Application layer protocol, Computer Network Security

Assignment Help:

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in decimal and hence deduce the application layer protocol this capture is destined to.

00 15 56 3a 4c 79 00 13 02 4a 88 97 08 00 45 00  
00 3e 0f 8b 00 00 80 11 a7 90 c0 a8 01 42 c0 a8  
01 01 05 61 00 35 00 2a 76 06 f3 5b

Problem b) A UTM graduate has been told to configure a small branch office to provide internal and external network connectivity. The office consists of 6 clients (4 wired and 2 wireless laptops), 1 server with two Ethernet network adapters, 2 network printers, 1 wireless router, one 8-port Ethernet switch  and 1  basic ADSL gateway. All the clients will be on dynamic IP addressing and there is need for content filtering on the Internet. Staff are not allowed to access certain external sites e.g. Facebook or download some specific content such as mp3 files.

  The layout of the office is given below:

2114_round trip time1.png

Sketch a suitable physical network diagram for the office bearing in mind sound design principles. Your diagram should show how you would interconnect the devices present. You should mention specific system software you would be required as well as the topology, the network class you will be using. You should describe how you would configure specific services, for example Proxy, DHCP, ... on the server. Additionally, you should give the network configurations of 1 wired PC , 1 laptop, 1 printer, both server NICs and the ADSL gateway.


Related Discussions:- Application layer protocol

Pgp encryption, Produce a short report of your experiences in installing an...

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items: A de

Access control devices-cryptography, ACCESS CONTROL DEVICES Successful a...

ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

encrypt and decryption using rsa with the prime numbers, Problem (1) -...

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

Describe how a cellular network works, Problem 1 . Show various features of...

Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

Evaluations, Evaluations, Assessment, and Maintenance of Risk Controls W...

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

What is the use of digital certificate, Question: (a) What is the use ...

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

Types of errors detection in crc , CRC can detect the following errors bett...

CRC can detect the following errors better than check sums. a) Vertical errors b) Burst errors a) VERTICAL ERRORS:  This kind of error happens due to a hardware fai

Pcm encoder, You have been asked to setup a remote temperature sensing syst...

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The

Wireless local area network, a) Wireless local area network (WLAN) technol...

a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd