Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) A small company has network topology shown below. In this topology: Three Ethernet segments (L1, L2, L3) are interconnected with transparent bridge B and router R. Nodes E, F, I, and J are end systems. End systems don’t forward packets.

1411_Routers and bridges.jpg

a) In this problem, use following notation: the MAC address of node E is e (lower case), its IP address is E (UPPER CASE). If node has multiple IP or MAC addresses, use index of segment to distinguish between them. Such as, host F has two different IP addresses, F[1] and F[3], as it is on two LANs. The first line in the table provides an ex entry for a packet from E to F on link L1.

Assume host E opens a connection to the Web server J. In the following table, give the MAC and IP source and destination addresses of the SYN packet of the TCP connection as it is observed travelling on links L1, L2, and L3 (i.e. fill in the next 3 lines).

1104_MAC address.jpg

b) The administrator has allocated class C addresses to each of the routed IP subnets. All the networking parameters of the different nodes in the system are statically configured. At some point, the company wants to move server J from link L3 to link L1.

(i) What changes are required to configuration of J?

(ii) What changes are required to configuration of R? (Don't worry about DNS for any of these problems).

(iii) What other nodes need to be updated?

c) At a later time endsystem E is moved to link L2. What nodes should have their configuration changed and how? Because of high network utilization in L3, the administrator reduces network load in L3 by segmenting it.

d) What type of device should be used if the administrator wishes to minimize his work? Give a reason for your answer.

e) What kind of device should be used if a significant portion of network traffic is broadcast (primarily ARP traffic) on the LAN? Give a reason for your answer.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96757

Have any Question? 


Related Questions in Computer Network & Security

Securritypost for elprofessoripart 1based on your teams

Securrity Post for elprofessori Part 1 Based on your team's Week Five Learning Team Collaborative discussion, write the Network Security Policy section of the Information Security Policy. Include the following: • Network ...

Assignmentsummarize the principles of public-key

Assignment Summarize the principles of public-key encryption. In what way is an unprotected idle PC a danger to the internet? Suppose a PC owner leaves the PC connected to the Internet where it ultimately is used by anot ...

Assignmentmr smith is the director of it at a law firm

Assignment Mr. Smith is the Director of IT at a law firm located in downtown Chicago. He needs to plan for a network upgrade. He has decided that he would like to have a network analysis done before the upgrade so that h ...

Proposal projectchoose one of the following for this

Proposal Project Choose one of the following for this project and See attachment for complete instruction and please remember to send a turnitin report. 1) Metasploit 2) Wireshark 3) Back Track 4) Nessus 5) Cain & Abel P ...

Assignment1many more square-wave digital encoding schemes

Assignment 1. Many more square-wave digital encoding schemes exist than NRZ-L, NRZI, Manchester, differential Manchester, and bipolar-AMI. List three other encoding techniques and show an example of how each encodes. 2. ...

Networking and server landscape of rays foodusing the

Networking and server landscape of Ray's Food. Using the Configuration Scenario Instructions, create a 1-page Systems Diagram in Microsoft Visio, or another diagramming tool, that shows the technical networking and serve ...

Networking trends papernbsp in this paper you will research

Networking Trends Paper:  In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, hardware, network m ...

What are the main components of cryptology explain the

What are the main components of cryptology? Explain the relationship between plaintext and ciphertext ? Define asymmetric encryption. Why would it be of interest to information security professionals? One tenet of crypto ...

Data information decision please respond to the

"Data Information Decision" Please respond to the following: · With the obvious pace of current technology development, data continues to grow daily. Imagine that you are a Database Administrator for a large organization ...

Develop a wlan plan for acme graphic design based on a

Develop a WLAN plan for Acme Graphic Design based on a chosen Blueprint and security to the owner. Write a 700- to 1,750-word document using Microsoft® Word finalizing describing your final network design incorporating y ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen