Monday, 31 October 2016

Multi Server Queue Simulation Using C# Source Code

Source Code Down Below!

Program Interface


Download Link:
http://adf.ly/15925565/multi-server-queue

How To Download:
Please disable any Ad Block software beforehand or this may not work properly. We know you hate ads but it helps us maintain our blog and provide better content in the future.

1. Please wait for 5 seconds.


2. Click on "Skip Ad".


3. Click on "Download through your browser".


Friday, 10 June 2016

Application of Discrete Mathematics RSA Algorithm Report

Download Link Down Below!

Table of Content


  • Introduction
  • Mathematical Prerequisites
    • Euler's Totient Function
    • Coprime Integers
    • Modular Multiplicative Inverse
    • Euler's Theorem
    • Modulo Congruence
  • Operation
    • Generating Public & Private Keys
    • Encryption
    • Key Distribution
    • Decryption
  • Working Example
  • Alternative Solution
    • Caesar Cipher
  • RSA Reliability & Advantages
    • Prime Generation & Integer Factorization
    • Modular Exponetiation and Roots
    • Advantages of RSA over Caesar Cipher
  • Conclusion

Preview

Introduction


Number theory may be one of the “purest” branches of mathematics, but it has turned out to be one of the most useful when it comes to computer security. For instance, number theory helps to protect sensitive data such as credit card numbers when you shop online. This is the result of some remarkable mathematic research from the 1970s that is now being applied worldwide.

Sensitive data exchanged between a user and a Web site needs to be encrypted to prevent it from being disclosed to or modified by unauthorized parties. The encryption must be done in such a way that decryption is only possible with the knowledge of a secret decryption key. The decryption key should be known by authorized parties.

This is the concept of public-key cryptography. The distinguishing technique used in public-key cryptography is the use of asymmetric key algorithms, where a key used by one party to perform either encryption or decryption is not the same as the key used by another in the counterpart decryption. RSA is one of the asymmetric algorithms.

RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission. In RSA, this asymmetry is based on the practical difficulty of factoring the two products of two large prime numbers, the factoring problem. RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who first publicly described the algorithm in 1977.

Download Link:

How To Download:
Please disable any Ad Block software beforehand or this may not work properly. We know you hate ads but it helps us maintain our blog and provide better content in the future.

1. Please wait for 5 seconds.


2. Click on "Skip Ad".


3. Click on "Download through your browser".


Wednesday, 8 June 2016

Smart Parking System Based On Wireless Sensor Network Report

Download Link Down Below!

Table of Content


  • Abstract
  • Introduction
    • Existing Approach
      • Issue/Problems
      • Absence of Parking Guidance
      • Undetermined Parking Availability
      • Absence of Parking Pricing & Regulations Information
      • Poor Law Enforcement
      • Inconvenient Payment Solution
      • Absence of Parking Analytic Data
  • Solution
    • Mobile Application Solution
    • Wireless Sensor Network
    • Guided Parking Enforcement
    • Mobile Payment Solution
    • Concept Art
  • Network Architecture & Protocol Stack
    • Introduction
    • Sensor Node Structure
    • Architecture
    • Protocol Stack
      • Application Layer
      • Transport Layer
      • Network Layer
      • Data Link Layer
      • Physical Layer
  • Literature Review
    • Parking Guidance & Information Systems (PGIS)
    • Transit-Based Smart Parking System
    • Smart Payment Solution
    • E-Parking
    • Other WSN based Systems
  • Potential Flaws & Ways To Overcome
  • Summary
  • Citation
  • Works Cited

Preview

Introduction


Parking, the most agonizing experience any urban driver can have. The thoughts that come to mind are often quite negative. When it comes to finding a parking space, drivers either rely on their good eyesight where they make move as soon as they lock-on a target or they just simply bet on their instincts where each turn they make hopefully will lead to a jackpot. People can spend up to hours just to find one parking space. Not only does this make the drivers go nuts, it also contributes to traffic congestion and even environmental pollution. However, it isn’t always about the driver. Shops and local businesses are also heavily affected by the parking availability near them. On the other hand, from time to time some portion of the people just doesn’t feel like abiding the rules. This is where parking violations comes in that ruins the parking enforcement laws. As we look at ways to apply technology to tackle some of the most pressing issues facing our cities today, parking is sure ripe for some innovation. Below are some interesting facts provided by Cisco that tells us a little bit more about parking.

Download Link:

How To Download:
Please disable any Ad Block software beforehand or this may not work properly. We know you hate ads but it helps us maintain our blog and provide better content in the future.

1. Please wait for 5 seconds.


2. Click on "Skip Ad".


3. Click on "Download through your browser".


Tuesday, 24 May 2016

Wireshark Lab ARP Solution

Link to download document down below! (Microsoft Word format)

1.  Write down the contents of your computer’s ARP cache (see above procedure: Step 1).  What is the meaning of each column value?

Answer: The Internet Address column represents the IP address of the computer at the network layer, the Physical Address column contains the MAC address to physically communicate with the hardware that is located at that IP address, and the Type column indicates whether it is changing (dynamic) or not (static).


2.  Where in the ARP request does the “question” appear – the Ethernet address of the machine whose corresponding IP address is being queried? (see Wireshark).

Answer: The “question” appears in the ‘Target MAC address’.


3.  Why is the ARP request message sent as broadcast (i.e. to all other devices), whereas the ARP reply is sent as a unicast directly to the sender device only? Explain.

Answer: ARP requests are sent as broadcast because the destination or the target device is yet unknown. Broadcasting will be faster and more efficient to look for the device that matches the address of the request. ARP replies are sent as unicast because a connection has been established between two devices, therefore direct communication can be formed.

Download Link:

How To Download:
Please disable any Ad Block software if any beforehand or this may not work properly.

1. Please wait for 5 seconds.


2. Click on "Skip Ad".


3. Click on "Download through your browser".


Wireshark Lab IP Solution

Link to download document down below! (Microsoft Word format)

1.  Within the IP packet header, what is the value in the protocol field? What does this value mean?

Answer: The value in the protocol field is ICMP (1). It means the protocol field has only 1 byte.


2.  How many bytes are in the IP header? How many bytes are in the payload of the IP datagram?  Explain how you determined the number of payload bytes.

Answer: There are 20 bytes in the IP header, and 92 bytes total length, this gives 72 bytes in the payload of the IP datagram.


3.  Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer? Explain why they change.

Answer: Identification, Time to live and Header checksum always change. The identification is a unique value. Different IP packets must have different IDs to identify themselves. TTL always changes because traceroute increments each subsequent packet. Header checksum changes because since header change, checksum must also change.

4.  What is the value in the Identification field and the TTL field?

Answer: 
The value in the identification field is 46463.
The value in the TTL field is 255.



5.  Do these values (referring to question 4) remain unchanged for all of the ICMP TTL-exceeded replies sent to your computer by the nearest (first hop) router?  Why?

Answer: The identification field changes for all the ICMP TTL-exceeded replies because the identification field is a unique value. When two or more IP datagrams have the same identification value, then it means that these IP datagrams are fragments of a single large IP datagram.

The TTL field remains unchanged because the TTL for the first hop router is always the same.

Download Link:

How To Download:
Please disable any Ad Block software if any beforehand or this may not work properly.

1. Please wait for 5 seconds.


2. Click on "Skip Ad".


3. Click on "Download through your browser".




Wireshark Lab ICMP & Traceroute Solution

Link to download document down below! (Microsoft Word format)

1.  Why is it that an ICMP packet does not have source and destination port numbers?

Answers: ICMP is not used to transfer data, but rather to detect errors. If it cannot reach the IP, it will give an error and only send small amounts of data to check the status of the destination. Thus, it does not need a specific port, it just needs to know whether or not the given IP can be contacted.

2.  What is the ICMP protocol number in the IP packet header?

Answers: The protocol number in the IP packet header is 1.


3.  Examine the ICMP Echo Request packet. What are the ICMP type and code numbers? What other fields does this ICMP packet have? How many bytes are the checksum, sequence number and identifier fields?

Answers: The Type is 8, which is an Echo (ping) request. The code is 0. The other fields contained are Checksum, Identifier (BE), Identifier (LE), Sequence number (BE), and Sequence number (LE). They are each 2 bytes long.

4.  Examine the ICMP error packet received by your host (i.e. the TTL Exceeded packet). It has more fields than the ICMP echo packet. What is included in those fields?

Answers: The additional fields are the IPv4 data from the original packet (ping request). The additional data is a carbon copy of the ICMP part of the original packet.




5.  Refer to the screenshot in Figure 1, how many hops are there between the Traceroute client and target destination server is in France (i.e. www.inria.fr)?


Answers: 15 hops.

Download Link:

How To Download:
Please disable any Ad Block software if any beforehand or this may not work properly.

1. Please wait for 5 seconds.


2. Click on "Skip Ad".


3. Click on "Download through your browser".




Wireshark Lab DNS Solution

Link to download document down below! (Microsoft Word format)

1.  Locate the DNS query and response messages. Are they sent over UDP or TCP?

Answer: They sent over UDP.




2.  What is the destination port for the DNS query message? What is the source port of DNS response message?

Answer: 
Destination port: domain (53)
Source port: domain (53)


3.  To what IP address is the DNS query message sent? Use ipconfig to determine the IP address of your local DNS server. Are these two IP addresses the same?

Answer: 172.18.41.2, yes the two IP addresses are the same.


4.  Examine the DNS query message. What “Type” of DNS query is it? Does the query message contain any “answers”?

Answer: Type: A (Host address), the query message does not contain any “answers”.



5.  Examine the DNS response message. How many “answers” are provided? What does each of these answers contain?

Answer: 
1 “answers” is provided.
The answer contains: www.ietf.org: type A, class IN, addr 12.22.58.30


6.  This web page contains images. Before retrieving each image, does your host issue new DNS queries?

Answer:
No.

Download Link:

How To Download:
Please disable any Ad Block software if any beforehand or this may not work properly.

1. Please wait for 5 seconds.


2. Click on "Skip Ad".


3. Click on "Download through your browser".


Wireshark Lab DHCP Solution

Link to download document down below! (Microsoft Word format)

1.  Are DHCP messages sent over UDP or TCP?

Answer: DHCP messages are sent over UDP (User Datagram Protocol).



2.  Draw a timing datagram illustrating the sequence of the first four-packet Discover/Offer/Request/ACK DHCP exchange between the client and server. For each packet, indicated the source and destination port numbers. Are the port numbers the same as in the example given in this lab assignment?

Answer: The port numbers are the same as the example given in this lab assignment.


3.  What is the link-layer (e.g., Ethernet, MAC) address of your host?

Answer: The link-layer address of my host is (00:25:64:e7:3b:2e)


4.  What values in the DHCP discover message differentiate this message from the DHCP request message?

Answer: The values which differentiate the Discover message from the Request message are in “Option: (t=53,l=1) DHCP Message Type”



5.  What is the value of the Transaction-ID in each of the first four (Discover/Offer/Request/ACK) DHCP messages? What are the values of the Transaction-ID in the second set (Request/ACK) set of DHCP messages? What is the purpose of the Transaction-ID field?

Answer: 
Discover - Transaction ID 0x752c8ad1
Offer    - Transaction ID 0x752c8ad1
Request - Transaction ID 0x752c8ad1
ACK      - Transaction ID 0x752c8ad1


6.  A host uses DHCP to obtain an IP address, among other things. But a host’s IP address is not confirmed until the end of the four-message exchange! If the IP address is not set until the end of the four-message exchange, then what values are used in the IP datagrams in the four-message exchange? For each of the four DHCP messages (Discover/Offer/Request/ACK DHCP), indicate the source and destination IP addresses that are carried in the encapsulating IP datagram.

Answer: The DCHP client and server both use 255.255.255.255 as the destination address. The client uses source IP address 0.0.0.0, while the server uses its actual IP address as the source.


7.  What is the IP address of your DHCP server?

Answer: The IP address of the DHCP server is 172.18.218.1

8.  What IP address is the DHCP server offering to your host in the DHCP Offer message? Indicate which DHCP message contains the offered DHCP address.

Answer: The DHCP server offered the IP address 172.18.218.105 to my client machine. The DHCP message with “DHCP Message Type = DHCP Offer” contained the offered IP.


9.  Explain the purpose of the router and subnet mask lines in the DHCP offer message.

Answer: The router line indicates to the client what its default gateway should be. The subnet mask line tells the client which subnet mask it should use.



10.  In the example screenshots in this assignment, the host requests the offered IP address in the DHCP Request message. What happens in your own experiment?

Answer: In my experiment, the host requests the offered IP address in the DHCP Request message.



11.  Explain the purpose of the lease time. How long is the lease time in your experiment?

Answer: The lease time is the amount of time the DHCP server assigns an IP address to a client. During the lease time, the DHCP server will not assign the IP given to the client to another client, unless it is released by the client. Once the lease time has expired, the IP address can be reused by the DHCP server to give to another client. In my experiment, the lease time is 8 days.




12.  What is the purpose of the DHCP release message? Does the DHCP server issue an acknowledgment of receipt of the client’s DHCP request? What would happen if the client’s DHCP release message is lost?

Answer: The client sends a DHCP Release message to cancel its lease on the IP address given to it by the DHCP server. The DHCP server does not send a message back to the client acknowledging the DHCP Release message. If the DHCP Release message from the client is lost, the DHCP server would have to wait until the lease period is over for that IP address until it could reuse it for another client.

Download Link:

How To Download:
Please disable any Ad Block software if any beforehand or this may not work properly.

1. Please wait for 5 seconds.


2. Click on "Skip Ad".


3. Click on "Download through your browser".