FACULTY OF SCIENCE, ENGINEERING AND TECHNOLOGY
SWINBURNE UNIVERSITY OF TECHNOLOGY
Prepared as part of the assessment requirements for
Data Communications and Security
COS20012 & COS70007
Version: 1.0
Author: Alistair Hutchings
Student ID: 4964276
STANDARDS ORGANISATIONS
[1-2 PAGES, EMBED LINKS TO INTERNET RESOURCES WITH YOUR EXPLANATION]
Provide a short summary (including the name) and details of the contribution that each of the following organizations have played in facilitating effective data communication. Summarize the types of standards that would be found at each organization and map those to the layered model used by Kurose Ross.
ITU-T
IETF
ISO
IEEE
RFCS - [1 - 2 PAGES]
WHAT ARE THEY USED …show more content…
CAPTURE A FRAME USING WIRESHARK FROM YOUR HOME COMPUTING NETWORK. EXPAND THE PART THAT SHOWS THE ETHERNET FRAME. TAKE A SCREEN DUMP (SHIFT PRINT SCREEN / PAINT) AND PASTE IT HERE.
IDENTIFY EACH FIELD IN THE FRAME AND DESCRIBE THEIR PURPOSE. PROVIDE EXAMPLES OF THE EXPECTED VALUES FOR EACH FIELD. RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.
1. SWITCH - [1 PAGE]
EXPLAIN HOW A SWITCH LEARNS ABOUT MAC ADDRESSES. (Detailed answer required with a supporting diagram)
ONCE UPON A TIME SWITCHES WERE CONSIDERED TO BE INSECURE. HAVE THERE BEEN ENHANCEMENTS TO SWITCH TECHNOLOGIES THAT MAKE THEM MORE SECURE. IDENTIFY TWO AND DESCRIBE THEM HERE. FOCUS ON SECURITY ISSUES.
2. ARP - [1 -2 PAGES]
WHEN IS ARP NEEDED?
DESCRIBE IN DETAIL (DOWN TO FIELD LEVEL)
WHAT WOULD BE FOUND IN AN ARP REQUEST, INCLUDE A WIRESHARK TRACE (1 FRAME)
DESCRIBE IN DETAIL WHAT WOULD BE FOUND IN AN ARP RESPONSE (1 FRAME)
(DOWN TO FIELD LEVEL)
EXPLAIN WHY ARP IS NOT A SECURE PROTOCOL? (0.5 – 1 …show more content…
bandwidth [Online]. QuinStreet Inc. Available: http://www.webopedia.com/TERM/B/bandwidth.html [Accessed 10th April 2016].
BEAL, V. modem [Online]. Quinstreet Inc. Available: http://www.webopedia.com/TERM/M/modem.html [Accessed 10th April 2016].
CHAPIN, L. 1992. The Internet Standards Process [Online]. IEFT. Available: https://tools.ietf.org/html/rfc1310 [Accessed 10th April 2016].
CHAWIA, R. S. 2013. Delays in computer networking. In: DELAY.PNG (ed.). com2networks.blogspot.com.
IEFT. 2012. RFC Editorial Guidelines and Procedures [Online]. IEFT. Available: https://www.rfc-editor.org/old/policy.html [Accessed April 2016].
KOZIEROK, C. M. 2005. Performance Measurements: Speed Bandwidth, Throughput and Latency [Online]. Charles M. Kozierok. Available: http://www.tcpipguide.com/free/t_PerformanceMeasurementsSpeedBandwidthThroughputand-2.htm [Accessed April 10th 2016].
LOVETOKNOW, C. nodal processing delay [Online]. LovetoKnow, Corp. Available: http://www.yourdictionary.com/nodal-processing-delay#7kdIyI1CMpD7Hx3q.97 [Accessed 10th April 2016].
NETWORKINFOBLOG. 2016. Transmission Delay - Propgation Delay [Online]. NetworkInfoBlog. Available: http://www.networkinginfoblog.com/post/36/transmission-delay---propagation-delay/ [Accessed April 10th