Show the simulation graph on a vertical time axis (like in slides, with events l

Show the simulation graph on a vertical time axis (like in slides, with events labeled with the senders number A-E) the contention period of five equally distanced Ethernet stations that all attempt to transmit at T=0 a minimally sized frame, in the style of the binary Exponential Backoff Algorithm. Assume that time is measured in slot times, and that exactly one slot time is needed to detect a collision (so that if two stations transmit at T=1 and collide, and one of them chooses a backoff time k=0, then that station will transmit again at T=2).
Use coin flips or some other source of randomness as follows: write your student ID in binary ->e.g., 1001010101010010110010100101011.
use the bits in order from the least significant to the most significant. If for a given coin throw you need k bits, use the least significant student ID bit extracted
in the corresponding group of bits, as the least significant bit of the coin thrown.
For example, with the above ID, if we need a number between 0-7 and then another between 0-15, the first will be 011=3, and the second will be 0101=5
Also run one simulation with the random sequence R: 100101010101001011001010 010 1011 10010101010 100 10110010 100101011
T0: x x x x x
T1: 1. 1. 0x. 1. 0x
T2: 1x. 1x. 01 1x. 10
T3: 10. 00x. x 11. 10
T4: 10. 100. 010. 11. T
T5: T. 100. 010. 11. _
T6: _. 100. x. x. _
T7: _ 100. 1010 010 _
T8. _. T. 1010. 010 _
T9. _. _ 1010. T _
T10. _. _ 1010. _ _

T17 _ _ T _ _
—————————
My student ID: 903959688
you can find the graph on slide 143/144, and everything else you need on slides.

the first part of this assignment is; “In this project, you use WinHex to becom

the first part of this assignment is;
“In this project, you use WinHex to become familiar with different file types. Follow these steps:
1.
Locate or create Microsoft Excel (.xlsx), Microsoft Word (.docx), .gif, .jpg, and .mp3 files. If you’re creating a Word document or an Excel spreadsheet, save it as a Word or Excel file.
2.
Start WinHex.
3.
Open each file type in WinHex. Record the hexadecimal codes for each file in a text editor, such as Notepad or WordPad. For example, for the Word document, record Word Header: 50 4B 03 04.
4.
Save the file, and submit it
the second part of this assignment is Write a 1 page paper comparing virtual enviroments that can be used to run guest OS’s on host machines. Compare the features, cost and supported OS’s.

Objectives Identify the difference between physical address and logical address

Objectives
Identify the difference between physical address and logical address
Investigate and disable unneeded ports
Troubleshoot network problems
Questions
How to find MAC address and ip address by using the command line tool and GUI tool? Need to discuss both of the approaches. Identify your system if you are not using Microsoft Windows 1O. (4 points)
How to find open ports on your host? Is there any port that should be closed and why?(6 points)
If your browser can not reach Google website, what will you do to identify the possible issues?(10 points)
Submission
Upload your work in a Microsoft Word document (20 points in total)

1-Explain any four differences between OSI and TCP/IP models in your own words.2

1-Explain any four differences between OSI and TCP/IP models in your own words.2-If a periodic signal is decomposed into five sine waves with frequencies of 350, 450, 850, 950, and 1050 Hz, what is its bandwidth? Draw the spectrum, assuming all components have a maximum amplitude of 20 V.3-Compare recent technologies used in Guided Media and Unguided Media with Example?4-If maximum distance amongst ALOHA wireless station is 12 kilometer ? If signals propagate at 3 km/s then calculate Maximum Propagation Time and R for k=4?

Assignment Content Network attacks are increasing day-by-day, and each day a new

Assignment Content
Network attacks are increasing day-by-day, and each day a new threat is evolving. Organizations often fail to defend against rapidly growing network attacks. From the perspective of organizations:
Create a 1- to 2-page (single-spaced) paper on the reasons for network security concerns using Microsoft® Word to detail the following:Describe 3 possible reasons for the uptick in Network Security Concerns.
Include an additional page for a table of common threats, vulnerabilities, and risks for “real world security.”
Based on your knowledge of current affairs, this week’s readings, or online research, describe 2 examples of security vulnerabilities that an end user needs to know in order to take precautions beforehand.
Describe an instance when security was breached in your organization, school, or an organization known to you. Include a description of how the attack was detected, what protocol was attacked, and what steps were used to resolve it.
Cite any sources to support your assignment.
Format your citations according to APA guidelines.
Submit your assignment.
ResourcesCenter for Writing Excellence
Reference and Citation Generator
Grammar Assistance

From your reading of chapter 1 (introduction to Netsec), for each of the followi

From your reading of chapter 1 (introduction to Netsec), for each of the following assets, assign a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify in detail your answers.(20 Points
An organization managing public information on its Web server.
A law-enforcement organization managing extremely sensitive investigative information.
A financial organization managing routine administrative information (not privacy-related information).
An information system used for large acquisitions in a contracting organization that contains both sensitive, pre-solicitation phase contract information and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole.
A power plant contains a SCADA (supervisory control and data acquisition) system controlling the distribution of electric power for a large military installation. The SCADA system contains both real-time sensor data and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole.
( please include reference )