Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) A small company has network topology shown below. In this topology: Three Ethernet segments (L1, L2, L3) are interconnected with transparent bridge B and router R. Nodes E, F, I, and J are end systems. End systems don’t forward packets.

1411_Routers and bridges.jpg

a) In this problem, use following notation: the MAC address of node E is e (lower case), its IP address is E (UPPER CASE). If node has multiple IP or MAC addresses, use index of segment to distinguish between them. Such as, host F has two different IP addresses, F[1] and F[3], as it is on two LANs. The first line in the table provides an ex entry for a packet from E to F on link L1.

Assume host E opens a connection to the Web server J. In the following table, give the MAC and IP source and destination addresses of the SYN packet of the TCP connection as it is observed travelling on links L1, L2, and L3 (i.e. fill in the next 3 lines).

1104_MAC address.jpg

b) The administrator has allocated class C addresses to each of the routed IP subnets. All the networking parameters of the different nodes in the system are statically configured. At some point, the company wants to move server J from link L3 to link L1.

(i) What changes are required to configuration of J?

(ii) What changes are required to configuration of R? (Don't worry about DNS for any of these problems).

(iii) What other nodes need to be updated?

c) At a later time endsystem E is moved to link L2. What nodes should have their configuration changed and how? Because of high network utilization in L3, the administrator reduces network load in L3 by segmenting it.

d) What type of device should be used if the administrator wishes to minimize his work? Give a reason for your answer.

e) What kind of device should be used if a significant portion of network traffic is broadcast (primarily ARP traffic) on the LAN? Give a reason for your answer.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96757

Have any Question? 


Related Questions in Computer Network & Security

Using power flow analysis for network Using Power Flow Analysis for Network

Using Power Flow Analysis for Network Reconfiguration Electricity distribution networks connect the high-voltage transmission system to users. Conventional distribution networks have been developed over the last 50 years ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

A cipher can be created by using a keyword for example if

A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows: Method I. Write the word "statistic" without the repeated letters. Then complet ...

Ten immutable laws of security please respond to the

"Ten Immutable Laws of Security" Please respond to the following: • From the e-Activity, read the full article posted at https://technet.microsoft.com/en-us/library/hh278941.aspx titled "Ten Immutable Laws of Security (V ...

The handbook must be original student content and workin

The handbook must be original student content and work. In addition to describing the company to which the employee handbook applies, also address the issues of privacy, employee or applicant testing, and performance eva ...

Program one - multithreaded joke server and

Program One - Multithreaded Joke Server and Client Overview: In this assignment you will build a pair of multi-threaded servers that accept input from multiple clients, and return appropriate output. In addition to the b ...

Assignment overviewpurpose of the assessmentthe purpose of

Assignment Overview Purpose of the assessment: The purpose of this assignment is to develop skills to identify appropriate network security tools for various operating systems. Students will also have opportunity to expl ...

Instructionsresponses to each question are expected to be

Instructions: Responses to each question are expected to be between 100 and 200 words. Will not be penalized for exceeding 200 words, but they should strive to reach a minimum of 100 words when constructing the response ...

Task sheettask scenarioan information security management

Task Sheet TASK SCENARIO: An information security management system (ISMS) represents a systematic approach to designing, implementing, maintaining, and auditing an organization's information system security objectives. ...

Tcpip network assignmentneed 8 ppt slides with at least 2

TCP/IP Network Assignment Need 8 ppt slides with at least 2 references. Your manager has tasked you to create two network diagrams that illustrate the Remote Employee Connection options for VPN connectivity. These diagra ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate