المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : حل واجب T324 تحميل 0544321455 دولي: 00966544321455 بريد [email protected]



أسواق
18-10-2014, 09:40 PM
حل واجبات الجامعة العربية المفتوحة
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد

حلول نموذجية مضمونة وغير مكررة - قسم خاص للتربية

KSA-Kuwait - Bahrain -Oman - Jordon -Lebanon -Egypt-Sudan

الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه

اتصل : O544321455 - OO966544321455
واتس اب: 966544321455+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora

حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة


حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.3.2.1.4.5.5



T324: Keeping ahead in ICTs
Tutor-Marked Assignment, Fall 2014 2015

Cut-Off Date: 27/11/2014 Total Marks: 100
Q1. Investigating socio-technical system
You have studied in block three of the course materials the socio-technical system approach for investigating system failures. To demonstrate your understanding of this part of the course, we are asking you to make some investigations regarding a specific type of socio-technical system which is academic social networks as for example eLearners and Academia. To this end, answer to the following questions:
1. Draw the system map that you think representative for the given system. The system map must show at least four technical components, two social components, and two components that belong to the system environment.
2. Present briefly two processes of the given system.
3. From your point of view, provide one major technical reason that may lead such system to failure?
4. From your point of view, provide one major non-technical reason that may lead such system to failure?
5. What are the system questions that should be investigated to identify or avoid the reasons of failure determined in the previous two parts?


Q2. Innovation in IEEE 802.11
You have studied in Block 1 the fundamental concepts, techniques, and mechanisms used in wireless communication in general and in more particularly in IEEE 802.11 standard. Nevertheless, the course does not emphasize on the evolution of this standard. In this problem, you will discover the innovative standard IEEE 802.11ac. Using the AOU e-library and Internet resources, you are asked to write an essay presenting an overview on the standard IEEE 802.11ac while providing its major physical layer specifications (e.g., throughput, RF bandwidth, channel bonding, number of MIMO spatial streams, modulation technique). Your essay should contain at least 500 words and the list of references. It should not include unapproved sites as Wikipedia or like citation. Marks will be deducted in case of essay lacking reliable references or containing errors in syntax, structure, and style.
Q3. Sniffing traffic using Wireshark
Wireshark is the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development and education. The software and its user guide could be downloaded from its home page (i.e., http://www.wireshark.org/). Besides, you can find attached to the TMA a file entitled “Introduction to Wireshark” that can help you to start working rapidly with this software.

In this question, you will make some traffic analysis using this passive measurement tool. To start the experiment, you should install and run the software on your mobile device. We recommend that you use laptop having Microsoft Windows as operating system and connected to the network through Wi-Fi. While Wireshark is running, enter the URL of Moodle to navigate to its homepage and then enter your login credentials. During this communication, your browser will contact the HTTP server hosting Moodle and exchange HTTP messages with it. The frames containing these HTTP messages will be captured by Wireshark.

After your browser has displayed your Moodle homepage, stop Wireshark packet capture by selecting stop in the Wireshark capture This will cause the main Wireshark window to display all packets captured since you began packet capture. You now have live packet data that contains all protocol messages exchanged between your laptop and other network entities. The HTTP message exchanges with the server should appear somewhere in the listing of packets captured. But there will be many other types of packets displayed as well.

For answering the following questions, you should look at the details of frames and subfields in the middle Wireshark It is mandatory that you provide snapshots from the software to prove the accuracy of your answers. Otherwise, no grades will be allocated.

1. What is the MAC and IP addresses of the wireless network connection of your laptop?

2. What is the MAC address of the wireless access point to which you are connecting?

3. What is the IP address of the server hosting Moodle?

4. Find the user and password of your Moodle account by looking at the data sent in the POST packet?

5. What do you conclude about the security of the server hosting Moodle in your branch?

6. Provide an overview on HTTPS. Your essay should include at least 200 words and the references.











حل واجبات الجامعة العربية المفتوحة
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد

حلول نموذجية مضمونة وغير مكررة - قسم خاص للتربية

KSA-Kuwait - Bahrain -Oman - Jordon -Lebanon -Egypt-Sudan

الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه

اتصل : O544321455 - OO966544321455
واتس اب: 966544321455+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora

حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة


حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.3.2.1.4.5.5