Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) A small company has network topology shown below. In this topology: Three Ethernet segments (L1, L2, L3) are interconnected with transparent bridge B and router R. Nodes E, F, I, and J are end systems. End systems don’t forward packets.

1411_Routers and bridges.jpg

a) In this problem, use following notation: the MAC address of node E is e (lower case), its IP address is E (UPPER CASE). If node has multiple IP or MAC addresses, use index of segment to distinguish between them. Such as, host F has two different IP addresses, F[1] and F[3], as it is on two LANs. The first line in the table provides an ex entry for a packet from E to F on link L1.

Assume host E opens a connection to the Web server J. In the following table, give the MAC and IP source and destination addresses of the SYN packet of the TCP connection as it is observed travelling on links L1, L2, and L3 (i.e. fill in the next 3 lines).

1104_MAC address.jpg

b) The administrator has allocated class C addresses to each of the routed IP subnets. All the networking parameters of the different nodes in the system are statically configured. At some point, the company wants to move server J from link L3 to link L1.

(i) What changes are required to configuration of J?

(ii) What changes are required to configuration of R? (Don't worry about DNS for any of these problems).

(iii) What other nodes need to be updated?

c) At a later time endsystem E is moved to link L2. What nodes should have their configuration changed and how? Because of high network utilization in L3, the administrator reduces network load in L3 by segmenting it.

d) What type of device should be used if the administrator wishes to minimize his work? Give a reason for your answer.

e) What kind of device should be used if a significant portion of network traffic is broadcast (primarily ARP traffic) on the LAN? Give a reason for your answer.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96757

Have any Question? 


Related Questions in Computer Network & Security

Discussion questions -optimizing your network design please

Discussion Questions - "Optimizing Your Network Design" Please respond to the following: Select and describe one (1) of the queuing methods described in the readings. Present a real-world example of the method you select ...

1a briefly explain how an integrity check value icv may be

1. (a) Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors. (b) When using an ICV, explain why (i) a message might be transmitted correctly but the receiver believes t ...

This assignment assumes that you are one of the network

This assignment assumes that you are one of the Network Engineer of a small Company which has two branch offices, Branch 1 (BR1), Branch 2 (BR2) and a Headquarter (HQ). The branches need to be interconnected to the Headq ...

Short answer1 classify each of the following

Short Answer 1. Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether business continuity plans would be called intoplay. a. A hacker breaks into the com ...

Assignment give an answer to the following topicswhat are

Assignment: Give an answer to the following topics: What are the security issues with wireless LANs and WANs in a data processing environment? What are the recommended solutions to the issues identified? What are the sec ...

Network simulation projectsimulation projectobjectivesbull

Network Simulation Project Simulation Project Objectives • Design and analyze the performance of a network under different traffic conditions. • Design and analyze the performance of a wide area network. • Investigates t ...

1 list and describe the four types of computer networks

1. List and describe the four types of computer networks from largest to smallest.  2. Define client/server computing, packet switching, and TCP/IP.  Explain how these three things make the Internet so powerful and robus ...

What is the typical relationship between the untrusted

What is the typical relationship between the untrusted network, the firewall, and the trusted network? How is an application-layer firewall different from a packet filtering firewall? Why is an application-layer firewall ...

Module case studythe purpose of this assignment is for

Module Case Study The purpose of this assignment is for students to write a case study based on a common information security scenario. Prompt: You are the senior information security manager for a federal agency. You re ...

Learning team apply encryption standardsyour team was

Learning Team: Apply Encryption Standards Your team was invited to present to a high school IT class to explain how cryptography works. In order to explain the basics, you decide to show the class a tool called, CrypTool ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro