NETWORKING ASSIGNMENT

NETWORKING ASSIGNMENT

  1. Differentiate application gateway from stateful packet inspection in the respect to firewall                                                                                                                         
  2. Describe NAT and show how it relates to internet security                                    
  3. Explain how you can configure an ACL that denies entry of packets from host 192.20.30.1 to router interface fa0/0.The host default gateway is interface fa0/0
  4. Convert above configurations to allow all hosts in network 192.20.30.0 access to internet through external port serial0/0

    ORDER A PLAGIARISM-FREE PAPER HERE

    We’ll write everything from scratch

 

) Differentiation between Application Gateway and Stateful Packet Inspection (SPI) in Firewall:

  1. Application Gateway: An application gateway, also known as a proxy firewall, operates at the application layer (Layer 7) of the OSI model. It inspects and filters traffic based on specific applications or protocols, such as HTTP, FTP, SMTP, etc. It can provide detailed logging, content filtering, and even protocol validation. However, it may introduce additional latency due to its deep packet inspection.
  2. Stateful Packet Inspection (SPI): SPI is a firewall technology that operates at the network layer (Layer 3) and transport layer (Layer 4) of the OSI model. It monitors the state of active connections and inspects packets based on their context within the network communication session. SPI maintains a stateful table of active connections, allowing it to make decisions based on the state of each packet. It provides improved performance compared to application gateways and is often used in traditional packet-filtering firewalls.

Differences:

  • Layer of Operation: Application gateways operate at the application layer, while SPI operates at the network and transport layers.
  • Granularity of Filtering: Application gateways provide more granular filtering based on specific applications or protocols, whereas SPI primarily filters based on IP addresses, port numbers, and connection states.
  • Processing Overhead: Application gateways may introduce more processing overhead due to deep packet inspection at the application layer, while SPI typically has lower overhead.
  • Security Depth vs. Performance: Application gateways offer deeper security inspection but may sacrifice performance, while SPI provides a balance between security and performance.

    ORDER A PLAGIARISM-FREE PAPER HERE

    We’ll write everything from scratch

b) Description of NAT and its Relationship to Internet Security:

NAT (Network Address Translation) is a technique used in networking to map private IP addresses within a local network to a single public IP address. It enables devices within a private network to access resources on the internet using a single public IP address. NAT operates at the network layer (Layer 3) of the OSI model.

Relationship to Internet Security:

  • Address Obfuscation: NAT hides the internal network structure by translating private IP addresses to a single public IP address, making it difficult for external entities to directly access devices within the network.
  • IP Address Conservation: NAT allows organizations to conserve public IP addresses by using private IP addresses internally and translating them to a smaller pool of public IP addresses when accessing the internet.
  • Stateful Inspection: Some NAT implementations incorporate stateful inspection, which tracks the state of connections and only allows incoming traffic that corresponds to existing outgoing connections. This provides an additional layer of security by preventing unsolicited inbound traffic.

c) Configuring an ACL to Deny Packets from Host 192.20.30.1 to Router Interface fa0/0:

Assuming you’re using Cisco IOS, here’s a sample ACL configuration:

plaintext
access-list 101 deny ip host 192.20.30.1 any
access-list 101 permit ip any any
interface fa0/0
ip access-group 101 in

Explanation:

  • access-list 101 deny ip host 192.20.30.1 any: Defines an ACL entry that denies all IP traffic from host 192.20.30.1.
  • access-list 101 permit ip any any: Allows all other IP traffic.
  • interface fa0/0: Enters configuration mode for interface fa0/0.
  • ip access-group 101 in: Applies the ACL to incoming traffic on interface fa0/0.

    ORDER A PLAGIARISM-FREE PAPER HERE

    We’ll write everything from scratch

d) Configuring NAT to Allow All Hosts in Network 192.20.30.0 Access to the Internet through External Port serial0/0:

Assuming the router is using Cisco IOS and is already configured with NAT, you can modify the NAT configuration as follows:

plaintext
interface serial0/0
ip nat outside
interface <internal_interface>
ip nat inside
ip nat inside source list 1 interface serial0/0 overloadaccess-list 1 permit 192.20.30.0 0.0.0.255

Explanation:

  • interface serial0/0: Specifies the external interface connected to the internet.
  • ip nat outside: Marks the interface as the outside interface for NAT.
  • interface <internal_interface>: Specifies the internal interface connected to network 192.20.30.0.
  • ip nat inside: Marks the interface as the inside interface for NAT.
  • ip nat inside source list 1 interface serial0/0 overload: Configures NAT overload (PAT) to translate internal IP addresses to the external IP address of the serial0/0 interface.
  • access-list 1 permit 192.20.30.0 0.0.0.255: Defines an ACL permitting traffic from network 192.20.30.0 to be translated by NAT.

IT Homework Help-Shared Key Calculation

IT Homework Help-Shared Key Calculation

Given that Alice and Bob want to communicate over a public link using Diffie Hellman algorithm and the value of p = 43 while g = 13. Alice chooses kA = 5 while Bob chooses kB= 7, determine the shared key(show working)

To determine the shared key using the Diffie-Hellman algorithm with the given parameters:

  1. Shared Prime Modulus (p): p=43
  2. Generator (g): g=13
  3. Alice’s Private Key (kA): kA=5
  4. Bob’s Private Key (kB): kB=7

The steps to compute the shared key are as follows:

Alice’s Calculation:

  1. Alice computes A=gkAmod  p A=135mod  43 A=122mod  43 A=38

Bob’s Calculation:

  1. Bob computes B=gkBmod  p B=137mod  43 B=62748517mod  43 B=24

Shared Key Calculation:

  1. Alice sends A to Bob, and Bob sends B to Alice.
  2. Alice computes the shared key: K=BkAmod  p

    K=245mod  43

    K=7962624mod  43

    K=9

    The shared key for Alice is 9.

  3. Bob computes the shared key: K=AkBmod  p

    K=387mod  43

    K=45435424mod  43

    K=9

    The shared key for Bob is also 9.

Therefore, both Alice and Bob compute the same shared key, which is K=9.

COMPUTER SECURITY AND CRYPTOGRAPHY

COMPUTER SECURITY AND CRYPTOGRAPHY

  1. Briefly explain the following
  2. i) Cryptography                                                            
  3. ii) Steganography                                                            
  • iii) Prime Factorization                                    
  1. Briefly explain the mathematical basis that provides the foundation for the usefulness o f public key cryptography?                                                                                    
  2. Discuss the significance of key length in private key cryptography?        
  3. Identify three main features of any two symmetric key block ciphers

Given that Alice and Bob want to communicate over a public link using Diffie Hellman algorithm and the value of p = 43 while g = 13. Alice chooses kA = 5 while Bob chooses kB= 7, determine the shared key(show working)

COMPUTER SECURITY AND CRYPTOGRAPHY HOMEWORK HELP

COMPUTER SECURITY AND CRYPTOGRAPHY HOMEWORK HELP

Consider the One Laptop per Child  Project (OLTPC) by the Kenyan Government. It is clear that the pupils will require a usable interface for the applications on these devices, such applications may also need to understand the traditional languages and be able to interpret the same into formal national languages of English and Swahili.

  1. There is need for employment of multimedia components on these applications
  1. Give a general user interface design for any applications to be used with these laptops
  2. Explain why the employment of sound would be very vital in such applications
  • What type of non-speech sounds may be of relevance in this scenario

  1. Giving Examples, explain how techniques in Natural Language Processing (NLP) may be used in these applications
  2. Suppose you want to carry out an expert evaluation of applications employed on this project.
  1. Giving reasons, identify the most appropriate method of expert evaluation that you would employ (
  2. Identify which of the Nielsen’s heuristics would be most appropriate for deployment on such evaluations<

    ORDER A PLAGIARISM-FREE PAPER HERE

    We’ll write everything from scratch

    Question


    /li>

COMPUTER SCIENCE HOMEWORK HELP(Norman’s seven principles)

COMPUTER SCIENCE QUESTIONS(HCI)

  1. List the Norman’s seven principles? (7 marks)

 

  1. Indicate three main types of signs that can be used in designing for navigation. (3 marks)

 

  1. Many software development projects have adopted the user-centered design methodology. Characterize the methodology. (4 marks)

 

  1. Describe the main strategies that people tend to use in order to deal with emotions emanating from difficult and stressful tasks. (4 marks)

    ORDER A PLAGIARISM-FREE PAPER HERE

    We’ll write everything from scratch

    Question


computer science assignments

COMPUTER SCIENCE HOMEWORK ASSIGNMENTS

  1. Define the following usability principles:
  2. a) Substitutivity
  3. b) Predictability
  4. c) Task migratability

 

  1. The software developers at Webest Inc. have come up with a prototype of the intended company’s website. The developers want to evaluate the prototype first before proceeding with the next version. They have decided to use the cognitive walkthrough type of evaluation. What is required when conducting this type of evaluation?

 

  1. Describe the differences between multimodal interfaces and traditional/standard graphical user interfaces. (8 marks)

    ORDER A PLAGIARISM-FREE PAPER HERE

    We’ll write everything from scratch

    Question


HUMAN COMPUTER INTERACTIONS Q&A

HUMAN COMPUTER INTERACTIONS Q&A

1. Usability goals are typically operationalized as questions. Consider next question:
Is the product capable of allowing people to buy the goods they want?

a. To which usability goal does this question refer?

b. Is this question a suitable formulation to operationalize that usability goal? Explain your
answer.

2. Give an example of the design principle affordance.

3. Suppose you are asked to design a system to support the desk clerks in a bank office. Is it a good
idea to play the role of desk clerk yourself for some time, as part of the analysis activities?

4. Given is the statement:
‘Motivation’ is a typical part of the basic structure of a research report.
Is this statement true? Explain your answer.

5. (Only BIT and TCS)
Given is the statement:
Every persona should have a name.
Is this statement true? Explain your answer.

6. Which are the core activities in the iterative approach of phase 2?

7. Is it a good idea to combine video and Wizard-of-Oz as a prototyping technique?

8. Should a Playtesting session preferably be held at the playtester’s home or in a playtesting lab?

Answers

1. a. Effectiveness.

b. Yes, this is question is concrete enough to assess effectiveness.
NB Utility is also considered as a correct answer, because it is closely related to effectiveness.
Source: Chapter What is Interaction Design?, sections 1.4-1.6.

2. Example: a mouse button invites pushing by the way it is physically shaped.
Source: Chapter What is Interaction Design?, sections 1.4-1.6.

3. In the context of context analysis this is very useful activity. In this way you can learn which
issues the desk clerk has to deal with.

Source: Video Participant Observation.
(Another question is whether to play this role is desirable from the point of view of the bank
office management.)
4. It is important to motivate why you do the research and what the impact is. These questions
are discussed in the section Motivation.
Source: Reader HCI Design and Evaluation, Chapter 3.
5. Giving a persona a name is one of the most important parts of successfully defining one.
A persona without a name is not useful.
Source: document Personas.
6. The core activities are: make products and ideas, confront the products with stakeholders
and reflect on everything you do and make.
Source: Reader, Chapter 6.
7. Yes. It might give the user a real sense of what it might feel like to interact with the proposed
system.
Source: document Off line prototyping techniques, by Beaudouin-Lafon and Mackay
8. Both have pros and cons, so it depends upon your goals. For a discussion about the ‘where’
of Playtesting: see the Playtesting chapter of The Art of Game Design, by Schell.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question


Human computer interaction exam questions (fUll semester)

Human computer interaction exam questions
(fUll semester)

1) Explain what skills are involved in Human computer interaction.
2) Explain the main concerns of Human computer interaction.
3) Why human Computer interaction is important in software design?
4) Explain what is involved analyzing product’s context of use.
5) Which people (activity | context | technology) characteristics are analyzing the user needs?
6) How data can be recorded during the data gathering sessions with stakeholders?
7) How interviews are conducted?
8) What kind of questions are used in usability questionnaires?
9) How observations results are conducted?
10) What is a good question in interview and questionnaire?
11) Core characteristics of user-centered design
12) Why important is involving stakeholders to design? Stakeholder types.
13) Explain the user experience levels.
14) Definition of usability according to ISO 9241. Provide the examples
15) Explain usability principles with examples.
16) Business and usability objectives
17) Explain how task analysis is performed.
18) Explain how task analysis performed using storyboards (scenarios | use cases | hierarchical task
analysis).
19) What are the differences between mockups and prototypes?
20) What is presented on mood board? Why is it needed?
21) What is information architecture?
22) Top-down development of information architecture
23) Bottom-up development of information architecture
24) The main categories of usability design rules and their relation with user experience levels
25) Design principles for learnability (flexibility | robustness)
26) Nielsen’s heuristics
27) Analyze heuristics evaluation: the aim, in which project phases can be applied, who is involved,
what is prepared for the evaluation, what outcomes are obtained
28) Explain Norman’s 4 stages of interaction.
29) Analyze Cognitive walkthrough: on what usability attribute is focused, when can be applied, who
is involved in evaluation, what outcomes can be obtained.
30) Page fold and attention in interface design
31) Usage of colors to attract user’s attention
32) Gestalt principles
33) Interactive information visualization: purpose, steps
34) Analyze usability testing: the aim, in which development phases can be applied, who is involved,
what is prepared for the evaluation, what outcomes can be obtained.
35) How usability testing is performed?
36) Analyze GOMS/KLM evaluation: the aim, in which project phases can be applied, who is
involved, what is prepared for the evaluation, what outcomes are obtained.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question


HUMAN COMPUTER INTERACTIONS(HCI)

HUMAN COMPUTER INTERACTIONS(HCI)

Q5. With the growing prominence of “networked” data in the physical, social, and
economic sciences, there has been a proliferation in graph visualization applications.
However, as the size and complexity of the underlying graph data grows, many
representation and interaction challenges arise. Please consider and describe a
multivariate, temporal network visualization context of interest/knowledge to you and
then answer the following questions:

A. What representation and interaction issues do you need to consider if you want to
facilitate top-down (overview first), bottom-up (start with what you know), and middle-out
(relevant subgraph) exploration?

B. How do the considerations identified in (a) change when you think about i) different
display sizes (small versus large) and ii) different input mechanisms (mouse versus
touch)?

HUMAN COMPUTER INTERACTIONS (HCI)

HUMAN COMPUTER INTERACTIONS (HCI)

Q4. Your company has received a contract to study mobile phones vs. smart watches
vs. eye glass displays using qualitative methods. The client would like you to;

A.Propose a study to analyze a conversational partner’s perception of interruption,
specifically in the context of the device user during face-to-face interaction in both oneon-one interactions AND a group meeting.

B. Reflect on the strengths and weaknesses of the methodology your client chose

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question