Provide a suitable network infrastructure for the campus, Computer Network Security

Assignment Help:

QUESTION

a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a segment. Give the source MAC address in hexadecimal; the source IP address, the upper layer protocol, the TTL and the header checksum in decimal; the source port number in decimal and hence deduce the application layer protocol this segment is destined to.

00 13 02 4a 88 97 00 15 56 3a 4c 79 08 00 45 00
00 9e 99 e6 40 00 3c 11 15 fd ca 7b 02 06 c0 a8
01 42 00 35 04 01 00 8a 35 9f

b) A UTM graduate has been told by his supervisor to work out how to connect a small university campus onto the Internet.

1457_Ethernet.png

The campus contains 3 schools, a library and a Research Centre. Each school has about 300 hosts, 50 for staff, and 250 for students.

The library consists of 4 levels. At any one time, a maximum of 50 WiFi-ready laptops are loaned to students for use within the library only.

The Research Centre has 12 workstations which run simulation software requiring an internal bandwidth above 500 Mbps.

The campus has a HTTP server and a FTP server holding the web content, both of which should be accessible internally and externally.

The university's ISP has awarded one block of public IP addresses as 202.123.21.112 /29.

Provide a suitable network infrastructure for the campus bearing in mind sound design principles. Give the configurations of all important nodes such as hardware devices or servers that you would be using to implement your design. Additionally, give the network configuration of 1 staff PC from any school, 1 laptop from the Library. Be sure to mention topologies, technologies used in your design.


Related Discussions:- Provide a suitable network infrastructure for the campus

Internet protocol (ipv6), SUCCESS OF IP:  IP has accommodated dramatic...

SUCCESS OF IP:  IP has accommodated dramatic modification since real design. But basic rules are still appropriate today. There are many new kinds of hardware. SCALING:

Reason for multiple topologies, REASON FOR MULTIPLE TOPOLOGIES Every t...

REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

Computer fundamentals, Ask You have been asked by a new client to assist i...

Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou

What do you meant by the term diffusion and confusion, Question: (a) W...

Question: (a) What do you meant by the term diffusion and confusion? Explain how diffusion and confusion can be implemented. (b) Distinguish between authorisation and auth

Explain the operation of the matchmaker middle agent, Question 1: (a) E...

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

Sequential label and supply, What questions should Iris ask Charlie about t...

What questions should Iris ask Charlie about the new job, about Kelvin''s team, and about the future of the company?

Csma/ca, CSMA/CA Wireless needs collision avoid ness rather than colli...

CSMA/CA Wireless needs collision avoid ness rather than collision checking. Transmitting computer puts very short codes to receiver. Receiver responds with short message getti

Udp communication semantics, UDP COMMUNICATION SEMANTICS:  UDP needs I...

UDP COMMUNICATION SEMANTICS:  UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or

Risk management discussion points, Risk Management Discussion Points Org...

Risk Management Discussion Points Organizations should define level of risk it can live with Risk appetite: it defines quantity and nature of risk which organizations are wil

Develop firewall rules based on a fictitious organisation, Question requir...

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd