Categories
Telecommunications Engineering homework help

Instructions Assignment #4: In order to complete assignment #4 you will need to

Instructions
Assignment #4:
In order to complete assignment #4 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. Use examples from the readings, lecture notes and outside research to support your answers. All questions must answered with viable support and detail.  Your answer cannot simply be a cited source answering the question.  Please be sure to follow APA guidelines for citing and referencing source. 
This assignment is a summative assessment for Course Objective 4.
1. What is a softphone?
2. List four typical active attacks against Wireless Local Area Networks (WLAN). Briefly describe each one.
3. What are some of the security concerns in the Internet Control Management Protocol (ICMP)?
4. Which wireless technology does not operate in the 2.4Ghz frequency range?
a. IEEE 802.11a
b. IEEE 802.11b
c. IEEE 802.11g
d. Bluetooth
5. Routing information is encrypted using which technology:
a. S-ATM (Secure ATM)
b. Link encryption
c. IPSec
d. File Transfer protocol (FTP)
6. List at least five SMS attack types. Could SMS attacks cripple a mobile phone network? Why or why not? Explain.

Categories
Telecommunications Engineering homework help

Conduct a web search for the key words “SMS Language”. Then continue: Get the

Conduct a web search for the key words “SMS Language”. Then continue:
Get the references of 2 sites that come up with the best, most informative results.
Based on your scanning of these 2 sites
Write down 20 phrases in SMS language and its English translation, in the following format: SMS: English translation. For example, tyvm: thank you very much
Out of the 20 phrases list your favorite or most used 5
Please remember to provide your sources and citation
Do you use emoticons with your SMS texting? With emailing? What is emoticon for “confused”?

Categories
Telecommunications Engineering homework help

Instructions Outline. The paper outline is to be based on the week 2 proposal to

Instructions
Outline. The paper outline is to be based on the week 2 proposal topic.  Do not include your week 2 material.  Do not use the paper organization below as your outline, do not write a mini-paper, but use it as a guide to construct your outline.  See the examples in the link below for outline types (think TOC). 
See: https://owl.purdue.edu/owl/general_writing/the_writing_process/developing_an_outline/types_of_outlines.html. 
Your outline will include:
Introduction
Body
Conclusion
References (at least ten).
Proposal Attached for reference*

Categories
Telecommunications Engineering homework help

Instructions Assignment #3:  In order to complete assignment #3 you will need to

Instructions
Assignment #3: 
In order to complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading.  Use examples from the readings, lecture notes and outside research to support your answers. All questions must answered with viable support and detail.  Your answer cannot simply be a cited source answering the question.  Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
This assignment is a summative assessment for Course Objective 3.
1. Describe traditional telephony and network layouts.
2. Discuss mobile telephony and cellular service.
3. What is GSM and how does it work?
4. Do digital signal from phone to towers utilize low bandwidth or high bandwidth usage? Expand on your answer.
5. Are GSM specifications hardware-specific? Why or why not?
6. Describe FDMA, TDMA, and CDMA. Differentiate their subtle applicability. Then an example of a provider for each of these technologies.
7. Enumerate IP Telephony Network issues and vulnerabilities, and briefly describe each issue or vulnerability. List some common attacks on IP Telephony.
8. Define “rogue” and “softphone”.
9. List IP Phone countermeasures (at least 5).

Categories
Telecommunications Engineering homework help

Research the key words “IP telephony” or “telephony”. Then complete the followin

Research the key words “IP telephony” or “telephony”. Then complete the following: 
Get the references of 3 sites that come up with the best, most informative results.
Based on your scanning of these 3 sites,
Summarize a one paragraph description of what IP Telephony means
Provide which source you used exactly where in your paragraph, by providing the article author’s last name, year of the publication of the article or the last modified date of the website, and the page or paragraph number where your citation can be found. Use the following format (authorLastName, year, p.# or para.#).
List 3 examples of services that use IP Telephony, with a short description of each service

Categories
Telecommunications Engineering homework help

Instructions Proposal/idea Paper.  Submit an 3 page concept/idea paper IAW APA f

Instructions
Proposal/idea Paper. 
Submit an 3 page concept/idea paper IAW APA format on an approved topic. Paper organization will include (use as headings):
Introduction.
Problem Statement.
Relevance and Significance.
References (at least five).
2. Pre-approved research topic:
� Wireless technology security
The proposal/idea paper “sets the stage” for your research paper – which will be on the same topic, assuming your paper receives a passing grade.

Categories
Telecommunications Engineering homework help

Conduct a web search for the key words “parallel computing”. Then complete the f

Conduct a web search for the key words “parallel computing”. Then complete the following: 
Get the references of 5 sites that come up with the best, most informative results.
Based on your scanning of these 5 sites,

Summarize a one paragraph description of what parallel computing means
Provide which source you used exactly where in your paragraph, by providing the article author’s last name, year of the publication of the article or the last modified date of the website, and the page or paragraph number where your citation can be found. Use the following format (authorLastName, year, p.# or para.#). Try to use all 5 sources

Find an example of service or device that uses parallel computing.
This assignment is a formative assessment for Course Objective 2.

Categories
Telecommunications Engineering homework help

Instructions Assignment #2: In order to complete assignment #2  you will need to

Instructions
Assignment #2:
In order to complete assignment #2  you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #). Use examples from the readings, lecture notes and outside research to support your answers. All questions must answered with viable support and detail.  Your answer cannot simply be a cited source answering the question.  Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
This assignment is a summative assessment for Course Objective 2.
1. Time division multiple access was used early in cell phone systems to carry how many voice channels on a single frequency derived channel?
2. What code does CDMA use to encode individual cell phone conversations?
3. Which cell phone transmission technology uses spread-spectrum transmission?
4. Which of the following has a complex security system that is based on encryption: PCS, GMS, PSTN, or WAP?
5. Through a web search contrast CDMA with PCS systems. Which major providers offer CDMA, and which PCS?
6. Search for the keyword WAP on http://Scholar.Google.com. Are there any details on how to hack during a WTLS-to-SSL conversion? Write your findings in detail here, including proper citation and references.

Categories
Telecommunications Engineering homework help

Instructions  Assignment #1: In order to complete assignment #1 you will need to

Instructions
 Assignment #1:
In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. Use examples from the readings, lecture notes and outside research to support your answers. All questions must answered with viable support and detail.  Your answer cannot simply be a cited source answering the question.  
This assignment is a summative assessment for Course Objective 1.
1. What is the difference between active and passive security threats?
2. List and briefly define 3 categories of passive and active security attacks.
3. List and briefly define at least 3 categories of security services.
4. List and briefly define at least 3 categories of security mechanisms.
5. Create a matrix highlighting the relationship between the security services and the mechanisms listed in questions 3 and 4. Place services to the left (vertically), the mechanism to the right (horizontally), then place an X for the applicable mechanisms to the services.
6. What are the essential differences of a symmetric cipher?
7. How many keys are required for two people to communicate via a symmetric cipher?
8. What is triple encryption?
9. List ways in which secret keys can be distributed to two communicating parties.
10. What are the fundamental differences between AES, DES, and 3DES?

Categories
Telecommunications Engineering homework help

Instructions  Assignment #1: In order to complete assignment #1 you will need to

Instructions
 Assignment #1:
In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. Use examples from the readings, lecture notes and outside research to support your answers. All questions must answered with viable support and detail.  Your answer cannot simply be a cited source answering the question.  
This assignment is a summative assessment for Course Objective 1.
1. What is the difference between active and passive security threats?
2. List and briefly define 3 categories of passive and active security attacks.
3. List and briefly define at least 3 categories of security services.
4. List and briefly define at least 3 categories of security mechanisms.
5. Create a matrix highlighting the relationship between the security services and the mechanisms listed in questions 3 and 4. Place services to the left (vertically), the mechanism to the right (horizontally), then place an X for the applicable mechanisms to the services.
6. What are the essential differences of a symmetric cipher?
7. How many keys are required for two people to communicate via a symmetric cipher?
8. What is triple encryption?
9. List ways in which secret keys can be distributed to two communicating parties.
10. What are the fundamental differences between AES, DES, and 3DES?