Ask Question, Ask an Expert


Ask Computer Network & Security Expert

Answer each of the following problems in detail:

problem1) Bob has been given the task of changing the IP address and enabling telnet access on a CISCO 2950 enterprise switch.
The current IP address is the new IP address is
The enterprise switch has an encrypted password which Bob has no way of determining.

a) describe the process Bob would take to get around the password

b) describe all of the commands needed for Bob to successfully accomplish the IP address change and telnet access

problem2) describe everything you can tell from the following:

a) 00-01-00-01-13-FD-F4-C0-00-1E-33-92-CE-99
b) fe80::2c1e:18af:749b:91c5%12
c) 2002:8b64:6e3a::8b64:6e3a
d) ::01

problem3) The following information was obtained from a host:

IP address……………
Default Gateway……
DNS Server………….
HOSTS file entry’s
Describe the sequence of events (in detail) that would occur if this host attempts to:

a) Load the Web Site (using a Web Browser) of the following Domain Names.

b) Ping the following Domain Names.

problem4) describe each of the good ‘Network Design goals’ as discussed in class.

problem5) After powering up his PC, Bob notices the PC was not able to properly connect to network devices. He obtained the following information from his workstation:
Windows IP Configuration
Ethernet adapter El90x1:
Connection-specific DNS Suffix….:
IP Address. . . . . . . . ………………:
Subnet Mask . . . . . . …………….. :
Default Gateway . . . …………….. :
He called the IT department for help (he was on hold for 5 minutes). When the IT tech support person got on the phone, Bob’s PC had already begun working properly. Bob then obtained the following information from his workstation.
Connection-specific DNS Suffix….:
IP Address. . . . . . . . ………………:
Subnet Mask . . . . . . …………….. :
Default Gateway . . . …………….. :

a) describe in detail what occurred.

b) How can Bob account for the first IP stack entries?

c) How would you describe the changes to the IP stack?

problem6) SSK Software Corporation has opened an office in Toledo, Ohio. The office will have a wireless Wi-Fi (WLAN), and a Corporate wired Ethernet LAN. Workstation requirements are as follows:
Users Workstations Planned Expansion
Accounting Dept. 20 14
All other Dept’s 105 15
Wireless Users 23 0
The Corporate plan is to Subnet the Accounting Department, the Wireless Network and the rest of the wired network. The goal is to keep the accounting data private and secure.

a) Propose a IP network scheme to accommodate the needs of the office above. Your proposal should incorporate the most efficient use of network/host using VLSM and a second option using FLSM. Provide pluses and minuses for each option.

b) Select one of your options from answer (a) above to use in developing a network number scheme and assign IP addresses to devices (such as PC’s, printers, switches). Create a table for the entire network applying this scheme.

c) Design a Network Security Policy for SSK Software. Assume SSK Software currently has no network security hardware/Software. What items would SSK Software need to purchase in order to implement the Security Policy?

d) describe all Security measures you would recommend to SSK Software.

problem7) ACME Corp is located in Toledo, Ohio. They would like to create a network and divide it into 3 subnets, each subnet has 150 computers. The IT plan calls for connecting the LAN to the Internet. ACME Corp. has elected to use public IP address space on all computers.
Their ISP has restricted the IP ranges to the ones below. The ISP’s Network Administrator is on vacation – you have been asked to fill-in and select a range of addresses that will satisfy ACME Corp.’s needs with the least amount of wasted IP addresses. Propose a range of addresses for ACME Corp. and describe your answer.

problem8) The following information was obtained from a host computer:

00:05:17.176507 > S 2688560409:2688560409(0) win 16384 (DF) (ttl 46, id 20964)
00:05:17.176700 > S 774583594:774583594(0) ack 2688560410 win 8760 (DF) (ttl 64, id 35473)
00:05:17.302784 > . ack 1 win 17520 (DF) (ttl 46, id 21021)
00:05:17.906230 > P 1:93(92) ack 1win 8760 (DF) (ttl 64, id 35502)
00:05:18.021955 > P 1:29(28) ack 93 win 17520 (DF) (ttl 46, id 21354)
00:05:18.023785 > P 93:184(91) ack 29 win 8760 (DF) (ttl 64, id 35505)
00:05:18.140187 > P 29:67(38) ack 184 win 17520 (DF) (ttl 46, id 21464)
00:05:18.174986 > P 184:229(45) ack 67 win 8760 (DF) (ttl 64, id 35514)
00:05:18.289620 > P 67:99(32) ack 229 win 17520 (DF) (ttl 46, id 21594)
00:05:18.298831 > . ack 99 win 8760 (DF) (ttl 64, id 35523)
00:05:18.353209 > P 229:273(44) ack 99 win 8760 (DF) (ttl 64, id 35524)
00:05:18.469836 > P 99:105(6) ack 273 win 17520 (DF) (ttl 46, id 21661)
00:05:18.474644 > P 273:323(50) ack 105 win 8760 (DF) (ttl 64, id 35529)
00:05:18.607459 > P 105:1129(1024) ack 323 win 17520 (DF) (ttl 46, id 21704)
00:05:18.615449 > . 1129:2589(1460) ack 323 win 17520 (DF) (ttl 46, id 21705)
00:05:18.695594 > . ack 2589 win 8760 (DF) (ttl 64, id 35538)
00:05:18.818813 > P 2589:3698(1109) ack 323 win 17520 (DF) (ttl 46, id 21827)
00:05:18.834821 > P 323:367(44) ack 3698 win 8760 (DF) (ttl 64, id 35552)
00:05:18.979682 > P 3698:3704(6) ack 367 win 17520 (DF) (ttl 46, id 21900)
00:05:18.979877 > F 3704:3704(0) ack 367 win 17520 (DF) (ttl 46, id 21901)
00:05:18.979957 > . ack 3705 win 8754 (DF) (ttl 64, id 35571)
00:05:18.983169 > F 412:412(0) ack 3705 win 8760 (DF) (ttl 64, id 35574)

a) Describe what is occurring and how do you know?

b) Was the entire transaction completed?

c) Did this transaction use TCP, UDP or something else? How do you know?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91224
  • Price:- $220

Guranteed 48 Hours Delivery, In Price:- $220

Have any Question? 

Related Questions in Computer Network & Security

Project infrastructure and securitythis assignment consists

Project: Infrastructure and Security This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of t ...

Learning team apply encryption standardsyour team was

Learning Team: Apply Encryption Standards Your team was invited to present to a high school IT class to explain how cryptography works. In order to explain the basics, you decide to show the class a tool called, CrypTool ...

Wireless and remote access securitykey assignment

Wireless and Remote Access Security Key Assignment Draft Great progress has been made on the design of the network with the addition of the client and server security models in the previous assignment. With the increasin ...

Network management paperin this paper you will research and

Network Management Paper In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

What are the main components of cryptology explain the

What are the main components of cryptology? Explain the relationship between plaintext and ciphertext ? Define asymmetric encryption. Why would it be of interest to information security professionals? One tenet of crypto ...

Assessment project network securityyou have been recently

Assessment Project Network Security You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your ...

Assignmentintroductionin this assignment you will use

Assignment Introduction In this assignment you will use several network tools to look at the protocols and data exchanged between network components. We will be only scratching the surface of the usefulness of these tool ...

Taskprovide short answers to the following six questions

Task Provide short answers to the following six questions. Your answers should be clear, concise and to the point. Prepare a single document (MS Word or PDF, NOT both) along with title page and submit it online using EAS ...

Proposal projectchoose one of the following for this

Proposal Project Choose one of the following for this project and See attachment for complete instruction and please remember to send a turnitin report. 1) Metasploit 2) Wireshark 3) Back Track 4) Nessus 5) Cain & Abel P ...

Topic 1 wireless technologiescreate a short essay 1 to 3

Topic 1: Wireless Technologies Create a short essay (1 to 3 pages) that describes how you will set up a wireless network for the Nardi Pardy Corporation (a fictitious company). In this simple scenario, the company office ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen