Free

Data Communication and Networking - Assignment Example

Comments (0) Cite this document
Summary
The process occurs through utilization of the autotrunking feature in DTP or through frames that are embedded with double 802.1Q tags in…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Data Communication and Networking
Read TextPreview

Extract of sample "Data Communication and Networking"

Data Communication and networking 1a) VLAN Hopping VLAN hopping is a method of gaining entry to a network by sending packets to a port that cannot be accessed from an end system. The process occurs through utilization of the autotrunking feature in DTP or through frames that are embedded with double 802.1Q tags in switches.
1b) ARP Poisoning
This attack takes place by poisoning/feeding the address resolution protocol by the attackers MAC address. When the attack is successful, the victim devices send all their information to the attacker as they communicate to other devices.
1c) MAC spoofing
MAC spoofing entails the process of changing the MAC address of a network card on a certain computer through various techniques. Using this method, a computer can bypass some access controls or servers or even imitate other computers on a certain network, thus a simple way to hack into the system.
A man-in-the-middle attack through DHCP, also known as DHCP spoofing occurs when an attack is initiated, and the attacker tries to make DHCP requests responses by trying to enlist as the default server. In such a case, traffic is intercepted before it is forwarded to the user gateway.
BEAST: This is a hacking tool developed in Delphi that infects Windows operating systems. BEAST operates in reverse engineering mode and gets the required codes. It utilizes some ports and can terminate the operations of an antivirus or even a firewall, to gain entry into a victim.
Encryption
RSA is an asymmetric public key algorithm whilst DES uses cipher that is old symmetric. RSA uses two keys, a public one and a private one whilst DES uses one key that is shared. DES can handle large chunks of data, a mechanism that is slow in RSA. Both are secret keys. PGP is standardized software that utilizes the former algorithms and others for operation. PGP is thus not an algorithm per se but has to use the other algorithms but perform the same encryption function (Keith, 165).
Work Cited
Martin, Keith. Everyday Cryptography: Fundamental principles and Applications. London: Oxford University Press. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Data Communication and Networking Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Data Communication and Networking Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1655607-data-communication-and-networking
(Data Communication and Networking Assignment Example | Topics and Well Written Essays - 250 Words)
Data Communication and Networking Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1655607-data-communication-and-networking.
“Data Communication and Networking Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1655607-data-communication-and-networking.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Data Communication and Networking

Networking and communication sys (sockets)

...?PART General Knowledge of Sockets and Threads (7 Internet socket or network socket is an end point for the two- way communication link whereinformation is exchanged in one or more processes running on one or more computers in the network. It allows a client to send requests to a server and a server to receive these requests and respond to them.  Fig 1 Server-Client Model (Richtie R, 1995) 2. Socket, acting as interface in connection oriented communication system, establishes a dialog of request and response between client and server. For example, when we (client) call via mobile or telephone (connection is established) bank customer care (server) to resolve our queries....
3 Pages(750 words)Assignment

Named data networking

..., the named data network works by specifying how information can traverse the network. The selection process is done when a host sends an interest group. The transport strategy in named data networks entails sending of single data packets in response to each interest packet received. In some instances, network hosts can send many interest packets to ensure that flow of data is controlled in some applications. With the difficulty of flow control, network nodes learn the best strategy to send their packets to support an end-to-end communication. Content segments are also used to replace TCP sequence numbers in use. Named data networks have different routing mechanism. A named data network makes use of a mechanism that provides link... ...
5 Pages(1250 words)Term Paper

Social Networking Sites for Communication

...of communication in organisational culture helps one to maximize his skills and hence the attainment of the organization’s goals (Champoux, 2010). Social networking sites are an example of communications that can effectively relay information. Organisation cultures equally adapt general characteristics that aid in the running of an organisation. The organisation culture characteristics directly affect the performance of stakeholders and thus the productivity of an organisation (Towers, 2006). Productivity is the act of utilizing the available resources to generate significant outcomes. Productivity aims at maximum profits and depends on factors like motivation, participation, and...
5 Pages(1250 words)Term Paper

Data Communication assignment - 4G

...of entertaining multiple users at the same time and brings about more stability and reliability in the network. The use of Fast Fourier Transform (F.F.T) by the incumbent allows increased number of bits being transformed from one source to another (spectral efficiency) .802.16d made use of OFDM while the later version (802.16e) uses OFDMA which enables multiple accesses. The distribution of subcarriers enables all the users to send and receive data simultaneously. MIMO (Multiple Input Multiple Output): The MIMO features allows usage of relatively more number of antennas hence support for increased number of customers on the link as well as increased signal strength, capacity and efficiency .In past many...
4 Pages(1000 words)Essay

Data Communication & the Cloud

...receiving the information as the transmission medium is the physical path by which a message travels from the sender to receiver e.g. twisted pair wire, coaxial cable, fiber optic cable and radio waves. Data communication and other aspects such as networking are changing the way business is done and the lifestyle of people in the world today. Business decisions have to be made even more quickly and the decision makers required access to accurate information relevant to the subject at hand. Computer data communication models in the world today enable the transfer of information through long distances and the information appears almost instantaneous...
6 Pages(1500 words)Research Paper

Business Data Communication and Networking

...should own their specific bandwidths within the communication when they are connected. The company will have the ability to transfer data at the required speed in order to avoid unnecessary data wastage. On the other side, the switching will have a fixed amount of data flow among the computers in the XYZ Company. The only limitation of the circuit switching is that it does not allow the user to use the unused bundles. For the message switching, the connection for the company will not have a physical connection within the users. For the company, the connection will have the two switching technologies and the network will rely on the message technology of...
6 Pages(1500 words)Term Paper

In networking communications, packet switching is more flexible than circuit switching because of the full potential bandwidth, error free data transfer and multiple communication sessions

...Networking Communications al Affiliation) Networking Communications Research has provided evidence that circuit switching is less flexible when compared to packet switching when it comes to networking communications. Despite the dominance of circuit switching since the advent of the telephone, packet switching has come up as a more reliable alternative in digital data communications. The dominance of packet switching began in 1970, and its design supports its creation purpose, which is to offer more efficiency, especially in handling data traffic of huge sizes. Long distance transmission...
5 Pages(1250 words)Research Paper

Data Communications and Networking

...Data Communications and Networking THE LATEST STANDARD IN PCI-DSS AND HOW ARE COMPANIES USING NFC (NEAR FIELD COMMUNICATIONS) AND IMPLEMENTING PCI-DSS INTO THEIR SOLUTIONS The latest standard used in Payment Card Industry–Data Security Standard (PCI–DSS) is quite robust and comprehensive. Since its introduction, the standards of PCI-DSS has been altered and reformed at several instances, mostly on annual basis. Correspondingly, the latest version of PCI-DSS is 3.0, introduced in 2013 (PCI Security Standards Council LLC 1-9). Near Field Communication is a technology, which is specially used in smart phones. Some standard mobile companies...
1 Pages(250 words)Assignment

Networking and data security

...it to guard against identity theft by protecting personal information, and governments often use it to secure their classified information. It can also be used to ensure or facilitate secret communication particularly for the governments, individuals, and businesses. Encryption is used when a very confidential data is in transit, those being transferred through networks. It is also used when a very confidential data is at rest (stored) such as files on storage devices and computers. 10. Which layer of the OSI model implements security in a Web application? The OSL model layer that implements security in a web application is definitely the application layer (layer seven)...
4 Pages(1000 words)Assignment

Social Networking Crisis Communication

...Social Networking: Crisis Communication Social Networking: Crisis Communication Information spreading is a significant and essential process in society. Communication ranges from the spread of news and information from one person to another. As such, medium of communication should be of great importance in spreading information globally. Given that the current era is modern or digital, there are both traditional means of communication, as well as innovative means of information transfer used in the digital world. Both traditional media and social media offer an excellent medium for communication. A study...
3 Pages(750 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Data Communication and Networking for FREE!

Contact Us