Detect or prevent network security breaches

Assignment Help Computer Networking
Reference no: EM131704442

Question:

In order to detect or prevent network security breaches, you must understand the Internet protocols as well as the attacker does. The protocols originate from publicly available Requests for Comments, or RFCs. The official repository and publisher of all RFCs is the RFC editor. The purpose of this short research paper is to practice locating and referring to RFCs

Read the page, find the in-text "RFC SEARCH". In the search field "Title/Keyword," type in the complete name of the protocol (eg. "Internet Protocol"). By default, the search results are displayed by RFC number (ascending).

Understanding Internet and TCP Protocols

1. Find and identify the RFCs for IP and TCP.

RFC _______ - Internet Protocol
RFC _______- Transmission Control Protocol

2. Refer to the RFCs to answer the following questions.

Questions about IP

1. What two basic functions does IP implement?

2. What four key mechanisms does IP use to provide its service?

3. Via what protocol does IP communicate errors?

4. In the IP header, what is the Identification field used for?

5. A number of bits within the IP header are designated reserved or optional; why would these be important in network security?

Questions about TCP

1. What is the difference between a socket and a connection?

2. What are the five calls the TCP/user interface provides for?

3. What is a passive OPEN request?

4. Describe the three-way handshake.

5. At a workstation, open some web pages.

Identify the ports your machine is listening on and the state of the various connections it is holding

Verified Expert

The assignment is about how the two protocols i.e. Internet Protocol (IP) and Transmission Control Protocol (TCP). It talks about the various technical specification and features of these protocols mentioned in the respective RFC. It will certainly help in understanding the network security concepts as these two protocols play an every important role in network communication. The assignment contains several questions to be answered based on the explanation available in the RFC, all the questions are answered in Microsoft Office Word Document.

Reference no: EM131704442

Questions Cloud

Examine the major benefits for an organization to use ssds : Use the Internet to research the benefits and hazards to organizations that use SSD storage devices. Examine the major benefits for an organization to use SSDs.
Recording a hospital expenses by natural classification : Illustrate the difference between recording a hospital's expenses by natural classification and recording by function. Discuss which is more informative.
Illustrates when a manager should approach a decision : Take a position on whether or not managerial groups within a large organization are more likely to make better decisions than individual managers.
Limit to per capita gdp : If natural resources are ultimately finite, does this imply that there is a limit to per capita GDP? Explain. Provide any references used.
Detect or prevent network security breaches : detect or prevent network security breaches, you must understand the Internet protocols as well as the attacker does. The protocols originate
Discuss your examination process on the tissue sample : discuss your examination process on the tissue sample and the results you expect to observe
Discuss case of a not-for-profit hospital : The chief administrative officer of a not-for-profit hospital, Vera Thomas, is attempting to find resources to add a new wing to the hospital.
Absolute advantage in the production : Suppose the United States has an absolute advantage in the production of 2 goods compared to another country.
Discuss the key characteristics of public goods : What is it about pure public goods that means that the market will not adequately provide those goods?

Reviews

len1704442

11/3/2017 2:46:06 AM

Read the page, find the in-text "RFC SEARCH" link, and click on it. In the search field "Title/Keyword," type in the complete name of the protocol (eg. "Internet Protocol"). By default, the search results are displayed by RFC number (ascending). Also, by default, the number of results shown is 25. Click "All" to show all the results.

Write a Review

Computer Networking Questions & Answers

  Explain a network storage technology

Explain a network storage technology that can use the existing network to make data on network-connected hard disks accessible to comapny users.

  What is a possible downside of making such a choice

What kind of connectivity solution makes the most sense if you want to use the same technology for all users? What is a possible downside of making such a choice?

  What is the logical address

A router uses the network address on a data packet for what purpose?

  Describe at least two data transmission technologies

Define each protocol and describe at least two data transmission technologies associated with the protocol. Include the bandwidth limitations of each technology and protocol.

  Managing access to an active directory environment located

How do you plan to recover from these types of loss of current AD DS and other critical information. What utilities might you investigate to help accomplish your plan

  Administrative distance for directly connected staic route

Implement extended ACL for IPv4 to block LAN 11 and LAN 12 to access LAN 22 for web browsing at port 80 -  Explain the differences between next-hop static route, directly connected static route and a fully specified static route.

  Which is better or controlled access or contention

Which is better, controlled access or contention? Explain.- Define two fundamental types of errors.- Is there any difference in the error rates of lower-speed lines and higher-speed lines?

  Wireless networksconsider a warehouse that is 60m by 30m

wireless networksconsider a warehouse that is 60m by 30m. wireless networking is required so that up to 20 staff

  What are the four factors that contribute to attenuation

What are the typical core/cladding sizes (in microns) for multimode fiber?

  Identify the critical path and other paths through network

Construct the project activity network using AON methodology and label each node. Identify the critical path and other paths through the network

  In the early years of web authoring websites commonly

in the early years of web authoring websites commonly posted operating system browser and even resolution

  The year of encryption

Formulate a possible solution that utilizes symmetric or asymmetric cryptography, and describe the advantages and disadvantages of the selected solution.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd