Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) A small company has network topology shown below. In this topology: Three Ethernet segments (L1, L2, L3) are interconnected with transparent bridge B and router R. Nodes E, F, I, and J are end systems. End systems don’t forward packets.

1411_Routers and bridges.jpg

a) In this problem, use following notation: the MAC address of node E is e (lower case), its IP address is E (UPPER CASE). If node has multiple IP or MAC addresses, use index of segment to distinguish between them. Such as, host F has two different IP addresses, F[1] and F[3], as it is on two LANs. The first line in the table provides an ex entry for a packet from E to F on link L1.

Assume host E opens a connection to the Web server J. In the following table, give the MAC and IP source and destination addresses of the SYN packet of the TCP connection as it is observed travelling on links L1, L2, and L3 (i.e. fill in the next 3 lines).

1104_MAC address.jpg

b) The administrator has allocated class C addresses to each of the routed IP subnets. All the networking parameters of the different nodes in the system are statically configured. At some point, the company wants to move server J from link L3 to link L1.

(i) What changes are required to configuration of J?

(ii) What changes are required to configuration of R? (Don't worry about DNS for any of these problems).

(iii) What other nodes need to be updated?

c) At a later time endsystem E is moved to link L2. What nodes should have their configuration changed and how? Because of high network utilization in L3, the administrator reduces network load in L3 by segmenting it.

d) What type of device should be used if the administrator wishes to minimize his work? Give a reason for your answer.

e) What kind of device should be used if a significant portion of network traffic is broadcast (primarily ARP traffic) on the LAN? Give a reason for your answer.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96757

Have any Question? 


Related Questions in Computer Network & Security

Develop a network security plan for a medical record

Develop a Network Security Plan for a Medical Record Company. As a network administrator you are required to develop a brand new security plan. The medical record company consists of the following individuals: Doctors, N ...

Wireless and remote access securitykey assignment

Wireless and Remote Access Security Key Assignment Draft Great progress has been made on the design of the network with the addition of the client and server security models in the previous assignment. With the increasin ...

Network security- as a corporate network administrator the

"Network Security" - As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects on ...

Research paperfor this writing assignment you find a

Research Paper For this writing assignment, you find a current event that has occurred in the last year. Your paper will be a minimum of 3 pages and include a summary of the event, the perceived impact of the event on th ...

Networking trends paperin this paper you will research and

Networking Trends Paper In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, hardware, network man ...

Multiple-choice questions1 which of the following is not a

Multiple-Choice Questions: 1. Which of the following is NOT a feature of an Intranet? A. uses Internet based standards, such as HTML and SMTP B. is used to connect both local and remote sites into one network C. is used ...

What are the main components of cryptology explain the

What are the main components of cryptology? Explain the relationship between plaintext and ciphertext ? Define asymmetric encryption. Why would it be of interest to information security professionals? One tenet of crypto ...

Presentation - tool comparisonat this point you have been

Presentation - Tool Comparison At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of t ...

Develop a wlan plan for acme graphic design based on a

Develop a WLAN plan for Acme Graphic Design based on a chosen Blueprint and security to the owner. Write a 700- to 1,750-word document using Microsoft® Word finalizing describing your final network design incorporating y ...

Questions1 describe three factors that help to influence

Questions: 1. Describe three factors that help to influence our nation's focus on natural or man-made disasters. 2. What issues have been raised concerning some of the authorities granted to government agencies in the PA ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen