Question
Wireless network security relies on ARP - the Airway Recryption Protocol should not rely on WEP - the Wired Equivalence Protocol is not needed in
Wireless network security
relies on ARP - the Airway Recryption Protocol
should not rely on WEP - the Wired Equivalence Protocol
is not needed in a point-to-point wireless link because no one else can receive the radio signal
is impossible because the data is transmitted through the air and anyone can capture those signals
Conversational audio and video
relies on the network to be able to deliver the data with high latency and variable network delay
must overcome variable network delay and latency
should deliver network data with more than a 1000 ms delay
can overcome any network delivery issues with sufficient buffering
The IPSec protocol secures data by adding encryption
at the network layer
between the application and transport layers
at the data link layer
at the physical layer
In terms of network management, MIB is
the men in black, otherwise known as network administrators who must always wear sunglasses so that the blinking lights of switches and routers don't cause them to forget the OSI data model
a distributed store/database of network management data
the data definition langauge for network management data
the protocol for communicating network management data between managed devices and managing entities
Streaming stored audio and video
requires that network delays do not exceed 400 ms
overcomes many network related issues by relying on the inherent re-transmission capability in UDP
can be stored on different servers at different bitrates to meet the needs of users
requires that the entire file is downloaded by the client prior to playback
Wireless networks use CSMA-CA (carrier sense, multiple access, collision avoidance) instead of CSMA-CD (carrier sense, multiple access, collision detection) that is used on wired networks because
wireless network nodes cannot "hear" all other nodes on the network and therefore cannot rely on hearing other transmissions to determine if the network is busy or not
wireless network nodes can "hear" all other network nodes, unlike in a wired network, so they don't have to detect collisions
signal propagation in a wireless network is uni-directional and follows guided network paths, so collision detection isn't needed
wireless nodes can move, so radio wave collision must be avoided as nodes move around the network
If "Trudy" wishes to do harmful things to the communication between "Bob" and "Alice", she can attempt to do all except
eavesdrop - intercept messages
impersonate either Bob or Alice
hijack the connection, and become a "man-in-the-middle"
crack the AES encryption key easily because of how poorly AES was designed
Select the best authenitcation method that Alice can use to prove who she is to Bob
she can send Bob a hash of her username to prove she is Alice
she can send an encrypted version of her password to Bob to prove that she is Alice
Bob sends a nonce to Alice, which she encrypts with her password as the key, and sends the result back to Bob
she can just send her password to Bob and Bob can validate the password against the database
Message integrity is
that messages can only be sent anonymously between senders and receivers
the sending and receiving of messages securely, so that only the two of them can understand the contents of their messages
that messages cannot be modified without detection
that messages can be communicated at any time when desired by the sender and receiver
Jitter in digital video transmission
is caused by variable network delay
is caused by the user shaking the camera violently
is caused by green blocks of video being transmitted to the receiver
is caused by constant network delay
ASN.1 addresses the problem of
translation between different types of SNMP messages
asynchronous system notation between similar systems
autonomous system networking
the study of national networks through the association for the study of nationalities
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started