...queuing delay is a queue that is construct because there are many packet is currently trying to communicate. 2. Internet’s connection oriented service is using preliminary protocol for reaching a reliable connection before the data is sent. It grants data will arrive in proper place. For imply it, each end point ought to transmit to be able to communicate. 4. Five layer internet protocol stack are: Application, transport, network, link, physical. Transport layer is a transporter that send or transfer application messages among application endpoints. Network layer takes responsibility for moving network layer packets from one host to another. Network layer is facilitating services of delivering segment to transport layer to destination. 7. Passive security attack: wiretapping, port scanner, idle scan. Active security attack: denial of service attack, spoofing, ping flood, smurf attack. Wiretapping is a stalking of conversation (monitoring) to get information by historical. Port scanner is an application that using for investigating host for open port. Idle scan is transferring spoofed packet to computer to seeking service that available. Denial of service attack is an attack that making the network or resource unavailable to the users, which interrupting or suspending the service of host connected to internet. Spoofing is undercover program that faking a data for gaining advantages. Ping flood is simple denial of service attack with sending a ping packet. Smurf attack is distributed...
Words: 515 - Pages: 3
...1. Avoiding the risk of infiltration, we must ensure that the system does not kemasukaan intruder who can read, write and execute programs that could disrupt or destroy our system. 2. Reduce the risk of threats, it is customary for institutions and private companies. There are several types of intruders that can attack the system that we have, among others: a. Si Want to Know, type of intruder is basically interested in finding the type of system that we use. b. Destroyer, this type of intruder wants to damage the system that we use or change the screen display that we make. c. Infiltrate to the popularity, the intruder is using our system to achieve the popularity of her own, the higher the security system that we make, the more make him curious. If he managed to get us to a system that is a means for him to promote himself. d. The competitor, the intruder is more interested in the existing data in the system that we have, because he assumes we have something that can mengguntungkan him financially or even harm him (the intruder). 3. Protecting the system from vulnerabilities, keretanan will make our system has the potential to provide unauthorized access to other people who are not eligible. 4. Protecting the system from natural disturbances such as lightning and others. In line with the increasingly complex and increasingly rapid advancement of information technology, it will be increasing the risk concerning data security today. For those of us who are accustomed to using...
Words: 539 - Pages: 3
...2. About AODV: a. The structure of RREQ sent by A (assuming that A doesn’t know the sequence number of D) Destination ID Destination Sequence# Source ID Source Sequence# Hop Count D 0 A 13 0 A increases sequence number before sending RREQ and destination sequence number of D is 0, because A doesn’t know the sequence number of D. b. The backward routing table at F, C and D. Backward routing table at F, Destination ID Via Distance Sequence # A B 2 13 Backward routing table at C, Destination ID Via Distance Sequence # A B 2 13 Backward routing table at D, Destination ID Via Distance Sequence # A C 3 13 c. Destination node is D, hence D will stop flooding RREQ and send RREP to A. So, E will not receive RREQ. Meanwhile, H will receive RREQ from node G, as C will flood RREQ to node G and from G to H. d. The forwarding routing table at A after receiving RREP from D, Destination ID Via Distance Sequence # D B 3 22 e. If node E moves away, will D detect it? Will D propagate this link break to other node? Why? • Yes, D can detect link break between D and E, since the nodes periodically communicate with a “Hello” message in AODV. When E doesn’t respond to node D’s message, D will record it as a link break • Link failure information is sent to active neighbors only and E is not active, because it is not involved in transferring data. So D will not propagate this link break to other nodes. f. The link between A and B is broken, as A moves away from...
Words: 547 - Pages: 3
...Each node keeps its sequence number and broadcast ID. For every RREQ the node originates broadcast ID which is increased and together with the node's IP address uniquely identifies an RREQ. At the end that route will be the concluding route that has the minimum hop count from source to destination. 2. Proactive Protocols: - It keeps the routing data even before it is desired. They try to keep up to date information from each node to every other node in the network. Routes data is generally kept in the routing tables and is occasionally updated as the network topology differs. Proactive routing protocols are driven with the help of tables. The routes are updated continuously and when a node wants to route packets to another node, it uses an already available route. These protocols maintain routes to all possible destinations even though a few of the routes may not be needed. Every node in the network keeps tables of routes and when the network topology differs, updates are sent across the network. The most common types of the proactive type are destination sequenced distance vector (DSDV) routing protocol and optimized link state routing (OLSR) protocol. • Destination Sequenced Distance Vector (DSDV):- The DSDV protocol demands that each mobile station in the network must continually; advertise to each of its neighbors, its own routing table. Since, the entries in the table my differ very quickly, the advertisement should be made regularly to ensure that every node can locate...
Words: 1800 - Pages: 8
...1.6.7 MANET CHALLENGES A Manet environment has to overcome certain issues of limitation and inefficiency. It includes: The wireless link characteristics are time-varying in nature: There are transmission impediments like fading, path loss, blockage and interference that adds to the susceptible behavior of wireless channels. The reliability of wireless transmission is resisted by different factors. Limited range of wireless transmission – The limited radio band results in reduced data rates compared to the wireless networks. Hence optimal usage of bandwidth is necessary by keeping low overhead as possible. Packet losses due to errors in transmission – MANETs experience higher packet loss due to factors such as hidden terminals that results in collisions, wireless channel issues (high bit error rate (BER)), interference, and frequent breakage in paths caused by mobility of nodes, increased collisions due to the presence of hidden terminals and uni-directional links. Route changes due to mobility- The dynamic nature of network topology results in frequent path breaks. Frequent network partitions- The random movement of nodes often leads to partition of the network. This mostly affects the intermediate nodes [18]. 1.7 MOBILE ADHOC NETWORK SECURITY ISSUES Securities Issues: It is necessary to find out how we can judge a mobile ad hoc network is secure or not, or in other words, what should be covered in the security issues for the mobile ad hoc...
Words: 773 - Pages: 4
...For purpose of network paralysis, DDoS attack occupies a lot of cyber source by sending massive number of legitimate requests. This attack mode can be divided into the following 4 categories: Disturb or block the normal network communication by making the network overload; Through a large number of requests submitted to the server, the server overload; Blocking users get access to the server; Blocking a service communicate with a particular system or person. IP spoofing is the approach that hackers send false packet to the server for deception server. Specifically, it set the source IP address in the packet to inexistence or legitimate value. The server once receiving the packet will try to return to accept the request packet. In fact this package never returns to the source computer. This approach makes the server must open their listening port continue to wait. It wasted all aspects of system resources. This mode of attack is similar to SYN floods. However, in the LAND attack attacks, the original address and the destination address in the packet are both IP address of attacked targets. This attack will cause the attacked machine falls into an infinite loop, and eventually it will run out of resources and crash. The ICMP floods sends broadcast message to the router with improper settings to keep system resources occupied. Application level floods mainly aimed at the application layer. Its purpose is consuming a large number of system resources for the purpose to persecute the...
Words: 1181 - Pages: 5
...deploys sensor nodes that have a short transmission distance in large numbers to monitor the entire area. 5. Adaptability: The WSN system should be adaptable to changes such as addition of more nodes, failure of nodes, environmental conditions and thus unlike traditional networks, where the focus is on maximizing channel throughput or minimizing node deployment, the major consideration in a sensor network is to extend the network lifetime besides system robustness. 6. Application Awareness: A WSN is not a general purpose network. In order to deploy it for specific application, the WSN protocols should consider application-specific trade-offs in terms of complexity, resource usage and communication patterns to improve network efficiency. 7. Lack of Global Identification: Due to large number of sensor nodes in a sensor network the Global Identification (GID) is generally not possible. Although in some cases, the Global Positioning System (GPS) provides positioning information to sensor nodes but it requires line of sight to several satellites, which is generally not available inside of buildings, beneath dense foliage, underwater, when jammed by an enemy or during MARS exploration etc. 8. Storage, Search and Retrieval: The sensor network can produce a large volume of raw data such as continuous time series of observations over all points in space covered by the network. Since the data source is continuous traditional databases are not suitable for WSNs. 9. Data centric processing:...
Words: 1568 - Pages: 7
...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...
Words: 496 - Pages: 2
...to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database...
Words: 1834 - Pages: 8
...| Unit 3. Exercise 1. | | Specifications - Definitions | | Unit 3. Exercise 1. | | Specifications - Definitions | NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi 1. Application (in terms of cabling infrastructure): The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exists.. (OSI_model#Layer_7:_application_layer) 2. Unshielded twisted-pair: UTP cable is a popular cable used in computer networking that consists of two shielded wires twisted around each other. In the image to the right, is an example of the different network cables you're likely to encounter. (/jargon/u/utpcable.htm) 3. Shielded Twisted-pair: Twisted Pair (STP) has a fine wire mesh surrounding the wires to protect the transmission; Unshielded Twisted Pair (UTP) does not. Shielded cable is used in older telephone networks, network, and data communications to reduce outside interference. In the picture to the right, is an example of what these cables look like inside. (jargon/t/twispair.htm) 4. Fiber-Optic cable: A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing. These...
Words: 1317 - Pages: 6
...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...
Words: 10839 - Pages: 44
...NT1310 Unit 6 Exercise 1 Luz Garcia 7/22/14 Connector Installations Twisted-pair cable: Step 1: Measure the cable you want to put ends on and trim it to the proper length using the cable cutter. Step 2: Use the cable stripper to strip about 1.5" of the jacket from the end of the cable. Then, rotate the stripper around the cable twice. This will cut through the jacket. Step 3: Remove the stripper from the cable and pull the trimmed jacket from the cable, exposing the inner conductors. If a jacket slitting cord (usually a white thread) is present, separate it from the conductors and trim it back to the edge of the jacket. Step 4: Untwist all the inner conductor pairs and spread them apart so that you can see each individual conductor. Step 5: Line up the individual conductors so that the color code matches the color-coding standard you are using. Step 6: This step includes two points. First, trim the conductors so that the ends are even with each other, making sure that the jacket of the cable will be inside the connector. Second, the total length of exposed connectors after trimming should be no longer than 0.5" to 0.625". Step 7: Insert the conductors in the connector, ensuring that all conductors line up properly with the pins as they were in the previous step. If they don't line up, pull them out and line up. Do this carefully, as it's the last...
Words: 591 - Pages: 3
...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...
Words: 6762 - Pages: 28
...Montie Ramsarran August 11th, 2014 NT1310 Mr. Amos Unit 9 Exercise 1 Light Source and Components-Definitions 1. Forward Biased LED: A bias voltage that is applied to a pn-junction in the direction that causes a large current flow; used in some semiconductor diode circuits. 2. Incoherent Light: Light in which the electric and magnetic fields of photons are completely random in orientation. Incoherent light is typically emitted from light bulbs and LEDs. 3. Laser: Acronym for light amplification by stimulated emission of radiation. The laser produces a coherent source of light with a narrow beam and a narrow spectral bandwidth (about 2cm). Lasers in fiber optics are usually solid-state semiconductor types. Lasers are used to provide the high-powered, tightly controlled light wave lengths necessary for high-speed, long-distance optical fiber transmissions. 4. Output Pattern: A setting that selects the output pattern for comparison outputs. This enables outputs for changes in levels rather than just upper/lower limit comparisons to set value. It can be set according to the control applications. Note: The settings must be as follows for correct zone outputs. 5. Output Power: The useful signal or power delivered by a circuit or device. 6. Modulation Speed: (1) Coding of information onto the carrier frequency. Types of modulation include amplitude modulation (AM), frequency modulation (FM), and phase modulation...
Words: 1207 - Pages: 5
...degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...
Words: 2573 - Pages: 11