Write My Paper Button

WhatsApp Widget

Instructions for Assignment 3 | My Assignment Tutor

Instructions for Assignment 3 Introduction This assignment is designed to: Give you practice at formulating security rules and objectives for given network scenarios.Give you practice in the simulation of networks.Give you practice in the interpretation of the plots produced by such simulations.Gain a full understanding of TCP congestion control mechanisms.Gain an understanding of how traffic … Continue reading “Instructions for Assignment 3 | My Assignment Tutor”

Instructions for Assignment 3 Introduction This assignment is designed to: Give you practice at formulating security rules and objectives for given network scenarios.Give you practice in the simulation of networks.Give you practice in the interpretation of the plots produced by such simulations.Gain a full understanding of TCP congestion control mechanisms.Gain an understanding of how traffic flows will compete for resources. Part 1 The questions in this part give a basic framework, and will not specify every detail that you might find if you encountered reality. Please use your imagination here, and make whatever assumptions you think would be appropriate. Suppose you have been asked to install and configure a wireless network for the following situation, and, in particular, it is your responsibility to configure the security of this network. Here is the scenario: Scenario A building containing two practitioner suites for medical and allied health professionals (physiotherapist, psychologist, nurse, doctor, psychiatrist, occupational therapist, etc), together with a waiting area and meeting room, and an office area where appointments and services can be made or managed. The service is provided free of charge for a certain community of clients with special needs. Wireless internet service is provided for both the practitioners and their clients. The practitioners use this service for accessing and managing client records, and for accessing any other professional services that they need during the course of their consultations, The facilities are intended to be used for informal meetings and meetings between clients as well as for consultations between practioners and clients. Questions Question 1 Create a security policy for the scenario described above with the same headings as the example security policy given in week 6.  25 marks Question 2 Consider how the chosen security policy should be implemented (or enforced), and explain how your strategy will achieve the intended goals of your policy.  15 marks Part 2 Create a network as depicted in Figure 1. The central link should have capacity 10 Mbps, and all other links capacity 100 Mbps. All links should be of pt-to-pt type, with PfifoFastQueue queue discipline and buffer size of 200 packets. The delay of all links should be 1 ms, except the link from D to Y, which should be 20 ms. Figure 1. A network to be simulated The traffic stream from A to X should be an ftp stream with 10,000,000 total bytes starting at 1 seconds after the start of the simulation. The traffic stream from A to Y should be an ftp stream with total bytes 10,000,000, starting at 3 seconds after the start of the simulation. The traffic stream from B to X should be an on-off stream, using TCP, with exponentially distributed on-times, with mean 1, exponentially distributed off-times, with mean 1, bit-rate 1 Mbps during on times, and starting at time 5s. The traffic stream from B to Z should be an ftp stream with total bytes 10,000,000, starting at 7 seconds after the start of the simulation. All traffic streams should finish at time 20. The version of TCP in use, which is selected in the dialog used to run the simulation, should be Reno. The duration of the simulation should be 20s. Scenario 1 Simulate this network, recording the throughput of the three ftp streams, and the on-off stream, in bytes/s, in a single plot. Also create a plot of the left-to-right link traffic, and of the right-to-left link traffic.   15 marks Do the following: 1. Perform the experiment and create the plots. 2. Explain the overall behaviour of each curve in the plots. You should mainly used the traffic plot, but if you need to confirm your interpretation, use the link plots. 3. Identify and explain features of the curves. What happened to make the curve do that? Scenario 2 Make the following adjustments to the network of Scenario 1:   15 marks Change all the link delay values to 20ms. Simulate this network, recording the throughput of the three ftp streams, the on-off stream, in bytes/s, in a single plot. Do the following: 1. Perform the experiment and include the resulting traffic plot in the report. 2. Explain the overall behaviour of each curve in the plot. What is different from Scenario 1 and why is it different? Scenario 3 Swap the start-times of the top ftp stream and the bottom one, i.e. Stream 1 should now have start time 7 and Stream 7 should have start time 1.   15 marks 1. Perform the experiment and include the resulting plots in your assignment. 2. Explain the overall behaviour of each curve in the plot. What is different from Scenario 2 and why is it different? Scenario 4 Change the duration of the simulation to 40 seconds, rather than 20 seconds.  15 marks 1. Perform the experiment and include the resulting plot in your assignment. 2. Explain the overall behaviour of each curve in the plot. What is different from Scenario 3 and why is it different?

Don`t copy text!
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
???? Hi, how can I help?