Documente Academic
Documente Profesional
Documente Cultură
Rennie Ramlochan
INFO 3405 Networking Technologies
Assignment #1
1.
(a)
When packets are transmitted, the sequence of packets does not follow any periodic
ordering, the ordering is random. Packets are transmitted whenever they appear at the
link. This is the similarity shared between statistical multiplexing and packet switching.
(b)
In digital audio and video broadcasting statistical multiplexing can be used to allow
several video, audio and data streams of different data rates to be transmitted over a
bandwidth-limited channel.
2.
D
A
Signal from ISP
Cable Modem
Wireless Router
B
C
This can be done by implementing a wireless local area network. From the
diagram above, a cable modem is used to connect to the internet via an (isp) internet
service provider. [A wireless router allows wired and wireless ethernet LAN devices to
connect to a (usually) single WAN device such as cable modem or DSL modem.]
Computer A is connected directly to the wireless router using a hardwired
Ethernet cable via its Ethernet card. The wireless router is used to transmit the signal to
computers B, C, and D. Computers B, C, and D are outfitted with wireless network cards
and the wireless router is configured to communicate with them.
To provide a level of security for the network, MAC address filtering can be
enabled as well as enabling firewalls on all computers and the router to provide a level of
security for the network to deter unauthorized users from eavesdropping and to prevent
unauthorized access to the wireless network .
In addition the use of WEP and WPA encryption should be used, as they are used
to protect the wireless communication from eavesdropping and to prevent unauthorized
access to the wireless network
Also you can Assign passwords to folders you want to protect by using Windows
share-level access control, also known as "permissions." to protect your shared files.
For file sharing capabilities, file and printer sharing must be enabled on all four
computers which is done through the operating system of the computers.
3.
The following displays a Protocol for interacting with an online registration system for
courses.
Validation of User Name and Password
time
Registration of a Course
Select Course to REGISTER
If Pre-requisite met
COURSE ADDED to Banner
Student Submits application
If Pre-requisite NOT MET course Can Not BE
added to Banner DENY ACCESS
time
time
References:
http://en.wikipedia.org/wiki/Statistical_multiplexing
(question1)
http://www.edutainingkids.com/articles/howtosetuphomewirelessnetwork.html
(question2)
http://images.google.com/imgres?imgurl=http://www.gsdi.org/pubs/cookbook/gifs/figure
4_1.gif&imgrefurl=http://www.gsdi.org/pubs/cookbook/chapter04.html&usg=__wILF7b
MzfmvK1LfIs_bGKQCBQyQ=&h=453&w=563&sz=6&hl=en&start=1&um=1&tbnid=
_NmQtJBj4fYcM:&tbnh=107&tbnw=133&prev=/images%3Fq%3Dprotocol%2Bfor%2Bregistration%2
Bsystem%26hl%3Den%26rls%3DGGLL,GGLL:200438,GGLL:en%26sa%3DN%26um%3D1 (question3)
http://images.google.com/imgres?imgurl=http://bitten.edgewall.org/rawattachment/wiki/MasterSlaveProtocol/protocol.png&imgrefurl=http://bitten.edgewall.org/
wiki/MasterSlaveProtocol&usg=__a7t6QBQ3soGdypH_VNzO32qW7I=&h=468&w=387&sz=50&hl=en&start=40&um=1&tbnid=t9sBeyEDoP82X
M:&tbnh=128&tbnw=106&prev=/images%3Fq%3Dprotocol%2Bfor%2Bonline%2Bregi
stration%2Bsystem%26ndsp%3D20%26hl%3Den%26rls%3DGGLL,GGLL:200438,GGLL:en%26sa%3DN%26start%3D20%26um%3D1
Computer Networking - A Top-down Approach Featuring the Internet, Third Edition