Design the network and draw the network diagram

Assignment Help Computer Networking
Reference no: EM13944890

Assignment

An organization has 2 server computers and a number of desktop computers and a few printers. All of them are connected together via an internal network, and the network is connected to the Internet via the border router of the organization. From the outside of the organization, on the Internet, only these 2 server computers are visible. One of them is the email server (IP address: e1.e2.e3.e4), and the other one is the web server (IP address: w1.w2.w3.w4). In other words, only these 2 server computers accept requesting incoming network traffic. All desktop computers are allowed to access the Internet, without any restriction. Therefore, they accept responding incoming network traffic, but not accepting any requesting incoming network traffic.

• Please design the network and draw the network diagram. You have the freedom to assume the internal network structure. In the diagram, in addition to the 2 servers, you should also include a few desktop computers and a printer. Please explain the rationale on why you put a computer or a printer in its designated location, 1 example for each location. A subnet (or a segment) is regarded as the same location. (hint: a firewall or a few firewalls, depending on your design, are needed to regulate the network traffic)

• Please write down the firewall rules to fulfil the access requirement of the organization. Please also explain the meaning of each firewall rule. If you have multiple firewalls, you should explain to which firewall each of the rules belongs. Below is a set of sample firewall rules. Please follow the sample firewall rule format to write down your firewall rules. Please also be advised that the order of the rules matters.

The meaning of the columns of the sample firewall rules in the screen dump is as follows. Please use only the information provided here and the textbook for your assignment. The information provided here is overly simplified from iptables manual to make the assignment manageable.

• action - ACCEPT means accepting the connection, and REJECT means not.
• prot - the protocol of the connection, e.g., tcp, udp, icmp, and all etc.;
• opt - please ignore;
• source - source IP address of the packet;
• destination - destination IP address of the packet, plus extra information, for example: o "tcp dpt: https" means that the TCP port of the destination host is https.

o state lists the connection state for the firewall to match on to perform the action of the rule. RELATED: the connection is new, but is related to another. connection already permitted; ESTABLISHED: the connection is already established.

o reject-with: please ignore. No need to include it in your assignment.

2. Please write a summary to briefly explain to senior managers, who know very little on computer security but have a general understanding of IT, on what a buffer overflow problem is and what the consequences of a buffer overflow problem could cause. What programming techniques the software development team should adopt to avoid buffer overflow problems in the software it develops.
Below is from a Nessus report on a computer.

• Pretending that the application is developed by the software development team of this organization, how to fix the problem.

• Accepting the recommendations given by the report, what action you should take? Assuming that this computer is one of the many desktop computers, and an automatic system for software updating is in operation. Write down the operational steps, by following the principle of "one, some, and many".

• Assuming that this computer is a server computer, please write a brief report to the senior managers, who know very little on computer security but have a general understanding of IT, explaining why the software Firefox (a web browser) should not be installed on the computer. In your report, you should use trusted information sources to explain to your senior managers on the best practices of operating system security administration. The senior managers trust only the text books of this unit, nothing else.

Reference no: EM13944890

Questions Cloud

What led up to welfare reform and what does it mean : How is economic aid an instrument of American foreign policy? How is military deterrence an instrument of American foreign policy?
Case study-wal-mart company or robert bosch company : Choose one company " Wal-Mart company or Robert Bosch company". For this company, explain how successful you think it is and discuss the strategic reasons behind that success.
Critical observations about the work : Make some critical observations about the work (comparing and contrasting ideas with the work of others, noting limits in arguments, establishing key assumptions made).
Write an oops in java to play the game of life : Write an object oriented program in Java to play the Game of Life and investigate the patterns produced by various initial configurations
Design the network and draw the network diagram : Please design the network and draw the network diagram. You have the freedom to assume the internal network structure.
How many standards are there in your chosen quality area : How many Standards are there in your chosen Quality Area? (In your answer state the Quality Area chosen, and specify how many Standards there are in it).
Measures of central and variability tendency : Application: Measures of Central and Variability Tendency, While researchers typically show frequency distributions in a table as a way to organize large amounts of data, you may have also seen frequency distributions displayed graphically, using ..
What is the reinforcement theory : What is the Reinforcement Theory? What is the Social Learning Theory? Other Theories?
Financial planning service : Thank you for choosing ABC Financial Planning Service, we highly appreciate your reliance to us and surely bring our high quality services back for your future planning advice.

Reviews

Write a Review

Computer Networking Questions & Answers

  Process routers and switches

Do you think that one day, routers and switches will not be needed? Why?

  How would you explain the concept of packet switching

How would you explain the concept of packet switching

  What is the server port number for data download

Use Wireshark tool to capture packets when you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet.

  What ip address will be the destination on a broadcast

What IP address will be the destination on a broadcast message sent to your subnet?

  Find out a tcp three-way handshake for a telnet ftp or ssh

question 1 find a tcp three-way handshake for a telnet ftp or ssh session. what is the significance of the tcpthree-way

  Compute udp checksum for internet department

Suppose that the receiver computes the UDP checksum for the Internet department received UDP and finds that matches the value transferred to the checksum field.

  Which layer of tcp/ip reference model contains information

Which layer of TCP/IP reference model contains the information on source port number and destination port number? Why do we need the source and destination port numbers when we already have source and destination IP addresses?

  Estimate the time required to find the optimal member of n

What is the computational time to find the optimal member of Na using the Bayesian Dirichlet score. Estimate the time required to find the optimal member of N?

  Determine the primary security concerns

Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns

  Counteract the force of gravity

How does gravity affect the flow of blood in your body? The flow of sap in trees? How have organisms evolved to counteract the force of gravity?

  Nat/pat helped address the ipv4 address

Compare MAC with IPv4 addresses providing an example of each, how those addresses are assigned and what role they play in the operation of a network.

  Design a wireless network

(15%) Allen FINALLY has been able to secure broadband service to his home in a remote area of the country via newly installed telephone lines. He had a powerful desktop. But he wants to be able to sit on his deck when using his new laptop to do his o..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd