Unit 3 Discussion Board- Fundementals of Networking
User Generated
enaqyr_xhua
Computer Science
Description
You are trying to describe the Ethernet as the most common local area networking standard for your coworkers, friends, or family members. Discuss the following:
- Provide a detailed description about the Ethernet as the most common local area networking standard for wired networks.
- Discuss the most common components that are used to create an Ethernet network.
400-600 words
Needs to be completely original work
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
This question has not been answered.
Create a free account to get help with this and any other question!
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
12 pages
Risk Management Plan Final
A solid risk management plan is required to succeed in most organizations' new projects and service development. When busi ...
Risk Management Plan Final
A solid risk management plan is required to succeed in most organizations' new projects and service development. When businesses embark on new ...
Information Systems and Security - week 5
What would you consider the most effective perimeter and network defense methods available to safeguard network assets? Yo ...
Information Systems and Security - week 5
What would you consider the most effective perimeter and network defense methods available to safeguard network assets? Your answer should include at least one practical example of each type of defense and potential type of attack.1.FirewallsFirewalls are a fundamental component of any perimeter defense. There are many misconceptions about firewalls. Most firewalls are not just pieces of hardware. Firewalls are collections of components. A firewall resides between two networks acting like a gateway. Some basic requirements of a well configured firewall are as follows:•It must work as a gatekeeper that grants and denies incoming and outgoing traffic.•It must prevent all unauthorized traffic from entering the network.•It must be configured correctly to be immune from attacks.2.Intrusion DetectionIntrusion detection systems (IDS)are designed to provide the network more sophisticated protection than that offered by firewalls.Intrusioncan be defined as any unauthorized attempt to access a system.Intrusion detectionis the art of detecting unauthorized attempts to access a system or network. The two main categories of IDS are network-based IDS and host-based IDSA network-based IDSruns on the network, monitoring activity and reporting any activity that arouses suspicion. A network-based IDS usually employs a dedicated network server or a device with a network adapter configured for promiscuous mode to monitor and analyze all traffic in real time as it travels across the network. The network-based IDSs monitor packets on the network wire and attempt to discern the legitimate traffic from the malicious. Network-based IDSs are operating system independent. They are centralized and therefore have very low maintenance requirements. They are positioned to monitor outside intrusions, but, in addition, they can detect network-based patterns originating from within the segment they are protecting.Host-based IDSsreside on the host and are capable of automatically monitoring and denying services if suspicious activity is detected. They monitor activity in the individual host, as opposed to the network. A host-based IDS, in many cases, is more complex than a network-based system because a host-based system monitors several things in addition to network traffic specific to the host on which the system is running. A host-based IDS can be configured to monitor the following:•Ports used by the system for incoming connections•Processes running on the system and how the list compares to the baseline•Checksums of important system files to see whether any of them have been compromised.In addition to active network traffic analysis on the host itself, some newer host-based IDSs can filter content and protect against viruses.3.Network Attacks OverviewNetwork attacks continue to be a concern for organizations as they continue to rely on information technology. The most common forms of attacks are footprinting and scanning.Footprintingis the process of systematically identifying the network and its security controls. For example, an attacker might look at the source code of your Web site and, based on that information, get other information such as what language was used to write code and create various elements of the program. Information is readily available by doing a DNS query and getting the IP address.Scanningis the process that attackers use to gather information about how a system or network might be configured. They can use port scanners that are readily available for anyone to download from the Internet free of charge. They can also use troubleshooting commands such as pings and traceroute to get information regarding what computers are "live" on the network.4.Denial of Service AttacksADenial of Service (DoS)attack prevents access to resources by users authorized to access those resources. Several different types of attacks can occur in this category. These attacks can deny access to information, applications, systems, or communications. DoS does not cause "harm" to the resource but can bring about negative consequences. For example, if the Amazon.com Web site was successfully attacked, Amazon would lose money from its Web site not being available for purchases. SeeThe US Cert Websitefor more information about DoS and other security threats.Distributed Denial of Service (DDoS)uses multiple computers to attack a single computer. An attack can load an attack program onto many computers that use DSL or cable modems. The program stays dormant until a master computer instructs it to attack a particular system. The master computer can be another unsuspecting user or computer.5.Session and Spoofing AttacksAspoofing attackis an attempt by someone or something to masquerade as someone else. A very common spoofing attack that was popular for many years involved a programmer writing a fake log-on program. No matter what you typed, the program would indicate an invalid login. The spoofing program would write the user ID and password onto a disk file that could be used later by a hacker.Aman-in-the-middle attackis commonly used to gather information in transit between two hosts. A third system is placed between two hosts already communicating or currently in the process of setting up a communication channel. The attacker establishes a session with each of the victims and represents what appears to be a valid end point of communication to each. This gives the attacker the ability to intercept the data, record it, and then pass it on to the second victim. Remember, the attacker can choose to alter the information rather than pass it.
8 pages
Digital Forensic
Monitoring and auditing of database are one of the most vital requirements of compliance that ought to be set up to enable ...
Digital Forensic
Monitoring and auditing of database are one of the most vital requirements of compliance that ought to be set up to enable organizations meet ...
Campbesville University Big Data Analytics Discussion
Discussion (Chapter 9): What are the common business problems addressed by Big Data analytics? In the era of B ...
Campbesville University Big Data Analytics Discussion
Discussion (Chapter 9): What are the common business problems addressed by Big Data analytics? In the era of Big Data, are we about to witness the end of data warehousing? Why?
NECBF Time Value of Money Analysis Questions
Assume that you are nearing graduation and have applied for a job with a local bank. As part of the bank's evaluation proc ...
NECBF Time Value of Money Analysis Questions
Assume that you are nearing graduation and have applied for a job with a local bank. As part of the bank's evaluation process, you have been asked to take an examination that covers several financial analysis techniques. The first section of the test addresses time value of money analysis. See how you would do by answering the following questions.
Draw time lines for (a) a $2000 lump sum cash flow at the end of year 4, (b) an ordinary annuity of $1000 per year for 5 years, and (c) an uneven cash flow stream of -$450, $1000, $650, $850 and $500 at the end of years 0 through 4.
What is the future value of an initial $1000 after 5 years if it is invested in an account paying 5% annual interest?
What is the present value of $1000 to be received in 4 years if the appropriate interest rate is 5%?
We sometimes need to find out how long it will take a sum of money (or anything else) to grow to some specified amount. For example, if a company's sales for 2020 is $1000 and expected to grow at a rate of 10% per year, how long will it take sales to double?
If you invested $10,000 in an investment account and you expect it to double in 4 years, what interest rate must it earn?
What is the future value of a 5-year ordinary annuity of $1000 if the appropriate interest rate is 5%? What is the present value of the annuity?
What is the future value of $1000 after 4 years under 10% annual compounding? Semiannual compounding? Quarterly compounding? Monthly compounding? Daily compounding
What is the effective annual rate (EAR or EFF%)? What is the EFF% for a nominal rate of 5%, compounded semiannually? Compounded quarterly? Compounded monthly? Compounded daily?
Construct an amortization schedule for a $1,000, 12% annual rate loan with 4 equal installments. What is the annual interest expense for the borrower, and the annual interest income for the lender, during Year 2?
Suppose on January 1 you deposit $1000 in an account that pays a nominal, or quoted, interest rate of 12%, with interest added (compounded) daily. How much will you have in your account on October 1, or 9 months later?
You want to buy a car, and a local bank will lend you $10,000. The loan would be fully amortized over 6 years (72 months), and the nominal interest rate would be 10%, with interest paid monthly. What is the monthly loan payment?
While Mary Corens was a student at the University of Tennessee, she borrowed $20,000 in student loans at an annual interest rate of 5%. If Mary repays $200 per year, then how long (to the nearest year) will it take her to repay the loan?
Question 2
1. Jackson Corporation’s bonds have 10 years remaining to maturity. Interest is paid annually, the bonds have a $1,000 par value, and the coupon interest rate is 9%. The bonds have a yield to maturity of 10%. What is the current market price of these bonds?
2. Renfro Rentals has issued bonds that have a 10% coupon rate, payable semiannually. The bonds mature in 10 years, have a face value of $1,000, and a yield to maturity of 9%. What is the price of the bonds?
3. Wilson Wonders’s bonds have 10 years remaining to maturity. Interest is paid annually, the bonds have a $1,000 par value, and the coupon interest rate is 10%. The bonds sell at a price of $900. What is their yield to maturity?
4. Heath Foods’s bonds have 10 years remaining to maturity. The bonds have a face value of $1,000 and a yield to maturity of 9%. They pay interest annually and have a 10% coupon rate. What is their current yield?
5. Suppose Hillard Manufacturing sold an issue of bonds with a 12-year maturity, a $1,000 par value, a 10% coupon rate, and semiannual interest payments.
Two years after the bonds were issued, the going rate of interest on bonds such as these fell to 5%. At what price would the bonds sell?
Suppose that 2 years after the initial offering, the going interest rate had risen to 11%. At what price would the bonds sell?
Suppose that 2 years after the issue date (as in part a) interest rates fell to 5%. Suppose further that the interest rate remained at 5% for the next 10 years. What would happen to the price of the bonds over time?
MIS 6000 UoPX Wk 4 Modeling Language & Operational Workflows Paper
PART I
Discussion Questions
In the unified modeling language (UML), use-case modeling captures different aspects of th ...
MIS 6000 UoPX Wk 4 Modeling Language & Operational Workflows Paper
PART I
Discussion Questions
In the unified modeling language (UML), use-case modeling captures different aspects of the operational workflows of a system. How would you extend use-case models that you created in the requirements phase, to use-case models that apply to the design phase?
Prepare a list containing at least 10 criteria for evaluating computer hardware and system software. The method for evaluating alternatives called weighting and scoring implies that the total utility of an alternative is the product of the weights of each criterion times the weight of the criterion for the alternative. What assumptions are characteristic of this method for evaluating alternatives?
NOTE: Please, support your answers with examples and research, and cite your research using the APA format for each part.
PART II
Week 4 Project Tasks
Now that you have created use-case models for your system, you plan your design, implementation, and test phases
Discuss the development methodology that you will use for your development process, clearly explaining the rationale of your choice.
Determine a plan to study whether the implementation of your target system will be successful or not.
Outline a test plan for your application, and design a format for test documentation that your testing members would use to explain how they tested the system (including what types of testing) to document the results of these tests. Create at least five (5) detailed test cases for your system-test phase.
Design a stakeholder feedback form that will be used to capture comments from stakeholders during the acceptance phase. Include measures of usability that should be established and collected in the feedback form.
Submission Details:
Submit your complete report in a 3- to 5-page MS Word document saved as W4_Project_Lastname_Firstname
Similar Content
IT 270 SEU What Do You Infer About Project Schedule & Cost Questions
College of Computing and Informatics
Assignment 2
a
Deadline: Thursday 27/10/2022 @ 23:59
[Total Mark for this Assignmen...
Discussion
I need 1500 wordsPart 1: According to the Sarin and O’Connor (2009) article, certain style and goal structures of team l...
Networking Question
Assignment 1AAssignment1A1) Describe the importance of penetration testing?
2) There are several security testing tools ...
PC Purchase Research Desktop Migration Proposal
Your project will involve a desktop migration proposal for Hudson Fisher Associates.You have already gained management’s...
Networking Trends Paper, computer science homework help
Please find the enclosed document and solve the problem....
INSS 611 Exercise 6
...
Visual Technologies
It’s important for the management to understand visualization technologies as such they can be able to implement their u...
Erm
The strategy used by Nestle to combat supply chain risks.....................................................................
Week 4 Question 4 Responses
What do you think is the most important factor in crime scene awareness and why? The most important factor in crime scene ...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
12 pages
Risk Management Plan Final
A solid risk management plan is required to succeed in most organizations' new projects and service development. When busi ...
Risk Management Plan Final
A solid risk management plan is required to succeed in most organizations' new projects and service development. When businesses embark on new ...
Information Systems and Security - week 5
What would you consider the most effective perimeter and network defense methods available to safeguard network assets? Yo ...
Information Systems and Security - week 5
What would you consider the most effective perimeter and network defense methods available to safeguard network assets? Your answer should include at least one practical example of each type of defense and potential type of attack.1.FirewallsFirewalls are a fundamental component of any perimeter defense. There are many misconceptions about firewalls. Most firewalls are not just pieces of hardware. Firewalls are collections of components. A firewall resides between two networks acting like a gateway. Some basic requirements of a well configured firewall are as follows:•It must work as a gatekeeper that grants and denies incoming and outgoing traffic.•It must prevent all unauthorized traffic from entering the network.•It must be configured correctly to be immune from attacks.2.Intrusion DetectionIntrusion detection systems (IDS)are designed to provide the network more sophisticated protection than that offered by firewalls.Intrusioncan be defined as any unauthorized attempt to access a system.Intrusion detectionis the art of detecting unauthorized attempts to access a system or network. The two main categories of IDS are network-based IDS and host-based IDSA network-based IDSruns on the network, monitoring activity and reporting any activity that arouses suspicion. A network-based IDS usually employs a dedicated network server or a device with a network adapter configured for promiscuous mode to monitor and analyze all traffic in real time as it travels across the network. The network-based IDSs monitor packets on the network wire and attempt to discern the legitimate traffic from the malicious. Network-based IDSs are operating system independent. They are centralized and therefore have very low maintenance requirements. They are positioned to monitor outside intrusions, but, in addition, they can detect network-based patterns originating from within the segment they are protecting.Host-based IDSsreside on the host and are capable of automatically monitoring and denying services if suspicious activity is detected. They monitor activity in the individual host, as opposed to the network. A host-based IDS, in many cases, is more complex than a network-based system because a host-based system monitors several things in addition to network traffic specific to the host on which the system is running. A host-based IDS can be configured to monitor the following:•Ports used by the system for incoming connections•Processes running on the system and how the list compares to the baseline•Checksums of important system files to see whether any of them have been compromised.In addition to active network traffic analysis on the host itself, some newer host-based IDSs can filter content and protect against viruses.3.Network Attacks OverviewNetwork attacks continue to be a concern for organizations as they continue to rely on information technology. The most common forms of attacks are footprinting and scanning.Footprintingis the process of systematically identifying the network and its security controls. For example, an attacker might look at the source code of your Web site and, based on that information, get other information such as what language was used to write code and create various elements of the program. Information is readily available by doing a DNS query and getting the IP address.Scanningis the process that attackers use to gather information about how a system or network might be configured. They can use port scanners that are readily available for anyone to download from the Internet free of charge. They can also use troubleshooting commands such as pings and traceroute to get information regarding what computers are "live" on the network.4.Denial of Service AttacksADenial of Service (DoS)attack prevents access to resources by users authorized to access those resources. Several different types of attacks can occur in this category. These attacks can deny access to information, applications, systems, or communications. DoS does not cause "harm" to the resource but can bring about negative consequences. For example, if the Amazon.com Web site was successfully attacked, Amazon would lose money from its Web site not being available for purchases. SeeThe US Cert Websitefor more information about DoS and other security threats.Distributed Denial of Service (DDoS)uses multiple computers to attack a single computer. An attack can load an attack program onto many computers that use DSL or cable modems. The program stays dormant until a master computer instructs it to attack a particular system. The master computer can be another unsuspecting user or computer.5.Session and Spoofing AttacksAspoofing attackis an attempt by someone or something to masquerade as someone else. A very common spoofing attack that was popular for many years involved a programmer writing a fake log-on program. No matter what you typed, the program would indicate an invalid login. The spoofing program would write the user ID and password onto a disk file that could be used later by a hacker.Aman-in-the-middle attackis commonly used to gather information in transit between two hosts. A third system is placed between two hosts already communicating or currently in the process of setting up a communication channel. The attacker establishes a session with each of the victims and represents what appears to be a valid end point of communication to each. This gives the attacker the ability to intercept the data, record it, and then pass it on to the second victim. Remember, the attacker can choose to alter the information rather than pass it.
8 pages
Digital Forensic
Monitoring and auditing of database are one of the most vital requirements of compliance that ought to be set up to enable ...
Digital Forensic
Monitoring and auditing of database are one of the most vital requirements of compliance that ought to be set up to enable organizations meet ...
Campbesville University Big Data Analytics Discussion
Discussion (Chapter 9): What are the common business problems addressed by Big Data analytics? In the era of B ...
Campbesville University Big Data Analytics Discussion
Discussion (Chapter 9): What are the common business problems addressed by Big Data analytics? In the era of Big Data, are we about to witness the end of data warehousing? Why?
NECBF Time Value of Money Analysis Questions
Assume that you are nearing graduation and have applied for a job with a local bank. As part of the bank's evaluation proc ...
NECBF Time Value of Money Analysis Questions
Assume that you are nearing graduation and have applied for a job with a local bank. As part of the bank's evaluation process, you have been asked to take an examination that covers several financial analysis techniques. The first section of the test addresses time value of money analysis. See how you would do by answering the following questions.
Draw time lines for (a) a $2000 lump sum cash flow at the end of year 4, (b) an ordinary annuity of $1000 per year for 5 years, and (c) an uneven cash flow stream of -$450, $1000, $650, $850 and $500 at the end of years 0 through 4.
What is the future value of an initial $1000 after 5 years if it is invested in an account paying 5% annual interest?
What is the present value of $1000 to be received in 4 years if the appropriate interest rate is 5%?
We sometimes need to find out how long it will take a sum of money (or anything else) to grow to some specified amount. For example, if a company's sales for 2020 is $1000 and expected to grow at a rate of 10% per year, how long will it take sales to double?
If you invested $10,000 in an investment account and you expect it to double in 4 years, what interest rate must it earn?
What is the future value of a 5-year ordinary annuity of $1000 if the appropriate interest rate is 5%? What is the present value of the annuity?
What is the future value of $1000 after 4 years under 10% annual compounding? Semiannual compounding? Quarterly compounding? Monthly compounding? Daily compounding
What is the effective annual rate (EAR or EFF%)? What is the EFF% for a nominal rate of 5%, compounded semiannually? Compounded quarterly? Compounded monthly? Compounded daily?
Construct an amortization schedule for a $1,000, 12% annual rate loan with 4 equal installments. What is the annual interest expense for the borrower, and the annual interest income for the lender, during Year 2?
Suppose on January 1 you deposit $1000 in an account that pays a nominal, or quoted, interest rate of 12%, with interest added (compounded) daily. How much will you have in your account on October 1, or 9 months later?
You want to buy a car, and a local bank will lend you $10,000. The loan would be fully amortized over 6 years (72 months), and the nominal interest rate would be 10%, with interest paid monthly. What is the monthly loan payment?
While Mary Corens was a student at the University of Tennessee, she borrowed $20,000 in student loans at an annual interest rate of 5%. If Mary repays $200 per year, then how long (to the nearest year) will it take her to repay the loan?
Question 2
1. Jackson Corporation’s bonds have 10 years remaining to maturity. Interest is paid annually, the bonds have a $1,000 par value, and the coupon interest rate is 9%. The bonds have a yield to maturity of 10%. What is the current market price of these bonds?
2. Renfro Rentals has issued bonds that have a 10% coupon rate, payable semiannually. The bonds mature in 10 years, have a face value of $1,000, and a yield to maturity of 9%. What is the price of the bonds?
3. Wilson Wonders’s bonds have 10 years remaining to maturity. Interest is paid annually, the bonds have a $1,000 par value, and the coupon interest rate is 10%. The bonds sell at a price of $900. What is their yield to maturity?
4. Heath Foods’s bonds have 10 years remaining to maturity. The bonds have a face value of $1,000 and a yield to maturity of 9%. They pay interest annually and have a 10% coupon rate. What is their current yield?
5. Suppose Hillard Manufacturing sold an issue of bonds with a 12-year maturity, a $1,000 par value, a 10% coupon rate, and semiannual interest payments.
Two years after the bonds were issued, the going rate of interest on bonds such as these fell to 5%. At what price would the bonds sell?
Suppose that 2 years after the initial offering, the going interest rate had risen to 11%. At what price would the bonds sell?
Suppose that 2 years after the issue date (as in part a) interest rates fell to 5%. Suppose further that the interest rate remained at 5% for the next 10 years. What would happen to the price of the bonds over time?
MIS 6000 UoPX Wk 4 Modeling Language & Operational Workflows Paper
PART I
Discussion Questions
In the unified modeling language (UML), use-case modeling captures different aspects of th ...
MIS 6000 UoPX Wk 4 Modeling Language & Operational Workflows Paper
PART I
Discussion Questions
In the unified modeling language (UML), use-case modeling captures different aspects of the operational workflows of a system. How would you extend use-case models that you created in the requirements phase, to use-case models that apply to the design phase?
Prepare a list containing at least 10 criteria for evaluating computer hardware and system software. The method for evaluating alternatives called weighting and scoring implies that the total utility of an alternative is the product of the weights of each criterion times the weight of the criterion for the alternative. What assumptions are characteristic of this method for evaluating alternatives?
NOTE: Please, support your answers with examples and research, and cite your research using the APA format for each part.
PART II
Week 4 Project Tasks
Now that you have created use-case models for your system, you plan your design, implementation, and test phases
Discuss the development methodology that you will use for your development process, clearly explaining the rationale of your choice.
Determine a plan to study whether the implementation of your target system will be successful or not.
Outline a test plan for your application, and design a format for test documentation that your testing members would use to explain how they tested the system (including what types of testing) to document the results of these tests. Create at least five (5) detailed test cases for your system-test phase.
Design a stakeholder feedback form that will be used to capture comments from stakeholders during the acceptance phase. Include measures of usability that should be established and collected in the feedback form.
Submission Details:
Submit your complete report in a 3- to 5-page MS Word document saved as W4_Project_Lastname_Firstname
Earn money selling
your Study Documents