Application layer protocol, Computer Network Security

Assignment Help:

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in decimal and hence deduce the application layer protocol this capture is destined to.

00 15 56 3a 4c 79 00 13 02 4a 88 97 08 00 45 00  
00 3e 0f 8b 00 00 80 11 a7 90 c0 a8 01 42 c0 a8  
01 01 05 61 00 35 00 2a 76 06 f3 5b

Problem b) A UTM graduate has been told to configure a small branch office to provide internal and external network connectivity. The office consists of 6 clients (4 wired and 2 wireless laptops), 1 server with two Ethernet network adapters, 2 network printers, 1 wireless router, one 8-port Ethernet switch  and 1  basic ADSL gateway. All the clients will be on dynamic IP addressing and there is need for content filtering on the Internet. Staff are not allowed to access certain external sites e.g. Facebook or download some specific content such as mp3 files.

  The layout of the office is given below:

2114_round trip time1.png

Sketch a suitable physical network diagram for the office bearing in mind sound design principles. Your diagram should show how you would interconnect the devices present. You should mention specific system software you would be required as well as the topology, the network class you will be using. You should describe how you would configure specific services, for example Proxy, DHCP, ... on the server. Additionally, you should give the network configurations of 1 wired PC , 1 laptop, 1 printer, both server NICs and the ADSL gateway.


Related Discussions:- Application layer protocol

What is the main security vulnerability of ipv4, Question: (a) What is...

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

Sequential label and supply, What questions should Iris ask Charlie about t...

What questions should Iris ask Charlie about the new job, about Kelvin''s team, and about the future of the company?

Udp communication semantics, UDP COMMUNICATION SEMANTICS:  UDP needs I...

UDP COMMUNICATION SEMANTICS:  UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or

Explain belady''s anomaly, Belady's Anomaly Also known FIFO anomaly. G...

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

Malicious node detection mechanisms, Many applications are vulnerable to in...

Many applications are vulnerable to intrusion attacks and can provide misleading reports about misbehaving nodes. Some of the mechanisms under such a category include the Bayesian

Quote, How much would it cost to have a project completed by tomorrow night...

How much would it cost to have a project completed by tomorrow night?

Secure a wireless network, Secure a Wireless Network WIRELES Most onli...

Secure a Wireless Network WIRELES Most online retailers provide some type of privacy statement. Many statements are long, and appear in small print, and many appear to be simi

Develop a tcp-based client-server socket program, Develop a TCP-based clien...

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

Explain the terms used in network security, Question 1 (a) Explain b...

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone

Security analysis-information security, SECURITY ANALYSIS Overview •    ...

SECURITY ANALYSIS Overview •    Know yourself: examine, identify, and understand the information and systems which are currently in place •    Know the enemy: examine, identify,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd