Bull an application on computer a in network 1 is sending a

Assignment Help Computer Networking
Reference no: EM13380323

• An application on computer A (in network 1) is sending a message to an application on computer B (in network 2). 
• There will also be a reply going back the other way.
• TCP is the transport layer protocol used for the messages and IP the network later protocol for the network. 
• Ethernet is the datalink layer protocol for all the connections in the network.
• You can assume that computer A has obtained the destination port and IP address (probably from DNS)
• The above diagram shows the path taken by the messages as determined by the routing information held by the routers, etc.
• Network 1 is a class B network
• Network 2 is a small class C network
• Routers 3, and 5 belong ISPs with class B networks, and router 4 belongs to a top-level ISP with a class A network.
• Computer A is made by Spike technologies which has a MAC OUI of 45-FE-2A, computer B from Secombe technologies with an OUI of D2-34-C4, the routers are a mix of Trek Technologies with OUI 6B-3C-24 and Kirk Corporation with OUI 7F-9C-37

1447_What security vulnerabilities and threats can you see.png

You are to:

1. Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the above description. State clearly in your submission the choices you have made for these addresses.
Do not give the addresses in binary but in the X.X.X.X decimal format for the IP addresses, the hexadecimal format for MAC addresses and decimal numbers for the port numbers.

2. For the delivery of the message from Computer A to Computer B, for each step along the way show the source and destination
a. MAC addresses
b. IP addresses
c. Port addresses
Making it clear which is the source and which is the destination, in what packet or frame these addresses appear (IP, TCP, Ethernet) and what the order of encapsulation is.

3. The same as number 2, but for the reply from computer B to computer A

4. These messages are sensitive. What security vulnerabilities and threats can you see? What measures would you put in place to remove or minimize the vulnerabilities?

Reference no: EM13380323

Questions Cloud

Concept learninga write an algorithm called find-g to nd a : concept learninga write an algorithm called find-g to nd a maximally-general consistent hypothesis. you can assume the
Well-posed machine learning problemsa what is required to : well-posed machine learning problemsa what is required to dene a well-posed learning problem ?b here are two potential
Message forwarding a computer in the computing department : message forwarding a computer in the computing department has just been turned on. the user starts up their web browser
Question - subnettingconsider the following scenarios -a : question - subnettingconsider the following scenarios -a you are an isp that has been assigned a class b network with
Bull an application on computer a in network 1 is sending a : bull an application on computer a in network 1 is sending a message to an application on computer b in network 2.nbsp
1 list the three fundamental security properties and for : 1. list the three fundamental security properties and for each give an example of failure. justify your answer based on
You are working on a new web site for cruzes inc the web : you are working on a new web site for cruzes inc. the web site is aimed at providing travel information to consumers
The aim of this project is to design developand evaluate a : the aim of this project is to design developand evaluate a 2d game for pc. you can choose any type of game you like
Nbspa stack evaluating the postfix expression lrm using : nbspa stack evaluating the postfix expression lrm using linked list implementationthis step will use the queue

Reviews

Write a Review

Computer Networking Questions & Answers

  Type of network provides limited access to corporate data

Which type of network provides customers with limited access to corporate data such as inventory, parts lists, and orders?

  Snmp security

SNMPv1 is the most commonly used version of SNMP even though it provides little support for security. Why not change to another version of SNMP?

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  Design remote access plan which meets requirements

Design a remote access plan which meets requirements described so far. Your submission should include following. Details of your proposed remote access solution, including any hardware and/or software that would be needed.

  Share resources on wins server

Client wants your friend's shop to log on to its WINS server so they can share resources more directly. With security in mind, what do you tell your friend to do? Why?

  Explaining sliding window protocol with the window size

Terminal A is sending data to terminal B using a sliding window protocol with the window size equal to 5 and the maximum sequence number equal to 6.

  The purpose of this two-part project is to compute the

the purpose of this two-part project is to compute the students ability to analyze security requirements and prepare a

  Phising email it is multipart what are the two parts the

phising email it is multipart what are the two parts? the html part is it inviting the recepient to click somewhere?

  What size of packet result in last bit being transmitted

What size of packet will result in the last bit being transmitted just as the first bit of the packet arrives at the "far end" of the cable?

  How is this applied to changing the coding?

when writing a linear cipher using n = 27, if a = ?, b = ? and c = 7, if ac = 1(mod27) how is this applied to changing the coding?

  Discuss what actions can be taken by the tcp protocol

Discuss what actions can be taken by the TCP protocol to preserve a connection-oriented packet stream, particularly if there has been packet loss due to the route disruption. What are the consequences to throughput as a result of route breakage du..

  How long does b takes to acknowledge

Assume that no packet or acknowledgement are dropped. Assume that A sends a packet to C and waits for its acknowledgement to come back from C. How long does it take until A gets that acknowledgement?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd