Provide a suitable network infrastructure for the campus, Computer Network Security

Assignment Help:

QUESTION

a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a segment. Give the source MAC address in hexadecimal; the source IP address, the upper layer protocol, the TTL and the header checksum in decimal; the source port number in decimal and hence deduce the application layer protocol this segment is destined to.

00 13 02 4a 88 97 00 15 56 3a 4c 79 08 00 45 00
00 9e 99 e6 40 00 3c 11 15 fd ca 7b 02 06 c0 a8
01 42 00 35 04 01 00 8a 35 9f

b) A UTM graduate has been told by his supervisor to work out how to connect a small university campus onto the Internet.

1457_Ethernet.png

The campus contains 3 schools, a library and a Research Centre. Each school has about 300 hosts, 50 for staff, and 250 for students.

The library consists of 4 levels. At any one time, a maximum of 50 WiFi-ready laptops are loaned to students for use within the library only.

The Research Centre has 12 workstations which run simulation software requiring an internal bandwidth above 500 Mbps.

The campus has a HTTP server and a FTP server holding the web content, both of which should be accessible internally and externally.

The university's ISP has awarded one block of public IP addresses as 202.123.21.112 /29.

Provide a suitable network infrastructure for the campus bearing in mind sound design principles. Give the configurations of all important nodes such as hardware devices or servers that you would be using to implement your design. Additionally, give the network configuration of 1 staff PC from any school, 1 laptop from the Library. Be sure to mention topologies, technologies used in your design.


Related Discussions:- Provide a suitable network infrastructure for the campus

Legal, LEGAL, ETHICAL AND PROFESSIONAL ISSUES To minimize liabilities an...

LEGAL, ETHICAL AND PROFESSIONAL ISSUES To minimize liabilities and reduce risks, information security practitioner should: •    to understand current legal environment •    to s

Cost accounting, ?Examples should include direct costs items, indirect cost...

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

Explain briefly how go-back-n operates, Question: a) There are two basi...

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

Innovative nature of triple key management, Innovative nature of triple key...

Innovative nature of triple key management The triple key management scheme provides secure services by combining different techniques whic contribute to the security and priv

Spambot detection - spam mail, Spambot Detection: The  previous studie...

Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is

Log file monitors-information security, LOG FILE MONITORS Log file monit...

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

Describe how the encapsulated security header protocol, Question: (a) ...

Question: (a) Give 2 benefits of using IPsec. (b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (

Explain the term quality of service in networks, QUESTION (a) One of th...

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd