SIT716留学生编程 写作、data课程编程

” SIT716留学生编程 写作、data课程编程Assessment InformationSIT716: COMPUTER NETWORKS AND SECURITYAssessment 1b: Bi-weekly Report (Weeks 3-4)KEY INFORMATIONDue: Sunday August 9th by 11:59pmWeight: 6% of total mark for this unitWord limit: 1 to 2 pagesIndividual AssessmentPURPOSEShort answer questions to assess and reinforce learning of the concepts of Weeks 3-4 byexploring convergence of dynamic routing protocols and possible cyber-attacks on the TCPdisconnection exchange.TASK(S)Dynamic routing protocols such as OSPF are a key technology in the reliable operation ofnetworks in most large organisations. To ensure correct information is communicated,installations of OSPF are usually configured to include a hash value in OSPF packets to allowtheir Contents to be validated by receivers.Consider a scenario where an attacker gains limited control over a router which interconnectsthree or more networks. The access gained by the attacker only allows them to activate ordeactivate (turn on or off) any of the network interfaces on that router.i. Describe how OSPF would react to the attacker deactivating one of the networkinterfaces On the router.ii. Discuss the possible impacts on the network if the attacker were to repeatedlydeactivate and reactivate one of the network interfaces on the router.Assessment InformationSUBMISSION DETAILSSIT716留学生作业 写作、data课程作业 辅导Your answers should be submitted via CloudDeakin to the TurnItIn-enabled Assignment Folderfor the Assignment 1b – Weeks 3-4 Bi-Weekly Report. Your answers to each question and subquestionmust be Clearly identified in your submission. Acceptable file formats are Worddocuments, PowerPoint documents, PDF documents, text and rich text files, and HTML.Compressed files, such as ZIP files or RAR files are not accepted and will not be marked.After submitting your assignment you should receive an email to your Deakin email addressconfirming that it has been submitted. You should check that you can see your assignment inthe Submissions view of the Assignment folder after upload, and check for, and keep, the emailreceipt for the submission.ACADEMIC MISCONDUCTAcademic misconduct and plagiarism is subjected to penalties.Plagiarism includes and not limited to: Copying others work without appropriate referencing Re-using Assignment material completed by other students Contracting others to do assessment tasks on your behalf. httpss://www.deakin.edu.au/students/study-support/referencing/academic-integrityLEARNING OUTCOMESThis assignment assesses the following Graduate Learning Outcomes (GLO) and related UnitLearning Outcomes (ULO):Graduate Learning Outcome (GLO) Unit Learning Outcome (ULO)GLO1: You will be required to work withcontent relevant To computer networks,network security, and the IT discipline ingeneral.ULO1: You will be required to explain thearchitecture and operation of computernetworks, security attacks, and defensivemeasures.ULO2: You will be required to explainnormal and abnormal behaviour ofnetwork protocols.ULO3: You will be required to explainhow cybersecurity activity can beidentified.Assessment InformationEXTENSIONSNo extensions will be considered for this assessment unless a request is submitted through theCloudDeakin and approved by the Unit Chair (enter SIT716 unit page and click Assessment -Extension request). Assignment Extensions are normally only approved when students applybefore the due date. The Unit Chair may ask you to supply supporting documentation about thedifficulties you are facing, and evidence of the work you have completed so far.A marking penalty will be applied where the assessment task is submitted after the due datewithout an approved extension as follows:a. 5% will be deducted from available marks for each day up to five daysb. where work is submitted more than five days after the due date, the task will not bemarked And The student will receive 0% for the task.Day means working day for paper submissions and calendar day for electronic submissions.(This assessment task uses electronic submission)Assessment InformationSIT716 Computer Networks and SecurityAssessment 1: Bi-Weekly Report (Course 2)Criteria High Distinction(80 100)Distinction(70 79)Credit(60 69)Pass(50 59)Fail(0 49)Task iCriteria 1:50%Discuss OSPFs reaction to alink being deactivated.How OSPF would react to alink being deactivated hasbeen clearly explained andyou have clearlydemonstrated insight intothe potential impacts onnetwork connectivitygenerally and how thatwould be influenced bydifferent possible changesto network topology.How OSPF would react to alink being deactivated hasbeen clearly explained andthere is good insight into theimpact on the networkconnectivity more generally.How OSPF would react to alink being deactivated hasbeen adequately explained.Description of how OSPFwould react to a link beingdeactivated is unclear and/orthere are minor gaps in theanswer.Answer does not correctlyexplain how OSPF will reactto the state of a link beingdeactivated.Task iiCriteria 2:50%Discuss OSPFs reaction tothe state of a link rapidlybeing deactivated andreactivated.How OSPF would react to alink being rapidlydeactivated/reactivated hasbeen clearly explained andthere is good insight intothe potential impacts onnetwork connectivity andhow that would beinfluenced by differentpossible changes tonetwork topology.How OSPF would react to alink being rapidlydeactivated/reactivated hasbeen clearly explained andthere is good insight into theimpact on the networkconnectivity more generally.How OSPF would react to alink being rapidlydeactivated/reactivated hasbeen adequately explained.Description of how OSPFwould react to a link beingrapidly deactivated/reactivated is unclear and/orthere are minor gaps in theanswer.Answer does not correctlyexplain how OSPF will reactTo the state of a link beingrapidly deactivated/reactivated.如有需要,请加QQ:99515681 或邮箱:99515681@qq.com

添加老师微信回复‘’官网 辅导‘’获取专业老师帮助,或点击联系老师1对1在线指导