Computer Network Security

Requirement

1) Discuss the performance differences between FHSS and DSSS.

2) In CDMA:

a. How is the chipping rate determined?
b. What considerations should be used when determining the chipping rate?
c. How can the chipping code be protected?

3) Explain what space division switching is and how, when and where is it used?

4) When should a virtual circuit packet network be employed?

5) In at ATM,  cell loss priority (CLP) is used to make determinations about the data flow,  what are these decisions based on CLP, and what adjustment can be made from the data?

6) Explain two situations in which each algorithm should be used vs. the other, make sure you explain your choice and situation. a. Bellman-Ford algorithm b. Dijkstra’s algorithm

7) Discuss and explain the overall complexity regarding congestion control, when one would use backpressure over implicit congestion signaling?

8) Explain the differences between a 4G and a 4G lite cellular network, choose two or three major features. Explain in detail these differences.

9) Where, in your opinion, are the largest set of changes that affect the most people regarding data and computer communications? Provide a discussion of this topic.

10) How does Human computer interfacing (HCI) influence the overall design of the next generation networking solutions?

Solution

1) Discuss the performance differences between FHSS and DSSS.

FHSS stands for Frequency Hopping Spread Spectrum and DSSS stands for Direct Sequence Spread Spectrum. Both FHSS and DSSS are spread spectrum modulation techniques. Wireless performance is dependent on the bandwidth offered by the channel.  So, comparing DHSS with FHSS on the performance scale can be done based on the type of channel used by them
DSSS uses uses 22 MHz channels, which is always faster than that of FHSS, which is only 1 MHz channels both in the UNII/ISM bands . However, there are techniques that can increase the speed of FHSS to 3-5 Mb range, but it still doesn’t get close to DSSS. Moreover, the FHSS modulation technique provides a throughput of 0.5 to 2 MHz in bit/s throughput (Zytrax.com, 2016). 

Hire the best computer networking assignment help experts at Allassignmenthelp.com to complete your CSE assignment on time. Our computer programming assignment helpers have the potential to assist the students in improving and achieving the desired grades. If you are running out of time then you can get our instant assignment help online and submit your assignments before the deadline.

2. In CDMA

a. How is the chipping rate determined? 
b. What considerations should be used when determining the chipping rate? 
c. How can the chipping code be protected?

  • a)    The chipping rate is determined as the number of chips per second at which the code is transmitted or received.  The measurement unit for the chip rate is megachips per seconds, which is equivalent to the millions of chips per second. The formula to calculate chip rate - spreading rate x data rate. Where, Spreading rate is the ratio of chips to information signal of the modulation technique.

  • b)    Available bandwidth of the channel should be considered at the time of setting up chipping rate. It happens that the channel bandwidth is lower than the chip rate it can handle.

  • c)    With the help of pseudo-random technique chipping code is protected. The chipping code seems to be random, but it is actually deterministic and can be decoded at the receivers end.

3 Explain what space division switching is and how, when and where is it used?

There are number of ways in which a switching can be done and space division switching is one such technique. Space division switching was developed for the analog network such as telephone lines and network.  For example, it was used for voice communication in telephone networks (Stallings, 2000). However, with the advancements, it is used for digital domain as well.  Space switching is required whenever there are different physical paths needed for the communication. Hence, telephone networks is one such example where communication through single physical path is not possible.

4. When should a virtual circuit packet network be employed?

Whenever there is a need of a reliable connection for data transfer, we employ virtual circuit packet networks. The process takes place in three steps:

  • Connection establishment: Initial step in which a connection is established between the source and destination.

  • Data transfer: It is the data transfer phase where data is transferred over the previously established connection

  • Connection release: It is the final phase when the communication is done. It is close down phase.

Virtual Circuit is preferred in the private networks of an organization. The fundamental reason for the user of Virtual Circuit is its independence from the routing table for the routing addresses. Another advantage with VC is the header length that is short and takes less time.

5. In at ATM, cell loss priority (CLP) is used to make determinations about the data flow, what are these decisions based on CLP, and what adjustment can be made from the data?

The Cell Loss Priority (CLP) bit is present in the header of an ATM to control the network traffic. There are two possible values of CLP bit. It can either be 0 or 1 and this sets the possibility of discarding or accepting a data packet.
As per the concept of CLP, if the value of the bit is 1, implies lower priority. A CLP value of 0 implies higher priority. Hence, a cell with CLP 1 will be discarded relative to the CLP value of 0.   Hence, the network performance can be monitored by setting the CLP value. For example, if network is congested , then the CLP with value 1 will be discarded and it will make space for the higher priority data and reducing network congestion. A network can also set the CLP to 1 in case data cell is violating the network traffic agreement (Stallings, 2000). 

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

6. Explain two situations in which each algorithm should be used vs. the other, make sure you explain your choice and situation.

a. Bellman-Ford algorithm 
b. Dijkstra’s algorithm
Both Bellman-Ford and Dijkstra algorithm have advantages and disadvantages. Bellman-Ford is slower than Dijkstra algorithm, but is effective in case of negative weights of a network graph. 

  • a)    Bellman-Ford algorithm - It is preferred in the Distance Vector Routing method where the complete network topology is not present, hence Dijkstra algorithm won’t work. Dijkstra algorithm stores the entire network topology and eliminates the nodes based on the edge cost. 

  • b)    Dijkstra’s algorithm - It is preferred in the Link state routing method. There is a complete adjacency matrix for the entire network, hence finding the shortest path is possible based on the adjacent nodes. However, Dijkstra algorithm may or maynot work in case a graph contains the negative weights (Sedgewick, 2016) as end result will be wrong, hence Bellman-ford will be preferred. Moreover, in case the entire network topology is known, Bellman-Ford may run into infinity count problem, that halts the network. 

7. Discuss and explain the overall complexity regarding congestion control, when one would use backpressure over implicit congestion signaling?

Congestion control technique is employed by network providers to avoid deadlocks, high congestions on a network. It can be done by reducing the packet transmission over the network. Reasons for congestion control can be high data transmission rate that cannot be sustained by the network output lines. Moreover, slow packet transmission rate can also cause packets to stuck on the network and causing congestion. These possibilities make Network Congestion control a complex process. It is not a straightforward mechanism and many algorithms has been designed to counter congestion. A few techniques that help in congestion prevention are feedback, message replay, admission policy and many more. 

Backpressure (Mvn.edu.in, 2016) is a closed loop congestion control technique that comes into picture when the network is already congested. It is used over implicit congestion signaling for one main reason. In implicit congestion signalling a data packet may be discarded and it is not considered fair. However, in case of backpressure approach all the data packets are pushes back to the source. In implicit congestion, delay may increase as compared to backpressure.

8. Explain the differences between a 4G and a 4G lite cellular network, choose two or three major features. Explain in detail these differences.

4G and 4G LTE are replacement of 3G networks. 4G stands for Fourth Generation and LTE stands for Long Term Evolution. 4G provides a high data transmission speed as compared to 3G. As per the ITU-R standard, the download speed for a 4G connection can be 100 mbps. 4G LTE on the other hand offers a download speed of  5-12 mbps on the mobile devices, which is considered to be on the high side (Bourque, 2015).

A few important differences between 4G and 4G LITE are given below:

  • Speed of data transmission:  This is the first and foremost difference between a 4G and a 4G LITE network. A 4G LITE network offers a much faster speed as compared to normal 4G on a device. 4G LITE download speed can be somewhere between 5 to 8 mbps as compared to 3 to 8 mpbs in 4G networks.

  • Mode of Data transmission: In networking there is two type of data transmission. Either it can be packet switching or circuit switching. The 4G network is based on the concept of circuit-switching, whereas 4G LITE works on the fundamental of packet-switching. working with packet-switching. In case of failure of circuit switching the connection has to be established again, but in case of packet switching a data packet can take a different route to get to the destination.

  • Requirements for 4G and 4G LTE: 4G devices are cheaper as compared to 4G LTE due to availability of the 4G LTE connections.

9. Where, in your opinion, are the largest set of changes that affect the most people regarding data and computer communications? Provide a discussion of this topic.

There has been numerous changes in the computer communication over the years, but the largest set affecting our lives is given below: 

  • With the increase in the number of people using computer technology and devices has been rising with every passing day, hence it is imperative to build devices and systems that are easy to use for the end user. Building a user friendly and easy to use technology is one such set affecting perception towards computing.

  • Technology should enable a better data transmission and faster communication that can work well even on the slow networks or internet speed. For example, Skype can be improved that can even work on small data packets.  

  • Accessibility to wireless network is limited in many areas, hence the entire logic of computer communication go into vain. It is necessary to built towers with a range covering a few kilometers of area that can facilitate fast internet speed.

  • HCI has helped changing many interfaces over the years, but there is a need to make applications that are easy for the naive users as well.

  • End users are not sure who is spying on their communication. Hence, data encryption is a must for the users privacy. It can change the user perception towards computer communication.

10. How does Human computer interfacing (HCI) influence the overall design of the next generation networking solutions?

As the name suggests HCI is a term that denotes the interaction of Human and Computer with each other. HCI came into existence into 1980s, but it evolved manifolds since then. Moreover, networking and internet is the primary reason for the evolution of HCI. The first HCI application was Email using which people interacted with each other by computers. However, HCI has a major role to play in the next generation networking solutions. Despite the evolution in the area of Networking, home networking remains a problem. Due to poor network designs and protocol, even the most tech savvy people face difficulty in setting up the networks. Solution to this problem lies in HCI. 
Network core design has always been kept simple, hence the entire complexity for the network solution is related to the end devices. A simple change in the network settings on a networking device leads to the failure of the entire network.  A network requires that the device located in the client's location should be configured as per the settings of the service provider, otherwise the network will not work. Hence, the design of the network core has left a vulnerability at the client’s end. However, in case of cell phones, network core design has been given attention. A phone is a stateless device that doesn’t know its number. It gets the number from the network core. So, the user experience is just to insert the sim and enjoy all sort of features related to the phones. This is a usability example of the network design that can help end users. It can be easily established that a chosen design for the network can impact the usability. Hence, employment of HCI is a must for the better networking generation. One possible solution is to create a visual network simulation model for the naive users to explain the broken network and fixing issues. Self healing networks (Poole, Edwards and Jarvis, 2016) is also a possibility, however they won’t work in every situation because the end users need are different. HCI can make troubleshooting and network error fixing easy for the users and can save a good amount of costs for the companies that employ technicians who fixes broken network for the people. 

References

  • Zytrax.com. (2016). Tech Stuff - Frequency Hopping and Spread Spectrum Technology. [online] Available at: http://www.zytrax.com/tech/wireless/fh_ds.htm [Accessed 24 Apr. 2016].

  • Stallings, W. (2000). Data and computer communications. Upper Saddle River, N.J.: Prentice Hall.

  • Mvn.edu.in. (2016). Congestion: Congestion Control. [online] Available at: http://mvn.edu.in/lms/mod/book/view.php?id=72&chapterid=22 [Accessed 23 Apr. 2016].

  • Poole, E., Edwards, ,. and Jarvis, L. (2016). The Home Network as a Socio-Technical System: Understanding the Challenges of Remote Home Network Problem Diagnosis. ACM, [online] pp.1-10. Available at: http://www.cc.gatech.edu/~keith/pubs/jcscw09-homenet-help.pdf [Accessed 23 Apr. 2016].

  • Bourque, B. (2015). What’s the difference between 4G and LTE?. [online] Digital Trends. Available at: http://www.digitaltrends.com/mobile/4g-vs-lte/ [Accessed 23 Apr. 2016].

  • Sedgewick, R. (2016). Negative Weights | Shortest Paths Graph Algorithms | InformIT. [online] Informit.com. Available at: http://www.informit.com/articles/article.aspx?p=169575&seqNum=8 [Accessed 23 Apr. 2016].

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order