Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Answer each of the following problems in complete detail:

All answers should be your own work describeed in your own words

1. Bob has been given the task of changing the IP address and enabling telnet access on a CISCO 2950 enterprise switch.

The current IP address is 10.10.10.2/8 the new IP address is 10.0.0.2/24

The enterprise switch has an encrypted password which Bob has no way of determining.

a. describe the process Bob would take to get around the password

b. describe all of the commands needed for Bob to successfully accomplish the IP address change and telnet access

2. describe everything you can tell from the following:

a. 00-01-00-01-13-FD-F4-C0-00-1E-33-92-CE-99

b. fe80::2c1e:18af:749b:91c5%12

c. 2002:8b64:6e3a::8b64:6e3a 

d. ::01

3. The following information was obtained from a host:

IP address……………205.133.127.8/24
Default Gateway…… 205.133.127.1
DNS Server………….139.100.110.10
HOSTS file entry’s
131.183.10.40 foxnews.com
127.0.0.1 cnn.com

Describe the sequence of events (in detail) that would occur if this host attempts to:

a) Load the Web Site (using a Web Browser) of the following Domain Names.

http://www.foxnews.com
http://www.myut.utoledo.edu
http://www.cnn.com

b) Ping the following Domain Names.

foxnews.com
myut.utoledo.edu
cnn.com

4. describe each of the good ‘Network Design goals’.

5. After powering up his PC, Bob notices the PC was not able to properly connect to network devices. He obtained the following information from his workstation:
C:\>ipconfig
Windows IP Configuration
Ethernet adapter El90x1:
Connection-specific DNS Suffix….:
IP Address. . . . . . . . ………………: 169.254.55.187
Subnet Mask . . . . . . …………….. : 255.255.0.0
Default Gateway . . . …………….. :

He called the IT department for help (he was on hold for 5 minutes). When the IT tech support person got on the phone, Bob’s PC had already begun working properly. Bob then obtained the following information from his workstation.
C:\>ipconfig
Connection-specific DNS Suffix….:
IP Address. . . . . . . . ………………: 139.100.110.50
Subnet Mask . . . . . . …………….. : 255.255.0.0
Default Gateway . . . …………….. : 139.100.110.1

a. describe in detail what occurred.

b. How can Bob account for the first IP stack entries?

c. How would you describe the changes to the IP stack?

6. SSK Software Corporation has opened an office in Toledo, Ohio. The office will have a wireless Wi-Fi (WLAN), and a Corporate wired Ethernet LAN. Workstation requirements are as follows:
Users Workstations Planned Expansion
Accounting Dept. 20 14
All other Dept’s 105 15
Wireless Users 23 0
The Corporate plan is to Subnet the Accounting Department, the Wireless Network and the rest of the wired network. The goal is to keep the accounting data private and secure.

a. Propose a IP network scheme to accommodate the needs of the office above. Your proposal should incorporate the most efficient use of network/host using VLSM and a second option using FLSM. Provide pluses and minuses for each option.
b. Select one of your options from answer (a) above to use in developing a network number scheme and assign IP addresses to devices (such as PC’s, printers, switches). Create a table for the entire network applying this scheme.
c. Design a Network Security Policy for SSK Software. Assume SSK Software currently has no network security hardware/Software. What items would SSK Software need to purchase in order to implement the Security Policy?
d. describe all Security measures you would recommend to SSK Software.

7. ACME Corp is located in Toledo, Ohio. They would like to create a network and divide it into 3 subnets, each subnet has 150 computers. The IT plan calls for connecting the LAN to the Internet. ACME Corp. has elected to use public IP address space on all computers.
Their ISP has restricted the IP ranges to the ones below. The ISP’s Network Administrator is on vacation – you have been asked to fill-in and select a range of addresses that will satisfy ACME Corp.’s needs with the least amount of wasted IP addresses. Propose a range of addresses for ACME Corp. and describe your answer.

225.113.8.0/24
225.113.9.0/24
192.168.0.0/16
63.127.136.0/24
63.128.135.0/24
63.128.136.0/24
63.128.137.0/24
63.128.138.0/24
206.122.148.0/24
10.0.0.0/8
63.125.138.0/24
63.126.137.0/25
63.128.139.0/24

8. The following information was obtained from a host computer:

00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.25: S 2688560409:2688560409(0) win 16384 (DF) (ttl 46, id 20964)
00:05:17.176700 64.254.128.66.25 > 74.125.228.54.1270: S 774583594:774583594(0) ack 2688560410 win 8760 (DF) (ttl 64, id 35473)
00:05:17.302784 74.125.228.54.1270 > 64.254.128.66.25: . ack 1 win 17520 (DF) (ttl 46, id 21021)
00:05:17.906230 64.254.128.66.25 > 74.125.228.54.1270: P 1:93(92) ack 1win 8760 (DF) (ttl 64, id 35502)
00:05:18.021955 74.125.228.54.1270 > 64.254.128.66.25: P 1:29(28) ack 93 win 17520 (DF) (ttl 46, id 21354)
00:05:18.023785 64.254.128.66.25 > 74.125.228.54.1270: P 93:184(91) ack 29 win 8760 (DF) (ttl 64, id 35505)
00:05:18.140187 74.125.228.54.1270 > 64.254.128.66.25: P 29:67(38) ack 184 win 17520 (DF) (ttl 46, id 21464)
00:05:18.174986 64.254.128.66.25 > 74.125.228.54.1270: P 184:229(45) ack 67 win 8760 (DF) (ttl 64, id 35514)
00:05:18.289620 74.125.228.54.1270 > 64.254.128.66.25: P 67:99(32) ack 229 win 17520 (DF) (ttl 46, id 21594)
00:05:18.298831 64.254.128.66.25 > 74.125.228.54.1270: . ack 99 win 8760 (DF) (ttl 64, id 35523)
00:05:18.353209 64.254.128.66.25 > 74.125.228.54.1270: P 229:273(44) ack 99 win 8760 (DF) (ttl 64, id 35524)
00:05:18.469836 74.125.228.54.1270 > 64.254.128.66.25: P 99:105(6) ack 273 win 17520 (DF) (ttl 46, id 21661)
00:05:18.474644 64.254.128.66.25 > 74.125.228.54.1270: P 273:323(50) ack 105 win 8760 (DF) (ttl 64, id 35529)
00:05:18.607459 74.125.228.54.1270 > 64.254.128.66.25: P 105:1129(1024) ack 323 win 17520 (DF) (ttl 46, id 21704)
00:05:18.615449 74.125.228.54.1270 > 64.254.128.66.25: . 1129:2589(1460) ack 323 win 17520 (DF) (ttl 46, id 21705)
00:05:18.695594 64.254.128.66.25 > 74.125.228.54.1270: . ack 2589 win 8760 (DF) (ttl 64, id 35538)
00:05:18.818813 74.125.228.54.1270 > 64.254.128.66.25: P 2589:3698(1109) ack 323 win 17520 (DF) (ttl 46, id 21827)
00:05:18.834821 64.254.128.66.25 > 74.125.228.54.1270: P 323:367(44) ack 3698 win 8760 (DF) (ttl 64, id 35552)
00:05:18.979682 74.125.228.54.1270 > 64.254.128.66.25: P 3698:3704(6) ack 367 win 17520 (DF) (ttl 46, id 21900)
00:05:18.979877 74.125.228.54.1270 > 64.254.128.66.25: F 3704:3704(0) ack 367 win 17520 (DF) (ttl 46, id 21901)
00:05:18.979957 64.254.128.66.25 > 74.125.228.54.1270: . ack 3705 win 8754 (DF) (ttl 64, id 35571)
00:05:18.983169 64.254.128.66.25 > 74.125.228.54.1270: F 412:412(0) ack 3705 win 8760 (DF) (ttl 64, id 35574)

a. Describe what is occurring and how do you know?

b. Was the entire transaction completed?

c. Did this transaction use TCP, UDP or something else? How do you know?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91599

Have any Question? 


Related Questions in Computer Network & Security

Network assignmentoverviewyou will provide a detailed

Network Assignment Overview You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria: • Each Classroom Computer Lab will be on a separate n ...

Context this assignment involves preparation of a report

Context This assignment involves PREPARATION OF A REPORT. The report relates to the Scenario given below. Aim: You have been asked to present a proposal for an Internet/Intranet solution for a college. The college is esp ...

Explain briefly what is meant by lsquooptimising a

Explain briefly what is meant by ‘optimising a network'. Answer should refer to all aspects of optimisation, including resource smoothing /levelling, crashing the network, and anything else you consider relevant.

I encourage you to use latex but even if you dont please

I encourage you to use Latex, but even if you don't, please type your answers or hand write nicely. Explain your argument in a brief and precise way. 1. In a symmetric cryptosystem, Alice and Bob both know the e-key and ...

Individual systems scenariothis assignment is a

Individual: Systems Scenario This assignment is a continuation from the Week Four assignment. In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and config ...

Performance architecture papercontinuing with a company you

Performance Architecture Paper Continuing with a company you selected in Week Two, evaluate network management components on a global scale. Write a 2- to 3-page paper that evaluates and discusses the following: • Impact ...

Program one - multithreaded joke server and

Program One - Multithreaded Joke Server and Client Overview: In this assignment you will build a pair of multi-threaded servers that accept input from multiple clients, and return appropriate output. In addition to the b ...

The project requires a significant amount of work on

The project requires a significant amount of work on research, design and implementation. It is advised that you should start the project as soon as possible. A Simple File Transfer Protocol Design and implement a simple ...

Coit20261 network routing and switching assignment-

COIT20261 Network Routing and Switching Assignment- Objectives - This assessment task requires you to demonstrate your knowledge of basic routing concepts by completing a number of exercise questions. Instructions - You ...

Provide at least three methods or tools used to attack web

Provide at least three methods or tools used to attack web servers as well as provide how each of these three methods can be protected against. Directions: Your completed assignment should be at least 2 FULL double-space ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate