Upload
rennie-ramlochan
View
6
Download
0
Embed Size (px)
DESCRIPTION
2745022 Rennie Ramlochan INFO 3405 Networking Technologies Assignment #1
Citation preview
02745022 Rennie Ramlochan INFO 3405 Networking Technologies Assignment #1 1. (a) When packets are transmitted, the sequence of packets does not follow any periodic
ordering, the ordering is random. Packets are transmitted whenever they appear at the
link. This is the similarity shared between statistical multiplexing and packet switching.
(b) In digital audio and video broadcasting statistical multiplexing can be used to allow
several video, audio and data streams of different data rates to be transmitted over a
bandwidth-limited channel.
2.
Cable Modem Wireless Router
A
D
C
B
Signal from ISP
This can be done by implementing a wireless local area network. From the
diagram above, a cable modem is used to connect to the internet via an (isp) internet
service provider. [A wireless router allows wired and wireless ethernet LAN devices to
connect to a (usually) single WAN device such as cable modem or DSL modem.]
Computer A is connected directly to the wireless router using a hardwired
Ethernet cable via its Ethernet card. The wireless router is used to transmit the signal to
computers B, C, and D. Computers B, C, and D are outfitted with wireless network cards
and the wireless router is configured to communicate with them.
To provide a level of security for the network, MAC address filtering can be
enabled as well as enabling firewalls on all computers and the router to provide a level of
security for the network to deter unauthorized users from eavesdropping and to prevent
unauthorized access to the wireless network .
In addition the use of WEP and WPA encryption should be used, as they are used
to protect the wireless communication from eavesdropping and to prevent unauthorized
access to the wireless network
Also you can Assign passwords to folders you want to protect by using Windows share-level access control, also known as "permissions." to protect your shared files.
For file sharing capabilities, file and printer sharing must be enabled on all four
computers which is done through the operating system of the computers.
3. The following displays a Protocol for interacting with an online registration system for courses. Validation of User Name and Password
Registration of a Course
Select Course to REGISTER
time
Student Submits application
If Pre-requisite NOT MET course Can Not BE added to Banner DENY ACCESS
If Pre-requisite met COURSE ADDED to Banner
User Name and Password entered
ACCESS GRANTED if username and password Valid
time
If Password INVALID display ERROR and DENY ACCESS
User Name and Password Re-entered
If NO SPACE AVALIABLE MESSAGE DISPLAYED & COURSE NOT ADDED
time
If class has Available Spaces Course ADDED to BAnner
Student ACKNOWLEDGES message and exits system
Student CONFIRMS addition, SAVES CHANGES
Select course to ADD
View Registration Status
Withdraw from a Course
Check Available Spaces for Course
Select term to view
time
Display Registered Courses
Select Course to WITHDRAW
If not a core course CONFIRM REMOVAL from student’s registration
time
If it’s a CORE COURSE, display WARNING MESSAGE AND COURSE not Removed
Acknowledge message and exit system
Student confirms changes and exits system
References: http://en.wikipedia.org/wiki/Statistical_multiplexing (question1) http://www.edutainingkids.com/articles/howtosetuphomewirelessnetwork.html (question2) http://images.google.com/imgres?imgurl=http://www.gsdi.org/pubs/cookbook/gifs/figure4_1.gif&imgrefurl=http://www.gsdi.org/pubs/cookbook/chapter04.html&usg=__wILF7bMzfmvK1LfIs_bGKQCBQyQ=&h=453&w=563&sz=6&hl=en&start=1&um=1&tbnid=_NmQtJBj4fYc-M:&tbnh=107&tbnw=133&prev=/images%3Fq%3Dprotocol%2Bfor%2Bregistration%2Bsystem%26hl%3Den%26rls%3DGGLL,GGLL:2004-38,GGLL:en%26sa%3DN%26um%3D1 (question3) http://images.google.com/imgres?imgurl=http://bitten.edgewall.org/raw-attachment/wiki/MasterSlaveProtocol/protocol.png&imgrefurl=http://bitten.edgewall.org/wiki/MasterSlaveProtocol&usg=__a7t6QBQ3soGdypH_VN-zO32qW7I=&h=468&w=387&sz=50&hl=en&start=40&um=1&tbnid=t9sBeyEDoP82XM:&tbnh=128&tbnw=106&prev=/images%3Fq%3Dprotocol%2Bfor%2Bonline%2Bregistration%2Bsystem%26ndsp%3D20%26hl%3Den%26rls%3DGGLL,GGLL:2004-38,GGLL:en%26sa%3DN%26start%3D20%26um%3D1 Computer Networking - A Top-down Approach Featuring the Internet, Third Edition