Draw the network layout, Computer Network Security

Assignment Help:

Question :

a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source IP address, the total length in bytes and the header checksum for the packet in decimal; the destination port number in decimal for the segment and hence deduce the application layer protocol this segment is destined to.

0015   563a   4c79   0013   024a   8897   0800   4500   0030
daf3    4000   8006   4673   c0a8   0142   480e   cf68    08af
0050   9347   9790   0000   0000   7002   4000   35e7  0000
0204   05b4   0101   0402

b) Given a following information by your ISP about your newly acquired 256 kbps Frame Relay Over IP connection: Public IP: 202.123.21.121 /28

• You are required to design a network layout which constitutes of a LAN having 4 subnets (with Internet connectivity) for each department in your company.
• 3 of the 4 subnets are assumed to have each around 50 hosts, inclusive of a file server, an internal web server and a network printer.
• One of the 4 subnets is to be connected using a wireless Access Point and all the hosts (around 19) on that subnet are assumed to be Wi-Fi ready.
• Finally, all 4 subnets should make use of dynamic addressing.

Draw the network layout and giving maximum information about:

• IP, Subnet Mask & Gateway addresses of all devices, servers, printers, and 1 host from each subnet.

• Type and hierarchy of hardware devices, transmission media and network topology you might adopt, with justifications, where necessary.


Related Discussions:- Draw the network layout

Meaning of dns - domain name system, What do you understand by the DNS? Exp...

What do you understand by the DNS? Explain the usage of the resource rec or ds. Domain Name System is described below: The Domain Name Service (DNS) is the hierarchi

Unguided media, Unguided Media This is the wireless media that transfe...

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Asset identification and valuation-information security, ASSET IDENTIFICATI...

ASSET IDENTIFICATION AND VALUATION This process begins with identification of assets that includes all elements of an organization’s system (people, procedures, data and informa

What is triple key management scheme, Q. What is Triple Key Management Sche...

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

Explain the close procurement project process, Question 1: Why do we ne...

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

Cryptographic algorithms-cryptography, Cryptographic algorithms Cryptogr...

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio

Why is this setup not secure, Question: a) You are using Active Directo...

Question: a) You are using Active Directory Users under Windows Server 2003 and Computers to configure user objects in your domain, and you are able to change the address and

Digital signature, A digital signature is a stamp on the data, which is uni...

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective. STEP 1

Security and basics steps in writing thesis, how can i start thesis? Please...

how can i start thesis? Please mention so of examples?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd