Objectives In this task you will demonstrate the work that you have completed and the understanding you have gained from the weeks indicated above. There are three parts to this pass task (questions...

1 answer below »
networks and security


Objectives In this task you will demonstrate the work that you have completed and the understanding you have gained from the weeks indicated above. There are three parts to this pass task (questions appear starting on the next page), as follows: • Part 1. Specific Questions – short answer questions requiring you to explain or discuss one several topics examined. • Part 2. Reflection Questions – general discussion where you reflect on what you have learned and demonstrate you have understood the context for the learning conducted. • Part 3. Evidence of Learning – a collection of artifacts you have gathered to demonstrate what activities you have completed in learning the content of the unit. Page limits are indicated below for Parts 1 and 2. These limits are based on text that is formatted reasonably, e.g., 2cm margins, 11 or 12 point font, appropriate headings/spacing, etc. If your submission significantly exceeds these limits, either in answer length, by using tiny fonts, no spacing, etc., then your submission will be returned to you without review for corrections. There is no requirement/expectation that your answer will reach these page limits (no minimum length, only a maximum). Submitting Your Task Prepare your submission using the word processor of your choice and submit a PDF to OnTrack. Citations and Referencing When completing assessment it is necessary to acknowledge the work of others that you have relied upon. For written submissions, we achieve this using citations and references. Failing to correctly identify the work of others is known as plagiarism, an issue of Academic Integrity, and is subject to penalties. If your submission to this task has involved using the work of others, you must include citations and references where appropriate. Deakin provides a web site that explains how to use citations and references, and includes explanations of various referencing styles: https://www.deakin.edu.au/students/studying/study-support/referencing You may choose any of the styles described on the above site, however you must apply your chosen style consistently for this task (you can use other styles in other tasks if you wish). Note that any bibliography/list of references is not included in page limits. SIT716 Computer Networks and Security Pass Task 2.1P Weeks 1-2: Introduction and Link Layer https://www.deakin.edu.au/students/studying/study-support/referencing Part 1. Specific Questions (limit: 1 page) Answers to these questions must be your own, however you can discuss these questions with other students and/or your workshop supervisors to get ideas/insights. These questions are not intended to be challenging, instead most of these questions you should be able to answer immediately after studying the unit content. 1. Using a computer connected to the Internet, capture some network traffic using Wireshark. Select one of the packets and copy a screenshot into your answer. Identify which protocols are used at each layer of the TCP/IP model and explain how you know this. 2. Consider the main connection to the Internet you use at home (this could be a broadband connection or your smartphone). Discuss the advantages and disadvantages of this Internet connection as they relate to your studies at Deakin. 3. In Week 2 we discussed how a MAC flood allows an attacker to read all of the traffic on a wired Ethernet LAN. Discuss whether this attack is also relevant to Wi-Fi networks or not. Part 2. Reflection Questions (limit: 1 page) 1. What are the most important lessons you learned in studying this week/these weeks and how will you apply these in your future learning/future career? 2. If you had to explain what you learned to another person/student, what topics do you need to improve your understanding of so you can explain those topics properly? How will you do this? 3. How does this new knowledge fit in with your existing knowledge and how will you use it in your future learning/career? Part 3. Evidence of Learning (no limit) There are no specific questions to answer for this section. Instead, this section acts like a journal where you gather the evidence of your learning. You can include any elements are relevant to your learning, however if you are aiming for a higher grade this section would naturally reflect more in-depth activities, even going beyond unit content (for HDs). Keep in mind that you are evidencing your learning, so make sure you include a brief discussion/summary where relevant to explain where/what you have learned. Your learning also isn’t restricted to yourself, e.g., you will also learn helping other students understand content. Examples may include: • Notes/summaries you have taken while reviewing the content online or while completing the labs. • Links to web sites / videos you have reviewed to further develop your understanding. Include a brief summary of why this site/video is useful and what you learned from it. If you find something particularly useful, make sure you post it in the forums for others to learn from also! • Discussion postings you’ve made asking questions or providing answers. Include a brief summary of what you learned from the answers you received, why you were able to provide a good answer, or what you learned in contributing to the discussion. • Discussions you’ve had with other students, staff, colleagues, and so on. Include a brief summary of what was discussed and the outcome of the discussions, e.g., did you do additional work after this discussion or did you work with others to solve a problem you discovered? • Experiments you’ve conducted, either as part of the labs in the unit or your own experimentation. What work did you complete and what did you learn? • If you are aiming for a higher grade, your learning would also include preparation for higher tasks, so you can include some notes here as part of that. Your notes here could include a plan of what work you need to do or even a (partial) draft of your answer.
Answered 4 days AfterJul 24, 2022Deakin University

Answer To: Objectives In this task you will demonstrate the work that you have completed and the understanding...

Sairama answered on Jul 28 2022
73 Votes
Part 1 Specific Questions
1.             
I have chosen the wireless interface to capture the packets. The above is the snapshot
of the packets captured. I have chosen packet number 20
, which belongs to the TCP
Protocol (Transport Layer). We can know the protocol of the packet through the ‘protocol’ column. Also the frame below gives us details about IP version, source and destination address, source and destination port. I can see other layers like Application layers (TLS protocol), ICMP (IP layer) etc.,
2. Advantages of a broadband connection at home:
a. The connection provides various facilities like the DNS service,TLS, for secure communication, DHCP, for providing an ip address to a node, FTP, HTTP, HTTPS, SMTP for various communication.
b. Independent layers, modularized function of each of the layers.
    Disadvantages : Congestion of network, delay in packet relay, network security
3. Even if port security is not an option to stop the MAC flooding attack, the MAC flooding attack is unsuccessful when launched by a wireless user. The reason for this is the 802.11 protocol. The association to an AP is MAC-based; this means that the AP bridges traffic coming only from or going to known users or known MACs. If a MAC flooding attack is launched from a wireless user, all the 802.11 frames with random source MAC addresses that are not associated with the AP are dropped. The only frame allowed is the one with the MAC of the malicious user, which the switch has probably already learned. Thus, the operation of the access point prevents the switch from being susceptible to MAC flooding attack
Part 2 Reflection Questions:
1. The important lessons learnt in the last two weeks are mainly to understand the functionality, bare bones of the various types of computer networks which are prevalent...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here