Uploaded by philipjoshua.abellera

ACT8

advertisement
DATA AND DIGITAL COMMUNICATIONS
COE 3
NAME: Philip Joshua B. Abellera
ID Number: 18-UR-0316
Year and Section: 4th YR. 3B
Activity 8
Answer the following questions and don’t forget to provide the references in APA Format. This
activity may be handwritten or encoded.
ANSWERS:
1. Types of Errors- Whenever bits flow from one point to another, they are subject to
unpredictable changes because of interference. This interference can change the shape of the
signal. The term single-bit error means that only 1 bit of a given data unit (such as a byte,
character, or packet) is changed from 1 to 0 or from 0 to 1. The term burst error means that
2 or more bits in the data unit have changed from 1 to 0 or from 0 to 1. The central concept in
detecting or correcting errors is redundancy. To be able to detect or correct errors, we need to
send some extra bits with our data. The correction of errors is more difficult than the detection.
In error detection, we are only looking to see if any error has occurred. The answer is a simple
yes or no. We are not even interested in the number of corrupted bits.
2. Similarities between the TCP/IP model and the OSI model
Both are logical models.
Both define standards for networking.
Both provide a framework for creating and implementing networking standards and
devices.
o Both divide the network communication process into layers.
o In both models, a single layer defines a particular functionality and sets standards for
that functionality only.
o Both models allow a manufacturer to make devices and network components that can
coexist and work with the devices and components made by other manufacturers.
o Both models simplify the troubleshooting process by dividing complex functions into
simpler components.
Differences between the OSI model and the TCP/IP model
o
o
o
o
o
o
o
o
o
The OSI Layer model has seven layers while the TCP/IP model has four layers.
The OSI Layer model is no longer used while the TCP/IP is still used in computer
networking.
To define the functionalities of upper layers, the OSI model uses three separate
layers (Application, Presentation, and Session) while the TCP/IP model uses a
single layer (Application).
Just like the upper layers, the OSI model uses two separate layers (Physical and
Datalink) to define the functionalities of the bottom layers while the TCP/IP uses
a single layer (Link layer) for the same.
To define the routing protocols and standards, the OSI model uses the Network
layer while the TCP/IP model uses the Internet layer.
The OSI model is well documented than the TCP/IP model.
DATA AND DIGITAL COMMUNICATIONS
COE 3
3. Encryption uses algorithms to scramble your information. It is then transmitted to the
receiving party, who can decode the message with a key. There are many types of algorithms,
which all involve different ways of scrambling and then decrypting information. Historically,
additive ciphers are called shift ciphers because the encryption algorithm can be interpreted
as “shift key characters down” and the encryption algorithm can be interpreted as “shift key
characters up.”
Decryption is a process that transforms encrypted information into its original format. The
process of encryption transforms information from its original format called plaintext into an
unreadable format called ciphertext — while it is being shared or transmitted. In addition, the
encryption and decryption algorithms are inverses of each other.
4. Viruses and worms are malicious programs that self-replicate on computers or via
computer networks without the user being aware; each subsequent copy of such malicious
programs is also able to self-replicate.
Viruses can be divided in accordance with the method used to infect a computer:
o file viruses
o boot sector viruses
o macro viruses
o script viruses
o This subclass of malicious programs includes the following behaviours:
o Email-Worm
o IM-Worm
o IRC-Worm
o Net-Worm
o P2P-Worm
o Virus
o Worm
5. Black hat hackers are the "bad guys" of the hacking scene. They go out of their way to
discover vulnerabilities in computer systems and software to exploit them for financial gain
or for more malicious purposes, such as to gain reputation, carry out corporate espionage, or
as part of a nation-state hacking campaign.
White hat hackers can be seen as the “good guys” who attempt to prevent the success of
black hat hackers through proactive hacking. They use their technical skills to break into
systems to assess and test the level of network security, also known as ethical hacking.
Grey hat hackers sit somewhere between the good and the bad guys. Unlike black hat
hackers, they attempt to violate standards and principles but without intending to do harm
or gain financially. Their actions are typically carried out for the common good.
REFERENCES:





Forouzan, Behrouz. A. (2013). Data Communications and Networking (5th ed.)
Computer Networking Notes and Study Guide (2022). Retrieved from:
https://www.computernetworkingnotes.com/ccna-study-guide/similaritiesanddifferences- between-osi-and-tcp-ip-model.html
Karpersky.
(2022).
Viruses
and
Worms.
Retrieved
from:
https://encyclopedia.kaspersky.com/knowledge/viruses-and-worms/
Hemanth, Jude, Fernando, Xavier, Lafata, Pavel, & Baig, Zubair. (2018).
International Conference on Intelligent Data Communication Technologies and
Internet of Things (ICICI) 2018 (Vol. 26).
Fortinet.
(2022).
What
is
Hacking.
Retrieved
from:
https://www.fortinet.com/resources/cyberglossary/what-is-hacking
Download