Detect or prevent network security breaches

Assignment Help Computer Networking
Reference no: EM131704442

Question:

In order to detect or prevent network security breaches, you must understand the Internet protocols as well as the attacker does. The protocols originate from publicly available Requests for Comments, or RFCs. The official repository and publisher of all RFCs is the RFC editor. The purpose of this short research paper is to practice locating and referring to RFCs

Read the page, find the in-text "RFC SEARCH". In the search field "Title/Keyword," type in the complete name of the protocol (eg. "Internet Protocol"). By default, the search results are displayed by RFC number (ascending).

Understanding Internet and TCP Protocols

1. Find and identify the RFCs for IP and TCP.

RFC _______ - Internet Protocol
RFC _______- Transmission Control Protocol

2. Refer to the RFCs to answer the following questions.

Questions about IP

1. What two basic functions does IP implement?

2. What four key mechanisms does IP use to provide its service?

3. Via what protocol does IP communicate errors?

4. In the IP header, what is the Identification field used for?

5. A number of bits within the IP header are designated reserved or optional; why would these be important in network security?

Questions about TCP

1. What is the difference between a socket and a connection?

2. What are the five calls the TCP/user interface provides for?

3. What is a passive OPEN request?

4. Describe the three-way handshake.

5. At a workstation, open some web pages.

Identify the ports your machine is listening on and the state of the various connections it is holding

Verified Expert

The assignment is about how the two protocols i.e. Internet Protocol (IP) and Transmission Control Protocol (TCP). It talks about the various technical specification and features of these protocols mentioned in the respective RFC. It will certainly help in understanding the network security concepts as these two protocols play an every important role in network communication. The assignment contains several questions to be answered based on the explanation available in the RFC, all the questions are answered in Microsoft Office Word Document.

Reference no: EM131704442

Questions Cloud

Examine the major benefits for an organization to use ssds : Use the Internet to research the benefits and hazards to organizations that use SSD storage devices. Examine the major benefits for an organization to use SSDs.
Recording a hospital expenses by natural classification : Illustrate the difference between recording a hospital's expenses by natural classification and recording by function. Discuss which is more informative.
Illustrates when a manager should approach a decision : Take a position on whether or not managerial groups within a large organization are more likely to make better decisions than individual managers.
Limit to per capita gdp : If natural resources are ultimately finite, does this imply that there is a limit to per capita GDP? Explain. Provide any references used.
Detect or prevent network security breaches : detect or prevent network security breaches, you must understand the Internet protocols as well as the attacker does. The protocols originate
Discuss your examination process on the tissue sample : discuss your examination process on the tissue sample and the results you expect to observe
Discuss case of a not-for-profit hospital : The chief administrative officer of a not-for-profit hospital, Vera Thomas, is attempting to find resources to add a new wing to the hospital.
Absolute advantage in the production : Suppose the United States has an absolute advantage in the production of 2 goods compared to another country.
Discuss the key characteristics of public goods : What is it about pure public goods that means that the market will not adequately provide those goods?

Reviews

len1704442

11/3/2017 2:46:06 AM

Read the page, find the in-text "RFC SEARCH" link, and click on it. In the search field "Title/Keyword," type in the complete name of the protocol (eg. "Internet Protocol"). By default, the search results are displayed by RFC number (ascending). Also, by default, the number of results shown is 25. Click "All" to show all the results.

Write a Review

Computer Networking Questions & Answers

  Developing guidelines for ethical use of the computers

MN501 - Privacy laws and principles important for doing business internationally - Developing guidelines for Ethical use of the computers

  Computer network i am sorry that i didnt notice you reduced

i am sorry that i didn39393939t notice you reduced fees for me. ltbrgti am willing to pay 50aud ltbrgtbut i need this

  Craft an analytical report on strategies for the network

Craft an analytical report on strategies for hardening the network environment throughout the seven domains of a typical IT infrastructure.

  Explain your job duties to the new network administrator

Explain your job duties to the new network administrator. Include an explanation about the differences between the role of the system administrator and the role of the network administrator.

  What is the latest version of adsl

List four WAN technologies that are carried over the PSTN.

  Which of the following algorithms is used to securely

1.which is a more secure way to use preshared keys between multiple peers? points 4 specify the same key to share with

  Analyze the potential areas for advancements in wireless

Analyze the potential areas for advancements in wireless technologies for these industries and determine the driving forces behind those advancements.

  Explain digital transmission to analog transmission

Explain digital transmission to analog transmission to determine the advantages of digital transmission. Provide at least one example to support your response.

  Project management consultant

MN601 Who do you think should pay for the changes - what could have been done to make sure that the project scope was correct?

  Business applications of java

Summarize the main points of the article.

  Discuss how we use the control panel to configure specific

some commentators have suggested that companies today have not adequately configured computers and network resources

  Difference between server-side and client-side scripting?

difference between server-side and client-side scripting?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd