different locations the home office is La Jolla, a Del Mar store, and the Encinitas store on their network that are interconnected on a WAN through a T3 line. The La Jolla stores network is built around a 100baseT environment the main server is an IBM blade server system C3000 that uses UNIX, and backed up with a10TB NAS, and 5KVA APD UPS that provides power backup. This server runs the corporate SAP ERP SW, the network services, e-mail, storage control, printer/file services, and the Internet. The retail store uses NCR Real POS 82XRT POS terminals and systems. At this time they have 19 Dell Vostro computers that share 3 HP networked printers these components are used by corporate management and other admin personnel. The communication that comes in or out of the La Jolla store runs through 2 cisco routers, and firewalls they help to provide an inter-store dedicated network and a separate 25Mbps link to the Ethernet. This location also has 19 VOIP phones. Del Mar and Encinitas Store Networks both are basically the same as the La Jolla store the only differences are they both have 6 Dell Vostro computers with 1 HP laser jet multifunction networked printer...
Words: 4396 - Pages: 18
...Digital Business Networks (Dooley) Chapter 1 Elements of Data Communications: Analog and Digital 1.1 Multiple Choice Questions 1) What are the five evolution phases of data communications? A) digitization, growth of data gathering, an era of delegation, the Internet as a common tool, and pervasive computing B) analog signals, growth of data communications, an era of deregulation, the Internet as a common tool, and pervasive computing C) digitization, growth of data communications, an era of deregulation, the Internet as a common tool, and pervasive computing D) digitization, growth of data communications, an era of deregulation, the evolution of Voice-over-IP (VoIP) as a common tool, and pervasive computing Answer: C Diff: 2 Page Ref: 3 2) In what year did computer technology begin to transform our social, economic, and governmental infrastructures? A) 1960s, when Internet became a core in our technology B) 1950s, when ARPA research was formed C) 1980s, when the Internet was introduced D) 1990s, when the Internet was enhanced Answer: A Diff: 2 Page Ref: 3 3) The technology used in the 1960s called ________ was/were very large and expensive and used proprietary architectures that did not support cross-platform communications. A) Department of Defense PCs B) the Internet C) personal computers D) mainframes Answer: D Diff: 1 Page Ref: 3 4) The term ________ generally refers to a technology or product that is copyrighted and not...
Words: 6142 - Pages: 25
...assortment of distinct networks that functions as a single large network. Internetworking denotes to the industry, products, and procedures that meet the challenge of crafting and governing internetworks. (Corner & Stevens, 1952) The first networks were time-sharing networks that used mainframes and attached terminals. Local-area networks progressed around the PC insurrection. (Davidson & Muller, 1992) LANs allowed numerous operators in a somewhat trifling area to interchange files and messages, as well as access shared resources. Wide-area networks interconnect LANs with geographically disseminated users to create connectivity. (Davidson & Muller, 1992) Though it is quite simple to visualize internetwork, implementing a practical internetwork is no unpretentious job. Many encounters must be tackled, especially in the areas of connectivity, reliability, network management, and flexibility. Each area is plays a key role in inaugurating a proficient and operative internetwork. The test when connecting various systems is to support communication among disparate technologies. Different sites, for example, may use different types of media operating at varying speeds, or may even include different types of systems that need to communicate. Because establishments depend comprehensively on data communication, internetworks must deliver a certain level of steadfastness. This is a volatile world; so many large internetworks include redundancy to allow for communication even when problems...
Words: 1649 - Pages: 7
...06/29/2015 Importance of Communication Protocols Communications protocols are a very important communication capability. Communications protocols allow two systems or more to communicate effectively and to pass data over a network and between different communication devices. Communication protocols allows for the process of breaking data down into tiny packets that are the encrypted and signed by the sending device. Each of these packets are sent individually to cut down on errors. If any errors occur, instead of resending the whole line of data it is only necessary to send that specific packet to complete the transfer. Communications protocols also allow you to have secure and private communications when transferring data. Each packet we previously discussed has a header imbedded in its data that signifies where it is going. It will then only open on the device it has been addressed to. Also if someone were to intercept one of your packages it is still not the whole transfer since all the data is sent separately in smaller packages and they wouldn’t receive the full data transfer. There are many different kinds of protocols that govern how computers interact with each other through the internet and govern how they communicate most effectively. Common communication protocols include everything from how the data is secure to how the packets are structured and sent. Identifying Protocols/Network Architecture The links of communication and how they will be realized...
Words: 932 - Pages: 4
...BISE – RESEARCH PAPER Analysis of Informal Communication Networks – A Case Study It is becoming more and more important for knowledge workers to increase their productivity. However, there is a general lack of (semi-)automated, IT-supported data collection and evaluation approaches that allow insights into the processes and structures of an enterprise’s internal networks and the activities of its knowledge workers. The article presents a prototype of an IT-supported instrument (“Social Badges”) that supports automatic collection of informal, personal interaction between (knowledge) workers within an enterprise. The authors’ aim is to introduce a novel approach which improves data quality over legacy methods. The approach uses Social Network Analysis (SNA) to make it easier for executives to analyze and manage informal communications networks. Its practical applicability is demonstrated by a case study. DOI 10.1007/s12599-008-0018-z The Authors Dr. Kai Fischbach Prof. Dr. Detlef Schoder Seminar for Business Informatics and Information Management University of Cologne Pohligstr. 1 50969 Cologne Germany {fischbach | schoder}@ wim.uni-koeln.de 1 Introduction If the formal organization is the skeleton of a company, the informal is the central nervous system driving the collective thought processes, actions, and reactions of its business units. (Krackhardt and Hanson 1993, p. 104) Both the volume and importance of knowledge workers are growing as industrialized countries...
Words: 3796 - Pages: 16
...instance, to dial a number 8 a telephone would have to interrupt the electrical signal 8 times. A pause signifies the completion of the first dialed numbered and the system prepares to receive the next number. Voice and Data Communication Systems Voice and data communication systems are the backbones of modern business organizations. Without these systems, business would quickly crumble due to competitors’ ability to leverage such systems to communicate changes in the market and other required business information very quickly. If my business had more than one employee and more than one location, then getting information from one point to the other without a voice or data network could potentially take long enough that my company would lose out on profits to my competitors. In short, voice and data communication systems enable businesses to survive in what has now become a world that moves at the speed of light. In this article, I will describe the voice and data communication systems I use to perform my job as an online reseller. The Telephone System I pay a monthly service fee to AT&T so that my home telephone is allowed to access the PSTN. The PSTN is a circuit switching network, which means a dedicated circuit is opened for a communication until that communication is closed by either of the involved parties. When I lift the handset, the hook switch inside my telephone closes and connects my telephone to the central switch. Dialing the number I wish to call informs the central...
Words: 928 - Pages: 4