Detect or prevent network security breaches

Assignment Help Computer Networking
Reference no: EM131704442

Question:

In order to detect or prevent network security breaches, you must understand the Internet protocols as well as the attacker does. The protocols originate from publicly available Requests for Comments, or RFCs. The official repository and publisher of all RFCs is the RFC editor. The purpose of this short research paper is to practice locating and referring to RFCs

Read the page, find the in-text "RFC SEARCH". In the search field "Title/Keyword," type in the complete name of the protocol (eg. "Internet Protocol"). By default, the search results are displayed by RFC number (ascending).

Understanding Internet and TCP Protocols

1. Find and identify the RFCs for IP and TCP.

RFC _______ - Internet Protocol
RFC _______- Transmission Control Protocol

2. Refer to the RFCs to answer the following questions.

Questions about IP

1. What two basic functions does IP implement?

2. What four key mechanisms does IP use to provide its service?

3. Via what protocol does IP communicate errors?

4. In the IP header, what is the Identification field used for?

5. A number of bits within the IP header are designated reserved or optional; why would these be important in network security?

Questions about TCP

1. What is the difference between a socket and a connection?

2. What are the five calls the TCP/user interface provides for?

3. What is a passive OPEN request?

4. Describe the three-way handshake.

5. At a workstation, open some web pages.

Identify the ports your machine is listening on and the state of the various connections it is holding

Verified Expert

The assignment is about how the two protocols i.e. Internet Protocol (IP) and Transmission Control Protocol (TCP). It talks about the various technical specification and features of these protocols mentioned in the respective RFC. It will certainly help in understanding the network security concepts as these two protocols play an every important role in network communication. The assignment contains several questions to be answered based on the explanation available in the RFC, all the questions are answered in Microsoft Office Word Document.

Reference no: EM131704442

Questions Cloud

Examine the major benefits for an organization to use ssds : Use the Internet to research the benefits and hazards to organizations that use SSD storage devices. Examine the major benefits for an organization to use SSDs.
Recording a hospital expenses by natural classification : Illustrate the difference between recording a hospital's expenses by natural classification and recording by function. Discuss which is more informative.
Illustrates when a manager should approach a decision : Take a position on whether or not managerial groups within a large organization are more likely to make better decisions than individual managers.
Limit to per capita gdp : If natural resources are ultimately finite, does this imply that there is a limit to per capita GDP? Explain. Provide any references used.
Detect or prevent network security breaches : detect or prevent network security breaches, you must understand the Internet protocols as well as the attacker does. The protocols originate
Discuss your examination process on the tissue sample : discuss your examination process on the tissue sample and the results you expect to observe
Discuss case of a not-for-profit hospital : The chief administrative officer of a not-for-profit hospital, Vera Thomas, is attempting to find resources to add a new wing to the hospital.
Absolute advantage in the production : Suppose the United States has an absolute advantage in the production of 2 goods compared to another country.
Discuss the key characteristics of public goods : What is it about pure public goods that means that the market will not adequately provide those goods?

Reviews

len1704442

11/3/2017 2:46:06 AM

Read the page, find the in-text "RFC SEARCH" link, and click on it. In the search field "Title/Keyword," type in the complete name of the protocol (eg. "Internet Protocol"). By default, the search results are displayed by RFC number (ascending). Also, by default, the number of results shown is 25. Click "All" to show all the results.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd