SlideShare une entreprise Scribd logo
1  sur  82
Télécharger pour lire hors ligne
Mat 540 Quiz 3
Quiz #1:
What are the ways in which we can keep a check on the number of duplicate packets generated due
to the Flooding Routing technique?.
Answers;
Techniques used to avoid flood duplication.
1. Include HOP COUNTER in the header packet which decrement at each hop along the path
2. Keep tracking of packed that have been flooded, to avoid sending them a second time. Where
Source Router puts a sequence number in each packet it receives from its hosts.
3. Use selective flooding. In selective flooding the routers do not send every incoming packet out on
every output line. Instead packet is sent only on those lines which are approximately going in the
right direction
Also in some books are highlighted as
Use of Hop Counter or Time to live (TTL) ... Show more content on Helpwriting.net ...
What is it? Answer:
Store–and–Forward: Store–and–Forward switching will wait until the entire frame has arrived prior
to forwarding it. This method stores the entire frame in memory. Once the frame is in memory, the
switch checks the destination address, source address, and the CRC. If no errors are present, the
frame is forwarded to the appropriate port. This process ensures that corrupted or truncated frames
do not affect the destination network. While
Cut–Through: Cut–Through switching will begin forwarding the frame as soon as the destination
address is identified. The difference between this and Store–and–Forward is that Store–and–
Forward receives the whole frame before forwarding. Since frame errors cannot be detected by
reading only the destination address, Cut–Through may impact network performance by forwarding
corrupted or truncated frames.
These bad frames can create broadcast storms where in several devices on the network respond to
the corrupted frames simultaneously.
Quiz #4:
Very briefly explain the Optimality Principle and the use of Spanning Trees in routing schemes
Answer:
Spanning Tree: The packet is sent only on those links that lead to the destination
... Get more on HelpWriting.net ...
The Debate Over The Internet
The Internet in the year 2009. We send e–mails, make calls over the internet and discuss topics we
take an interest in. Even our banking is going virtual. But what we take for granted today was only a
vague idea fifty years ago. In order to understand how we got this far Let's go back to 1957, when
everything began. Before 1957 computers only worked on one task at a time. This is called batch
processing. Of course, this was quite ineffective. With computers getting bigger and bigger they had
to be stored in special cooled rooms. But then the developers couldn 't work directly on the
computers anymore – specialists had to be called in to connect them. Programming at that time
meant a lot of manual work and the indirect connection to the computers led to a lot of bugs,
wasting time and fraying the developers´ nerves. The year 1957 marked a big change. A remote
connection had to be installed so the developers could work directly on the computers. At the same
time the idea of time–sharing came up. This is the first concept in computer technology to share the
processing power of one computer with multiple users. On October 4th 1957, during the Cold War
The first unmanned satellite, Sputnik 1, was sent into orbit by the Soviet Union. The fear of a
"Missile Gap" emerged. In order to secure America 's lead in technology, the US founded the
"Defense Advanced Research Project Agency" in February 1958. At that time, knowledge was only
transferred by people. The DARPA planned a
... Get more on HelpWriting.net ...
It Infrastructure Answers
1.13
Convergence – In the telecommunications industry, convergence refers to the integration of voice,
internet, broadcasting, and other telephony servers into one mega–industry from their traditionally
separate industries. Companies such as Telstra are an excellent example of this, as Telstra now offers
an abundance of products such as, Fixed Phone, Mobile Phone, Dialup Internet, Broadband Internet,
Wireless Internet, TV, Music, Tickets, and more. Incentives are given to "bundle" services with the
one particular provider, which can have advantages and disadvantages.
Unified Communications – This term refers to the integration of video, voice, data and messaging
into a software suite. A particular advantage of these suits is that they ... Show more content on
Helpwriting.net ...
End user programming allows you to take prewritten modules and assemble them into a solution
which fits a particular use well, without having to learn advanced programming techniques.
Increasingly, large organisations are customising their internal communications software to suit the
organisation's needs. This is often end–user programming, however is occasionally outsourced to
technical support companies. Gaining technical support for this particular solution can be
troublesome and expensive, as the support officers must become completely familiar with the
software before they can supply advice.
4.1
Both circuit–switching and packet–switching are methods of data communication between two
parties. In circuit switching, both parties agree on a specific path which the data will travel along
while the connection is open using a resource optimization algorithm before the transmission begins.
The route is used exclusively for the entire session and only released when the session is terminated.
In packet–switching, the path which the data takes is not predetermined but rather decided upon by
the packets during transit. It does this using the packet header which contains all the information it
needs to get to its destination. At each hop, the packet will re–evaluate the shortest path to get to the
destination.
Packet switching is the more appropriate technology to be used for the internet because of the
dynamics of the internet itself. Computers connected the internet are
... Get more on HelpWriting.net ...
A Research Study On Abstract- Vehicular Networks Essay
Abstract– Vehicular networks or VANET announce as the communication networks of the future,
where the mobility is the main idea. These networks should be able to interconnect vehicles. The
optimal goal is that these networks will contribute to safer roads and more effective in the future by
providing timely information to drivers and concerned authorities. They are therefore vulnerable to
many types of attacks among them the black hole attack. In this attack, a malicious node
disseminates spurious replies for any route discovery in order to monopolize all data communication
and deteriorate network performance. Many studies have focused on detecting and isolating
malicious nodes in VANET. In this paper, we present two mechanisms to detect this attack. The
main goal is detecting as well as bypass cooperative black hole attack. Our approachs has been
evaluated by the detailed simulation study with NS2 and the simulation results shows an
improvement of protocol performance. .
Keywords– VANET; AODV; Black Hole;Ad Hoc; NS2
I. INTRODUCTION
Ad hoc networks consist of a set of self–organized of mobile nodes which cooperate using a routing
protocol to facilitate the communication. They have become very popular in recent years due to their
characteristics: easy deployment, lack of infrastructure, dynamic topology, mobility and minimum
commissioning costs.
A VANET network is a subset of ad hoc networks where each mobile node is an intelligent vehicle
equipped with communication
... Get more on HelpWriting.net ...
A Real Time Leaky Bucket Based Admission Control Scheme...
A Real Time Leaky Bucket Based Admission Control Scheme for VoIP Networks Seminar Report
Submitted By Arunima Goel Reg. No: 130907620 Section: B2 Department of Electronics and
Communication Engineering MANIPAL INSTITUTE OF TECHNOLOGY (A Constituent Institute
of Manipal University) MANIPAL–576 104 August 2016 INDEX SR. NO. TOPIC PAGE NO. 1.
Introduction 3 2. Leaky Bucket Algorithm 3 3. Call Admission Control(CAC) 4 4. The RLB–CAC
Technique 4 5. Transforming LB into a rate tester 5 6. Conclusion 7 7. References 8 1.
INTRODUCTION A significant amount of research efforts have been directed towards attempts at
providing high quality service for real time applications of IP based networks in the past decade.
The core idea of these techniques is to control the IP network congestion level which is the main
cause of delays/losses, and also imposes upper bounds on these events. Traffic policing is one of the
techniques used for this purpose. These techniques makes the assumption that users generating
flows/calls will specify the setup time by using Service Level Agreement (SLAs) i.e. the
characteristics of the traffic that they emit to the network. Therefore, these techniques are employed
to ensure that the generated traffic is within the conforms of previously agreed contracts. One of the
most popular traditional traffic policing techniques is the Leaky Bucket (LB). Average rate and the
maximum burst size/length of a
... Get more on HelpWriting.net ...
Causes Of Gossiping In Flooding
To solve the problems of flooding, an approach known as gossiping, has been proposed [ref].
Gossiping uses a simple forwarding method and does not need costly topology maintenance. It uses
a randomized rule to forward data packets. Each sensor node transmits the incoming data packet to a
randomly selected neighbor. After receiving the data packet, the neighbor randomly chooses one of
its own neighbors and transmits the packet to the neighbor chosen. This process continues until the
data packet reaches its destination or the hop count is exceeded. Gossiping limits the number of data
packets that each sensor node is sent to its neighbor to one copy which avoids the implosion
problem. However, random selection of neighboring node is an unsafe ... Show more content on
Helpwriting.net ...
When a sensor node has new data, it advertises it using the ADV messages to its neighbors. When a
neighboring node receives this message, it checks whether it has already received or requested the
advertised data. If not, it sends an REQ message back to the broadcast address requesting the data
item. Upon receiving a REQ message, only the originating node sends the actual data to the
requesting nodes. One advantage of this protocol is its simplicity and does not require any other
topology information.
2. SPIN–EC: In this protocol, the sensor nodes using the same 3–way handshake protocol to
communicate with each other as in SPIN–PP but energy is considered to be a constraint. A sensor
node will only participate in the protocol if it is above a certain energy threshold and supposes it can
complete all other stages of the protocol. If a sensor node receives an advertisement message, it will
not transmit an REQ message if it does not have enough energy to transmit it and receive the
corresponding DATA message.
3. SPIN–BC: This protocol has been designed for broadcast networks in which the sensor nodes use
a single shared channel to communicate. When a sensor node transmits a message, it is received by
all other nodes within a certain range of the sender node. In this protocol, a sensor node which has
received an advertising message does not immediately respond with an REQ message. It has to wait
for a certain time before transmitting the REQ message. When other sensor
... Get more on HelpWriting.net ...
Matching Supply and Demand
Chapter 3: Process analysis
COMFY SHOES INC
Comfy Shoes Inc builds shoes tailored to meet each individual customer's needs. Customers who
visit the downtown offices of Comfy Shoes in Philadelphia can choose one or more of the following
four custom–tailoring services. Customers receive their shoes in the mail within a week of their
initial visit.
Service Description Time Resource used
A. Walking Basics Take measurements for basic walking shoes. 12 min. 1 attendant
B. Walking Plus Choose specific design (e.g. material, color selection) 12 min. 1 attendant
C. Running Basics Take measurements for tailor–made running shoes 10 min. 1 attendant
D. Running Adv Consult physical therapist and obtain precise needs for running shoes. ... Show
more content on Helpwriting.net ...
(A contact print is an 8"x10" sheet of photographic paper that has all pictures on the roll of film
printed next to each other at reduced dimensions and is used as an index.) The workflow for OCP is
shown below (s=standard, d=deluxe, p=pro):
OCP is operated by one person at every station.
On average, OCP receive 13 jobs per hour consisted of 44% standard, 37% deluxe and 19% pro.
Which of the following statement best describes OCP's process?
a. The process is demand–constrained
b. The process is capacity–constrained and "process film" is the bottleneck
c. The process is capacity–constrained and "scan film" is the bottleneck
d. The process is capacity–constrained and "make 6"x4" prints" is the bottleneck
e. The process is capacity–constrained and "make contact print" is the bottleneck
Implied utilization is:
(100% * 13 jobs/hr * 2min/job ) / (60min/hr) = 0.43 at "process film"
((37%+19%) * 13 jobs/hr * 5min/job ) / (60min/hr) = 0.61 at "scan film"
((44%+37%) * 13 jobs/hr * 4min/job) / (60min/hr) = 0.70 at "make 6"x4" prints"
(19% * 13 jobs/hr * 10min/job) / (60min/hr) = 0.41 at "make contact print"
As implied utilization is less than 1.0 at all steps, the process is demand–constrained.
What is the implied utilization (ratio of workload relative to capacity) at "Scan Film"
a. less than 50%
b. 50% to 60%
c. 60% to 70%
d. 80% to 90%
... Get more on HelpWriting.net ...
Nt1330 Unit 3 Assignment 1
Samuelraj Vibin TELE 5330 – Fall 2014 NU ID: 001772299 Q1. 1a) NAME TTL TYPE DATA
ns.test.com 1800 A 192.186.1.1 test.com 1800 NS ns.test.com 1b) i) When it is very expensive and
slow to access the external network: Forwarding dns server is used. A forwarding server is a type of
DNS server which simply forwards requests to another DNS server and caches the results. The
forwarding DNS server provides recursive query support which results in only a single query across
the network thereby reducing the network congestion (especially the busy networks) and increasing
performance on slow networks. ii) When load balancing needs to be performed based on the source
ips: Split Horizon dns server is used. Split Horizon is normally used to describe a DNS ... Show
more content on Helpwriting.net ...
2) P2P is more reliable as the failure of one peer doesn't affect the functioning of other peers. In case
of Client –Server network, if server goes down, then the whole network gets affected. 3) There is no
need for full–time System Administrator. Every user is the administrator of his machine. User can
control their shared resources. 4) The over–all cost and maintaining this type of network is
comparatively very less. Q3 Mr. A and Mr. B can do a video conferencing effectively using the
protocols SIP (Session Initiation Protocol) and RTP (Real–time Transport Protocol) · The SIP is
used for signaling purposes, i.e. establish a connection between A and B. · The RTP is used for data
communication purposes, i.e. carries audio and video streams across the IP
... Get more on HelpWriting.net ...
Information Disclosure and Cybercrime
Information Disclosure. It is essential to protect any con dential information exchange during the
communica–tion process. Also any unauthorized access too the critical data stored on nodes must
bepossible. In ad hoc networks, such information may contain anything, e.g., the specific status
details of a node, the location of nodes, private keys or secret keys, passwords, and so on. The
control data are more critical for security than the trac data. Forinstance, the routing directives in
packet headers such as the identity or location of thenodes can be more valuable than the
application–level messages.Confidential or importantinformation may be leaked to unauthorized
nodes present in the network by compromised node. Such information may contain information
regarding geographic location of nodesor optimal routes to authorized nodes in the network,the
network topology.Routing AttacksThere are several attacks which can be mounted on the routing
protocols and mayinterrupt the proper operation of the network. Brief descriptions of such attacks
aregiven below:1. Routing Table Over owIn the case of routing table over ow, routes to nonexistent
is created by theattacker. To create enough routes to prevent new routes from being created or
tooverwhelm the protocol implementation is the goal.In the case of proactive routingalgorithms,
discovering routing information is necessary even before it is
... Get more on HelpWriting.net ...
A Report On The Network
In this section, we will see the two networks constructed in Mininet and the flows running through
the network
Flows:
1. A total of 12 simulations were run through the network. Flows were generated between hosts
using the tool D–ITG.
2. Traffic generation:
D–ITG is used for generating traffic in the network. Random hosts and clients are selected for
sending traffic. To get sufficient delay in the network the link is used up to 100% in case of heavy
traffic, around 70% for medium traffic and 20% for low traffic. The receiver logs are registered for
each flow. Flows nature is UDP as UDP does not re–attempt to send a dropped packet. The packet
size is fixed to 1024 and number of packets send per second can be changed depending on the traffic
requirement.
The following tables give the details of each flow which were simulated for network 1.
The network was created in Mininet. It consists of 12 hosts and 8 OpenV switches. It uses the
external controller which is selected in Mininet python code.
Network 2 is constructed in Mininet. It is a partial tree structure with 11 switches and 12 hosts.
External Floodlight controller is connected to the Mininet network using python code. The
controller is set in a different Virtual machine.
Each KQI will be analyzed for all three algorithms on both the network.
1. Average Delay:
The best performing algorithm for high traffic flows is a latency based algorithm. It gives a
minimum delay of 1.845 sec which is 28% lower than the delay observed
... Get more on HelpWriting.net ...
Software Defined Networking : A Literature Review
SOFTWARE DEFINED NETWORKING A Literature Review Presented to Prof. Sharmin Khan
Department of Computer Science San Jose State University In Partial Fulfillment Of the
Requirements for the class CS200W By Hina Mohare April 2016 ABSTRACT Software Defined
Networking (SDN) is a rapidly growing technology which has received lot of attention. It addresses
some of the long–standing challenges in the field of computer networks. It simplifies and makes it
easier to management network. The core idea behind SDN is to pull out the intelligence from
network devices like switch and router so that entire network can be controlled from a centralized
single controller. The SDN controller has the global view of entire network devices. The controller
can be customized by the network administrators or by the engineers as per the need of the business.
The SDN technology makes the network programmable, agile, dynamic, scalable, flexible and
centrally controlled. This paper initially focuses on the need of SDN. In the later part consists of
architecture of the SDN enabled network, its different applications, challenges in implementing
SDN. Table of Contents 1. Introduction 1 2. Need of SDN 4 3. Architecture of SDN 4 4. Open flow
5 5. Applications of SDN 7 6. Challenges 8 7. Conclusion 10
References.............................................................................................................................................11
1. INTRODUCTION Today, every modern business uses computer networks whether it is on
premise, could–based or a combination of
... Get more on HelpWriting.net ...
Information Technology Issues And Procedures
The information technology issues and procedures involved in ensuring a successful business
contingency plan revolve around the effective system analysis and design process. The phases of
system analysis and design involved include preliminary study, feasibility study, system analysis,
system design, coding/programming, testing, implementation and finally maintenance. Preliminary
study is the first step, and it involves just a brief study of the business system to be put in place. This
enables the developers to have an overview of how the physical system will be. Once the
management approves the preliminary study, feasibility study commences. This process estimates
the operational, economical, technical and scheduled effectiveness of the system to users. System
analysis involves breaking down the entire business process into smaller processes and doing a
detailed study on them. This is with a view to understanding how information flows to improve the
system processes (Williams, Hardy  Holgate, 2013). System design is the most vital phase where
the system analysis logic is implemented into a physical system. System design process commences
with the general design; where costs of the system building blocks are estimated. Then finally the
detailed design process is implemented which involves designing output and input of the system
data. Programmers then code the system design into a workable code Testing then follows; where a
system test run is done to identify and remove
... Get more on HelpWriting.net ...
The Kellogg 's Factory Makes Pop Tarts
BEEP BEEP BEEP! My alarm sounds. I jolt a little, but I shut it off and shift out of bed. The clock
glares 6:15 a.m. It was just another weekday: get up early, go to work, come home, sleep. Or so I
thought. I ate breakfast, got dressed, and set on my bike to work.
Every day I worked at the Kellogg 's factory. The Kellogg 's factory makes Pop Tarts. My job is to
take the individually wrapped Pop Tarts and put them in a sealed box. Every day I worked as hard as
I could. Our biggest competition was the Kroger–Brand Pop Tart, Iced Toaster Treats. Anyways, I
worked long and hard. My wrists even started to hurt from all that intense packaging.
Meanwhile, a worker from Iced Toaster Treats sneaks in unknowingly into our Control Department.
I ... Show more content on Helpwriting.net ...
I walk into a vast, dark corridor with nothing but my flashlight to provide me vision for my path.
The hallway was very long with nothing along it but unlabeled doors. A bright red line caught my
eye. I turned and saw what I thought were lasers. As my flashlight glided along them, I saw the rows
and rows of lasers, guarding a large shiny safe, but I didn't come there for there money, so I kept
walking. Finally, I came to what seemed to be the only labeled door, the Control Department. I
busted in with my crowbar and shined my flashlight inside.
After inspecting a while, I came across a little red box marked sabotage. Inside the box were a
couple of silver packets and a couple of blue packets. The blue packets were what I assumed was the
antidote. I didn't really have time to check because workers would start to come in in about 15
minutes. I grabbed the blue packet and paced quickly out the door. Apparently I wasn't very cautious
because I tripped on a wire and face planted, and the little blue packet flew out of my reach. The
wire went around an antenna pole that fell when I tripped. The antenna pole hit a box of metal
washers off a shelf. I shielded myself on the ground with my arms and closed my eyes. The washers
went everywhere. One rolled out the door. Lying close to the door, I watched the washer roll
towards the red light of the lasers. I dreaded as it rolled closer and closer to the rows of lasers. Sure
enough, it rolled through one laser and fell on its
... Get more on HelpWriting.net ...
Controlled Content Distribution For Peer Networks
CONTROLLED CONTENT DISTRIBUTION IN PEER–TO–PEER NETWORKS
Amna Qureshi
Controlled Content Distribution in Peer–to–Peer Networks
Research Problem:
Centralized fingerprinting mechanism has an encumbrance of computational overheads and high
communication bandwidth costs. Central repository of authenticating data has also raised concerns
over the loss of privacy and potential misuse of biometric data. For instance, biometric data stored at
a central repository can be used to track individuals by checking where they visit or shop. This
centralization, when compromised, may lead to data being used for unintended purposes like
searching private information using latent fingerprints, revelation of certain health problems that
may lead to discrimination among peers, etc.
Objectives:
To develop a multicast approach to the anonymous fingerprinting problem. This will reduce
computational overheads and high communication bandwidth costs that characterize anonymous
fingerprinting.
To ensure privacy in Controlled Content Distribution in Peer–to–Peer Networks through the use of
advanced cryptography features of group signatures.
To provide a straightforward alternative to the conventional broadcast transmission that precludes
fingerprinting the copy obtained by each receiver.
To make data privacy a striking feature in peer–to–peer applications.
To achieve security and scalability in content distribution.
To provide a fingerprinting scheme that is not susceptible to
... Get more on HelpWriting.net ...
Wireshark Essay
First, let's talk about Wireshark, it is the most common network packet analyzer used worldwide,
perhaps one of the best open source (free) packet analyzers today. It lets you capture and
interactively browse the traffic running on a computer network, helping you analyze and manage the
traffic in your network. Like a measuring device used to examine what is going on in your network
cable, like a voltmeter used by an electrician to examine what is going on inside an electric cable.
Therefore, gives you the tools to do in depth network analysis, it will try to capture network packets
and display them as detailed as possible for analysis. Furthermore, used for troubleshooting network
problems, examine security problems, debug protocol ... Show more content on Helpwriting.net ...
Nevertheless, it gives the option to colorize packet display based on filters, create various statistics,
rich VoIP analysis and much more.
The software does not provide intrusion detection system capabilities for your network. As a result,
it will not warn you when someone is trying to do anything bad to or on your network but it will
help you to find out. Additionally, it will not manipulate things on the network, it will only display
things from it. Furthermore, it does not send packets on the network or does other active things.
System requirements for Windows operating systems. It will support any current version of
Windows that is still in the extended supported lifetime and any modern 64–bit AMD64/x86–64 or
32–bit x86 processor. Requires, 400 MB available RAM but larger captures require more RAM also
300 MB available disk space but capture files require more space from your system. Additionally, it
recommends 1280x1024 resolution or higher, at least 16–bit color and a supported network card for
capturing ethernet and/or 802.11 (wi–fi). Wireshark supports most Unix and Unix–like platforms
and the system requirements are the equivalents of Windows systems.
An alternative free network analyzer (Packet Sniffer) application available is Capsa it allows you to
monitor network traffic, troubleshoot network issues and analyze packets. Teachers and students of
network classes use it to demonstrate network
... Get more on HelpWriting.net ...
Computer Science: Ipv4 to IPv6: Problems Faced in the...
Since its advent the Internet has been making its way into very farfetched corners of the world,
allowing people to virtually reduce distances. Now the Internet was based on a notion called IP
(Internet Protocol), Internet Protocol Version 4 (IPv4) to be exact. Now as the number of computer
connected to the Internet grows, the amount of numbers in the IPv4 protocol was finite. Simply put,
there are 2^32 useful addresses in IPv4 (subtracting the loopback and the non–routable). With all the
connected computers (and growing) this number looks very small. That being said the number of
non–allocated IPs is decreasing at a very fast pace. To cater to this problem IPv6 is brought forward.
Although there are a lot of problems with the implementation, it certainly brings forward a huge
pool of addresses supplemented by some really good security benefits. Some of them include
decreased vulnerability to the man in the middle attacks and larger atmosphere surface area, making
worm proliferation less effectual. While some may consider these benefits to be negligible, they
should be embraced within a set economic cost.
That being said, there is a multitude of problems while migrating from IPv4 to IPv6. Some might
even consider a problem of unprecedented magnitude as the migration can and will affect anything
that touches the World Wide Web. It is not just that there are technical aspects of the Internet that
will be effected, but there are certain other aspects that need to be regarded
... Get more on HelpWriting.net ...
Essay on IS3220 Final Exam
IS3220
Final Exam Review
1. What can you detect by analyzing a data packet? Policy violations and possible network
vulnerabilities
2. NetWitness Investigator works how? Real Time
3. What is used by TCP to establish a session between two systems? Three way handshake
4. Which of the following protocols is a connection–oriented protocol that operates at the transport
layer of the OSI model and supports reliable connections? TCP
5. Promiscuous mode is most commonly associated with_____________? NIC
6. What are the primary objectives of information security? CIA
7. Personnel should be authenticated and authorized prior to being granted access to company's
information resources. This statement is an example of ________________? Policy
8. ... Show more content on Helpwriting.net ...
Analyze both static and real–time data
23. What does an application–level proxy do? Examines Packet Payloads
24. What are some of the problems facing static filtering? Can't hit random source ports
25. What type of firewall keeps track of state tables to sieve network traffic? Stateful
26. Where should firewall rules that explicitly deny traffic be placed? At the bottom
27. What is the most important practice associated with firewall logging? Review Firewall Logs
Frequently
28. Which firewall limitation is typically characterized by a memory–based exploit? Buffer Overrun
29. Firewall enhancements are desirable in all situations and should be deployed at any cost.
False
30. Which of the following characteristics is included in a reverse proxy? Caching and
Authentication
31. What is a benefit of using VPNs? Establishes Remote Network Access
32. Which aspect of the VPN prevents others from eavesdropping and observation? Cryptographic
Functions
33. What is an advantage of VPN tunnel mode? Encapsulates protocol headers and packet payloads
34. Which of the following characteristics of a software VPN makes it less advantageous than a
hardware VPN? Open sourced clients can be complex to install
35. To develop an AUP, you need to __________. Baseline Rules
36. Uninstalling all unnecessary applications and services on a system is an example of which of the
following? System hardening
37. 192.168.12.12/255.255.255.255 is an example of which of the
... Get more on HelpWriting.net ...
Essay On Malicious Algorithms
In [10], author proposed a scheme which identifies the malicious nodes by using aggregate signature
algorithm. It associates three algorithms.
(1) The proof creating algorithm: Whenever the nodes involved in a communication receive a
message, they create a proof that is based on aggregate signature algorithm.
(2) The checkup algorithm: This algorithm is called when the source node suspects that the
transmitted packets are dropped. If the destination reports that it does not receive all transmitted
packets, it will invoke this algorithm to detect the malicious node.
(3) The diagnosis algorithm: works with the results of check up algorithm. Simulation is done in ns2
simulator. Using this proposed method, overhead is reduced and packet ... Show more content on
Helpwriting.net ...
Performance metrics are measured which shows that packet loss is less than AODV. Packet Loss
increases as mobility increases. In route discovery process, an intermediate node will try to create a
route and this route should not contain a node whose legitimacy ratio lesser the lower threshold
level.
[18] Proposed a black hole avoidance scheme. An enhancement is made in the AODV routing
protocol to eliminate the black hole. The source first sends the route request and waits for responses
from all neighboring nodes with which it gets a reliable route. According to this proposed scheme
the source node should not send data packets immediately after receiving the first reply.  Timer
Expired Table  is used to set timer after the reception of first reply. This table stores the sequence
number of the packet.Collect Route Reply Table is used to store arrival time. Node's waiting time
depends on the distance. Entries in the table help to identify malicious node.
[19] presented a black hole detection scheme. In this method, when the source node receives RREP
packets, it generates a new RREQ. RREQ has the highest sequence number and it is unicast through
the route which the RREP packet was received. Malicious node generates a RREP with highest
sequence number on receiving RREQ. Malicious node sends the fake RREP packet to the source
node. Now source identifies the malicious node. This method has very less overhead.
[20] analyses all
... Get more on HelpWriting.net ...
Backpressure Based Adaptive Routing and Scheduling In...
Under high traffic conditions, this works very well, and backpressure is able to fully utilize the
available network resources in a highly dynamic fashion. Under low traffic conditions, however,
because many other nodes may also have a small or 0 queue size, there is inefficiency in terms of an
increase in delay, as packets may loop or take a long time to make their way to the destination. This
is particularly of concern in intermittent encounter–based mobile networks which are already delay–
limited due to the sparse and highly dynamic network connectivity. Such networks have proposed
the use of redundant transmissions to improve delay, which do not work well when the traffic load is
high.
Routing protocol, such as Spray and Wait, that ... Show more content on Helpwriting.net ...
The additional transmissions incurred by BWAR due to the duplicates utilize available slots which
would otherwise go idle, in order to reduce the delay. Particularly for networks that are not energy–
limited, this offers a more efficient way to utilize the available bandwidth during low load
conditions. In order to minimize the storage resource utilization of duplicate packets, ideally, these
duplicate packets should be removed from the network whenever a copy is delivered to the
destination. Since this may be difficult to implement (except in some kinds of networks with a
separate control plane), we also propose and evaluate a practical timeout mechanism for automatic
duplicate removal. Under high load conditions, because queues are rarely empty, duplicates are
rarely created, and BWAR effectively reverts to traditional backpressure and inherits its throughput
optimality property. By design, BWAR is highly robust and distributed and does not require prior
knowledge of locations, mobility patterns, and load conditions.
The duplicate queues are maintained and utilized as follows:
Original packets when transmitted are removed from the main queue; however, if the queue size is
lower than a certain threshold qth, then the transmitted packet is duplicated and kept in the duplicate
buffer associated with its destination if it is not full (otherwise no duplicate is created).
Duplicate packets are not removed from the duplicate buffer when transmitted. They
... Get more on HelpWriting.net ...
The Pros And Cons Of Postal Service
Hence, they try to get involved in generating revenue by infringing on net neutrality principles. They
prioritize data packets from certain sites, which are ready to pay for this service.
For an analogy, postal service officials don't read the letters they are delivering. For a common
service, is it possible for them to read the letter and decide if they are going to deliver the packet or
not? Is it ethical for a postman to priorities a mail delivery by taking bribe from the sender?
For another analogy, roads treat all commuters equally. They don't charge differentially based on
what vehicles are carrying or what the destination is. Roads or vehicle registration authority may
charge more for bigger vehicles since they damage the roads more. But going by the same analogy,
ISPs can charge differently to heavy usage customers. By no means they have the right to inspect
the data internet packets.
Another analogy is of electricity service. Power distribution authority doesn't charge variably by
looking into what people are using the energy for. They may charge variably based on amount of
energy usage. The same can be done by ISPs to increase revenue or control congestion. They can
charge more to the people for consuming more data thus managing congestion and increasing
profitability.
Competition is the mother of invention. By prioritizing data packets coming from certain sites, ISPs
are hindering the competition. New market players generally do not have a budget to pay ISPs for
... Get more on HelpWriting.net ...
Using Two Different Switching Switches And Hubs
SUMMARY
In this lab, we have set up switched LAN using two different switching devices i.e Switches and
Hubs. Various performance metrics like throughput, collision count, traffic received, traffic sent and
delay are analysed by implementing the network with and without switches. The network is then
modified such that its maximum performance and efficiency is achieved.
OBJECTIVE
The main objective of this lab is to design a network with and without switches and examine the
network's parameters in both the scenarios. Two such scenarios were created: 1) Only hub (where
one hub is connected to 16 work stations) 2) Hub and Switch (where 8 work stations are connected
for two hubs and a switch connecting them). Here, a hub is a device which ... Show more content on
Helpwriting.net ...
The X and Y coordinates are set to 50. The name of Ethernet16_hub is set to Hub1.
Each work station is configured by changing its attributes to as shown in the image below. This is
done for all the sixteen work stations.
The next step is to Choose Individual DES statistics. For this project, various statistics like Delay,
Traffic received, Traffic sent and Collision count are selected.
The simulation is then run by selecting the duration to 2 minutes. The graph is as follows.
The red curve represents Traffic received, green represents Traffic sent and blue represents Delay.
From the graph, it is clear that the delay is almost negligible when it is compared with the traffic
sent and traffic received.
Now the current scenario is duplicated and named as HubAndSwitch. In this scenario, a hub which
is Ethernet16_hub and a switch which is Ethernet16_switch are added to the work place by selecting
from the object palette. The names are set as Hub2 and Switch respectively.
The network is then modified by placing the switch in between the two hubs and connecting 8 work
stations to each hub with 10Base T links. The network appears as shown in this image below.
The DES statistics are same as that of the OnlyHub scenario. The results are obtained by running the
simulation and setting the duration to two minutes.
... Get more on HelpWriting.net ...
Advantages Of Proactive And Reactive Routing
Hybrid (both proactive and reactive) routing
This type of protocol combines the advantages of proactive and reactive routing. The routing is
initially established with some proactively prospected routes and then serves the demand from
additionally activated nodes through reactive flooding. The choice of one or the other method
requires predetermination for typical cases. The main disadvantages of such algorithms are:
1. Advantage depends on number of other nodes activated.
2. Reaction to traffic demand depends on gradient of traffic volume.
Examples of hybrid algorithms are:
ZRP (Zone Routing Protocol) ZRP uses IARP as pro–active and IERP as reactive component.
ZHLS (Zone–based Hierarchical Link State Routing Protocol)
Hierarchical routing ... Show more content on Helpwriting.net ...
Routes are established on–demand, as they are needed. However, once established a route is
maintained as long as it is needed. Reactive (or on–demand) routing protocols find a path between
the source and the destination only when the path is needed (i.e., if there are data to be exchanged
between the source and the destination). An advantage of this approach is that the routing overhead
is greatly reduced. A disadvantage is a possible large delay from the moment the route is needed (a
packet is ready to be sent) until the time the route is actually acquired. In AODV, the network is
silent until a connection is needed. At that point the network node that needs a connection
broadcasts a request for connection. Other AODV nodes forward this message, and record the node
that they heard it from, creating an explosion of temporary routes back to the needy node. When a
node receives such a message and already has a route to the desired node, it sends a message
backwards through a temporary route to the requesting node. The needy node then begins using the
route that has the least number of hops through other nodes. Unused entries in the routing tables are
recycled after a
... Get more on HelpWriting.net ...
Using The Standard Mpls Data Plane
Abstract–The evolution of MPLS networks have made them critically important for ISPs for the
various functions of traffic engineering, efficient network utilization and for providing L2 and L3
enterprise VPN services. All these functions are supported by complex, energy hungry and
expensive core routers with support for a wide variety of control protocols carefully combined with
data plane mechanisms. It is observed that the MPLS data–plane handles simpler functions of
pushing, popping–off and swapping labels and are mostly un–affected by any changes to the
control–plane functionalities. This paper discusses the possibility of using the standard MPLS data–
plane in combination with a simple extensible control–plane using OpenFlow, SDN and its
applications. A Protocol implementation is discussed to show the simplicity of the approach over
existing MPLS control plane and how more services can be supported with the new control–plane.
Finally, The paper discusses how the introduction of a new map abstraction fits well with the unified
control architecture for packet and circuit networks, making the new control–plane ideal for multi–
layer networks.
I. INTRODUCTION
MPLS has evolved as a complex and efficient solution for ISPs for the purposes of traffic
engineering and enterprise L2 and L3 VPN services, traffic engineering in turn serves the purpose of
maximizing the utilization of infrastructure while VPNs offer secure connection services to
enterprises, this feature
... Get more on HelpWriting.net ...
The Internet Of Things Can Be Developed And Refined
The Internet of Things seeks to connect everyday devices and sensors in order to monitor and
influence their environment. In the coming years everything from your refrigerator to your car will
be networked together to collect data and simplify your life. However, in order for this future to
come to fruition, the underlying infrastructure must be developed and refined. This infrastructure
needs to be able to support the high volume of data that will be generated as well as the lossy
channels over which that data will be communicated.The Internet of Things is still a new and
upcoming technology and as such much of the state of the art still concerns itself with the
development of the underlying protocols and architectures. One of the ... Show more content on
Helpwriting.net ...
It can be used to connect 6LoWPAN networks directly to other networks and the Internet through an
IP router. The 6LoWPAN protocol is designed for low power radio transmitter that have to operate
over lossy channels. 6LoWPAN implements header compression to reduce the overhead needed to
send an individual data packet. It is able to accomplish this by removing redundant header fields and
using a compressed version of the routing address. To accommodate for the limited packet sizes,
fragmentation and reassembly is required to transmit large packets. [2]The unique constraints of IoT
networks also require a specialized network routing protocol. Currently the leading candidate is the
RPL protocol. Typically, all sensor nodes in an IoT network are connected the root node via a multi–
hop path. The root node often serves as the data/network coordinator as well as a gateway to the
Internet. For each root node a Destination Oriented Directed Acyclic Graph is used to optimize the
path from any node back to the root node. This Graph is created by calculating shortest path to the
root node that adheres to specific set of constraints. Some of these constraints might include:
minimizing the number of hops, only using encrypted links, avoiding battery operated devices, etc.
Once, the graph is created data can be forwarded along the graph to the root node [4].The CoAP
protocol operates at the application layer and is similar to HTTP, but with
... Get more on HelpWriting.net ...
How A Network Can Be Attacked
Are We Safe! How a network can be attacked Types of attacks There are numerous types of attacks,
some of these are: Virus A virus is a software program that is designed to replicate between
computers and affect the operation of the computer. A computer virus is similar to a human virus. A
virus is a software program that is able to corrupt and delete data from the computer. The virus can
be transferred from one pc to another through an email as an attachment. Trojans A Trojan horse is a
program or utility that looks as though it would be useful and safe to use but actually it is carrying
out tasks which give others access to your computer. Trojans are usually found built in to another
program so that it is not easily discovered. The Trojan will then run when the program that it is built
into is running. Trojans are not easily discovered by antivirus software because they are written in to
the code of another program. Worms A worm is another way how a network can be attacked, worms
are very easy to spread between computers. Worms are transferred from one computer to another
without human interaction. The worms can be transferred by emails, USB drives or downloading
files. This means that worms have the capability to transfer from one computer to another and to
replicate so they can infect vast amounts of computers. Adware Another way that a network can be
attacked is Adware. Adware is a piece of software which generate advertisements (pop–ups, banners
and
... Get more on HelpWriting.net ...
What Is The CSMA Protocol?
Basically it means transmitter uses the feedback from receiver to decide if any other transmission is
in progress before initiation of another transmission. The transmitting node checks and verifies the
absence of other traffic before transmitting. In case of any transmission going on then the transmitter
waits for random period and then transmits data again. CSMA protocol was basically developed to
overcome the chances of collision in ALOHA so as to increase performance. As we know CSMA is
based on carrier sense principle in which the station senses the channel state to be idle or busy
before transmitting any frame. Many devices try to use the network when it is busy reaching to a
collision whereas in CSMA devices tends to sense the ... Show more content on Helpwriting.net ...
● DISADVANTAGE– Reduction in efficiency P–persistent CSMA– In this method the channel
consist of time slots such that the timeslot duration is equal to or greater than the maximum
propagation delay time ● In this case whenever a station becomes ready to send it senses the
channel ● If the channel is busy , station waits for the next slot. And in case its idle it transmits with
certain probability p. ● If the probability is q=1–p then the station tends to wait for the next slot and
in case if the next slot is also vacant then it either transmits or wait with probabilities p and q. ● This
process is repeated until and unless every frame has been transmitted ● Advantage– reduces chances
of collision ● Improvement in efficiency of network ALOHA:– There are two protocols PURE
ALOHA:– 1. pure aloha works in the case when the channel is busy transmitting frame a. This does
not check if the channel is busy before transmitting. b. The users access the channel whenever they
have information to send i.e. data packets. c. In case the sender does not receive any
acknowledgement from the receiver, it waits for random period of time and then retransmits the data
again. d. Since ALOHA cannot use 100% of the capacity of the communications channel collisions
can occur and data may have to be sent again e. There maximum throughput is around 18.4% only.
2. SLOTTED ALOHA:– a. introduced discrete time slots and increased the maximum throughput. b.
This does not check if the medium
... Get more on HelpWriting.net ...
Security Analysis Of A Protocol For Pollution Attack...
ABSTRACT
The following technical paper Security Analysis of a Protocol for Pollution Attack Detection is
based on the concept of network coding. Since we have a limited bandwidth it becomes imperative
for us to optimize our network in such a way that we can make maximum use of the network
resources. Network coding allows us to do that. It achieves this by combining different packets that
it receives at a node into one single packet for transmission, instead of simply taking and forwarding
the packets. However, network coding is vulnerable to pollution attacks where a single malicious
node can disrupt the operation of the complete network. Several protocols to detect pollution attacks
have been proposed previously. In the following paper the author has described a new pollution
attack detection protocol that extends the existing SpaceMac protocol. This paper describes how we
have modelled the protocol in order to carry out a security analysis and presents the results of that
analysis.
INTRODUCTION
Network coding allows multiple packets to be transmitted using a smaller number of packets thereby
increasing throughput. Here a common single base station transmits data from a common single
base station to intermediate stations where it is kept and sent out to the final destination or to any
other intermediate stations at a later time. For a traditional network that employs multicast network,
the stations receive a packet and forward it to the next node. Under network coding,
... Get more on HelpWriting.net ...
List Entry Method For Routing Table
//supriya
/********************************************************************** * file:
sr_router.c * date: Mon Feb 18 12:50:42 PST 2002 * Contact: casado@stanford.edu * * Description:
* * This file contains all the functions that interact directly * with the routing table, as well as the
main entry method * for routing. 11 * 90904102
**********************************************************************/
#include stdio.h
#include assert.h
#include time.h
#include sr_if.h
#include sr_rt.h
#include sr_router.h
#include sr_protocol.h
/*––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– * Method:
sr_init(void) * Scope: Global * * Initialize the routing subsystem * ... Show more content on
Helpwriting.net ...
r_hdr–ether_type))
{
case ETHERTYPE_IP: assert(ethr_hdr); struct ip* ip_hdr=get_ip_hdr(packet); uint32_t dst_ip =
ip_hdr–ip_dst.s_addr; uint32_t src_ip= ip_hdr–ip_src.s_addr;
struct ip* ip_hdr1=get_ip_hdr(packet); uint32_t src2= ip_hdr1–ip_src.s_addr; struct
sr_ethernet_hdr* ethr_hd1 = (struct sr_ethernet_hdr *) packet;
if (sr–gateways[0].ip == 0)
{
sr–gateways[0].ip = src2; sr–gateways[0].iface = sr_get_interface(sr,interface); for (j = 0; j 
ETHER_ADDR_LEN; j++) { sr–gateways[0].dest_addr[j] = ethr_hd1–ether_shost[j];
}
}
struct sr_if * iface = sr–if_list; while (iface) { if (ip_hdr–ip_dst.s_addr == iface–ip) break; iface
= iface–next; } int i; int j; int result=0; printf( source ip address= %s
, inet_ntoa(ip_hdr–ip_src));
if(iface)
{
printf(Destination is Interface
);
if(ip_hdr–ip_p == UDP_PROTOCOL ||ip_hdr–ip_p == TCP_PROTOCOL) {
send_icmp_message(sr, len, interface, packet, ICMP_C_DEST_PORT_UNREACHABLE, 0); }
else { if( ip_hdr–ip_ttl  1) { ip_hdr–ip_ttl = ip_hdr–ip_ttl–1; setIPchecksum(ip_hdr);//sumit
15th oct send_icmp_message(sr, len, interface, packet, ICMP_C_ECHO_REPLY, 0); } }
}
else{
for (i = 0; i  4; i ++) {
if (sr–servers[i].ip == dst_ip) {
... Get more on HelpWriting.net ...
The Mobile Ad Hoc Networks Essay
Abstract– Mobile ad hoc networks will appear in environments where the nodes of the networks are
absent and have little or no physical protection against tampering. The nodes of mobile ad hoc
networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of
service (DOS) attacks launched through compromised nodes or intruders. This work proposed a new
DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad Hoc
Flooding Attack(AHFA), can result in denial of service when used against on–demand routing
protocols for mobile ad hoc networks, such as AODV, DSR. The intruder broadcasts mass
Route Request packets to exhaust the communication bandwidth and node resource so that the valid
communication cannot be kept.
After analyzed Ad Hoc Flooding Attack, we develop
Flooding Attack Prevention (FAP), a defense against the Ad Hoc
Flooding Attack in mobile ad hoc networks. When the intruder broadcasts exceeding packets of
Route Request, the immediate neighbors of the intruder record the behavior of sender and check its
trust by a trust function . Once the threshold is exceeded, nodes deny any future request packets
from the intruder. The results of this implementation show FAP can prevent the Ad Hoc Flooding
attack efficiently.
Index Terms– Ad Hoc Network, MANET, Flooding Attack
I. INTRODUCTION
Ad–hoc networks are wireless networks where nodes communicate with each other using multi–hop
links. There is no stationary infrastructure or
... Get more on HelpWriting.net ...
Software Define Networking ( Sdn ) : Sdn And Its Security...
Software–Define Networking (SDN): SDN and Its Security Issues
Sardar Ali alias shah
Department of Computer Engineering
Melbourne Institute of Technology
Abstract – Nowadays, SDN is most emerging technology. It is one of the most promising area in
which you easily depend on networking. It is going to virtualization to reality.SDN is basically
separate the control plane and data plane physically. It is dynamically programmable that's why they
have more security issues if they have static programmable it is not much as insecure. Due to
dynamic factor they are facing many security threats related to SDN.We are discussing on SDN
security threats and we present its new framework architecture model.
Index Terms – SDN (software Define Networking).
I. INTRODUCTION Since 1970 there are no big changes in networking. Only the end point such as
computers is where all the magic happens. Even networking equipment such as routers and switches
serves as data collection purpose equipment. In order to develop data planes and have more network
control, management becomes more complex. This type of new technology increases operating cost
of networking.
Body: SDN is the new emerging technology used in data centers, mobiles and enterprise networks
typically used for network virtualization. SDN allows for customized control planes and centralized
data plan abstraction, making control and data planes parted.
This is to give network operator more control and visualize their
... Get more on HelpWriting.net ...
Connector Class Analysis
This area discusses the NS parts, for the most part compound system segments. The foundation of
the pecking order is the Tcl Object class that is the super class of all Otcl library objects scheduler,
system parts, clocks and alternate articles including NAM related ones). As a predecessor class of
Tcl object, Ns object class is the super class of all fundamental system part questions that handle
bundles, which may form compound system protests, for example, hubs and connections. The
fundamental system parts are further isolated into two subclasses, Connector and Classifier, in light
of the quantity of the conceivable yield information ways. The essential system questions that have
stand out yield information way are under the Connector ... Show more content on Helpwriting.net
...
At last, the TTL item figures Time to Live parameters for every parcel got and overhauls the TTL
field of the bundle.
In NS, system exercises are followed around simplex connections. In the event that the test system is
administered to follow system exercises (tagged utilizing $ns follow all record or $ns namtrace–all
document), the connections made after the summon will have the accompanying follow items
embedded as indicated in Figure 9. Clients can additionally particularly make a follow object of sort
between the given src and dst hubs utilizing the make follow {type document src dst} command.
At the point when each one embedded follow object (i.e. Enqt, Deqt, Drpt and Recvt) gets a bundle,
it keeps in touch with the determined follow record without expending any reproduction time, and
passes the parcel to the following system object. The follow configuration will be analyzed in the
General Analysis Example area.
queue Monitor
Essentially, following items are intended to record parcel entry time at which they are found. In spite
of the fact that a client gets enough data from the follow, he or she may be intrigued by what is
happening inside a particular yield line. For instance, a client intrigued by RED line conduct may
need to measure the flow of normal line size and current line size of a particular RED line (i.e.
requirement for line observing). Line checking might be accomplished utilizing line screen
questions and
... Get more on HelpWriting.net ...
Advantages And Advantages Of Dsr
DSR is a reactive protocol and therefore doesn't use periodic updates of routing information. It
computes the routes whenever needed and then maintains them. The distinguishing feature of
Dynamic Source Routing (DSR) is the use of source routing technique in which the sender of a
packet determines the complete sequence of nodes through which the packet has to pass. The sender
lists this route in the packet's header, to identify each forwarding hop by the address of the next
node to which to transmit the packet on its way to the destination node There are two basic steps of
DSR protocol: (i) Route discovery and (ii) Route maintenance. Every node in the network maintains
a cache to store latest discovered paths. Before a node sends a packet, it first checks the cache
whether there is an entry for ... Show more content on Helpwriting.net ...
Also the node keeps the freshness information of the entry to recognize whether the cache is fresh or
not. If any intermediate node receives a data packet, it first checks whether the packet is sent to
itself. If it is the destination, it accepts the packet else it forwards the packet using the route attached
on the packet.
B. Merits and Demerits of DSR
Advantages of DSR are that routes are maintained only between nodes who wants to communicate
and overhead of route maintenance is reduced. Route caching further reduces route discovery
overhead. Many routes to the destination are yielded by a single route discovery due to intermediate
nodes reply from local caches.
The disadvantage is that the packet header size grows with route length as the route is cached
.Flooding of route requests casuses it to reach all nodes in the network. Hence collisions may occur
between route requests propagated by neighboring nodes. Nodes replying using their local cache
increases contention.
C. AODV
... Get more on HelpWriting.net ...
Cerita
Kod Projek : | BITU 3973 |
UNIVERSITI TEKNIKAL MALAYSIA MELAKAFACULTY OF INFORMATION AND
COMMUNICATION TECHNOLOGYPROJEK SARJANA MUDA 1PROPOSAL
FORM[Incomplete form will be rejected] | A | TITLE OF PROPOSED PROJECT:Tajuk projek yang
dicadangkan :ANALYSIS ON IPV6 ATTACK (SMURF6) | B | DETAILS OF STUDENT /
MAKLUMAT PELAJAR | B(i) | Name of Student:Nama Pelajar: JAMALUDDIN BIN NAFIS
Identity card no.:No. Kad Pengenalan : 910424–14–6277Student card no.:No. Kad Pelajar :
B031310034 | B(ii) | CorrespondenceAddress :Alamat Surat Menyurat : 66G JLN MELUR 3 SERI
MELUR KG MELAYU AMPANG 68000 SELANGOR DARUL EHSAN. | B(iii) | Program
Pengajian:Study Program:BITS
BITS
BITM
BITM
BITI
BITI
BITC
BITC
BITD
BITD
| B(iv) | Home ... Show more content on Helpwriting.net ...
And all the result will be documented. 2. Problem Statements There a many type of cybercrime
attack, with different pattern and behaviour. Smurf6 is one of the attack that are launched the attack
via IPv6, the problem with this issue are: No | Problem Statement | PS1 | No policy to prevent from
smurf6 attack | PS2 | Low knowledge in IPv6 technology | 3. Literature ReviewBroadcast Address
Broadcast address is a reserved address that is for sending message and data packets to all machines
on the network segment. A broadcast address is a MAC destination address of all machines. But, in
Internet Protocol Version 6 (IPv6), broadcast are not supported. Generally IPv6 sends a multicast
message to each machines on the network segment. ICMPv6 Internet Control Message Protocol
version 6 (ICMPv6) is an enhancement from ICMP for Internet Protocol Version 6 (IPv6). ICMPv6
is a standard internet protocol that is used to send error messages. ICMP is used by network devices
such as routers. Distributed Denial of Service (DDoS) DDoS is one of the cybercrime attacks that
will flood the victim's traffic and slow down the victim's computer or service. DDoS that used a
broadcast address to get a respond from the entire machine on the network segment. (Abhishek
Singh, 2205), a
... Get more on HelpWriting.net ...
Isolation Mechanism For Jamming Attack
Isolation Mechanism for Jamming Attack in MANET
1. Introduction
Mobile Ad–hoc Network (MANET) attached in a dynamic manner and it is an assembly of wireless
mobile nodes. Without any fixed infrastructure nodes making a temporary network where all nodes
are arbitrarily free to move. In the network nodes are act as routers, which take part in finding and
maintenance of routes to other nodes [1]. Wireless connection in MANET is highly misplay and due
to mobility of nodes it goes down usually. Due to highly dynamic environment coherent routing is a
very difficult task in Mobile Ad–hoc Network [2].
In this paper, we esteem a particular category of DoS attacks called Jamming. In actual fact, the
mobile host in mobile ad hoc networks is a part of wireless medium. Thus, the radio signals can be
jammed or interfered, which make the message to be amoral or missed. If the attacker has a strong
transmitter, a signal can be launched that will be strong enough to conquer the directed signals and
distort communications. There are several attack schemes that a jammer can do in order to interfere
with other wireless communications.
1.1 Jamming attack
The motive of jamming attack is to fill up the communication channel with purposeless signals, due
to which verified or permissible user cannot use it. Jamming slowly down the receiving and sending
of messages at the destination. It is very difficult to prevent and find out the jamming attacks but
still some detection
... Get more on HelpWriting.net ...
Advantages And Disadvantages Of SSAAnd Static Routing...
SSA is descendent of Associativity–Based Routing ABR. Similar to ABR; SSA chooses route based
on location stability and signal strength. In SSA, route selection for a packet is based on choosing
routes based on stronger connectivity's [12]. SSA is based on the two co–operative protocols;
Dynamic Routing Protocol (DRP); Static Routing Protocol (SRP). The DRP had maintains Signal
Stability Table (SST) and the routing table (RT). SST records signal strength of all neighboring
nodes. The signal strength is recorded as stronger or weaker channel. All transmissions are received
and processed in DRP. DRP passes received packet to SRP. It processes them by looking their
destination in the RT. If no entry is found for the destination in the RT then ... Show more content on
Helpwriting.net ...
It supplies the multiple routes for one particular destination. It is helpful in case of topology changes
and node failure. The ODMR protocol uses a concept of Forwarding Group. It means that only a
subset of nodes forwards the multicast data packets via scoped relaying [5].
In ODMR routing, the on–demand route and mesh creation is supported with the help of join query
and join reply messages. In Fig. 6(a), the source node S floods a Join Query to entire network to
refresh membership. Each of the receiving node, stores the backward learning into the routing table
of a node and they rebroadcasts the packet. Finally, when query reaches a receiver, then it creates a
Join Reply and broadcasts to its neighbors. The node receiving the Join Reply checks the Join Reply
packets and its next node id, to find the matches on its own. If yes, it is a subpart of forwarding
group, then sets its FG_FLAG upon the built matched entries it broadcasts the join reply [13]. Join
Reply is broadcasted by each forwarding group member up to it reaches source node through the
shortest path of the network. A route from source to receivers constructs a mesh of nodes called
forwarding group as shown in the Fig. 6
... Get more on HelpWriting.net ...
Web Application For The Smart Agricultural System
The Web Application is used to view and interact with the smart agricultural system. The webpages
are served from the Webserver and consist of HTML, CSS, JS, and JSON files. The HTML and CSS
files are used for the webpages content and layout, the Javascript performs the webpages backend
processing, and JSON is used for data. The Web Application performs most of its interaction with
the Sensor Network through JSON files are passed between the Webserver and the Web Application.
The JSON files contain labeled data that can be displayed as plots or text information. The plots are
updated once every second by requesting new sensor data from the Webserver. This Section will
focus on the software that allows that Web Application to ... Show more content on Helpwriting.net
...
Figure 26: Weather webpage layout. The Temperature, Pressure, Humidity, Light, and Soil Moisture
pages display graphic plots for each sensor value type. These pages allow the user to track in real
time the current status and history of the sensor value. Figure 27: Temperature webpage layout. The
Water Control webpage displays the history the water pump on/off state and value of the
environment's soil moisture. This page gives the best overview of the current system status.
Typically, what you would see is that based on environmental factors such as temperature, humidity,
pressure, and weather, the soil moisture threshold will scale to compensate for the current
conditions. The scaling and compensating factors will be discussed in the smart algorithm section
below. Then, if the environment's soil moisture sensor value falls below the soil moisture threshold,
then the water pump will turn on. This will be reflected in the water control graphical plot. Figure
28: Water control webpage layout. 4.5.2 Data Interface: The Web Application interfaces with the
Webserver by requesting JSON data files. The JSON files contain the sensor data used to update the
plots and command statuses of the Web Application. The information within the files is formatted in
a specific way such that the files can be passed directly to the plotting function. CouchDB performs
the file formatting using its query function. Below is an
... Get more on HelpWriting.net ...
Importance Of Secure Information Transmission In Mobile...
Secure and Authenticate Jamming Attack Proof Secure Information Transmission in Mobile Adhoc
Network
Harsha Jain Pranita Jain
Department of Computer Science Engineering Department of Computer Science Engineering
SATI College SATI College
Civil Lines, Vidisha, M.P., India Civil Lines, Vidisha, M.P., India harshajain98@gmail.com
pranita.jain@gmail.com
Abstract– An Ad–hoc mobile network is an assembly of wireless transportable nodes devotedly
creating a short–lived network lacking the use of any core–existing centralized administration or
network infrastructure. MANET have restrictions owed to mobility, infrastructure and capabilities of
mobile nodes or due to network system as an entire. Limitations due to system or infrastructure, ...
Show more content on Helpwriting.net ...
It is a combination of several wireless nodes that can build a network randomly. The study and
growth of mobile devices and 802.11[2] Wi–
Fi wireless networks is on demand topic of research in MANE. Ad–hoc network doesn't depend on
any central administration or stable infrastructure such as base. While nodes are moving in the
network they interchange the information to each other and may continue to move here and there
and so the network must be prepared.Mobile devices are not having the centralized control,
therefore they are free to move, and hence the topology of such network changes expeditiously. In
the mobile Adhoc system, a number of influences such as physical obstacles movement, unwanted
noise, and climate circumstances contribute to the trouble of precisely forming the actions of the
lifetime of a link among two mobile nodes. The excellence of service must fulfil source end to
destination end data packet transfer without packet loss. Data packets routed between a sender node
(source) and a receiver node (destination) of a MANET often traverse along a path spanning
multiple links, which is known as the multihop path.
To accomplish availability and reliability network routing protocols should be prevailing compared
to jamming attacks. The trustworthiness of distributing data packets from end to end using multi–
hop intermediary nodes is a noteworthy problem in the mobile Adhoc network. Due to the
intrinsically self–motivated nature of
... Get more on HelpWriting.net ...
Nt1310 Unit 6 Assignment 1
6. APPENDIX
//
// Network topology
//
// n0
//  5 Mb/s, 2ms
//  1.5Mb/s, 10ms
// n2 –––––––––––––––––––––––––n3
// /
// / 5 Mb/s, 2ms
// n1
//
// – all links are point–to–point links with indicated one–way BW/delay
// – CBR/UDP flows from n0 to n3, and from n3 to n1
// – FTP/TCP flow from n0 to n3, starting at time 1.2 to time 1.35 sec.
// – UDP packet size of 210 bytes, with per–packet interval 0.00375 sec.
// (i.e., DataRate of 448,000 bps)
// – DropTail queues
// – Tracing of queues and packet receptions to file simple–global–routing.tr
#include
#include
#include
#include
#include ns3/core–module.h
#include ns3/network–module.h
#include ns3/internet–module.h
#include ns3/point–to–point–module.h ... Show more content on Helpwriting.net ...
apps.Stop (Seconds (2.0));
// Create a packet sink to receive these packets PacketSinkHelper sink (ns3::UdpSocketFactory,
Address (InetSocketAddress (Ipv4Address::GetAny (), port))); apps = sink.Install (c.Get (2));
apps.Start (Seconds (0.5)); apps.Stop (Seconds (2.0));
/* // Create a similar flow from n3 to n1, starting at time 1.1 seconds onoff.SetAttribute (Remote,
AddressValue (InetSocketAddress (i1i2.GetAddress (0), port))); apps = onoff.Install (c.Get (3));
apps.Start (Seconds (1.1)); apps.Stop (Seconds (10.0));
// Create a packet sink to receive these packets apps = sink.Install (c.Get (1)); apps.Start (Seconds
(1.1)); apps.Stop (Seconds (10.0));
*/
AsciiTraceHelper ascii; p2p.EnableAsciiAll (ascii.CreateFileStream (trial1.tr));
p2p.EnablePcapAll (trial1);
// Flow Monitor FlowMonitorHelper flowmonHelper; if (enableFlowMonitor) {
flowmonHelper.InstallAll (); }
NS_LOG_INFO (Run Simulation.); Simulator::Stop (Seconds (2.5)); Simulator::Run ();
NS_LOG_INFO (Done.);
if (enableFlowMonitor) { flowmonHelper.SerializeToXmlFile (trial1.flowmon, false, false); }
Simulator::Destroy (); return 0;
... Get more on HelpWriting.net ...
Wireless Sensor Networks Are Used For Detecting The...
Natural disasters have become very critical due to several reasons like global warming. Wireless
sensor networks are used for detecting the natural events by measuring the temperature, air pressure,
vibration, etc. and generate alarms. WSNs can measure the agitation of buildings, CO2 levels, and
weather monitoring, etc. (Yawut  Kilaso, 2011).
WSN that utilized Zigbee/IEEE802.15.4 is utilized as a weather monitoring network. It sends the
information about the weather and generates hazard alarms. Decision tree techniques are used for
analysing the data at sensor site. Weather data is checked with a notification measurement (Yawut 
Kilaso, 2011).
4.3 Wireless Sensor Networks in New Zealand
Telecommunication sector of ICT contributes $3,467 million to GDP in 2013 which is highest than
other sectors (Ministry of Business, Innovation and Employment, 2015). Figure 6. ICT contribution
to GDP by sub–sector (from Ministry of Business, Innovation and Employment, 2015)
MetService: MetService is a NZ weather company that has 2000 autonomous weather stations all
over New Zealand (Ministry of Business, Innovation and Employment, 2013).
MetService is a NZ metrological service that provides warnings and public safety weather service
to New Zealand public. It provides warnings about storms, hurricanes, hazardous weather, and
severe thunderstorms (National Weather Services, n.d.).
Sensors are used by Metservice for weather services. Special sensors like wind sensors,
... Get more on HelpWriting.net ...

Contenu connexe

Similaire à Mat 540 Quiz 3

Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...IJCNCJournal
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...Editor IJMTER
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos TechniquesKatie Gulley
 
Networking Technologies Basic's complete notes
Networking Technologies Basic's complete notesNetworking Technologies Basic's complete notes
Networking Technologies Basic's complete notesIndrajaMeghavathula
 

Similaire à Mat 540 Quiz 3 (9)

Lect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptxLect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptx
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
 
packet switching
packet switchingpacket switching
packet switching
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
 
Networking Technologies Basic's complete notes
Networking Technologies Basic's complete notesNetworking Technologies Basic's complete notes
Networking Technologies Basic's complete notes
 

Plus de Ashley Fisher

How To Write A 4 Page Research Paper. How To Wr
How To Write A 4 Page Research Paper. How To WrHow To Write A 4 Page Research Paper. How To Wr
How To Write A 4 Page Research Paper. How To WrAshley Fisher
 
Essay Writing Tools (FSA Style 5 Paragraph Opinion A
Essay Writing Tools (FSA Style 5 Paragraph Opinion AEssay Writing Tools (FSA Style 5 Paragraph Opinion A
Essay Writing Tools (FSA Style 5 Paragraph Opinion AAshley Fisher
 
Handwriting Paper Zaner-Bloser 97808. Online assignment writing service.
Handwriting Paper Zaner-Bloser 97808. Online assignment writing service.Handwriting Paper Zaner-Bloser 97808. Online assignment writing service.
Handwriting Paper Zaner-Bloser 97808. Online assignment writing service.Ashley Fisher
 
001 I Hate Writing Essay. Online assignment writing service.
001 I Hate Writing Essay. Online assignment writing service.001 I Hate Writing Essay. Online assignment writing service.
001 I Hate Writing Essay. Online assignment writing service.Ashley Fisher
 
University Of Toronto Essay Format In 2021 Essay For
University Of Toronto Essay Format In 2021 Essay ForUniversity Of Toronto Essay Format In 2021 Essay For
University Of Toronto Essay Format In 2021 Essay ForAshley Fisher
 
Persuasive Essay 4Th Grade Lesson - Sandra RogerS R
Persuasive Essay 4Th Grade Lesson - Sandra RogerS RPersuasive Essay 4Th Grade Lesson - Sandra RogerS R
Persuasive Essay 4Th Grade Lesson - Sandra RogerS RAshley Fisher
 
Airmail Writing Pad- Blank- 50 Sheets Two Hands
Airmail Writing Pad- Blank- 50 Sheets Two HandsAirmail Writing Pad- Blank- 50 Sheets Two Hands
Airmail Writing Pad- Blank- 50 Sheets Two HandsAshley Fisher
 
How To Write An Research Paper For Science Fair -
How To Write An Research Paper For Science Fair -How To Write An Research Paper For Science Fair -
How To Write An Research Paper For Science Fair -Ashley Fisher
 
Unlimited Thinking Essay Writing Test. Online assignment writing service.
Unlimited Thinking Essay Writing Test. Online assignment writing service.Unlimited Thinking Essay Writing Test. Online assignment writing service.
Unlimited Thinking Essay Writing Test. Online assignment writing service.Ashley Fisher
 
Admission Essay Essays University And College Ad
Admission Essay Essays University And College AdAdmission Essay Essays University And College Ad
Admission Essay Essays University And College AdAshley Fisher
 
How To Type A Conclusion Paragraph. How To Start A Conclusion Paragraph ...
How To Type A Conclusion Paragraph. How To Start A Conclusion Paragraph ...How To Type A Conclusion Paragraph. How To Start A Conclusion Paragraph ...
How To Type A Conclusion Paragraph. How To Start A Conclusion Paragraph ...Ashley Fisher
 
Analytical Essay Anthropology Research Pap
Analytical Essay Anthropology Research PapAnalytical Essay Anthropology Research Pap
Analytical Essay Anthropology Research PapAshley Fisher
 
Freedom Writers Summary Essay. Online assignment writing service.
Freedom Writers Summary Essay. Online assignment writing service.Freedom Writers Summary Essay. Online assignment writing service.
Freedom Writers Summary Essay. Online assignment writing service.Ashley Fisher
 
Different Citation Styles Examples. Ty. Online assignment writing service.
Different Citation Styles Examples. Ty. Online assignment writing service.Different Citation Styles Examples. Ty. Online assignment writing service.
Different Citation Styles Examples. Ty. Online assignment writing service.Ashley Fisher
 
The Help Movie Review Be A Fun Mum. Online assignment writing service.
The Help Movie Review  Be A Fun Mum. Online assignment writing service.The Help Movie Review  Be A Fun Mum. Online assignment writing service.
The Help Movie Review Be A Fun Mum. Online assignment writing service.Ashley Fisher
 
015 History Essay Topics 008049318 1 Thatsnotus
015 History Essay Topics 008049318 1  Thatsnotus015 History Essay Topics 008049318 1  Thatsnotus
015 History Essay Topics 008049318 1 ThatsnotusAshley Fisher
 
Prompt Essay Review Service. Online assignment writing service.
Prompt Essay Review Service. Online assignment writing service.Prompt Essay Review Service. Online assignment writing service.
Prompt Essay Review Service. Online assignment writing service.Ashley Fisher
 
How To Write A Letter Asking For Help Finding A Job. Find
How To Write A Letter Asking For Help Finding A Job. FindHow To Write A Letter Asking For Help Finding A Job. Find
How To Write A Letter Asking For Help Finding A Job. FindAshley Fisher
 
Writing A Personal Experience Essay
Writing A Personal Experience EssayWriting A Personal Experience Essay
Writing A Personal Experience EssayAshley Fisher
 
H-E-B Central Market Management Theory Analysis
H-E-B Central Market Management Theory AnalysisH-E-B Central Market Management Theory Analysis
H-E-B Central Market Management Theory AnalysisAshley Fisher
 

Plus de Ashley Fisher (20)

How To Write A 4 Page Research Paper. How To Wr
How To Write A 4 Page Research Paper. How To WrHow To Write A 4 Page Research Paper. How To Wr
How To Write A 4 Page Research Paper. How To Wr
 
Essay Writing Tools (FSA Style 5 Paragraph Opinion A
Essay Writing Tools (FSA Style 5 Paragraph Opinion AEssay Writing Tools (FSA Style 5 Paragraph Opinion A
Essay Writing Tools (FSA Style 5 Paragraph Opinion A
 
Handwriting Paper Zaner-Bloser 97808. Online assignment writing service.
Handwriting Paper Zaner-Bloser 97808. Online assignment writing service.Handwriting Paper Zaner-Bloser 97808. Online assignment writing service.
Handwriting Paper Zaner-Bloser 97808. Online assignment writing service.
 
001 I Hate Writing Essay. Online assignment writing service.
001 I Hate Writing Essay. Online assignment writing service.001 I Hate Writing Essay. Online assignment writing service.
001 I Hate Writing Essay. Online assignment writing service.
 
University Of Toronto Essay Format In 2021 Essay For
University Of Toronto Essay Format In 2021 Essay ForUniversity Of Toronto Essay Format In 2021 Essay For
University Of Toronto Essay Format In 2021 Essay For
 
Persuasive Essay 4Th Grade Lesson - Sandra RogerS R
Persuasive Essay 4Th Grade Lesson - Sandra RogerS RPersuasive Essay 4Th Grade Lesson - Sandra RogerS R
Persuasive Essay 4Th Grade Lesson - Sandra RogerS R
 
Airmail Writing Pad- Blank- 50 Sheets Two Hands
Airmail Writing Pad- Blank- 50 Sheets Two HandsAirmail Writing Pad- Blank- 50 Sheets Two Hands
Airmail Writing Pad- Blank- 50 Sheets Two Hands
 
How To Write An Research Paper For Science Fair -
How To Write An Research Paper For Science Fair -How To Write An Research Paper For Science Fair -
How To Write An Research Paper For Science Fair -
 
Unlimited Thinking Essay Writing Test. Online assignment writing service.
Unlimited Thinking Essay Writing Test. Online assignment writing service.Unlimited Thinking Essay Writing Test. Online assignment writing service.
Unlimited Thinking Essay Writing Test. Online assignment writing service.
 
Admission Essay Essays University And College Ad
Admission Essay Essays University And College AdAdmission Essay Essays University And College Ad
Admission Essay Essays University And College Ad
 
How To Type A Conclusion Paragraph. How To Start A Conclusion Paragraph ...
How To Type A Conclusion Paragraph. How To Start A Conclusion Paragraph ...How To Type A Conclusion Paragraph. How To Start A Conclusion Paragraph ...
How To Type A Conclusion Paragraph. How To Start A Conclusion Paragraph ...
 
Analytical Essay Anthropology Research Pap
Analytical Essay Anthropology Research PapAnalytical Essay Anthropology Research Pap
Analytical Essay Anthropology Research Pap
 
Freedom Writers Summary Essay. Online assignment writing service.
Freedom Writers Summary Essay. Online assignment writing service.Freedom Writers Summary Essay. Online assignment writing service.
Freedom Writers Summary Essay. Online assignment writing service.
 
Different Citation Styles Examples. Ty. Online assignment writing service.
Different Citation Styles Examples. Ty. Online assignment writing service.Different Citation Styles Examples. Ty. Online assignment writing service.
Different Citation Styles Examples. Ty. Online assignment writing service.
 
The Help Movie Review Be A Fun Mum. Online assignment writing service.
The Help Movie Review  Be A Fun Mum. Online assignment writing service.The Help Movie Review  Be A Fun Mum. Online assignment writing service.
The Help Movie Review Be A Fun Mum. Online assignment writing service.
 
015 History Essay Topics 008049318 1 Thatsnotus
015 History Essay Topics 008049318 1  Thatsnotus015 History Essay Topics 008049318 1  Thatsnotus
015 History Essay Topics 008049318 1 Thatsnotus
 
Prompt Essay Review Service. Online assignment writing service.
Prompt Essay Review Service. Online assignment writing service.Prompt Essay Review Service. Online assignment writing service.
Prompt Essay Review Service. Online assignment writing service.
 
How To Write A Letter Asking For Help Finding A Job. Find
How To Write A Letter Asking For Help Finding A Job. FindHow To Write A Letter Asking For Help Finding A Job. Find
How To Write A Letter Asking For Help Finding A Job. Find
 
Writing A Personal Experience Essay
Writing A Personal Experience EssayWriting A Personal Experience Essay
Writing A Personal Experience Essay
 
H-E-B Central Market Management Theory Analysis
H-E-B Central Market Management Theory AnalysisH-E-B Central Market Management Theory Analysis
H-E-B Central Market Management Theory Analysis
 

Dernier

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Dernier (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Mat 540 Quiz 3

  • 1. Mat 540 Quiz 3 Quiz #1: What are the ways in which we can keep a check on the number of duplicate packets generated due to the Flooding Routing technique?. Answers; Techniques used to avoid flood duplication. 1. Include HOP COUNTER in the header packet which decrement at each hop along the path 2. Keep tracking of packed that have been flooded, to avoid sending them a second time. Where Source Router puts a sequence number in each packet it receives from its hosts. 3. Use selective flooding. In selective flooding the routers do not send every incoming packet out on every output line. Instead packet is sent only on those lines which are approximately going in the right direction Also in some books are highlighted as Use of Hop Counter or Time to live (TTL) ... Show more content on Helpwriting.net ... What is it? Answer: Store–and–Forward: Store–and–Forward switching will wait until the entire frame has arrived prior to forwarding it. This method stores the entire frame in memory. Once the frame is in memory, the switch checks the destination address, source address, and the CRC. If no errors are present, the frame is forwarded to the appropriate port. This process ensures that corrupted or truncated frames do not affect the destination network. While Cut–Through: Cut–Through switching will begin forwarding the frame as soon as the destination address is identified. The difference between this and Store–and–Forward is that Store–and– Forward receives the whole frame before forwarding. Since frame errors cannot be detected by reading only the destination address, Cut–Through may impact network performance by forwarding corrupted or truncated frames. These bad frames can create broadcast storms where in several devices on the network respond to the corrupted frames simultaneously. Quiz #4: Very briefly explain the Optimality Principle and the use of Spanning Trees in routing schemes Answer: Spanning Tree: The packet is sent only on those links that lead to the destination ... Get more on HelpWriting.net ...
  • 2.
  • 3. The Debate Over The Internet The Internet in the year 2009. We send e–mails, make calls over the internet and discuss topics we take an interest in. Even our banking is going virtual. But what we take for granted today was only a vague idea fifty years ago. In order to understand how we got this far Let's go back to 1957, when everything began. Before 1957 computers only worked on one task at a time. This is called batch processing. Of course, this was quite ineffective. With computers getting bigger and bigger they had to be stored in special cooled rooms. But then the developers couldn 't work directly on the computers anymore – specialists had to be called in to connect them. Programming at that time meant a lot of manual work and the indirect connection to the computers led to a lot of bugs, wasting time and fraying the developers´ nerves. The year 1957 marked a big change. A remote connection had to be installed so the developers could work directly on the computers. At the same time the idea of time–sharing came up. This is the first concept in computer technology to share the processing power of one computer with multiple users. On October 4th 1957, during the Cold War The first unmanned satellite, Sputnik 1, was sent into orbit by the Soviet Union. The fear of a "Missile Gap" emerged. In order to secure America 's lead in technology, the US founded the "Defense Advanced Research Project Agency" in February 1958. At that time, knowledge was only transferred by people. The DARPA planned a ... Get more on HelpWriting.net ...
  • 4.
  • 5. It Infrastructure Answers 1.13 Convergence – In the telecommunications industry, convergence refers to the integration of voice, internet, broadcasting, and other telephony servers into one mega–industry from their traditionally separate industries. Companies such as Telstra are an excellent example of this, as Telstra now offers an abundance of products such as, Fixed Phone, Mobile Phone, Dialup Internet, Broadband Internet, Wireless Internet, TV, Music, Tickets, and more. Incentives are given to "bundle" services with the one particular provider, which can have advantages and disadvantages. Unified Communications – This term refers to the integration of video, voice, data and messaging into a software suite. A particular advantage of these suits is that they ... Show more content on Helpwriting.net ... End user programming allows you to take prewritten modules and assemble them into a solution which fits a particular use well, without having to learn advanced programming techniques. Increasingly, large organisations are customising their internal communications software to suit the organisation's needs. This is often end–user programming, however is occasionally outsourced to technical support companies. Gaining technical support for this particular solution can be troublesome and expensive, as the support officers must become completely familiar with the software before they can supply advice. 4.1 Both circuit–switching and packet–switching are methods of data communication between two parties. In circuit switching, both parties agree on a specific path which the data will travel along while the connection is open using a resource optimization algorithm before the transmission begins. The route is used exclusively for the entire session and only released when the session is terminated. In packet–switching, the path which the data takes is not predetermined but rather decided upon by the packets during transit. It does this using the packet header which contains all the information it needs to get to its destination. At each hop, the packet will re–evaluate the shortest path to get to the destination. Packet switching is the more appropriate technology to be used for the internet because of the dynamics of the internet itself. Computers connected the internet are ... Get more on HelpWriting.net ...
  • 6.
  • 7. A Research Study On Abstract- Vehicular Networks Essay Abstract– Vehicular networks or VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks among them the black hole attack. In this attack, a malicious node disseminates spurious replies for any route discovery in order to monopolize all data communication and deteriorate network performance. Many studies have focused on detecting and isolating malicious nodes in VANET. In this paper, we present two mechanisms to detect this attack. The main goal is detecting as well as bypass cooperative black hole attack. Our approachs has been evaluated by the detailed simulation study with NS2 and the simulation results shows an improvement of protocol performance. . Keywords– VANET; AODV; Black Hole;Ad Hoc; NS2 I. INTRODUCTION Ad hoc networks consist of a set of self–organized of mobile nodes which cooperate using a routing protocol to facilitate the communication. They have become very popular in recent years due to their characteristics: easy deployment, lack of infrastructure, dynamic topology, mobility and minimum commissioning costs. A VANET network is a subset of ad hoc networks where each mobile node is an intelligent vehicle equipped with communication ... Get more on HelpWriting.net ...
  • 8.
  • 9. A Real Time Leaky Bucket Based Admission Control Scheme... A Real Time Leaky Bucket Based Admission Control Scheme for VoIP Networks Seminar Report Submitted By Arunima Goel Reg. No: 130907620 Section: B2 Department of Electronics and Communication Engineering MANIPAL INSTITUTE OF TECHNOLOGY (A Constituent Institute of Manipal University) MANIPAL–576 104 August 2016 INDEX SR. NO. TOPIC PAGE NO. 1. Introduction 3 2. Leaky Bucket Algorithm 3 3. Call Admission Control(CAC) 4 4. The RLB–CAC Technique 4 5. Transforming LB into a rate tester 5 6. Conclusion 7 7. References 8 1. INTRODUCTION A significant amount of research efforts have been directed towards attempts at providing high quality service for real time applications of IP based networks in the past decade. The core idea of these techniques is to control the IP network congestion level which is the main cause of delays/losses, and also imposes upper bounds on these events. Traffic policing is one of the techniques used for this purpose. These techniques makes the assumption that users generating flows/calls will specify the setup time by using Service Level Agreement (SLAs) i.e. the characteristics of the traffic that they emit to the network. Therefore, these techniques are employed to ensure that the generated traffic is within the conforms of previously agreed contracts. One of the most popular traditional traffic policing techniques is the Leaky Bucket (LB). Average rate and the maximum burst size/length of a ... Get more on HelpWriting.net ...
  • 10.
  • 11. Causes Of Gossiping In Flooding To solve the problems of flooding, an approach known as gossiping, has been proposed [ref]. Gossiping uses a simple forwarding method and does not need costly topology maintenance. It uses a randomized rule to forward data packets. Each sensor node transmits the incoming data packet to a randomly selected neighbor. After receiving the data packet, the neighbor randomly chooses one of its own neighbors and transmits the packet to the neighbor chosen. This process continues until the data packet reaches its destination or the hop count is exceeded. Gossiping limits the number of data packets that each sensor node is sent to its neighbor to one copy which avoids the implosion problem. However, random selection of neighboring node is an unsafe ... Show more content on Helpwriting.net ... When a sensor node has new data, it advertises it using the ADV messages to its neighbors. When a neighboring node receives this message, it checks whether it has already received or requested the advertised data. If not, it sends an REQ message back to the broadcast address requesting the data item. Upon receiving a REQ message, only the originating node sends the actual data to the requesting nodes. One advantage of this protocol is its simplicity and does not require any other topology information. 2. SPIN–EC: In this protocol, the sensor nodes using the same 3–way handshake protocol to communicate with each other as in SPIN–PP but energy is considered to be a constraint. A sensor node will only participate in the protocol if it is above a certain energy threshold and supposes it can complete all other stages of the protocol. If a sensor node receives an advertisement message, it will not transmit an REQ message if it does not have enough energy to transmit it and receive the corresponding DATA message. 3. SPIN–BC: This protocol has been designed for broadcast networks in which the sensor nodes use a single shared channel to communicate. When a sensor node transmits a message, it is received by all other nodes within a certain range of the sender node. In this protocol, a sensor node which has received an advertising message does not immediately respond with an REQ message. It has to wait for a certain time before transmitting the REQ message. When other sensor ... Get more on HelpWriting.net ...
  • 12.
  • 13. Matching Supply and Demand Chapter 3: Process analysis COMFY SHOES INC Comfy Shoes Inc builds shoes tailored to meet each individual customer's needs. Customers who visit the downtown offices of Comfy Shoes in Philadelphia can choose one or more of the following four custom–tailoring services. Customers receive their shoes in the mail within a week of their initial visit. Service Description Time Resource used A. Walking Basics Take measurements for basic walking shoes. 12 min. 1 attendant B. Walking Plus Choose specific design (e.g. material, color selection) 12 min. 1 attendant C. Running Basics Take measurements for tailor–made running shoes 10 min. 1 attendant D. Running Adv Consult physical therapist and obtain precise needs for running shoes. ... Show more content on Helpwriting.net ... (A contact print is an 8"x10" sheet of photographic paper that has all pictures on the roll of film printed next to each other at reduced dimensions and is used as an index.) The workflow for OCP is shown below (s=standard, d=deluxe, p=pro): OCP is operated by one person at every station. On average, OCP receive 13 jobs per hour consisted of 44% standard, 37% deluxe and 19% pro. Which of the following statement best describes OCP's process? a. The process is demand–constrained b. The process is capacity–constrained and "process film" is the bottleneck c. The process is capacity–constrained and "scan film" is the bottleneck d. The process is capacity–constrained and "make 6"x4" prints" is the bottleneck e. The process is capacity–constrained and "make contact print" is the bottleneck Implied utilization is: (100% * 13 jobs/hr * 2min/job ) / (60min/hr) = 0.43 at "process film" ((37%+19%) * 13 jobs/hr * 5min/job ) / (60min/hr) = 0.61 at "scan film" ((44%+37%) * 13 jobs/hr * 4min/job) / (60min/hr) = 0.70 at "make 6"x4" prints" (19% * 13 jobs/hr * 10min/job) / (60min/hr) = 0.41 at "make contact print" As implied utilization is less than 1.0 at all steps, the process is demand–constrained.
  • 14. What is the implied utilization (ratio of workload relative to capacity) at "Scan Film" a. less than 50% b. 50% to 60% c. 60% to 70% d. 80% to 90% ... Get more on HelpWriting.net ...
  • 15.
  • 16. Nt1330 Unit 3 Assignment 1 Samuelraj Vibin TELE 5330 – Fall 2014 NU ID: 001772299 Q1. 1a) NAME TTL TYPE DATA ns.test.com 1800 A 192.186.1.1 test.com 1800 NS ns.test.com 1b) i) When it is very expensive and slow to access the external network: Forwarding dns server is used. A forwarding server is a type of DNS server which simply forwards requests to another DNS server and caches the results. The forwarding DNS server provides recursive query support which results in only a single query across the network thereby reducing the network congestion (especially the busy networks) and increasing performance on slow networks. ii) When load balancing needs to be performed based on the source ips: Split Horizon dns server is used. Split Horizon is normally used to describe a DNS ... Show more content on Helpwriting.net ... 2) P2P is more reliable as the failure of one peer doesn't affect the functioning of other peers. In case of Client –Server network, if server goes down, then the whole network gets affected. 3) There is no need for full–time System Administrator. Every user is the administrator of his machine. User can control their shared resources. 4) The over–all cost and maintaining this type of network is comparatively very less. Q3 Mr. A and Mr. B can do a video conferencing effectively using the protocols SIP (Session Initiation Protocol) and RTP (Real–time Transport Protocol) · The SIP is used for signaling purposes, i.e. establish a connection between A and B. · The RTP is used for data communication purposes, i.e. carries audio and video streams across the IP ... Get more on HelpWriting.net ...
  • 17.
  • 18. Information Disclosure and Cybercrime Information Disclosure. It is essential to protect any con dential information exchange during the communica–tion process. Also any unauthorized access too the critical data stored on nodes must bepossible. In ad hoc networks, such information may contain anything, e.g., the specific status details of a node, the location of nodes, private keys or secret keys, passwords, and so on. The control data are more critical for security than the trac data. Forinstance, the routing directives in packet headers such as the identity or location of thenodes can be more valuable than the application–level messages.Confidential or importantinformation may be leaked to unauthorized nodes present in the network by compromised node. Such information may contain information regarding geographic location of nodesor optimal routes to authorized nodes in the network,the network topology.Routing AttacksThere are several attacks which can be mounted on the routing protocols and mayinterrupt the proper operation of the network. Brief descriptions of such attacks aregiven below:1. Routing Table Over owIn the case of routing table over ow, routes to nonexistent is created by theattacker. To create enough routes to prevent new routes from being created or tooverwhelm the protocol implementation is the goal.In the case of proactive routingalgorithms, discovering routing information is necessary even before it is ... Get more on HelpWriting.net ...
  • 19.
  • 20. A Report On The Network In this section, we will see the two networks constructed in Mininet and the flows running through the network Flows: 1. A total of 12 simulations were run through the network. Flows were generated between hosts using the tool D–ITG. 2. Traffic generation: D–ITG is used for generating traffic in the network. Random hosts and clients are selected for sending traffic. To get sufficient delay in the network the link is used up to 100% in case of heavy traffic, around 70% for medium traffic and 20% for low traffic. The receiver logs are registered for each flow. Flows nature is UDP as UDP does not re–attempt to send a dropped packet. The packet size is fixed to 1024 and number of packets send per second can be changed depending on the traffic requirement. The following tables give the details of each flow which were simulated for network 1. The network was created in Mininet. It consists of 12 hosts and 8 OpenV switches. It uses the external controller which is selected in Mininet python code. Network 2 is constructed in Mininet. It is a partial tree structure with 11 switches and 12 hosts. External Floodlight controller is connected to the Mininet network using python code. The controller is set in a different Virtual machine. Each KQI will be analyzed for all three algorithms on both the network. 1. Average Delay: The best performing algorithm for high traffic flows is a latency based algorithm. It gives a minimum delay of 1.845 sec which is 28% lower than the delay observed ... Get more on HelpWriting.net ...
  • 21.
  • 22. Software Defined Networking : A Literature Review SOFTWARE DEFINED NETWORKING A Literature Review Presented to Prof. Sharmin Khan Department of Computer Science San Jose State University In Partial Fulfillment Of the Requirements for the class CS200W By Hina Mohare April 2016 ABSTRACT Software Defined Networking (SDN) is a rapidly growing technology which has received lot of attention. It addresses some of the long–standing challenges in the field of computer networks. It simplifies and makes it easier to management network. The core idea behind SDN is to pull out the intelligence from network devices like switch and router so that entire network can be controlled from a centralized single controller. The SDN controller has the global view of entire network devices. The controller can be customized by the network administrators or by the engineers as per the need of the business. The SDN technology makes the network programmable, agile, dynamic, scalable, flexible and centrally controlled. This paper initially focuses on the need of SDN. In the later part consists of architecture of the SDN enabled network, its different applications, challenges in implementing SDN. Table of Contents 1. Introduction 1 2. Need of SDN 4 3. Architecture of SDN 4 4. Open flow 5 5. Applications of SDN 7 6. Challenges 8 7. Conclusion 10 References.............................................................................................................................................11 1. INTRODUCTION Today, every modern business uses computer networks whether it is on premise, could–based or a combination of ... Get more on HelpWriting.net ...
  • 23.
  • 24. Information Technology Issues And Procedures The information technology issues and procedures involved in ensuring a successful business contingency plan revolve around the effective system analysis and design process. The phases of system analysis and design involved include preliminary study, feasibility study, system analysis, system design, coding/programming, testing, implementation and finally maintenance. Preliminary study is the first step, and it involves just a brief study of the business system to be put in place. This enables the developers to have an overview of how the physical system will be. Once the management approves the preliminary study, feasibility study commences. This process estimates the operational, economical, technical and scheduled effectiveness of the system to users. System analysis involves breaking down the entire business process into smaller processes and doing a detailed study on them. This is with a view to understanding how information flows to improve the system processes (Williams, Hardy Holgate, 2013). System design is the most vital phase where the system analysis logic is implemented into a physical system. System design process commences with the general design; where costs of the system building blocks are estimated. Then finally the detailed design process is implemented which involves designing output and input of the system data. Programmers then code the system design into a workable code Testing then follows; where a system test run is done to identify and remove ... Get more on HelpWriting.net ...
  • 25.
  • 26. The Kellogg 's Factory Makes Pop Tarts BEEP BEEP BEEP! My alarm sounds. I jolt a little, but I shut it off and shift out of bed. The clock glares 6:15 a.m. It was just another weekday: get up early, go to work, come home, sleep. Or so I thought. I ate breakfast, got dressed, and set on my bike to work. Every day I worked at the Kellogg 's factory. The Kellogg 's factory makes Pop Tarts. My job is to take the individually wrapped Pop Tarts and put them in a sealed box. Every day I worked as hard as I could. Our biggest competition was the Kroger–Brand Pop Tart, Iced Toaster Treats. Anyways, I worked long and hard. My wrists even started to hurt from all that intense packaging. Meanwhile, a worker from Iced Toaster Treats sneaks in unknowingly into our Control Department. I ... Show more content on Helpwriting.net ... I walk into a vast, dark corridor with nothing but my flashlight to provide me vision for my path. The hallway was very long with nothing along it but unlabeled doors. A bright red line caught my eye. I turned and saw what I thought were lasers. As my flashlight glided along them, I saw the rows and rows of lasers, guarding a large shiny safe, but I didn't come there for there money, so I kept walking. Finally, I came to what seemed to be the only labeled door, the Control Department. I busted in with my crowbar and shined my flashlight inside. After inspecting a while, I came across a little red box marked sabotage. Inside the box were a couple of silver packets and a couple of blue packets. The blue packets were what I assumed was the antidote. I didn't really have time to check because workers would start to come in in about 15 minutes. I grabbed the blue packet and paced quickly out the door. Apparently I wasn't very cautious because I tripped on a wire and face planted, and the little blue packet flew out of my reach. The wire went around an antenna pole that fell when I tripped. The antenna pole hit a box of metal washers off a shelf. I shielded myself on the ground with my arms and closed my eyes. The washers went everywhere. One rolled out the door. Lying close to the door, I watched the washer roll towards the red light of the lasers. I dreaded as it rolled closer and closer to the rows of lasers. Sure enough, it rolled through one laser and fell on its ... Get more on HelpWriting.net ...
  • 27.
  • 28. Controlled Content Distribution For Peer Networks CONTROLLED CONTENT DISTRIBUTION IN PEER–TO–PEER NETWORKS Amna Qureshi Controlled Content Distribution in Peer–to–Peer Networks Research Problem: Centralized fingerprinting mechanism has an encumbrance of computational overheads and high communication bandwidth costs. Central repository of authenticating data has also raised concerns over the loss of privacy and potential misuse of biometric data. For instance, biometric data stored at a central repository can be used to track individuals by checking where they visit or shop. This centralization, when compromised, may lead to data being used for unintended purposes like searching private information using latent fingerprints, revelation of certain health problems that may lead to discrimination among peers, etc. Objectives: To develop a multicast approach to the anonymous fingerprinting problem. This will reduce computational overheads and high communication bandwidth costs that characterize anonymous fingerprinting. To ensure privacy in Controlled Content Distribution in Peer–to–Peer Networks through the use of advanced cryptography features of group signatures. To provide a straightforward alternative to the conventional broadcast transmission that precludes fingerprinting the copy obtained by each receiver. To make data privacy a striking feature in peer–to–peer applications. To achieve security and scalability in content distribution. To provide a fingerprinting scheme that is not susceptible to ... Get more on HelpWriting.net ...
  • 29.
  • 30. Wireshark Essay First, let's talk about Wireshark, it is the most common network packet analyzer used worldwide, perhaps one of the best open source (free) packet analyzers today. It lets you capture and interactively browse the traffic running on a computer network, helping you analyze and manage the traffic in your network. Like a measuring device used to examine what is going on in your network cable, like a voltmeter used by an electrician to examine what is going on inside an electric cable. Therefore, gives you the tools to do in depth network analysis, it will try to capture network packets and display them as detailed as possible for analysis. Furthermore, used for troubleshooting network problems, examine security problems, debug protocol ... Show more content on Helpwriting.net ... Nevertheless, it gives the option to colorize packet display based on filters, create various statistics, rich VoIP analysis and much more. The software does not provide intrusion detection system capabilities for your network. As a result, it will not warn you when someone is trying to do anything bad to or on your network but it will help you to find out. Additionally, it will not manipulate things on the network, it will only display things from it. Furthermore, it does not send packets on the network or does other active things. System requirements for Windows operating systems. It will support any current version of Windows that is still in the extended supported lifetime and any modern 64–bit AMD64/x86–64 or 32–bit x86 processor. Requires, 400 MB available RAM but larger captures require more RAM also 300 MB available disk space but capture files require more space from your system. Additionally, it recommends 1280x1024 resolution or higher, at least 16–bit color and a supported network card for capturing ethernet and/or 802.11 (wi–fi). Wireshark supports most Unix and Unix–like platforms and the system requirements are the equivalents of Windows systems. An alternative free network analyzer (Packet Sniffer) application available is Capsa it allows you to monitor network traffic, troubleshoot network issues and analyze packets. Teachers and students of network classes use it to demonstrate network ... Get more on HelpWriting.net ...
  • 31.
  • 32. Computer Science: Ipv4 to IPv6: Problems Faced in the... Since its advent the Internet has been making its way into very farfetched corners of the world, allowing people to virtually reduce distances. Now the Internet was based on a notion called IP (Internet Protocol), Internet Protocol Version 4 (IPv4) to be exact. Now as the number of computer connected to the Internet grows, the amount of numbers in the IPv4 protocol was finite. Simply put, there are 2^32 useful addresses in IPv4 (subtracting the loopback and the non–routable). With all the connected computers (and growing) this number looks very small. That being said the number of non–allocated IPs is decreasing at a very fast pace. To cater to this problem IPv6 is brought forward. Although there are a lot of problems with the implementation, it certainly brings forward a huge pool of addresses supplemented by some really good security benefits. Some of them include decreased vulnerability to the man in the middle attacks and larger atmosphere surface area, making worm proliferation less effectual. While some may consider these benefits to be negligible, they should be embraced within a set economic cost. That being said, there is a multitude of problems while migrating from IPv4 to IPv6. Some might even consider a problem of unprecedented magnitude as the migration can and will affect anything that touches the World Wide Web. It is not just that there are technical aspects of the Internet that will be effected, but there are certain other aspects that need to be regarded ... Get more on HelpWriting.net ...
  • 33.
  • 34. Essay on IS3220 Final Exam IS3220 Final Exam Review 1. What can you detect by analyzing a data packet? Policy violations and possible network vulnerabilities 2. NetWitness Investigator works how? Real Time 3. What is used by TCP to establish a session between two systems? Three way handshake 4. Which of the following protocols is a connection–oriented protocol that operates at the transport layer of the OSI model and supports reliable connections? TCP 5. Promiscuous mode is most commonly associated with_____________? NIC 6. What are the primary objectives of information security? CIA 7. Personnel should be authenticated and authorized prior to being granted access to company's information resources. This statement is an example of ________________? Policy 8. ... Show more content on Helpwriting.net ... Analyze both static and real–time data 23. What does an application–level proxy do? Examines Packet Payloads 24. What are some of the problems facing static filtering? Can't hit random source ports 25. What type of firewall keeps track of state tables to sieve network traffic? Stateful 26. Where should firewall rules that explicitly deny traffic be placed? At the bottom 27. What is the most important practice associated with firewall logging? Review Firewall Logs Frequently 28. Which firewall limitation is typically characterized by a memory–based exploit? Buffer Overrun 29. Firewall enhancements are desirable in all situations and should be deployed at any cost. False 30. Which of the following characteristics is included in a reverse proxy? Caching and Authentication 31. What is a benefit of using VPNs? Establishes Remote Network Access 32. Which aspect of the VPN prevents others from eavesdropping and observation? Cryptographic Functions 33. What is an advantage of VPN tunnel mode? Encapsulates protocol headers and packet payloads 34. Which of the following characteristics of a software VPN makes it less advantageous than a hardware VPN? Open sourced clients can be complex to install 35. To develop an AUP, you need to __________. Baseline Rules 36. Uninstalling all unnecessary applications and services on a system is an example of which of the following? System hardening 37. 192.168.12.12/255.255.255.255 is an example of which of the
  • 35. ... Get more on HelpWriting.net ...
  • 36.
  • 37. Essay On Malicious Algorithms In [10], author proposed a scheme which identifies the malicious nodes by using aggregate signature algorithm. It associates three algorithms. (1) The proof creating algorithm: Whenever the nodes involved in a communication receive a message, they create a proof that is based on aggregate signature algorithm. (2) The checkup algorithm: This algorithm is called when the source node suspects that the transmitted packets are dropped. If the destination reports that it does not receive all transmitted packets, it will invoke this algorithm to detect the malicious node. (3) The diagnosis algorithm: works with the results of check up algorithm. Simulation is done in ns2 simulator. Using this proposed method, overhead is reduced and packet ... Show more content on Helpwriting.net ... Performance metrics are measured which shows that packet loss is less than AODV. Packet Loss increases as mobility increases. In route discovery process, an intermediate node will try to create a route and this route should not contain a node whose legitimacy ratio lesser the lower threshold level. [18] Proposed a black hole avoidance scheme. An enhancement is made in the AODV routing protocol to eliminate the black hole. The source first sends the route request and waits for responses from all neighboring nodes with which it gets a reliable route. According to this proposed scheme the source node should not send data packets immediately after receiving the first reply. Timer Expired Table is used to set timer after the reception of first reply. This table stores the sequence number of the packet.Collect Route Reply Table is used to store arrival time. Node's waiting time depends on the distance. Entries in the table help to identify malicious node. [19] presented a black hole detection scheme. In this method, when the source node receives RREP packets, it generates a new RREQ. RREQ has the highest sequence number and it is unicast through the route which the RREP packet was received. Malicious node generates a RREP with highest sequence number on receiving RREQ. Malicious node sends the fake RREP packet to the source node. Now source identifies the malicious node. This method has very less overhead. [20] analyses all ... Get more on HelpWriting.net ...
  • 38.
  • 39. Backpressure Based Adaptive Routing and Scheduling In... Under high traffic conditions, this works very well, and backpressure is able to fully utilize the available network resources in a highly dynamic fashion. Under low traffic conditions, however, because many other nodes may also have a small or 0 queue size, there is inefficiency in terms of an increase in delay, as packets may loop or take a long time to make their way to the destination. This is particularly of concern in intermittent encounter–based mobile networks which are already delay– limited due to the sparse and highly dynamic network connectivity. Such networks have proposed the use of redundant transmissions to improve delay, which do not work well when the traffic load is high. Routing protocol, such as Spray and Wait, that ... Show more content on Helpwriting.net ... The additional transmissions incurred by BWAR due to the duplicates utilize available slots which would otherwise go idle, in order to reduce the delay. Particularly for networks that are not energy– limited, this offers a more efficient way to utilize the available bandwidth during low load conditions. In order to minimize the storage resource utilization of duplicate packets, ideally, these duplicate packets should be removed from the network whenever a copy is delivered to the destination. Since this may be difficult to implement (except in some kinds of networks with a separate control plane), we also propose and evaluate a practical timeout mechanism for automatic duplicate removal. Under high load conditions, because queues are rarely empty, duplicates are rarely created, and BWAR effectively reverts to traditional backpressure and inherits its throughput optimality property. By design, BWAR is highly robust and distributed and does not require prior knowledge of locations, mobility patterns, and load conditions. The duplicate queues are maintained and utilized as follows: Original packets when transmitted are removed from the main queue; however, if the queue size is lower than a certain threshold qth, then the transmitted packet is duplicated and kept in the duplicate buffer associated with its destination if it is not full (otherwise no duplicate is created). Duplicate packets are not removed from the duplicate buffer when transmitted. They ... Get more on HelpWriting.net ...
  • 40.
  • 41. The Pros And Cons Of Postal Service Hence, they try to get involved in generating revenue by infringing on net neutrality principles. They prioritize data packets from certain sites, which are ready to pay for this service. For an analogy, postal service officials don't read the letters they are delivering. For a common service, is it possible for them to read the letter and decide if they are going to deliver the packet or not? Is it ethical for a postman to priorities a mail delivery by taking bribe from the sender? For another analogy, roads treat all commuters equally. They don't charge differentially based on what vehicles are carrying or what the destination is. Roads or vehicle registration authority may charge more for bigger vehicles since they damage the roads more. But going by the same analogy, ISPs can charge differently to heavy usage customers. By no means they have the right to inspect the data internet packets. Another analogy is of electricity service. Power distribution authority doesn't charge variably by looking into what people are using the energy for. They may charge variably based on amount of energy usage. The same can be done by ISPs to increase revenue or control congestion. They can charge more to the people for consuming more data thus managing congestion and increasing profitability. Competition is the mother of invention. By prioritizing data packets coming from certain sites, ISPs are hindering the competition. New market players generally do not have a budget to pay ISPs for ... Get more on HelpWriting.net ...
  • 42.
  • 43. Using Two Different Switching Switches And Hubs SUMMARY In this lab, we have set up switched LAN using two different switching devices i.e Switches and Hubs. Various performance metrics like throughput, collision count, traffic received, traffic sent and delay are analysed by implementing the network with and without switches. The network is then modified such that its maximum performance and efficiency is achieved. OBJECTIVE The main objective of this lab is to design a network with and without switches and examine the network's parameters in both the scenarios. Two such scenarios were created: 1) Only hub (where one hub is connected to 16 work stations) 2) Hub and Switch (where 8 work stations are connected for two hubs and a switch connecting them). Here, a hub is a device which ... Show more content on Helpwriting.net ... The X and Y coordinates are set to 50. The name of Ethernet16_hub is set to Hub1. Each work station is configured by changing its attributes to as shown in the image below. This is done for all the sixteen work stations. The next step is to Choose Individual DES statistics. For this project, various statistics like Delay, Traffic received, Traffic sent and Collision count are selected. The simulation is then run by selecting the duration to 2 minutes. The graph is as follows. The red curve represents Traffic received, green represents Traffic sent and blue represents Delay. From the graph, it is clear that the delay is almost negligible when it is compared with the traffic sent and traffic received. Now the current scenario is duplicated and named as HubAndSwitch. In this scenario, a hub which is Ethernet16_hub and a switch which is Ethernet16_switch are added to the work place by selecting from the object palette. The names are set as Hub2 and Switch respectively. The network is then modified by placing the switch in between the two hubs and connecting 8 work stations to each hub with 10Base T links. The network appears as shown in this image below. The DES statistics are same as that of the OnlyHub scenario. The results are obtained by running the simulation and setting the duration to two minutes. ... Get more on HelpWriting.net ...
  • 44.
  • 45. Advantages Of Proactive And Reactive Routing Hybrid (both proactive and reactive) routing This type of protocol combines the advantages of proactive and reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice of one or the other method requires predetermination for typical cases. The main disadvantages of such algorithms are: 1. Advantage depends on number of other nodes activated. 2. Reaction to traffic demand depends on gradient of traffic volume. Examples of hybrid algorithms are: ZRP (Zone Routing Protocol) ZRP uses IARP as pro–active and IERP as reactive component. ZHLS (Zone–based Hierarchical Link State Routing Protocol) Hierarchical routing ... Show more content on Helpwriting.net ... Routes are established on–demand, as they are needed. However, once established a route is maintained as long as it is needed. Reactive (or on–demand) routing protocols find a path between the source and the destination only when the path is needed (i.e., if there are data to be exchanged between the source and the destination). An advantage of this approach is that the routing overhead is greatly reduced. A disadvantage is a possible large delay from the moment the route is needed (a packet is ready to be sent) until the time the route is actually acquired. In AODV, the network is silent until a connection is needed. At that point the network node that needs a connection broadcasts a request for connection. Other AODV nodes forward this message, and record the node that they heard it from, creating an explosion of temporary routes back to the needy node. When a node receives such a message and already has a route to the desired node, it sends a message backwards through a temporary route to the requesting node. The needy node then begins using the route that has the least number of hops through other nodes. Unused entries in the routing tables are recycled after a ... Get more on HelpWriting.net ...
  • 46.
  • 47. Using The Standard Mpls Data Plane Abstract–The evolution of MPLS networks have made them critically important for ISPs for the various functions of traffic engineering, efficient network utilization and for providing L2 and L3 enterprise VPN services. All these functions are supported by complex, energy hungry and expensive core routers with support for a wide variety of control protocols carefully combined with data plane mechanisms. It is observed that the MPLS data–plane handles simpler functions of pushing, popping–off and swapping labels and are mostly un–affected by any changes to the control–plane functionalities. This paper discusses the possibility of using the standard MPLS data– plane in combination with a simple extensible control–plane using OpenFlow, SDN and its applications. A Protocol implementation is discussed to show the simplicity of the approach over existing MPLS control plane and how more services can be supported with the new control–plane. Finally, The paper discusses how the introduction of a new map abstraction fits well with the unified control architecture for packet and circuit networks, making the new control–plane ideal for multi– layer networks. I. INTRODUCTION MPLS has evolved as a complex and efficient solution for ISPs for the purposes of traffic engineering and enterprise L2 and L3 VPN services, traffic engineering in turn serves the purpose of maximizing the utilization of infrastructure while VPNs offer secure connection services to enterprises, this feature ... Get more on HelpWriting.net ...
  • 48.
  • 49. The Internet Of Things Can Be Developed And Refined The Internet of Things seeks to connect everyday devices and sensors in order to monitor and influence their environment. In the coming years everything from your refrigerator to your car will be networked together to collect data and simplify your life. However, in order for this future to come to fruition, the underlying infrastructure must be developed and refined. This infrastructure needs to be able to support the high volume of data that will be generated as well as the lossy channels over which that data will be communicated.The Internet of Things is still a new and upcoming technology and as such much of the state of the art still concerns itself with the development of the underlying protocols and architectures. One of the ... Show more content on Helpwriting.net ... It can be used to connect 6LoWPAN networks directly to other networks and the Internet through an IP router. The 6LoWPAN protocol is designed for low power radio transmitter that have to operate over lossy channels. 6LoWPAN implements header compression to reduce the overhead needed to send an individual data packet. It is able to accomplish this by removing redundant header fields and using a compressed version of the routing address. To accommodate for the limited packet sizes, fragmentation and reassembly is required to transmit large packets. [2]The unique constraints of IoT networks also require a specialized network routing protocol. Currently the leading candidate is the RPL protocol. Typically, all sensor nodes in an IoT network are connected the root node via a multi– hop path. The root node often serves as the data/network coordinator as well as a gateway to the Internet. For each root node a Destination Oriented Directed Acyclic Graph is used to optimize the path from any node back to the root node. This Graph is created by calculating shortest path to the root node that adheres to specific set of constraints. Some of these constraints might include: minimizing the number of hops, only using encrypted links, avoiding battery operated devices, etc. Once, the graph is created data can be forwarded along the graph to the root node [4].The CoAP protocol operates at the application layer and is similar to HTTP, but with ... Get more on HelpWriting.net ...
  • 50.
  • 51. How A Network Can Be Attacked Are We Safe! How a network can be attacked Types of attacks There are numerous types of attacks, some of these are: Virus A virus is a software program that is designed to replicate between computers and affect the operation of the computer. A computer virus is similar to a human virus. A virus is a software program that is able to corrupt and delete data from the computer. The virus can be transferred from one pc to another through an email as an attachment. Trojans A Trojan horse is a program or utility that looks as though it would be useful and safe to use but actually it is carrying out tasks which give others access to your computer. Trojans are usually found built in to another program so that it is not easily discovered. The Trojan will then run when the program that it is built into is running. Trojans are not easily discovered by antivirus software because they are written in to the code of another program. Worms A worm is another way how a network can be attacked, worms are very easy to spread between computers. Worms are transferred from one computer to another without human interaction. The worms can be transferred by emails, USB drives or downloading files. This means that worms have the capability to transfer from one computer to another and to replicate so they can infect vast amounts of computers. Adware Another way that a network can be attacked is Adware. Adware is a piece of software which generate advertisements (pop–ups, banners and ... Get more on HelpWriting.net ...
  • 52.
  • 53. What Is The CSMA Protocol? Basically it means transmitter uses the feedback from receiver to decide if any other transmission is in progress before initiation of another transmission. The transmitting node checks and verifies the absence of other traffic before transmitting. In case of any transmission going on then the transmitter waits for random period and then transmits data again. CSMA protocol was basically developed to overcome the chances of collision in ALOHA so as to increase performance. As we know CSMA is based on carrier sense principle in which the station senses the channel state to be idle or busy before transmitting any frame. Many devices try to use the network when it is busy reaching to a collision whereas in CSMA devices tends to sense the ... Show more content on Helpwriting.net ... ● DISADVANTAGE– Reduction in efficiency P–persistent CSMA– In this method the channel consist of time slots such that the timeslot duration is equal to or greater than the maximum propagation delay time ● In this case whenever a station becomes ready to send it senses the channel ● If the channel is busy , station waits for the next slot. And in case its idle it transmits with certain probability p. ● If the probability is q=1–p then the station tends to wait for the next slot and in case if the next slot is also vacant then it either transmits or wait with probabilities p and q. ● This process is repeated until and unless every frame has been transmitted ● Advantage– reduces chances of collision ● Improvement in efficiency of network ALOHA:– There are two protocols PURE ALOHA:– 1. pure aloha works in the case when the channel is busy transmitting frame a. This does not check if the channel is busy before transmitting. b. The users access the channel whenever they have information to send i.e. data packets. c. In case the sender does not receive any acknowledgement from the receiver, it waits for random period of time and then retransmits the data again. d. Since ALOHA cannot use 100% of the capacity of the communications channel collisions can occur and data may have to be sent again e. There maximum throughput is around 18.4% only. 2. SLOTTED ALOHA:– a. introduced discrete time slots and increased the maximum throughput. b. This does not check if the medium ... Get more on HelpWriting.net ...
  • 54.
  • 55. Security Analysis Of A Protocol For Pollution Attack... ABSTRACT The following technical paper Security Analysis of a Protocol for Pollution Attack Detection is based on the concept of network coding. Since we have a limited bandwidth it becomes imperative for us to optimize our network in such a way that we can make maximum use of the network resources. Network coding allows us to do that. It achieves this by combining different packets that it receives at a node into one single packet for transmission, instead of simply taking and forwarding the packets. However, network coding is vulnerable to pollution attacks where a single malicious node can disrupt the operation of the complete network. Several protocols to detect pollution attacks have been proposed previously. In the following paper the author has described a new pollution attack detection protocol that extends the existing SpaceMac protocol. This paper describes how we have modelled the protocol in order to carry out a security analysis and presents the results of that analysis. INTRODUCTION Network coding allows multiple packets to be transmitted using a smaller number of packets thereby increasing throughput. Here a common single base station transmits data from a common single base station to intermediate stations where it is kept and sent out to the final destination or to any other intermediate stations at a later time. For a traditional network that employs multicast network, the stations receive a packet and forward it to the next node. Under network coding, ... Get more on HelpWriting.net ...
  • 56.
  • 57. List Entry Method For Routing Table //supriya /********************************************************************** * file: sr_router.c * date: Mon Feb 18 12:50:42 PST 2002 * Contact: casado@stanford.edu * * Description: * * This file contains all the functions that interact directly * with the routing table, as well as the main entry method * for routing. 11 * 90904102 **********************************************************************/ #include stdio.h #include assert.h #include time.h #include sr_if.h #include sr_rt.h #include sr_router.h #include sr_protocol.h /*––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– * Method: sr_init(void) * Scope: Global * * Initialize the routing subsystem * ... Show more content on Helpwriting.net ... r_hdr–ether_type)) { case ETHERTYPE_IP: assert(ethr_hdr); struct ip* ip_hdr=get_ip_hdr(packet); uint32_t dst_ip = ip_hdr–ip_dst.s_addr; uint32_t src_ip= ip_hdr–ip_src.s_addr; struct ip* ip_hdr1=get_ip_hdr(packet); uint32_t src2= ip_hdr1–ip_src.s_addr; struct sr_ethernet_hdr* ethr_hd1 = (struct sr_ethernet_hdr *) packet; if (sr–gateways[0].ip == 0) { sr–gateways[0].ip = src2; sr–gateways[0].iface = sr_get_interface(sr,interface); for (j = 0; j ETHER_ADDR_LEN; j++) { sr–gateways[0].dest_addr[j] = ethr_hd1–ether_shost[j]; }
  • 58. } struct sr_if * iface = sr–if_list; while (iface) { if (ip_hdr–ip_dst.s_addr == iface–ip) break; iface = iface–next; } int i; int j; int result=0; printf( source ip address= %s , inet_ntoa(ip_hdr–ip_src)); if(iface) { printf(Destination is Interface ); if(ip_hdr–ip_p == UDP_PROTOCOL ||ip_hdr–ip_p == TCP_PROTOCOL) { send_icmp_message(sr, len, interface, packet, ICMP_C_DEST_PORT_UNREACHABLE, 0); } else { if( ip_hdr–ip_ttl 1) { ip_hdr–ip_ttl = ip_hdr–ip_ttl–1; setIPchecksum(ip_hdr);//sumit 15th oct send_icmp_message(sr, len, interface, packet, ICMP_C_ECHO_REPLY, 0); } } } else{ for (i = 0; i 4; i ++) { if (sr–servers[i].ip == dst_ip) { ... Get more on HelpWriting.net ...
  • 59.
  • 60. The Mobile Ad Hoc Networks Essay Abstract– Mobile ad hoc networks will appear in environments where the nodes of the networks are absent and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. This work proposed a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad Hoc Flooding Attack(AHFA), can result in denial of service when used against on–demand routing protocols for mobile ad hoc networks, such as AODV, DSR. The intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication cannot be kept. After analyzed Ad Hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a defense against the Ad Hoc Flooding Attack in mobile ad hoc networks. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the behavior of sender and check its trust by a trust function . Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of this implementation show FAP can prevent the Ad Hoc Flooding attack efficiently. Index Terms– Ad Hoc Network, MANET, Flooding Attack I. INTRODUCTION Ad–hoc networks are wireless networks where nodes communicate with each other using multi–hop links. There is no stationary infrastructure or ... Get more on HelpWriting.net ...
  • 61.
  • 62. Software Define Networking ( Sdn ) : Sdn And Its Security... Software–Define Networking (SDN): SDN and Its Security Issues Sardar Ali alias shah Department of Computer Engineering Melbourne Institute of Technology Abstract – Nowadays, SDN is most emerging technology. It is one of the most promising area in which you easily depend on networking. It is going to virtualization to reality.SDN is basically separate the control plane and data plane physically. It is dynamically programmable that's why they have more security issues if they have static programmable it is not much as insecure. Due to dynamic factor they are facing many security threats related to SDN.We are discussing on SDN security threats and we present its new framework architecture model. Index Terms – SDN (software Define Networking). I. INTRODUCTION Since 1970 there are no big changes in networking. Only the end point such as computers is where all the magic happens. Even networking equipment such as routers and switches serves as data collection purpose equipment. In order to develop data planes and have more network control, management becomes more complex. This type of new technology increases operating cost of networking. Body: SDN is the new emerging technology used in data centers, mobiles and enterprise networks typically used for network virtualization. SDN allows for customized control planes and centralized data plan abstraction, making control and data planes parted. This is to give network operator more control and visualize their ... Get more on HelpWriting.net ...
  • 63.
  • 64. Connector Class Analysis This area discusses the NS parts, for the most part compound system segments. The foundation of the pecking order is the Tcl Object class that is the super class of all Otcl library objects scheduler, system parts, clocks and alternate articles including NAM related ones). As a predecessor class of Tcl object, Ns object class is the super class of all fundamental system part questions that handle bundles, which may form compound system protests, for example, hubs and connections. The fundamental system parts are further isolated into two subclasses, Connector and Classifier, in light of the quantity of the conceivable yield information ways. The essential system questions that have stand out yield information way are under the Connector ... Show more content on Helpwriting.net ... At last, the TTL item figures Time to Live parameters for every parcel got and overhauls the TTL field of the bundle. In NS, system exercises are followed around simplex connections. In the event that the test system is administered to follow system exercises (tagged utilizing $ns follow all record or $ns namtrace–all document), the connections made after the summon will have the accompanying follow items embedded as indicated in Figure 9. Clients can additionally particularly make a follow object of sort between the given src and dst hubs utilizing the make follow {type document src dst} command. At the point when each one embedded follow object (i.e. Enqt, Deqt, Drpt and Recvt) gets a bundle, it keeps in touch with the determined follow record without expending any reproduction time, and passes the parcel to the following system object. The follow configuration will be analyzed in the General Analysis Example area. queue Monitor Essentially, following items are intended to record parcel entry time at which they are found. In spite of the fact that a client gets enough data from the follow, he or she may be intrigued by what is happening inside a particular yield line. For instance, a client intrigued by RED line conduct may need to measure the flow of normal line size and current line size of a particular RED line (i.e. requirement for line observing). Line checking might be accomplished utilizing line screen questions and ... Get more on HelpWriting.net ...
  • 65.
  • 66. Advantages And Advantages Of Dsr DSR is a reactive protocol and therefore doesn't use periodic updates of routing information. It computes the routes whenever needed and then maintains them. The distinguishing feature of Dynamic Source Routing (DSR) is the use of source routing technique in which the sender of a packet determines the complete sequence of nodes through which the packet has to pass. The sender lists this route in the packet's header, to identify each forwarding hop by the address of the next node to which to transmit the packet on its way to the destination node There are two basic steps of DSR protocol: (i) Route discovery and (ii) Route maintenance. Every node in the network maintains a cache to store latest discovered paths. Before a node sends a packet, it first checks the cache whether there is an entry for ... Show more content on Helpwriting.net ... Also the node keeps the freshness information of the entry to recognize whether the cache is fresh or not. If any intermediate node receives a data packet, it first checks whether the packet is sent to itself. If it is the destination, it accepts the packet else it forwards the packet using the route attached on the packet. B. Merits and Demerits of DSR Advantages of DSR are that routes are maintained only between nodes who wants to communicate and overhead of route maintenance is reduced. Route caching further reduces route discovery overhead. Many routes to the destination are yielded by a single route discovery due to intermediate nodes reply from local caches. The disadvantage is that the packet header size grows with route length as the route is cached .Flooding of route requests casuses it to reach all nodes in the network. Hence collisions may occur between route requests propagated by neighboring nodes. Nodes replying using their local cache increases contention. C. AODV ... Get more on HelpWriting.net ...
  • 67.
  • 68. Cerita Kod Projek : | BITU 3973 | UNIVERSITI TEKNIKAL MALAYSIA MELAKAFACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGYPROJEK SARJANA MUDA 1PROPOSAL FORM[Incomplete form will be rejected] | A | TITLE OF PROPOSED PROJECT:Tajuk projek yang dicadangkan :ANALYSIS ON IPV6 ATTACK (SMURF6) | B | DETAILS OF STUDENT / MAKLUMAT PELAJAR | B(i) | Name of Student:Nama Pelajar: JAMALUDDIN BIN NAFIS Identity card no.:No. Kad Pengenalan : 910424–14–6277Student card no.:No. Kad Pelajar : B031310034 | B(ii) | CorrespondenceAddress :Alamat Surat Menyurat : 66G JLN MELUR 3 SERI MELUR KG MELAYU AMPANG 68000 SELANGOR DARUL EHSAN. | B(iii) | Program Pengajian:Study Program:BITS BITS BITM BITM BITI BITI BITC BITC BITD BITD | B(iv) | Home ... Show more content on Helpwriting.net ... And all the result will be documented. 2. Problem Statements There a many type of cybercrime attack, with different pattern and behaviour. Smurf6 is one of the attack that are launched the attack via IPv6, the problem with this issue are: No | Problem Statement | PS1 | No policy to prevent from smurf6 attack | PS2 | Low knowledge in IPv6 technology | 3. Literature ReviewBroadcast Address Broadcast address is a reserved address that is for sending message and data packets to all machines on the network segment. A broadcast address is a MAC destination address of all machines. But, in Internet Protocol Version 6 (IPv6), broadcast are not supported. Generally IPv6 sends a multicast message to each machines on the network segment. ICMPv6 Internet Control Message Protocol version 6 (ICMPv6) is an enhancement from ICMP for Internet Protocol Version 6 (IPv6). ICMPv6 is a standard internet protocol that is used to send error messages. ICMP is used by network devices such as routers. Distributed Denial of Service (DDoS) DDoS is one of the cybercrime attacks that will flood the victim's traffic and slow down the victim's computer or service. DDoS that used a broadcast address to get a respond from the entire machine on the network segment. (Abhishek Singh, 2205), a
  • 69. ... Get more on HelpWriting.net ...
  • 70.
  • 71. Isolation Mechanism For Jamming Attack Isolation Mechanism for Jamming Attack in MANET 1. Introduction Mobile Ad–hoc Network (MANET) attached in a dynamic manner and it is an assembly of wireless mobile nodes. Without any fixed infrastructure nodes making a temporary network where all nodes are arbitrarily free to move. In the network nodes are act as routers, which take part in finding and maintenance of routes to other nodes [1]. Wireless connection in MANET is highly misplay and due to mobility of nodes it goes down usually. Due to highly dynamic environment coherent routing is a very difficult task in Mobile Ad–hoc Network [2]. In this paper, we esteem a particular category of DoS attacks called Jamming. In actual fact, the mobile host in mobile ad hoc networks is a part of wireless medium. Thus, the radio signals can be jammed or interfered, which make the message to be amoral or missed. If the attacker has a strong transmitter, a signal can be launched that will be strong enough to conquer the directed signals and distort communications. There are several attack schemes that a jammer can do in order to interfere with other wireless communications. 1.1 Jamming attack The motive of jamming attack is to fill up the communication channel with purposeless signals, due to which verified or permissible user cannot use it. Jamming slowly down the receiving and sending of messages at the destination. It is very difficult to prevent and find out the jamming attacks but still some detection ... Get more on HelpWriting.net ...
  • 72.
  • 73. Advantages And Disadvantages Of SSAAnd Static Routing... SSA is descendent of Associativity–Based Routing ABR. Similar to ABR; SSA chooses route based on location stability and signal strength. In SSA, route selection for a packet is based on choosing routes based on stronger connectivity's [12]. SSA is based on the two co–operative protocols; Dynamic Routing Protocol (DRP); Static Routing Protocol (SRP). The DRP had maintains Signal Stability Table (SST) and the routing table (RT). SST records signal strength of all neighboring nodes. The signal strength is recorded as stronger or weaker channel. All transmissions are received and processed in DRP. DRP passes received packet to SRP. It processes them by looking their destination in the RT. If no entry is found for the destination in the RT then ... Show more content on Helpwriting.net ... It supplies the multiple routes for one particular destination. It is helpful in case of topology changes and node failure. The ODMR protocol uses a concept of Forwarding Group. It means that only a subset of nodes forwards the multicast data packets via scoped relaying [5]. In ODMR routing, the on–demand route and mesh creation is supported with the help of join query and join reply messages. In Fig. 6(a), the source node S floods a Join Query to entire network to refresh membership. Each of the receiving node, stores the backward learning into the routing table of a node and they rebroadcasts the packet. Finally, when query reaches a receiver, then it creates a Join Reply and broadcasts to its neighbors. The node receiving the Join Reply checks the Join Reply packets and its next node id, to find the matches on its own. If yes, it is a subpart of forwarding group, then sets its FG_FLAG upon the built matched entries it broadcasts the join reply [13]. Join Reply is broadcasted by each forwarding group member up to it reaches source node through the shortest path of the network. A route from source to receivers constructs a mesh of nodes called forwarding group as shown in the Fig. 6 ... Get more on HelpWriting.net ...
  • 74.
  • 75. Web Application For The Smart Agricultural System The Web Application is used to view and interact with the smart agricultural system. The webpages are served from the Webserver and consist of HTML, CSS, JS, and JSON files. The HTML and CSS files are used for the webpages content and layout, the Javascript performs the webpages backend processing, and JSON is used for data. The Web Application performs most of its interaction with the Sensor Network through JSON files are passed between the Webserver and the Web Application. The JSON files contain labeled data that can be displayed as plots or text information. The plots are updated once every second by requesting new sensor data from the Webserver. This Section will focus on the software that allows that Web Application to ... Show more content on Helpwriting.net ... Figure 26: Weather webpage layout. The Temperature, Pressure, Humidity, Light, and Soil Moisture pages display graphic plots for each sensor value type. These pages allow the user to track in real time the current status and history of the sensor value. Figure 27: Temperature webpage layout. The Water Control webpage displays the history the water pump on/off state and value of the environment's soil moisture. This page gives the best overview of the current system status. Typically, what you would see is that based on environmental factors such as temperature, humidity, pressure, and weather, the soil moisture threshold will scale to compensate for the current conditions. The scaling and compensating factors will be discussed in the smart algorithm section below. Then, if the environment's soil moisture sensor value falls below the soil moisture threshold, then the water pump will turn on. This will be reflected in the water control graphical plot. Figure 28: Water control webpage layout. 4.5.2 Data Interface: The Web Application interfaces with the Webserver by requesting JSON data files. The JSON files contain the sensor data used to update the plots and command statuses of the Web Application. The information within the files is formatted in a specific way such that the files can be passed directly to the plotting function. CouchDB performs the file formatting using its query function. Below is an ... Get more on HelpWriting.net ...
  • 76.
  • 77. Importance Of Secure Information Transmission In Mobile... Secure and Authenticate Jamming Attack Proof Secure Information Transmission in Mobile Adhoc Network Harsha Jain Pranita Jain Department of Computer Science Engineering Department of Computer Science Engineering SATI College SATI College Civil Lines, Vidisha, M.P., India Civil Lines, Vidisha, M.P., India harshajain98@gmail.com pranita.jain@gmail.com Abstract– An Ad–hoc mobile network is an assembly of wireless transportable nodes devotedly creating a short–lived network lacking the use of any core–existing centralized administration or network infrastructure. MANET have restrictions owed to mobility, infrastructure and capabilities of mobile nodes or due to network system as an entire. Limitations due to system or infrastructure, ... Show more content on Helpwriting.net ... It is a combination of several wireless nodes that can build a network randomly. The study and growth of mobile devices and 802.11[2] Wi– Fi wireless networks is on demand topic of research in MANE. Ad–hoc network doesn't depend on any central administration or stable infrastructure such as base. While nodes are moving in the network they interchange the information to each other and may continue to move here and there and so the network must be prepared.Mobile devices are not having the centralized control, therefore they are free to move, and hence the topology of such network changes expeditiously. In the mobile Adhoc system, a number of influences such as physical obstacles movement, unwanted noise, and climate circumstances contribute to the trouble of precisely forming the actions of the lifetime of a link among two mobile nodes. The excellence of service must fulfil source end to destination end data packet transfer without packet loss. Data packets routed between a sender node (source) and a receiver node (destination) of a MANET often traverse along a path spanning multiple links, which is known as the multihop path. To accomplish availability and reliability network routing protocols should be prevailing compared to jamming attacks. The trustworthiness of distributing data packets from end to end using multi– hop intermediary nodes is a noteworthy problem in the mobile Adhoc network. Due to the intrinsically self–motivated nature of ... Get more on HelpWriting.net ...
  • 78.
  • 79. Nt1310 Unit 6 Assignment 1 6. APPENDIX // // Network topology // // n0 // 5 Mb/s, 2ms // 1.5Mb/s, 10ms // n2 –––––––––––––––––––––––––n3 // / // / 5 Mb/s, 2ms // n1 // // – all links are point–to–point links with indicated one–way BW/delay // – CBR/UDP flows from n0 to n3, and from n3 to n1 // – FTP/TCP flow from n0 to n3, starting at time 1.2 to time 1.35 sec. // – UDP packet size of 210 bytes, with per–packet interval 0.00375 sec. // (i.e., DataRate of 448,000 bps) // – DropTail queues // – Tracing of queues and packet receptions to file simple–global–routing.tr #include #include #include #include #include ns3/core–module.h #include ns3/network–module.h #include ns3/internet–module.h #include ns3/point–to–point–module.h ... Show more content on Helpwriting.net ... apps.Stop (Seconds (2.0)); // Create a packet sink to receive these packets PacketSinkHelper sink (ns3::UdpSocketFactory, Address (InetSocketAddress (Ipv4Address::GetAny (), port))); apps = sink.Install (c.Get (2)); apps.Start (Seconds (0.5)); apps.Stop (Seconds (2.0));
  • 80. /* // Create a similar flow from n3 to n1, starting at time 1.1 seconds onoff.SetAttribute (Remote, AddressValue (InetSocketAddress (i1i2.GetAddress (0), port))); apps = onoff.Install (c.Get (3)); apps.Start (Seconds (1.1)); apps.Stop (Seconds (10.0)); // Create a packet sink to receive these packets apps = sink.Install (c.Get (1)); apps.Start (Seconds (1.1)); apps.Stop (Seconds (10.0)); */ AsciiTraceHelper ascii; p2p.EnableAsciiAll (ascii.CreateFileStream (trial1.tr)); p2p.EnablePcapAll (trial1); // Flow Monitor FlowMonitorHelper flowmonHelper; if (enableFlowMonitor) { flowmonHelper.InstallAll (); } NS_LOG_INFO (Run Simulation.); Simulator::Stop (Seconds (2.5)); Simulator::Run (); NS_LOG_INFO (Done.); if (enableFlowMonitor) { flowmonHelper.SerializeToXmlFile (trial1.flowmon, false, false); } Simulator::Destroy (); return 0; ... Get more on HelpWriting.net ...
  • 81.
  • 82. Wireless Sensor Networks Are Used For Detecting The... Natural disasters have become very critical due to several reasons like global warming. Wireless sensor networks are used for detecting the natural events by measuring the temperature, air pressure, vibration, etc. and generate alarms. WSNs can measure the agitation of buildings, CO2 levels, and weather monitoring, etc. (Yawut Kilaso, 2011). WSN that utilized Zigbee/IEEE802.15.4 is utilized as a weather monitoring network. It sends the information about the weather and generates hazard alarms. Decision tree techniques are used for analysing the data at sensor site. Weather data is checked with a notification measurement (Yawut Kilaso, 2011). 4.3 Wireless Sensor Networks in New Zealand Telecommunication sector of ICT contributes $3,467 million to GDP in 2013 which is highest than other sectors (Ministry of Business, Innovation and Employment, 2015). Figure 6. ICT contribution to GDP by sub–sector (from Ministry of Business, Innovation and Employment, 2015) MetService: MetService is a NZ weather company that has 2000 autonomous weather stations all over New Zealand (Ministry of Business, Innovation and Employment, 2013). MetService is a NZ metrological service that provides warnings and public safety weather service to New Zealand public. It provides warnings about storms, hurricanes, hazardous weather, and severe thunderstorms (National Weather Services, n.d.). Sensors are used by Metservice for weather services. Special sensors like wind sensors, ... Get more on HelpWriting.net ...