CSC8507 Networking Technologies Assignment Help

CSC8507 Networking Technologies Assignment Help

CSC8507 Networking Technologies Assignment Help

Answer 7.1

 

PCA

PCB

S1

S4

R12

R45

R3

Source MAC Address

00D0.D301.877B

0030.A3B6.1701

00D0.D301.877B

0030.A3B6.1701

N/A

0030.A3B6.1701

000D.BDB6.0302

Destination MAC Address

0002.17C6.D301

00E0.F7AE.5C84

0002.17C6.D301

00E0.F7AE.5C84

N/A

00E0.F7AE.5C84

0030.A3B6.1702

Source IP Address

192.168.1.1

N/A

N/A

N/A

192.168.1.1

192.168.1.1

192.168.1.1

Destination IP Address

192.168.1.4

N/A

N/A

N/A

192.168.1.4

192.168.1.4

192.168.1.

Answer 7.2

HDLC Protocols is a synchronize protocol which uses SLARP (Serial Line ARP) that is endpoints connection. So HDLC will be not required the MAC Address to know next hop address. PDU is also not needs MAC Address because it uses no Ethernet frame that already contained source and destination MAC Address. So we can say HDLC is purely two end connections.

Answer 8

Network diagram for USQEntertaiment with 4 Employees and 1 server

CSC8507 Networking Technologies Assignment Help

Network components

1.Four personal system (like computer, laptops)

2.One sever

3.Switch crystal 2960

4.Router Cisco 1900

Addressing Scheme:

In the network, Addressing Scheme is known as naming Schema. Each Network device is distinctive in the network through the Addressing Scheme. It gives an IP Address to a device which unique in the single network.  It plays a major role in the Small  organization network. USQEntertaiment is a small network which holds two different addresses in the network such as 200.100.100.128/30 and 200.100.100.0/25.

Provision of redundancy:

Address Schema offers more IP Address when the Organization will be increasing their staffs’ member. It offers integration in the network during the device connection.

Network diagram for USQEntertaiment with 400 Employees

CSC8507 Networking Technologies Assignment HelpList possible Physical security threats

1.The networkmay be caused the malware infection during the USB device connection.

2.Multiple Device access ports contain the switch which allows for the attacker to attack the network.

3.Sometimes, an unauthorized user can be accessed by the Network Server.

List possible technological, configuration, and security policy vulnerabilities;

1.Dynamic Routing protocolsmust be correctly configured in the Network because it only allowed authorized network devices access the Network.

2.There are designed an ACL (Access control List) that filters unauthorized users in the network.

3.For the unique IP address, Network use VLNS segmentation that does not allow identical IP address in the network various departments.

4.Some time, Router has console ports which allow unauthorized access to the network. It harms the security of the network.

5.Each network device contains fix number of ports to access 2 MAC address but Switch allows accessing the multiple devices that created a threat system in the network.

6.Telnet access the Virtual Line that may be caused the security issue.

Security measures to be taken to secure the network

1.IDS (Intrusion Detection System), DMS, and IPS (Intrusion Prevention System) technologies used the network to create a secure environment with the SOC (Security Operation Center).

2.The networkcontainsPatch, Backup, Update and Upgrade data for the security point of view.

3.For the  Network device Security, AAA method used such as Authentication, Authorization, and Accounting that allows only to access authorized user and control the network configuration.

4.Firewall use in the network as filters which filters Packet filtering, URL filtering, State full packet inspection, and Application filtering. It offers network security through control traffic and unauthorized access.

5.For Network devices security, they use a password. Password must be protected through security algorithms such as hash algorithm and MD5 Algorithm with encryption.

6.Switch turn on their security ports that allow only authorized connection of the laptop and PC.