Premium Essay

Mis589 Week5

In: Science

Submitted By narisetty1
Words 320
Pages 2
.narisetty•Chapter 6—Questions R17

A permanent address for a mobile node is its IP address when it is at its home network. A care-of-address is the one its gets when it is visiting a foreign network. The COA is assigned by the foreign agent (which can be the edge router in the foreign network or the mobile node itself).

•Chapter 8—Questions R1, R3, R29.

Confidentiality is the property that the original plaintext message can not be determined by an attacker who intercepts the ciphertext-encryption of the original plaintext message.Message integrity is the property that the receiver can detect whether the message sent (whether encrypted or not) was altered in transit. The two are thus different concepts,and one can have one without the other. An encrypted message that is altered in transmit may still be confidential (the attacker can not determine the original plaintext) but will not have message integrity if the error is undetected. Similarly, a message that is altered in transit (and detected) could have been sent in plaintext and thus would not be confidential.

In symmetric key systems, the keys of receiver and sender are identical and are secret. In public key systems, a pair of keys is used. One of the keys is known to both receiver and sender, or in other word, to the whole world, while the other key is known only by sender. That’s the major difference between the two systems.

Stateful and Stateless IP .. There are several advantages to using a static IP filter. It has a combination of low overhead and high throughput. Stateless IP filters are very inexpensive, and many are free. They are included with router configuration software or are included with most Open Source operating systems. Being that a static IP filter does little more than simply route traffic, it is very good for traffic…...

Similar Documents

Free Essay


...Learning Personal Responsibility Although not always easy to accept, learning to accept personal responsibility is one’s choice. Becoming aware of feelings and accepting change will result in better decision-making as well as positive success in one’s life. Responsibility continues throughout one’s own actions therefore making the right choices will build character and not result in negative consequences. Going to school or work each day is a personal responsibility that we adapt to or can either feel forced to do. Whichever the choice may be, the results are simple, choosing success or blaming others for dropping out or quitting. To get ahead in life, learning to be responsible for one’s own actions is a priority. Only you can choose how your life will go, and taking the time and effort will make a difference in a person’s attitude and behavior. Taking responsibility towards your education refers to time management, study skills and learning. As students we are responsible for excelling, therefore if we fail to meet those standards it is our own responsibility and not that of others. “Research has demonstrated that college outcomes are tied to the efforts that students put into their work and the degree to which they are involved with their studies” (Davis & HillmanMurrell, n.d.). As a student I am responsible for my own efforts that I put into my study time, assignments and learning. Prioritizing what your choices are is one way of learning personal responsibility and......

Words: 291 - Pages: 2

Free Essay

Bsa375 Week5

...Testing Process Summary There will be several types of testing to ensure the final product is ready to be released and implemented. Some of the checks will be manual reviews, and the others will be automated. The manual checks will be done using a predetermined list of mistakes to check for, and each participant will go through the code of the software to look for syntax errors and other grammar mistakes. This will help prevent an abundance of errors when it comes to the automated portion. As the code is what makes the program work the way it does, the programmers will sit down while the program is used to make sure it meets the design requirements and delivers what the company needs. The programmer will be able to fix problems as they go through the dry run of the program. One of the slower processes and obviously more thorough of the inspections would be going through the code line by line while the programmer executes the each block of code to ensure it functions properly. After all of the manual checks are done, the automation process will begin. The first process will be done by scripting. A script will run to enter data and make selections based on a list of data generated by the programmer. The script will run until it is complete and then it will come to the individual module testing. Each separate module of the program will be tested by itself with selected data and then with each sub-ordinate module to ensure everything works properly. The......

Words: 744 - Pages: 3

Free Essay

Law/421 Week5

...Scenario 2 Brian McDonald had an incredible train collection it consisted of rare and one-of-a-kind trains. One day whole visiting another hobbyist Harry, Brian told him that when he retired from his job he would sell his trains and spend his life traveling on real trains. Brian once told Harry that he was the only person who he would sell his trains to because he know Harry would take care and appreciate as much as he did. Harry was excited and said he looked forward to the day when he could buy the trains. Harry spent the next two years and a large portion of his savings building a new 2,000-square foot room in his home to make room for his new collection of trains. Harry told Brian that he was building a new room but Brian did not reply and simply smiled. When Brian retired he sold his collection not to Brian but to a neighbor, James. Harry was furious and hurt so he sued Brian. Unfortunately, Harry did not have Brian sign any contract to prove that Brian had an obligation to sell the trains to him. According to the Cheeseman (2010) a contract is “a promise or a set of promises for the breach of which the law gives a remedy or the performance of which the law in some way recognizes a duty” (p. 156). The problem is that no one made an offer, and a contract is created if an offer is made and accepted. Therefore, Harry would not have a case against Brian based on spoken contract because no terms were agreed upon. Harry could also argue that because he built the......

Words: 365 - Pages: 2

Premium Essay

Dq Week5

...How do you know you have validated a research study based on data gathered from primary or secondary sources? Have you been involved with any product test-marketing project? Explain. How did the resulting statistics affect the product’s marketing strategy? How can organizations skew the statistical outcomes of their business research? When searching for information on a topic, it is important to understand the value of primary, secondary, and tertiary sources. Primary sources allow researchers to get as close as possible to original ideas, events, and empirical research as possible. Such sources may include creative works, first hand or contemporary accounts of events, and the publication of the results of empirical observations or research. Secondary sources analyze, review, or summarize information in primary resources or other secondary resources. Even sources presenting facts or descriptions about events are secondary unless they are based on direct participation or observation. Moreover, secondary sources often rely on other secondary sources and standard disciplinary methods to reach results, and they provide the principle sources of analysis about primary sources. Tertiary sources provide overviews of topics by synthesizing information gathered from other resources. Tertiary resources often provide data in a convenient form or provide information with context by which to interpret it. The distinctions between primary, secondary, and tertiary sources......

Words: 455 - Pages: 2

Free Essay

Week5 Lab

...NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools A computer with access to the Internet Recommended Procedures Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence? Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall. Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting. Your......

Words: 296 - Pages: 2

Premium Essay

Mis589 Week 5 Essay

...Silvio Kennedy MIS589 Week 5 Homework June 4, 2014 R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address? In mobile network a permanent address for a mobile node is its IP address when it is at its home network. A care-of-address is the one its gets when it is visiting a foreign network In the Mobile Internet Protocol (Mobile IP), a home address is the relatively permanent IP address given to a mobile node. The home address remains unchanged no matter where the mobile node is located. The Internet Engineering Task Force (IETF) defines the home address in RFC 2002, IP Mobility Support, which describes an enhancement to the Internet Protocol (IP) that makes it easier to replug a mobile device into networks other than its home network. Care-of-Address, on the other hand is, is a temporary IP address for a mobile node (mobile device) that enables message delivery when the device is connecting from somewhere other than its home network. The care-of address identifies a mobile node's current point of attachment to the Internet and makes it possible to connect from a different location without changing the device's home address (permanent IP address). The Foreign Agent that on the visiting or foreign network assigns the Care-Of-Address to the mobile node. R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?......

Words: 538 - Pages: 3

Premium Essay


...Financial Ratios Dora Massey ACC205 Principals of Accounting 1 Instructor Brandy Havens October 6, 2014 In the world of business things can go right or wrong, there are many factors involved. Investors try to analyze a company by looking at and comparing different ratios. Ratios are divisible into categories such as liquidity measure, turnover and profitability. The quick and current ratios are monitored by investors to check the liquidity of a company. While knowing about a business is important, ratios are way to monitor and manage a business. The company that I chose to analyze is Exxon Mobile. This company produces oil and is the worlds largest publicly traded international oil and gas company. Exxon mobile applies science and innovation to find safer and cleaner ways to deliver energy. Their guiding principals are to achieve superior financial and operating results and have high ethical standards. This company incurred more than $1.40 in taxes for every dollar of net earnings. Although they are below the average of 8.6 cents per dollar of sales for all manufactures. In 2012 they had 26 billion to shareholders. According to George S. Ford the profit margin of major oil companies......

Words: 775 - Pages: 4

Premium Essay

Week5 Group

...Introduction – Rushell Baderman Island Resort ensures all guests enjoy a relaxed and care free stay. In doing so the interior of company must be structured to function at its highest level of performance. This essay will outline the general functions of the Food and Bar Management and Front Office Supervisor. It will focus on the performance management systems, discuss the advantage and disadvantage of two different job evaluations, compare and contrast compensation plans, and explain the importance of providing employee benefits plans. Each area is unique to this company and its success. Describe the general function of performance management systems. If your assigned company does not use a performance management system, would you recommend it use one? LISA Overall the success of our company in general is due to our commitment and dedication given to our employees. The company strives to ensure that every employee is given an equal opportunity, and it is our duty to embrace each employee to the fullness of their potential. The company accomplishes this task by the use of performance management systems. Performance management systems are used to sustaining and measuring an employee’s performance. These methods are the key to an organization success because an organization can assess individuals' performance and reward them appropriately. To do this successfully an organization needs to have a system that manages performance: not just for reward purposes but also to......

Words: 1671 - Pages: 7

Free Essay


...Review Questions -Answers Answer R3: * The primary service provided by data link layer is to transport data between different and adjacent nodes over the same network segment. Possible services provided by link layer protocol are * Framing: Link layer protocol encapsulates the network layer data into frames to be transmitted over the communication link. The frame consist of data field which homes the network layer data along with source and destination hardware address of the nodes. Framing of the network layer data continues at the each hop until the network layer data is delivered to the destination. * Link access: This service provided by Data link layer’s sub layer called as media access control (MAC) is responsible for deciding how the frames are transmitted on the link. This service makes more relevance where multiple nodes or devices share the same media or bandwidth. Thus it regulates the use of the same link by devices by allowing devices to transmit when the media is idle or no other devices are transmitting. * Reliable delivery: This service of Data link layer guarantees delivery of network layer datagram to be delivered across the link without errors. This service is generally used for links which are prone to higher bit error rates like wireless networks but for wired networks this service is seldom used. * Error detection and correction: This service takes care of the bit errors introduced by signal attenuation and electromagnetic noise......

Words: 418 - Pages: 2

Premium Essay


...Database systems are a complete index of data put into one location. Databases are used in all businesses weather small mom and pop size to multimillion worldwide companies. They are used to keep track and accurate points of the data that their company has. As well as customer interaction with the company. A customer would use a hotels database to find what hotel rooms are available to rent. A Company uses a database so that all employees that need to access it can access the same one so other departments are not doing things without other departments know. Meaning if HR fires someone and payroll may not know if they do not have access to it, then the fired person would still get paid. But, by using a database system all the department know what each other is doing so when HR fires someone Payroll knows to stop paying that employee. Each instance of SQL Server has four system databases (master, model, tempdb, and msdb) and one or more user databases. Some organizations have only one user database, containing all the data for their organization. Some organizations have different databases for each group in their organization, and sometimes a database used by a single application. For example, an organization could have one database for sales, one for payroll, one for a document management application, and so on. Sometimes an application uses only one database; other applications may access several databases.

Words: 252 - Pages: 2

Free Essay


...Products and Liability Research Paper Steve Jackson Strayer University Legal 500 Professor Wendy White June 10, 2014 Question # 1: Describe the company and the product safety issue that led to the lawsuit. Baxter Pharmaceuticals is a healthcare company located in Deerfield, Illinois which was founded in 1931 by Dr. Donald Baxter. Baxter Pharmaceuticals was the first manufacturer of commercially prepared intravenous solutions. The company primarily “focuses, develops, manufacture, and markets different healthcare products that are used to save and sustain the lives of people with immune disorders, hemophilia, infectious disease, and other chronic and acute medical conditions.” ("Corporate overview," 2013) Baxter has been known as a very global diversified healthcare company that has a great reputation for its safety and effectiveness since 1931. “The company also has expertise in medical devices, pharmaceuticals and biotechnology to create products that advance patient care worldwide.” ("Corporate overview," 2013) On June 2009, there was a lawsuit placed again Baxter Pharmaceuticals (which is also known as Baxter Health Corporation) by Dennis Quaid and Kimberly Quaid. The Quaid’s filed suit against Baxter for liability and negligence for the “medical drug error” which nearly killed their twins. The Quaid twins (11 days old) were in admitted into Cedar-Sinai Medical Center to be treated for a staph infection. The doctor prescribe that the twins be......

Words: 1976 - Pages: 8

Premium Essay


...Abstract The smart phone development is the most exciting and crucial step for mobile internet. The first smartphone in the world was Motorola A6188 in year 2000. Since then, the smartphone industry has been developing continually. New manufacturers continue to seek a place in the market, while older, more established companies try to obtain their market share. Therefore, the most crucial step for smartphone industry is how to use innovation to face the challenge of competitors from both the smartphone industry and other intelligent devices in the future. 4 aspects of innovation will play an important role for the samrtphone industry development: multi-core technology, larges screen trend, cloud and integration technology, and near-field communication (NFC). Introduction: The smart phone development is the most exciting and crucial step for mobile internet. At the beginning when smart phone market rose, cell phone manufacturers started to focus on software but not hardware. The destination of innovation is to satisfy the customers’ needs, and to share a big portion of the market. As we all know, smartphones can do everything from acting as a GPS, to allowing you to video call someone on the other side of the world. Moving forwards smartphones will continue to be disruptive, as they are one of the key components in the movement towards the “internet of things”. In the future, smartphones are expected to be reflected in four major areas of innovation: multi-core, larger...

Words: 576 - Pages: 3

Free Essay

Mis589 W5-6

...Reginald Smith Networking concepts and apps Keller school of graduates * R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address? The permanent address is the address of the mobile device this is the home of the device. While the care of address is the address that a mobile device gets when you move into someone else’s network. The take care of address is assigned by whoever network that the device is on. * R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Justify your answer. Message confidentiality us when two or more host communicate under secure circumstances using an encryption. Message integrity is the state of the data that is being transported whether it has been compromised. Yes you can have integrity without confidentiality using hash or sums in your message. You can but what is the point the purpose of the message confidentiality is so it cannot be sniffed out which relates to the integrity of the data . * R3. From a service perspective, what is an important difference between a symmetric-key system and a public-key system? From a service perspective the difference between a symmetric-key system and a public-key system the thing that stands out to me the most is in a symmetric key system both the person sending and the person receiving know the key while in a......

Words: 309 - Pages: 2

Premium Essay

Acc/561 Week5

...Week Five Assignment Alison Eades ACC/561 December 22, 2014 Jason See Week 5 Assignment Exercise 18-1 is about the Martinez Company’s decision to introduce a new product manufacture by either a capital-intensive method or a labor-intensive method. Provided are the manufacturing cost for both methods as well as the estimate. The capital-intensive manufacturing cost estimates are as follow: $5.00 per unit for direct materials, $6.00 per unit for direct labor, $3.00 per unit for variable overhead, and $2,508,000 for fixed manufacturing cost. The labor-intensive manufacturing cost estimates are as follow: $5.50 per unit for direct materials, $8.00 per unit for direct labor, $4.50 per unit variable overhead, and $1,538,000. The company’s research department recommends an introductory unit sale price of $30. The incremental selling expenses are estimated to $502,000 annually plus $2.00 for each unit sold, regardless of which manufacturing method is used. Capital-intensive methodologies of production require higher levels of labor. A: The estimated break-even point in annual unit sales of the new product is calculated differently dependent on the used method. 1.) With the capital-intensive method, the Martinez Company must calculate total fixed cost first; $2,508,000+$502,000=$3,010,000. The contribution margin per unit must also be calculated through selling price less variable cost ($30-$5-$6-$3-$2=$14). Total fixed cost over contribution margin per unit......

Words: 566 - Pages: 3

Premium Essay


...Team B - Integrative Network Design Project Jacob Acuna, Susan Granata, David Teague University of Phoenix - NTC/362 Ronald Bowell October 26, 2015 Page Break Kudler Fine Foods is a purveyor of specialty and gourmet foods in the San Diego, CA. area. They currently have three locations: the home office in La Jolla, CA., and two store locations in Del Mar, CA. and Encinitas, CA. Kudler is in need of a new network design and topology that will address multiple issues faced in a growing enterprise. The new network must incorporate a new network topology to reduce downtime and ensure that functionality will remain if one or two devices are down. In addition, a VoIP system must be installed over the network, along with an internal WLAN in each store. The WAN will tie all three stores together to increase collaboration and network file sharing, and the new network must be easily scalable to support growth of the company and integration of future stores. Of utmost priority is the security of the network. The sensitive nature of credit card processing makes Kudler Fine Foods a prime victim for cyber threats, and therefore policies must be put in place to protect the customer and employee data. Network Characteristics and Components The current network characteristics and components for the Del Mar store starts with a small office scenario that is accompanied by six Dell Vostro computers for management. All six computers are running Windows 7 and......

Words: 3311 - Pages: 14