CMPT 371: Homework Assignment 4
1. Consider slotted ALOHA. At time t = 0 3 nodes become ready to send a
frame. Let p = 1/2. What is the probability that at time t = 3, that is,
three time slots later,
1. The most widely accepted and implemented approach to public-key encryption, _ is
a block cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for
some n.
RSA
2. The pur
Remote
users
Internet
Boundary
router
Internal DMZ network
Web
server(s)
Email
server
DNS
server
Internal protected network
Application and database servers
External
firewall
LAN
switch
Internal
firew
Distribution System
AP 2
AP 1
Basic Service
Set (BSS)
Basic Service
Set (BSS)
STA 1
STA 8
STA 2
STA4
STA 6
STA 3
Figure 7.5 IEEE 802.11 Extended Service Set
STA 7
Network Security: Top 5 Fundamentals
by Megan Berry
http:/www.itmanagerdaily.com/network-security-fundamentals/
Relentless cyber criminals, disgruntled current and former employees and careless users
Key Generation
p and q both prime, p q
Select p, q
Calculate n = p q
Calculate (n) = (p 1)(q 1)
Select integer e
gcd(n), e) = 1; 1 < e < (n)
Calculate d
de mod (n) = 1
Public key
KU = cfw_e, n
Private
TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false.
1)
Public-key encryption is also referred to as conventional encryption, secret-key, or single-key encryption.
1)
_
2)
CSIS3155 RSA Example
RSA involves a public key and a private key. The public key can be known by everyone and is
used for encrypting messages. Messages encrypted with the public key can only be decryp
Source: http:/www.geekgirls.com/databases_from_scratch_1.htm
Databases from scratch I: Introduction
The first in a series of articles on choosing, designing and using a database program.
When I was ei
Hypervisor
This is the Virtual Machine Manager that handles the relationship between the
physical computer with the virtual computer.
Software as a Service (SaaS) Cloud Service
Ondemand software, no l
What does the acronym HIDS denote?
host-based intrusion detection system
What is the purpose of NAC? Network Access Control (NAC) ensures that the computer on the
network meets an organization's secur
Kwan Yui Wong (Jason)
301152139
[email protected]
Assignment 1
3a. Circuit switching network is more appropriate because the connect runs for a
relatively long period. Also the application transmits data at
Kwan Yui Wong (Jason)
301152139
[email protected]
Assignment 1
3a. Circuit switching network is more appropriate because the connect runs for a
relatively long period. Also the application transmits data at
CMPT 371: Midterm
1. Give short answers.
(a) In go-back-N the senders and the receivers windows must be the
same size. True of false? .
(b) In the alternating bit protocol the size of the sequence spa
CMPT 371: Homework Assignment 2
1. Consider a channel that can somehow duplicate a packet (ie, you send
packet x, and another copy of x can be generated without you knowing.
This can happen to ACKs as
CMPT 371: Homework Assignment 1
1. I would like to send three packets, of size 1500 bytes each, from point
A to point B. A is connected to Router 1 with a link of lenght l1 meters
and bandwidth b1 byt
CMPT 371: Homework Assignment 4
1. Construct a network with the following properties: The links have symmetric costs in both directions. There is a node s such that the total
cost of the RPF broadcast
CMPT-371, Assignment-4 Solutions
1. All nodes will attempt to transmit at t = 1. Therefore, collision will
occur and no one succeeds. At t = 3, at most two nodes would succeed to transmit. Hence, it i
CMPT-371, Assignment-3 Solutions
1. In the following graph. The minimum spanning tree (MST) includes
edges (s,a) and (a,b) with a total cost of 2. While the RPF tree include
edges (s,a) and (s,b) with
CMPT 371, Fall 2013 Midterm
1. (20 pts) Suppose we have a TCP connection with a bandwidth of B
Kbit/sec each way, with an RTT of 0.5 seconds and no dropped/delayed
packets. The sender and receiver eac
CMPT-371, Assignment-2 Solutions
1. The only side eect of having such channel is increased congestion. The
operation of the Go-Back-N protocol will not be aected. Duplicate
packets will be discarded/i
1. First we must note that after the first packet reaches to the first router,
the second packet will be sent, and after the second packet reaches to
first router the third one will be sent.
For the f
Q1: True or False
(1a) To send an email, the senders email client will contact the recipients mail server,
which will then push the email into the recipient's local mailbox via SMTP.
(2b) The HT