Provide the network configuration, Computer Network Security

Assignment Help:

QUESTION:

a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length, and the header checksum of the packet in decimal; the source port number in decimal and thus deduce the application layer protocol and whether this capture relates to a response or request message.

00 13 02 4a 88 97 00 15 56 3a 4c 79 08 00 45 00
00 4c ae 91 40 00 3c 06 01 9b ca 7b 02 1a c0 a8
01 42 00 19 04 35 aa 36 09 bb e5 30 36 00 50 18
40 b0 05 fa 00 00 32 35 30 20 6f 6b 3a 20 20 4d

b) A company occupies 3 floors of a building plus the basement. Each floor is occupied by one department and adds the office of one senior manager responsible for each department. About 30 PCs having internet access are expected on each floor. The basement accommodates various server machines. For security reasons the senior managers should be accessible from the other machines only via a firewall router. The company uses a private internal network: 192.168.1.0./24. The company has an ADSL connection to the Internet. As part of this arrangement the ISP issues the company with a single public Internet address: 202.123.21.144.

Show a full network diagram for the company and make sure you identify any network devices, transmission technology and media. You have to give the IP, subnet mask and gateway addresses for all devices and servers that you find pertinent to your design. You have to also devise a scheme to allow the single public IP address to be shared among the whole staff and give special server configurations to meet company's goals. Provide the network configuration for 1 staff PC and 1 senior manager PC from each department.


Related Discussions:- Provide the network configuration

Packet sniffers, PACKET SNIFFERS A packet network protocol analyzer is a...

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

State the fermat-euler theorem, Question: (a) Prove that every positive...

Question: (a) Prove that every positive integer n can be factorized into a product of prime powers. (b) State the Fermat-Euler theorem as needed in the RSA system. (c) Us

It service support within the itil framework, Problem (a) IT Service Suppo...

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Define broadcasting , Broadcasting is the distribution of video and audio...

Broadcasting is the distribution of video and audio content to a whole audience via any audio or visual mass communications medium, but generally one using electromagnetic radiat

Semester 2, Do you have assignment solutions for CCE UPES MBA for oil and g...

Do you have assignment solutions for CCE UPES MBA for oil and gas semester 2

Explain authentication process in a synchronous token system, Question: ...

Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

Ucsf medical center case study-information security, Example : UCSF Medical...

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

Datagram reassembly, DATAGRAM REASSEMBLY Recreation of original datagr...

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

Evaluations, Evaluations, Assessment, and Maintenance of Risk Controls W...

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

Efforts of advanced research project agency, ADVANCED RESEARCH PROJECT AGEN...

ADVANCED RESEARCH PROJECT AGENCY (ARPA) The efforts of ARPA was to active all its research groups have accept to new era computers. For this purpose ARPA started investing in wa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd