Provide the network configuration, Computer Network Security

Assignment Help:

QUESTION:

a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length, and the header checksum of the packet in decimal; the source port number in decimal and thus deduce the application layer protocol and whether this capture relates to a response or request message.

00 13 02 4a 88 97 00 15 56 3a 4c 79 08 00 45 00
00 4c ae 91 40 00 3c 06 01 9b ca 7b 02 1a c0 a8
01 42 00 19 04 35 aa 36 09 bb e5 30 36 00 50 18
40 b0 05 fa 00 00 32 35 30 20 6f 6b 3a 20 20 4d

b) A company occupies 3 floors of a building plus the basement. Each floor is occupied by one department and adds the office of one senior manager responsible for each department. About 30 PCs having internet access are expected on each floor. The basement accommodates various server machines. For security reasons the senior managers should be accessible from the other machines only via a firewall router. The company uses a private internal network: 192.168.1.0./24. The company has an ADSL connection to the Internet. As part of this arrangement the ISP issues the company with a single public Internet address: 202.123.21.144.

Show a full network diagram for the company and make sure you identify any network devices, transmission technology and media. You have to give the IP, subnet mask and gateway addresses for all devices and servers that you find pertinent to your design. You have to also devise a scheme to allow the single public IP address to be shared among the whole staff and give special server configurations to meet company's goals. Provide the network configuration for 1 staff PC and 1 senior manager PC from each department.


Related Discussions:- Provide the network configuration

Gateways, Gateways They transfer packets among network machines that h...

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

Characteristics of radial basis function neural networks, Problem : (a)...

Problem : (a) Provide one possible classification of PCA, ART, RBF, and Fuzzy ARTMAP networks. (b) Describe in detail the characteristics of Radial Basis Function Neural Net

Spambot detection - spam mail, Spambot Detection: The  previous studie...

Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is

Describe how access control is implemented, Question: (a) How can you ...

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Internet protocol(ip), Internet Protocol IP Gives computer-to-comp...

Internet Protocol IP Gives computer-to-computer communication. Host and receiver addresses are computers. This is also known machine-to-machine communication.

Describe the two possible configurations for 3des, QUESTION (a) Describ...

QUESTION (a) Describe the two possible configurations for 3DES (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d

Find the services implemented on your computer, Question: (a) Which typ...

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

Error reporting mechanism (icmp), ERROR REPORTING MECHANISM (ICMP) INT...

ERROR REPORTING MECHANISM (ICMP) INTRODUCTION:  IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Me

Technology, how can you enter the ASVAB practice test on line?

how can you enter the ASVAB practice test on line?

Describe the role of dns root servers in network, QUESTION (a) Describ...

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd