Provide a suitable network infrastructure for the campus, Computer Network Security

Assignment Help:

QUESTION

a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a segment. Give the source MAC address in hexadecimal; the source IP address, the upper layer protocol, the TTL and the header checksum in decimal; the source port number in decimal and hence deduce the application layer protocol this segment is destined to.

00 13 02 4a 88 97 00 15 56 3a 4c 79 08 00 45 00
00 9e 99 e6 40 00 3c 11 15 fd ca 7b 02 06 c0 a8
01 42 00 35 04 01 00 8a 35 9f

b) A UTM graduate has been told by his supervisor to work out how to connect a small university campus onto the Internet.

1457_Ethernet.png

The campus contains 3 schools, a library and a Research Centre. Each school has about 300 hosts, 50 for staff, and 250 for students.

The library consists of 4 levels. At any one time, a maximum of 50 WiFi-ready laptops are loaned to students for use within the library only.

The Research Centre has 12 workstations which run simulation software requiring an internal bandwidth above 500 Mbps.

The campus has a HTTP server and a FTP server holding the web content, both of which should be accessible internally and externally.

The university's ISP has awarded one block of public IP addresses as 202.123.21.112 /29.

Provide a suitable network infrastructure for the campus bearing in mind sound design principles. Give the configurations of all important nodes such as hardware devices or servers that you would be using to implement your design. Additionally, give the network configuration of 1 staff PC from any school, 1 laptop from the Library. Be sure to mention topologies, technologies used in your design.


Related Discussions:- Provide a suitable network infrastructure for the campus

What do you understand by the term integrity, Question: (a) What do yo...

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

Protocols for secure communications-cryptography, Protocols for Secure Comm...

Protocols for Secure Communications Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption t

Describe the role of dns root servers in network, QUESTION (a) Describ...

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth

Keystroke-based access control model, Suppose you are working for one of th...

Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem

Social network development in java , Social Network development in Java: ...

Social Network development in Java: Project Title: SUGGESTLOCAL (Nov 2006-April 2007) Role             : Developer Domain        : Social Network Client          :

What is information-information security, What is information Informatio...

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

Find the capacity of the wcdma, Question: (a) Describe the term interfe...

Question: (a) Describe the term interference in the space, time, frequency, and code domain. (b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). B

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Softbank theft of consumer data -information security, Example : Softbank –...

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

Fragmentation format, FRAGMENTATION Fragmentation information is kept...

FRAGMENTATION Fragmentation information is kept in different extension header.  Every fragment has base header and fragmentation header. Whole datagram including original hea

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd