What is contained in the payload of the packet

Assignment Help Computer Networking
Reference no: EM131017578

1. Tell two major differences between a VPN router and a VPN server (e.g., Cisco VPN concentrator).

2. Consider the remote access VPN scenario shown in the Figure. In this scenario, the remote user's PC is in a hotel room in LA, while the Corporate Office is in NYC. We assume that a program X executed by employee Alice in the LA hotel wants to send message "80 cents per share" to a server program Y executed on the Application Server (see Figure) in the Corporate Office.

377_network.png

2.1 When the message leaves program X in the form of a packet, what is contained in the Destination IP field of the packet's header?

2.2 When the message leaves program X in the form of a packet, what is contained in the Destination Port field of the packet's header?

2.3 When the message leaves program X in the form of a packet, is the payload of the packet encrypted or not?

2.4 When the message leaves program X in the form of a packet, it will NOT instantly leave Alice's PC. Instead, it will be forwarded to another program Z. What is program Z?

2.5 After program Z gets the packet, what will program Z do against the packet?.

2.6 Before program Z sends out the revised packet, Z needs to let the VPN server (see Figure) authenticate Alice. For this purpose, program Z will send information W to the VPN server. What is info W?

2.7 After the VPN server receives info W, the VPN server will forward W to another server T. What is the name of server T?

2.8 After the VPN server receives a positive reply from server T, the VPN server will tell program Z that Alice is a legitimate employee. Then program Z will send out the message to the VPN server. When the message leaves program Z, what is contained in the Destination IP field of the packet's header?

2.9 When the message leaves program Z, what is contained in the payload of the packet?

2.10 After a while, the message will arrive at the VPN server. When the message arrives at the VPN server, how will the packet be handled by the VPN server? Please give a step-by-step description

2.11 After a while, the VPN server will want to forward the message to the Application Server (see Figure). Why does the VPN server not want to forward the message to server T? (

2.12 When the message leaves the VPN server, what is contained in the Source IP field of the packet?

2.13 During the whole process, how many times has the message been encrypted?

2.14 During the whole process, how many times has the message been decrypted?

Reference no: EM131017578

Questions Cloud

Write an essay proposal for african music history : Write an essay proposal for African Music History. The desscription of African music. Described the earlist Africa music and how does it start. How did the music change in these years?
What are the most important aspects of the site : What makes this site so historic and what are the most important aspects of the site? Your impressions of the site: what were you most impressed by, were you surprised by what you learned, etc.
Write a program for ijvm called scramble : Write a program for IJVM called scramble that takes lowercase text from input and prints the next character (i.e. ‘b' is printed as ‘c') and uppercase text and prints the character before (‘B' is printed as ‘A'). Print all other characters as is.
Compare the tax advantages of debt versus equity capital : Use the Internet and Strayer databases to research the advantages and disadvantages of debt for capital formation versus equity for capital formation of a corporation. Prepare a formal letter to the client using the six (6) step tax research proce..
What is contained in the payload of the packet : After the VPN server receives a positive reply from server T, the VPN server will tell program Z that Alice is a legitimate employee. Then program Z will send out the message to the VPN server. When the message leaves program Z, what is contained ..
Professional judgment in context feature : Inherent risk at the financial statement level relates to (a) business and operating-related risks and (b) financial reporting risks.The Professional Judgment in Context feature, "Risks Associated with Financial Statement Misstatements,
Crossing over occurs during which phase of meiosis : ATP is generated by both plants and animals using ATP synthase and a proton gradient.
Estimate the fixed cost of electricity per month : Using the high-low method, estimate the fixed cost of electricity per month and the variable cost of electricity per occupancy-day. Round off the fixed cost to the nearest whole dollar and the variable cost to the nearest whole cent.
Find the equation in y-intercept form for this given line : You are told that the point (X, Y) = (10, 20) sits on a straight line. You are also told that this line intersects the X-axis at 30. Given this information, find the equation in Y-intercept form for this line. Show your work for full credit

Reviews

Write a Review

Computer Networking Questions & Answers

  Show the working of ldcr and mdcr protocol

Find that distance with which the tasks are feasibly scheduled and Show the working of LDCR and MDCR protocol on the given message set

  Discuss the main features of osfp implementation

Discuss the main features of OSFP implementation around summarization of topology and summarization of reachability information

  Explain most memorable experience with salesperson which

prepare a three-page paper in apa style that describes explains addresses and answers the following. many people shy

  Provide all specific details regarding packet information

Describe the need of encapsulation. Elaborately describe the process of encapsulation and creation of packets as a result of encapsulation. Analyze and provide all specific details regarding packet information, like headers or trailers

  What are the two limitations of static packet filtering

Write between 600 to 800 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty of Business guidelines.

  Design a new network for western trucking

Western Trucking operates a large fleet of trucks that deliver shipments for commercial shippers such as food stores, retailers, and wholesalers. Design a new network for them, including the specific backbone and LAN technologies to be used

  Policies and procedures facilitate strategy execution

Policies and procedures facilitate strategy execution when they are designed to fit the company's strategy and objectives. Search for recent articles and select one that discusses how a company has revised its policies and procedures to provide bette..

  What is the latest definition of uml and ood

Maintenance: Rounds out the cycle with performance tuning, data backup, and troubleshooting.

  Ip subnet design project-technical design of network service

technical design of network services - You are a consultant being brought in by XUMUC to assist with its merger with another company

  Determine the theoretical maximum channel capacity

Given narrow (usable) audio bandwidth of telephone transmission facility, nominal SNR of 56dB (400,000). What can we say about actual maximum channel capacity?

  Assignment on processor performance & pipeline

We wish to compare two systems S1 and S2. The table below presents measurements for the two systems when running two programs, Program 1 and Program 2.

  Define method in doing cross-layer optimization correctly

Different access methods, such as OFDMA, SDMA, TDMA, CDMA, and FDMA, rely on cross-layer optimization to different degrees. The most common cross-layer issues are scheduling modulation type and setting power control. Complete the following for you..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd