I have Provided the question and also the solution, just need to build a network in https://www.edrawmax.com/ exactly(number of host computers, routers, switches, buildings, work stations) as mentioned in the question and solution.

# Category: Networking

Cost-2-Cost is a famous radio show broadcasted from Los Angeles, California, the broadcast use AM stereo at 1320 kHz by the time it reaches Maryland , Rockville WWDC-F2 (@101.1 kHz) Monday â€“ to Saturday from 1AM to 6AM and Sunday off day. What is the antenna height required to capture the station wavelength.

1-For multipoint configuration, only one device at a time can transmit. Why and what is that terminology called. Explain in maximum 2 paragraphs and cite your work? (10 Point)

2- Cost-2-Cost is a famous radio show broadcasted from Los Angeles, California, the broadcast use AM stereo at 1320 kHz by the time it reaches Maryland , Rockville WWDC-F2 (@101.1 kHz) Monday â€“ to Saturday from 1AM to 6AM and Sunday off day. What is the antenna height required to capture the station wavelength. Explain your Answer and calculations in details Do Not give only the final answer or short explanation you will not get a grade. (10 points)

3- Hulu and YouTube offers regular TV broadcast, and Time Shift service for there customers. As promotion to encourage subscribers to the service providers. FXX movie channel broadcast a new 4K movie with Dolby Atmos for subscribers. Answer the following Questions and Explain your Answer and calculations in details Do Not give only the final answer or short explanation you will not get a grade. (20 points)

What is the required bandwidth to watch a 4K HDR10 12-Bit color movie stream? (10 points)

How much data needed for the Time Shift of 1.5 hour and what is the compressed Value in ? (10 points)

Instrucciones

Lee, estudia y analiza recursos en linea sobre el tema. AdemÃ¡s, puedes hacer una bÃºsqueda en fuentes confiables en la Internet.

La tarea consta de dos partes:Parte I: En oraciones completas, contesta las premisas a continuaciÃ³n. Cada contestaciÃ³n debe tener un mÃ¡ximo de cuatro oraciones.Define quÃ© es ingenierÃa social en el contexto de ataques informÃ¡ticos.

Â¿Por quÃ© el ataque mediante ingenierÃa social es exitoso?

Parte II: En esta parte, crearÃ¡s cuatro (4) escenarios hipotÃ©ticos utilizando diversas estrategias de ingenierÃa social. Asume el rol del atacante y desarrolla estrategias de ataque que utilicen distintos vectores. Redacta un pÃ¡rrafo, de no mÃ¡s de cinco oraciones para cada escenario, donde expliques porquÃ© ese vector de ataque serÃ¡ exitoso.Presenta los escenarios de manera organizada. Utiliza el ejemplo a continuaciÃ³n como guÃa.

Vector de ataque: Confianza

Escenario hipotÃ©tico #1

Â¿Por quÃ© este vector de ataque serÃa exitoso?

Vector de ataque:__________

Escenario hipotÃ©tico #2

Â¿Por quÃ© este vector de ataque serÃa exitoso?

Entrega tu tarea en un documento MS Word. Incluye una introducciÃ³n, desarrollo y conclusiÃ³n. Recuerda que debe estar en formato APA.

The question is to write the review for the attached technical paper without any plagiarism. Please follow the guidelines attached.

Please work through the attached document: Lab – Using Wireshark to View Network Traffic.

3.4.1.2 Lab – Using Wireshark to View Network Traffic.pdf

Part 1Step 1.c – ask a friend or classmate while in the same local network.Please setup your firewall temporarily to allow incoming ICMP traffic.

Provide answers to Step 3.b.

Part 2Provide responses to Step 2 a-c.

Reflections

provide screenshots and answers in word.

You may use this old instruction set to assist you in installing Wireshark:

3.4.1.1 Lab – Installing Wireshark.pdf

## Computer networking concepts.

Computer Networking concepts. Just answer the questions accordingly with Appropriate Explanation and Screenshots.

Learning Goal: I’m working on a networking discussion question and need an explanation and answer to help me learn.

Assignment Content

You assume the role of a networking consultant for Network Solutions Group (NSG). The company has been asked to make a presentation to a high school computer programming club on the evolution of networking topologies.

The company president, Hajar, encourages employees to become involved in the community, resulting in the students being tasked with making the presentation.

For this assignment, the students will:Research the evolution in networking topologies.

Create a PowerPoint presentation that provides an overview of this evolution.

Submission RequirementsFormat: Microsoft PowerPoint (or compatible)

Font: Slide headings: Arial 36-point; Slide body: Arial 28-point (no less than 20-point for smaller text); at least half of the slides should include SmartArt

Citation Style: Follow your schoolâ€™s preferred style guide

Length: 6- 10 slides, including a title slide and summary slide

Self-Assessment ChecklistI researched the evolution in networking topologies.

I created a presentation that describes the evolution.

I created a professional, well-developed presentation with proper grammar, spelling, and punctuation.

I followed the submission guidelines.

use the links to asnwer the questions

https://www.boxentriq.com/code-breaking/modular-ex…

https://asecuritysite.com/encryption/random3

https://www.boxentriq.com/code-breaking/big-number…

P

art 1 â€“ Diffie Hellman:

In your Word document, choose any number you want and label the number as variable g.

In your Word document, choose any number you want and label the number as variable a.

In your Word document, choose any number you want and label the number as variable b.

Using the Random Prime Generator website, generate a large prime number (at least 128 bits) by clicking the Generate button. Copy Random Prime 1. Paste this value into your Word document labeled as variable p.

In this step, we need to get the result of ga mod p, and we’ll use the Modular Exponentiation Calculator for that. On the Modular Exponentiation Calculator page, paste the value of g in the Number (a) textbox, paste the value of a in the Exponent (b) textbox, paste the value of p in the Modulo (m) textbox. Click the Calculate button, copy the result, and paste this value into your Word document labeled as variable alpha.

This step will be similar to the previous step, but using the variable b instead of a to calculate gb mod p. Using the Modular Exponentiation Calculator, paste the value of g in the Number (a) textbox, paste the value of b in the Exponent (b) textbox, paste the value of p in the Modulo (m) textbox. Click the Calculate button, copy the result, and paste this value into your Word document labeled as variable beta.

Next, weâ€™ll calculate Aliceâ€™s key, which is the result of betaa mod p. Using the Modular Exponentiation Calculator, paste the value of beta in the Number (a) textbox, paste the value of a in the Exponent (b) textbox, paste the value of p in the Modulo (m) textbox. Click the Calculate button, copy the result, and paste this value into your Word document labeled as variable alicekey.

Next weâ€™ll calculate Bobâ€™s key, which is the result of alphab mod p. Using the Modular Exponentiation Calculator, paste the value of alpha in the Number (a) textbox, paste the value of b in the Exponent (b) textbox, paste the value of p in the Modulo (m) textbox. Click the Calculate button, copy the result, and paste this value into your Word document labeled as variable bobkey.

At this point, Aliceâ€™s key and Bobâ€™s key should match, which is the point of the Diffie-Hellman exchange â€“ itâ€™s a secure way for two parties to independently arrive at a shared key without a third party intercepting it. Make sure your Word document lists the values you used for g, a, b, p, alpha, beta, alicekey, and bobkey.

Part 2 â€“ RSA:

Using the Random Prime Generator website, regenerate some prime numbers (at least 128 bits) by clicking the Generate button.

Copy Random Prime 1. Paste this value into your Word document labeled as variable p and paste it in Big Number Calculator as Number (a).

Copy Random Prime 2. Paste this value into your Word document labeled as variable q and paste it in the Big Number Calculator as Number(b).

Under Calculate, click the button labeled a*b. Copy the result and paste this value into your Word document labeled as variable n.

In the Number(a) textbox, subtract 1 from the value stored in the textbox (i.e. if the number ends in a 7, delete the 7 and replace it with a 6). In the Number(b) textbox, subtract 1 from the value stored in the textbox, just like you did for the Number(a) textbox. Under Calculate, click the button labeled a*b. Copy the result and paste this value into your Word document labeled as variable phi.

Pick any small prime number like 3 or 5 or 7, and label this value in your Word document as variable e. Place this value in the online calculator as Number (a). Copy phi from your Word document and paste it in the online calculator as Number (b). Under Calculate, click the button labeled a-1 MOD b. Copy the result and paste this value into your Word document labeled as variable d.

For the remainder of the exercise, we will be using the Modular Exponentiation Calculator. Go to that web page.

In this step, we’re going to transform plaintext into ciphertext using the formula plaintexte mod n using the Modular Exponentiation Calculator. Pick any number you want and label this value in your Word document as variable plaintext. Place this value in the Modular Exponentiation Calculator as Number (a). Copy the value for variable e from your Word document and paste it in the Exponent(b) textbox. Copy the value for variable n from your Word document and paste it in the Modulo(m) textbox. Click the Calculate button, copy the result, and paste this value into your Word document labeled as variable ciphertext.

Now, we’re going to decrypt the ciphertext using the formula ciphertextd mod n. Place the value of variable ciphertext in the Number(a) textbox. Copy the value for variable d from your Word document and paste it in the Exponent(b) textbox. The value of n should still be in the Modulo(m) textbox from the previous step, but if it’s not, copy the value for variable n from your Word document and paste it in the Modulo(m) textbox. Click the Calculate button. Take a screenshot of the Result box to show that the value of the result is the same as your original plaintext value. Paste your screenshot into your Word document.

Next, we’re going to demonstrate how to sign a message using the formula Md mod n. Pick any number you want and label this value in your Word document as variable M. This value represents a message that will be encrypted using our private key, resulting in a digital signature. Place the value of M in the Number(a) textbox. Copy the value for variable d from your Word document and paste it in the Exponent(b) textbox. Copy the value for variable n from your Word document and paste it in the Modulo(m) textbox. Click the Calculate button. Copy the result and paste this value into your Word document labeled as variable S. This value represents your digital signature.

Now, we’re going to validate the signature with the formula Se mod n. Place the value of S in the Number(a) textbox. Copy the value for variable e from your Word document and paste it in the Exponent(b) textbox. Copy the value for variable n from your Word document and paste it in the Modulo(m) textbox. Click the Calculate button. Take a screenshot of the Result box to show that the value of the result is the same as your original M value. Paste your screenshot into your Word document.

Make sure your Word document includes your values for p, q, n, phi, e, d, plaintext, ciphertext, M, and S, along with the screenshots you took along the way (please make sure the screenshots are labeled as well).

Learning Goal: I’m working on a networking discussion question and need an explanation and answer to help me learn.

You assume the role of a networking consultant for Network Solutions Group (NSG). The company has been asked to make a presentation to a high school computer programming club on the evolution of networking topologies.

The company president, Hajar, encourages employees to become involved in the community, resulting in the students being tasked with making the presentation.

For this assignment, the students will:Research the evolution in networking topologies.

Create a PowerPoint presentation that provides an overview of this evolution.

Submission RequirementsFormat: Microsoft PowerPoint (or compatible)

Font: Slide headings: Arial 36-point; Slide body: Arial 28-point (no less than 20-point for smaller text); at least half of the slides should include SmartArt

Citation Style: Follow your schoolâ€™s preferred style guide

Length: 6- 10 slides, including a title slide and summary slide

Self-Assessment ChecklistI researched the evolution in networking topologies.

I created a presentation that describes the evolution.

I created a professional, well-developed presentation with proper grammar, spelling, and punctuation.

I followed the submission guideline