1. Provide the different access protocols, such as Carrier Sense Multiple Access (CSMA), Carrier Sense Multiple Access with Collision Detection (CSMA/CD) and Wavelength Division Multiplexing Access (WDMA).
Where would these types of protocols would be used?
Explain the situations with examples.
2. Describe an example of the Public Key Infrastructure that would explain the differing usages of symmetric and asymmetric encryption and how these encryption methods might use either a substitution or a transposition cipher.