Provide a suitable network infrastructure for the campus, Computer Network Security

Assignment Help:

QUESTION

a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a segment. Give the source MAC address in hexadecimal; the source IP address, the upper layer protocol, the TTL and the header checksum in decimal; the source port number in decimal and hence deduce the application layer protocol this segment is destined to.

00 13 02 4a 88 97 00 15 56 3a 4c 79 08 00 45 00
00 9e 99 e6 40 00 3c 11 15 fd ca 7b 02 06 c0 a8
01 42 00 35 04 01 00 8a 35 9f

b) A UTM graduate has been told by his supervisor to work out how to connect a small university campus onto the Internet.

1457_Ethernet.png

The campus contains 3 schools, a library and a Research Centre. Each school has about 300 hosts, 50 for staff, and 250 for students.

The library consists of 4 levels. At any one time, a maximum of 50 WiFi-ready laptops are loaned to students for use within the library only.

The Research Centre has 12 workstations which run simulation software requiring an internal bandwidth above 500 Mbps.

The campus has a HTTP server and a FTP server holding the web content, both of which should be accessible internally and externally.

The university's ISP has awarded one block of public IP addresses as 202.123.21.112 /29.

Provide a suitable network infrastructure for the campus bearing in mind sound design principles. Give the configurations of all important nodes such as hardware devices or servers that you would be using to implement your design. Additionally, give the network configuration of 1 staff PC from any school, 1 laptop from the Library. Be sure to mention topologies, technologies used in your design.


Related Discussions:- Provide a suitable network infrastructure for the campus

Explain briefly the role of the physical layer, a) Calculate the CRC for th...

a) Calculate the CRC for the frame below: Frame: 1101011011 Generator: 10011 Message after appending 4 zero bits: 11010110110000 b) OSI refers to a system in which any

Log file monitors-information security, LOG FILE MONITORS Log file monit...

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

Firewall analysis tools-information security, FIREWALL ANALYSIS TOOLS Th...

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

802.11 wireless lans and csma/ca, 802.11 WIRELESS LANs AND CSMA/CA:  ...

802.11 WIRELESS LANs AND CSMA/CA:  IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data

Udp- datagram transport service, UDP- DATAGRAM TRANSPORT SERVICE INT...

UDP- DATAGRAM TRANSPORT SERVICE INTRODUCTION:  UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to

What is authentication? explain authentication protocols, What is Authentic...

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Address resolution protocol (arp), ADDRESS RESOLUTION PROTOCOL (ARP) T...

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant

What do you understand by demilitarized zone, Problem 1: What does the ...

Problem 1: What does the SNMP access policy show? SNMP community diagram SNMP access policy Problem 2: Does there exist any formal functional specificat

Describe how the encapsulated security header protocol, Question: (a) ...

Question: (a) Give 2 benefits of using IPsec. (b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd