IT 105 HW9

.docx

School

University of Maryland *

*We aren’t endorsed by this school

Course

105

Subject

Electrical Engineering

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by arinzeallen

HW Assignment 9 (1) Correlation between OSI and TCP/IP model, and example protocols for Applications and Transport layers in TCP/IP model. TCP/IP is a layered protocol just like the OSI model. The TCP/IP layers are equivalent in operation and function as the OSI model. The Network Access layer of TCP/IP is equivalent to OSI layers 1 and 2. The Internet protocol layer of TCP/IP is comparable to layer 3 of the OSI model. The host-to-host layer of TCP/IP is equivalent to layer 4 in the OSI model. And the Application layer of TCP/IP is similar to the Session, Presentation, and Application layers (layers 5, 6, and 7) of the OSI model. - Example protocols for the Application layer in the TCP/IP model = File Transfer Protocol (FTP), Simple mail transport protocol (SMTP), Hypertext transmission protocol (HTTP). - Example protocols for the Transport layer in the TCP/IP model = Transmission Control Protocol (TCP), and User Datagram Protocol (UDP) (2) Difference between TCP and UDP Transport protocols In comparison with Transmission Control Protocol (TCP), the User Datagram Protocol (UDP) is unreliable. The TCP is connection-oriented, while the User Datagram Protocol (UDP) is a connectionless version of TCP. Meaning the UDP protocol does not require a session to be established between two devices, and transmission occurs on a best effort basis. (3) a. How many bits are reserved for control information? 64 bits b. How many bits is reserved for source address? 128 bits c. How many bits is reserved for destination address? 128 bits d. How many bits is reserved for payload? Variable (4) a. Dynamic IP Routing is based on travelling datagrams through internetworks one hop at a time. The entire route is unknown at the beginning of the journey. b. Multicasting is group-based communication. It can be one-to-many or many-to-many distribution. c. The most important requirement of a converged network is the ability to treat different data types differently. d. Voice over IP (VoIP) process transmits telephone calls (voice) over the internet. e. VoIP: G.723 is the standard recommended by the ITU for low bit-rate voice transmission over the Internet. f. Plaintext or Cleartext is an unencrypted message data.
(5) Encryption process and how it works Encryption transforms a message or data file so that its contents are hidden from unauthorized readers. Data is encrypted by using a cryptographic algorithm and a key. The key is a word, number, or phrase that must be known to encrypt or decrypt data (6) In Brute Force attack , to crack the password, the attacker uses password-cracking software to generate every possible combination of letters, numerals, and symbols. In Dictionary Attack , h ackers guess your password by trying out words in a dictionary, containing word lists in common languages such as English, Spanish, French, and German. (7) To create a password using lowercase (a~z) and uppercase (A~Z) English alphabet characters, as well as numbers 0~9. How many possible passwords can be generated if the length of the password is 5? Lower case letters = 26 Upper case letters = 26 Numbers = 10 26+26+10 = 62 Password length = 5 Number of possible passwords that can be generated = 62^5 Ans = 916,132,832 (8 ) Password entropy is a measure in bits of a password’s unpredictability. How entropy is calculated: A password has 10 characters and it is 4 digits in length. The entropy = Log 2 10^4 10^4 = 10,000. Log 2 of 10,000 = 13.2877 The entropy is rounded to 14. Entropy = 14bits (9) Malware - Any computer program designed to enter a digital device covertly and secretly. It is usually created by individuals referred to as hackers, crackers, black hats, or cybercriminals. Malware classifications are: Worms, Viruses, and Trojans. Worms - A self-replicating, self-distributing program designed to carry out unauthorized activity on a victim’s device. They are usually standalone executable programs that can spread themselves from one device to another without any assistance from victims. Viruses - A set of self-replicating program instructions that surreptitiously attaches itself to an executable file on a host device. When the infected file is run, the virus code is loaded into RAM with the rest of the program. Viruses inject malicious code into files. Trojan – They are standalone programs that masquerade as useful utilities or applications, which victims download and install unaware of their destructive nature. Its main purpose is to disguise malware as legitimate software. The base of these classifications are the way in which they enter a device and the type of activity they carry out.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help