5
02745022 Rennie Ramlochan INFO 3405 Networking Technologies Assignment #1 1. (a) When packets are transmitted, the sequence of packets does not follow any periodic ordering, the ordering is random. Packets are transmitted whenever they appear at the link. This is the similarity shared between statistical multiplexing and packet switching. (b) In digital audio and video broadcasting statistical multiplexing can be used to allow several video, audio and data streams of different data rates to be transmitted over a bandwidth-limited channel. 2. Cable Modem Wireless Router A D C B Signal from ISP

02745022 Rennie Ramlochan INFO 3405 Networking Technologies Assignment #1

Embed Size (px)

DESCRIPTION

2745022 Rennie Ramlochan INFO 3405 Networking Technologies Assignment #1

Citation preview

02745022 Rennie Ramlochan INFO 3405 Networking Technologies Assignment #1 1. (a) When packets are transmitted, the sequence of packets does not follow any periodic

ordering, the ordering is random. Packets are transmitted whenever they appear at the

link. This is the similarity shared between statistical multiplexing and packet switching.

(b) In digital audio and video broadcasting statistical multiplexing can be used to allow

several video, audio and data streams of different data rates to be transmitted over a

bandwidth-limited channel.

2.

Cable Modem Wireless Router

A

D

C

B

Signal from ISP

This can be done by implementing a wireless local area network. From the

diagram above, a cable modem is used to connect to the internet via an (isp) internet

service provider. [A wireless router allows wired and wireless ethernet LAN devices to

connect to a (usually) single WAN device such as cable modem or DSL modem.]

Computer A is connected directly to the wireless router using a hardwired

Ethernet cable via its Ethernet card. The wireless router is used to transmit the signal to

computers B, C, and D. Computers B, C, and D are outfitted with wireless network cards

and the wireless router is configured to communicate with them.

To provide a level of security for the network, MAC address filtering can be

enabled as well as enabling firewalls on all computers and the router to provide a level of

security for the network to deter unauthorized users from eavesdropping and to prevent

unauthorized access to the wireless network .

In addition the use of WEP and WPA encryption should be used, as they are used

to protect the wireless communication from eavesdropping and to prevent unauthorized

access to the wireless network

Also you can Assign passwords to folders you want to protect by using Windows share-level access control, also known as "permissions." to protect your shared files.

For file sharing capabilities, file and printer sharing must be enabled on all four

computers which is done through the operating system of the computers.

3. The following displays a Protocol for interacting with an online registration system for courses. Validation of User Name and Password

Registration of a Course

Select Course to REGISTER

time

Student Submits application

If Pre-requisite NOT MET course Can Not BE added to Banner DENY ACCESS

If Pre-requisite met COURSE ADDED to Banner

User Name and Password entered

ACCESS GRANTED if username and password Valid

time

If Password INVALID display ERROR and DENY ACCESS

User Name and Password Re-entered

If NO SPACE AVALIABLE MESSAGE DISPLAYED & COURSE NOT ADDED

time

If class has Available Spaces Course ADDED to BAnner

Student ACKNOWLEDGES message and exits system

Student CONFIRMS addition, SAVES CHANGES

Select course to ADD

View Registration Status

Withdraw from a Course

Check Available Spaces for Course

Select term to view

time

Display Registered Courses

Select Course to WITHDRAW

If not a core course CONFIRM REMOVAL from student’s registration

time

If it’s a CORE COURSE, display WARNING MESSAGE AND COURSE not Removed

Acknowledge message and exit system

Student confirms changes and exits system

References: http://en.wikipedia.org/wiki/Statistical_multiplexing (question1) http://www.edutainingkids.com/articles/howtosetuphomewirelessnetwork.html (question2) http://images.google.com/imgres?imgurl=http://www.gsdi.org/pubs/cookbook/gifs/figure4_1.gif&imgrefurl=http://www.gsdi.org/pubs/cookbook/chapter04.html&usg=__wILF7bMzfmvK1LfIs_bGKQCBQyQ=&h=453&w=563&sz=6&hl=en&start=1&um=1&tbnid=_NmQtJBj4fYc-M:&tbnh=107&tbnw=133&prev=/images%3Fq%3Dprotocol%2Bfor%2Bregistration%2Bsystem%26hl%3Den%26rls%3DGGLL,GGLL:2004-38,GGLL:en%26sa%3DN%26um%3D1 (question3) http://images.google.com/imgres?imgurl=http://bitten.edgewall.org/raw-attachment/wiki/MasterSlaveProtocol/protocol.png&imgrefurl=http://bitten.edgewall.org/wiki/MasterSlaveProtocol&usg=__a7t6QBQ3soGdypH_VN-zO32qW7I=&h=468&w=387&sz=50&hl=en&start=40&um=1&tbnid=t9sBeyEDoP82XM:&tbnh=128&tbnw=106&prev=/images%3Fq%3Dprotocol%2Bfor%2Bonline%2Bregistration%2Bsystem%26ndsp%3D20%26hl%3Den%26rls%3DGGLL,GGLL:2004-38,GGLL:en%26sa%3DN%26start%3D20%26um%3D1 Computer Networking - A Top-down Approach Featuring the Internet, Third Edition