Bull an application on computer a in network 1 is sending a

Assignment Help Computer Networking
Reference no: EM13380323

• An application on computer A (in network 1) is sending a message to an application on computer B (in network 2). 
• There will also be a reply going back the other way.
• TCP is the transport layer protocol used for the messages and IP the network later protocol for the network. 
• Ethernet is the datalink layer protocol for all the connections in the network.
• You can assume that computer A has obtained the destination port and IP address (probably from DNS)
• The above diagram shows the path taken by the messages as determined by the routing information held by the routers, etc.
• Network 1 is a class B network
• Network 2 is a small class C network
• Routers 3, and 5 belong ISPs with class B networks, and router 4 belongs to a top-level ISP with a class A network.
• Computer A is made by Spike technologies which has a MAC OUI of 45-FE-2A, computer B from Secombe technologies with an OUI of D2-34-C4, the routers are a mix of Trek Technologies with OUI 6B-3C-24 and Kirk Corporation with OUI 7F-9C-37

1447_What security vulnerabilities and threats can you see.png

You are to:

1. Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the above description. State clearly in your submission the choices you have made for these addresses.
Do not give the addresses in binary but in the X.X.X.X decimal format for the IP addresses, the hexadecimal format for MAC addresses and decimal numbers for the port numbers.

2. For the delivery of the message from Computer A to Computer B, for each step along the way show the source and destination
a. MAC addresses
b. IP addresses
c. Port addresses
Making it clear which is the source and which is the destination, in what packet or frame these addresses appear (IP, TCP, Ethernet) and what the order of encapsulation is.

3. The same as number 2, but for the reply from computer B to computer A

4. These messages are sensitive. What security vulnerabilities and threats can you see? What measures would you put in place to remove or minimize the vulnerabilities?

Reference no: EM13380323

Questions Cloud

Concept learninga write an algorithm called find-g to nd a : concept learninga write an algorithm called find-g to nd a maximally-general consistent hypothesis. you can assume the
Well-posed machine learning problemsa what is required to : well-posed machine learning problemsa what is required to dene a well-posed learning problem ?b here are two potential
Message forwarding a computer in the computing department : message forwarding a computer in the computing department has just been turned on. the user starts up their web browser
Question - subnettingconsider the following scenarios -a : question - subnettingconsider the following scenarios -a you are an isp that has been assigned a class b network with
Bull an application on computer a in network 1 is sending a : bull an application on computer a in network 1 is sending a message to an application on computer b in network 2.nbsp
1 list the three fundamental security properties and for : 1. list the three fundamental security properties and for each give an example of failure. justify your answer based on
You are working on a new web site for cruzes inc the web : you are working on a new web site for cruzes inc. the web site is aimed at providing travel information to consumers
The aim of this project is to design developand evaluate a : the aim of this project is to design developand evaluate a 2d game for pc. you can choose any type of game you like
Nbspa stack evaluating the postfix expression lrm using : nbspa stack evaluating the postfix expression lrm using linked list implementationthis step will use the queue

Reviews

Write a Review

Computer Networking Questions & Answers

  Write steps for computer in company browse site using url

Personel.mycompany.com in URL address box to browse this Web site. Write down steps do you take so that each computer in company can browse the site using URL?

  Reason why you would not install cables

Give me two reason why you would not install cables in ducts that are used to transport dust loos stock, flammable vapors or in those ducts that are used for ventilattion for cooking?

  What is still need to be completed main referencesr

7502ICT - Advanced Networking: Project. In order to keep track of the progress of the project, you will have to submit an interim progress report describing (a) brief overview of the project (b) what work has been completed so far and (c) what is s..

  Part- aduring the labs we used the national vulnerability

part- aduring the labs we used the national vulnerability database. select a recent vulnerability from that database

  What is the type of block of the abbreviated ipv6 address

list the networking and communication devices required, including the IP addresses, product numbers, the cost of each and the approximate total cost.

  What is meant by a nondeterministic protocol

What is meant by a nondeterministic protocol and what are the various combinations of circuit switched and packet switched networks and connection-oriented and connectionless network applications?

  1 your experiences with the social networking sites like

1. your experiences with the social networking sites like craig list etc etc?2. include how long you have been using

  Which of following is not class of client-server processing

Retail point of sale systems are an example of horizontal partitioning of data processing.

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Need assistance on how to write a good report on named

need assistance on how to write a good report on named comparison of voice and ear biometrics as a measure to passport

  Explain the reasons for your selection

Select a preferred supplier and briefly explain the reasons for your selection - provide the information that you are summarising. Higher marks will be awarded to answers which contain more complete information.

  Explain privacy issues related with acxiom-s business

Break into small groups with classmates, and explain privacy issues related with Acxiom's business. Do you believe they are doinganything wrong?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd