Draw a suitable physical network diagram, Computer Network Security

Assignment Help:

Question

a) From the capture below: Give the datagram source IP address, upper layer protocol, Total length in decimal and header checksum in hexadecimal; the segment source port number and the destination port number in decimal and thus deduce the application layer protocol this capture is destined to.

00 22 fa b7 88 02 00 15 56 3a 4c 79 08 00 45 00
00 a3 a0 a8 40 00 3a 11 11 36 ca 7b 02 06 c0 a8
01 42 00 35 e0 33 00 8f 4a a0 83 57 81 80 00 01

b) A UTM graduate has been told to configure a small branch office to give internal and external network connectivity. The office consists of 6 clients (4 wired and 2 wireless laptops), 1 server with two Ethernet network adapters, 2 network printers, 1 wireless router, one 8-port Ethernet switch and 1 basic ADSL gateway. All the clients will be on dynamic IP addressing and there is need for content filtering on the Internet. Staff are not allowed to access certain external sites e.g. Facebook or download some specific content such as mp3 files.The layout of the office is given below:

Draw a suitable physical network diagram for the office bearing in mind sound design principles. Your diagram should show how you would interconnect the devices present. You should mention specific system software, as well as the topology, the network class you will be using. You should describe how you would configure specific services, for example, Firewall and DHCP on the server.

Additionally, you should give the sample network configuration, for the IP addressing scheme you have chosen, of one network printer; of the wireless router, of both network interfaces on the server and of the ADSL gateway.


Related Discussions:- Draw a suitable physical network diagram

Network security course work, doing coursework in Network Security to prese...

doing coursework in Network Security to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design shou

Ids-information security, IDS Intrusion is a attack on information assets...

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio

Network simplex method, QUESTION: (a) Briefly explain the steps invol...

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

Address resolution protocol (arp), ADDRESS RESOLUTION PROTOCOL (ARP) T...

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant

Explain symmetric and asymmetric encryption system, Question 1: (a) Dif...

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

Rsa block and vernam stream ciphers, RSA Block and Vernam Stream Ciphers ...

RSA Block and Vernam Stream Ciphers This assignment involves writing two small Python scripts and a report. Before you start you must download the ?le summarysheets.zip from th

Virtual packets, VIRTUAL PACKETS These data packets serve same reason ...

VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph

What is feedforward multilayer perceptron neural network, Question: (a)...

Question: (a) Explain and illustrate with a drawing the three-layer feedforward multilayer perceptron neural network. (b) Summarize the standard backpropagation algorithm in

Ip datagrams, on LAN,where are IP datagrams transported?

on LAN,where are IP datagrams transported?

Arrangement of self-learning switches, QUESTION a) Consider the speed ...

QUESTION a) Consider the speed of propagation of an electrical signal is same to 2x10 8 m/s, evaluate the ratio of the propagation delay to the transmit time for the given typ

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd