Draw a suitable physical network diagram, Computer Network Security

Assignment Help:

Question

a) From the capture below: Give the datagram source IP address, upper layer protocol, Total length in decimal and header checksum in hexadecimal; the segment source port number and the destination port number in decimal and thus deduce the application layer protocol this capture is destined to.

00 22 fa b7 88 02 00 15 56 3a 4c 79 08 00 45 00
00 a3 a0 a8 40 00 3a 11 11 36 ca 7b 02 06 c0 a8
01 42 00 35 e0 33 00 8f 4a a0 83 57 81 80 00 01

b) A UTM graduate has been told to configure a small branch office to give internal and external network connectivity. The office consists of 6 clients (4 wired and 2 wireless laptops), 1 server with two Ethernet network adapters, 2 network printers, 1 wireless router, one 8-port Ethernet switch and 1 basic ADSL gateway. All the clients will be on dynamic IP addressing and there is need for content filtering on the Internet. Staff are not allowed to access certain external sites e.g. Facebook or download some specific content such as mp3 files.The layout of the office is given below:

Draw a suitable physical network diagram for the office bearing in mind sound design principles. Your diagram should show how you would interconnect the devices present. You should mention specific system software, as well as the topology, the network class you will be using. You should describe how you would configure specific services, for example, Firewall and DHCP on the server.

Additionally, you should give the sample network configuration, for the IP addressing scheme you have chosen, of one network printer; of the wireless router, of both network interfaces on the server and of the ADSL gateway.


Related Discussions:- Draw a suitable physical network diagram

Explain the dimension of service quality, Problem 1: Discuss how TWO of...

Problem 1: Discuss how TWO of the following gurus have contributed to the Quality Movement, highlighting the major points of their philosophies: (a) Edward Deming (b) Jose

Logic bombs - attacks information security, Example 3: Logic bombs In th...

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

Define network, A Network is described as a system for connecting compu...

A Network is described as a system for connecting computers using a single transmission technology. The computers can interact with each other in a network. They can receive an

Problem of spam mail, Topic -Spam is an ever-growing problem, with some net...

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Public key infrastructure (pki)-cryptography, Public Key Infrastructure (PK...

Public Key Infrastructure (PKI) It is integrated system of software, encryption methodologies, protocols, legal agreements, and 3rd-party services enabling users to communicate

Local talk, LOCAL TALK Apple discovered the LAN technology that uses b...

LOCAL TALK Apple discovered the LAN technology that uses bus topology. Its interface is added with all Macintosh computers. It has very low speed i.e. 230.4Kbps. Also it is ch

Distinguish between steganograhy and cryptography, Question: (a) Disti...

Question: (a) Distinguish between Steganograhy and Cryptography. (b) "Playfair cipher is more secure than Monoalphabetic cipher." Justify this statement. (c) Various ap

Packet filtering firewall-stateless packet filtering, Stateless Packet Filt...

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

Define bridges, Bridges perform both in the data link layers and physical...

Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the

Biology, Ask question #Minimum 100 words are there non parasitic v...

Ask question #Minimum 100 words are there non parasitic viruses

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd