السلام عليكم ورحمة الله وبركاته

عندي طلبين

الاول : عندى اساله واجابتهم بس انا ابغى اعيد صياغة الاجابه لانها نموذجيه فا المطلوب منى انى اكتبها بصياغتى انا موصيغه الكتاب

فالله يسعد الي بيساعدني في ها الشي
الاجابه زي ماذكرت موجوده بس ابغى تكون بصيغه ثانيه غير صياغه الكتاب




السوال الاول

List and describe the physical components used with ADSL technology.


Answer:


At the customer's premises, there must be a splitter in each telephone wall jack. One subjack is for telephones, the other for a NIC.
Transmission takes place over the existing single pair of voice-grade UTP that already runs to the customer premises.
At the telephone company's end office, there is a DSL access multiplexer (DSLAM). This connects to the telephone network for voice traffic and to a data network for data traffic.



============ =========


السوال الثاني


What is a remote access VPN?


Answer:


A remote access VPN is a VPN used to connect an individual user to a corporate site.

====================

السوال الثالث

a) How does Multiprotocol Label Switching (MPLS) work
b) What are MPLS’s attractions



Answer:

a) Multiprotocol label switching (MPLS) works by adding a label before the IP packet, and label-switching routers base forwarding decisions on the label’s value, which they look up in a single row in the label-switching table.


b) The main attraction of MPLS is that it reduces routing costs.
MPLS’s other attractions are that it can provide quality of service for voice and other time-critical traffic flows, as well as doing load balancing across different routes for efficiency.


=======================


السوال الرابع

a) What is hacking?
b) Why do hackers send probe packets into networks?
c) What steps do hackers usually take after a break-in?


Answer:

a) Hacking is using a computer resource without authorization or in excess of authorization.

b) Hackers send probe packets into the firm’s network because probe packets can elicit responses that reveal information about the firm’s general network design and about its individual computers—including their operating systems.

c) After a break-in, a hacker usually tries to erase the operating system’s log files so that the computer’s rightful owner cannot trace how the attacker broke in or gather evidence to find and prosecute the attacker. The attacker will also often create a backdoor and then do damage.


====================

السوال الخامس

a) What is authentication?
b) Distinguish between the applicant and the verifier.
c) What are credentials?


Answer:

a) Authentication is requiring someone requesting to use a resource to prove his or her identity.

b) The applicant is the user trying to prove his or her identity.
The verifier is the party requiring the applicant to prove his or her identity.


c) Credentials are proof of identity that the applicant provides to the verifier.

============

السوال السادس

Describe the difference between symmetric key encryption and public key encryption for confidentiality.


Answer:

In symmetric key encryption, the two sides use the same key to encrypt message to each other and to decrypt incoming messages.
In public key encryption, each side has a public key and a private key, so there are four keys in total. The sender encrypts messages with the receiver’s public key. The receiver, in turn, decrypts incoming messages with the receiver’s own private key. Only the receiver knows his or her own private key, so the receiver can decrypt the message.

=================


الطلب الثاني : عندي سوالين ما عرفت اجابتهم ياليت احد يفيدني فيهم


Research Questions 10 Marks


For these questions make sure that you reference your Internet sources.

Question 11 (5 marks)

Using the Internet, find two popular 3G mobile/cellular service providers in Australia. Using a table summarise the 3G services that each provider offers. Include the full costs of the services. Make sure you use your own words, any copy and paste details will be rewarded with a mark of zero. Make a recommendation for the use of one of the providers stating the reason for your choice.


Answer:


Question 12 (5 marks)

Using the Internet, find two popular domestic (for home use) VoIP providers in Australia. Using a table summarise the VoIP services that each provider offers. Include the full costs of the services. Make sure you use your own words, any copy and paste details will be rewarded with a mark of zero. Make a recommendation for the use of one of the providers stating the reason for your choice.

Answer:


الله يوفق من يساعدني