Nobody downloaded yet

Networking Assignment - Essay Example

Comments (0) Cite this document
Summary
1) If the company makes the software in C+, it should be kept in mind that which kind of data storage technology is going to be used so that it would be easier to restrict an employee to only view his own profile and edit whatever is allowed. If the C+ software is storing employees' information on flat file system then by using C+ business logic the userid, with which the user logs in to the Unix system, should be retrieved from the Unix operating system and depending on that userid, the user is allowed to access the profile associated with that userid.
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Networking Assignment
Read TextPreview

Extract of sample
"Networking Assignment"

Download file to see previous pages What this means for attackers is that once they penetrate a single machine on a network they can then observe all traffic passing through the network. This allows intruders to quickly collect passwords and account names for many users. And all too often a password good one place is good another. In order to save from this vulnerability, you have to save a copy of Kernel offline because the advance hackers even patches the kernel of Unix system so that the system can not detect that it is under promiscuous mode by the help of "ifconfig" and "tcpdump" commands. (http://www.acm.uiuc.edu)
In terms of availability, it should be kept in mind that the several users are accessing the same application simultaneously. For every user the instance of the C++ application would be separate but if look at data file, the data file would act as a centralized data storage so C++ program must have the eligibility to maintain the proper locking mechanism of the data file so that only one user is updating the data file at a time. With locking mechanism in mind, the dead lock possibility should be carefully taken care off. In this way integrity is also maintained as only one user is updating the file at a time.
Buffer Overflow
2) A buffer overflow occurs when a program or process tries to store more data in a buffer than it is supposed to hold that means storage of data in buffer more than its capacity. Since buffers are created to contain a finite amount of data, the extra information, which has to go somewhere can overflow into adjacent buffers, corrupting or overwriting the valid data, held in them. Sometimes it may occur accidentally through programming error but now-a-days buffer overflow is an increasingly common type of security attack. In overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information. Buffer overflow attacks are said to have arisen because the C/C++ programming language supplied the framework, and poor programming practices supplied the vulnerability.
In a Unix system, a C++ function is intended to allocate a 10 characters array and take userid as input from the user. Now if the function does not check the number of characters entered by the user and the user has entered 14 chars then those 4 extra chars are going to overwrite the other areas of the program. The extra will probably end up making the return address point to an area in memory which is not under the control of the currently executing program, causing a segmentation fault on Unix architectures.
Example
In November 1988, the Internet Worm shut down over 6,000 systems, just about cutting off all traffic on the Internet. One of the methods used to gain access to these systems was a buffer overflow exploit of a Unix service "finger." When you finger a user, the finger service returns information about the user, such as the user's real name and phone number. In the case of the Worm, the buffer overflow att ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networking Assignment Essay Example | Topics and Well Written Essays - 1750 words”, n.d.)
Networking Assignment Essay Example | Topics and Well Written Essays - 1750 words. Retrieved from https://studentshare.org/technology/1521547-networking-assignment
(Networking Assignment Essay Example | Topics and Well Written Essays - 1750 Words)
Networking Assignment Essay Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/technology/1521547-networking-assignment.
“Networking Assignment Essay Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/technology/1521547-networking-assignment.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Networking
...? of Institute] of Discipline] ‘Networking’ INTRODUCTION The growing technological advancements have transformed the planet Earth into a fast pace planet I which tasks are getting executed at very rapid rates. The increasing usability of the technologically advanced devices has been the main reason for their popularity and excessive use. Communication was never easier and more timely than today. The current research mentions one of the technologies that have assisted in the ease of communication. The concept is narrated with respect to a specific small scale business environment that would get benefitted by introduction and implementation of the technology. The co-owner of the small scale photography business, Sally, is a...
13 Pages(3250 words)Assignment
Networking
...any need to wait for responses. The use of HTTP pipelining allows the reduction of lag time since the client can send multiple requests at the same time and can then wait for their corresponding responses (W3, 2004 b). The use of this technique allows drastic improvements in the internet connection speed since HTML pages and other content tends to load faster. The typical TCP packet is constructed such that it houses multiple HTTP requests due to HTTP pipelining. Consequently, HTTP pipelining aids in sending a lower number of TCP packets on the network to perform the same tasks which allows a reduction in the overall network load and congestion. What is meant by a cache? Web cache? What is the relevance...
4 Pages(1000 words)Assignment
: Operating Systems and Networking
...?Expert Tools Manufacturers Introduction The Expert Tools is a renowned tools manufacturer in United Kingdom. The company has a vast setup across theKingdom with it’s headquarter in Surrey and sales offices network in the various cities. The company has its manufacturing facilities established in Hampshire. In the recent past the company's board of directors has undergone a major review of its business facilities and has identified various enhancements required to be incorporated for better operations across the company. An important observation was the absence of enterprise level networking facilities. The networking facilities were found indispensable for a better coordination among manufacturing, sales and marketing departments... of the...
4 Pages(1000 words)Assignment
Networking assignment
...?Networking Assignment Affiliation with more information about affiliation, research grants, conflictof interest and how to contact Topic: Networking assignment This paper intends to explore the topic of ‘networking and for this purpose, the author has interviewed three persons: Lindsey (marketing), Keith (accounting) and Holly (hospitality). The results of the interview are as under: Lindsay (marketing):   I am a first year student doing business administration course. In order to understand the application of various concepts I intend to conduct interview with different department heads. From this interview with Lindsay, I understand that Neil Lindsay is a graduated from St. Mary’s and...
3 Pages(750 words)Assignment
Social networking www.instagram.com
...? Social Networking: Instagram Number Introduction Instagram is an online video-sharing, photo-sharing and social networking service which enables users to photograph, film and apply digital filters on their pictures and videos, before sharing them on a variety of other online social services such as Twitter, Facebook, Flickr and Tumblr. Having been created by Kevin Systrom (December 30, 1983) and Mike Krieger (March 4, 1986) and inaugurated for use in October 2010, the use of Instagram has quickly gained popularity, such that by April 2012, it had already bagged over 100 million consistent users. This means that Instagram has its terms and conditions and legal sanctions, as shall be seen in the discussion that ensues forthwith. 1... ...
4 Pages(1000 words)Assignment
Networking Assignment
...? Networking al Affiliation Networking Identify all the skills that you could use at a networking event to ensure communication for building success. In an article written by Leimback (2012), it was revealed that the skills which would be useful at a networking event to ensure communication for building success include the following: (1) application of appropriate personal style in leveraging and understanding the necessary requirements and resources for the event; (2) discerning networking events that would strategically provide rewarding returns; (3) effective application of planning skills; (4) being able to empower and engage human resources for the event; (5) showcasing expertise in networking; (6) establishment of beneficial... ...
3 Pages(750 words)Assignment
Social Networking Product
...This paper is a project proposal regarding the MySpace Social Networking Website. Developing a Social Networking Product (MySpace) Name Name of University Abstract This paper includes a brief description of myspace.com as our case study and the project proposal that would be based on four main sections. 1- Gap Analysis on "Target Customers" and "Market Forecast". 2-Product Concept (Marketing Mix) 3-Business Analysis (Market Forecast, Development Stage Plan, Key resources at each stage) 4-Product Development Plan (Timescale and Stages, Test plan, Launch plan) Introduction to MySpace dot com "MySpace is a social networking website offering an interactive,...
8 Pages(2000 words)Assignment
Networking
...NETW-204 Assignment #3 Week 5 Refering to figure below: You are the network administrator for the network depicted in the diagram. You have beenassigned the address space 10.1.16.0/21 to create the LANs you need, and the 172.16.1.0/28 space for your WAN links. LAN: 10.1.16.0/21 WAN: 172.16.1.0/28 Assign addresses LAN Subnets Begin by creating and assigning the LAN subnets you will use. In order to make the most efficient use of your address space you should start by creating the subnet needed for the LAN with the most hosts and then work you down to the smallest LAN. Using the address space 10.1.16.0/21, create subnets for the LANs shown in the diagram and fill in the table 1 below. Notice that the...
2 Pages(500 words)Assignment
Networking
...Networking To the field of computers, networking refers to the activity of connecting two or several computing devices together with the reason of sharing information. Networks are developed with a combination of computer hardware as well as system software. However, networks may be classified in different ways. One mechanism states the form of network as per the geographic part it spans. Local area networks (LANs), for instance, classically move across a unit home, while wide area networks (WANs), moves through cities, countries, or even worldwide (Wendell, Rus, Denise 69). Items Specifications Reason(s) 1. Serial...
2 Pages(500 words)Assignment
Networking and data security
...Assignment Chapter Networking and Communication 14. What characteristics distinguish a personal area network from other types of networks? A personal area network (PAN) always operates within individuals closed range say10 meters and it is an interconnection of information technology. It is always organized around an individual person and as such may tend to be reliable. An individual can use these networks to transfer heavy files such as email and calendar appointments, music and digital photos. For instance, an individual traveling with a laptop, a personal digital assistant also referred to as (PDA), and a portable printer could just connect...
4 Pages(1000 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Networking Assignment for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us