Application layer protocol, Computer Network Security

Assignment Help:

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in decimal and hence deduce the application layer protocol this capture is destined to.

00 15 56 3a 4c 79 00 13 02 4a 88 97 08 00 45 00  
00 3e 0f 8b 00 00 80 11 a7 90 c0 a8 01 42 c0 a8  
01 01 05 61 00 35 00 2a 76 06 f3 5b

Problem b) A UTM graduate has been told to configure a small branch office to provide internal and external network connectivity. The office consists of 6 clients (4 wired and 2 wireless laptops), 1 server with two Ethernet network adapters, 2 network printers, 1 wireless router, one 8-port Ethernet switch  and 1  basic ADSL gateway. All the clients will be on dynamic IP addressing and there is need for content filtering on the Internet. Staff are not allowed to access certain external sites e.g. Facebook or download some specific content such as mp3 files.

  The layout of the office is given below:

2114_round trip time1.png

Sketch a suitable physical network diagram for the office bearing in mind sound design principles. Your diagram should show how you would interconnect the devices present. You should mention specific system software you would be required as well as the topology, the network class you will be using. You should describe how you would configure specific services, for example Proxy, DHCP, ... on the server. Additionally, you should give the network configurations of 1 wired PC , 1 laptop, 1 printer, both server NICs and the ADSL gateway.


Related Discussions:- Application layer protocol

Caralouer case study: analysis and design techniques, CarALouer provides re...

CarALouer provides rental of cars to its customer on a regional basis i.e. a car is attached to a regional home-base which also houses a regional office of the company. Each regi

Principles of information security, The key concepts and frameworks covered...

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

Explain the terms used in network security, Question 1 (a) Explain b...

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone

Computer security incident response team, QUESTION 1 Using a real life ...

QUESTION 1 Using a real life scenario or context list and set the scene for at least four advantages that an organized incident response program promotes. QUESTION 2 Yo

Spambot detection - spam mail, Spambot Detection: The  previous studie...

Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is

Draw the network layout, Question : a) Below is a capture of an Etherne...

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

Attackers motives behind the cyber attack, Attacker's Motives behind the Cy...

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

State the fermat-euler theorem, Question: (a) Prove that every positive...

Question: (a) Prove that every positive integer n can be factorized into a product of prime powers. (b) State the Fermat-Euler theorem as needed in the RSA system. (c) Us

How Ethical are Major Internet Companies?, Ask question #MHow Ethical are M...

Ask question #MHow Ethical are Major Internet Companies?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd