1- (10 points) Explain the correlation between OSI and TCP/IP model. Then provide example protocols for Applications and Transport layers in TCP/IP model.
2- (5 points) Explain the difference between TCP and UDP Transport protocols.
3- (4 points) Answer the following questions based on the format of a TCP packet: a. How many bits are reserved for control information? b. How many bits is reserved for source address? c. How many bits is reserved for destination address? d. How many bits is reserved for payload?
4- (6 points) Fill in the blanks: a. __________ is based on travelling datagrams through internetworks one hop at a time. The entire route is unknown at the beginning of the journey. b. __________ is group-based communication. It can be one-to-many or many-to-many distribution. c. The most important requirement of a _______ network is the ability to treat different data types differently. d. _______ process transmits telephone calls (voice) over the internet. 2 e. _______ is the standard recommended by the ITU for low bit-rate voice transmission over the Internet. f. ________ is an unencrypted message data. 5- (5 points) Describe the encryption process and the way it works.
6- (10 points) How is Brute-force attack different from Dictionary attack?
7- (5 points) Suppose you want to create password using lowercase (a~z) and uppercase (A~Z) English alphabet characters, as well as numbers 0~9. How many possible passwords can be generated if the length of the password is 5?
8- (5 points) What is password entropy? How is it calculated?
9- (10 points) What is malware and what are its classifications? Explain each type. What is the base of these classifications?
10-(10 points) Define malware payload. What are the main characteristics of malware payload?
11-(5 points) Explain how does a computer worm spread?
12-(13 points) Define the following concepts:
a. Spyware
b. Man-in-the-Middle
c. Spam
d. Phishing
e. Pharming
f. Multiplexing
g. Modulation
h. Bandwidth
i. Synchronous communication
j. Asynchronous communication
k. Simplex communication
l. Half-duplex communication
m. Full-duplex communication
ITE105 Chapter 9 Correlation Between OSI and TCP/IP Model Assignment
Our Service Charter
1. Professional & Expert Writers: Topnotch Essay only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.
2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.
3. Plagiarism-Free Papers: All papers provided byTopnotch Essay are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.
4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Topnotch Essay is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.
5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.
6. 24/7 Customer Support: At Topnotch Essay, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.