Categories
Networking

I have provided the question and also the solution, just need to build a network

I have Provided the question and also the solution, just need to build a network in https://www.edrawmax.com/ exactly(number of host computers, routers, switches, buildings, work stations) as mentioned in the question and solution.

Categories
Networking

What is the antenna height required to capture the station wavelength.

Cost-2-Cost is a famous radio show broadcasted from Los Angeles, California, the broadcast use AM stereo at 1320 kHz by the time it reaches Maryland , Rockville WWDC-F2 (@101.1 kHz) Monday – to Saturday from 1AM to 6AM and Sunday off day. What is the antenna height required to capture the station wavelength.

Categories
Networking

1-for multipoint configuration, only one device at a time can transmit.

1-For multipoint configuration, only one device at a time can transmit. Why and what is that terminology called. Explain in maximum 2 paragraphs and cite your work? (10 Point)
2- Cost-2-Cost is a famous radio show broadcasted from Los Angeles, California, the broadcast use AM stereo at 1320 kHz by the time it reaches Maryland , Rockville WWDC-F2 (@101.1 kHz) Monday – to Saturday from 1AM to 6AM and Sunday off day. What is the antenna height required to capture the station wavelength. Explain your Answer and calculations in details Do Not give only the final answer or short explanation you will not get a grade. (10 points)
3- Hulu and YouTube offers regular TV broadcast, and Time Shift service for there customers. As promotion to encourage subscribers to the service providers. FXX movie channel broadcast a new 4K movie with Dolby Atmos for subscribers. Answer the following Questions and Explain your Answer and calculations in details Do Not give only the final answer or short explanation you will not get a grade. (20 points)
What is the required bandwidth to watch a 4K HDR10 12-Bit color movie stream? (10 points)
How much data needed for the Time Shift of 1.5 hour and what is the compressed Value in ? (10 points)

Categories
Networking

¿por qué el ataque mediante ingeniería social es exitoso?

Instrucciones
Lee, estudia y analiza recursos en linea sobre el tema. Además, puedes hacer una búsqueda en fuentes confiables en la Internet.
La tarea consta de dos partes:Parte I: En oraciones completas, contesta las premisas a continuación. Cada contestación debe tener un máximo de cuatro oraciones.Define qué es ingeniería social en el contexto de ataques informáticos.
¿Por qué el ataque mediante ingeniería social es exitoso?
Parte II: En esta parte, crearás cuatro (4) escenarios hipotéticos utilizando diversas estrategias de ingeniería social. Asume el rol del atacante y desarrolla estrategias de ataque que utilicen distintos vectores. Redacta un párrafo, de no más de cinco oraciones para cada escenario, donde expliques porqué ese vector de ataque será exitoso.Presenta los escenarios de manera organizada. Utiliza el ejemplo a continuación como guía.
Vector de ataque: Confianza
Escenario hipotético #1
¿Por qué este vector de ataque sería exitoso?
Vector de ataque:__________
Escenario hipotético #2
¿Por qué este vector de ataque sería exitoso?
Entrega tu tarea en un documento MS Word. Incluye una introducción, desarrollo y conclusión. Recuerda que debe estar en formato APA.

Categories
Networking

The question is to write the review for the attached technical paper without any

The question is to write the review for the attached technical paper without any plagiarism. Please follow the guidelines attached.

Categories
Networking

You may use this old instruction set to assist you in installing wireshark:

Please work through the attached document: Lab – Using Wireshark to View Network Traffic.
3.4.1.2 Lab – Using Wireshark to View Network Traffic.pdf
Part 1Step 1.c – ask a friend or classmate while in the same local network.Please setup your firewall temporarily to allow incoming ICMP traffic.
Provide answers to Step 3.b.
Part 2Provide responses to Step 2 a-c.
Reflections
provide screenshots and answers in word.
You may use this old instruction set to assist you in installing Wireshark:
3.4.1.1 Lab – Installing Wireshark.pdf

Categories
Networking

Computer networking concepts.

Computer Networking concepts. Just answer the questions accordingly with Appropriate Explanation and Screenshots.

Categories
Networking

Citation style: follow your school’s preferred style guide

Learning Goal: I’m working on a networking discussion question and need an explanation and answer to help me learn.
Assignment Content
You assume the role of a networking consultant for Network Solutions Group (NSG). The company has been asked to make a presentation to a high school computer programming club on the evolution of networking topologies.
The company president, Hajar, encourages employees to become involved in the community, resulting in the students being tasked with making the presentation.
For this assignment, the students will:Research the evolution in networking topologies.
Create a PowerPoint presentation that provides an overview of this evolution.
Submission RequirementsFormat: Microsoft PowerPoint (or compatible)
Font: Slide headings: Arial 36-point; Slide body: Arial 28-point (no less than 20-point for smaller text); at least half of the slides should include SmartArt
Citation Style: Follow your school’s preferred style guide
Length: 6- 10 slides, including a title slide and summary slide
Self-Assessment ChecklistI researched the evolution in networking topologies.
I created a presentation that describes the evolution.
I created a professional, well-developed presentation with proper grammar, spelling, and punctuation.
I followed the submission guidelines.

Categories
Networking

Using the modular exponentiation calculator, paste the value of alpha in the number (a) textbox, paste the value of b in the exponent (b) textbox, paste the value of p in the modulo (m) textbox.

use the links to asnwer the questions
https://www.boxentriq.com/code-breaking/modular-ex…
https://asecuritysite.com/encryption/random3
https://www.boxentriq.com/code-breaking/big-number…
P
art 1 – Diffie Hellman:
In your Word document, choose any number you want and label the number as variable g.
In your Word document, choose any number you want and label the number as variable a.
In your Word document, choose any number you want and label the number as variable b.
Using the Random Prime Generator website, generate a large prime number (at least 128 bits) by clicking the Generate button. Copy Random Prime 1. Paste this value into your Word document labeled as variable p.
In this step, we need to get the result of ga mod p, and we’ll use the Modular Exponentiation Calculator for that. On the Modular Exponentiation Calculator page, paste the value of g in the Number (a) textbox, paste the value of a in the Exponent (b) textbox, paste the value of p in the Modulo (m) textbox. Click the Calculate button, copy the result, and paste this value into your Word document labeled as variable alpha.
This step will be similar to the previous step, but using the variable b instead of a to calculate gb mod p. Using the Modular Exponentiation Calculator, paste the value of g in the Number (a) textbox, paste the value of b in the Exponent (b) textbox, paste the value of p in the Modulo (m) textbox. Click the Calculate button, copy the result, and paste this value into your Word document labeled as variable beta.
Next, we’ll calculate Alice’s key, which is the result of betaa mod p. Using the Modular Exponentiation Calculator, paste the value of beta in the Number (a) textbox, paste the value of a in the Exponent (b) textbox, paste the value of p in the Modulo (m) textbox. Click the Calculate button, copy the result, and paste this value into your Word document labeled as variable alicekey.
Next we’ll calculate Bob’s key, which is the result of alphab mod p. Using the Modular Exponentiation Calculator, paste the value of alpha in the Number (a) textbox, paste the value of b in the Exponent (b) textbox, paste the value of p in the Modulo (m) textbox. Click the Calculate button, copy the result, and paste this value into your Word document labeled as variable bobkey.
At this point, Alice’s key and Bob’s key should match, which is the point of the Diffie-Hellman exchange – it’s a secure way for two parties to independently arrive at a shared key without a third party intercepting it. Make sure your Word document lists the values you used for g, a, b, p, alpha, beta, alicekey, and bobkey.
Part 2 – RSA:
Using the Random Prime Generator website, regenerate some prime numbers (at least 128 bits) by clicking the Generate button.
Copy Random Prime 1. Paste this value into your Word document labeled as variable p and paste it in Big Number Calculator as Number (a).
Copy Random Prime 2. Paste this value into your Word document labeled as variable q and paste it in the Big Number Calculator as Number(b).
Under Calculate, click the button labeled a*b. Copy the result and paste this value into your Word document labeled as variable n.
In the Number(a) textbox, subtract 1 from the value stored in the textbox (i.e. if the number ends in a 7, delete the 7 and replace it with a 6). In the Number(b) textbox, subtract 1 from the value stored in the textbox, just like you did for the Number(a) textbox. Under Calculate, click the button labeled a*b. Copy the result and paste this value into your Word document labeled as variable phi.
Pick any small prime number like 3 or 5 or 7, and label this value in your Word document as variable e. Place this value in the online calculator as Number (a). Copy phi from your Word document and paste it in the online calculator as Number (b). Under Calculate, click the button labeled a-1 MOD b. Copy the result and paste this value into your Word document labeled as variable d.
For the remainder of the exercise, we will be using the Modular Exponentiation Calculator. Go to that web page.
In this step, we’re going to transform plaintext into ciphertext using the formula plaintexte mod n using the Modular Exponentiation Calculator. Pick any number you want and label this value in your Word document as variable plaintext. Place this value in the Modular Exponentiation Calculator as Number (a). Copy the value for variable e from your Word document and paste it in the Exponent(b) textbox. Copy the value for variable n from your Word document and paste it in the Modulo(m) textbox. Click the Calculate button, copy the result, and paste this value into your Word document labeled as variable ciphertext.
Now, we’re going to decrypt the ciphertext using the formula ciphertextd mod n. Place the value of variable ciphertext in the Number(a) textbox. Copy the value for variable d from your Word document and paste it in the Exponent(b) textbox. The value of n should still be in the Modulo(m) textbox from the previous step, but if it’s not, copy the value for variable n from your Word document and paste it in the Modulo(m) textbox. Click the Calculate button. Take a screenshot of the Result box to show that the value of the result is the same as your original plaintext value. Paste your screenshot into your Word document.
Next, we’re going to demonstrate how to sign a message using the formula Md mod n. Pick any number you want and label this value in your Word document as variable M. This value represents a message that will be encrypted using our private key, resulting in a digital signature. Place the value of M in the Number(a) textbox. Copy the value for variable d from your Word document and paste it in the Exponent(b) textbox. Copy the value for variable n from your Word document and paste it in the Modulo(m) textbox. Click the Calculate button. Copy the result and paste this value into your Word document labeled as variable S. This value represents your digital signature.
Now, we’re going to validate the signature with the formula Se mod n. Place the value of S in the Number(a) textbox. Copy the value for variable e from your Word document and paste it in the Exponent(b) textbox. Copy the value for variable n from your Word document and paste it in the Modulo(m) textbox. Click the Calculate button. Take a screenshot of the Result box to show that the value of the result is the same as your original M value. Paste your screenshot into your Word document.
Make sure your Word document includes your values for p, q, n, phi, e, d, plaintext, ciphertext, M, and S, along with the screenshots you took along the way (please make sure the screenshots are labeled as well).

Categories
Networking

Self-assessment checklisti researched the evolution in networking topologies.

Learning Goal: I’m working on a networking discussion question and need an explanation and answer to help me learn.
You assume the role of a networking consultant for Network Solutions Group (NSG). The company has been asked to make a presentation to a high school computer programming club on the evolution of networking topologies.
The company president, Hajar, encourages employees to become involved in the community, resulting in the students being tasked with making the presentation.
For this assignment, the students will:Research the evolution in networking topologies.
Create a PowerPoint presentation that provides an overview of this evolution.
Submission RequirementsFormat: Microsoft PowerPoint (or compatible)
Font: Slide headings: Arial 36-point; Slide body: Arial 28-point (no less than 20-point for smaller text); at least half of the slides should include SmartArt
Citation Style: Follow your school’s preferred style guide
Length: 6- 10 slides, including a title slide and summary slide
Self-Assessment ChecklistI researched the evolution in networking topologies.
I created a presentation that describes the evolution.
I created a professional, well-developed presentation with proper grammar, spelling, and punctuation.
I followed the submission guideline