Assessment Information SIT716: COMPUTER NETWORKS AND SECURITY Assessment 1e: Bi-weekly Report (Weeks 9-10) KEY INFORMATION Due: Sunday May 23rd by 8pm Weight: 6% of total mark for this unit...

1 answer below »
SIT716 - Computer Networks And Security - 5102021 - 1040 PM.zip



Assessment Information SIT716: COMPUTER NETWORKS AND SECURITY Assessment 1e: Bi-weekly Report (Weeks 9-10) KEY INFORMATION Due: Sunday May 23rd by 8pm Weight: 6% of total mark for this unit Approximate length: 1 to 2 pages1 Individual Assessment PURPOSE Short answer questions to assess and reinforce learning of the concepts of Weeks 9-10 by exploring dashboard data for NOCs. TASK(S) Consider the following three possible events that may be highlighted on NOC dashboards: a) A significant and unusual drop in the number of IP packets being received on the ingress link for the public Internet. b) A significant and unusual increase in the rate of duplicate TCP acknowledgements observed on a Wi-Fi connection. c) A significant and unusual increase in the number of ARP requests on the internal LAN. At the same time, you notice that you are unable to access a network file share on the LAN. Select two of the above events and, for each selected event, explain the likely cause of the event and why the indicated symptoms would be observed. Note: If you address more than options the third cannot be marked/considered. 1 Approximate length is only an estimate and does not include title page, contents page, references, or illustrations, i.e., the length is indicative of the text of your answer only. Indicated length is based on sensible settings, e.g., 2cm margins, 12 point font, reasonable spacing. Whilst there is no penalty for an over-sized answer, note that excessively large answers are likely to lack clarity and can even demonstrate a lack of understanding. Assessment Information SUBMISSION DETAILS Your answers should be submitted via CloudDeakin to the TurnItIn-enabled Assignment Folder for the Assignment 1a - Weeks 1-2 Bi-Weekly Report. Your answers to each question and sub- question must be clearly identified in your submission. Acceptable file formats are Word documents, PowerPoint documents, PDF documents, text and rich text files, and HTML. Compressed files, such as ZIP files or RAR files are not accepted and will not be marked. After submitting your assignment you should receive an email to your Deakin email address confirming that it has been submitted. You should check that you can see your assignment in the Submissions view of the Assignment folder after upload, and check for, and keep, the email receipt for the submission. ACADEMIC MISCONDUCT Academic misconduct and plagiarism is subjected to penalties. Plagiarism includes and not limited to: • Copying others’ work without appropriate referencing • Re-using assignment material completed by other students • Contracting others to do assessment tasks on your behalf. https://www.deakin.edu.au/students/study-support/referencing/academic-integrity LEARNING OUTCOMES This assignment assesses the following Graduate Learning Outcomes (GLO) and related Unit Learning Outcomes (ULO): Graduate Learning Outcome (GLO) Unit Learning Outcome (ULO) GLO1: You will be required to work with content relevant to computer networks, network security, and the IT discipline in general. ULO1: You will be required to explain the architecture and operation of computer networks, security attacks, and defensive measures. ULO2: You will be required to explain normal and abnormal behaviour of network protocols. ULO3: You will be required to explain how cybersecurity activity can be identified. https://www.deakin.edu.au/students/study-support/referencing/academic-integrity Assessment Information EXTENSIONS No extensions will be considered for this assessment unless a request is submitted through the CloudDeakin and approved by the Unit Chair (enter SIT716 unit page and click Assessment -> Extension request). Assignment Extensions are normally only approved when students apply before the due date. The Unit Chair may ask you to supply supporting documentation about the difficulties you are facing, and evidence of the work you have completed so far. A marking penalty will be applied where the assessment task is submitted after the due date without an approved extension as follows: a. 5% will be deducted from available marks for each day up to five days b. where work is submitted more than five days after the due date, the task will not be marked and the student will receive 0% for the task. 'Day' means working day for paper submissions and calendar day for electronic submissions. (This assessment task uses electronic submission) Assessment Information SIT716 Computer Networks and Security Assessment 1: Bi-Weekly Report (Weeks 9-10) Criteria Advanced answer (4 marks) Clear answer (3 marks) Reasonable answer (2 marks) Flawed answer (1 mark) No merit (0 marks) Task i and ii (grading is the same for both events) Criteria 1: 50% Cause and explanation for the symptoms of the first selected event. Criteria 2: 50% Cause and explanation for the symptoms of the second selected event. Valid cause identified and how this problem generates the identified symptoms has been clearly explained. Additional symptoms that may also be present have also been identified with a clear explanation. There are no major misunderstandings or errors in the answer. Valid cause identified and a clear explanation of why those symptoms are observed has been provided. There are no major misunderstandings or errors in the answer. Valid cause identified and a basic explanation of why those symptoms are observed is provided. Minor inaccuracies may be present in the answer. Very poor and/or incomplete answer which only vaguely identifies a potential cause or explains why those symptoms are observed. Question not attempted, your explanation does not address the question, or your explanation is incorrect. KEY INFORMATION PURPOSE Task(s) Submission Details Academic Misconduct Learning Outcomes Unit Learning Outcome (ULO) Graduate Learning Outcome (GLO) Extensions
Answered 3 days AfterMay 10, 2021

Answer To: Assessment Information SIT716: COMPUTER NETWORKS AND SECURITY Assessment 1e: Bi-weekly Report (Weeks...

Prince answered on May 14 2021
142 Votes
A significant and unusual increase in the rate of duplicate TCP acknowledgements observed on a Wi-Fi connection

In transmission of data packets using TCP protocol, the receiver sends an ACK(acknowledgement) packet back to the sender to signify the successful transmission of the data packet. TCP DUP ACK(duplicate TCP acknowledgement) packets are created whenever a particular data packet in a series of data packet transmissions is lost. These DUP ACK packets signify the last packet successfully received to notify the sender about the packet lost in transmission. The sender then resends that data packet again. Unlike wired connections where shielded transmission line can be used, wireless connections suffer from interference from other wireless networks in their vicinity which are on the same channel. This interference can eventually result in delays in packet transmission due to traffic congestion on the wireless network channel which will trigger TCP timeout for the packet and the packet will then require retransmission for which TCP DUP ACK is created. Further to this, data transmission in a wireless network...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here