Ask Question, Ask an Expert


Ask Computer Network & Security Expert

problem 1:     

(a) What are the different run levels of Linux system? describe.

(b) What are layers in the TCP/IP Model? Discuss the major functions and services of each layer?

(c) Identify address classes of the following IP address:                 




(d) What is a Cookie?  How is it significant in session management?

problem 2:     

(a) Why will an application use UDP instead of TCP?  Also, describe how could TCP handle urgent data?

(b) prepare the UDP client and server program in C language, where client program interact with the Server as given below:

i) The client begins by sending a request to send a string of more than five characters or series of more than 7 numbers, the server sends back a characters or numbers as per the request of the client.

ii) In case of series of numbers: The client sends a multiplication of numbers, to the server.

iii)  In case of the string of characters: The client sends a reverse order of string to the server..

iv)  Server will send the acknowledgment to the client after receiving the correct answer.

(c) describe different remote administration tools in Linux/Unix?

problem 3:

(a) describe the different parts of a passwd file in Linux/Unix.   

(b) describe working of mail server specifying the protocols involved in sending and receiving the mails?                                

(c) Draw IP datagram header format.  “IP datagram has a checksum field still it’s called unreliable protocol.”  Justify.

(d) State and compare internetworking devices used to connect various LAN segments.

problem 4:

(a) Which command is used to display real-time running tasks in a Linux environment? Describe the importance of this command using an ex.

(b) How does TCP handle flow control problem? Describe it with the help of a diagram showing the status of sliding window at the various stages.   

(c) What is Samba Server in Linux? Describe its significance.   

(d) What is the importance of Nmap utility in Linux.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92276

Have any Question? 

Related Questions in Computer Network & Security

Assignmentinstructionsutilizing your comprehensive security

Assignment: Instructions: Utilizing your comprehensive security plan outline as a guide, develop the identity management and security awareness training plan strategy for the organization. Upload the assignment in Micros ...

Coit20261 network routing and switching assignment-

COIT20261 Network Routing and Switching Assignment- Objectives - This assessment task requires you to demonstrate your knowledge of basic routing concepts by completing a number of exercise questions. Instructions - You ...

Cyber crime and security 2168alleged computer hacker gary

Cyber Crime and Security (2168) Alleged computer hacker Gary McKinnon of the United Kingdom has publicly admitted to compromising computer systems belonging to NASA and the Department of Defense. Using information from y ...

Task - provide short answers to the following six

Task - Provide short answers to the following six questions: Question 1: Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. Provide real examples of each type. Question 2: Explain why th ...

1 why is the top-down approach to information security

1. Why is the top-down approach to information security superior to the bottom-up approach? 2. What is the difference between a threat agent and a threat? 3. What was important about Rand Report R-609? 4. What type of se ...

Context this assignment involves preparation of a report

Context This assignment involves PREPARATION OF A REPORT. The report relates to the Scenario given below. Aim: You have been asked to present a proposal for an Internet/Intranet solution for a college. The college is esp ...

1overviewthe learning objective of this assignment is for

1 Overview The learning objective of this assignment is for students to get familiar with the concepts in the security techniques such as symmetric and asymmetric encryption, hashing and certificates in Public Key Infras ...

Problem 1 consider the following protocol there exists a

Problem 1: Consider the following protocol. There exists a trusted server, T, that shares a secret key with any participant in the network. That is, for a participant A, A and T share a secret key K A . The protocol allo ...

Pcap challenge 1 objectivethe objective of this lab is

PCAP Challenge 1 Objective The objective of this lab is simple (although some of the questions will prove quite challenging), all you need to do is use the pcap file provided and investigate what transpired between 2 or ...

The handbook must be original student content and workin

The handbook must be original student content and work. In addition to describing the company to which the employee handbook applies, also address the issues of privacy, employee or applicant testing, and performance eva ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate