Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Technical Processes for Exam Submission and IoT Security
Answered

Exam Submission Process

Candidates’ answers to questions can be prepared in a single Word document, using the equation editor as appropriate. The Word document should be converted to a PDF format, prior to final submission in Canvas.

· Candidates may also prepare handwritten answers to examinations if they wish. These must be clear and legible. Illegible answers will not be marked.  must then be scanned and saved as PDF format, prior to final submission in Canvas.

· It is essential that all PDF pages are oriented in the normal upright portrait reading mode. Pages must not be rotated either clockwise nor anticlockwise, nor appear upside down. Pages not in the normal upright reading format, will not be marked.

· Candidates may wish to download the free Adobe Scan app or Scanner for Me app if they do not have access to a desktop scanner.

· If you are not able to submit your answers in the required PDF format, you must urgently contact the module leader to seek further advice.

Discuss what you understand by each of the following:

Authentication, Integrity

Briefly outline the technical process whereby each is implemented. Explain the advantage of using each as part of a network infrastructure.

b. Encryption techniques have several modes of operation. Discuss the operation of ‘Cypher Feedback Mode’ and ‘Counter Mode’. Explain which types of data transfer are they most suited to and why.

c. Security for Internet of Things (IoT) and Cyberphysical Systems (CPS) are important discussion topics.

i. Outline how the operational environments associated with CPS and IoT may affect how security requirements are considered.

ii. The following are some of the concepts which may be considered when examining security within IoT and CPS:

a. Physical Interface

b. Availability

c. Secure routing

You should discuss each concept and include the following A technical explanation.

Outline why the issue is more significant for one of IoT or CPS

Outline why it is LESS significant for the other.

a. Explain the bandwidth delay product in the context of Transmission Control Protocol (TCP) connections.

b. A network connection consists of three links as follows: a 10 Mbps link with Round-Trip Time (RTT) of 5 µs, a 1 Gbps link with RTT of 1 µs, and 100 Mbps link with RTT 2 µs.

i. What are the reasonable TCP window sizes for the individual connections on this link?

ii. Comment on values you have answered in part b.i above, and the implications for TCP traffic.

c.

Outline the significant change introduced by the ‘Binary Increase Congestion’ variant of TCP (BIC) and the impact it had on TCP performance.

d. Multipath TCP (MPTCP) is a development of original TCP.

i. Discuss the justification and aims for the development of MPTCP.

ii. Outline the main elements of MPTCP operation.

iii. Congestion control is a significant feature of TCP. Discuss a scenario where a congested link carries both MPTCP traffic and regular traffic. You should mention how both TCP and MPTCP flows might be affected by congestion, and actions which could be taken to address the situation.

Q3.

a. Compare the operation and application of random and reservation based Multiple Access techniques. You should include a discussion of the suitability of random or reservation based to different communication scenarios.

b. Discuss the effect of delay and data loss in the following situations: Interactive voice traffic (e.g. Skype™ or traditional voice calls) File upload. (e.g. transfer a text file or spreadsheet to a server) What are causes of delay and loss and how might they be alleviated?

c. Explain what is meant by fragmentation in a Wireless Lan environment. Wired Ethernet does not support fragmentation. Discuss why the two protocols have taken a different approach. What are the advantages and disadvantages which might apply in each case?

support
close