Design a network layout, Computer Network Security

Assignment Help:

QUESTION:

(a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source IP address, the total length in bytes and the header checksum for the packet in decimal; the destination port number in decimal for the segment and hence deduce the application layer protocol this segment is destined to.

00 24 2b ec 4a cc 00 19 4b 3b f2 10 08 00 45 00
01 de 56 08 00 00 38 06 38 9e 4a 7d e6 44 c0 a8
01 0a 00 50 2c 5e 28 b6 ca f6 e1 5e 81 e8 50 18
1c 0e a1 9d 00 00

(b) Given a following information by your ISP about your newly acquired 256 kbps Frame Relay Over IP connection: Public IP: 202.123.21.0 /26

You are required to design a network layout which constitutes of a LAN having 3 subnets (with Internet connectivity) for each department in your company.

  • Two of the 3 subnets are assumed to have each around 50 hosts, inclusive of a file server, an internal web server and a network printer.
  • The 3rd subnet is to be connected using a wireless Access Point and all the hosts (around 20) on that subnet are assumed to be Wi-Fi ready.
  • Finally, all 3 subnets should make use of dynamic addressing.
  • Draw the network layout and giving maximum information about:
  • IP, Subnet Mask & Gateway addresses of all devices, servers, printers, and 1 host from each subnet.
  • Type and hierarchy of hardware devices, transmission media and network topology you might adopt, with justifications, where necessary.

Related Discussions:- Design a network layout

Systems-specific policy (syssp), Systems-Specific Policy (SysSP) SysSP...

Systems-Specific Policy (SysSP) SysSPs are codified as standards and procedures which are used when configuring or maintaining systems. Systems specific policies fall into 2 g

Need for security-information security, NEED FOR SECURITY Primary missio...

NEED FOR SECURITY Primary mission of information security to ensure that the systems and contents stay the same If no threats, could focus on improving the systems, resulting in

Develop a tcp-based client-server socket program, Develop a TCP-based clien...

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

Introduction to security and personnel, INTRODUCTION TO SECURITY AND PERSON...

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

Evaluate the sample correlation between y and z, Question: (a) Data on ...

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

Digital signature, A digital signature is a stamp on the data, which is uni...

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective. STEP 1

E-commerce, briefly expslain type of e-commerce

briefly expslain type of e-commerce

Encapsulation, ENCAPSULATION Network interface layer adds IP datagram ...

ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

List vulnerabilities of using wep, Question: The Wired Equivalent Priv...

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

Cost benefit analysis (cba)-information security, Cost Benefit Analysis (CB...

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd