What is network address translation, Computer Network Security

Assignment Help:

Question:

(a) What is Network Address Translation (NAT)? Why is it used?

(b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Global IP address: 202.123.21.120 /30

You are required to design a network which constitutes of a LAN having 3 subnets (with Internet connectivity) for each department in your company.

Each subnet is assumed to have each a maximum of 28 hosts including a file server and an internal web server.

Note: You must use an internal Class C addressing scheme.

Draw the network layout and giving maximum information about:

• IP, Subnet Mask & Gateway addresses of all devices and servers and 1 host from each subnet.

• Type and hierarchy of hardware devices, transmission media and network topology you might adopt, with justifications, where necessary.


Related Discussions:- What is network address translation

Intrusion detection and classification, i want to detec and classify networ...

i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence

Characteristics of radial basis function neural networks, Problem : (a)...

Problem : (a) Provide one possible classification of PCA, ART, RBF, and Fuzzy ARTMAP networks. (b) Describe in detail the characteristics of Radial Basis Function Neural Net

Mobile wireless networks , Is standard TCP effective in mobile wireless net...

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

Ucsf medical center case study-information security, Example : UCSF Medical...

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

Negative cycle algorithm in minimum cost flows, QUESTION: (a) Show the...

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs

Risk management discussion points, Risk Management Discussion Points Org...

Risk Management Discussion Points Organizations should define level of risk it can live with Risk appetite: it defines quantity and nature of risk which organizations are wil

Venn Diagram Problem, Students were asked about search engine they used.90 ...

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo

Who are the individuals who cause these security problems, Who are the indi...

Who are the individuals who cause these security problems? Many unauthorized people who cause network security problems for obtaining information about the other users and causi

Direct point-to-point communication:, Early networks used simple point-to...

Early networks used simple point-to-point communication . In such a method of communication every communication channel connects exactly two devices. In this way it prepares a m

Ethernet network, QUESTION : a) A datagram of 3000 bytes has to travel...

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd