Florida Tech | MGT 5157 | DISCUSSION 3
College Name: Florida Tech
Subject: Networks and Communication
Course Code: MGT 5157
Title: DISCUSSION 3
Question 40869: • Explain MAC addressing
• Understand media-access control
• Describe network addressing
• Create an addressing structure for a multidepartment business
• Examine the different methods of routing table generation
Instructions
Routers determine the path to a network using routing tables which list known networks. Routing tables are populated in one of three ways: directly connected networks are added to the table automatically, routes learned through one or more routing protocols are added automatically, or routes can be manually added as static routes. What impact does the explosion of the number of nodes on the Internet of Things have on the routing fabric? How feasible is it to maintain home routers manually? What security issues arise?
Florida Tech | MGT 5157 | DISCUSSION 2
College Name: Florida Tech
Subject: Networks and Communication
Course Code: MGT 5157
Title: DISCUSSION 2
Question 40868: • Explain the fundamentals of network capacity and delay
Instructions
What is the reason behind packet loss? What can protocols do to limit packet loss? Are there tools available for providers and consumers that identify the source of packet loss?
Florida Tech | MGT 5157 | DISCUSSION 1
College Name: Florida Tech
Subject: Networks and Communication
Course Code: MGT 5157
Title: DISCUSSION 1
Question 40865: • Be conversant with common connectivity terms
Instructions
Read the article The Next Generation Functionality for the Local Area Network (LAN)Links to an external site.. What are some of the major differences in network traffic types that the Internet of Things devices have generated compared to traditional personal computer connectivity?
Florida Tech | MGT 5157 | ASSIGNMENT 5
College Name: Florida Tech
Subject: Networks and Communication
Course Code: MGT 5157
Title: ASSIGNMENT 5
Question 40864: • Differentiate between common network attacks and how they work, including
o Denial-of-service attacks
o Distributed denial-of-service attacks
o Host-based attacks
• Evaluate the applicability of network defense methods to prevalent attack types
Instructions
Answer each of the questions below with a few sentences. Be brief, but fully explain your answer. The assignment poses 5 questions. Each is worth 10 points.
1. Explain what an IPSweep and a PortSweep type of attack are.
2. In a few words, describe the operation of buffer overflow attacks.
3. Describe and explain denial of service (DoS) and distributed denial of service (DDoS) network attacks.
4. Briefly describe what routing attacks are. Provide two examples, highlighting their main characteristics.
5. What countermeasures would you recommend as defense against these types of attacks?
Florida Tech | MGT 5157 | ASSIGNMENT 4
College Name: Florida Tech
Subject: Networks and Communication
Course Code: MGT 5157
Title: ASSIGNMENT 4
Question 40863: • Explain the ideas and concepts behind domain name services
Instructions
Define and provide examples in questions 1 and 2. Answer the associated questions in 3, 4 and 5. This assignment has 5 questions worth 10 points each, as noted.
1. Define the following and provide an example:
a. Root DNS server
b. Top-level domain name servers
c. Default name server
2. Define the following and provide an example:
a. Authoritative domain name servers — primary and secondary
b. Master name server
c. Slave name server
3. Wi-Fi routers are expected to have a DNS relay. What is it? What does it do?
4. Go to www.misk.com/toolsLinks to an external site. and enter the domain name of your choice. Review the information provided by selecting DNSLOOKUP, WHOIS, and TRACEROUTE. What have you learned?
5. Your PC has been suspiciously pinged from IP address 91.140.0.140. Using tools that are freely available on the web, learn as much as possible about that IP address (domain name, physical location, owner, address, etc.).