What do you meant by network address translation, Computer Network Security


(a) What do you meant by Network Address Translation (NAT)? Why is it used?

(b) Given the following information by your ISP about your newly acquired Frame Relay connection with public IP range: /30 You are required to design a network which constitutes of a LAN having 3 subnets (with Internet connectivity) for each department in your company.

Each subnet is assumed to have each a maximum of 28 hosts including a file server and an internal web server.

Note: You must use an internal Class C addressing scheme.

Draw the network layout and giving maximum information about:

• IP, Subnet Mask & Gateway addresses of all devices and servers and 1 host from each subnet.

• Type and hierarchy of hardware devices, transmission media and network topology you might adopt, with justifications, where necessary.

Posted Date: 11/8/2013 2:21:33 AM | Location : United States

Related Discussions:- What do you meant by network address translation, Assignment Help, Ask Question on What do you meant by network address translation, Get Answer, Expert's Help, What do you meant by network address translation Discussions

Write discussion on What do you meant by network address translation
Your posts are moderated
Related Questions
Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

Network security is an issue for companies regardless of whether they participate in electronic commerce; however, since most organizations have a Web site that allows some interac

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

Describe the salient features of the multimedia. Also explain the applications of it. Multimedia can be understood as follows: Multimedia is on the whole a media which makes

Types of IDSs and Detection Methods IDSs operate as network based, host based, or application based systems and focused on protecting network information assets. All the IDSs us

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).