You must submit two separate copies (one Word file and one PDF file) using the A

You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboardvia the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Email submission will not be accepted.
You must use this template, failing which will result in zero mark.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind ofmanipulation).
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Grading Criteria
Calculate the throughput of communication medium
2.5
Propagation Delay Diagram of this Communication Channel
2.5
Create a communications Link Layer Switch Model
4
Presentation
5
Total
14
Description and Instructions
The objective of this project is to understand communications methods in OSI Model.
The project is a Group work with a minimum of 3 People and amaximum of 4 People.
PDF file of the project report
Presentation in PPT/PPTX format.
Your project must be original work. The project will be checked using a plagiarism tool. Any matching with an online project or another/previous student projectwill be given ZERO.
Due date: 5th December 2023 @11:59 PM
Learning Outcome(s):
CLO 2:

Develop the ability to outline layered approach for networking and the physical layer & associated hardware and software integration.
CLO 4:
Demonstrate protocol configuration, network-addressing schemes and analyze packet transmission for the Local and Wide Area Networks.
Description and Instructions
You are a Network Engineer and you want to analyze the communications methods and techniques of the signals in OSI Model. Suppose a signal travels through a transmission medium then in this transmission Medium, calculate and solve the given below problems:

A transmission medium with 50 Mbps bandwidth can communicate average of 10,000 frames per day. If the capacity of each frame is 250 bits then Calculate the throughput of this communication medium.
Sender(Ahmad) and Receiver(Mohammad) are connected through a communication Link, if Bandwidth of this channel is 3 Mbps and Propagation delay is 10 Second then draw Propagation Delay Diagram of this Communication Channel?
Create a communications Link Layer Switch Model for port numbers associated with following IP addresses:
Port No.
IP Address
8
86:4A:34:76:84:76
7
86:4A:34:76:84:67
5
86:4A:34:76:84:86
6
85:4A:34:76:84:68
3
85:4A:34:76:84:90
4
86:4A:34:76:84:96
1
98:4A:34:76:84:89
2
98:4A:34:76:84:92

Assignment – Encryption and Authentication Methods Objectives Understand encrypt

Assignment – Encryption and Authentication Methods
Objectives
Understand encryption and authentication methods
Describe encryption and authentication methods
Contrast among encryption and authentication
Questions
Synthesize major characters of each protocol into the table below.
Using the given information as a hint and fill up those missing fields under Type, Primary Use(s), and
Notes columns. Except for the Notes column, you can get the hints from the information given for the three columns.
For the column, Notes, you need to provide a summary for each security method. Refer to the TLS row. It says that TLS provides a secure transmission of HTTP sessions.
Security Method
Type
Primary Use(s)
Notes
IPsec
Encryption
TCP/IP transmissions
SSL
TCP/IP transmissions
TLS
Secure transmission of HTTP sessions
PPP
Connection
Remote Access
SSH
Connection, Authentication, Encryption
RDP
VNC
L2TP
Tunneling
VPN
GRE
VPN
OpenVPN
IKEv2
VTP
Trunking
SHA
Hashing
Data Integrity
LDAP
Authentication
Directory Access
Kerberos
Client validation
Verify the identity of clients and securely exchange information after a client logs on a system
RADIUS
Central authentication point for network users, including wireless, mobile, and remote users
TACACS+
AAA (Authentication, Authorization, and Accounting)
Client validation and monitoring
EAP
Client verification
802.1X
AES
Wi-Fi and other uses
Hint
Utilize those given hints in the table to answer those missing ones.

follow the instructions carefully+ I have already have it until 12, I want u to

follow the instructions carefully+ I have already have it until 12, I want u to do the rest. I want steps 13 as soon as possible the rest can be later. What i mean about as soon as possible is hours from the time of posting this 🙂
thanks! Can not wait to work with u
i also can show u examples of the steps from 1-12 that I have done

follow the instructions carefully+ I have already have it until 12, I want u to

follow the instructions carefully+ I have already have it until 12, I want u to do the rest. I want steps 13 as soon as possible the rest can be later. What i mean about as soon as possible is hours from the time of posting this 🙂
thanks! Can not wait to work with u

You can find the PDF file “2023 Stte of Malware” prepared by Malwarebytes below.

You can find the PDF file “2023 Stte of Malware” prepared by Malwarebytes below. Provide five major takeaways after reading this report.
2023 State of Malware

Submission
Upload your work in a Microsoft Word document (10 points
must be in apa format

Q1 -Consider a network with a data rate of 10 Mbps. Messages sent on this networ

Q1 -Consider a network with a data rate of 10 Mbps. Messages sent on this network have a maximum size of 1000 bits, including a 16-bit control field.
Q2- Explain the structural dissimilarities between coaxial cables and twisted-pair cables and discuss the advantages of coaxial cables in transmitting higher frequency signals.
Q3-Compare between the following two channelization protocols:
Q4-Explain the evolution of Ethernet standards from its inception to the modern era, covering Standard Ethernet, Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet. Discuss the technological advancements, key differences, and the impact of each iteration on network capabilities.

You can find the PDF file “2023 Stte of Malware” prepared by Malwarebytes below.

You can find the PDF file “2023 Stte of Malware” prepared by Malwarebytes below. Provide five major takeaways after reading this report.
2023 State of Malware

Submission
Upload your work in a Microsoft Word document (10 points
must be in apa format

Q1 -Consider a network with a data rate of 10 Mbps. Messages sent on this networ

Q1 -Consider a network with a data rate of 10 Mbps. Messages sent on this network have a maximum size of 1000 bits, including a 16-bit control field.
Q2- Explain the structural dissimilarities between coaxial cables and twisted-pair cables and discuss the advantages of coaxial cables in transmitting higher frequency signals.
Q3-Compare between the following two channelization protocols:
Q4-Explain the evolution of Ethernet standards from its inception to the modern era, covering Standard Ethernet, Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet. Discuss the technological advancements, key differences, and the impact of each iteration on network capabilities.