FIND A SOLUTION AT Academic Writers Bay
COMP347/ITEC697 : Advanced Computer Networks – IT Assignment
1. Security and Applications
a) Discuss the problems caused for firewalls by the use of VPNs and IPSec.
b) Security services may be placed within each of the layers of the OSI reference model. A list, describe and discuss the advantages anddisadvantages of placement within each layer. Your answer should include examples of security services within at least three differentlayers.
c) Both Alice and Bob have the public-key capability. They wish to carry out mutual authentication. Let us assume that Alice and Bobalready know each other’s public keys. They want to establish a session and then use symmetric session keys on that session since it is typically 100 to 1000 times faster than public key cryptography. Write a protocol that enables Alice and Bob to mutually authenticate each other and agree on a shared secret key.
2. TCPResearch and write a short report (two or three pages) on the different versions of TCP – Tahoe (base version), Reno, NewReno, and Vegas. What are the problems that each tries to solve and the features introduced to address those problems?
3. IPv6a) IPv6 has been standardised for almost 20 years, yet it has not seen widespread deployment. Describe the reasons for the slowadoption of IPv6.
b) What changes are required in regular routing protocols ( that operate with IPv4) in order to prepare them for routing within IP v6domain?
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER