Đã hoàn thành

Advance Computer Network (TCP and Security)


[login to view URL]

[login to view URL]


Please do not double space lines.

[login to view URL] and Applications (20 marks)

Authentication has long been a problem for transactions. How do you know if

someone presenting a card really is the owner of that card? Simple methods include

matching a signature to a previously signed one on the back or entering a PIN.

Now with PayWave, only authentication by possession (of the card) is required.

Currently, there are a number of initiatives to use mobile devices for the

functionality of payment. This raises the question of how safe are the devices and

what mechanisms are built in to prevent fraud. A number of platform vendors have

introduced electronic card payments to their devices. For example Apple

introduced ApplePay in iPhone and Apple Watch.

With reference to the techniques in the security lectures, examine how various

vendors approach secure payments. Is it easy to use for legitimate users while

difficult to crack for attackers? Does it provide confidentiality, integrity,

authentication, anti-replay, and non-repudiation? In what ways might these

transactions be compromised and how are they counteracted?

You should start with a general description of Apple Pay and another (Androidbased) service, an overview of how it works, and what encryption is used. Where is

encryption applied? Examine the authentication functions. What protocols are

used? Then evaluate it with reference to the previous paragraph. How do the

different vendor’s offerings compare? Where are they the same or similar, and how

do they differ?

Host A and B are communicating over a TCP connection, and Host B has already

received from A all bytes up to byte 126. Suppose Host A then sends two segments

to Host B back-to-back. The first and second segments contain 80 and 40 bytes of

data, respectively. In the first segment, the sequence number is 127, the source port

number is 3024, and the destination port number is 80. Host B sends an

acknowledgement whenever it receives a segment from Host A.

a. [5 marks] In the second segment sent from Host A to B, what are the sequence

number, source port number, and destination port number?

b. [5 marks] If the first segment arrives before the second segment, in the

acknowledgement of the first arriving segment, what is the acknowledgement

number, the source port number, and the destination port number?

c. [5 marks] If the second segment arrives before the first segment, in the

acknowledgement of the first arriving segment, what is the acknowledgement


d. [10 marks] Suppose the two segments sent by A arrive in order at B. B sends

acknowledgements for both segments, but the first acknowledgement is lost and

the second acknowledgement arrives after the first timeout interval. Draw a

timing diagram showing these segments and all other segments and

acknowledgements sent (you can assume no other segment loss). For each

segment in your diagram, provide the sequence number and the number of

bytes of data; for each acknowledgement that you add, show the

acknowledgement number.

e. [5 marks] As we have seen, the Internet layer of TCP/IP has two protocols –

IPv4 and IPv6. The transport layer provides two main protocols TCP and UDP

(along with some special-purpose, minor protocols). But these are for very

different reasons. Why are the Internet and Transport layers very different in

providing two protocols?

f. [5 marks] Since UDP does very little that is different from IP, why do we even

have a transport layer such as UDP?

g. [5 marks] Describe how DDoS attacks may be mounted against TCP and UDP

services. In what way will being connection oriented be different for TCP and



Multi-paragraph answers should be structured into sections and subsections

with appropriate headings and subheadings.

Ambiguous or poorly worded answers will not be accepted

Spelling and grammar

spelling and grammar should be perfect for this task.

Kĩ năng: Bảo mật Internet, Security Systems, Payment Gateway Integration

Xem nhiều hơn: Computer Network Projects, computer based entrance security using, find username user computer network vbnet, visual net network tcp communication project, jobs computer network nepal, computer network book urdu, computer network books urdu, visio computer network sample, list computer network project topics, computer network administrator security website hindi, computer network project topics, powerpoint presentation topics computer network, computer network security presentation topics, phd research proposal computer network security, computer network security

Về Bên Thuê:
( 1 Nhận xét ) MARSFIELD, Australia

ID dự án: #21803944

Được trao cho:


Hello Dear, I am an Expert Network Engineer and I am working as IP Problem Expert Network Engineer at Orange Business Services. I have great hands-on experience for more than 5 years in various network technologies. Thêm

$80 AUD trong 1 ngày
(6 Đánh Giá)

5 freelancer đang chào giá trung bình $65 cho công việc này


Hey there, I have been in the Information Security arena for years. I had conducted tons of Computer/Network Security projects. I can help. Regards.

$80 AUD trong 7 ngày
(9 Nhận xét)

Hello Sir/Madam, I am a highly experienced and skilled cyber security consultant. I have 9 years of experience in the navy as a network and information security officer. Also i have experience as a freelancer. I hav Thêm

$60 AUD trong 7 ngày
(1 Nhận xét)

Hello there, I am a qualified and satisfied writer with over three years of experience in different areas of writing. In all that I do, my clients come in as first priority so as to ensure that they are satisfied in th Thêm

$40 AUD trong 1 ngày
(2 Nhận xét)
$66 AUD trong 10 ngày
(0 Nhận xét)