Securing Higher Grades Costing Your Pocket? FLAT 25% OFF on all orders
loader

Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

Stuck on Your Question?

Get 24x7 live help from our Top Tutors. All subjects covered.

Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

loader
250 words

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Students Who Viewed This Also Studied

19 Pages
Perimeter Topology

Table of contents Introduction 1. Determine, and document, the level and nature of the security needed to the meet requirements of the enterprise. 2. Identify, and record, the security thre ...

Course

ICTNWK509

Subject

Networking

University

Victoria University

Season

Fall

83 Pages
Campus Wide Networks

International Journal of Computer Networks and Communications Security VOL. 5 , NO. 2 , FEBRUARY 2017 , 20 27 Available online at: www.ijcncs.org E - ISSN 2308 - 9830 (Online) ...

Course

ICTNWK509

Subject

Networking

University

Victoria University

Season

Fall

19 Pages
Vulnerability Investigation

!!!!"#$% &'(()*)+,-./0)123)$/,43)50647.89 )!"" #$%&'%( )*)+),-.%'/01#.#(2 )3%4'"(#$0(#5%) )!:;07;.0# 52&$&5(00 ,#$-#'))> #'-0.$&-"'< ##@-$)#$%($#$%&'# $('> #5("#1)#&"4&6&4.(0#-2# (#72-.; #/-2> #-8# *( ...

Course

ITECH3100

Subject

Networking

University

Federation University

Season

Fall

26 Pages
Virtual Private Network

Site - to - site virtual private network (VPN) S ite - to - site virtual private network (VPN) is a connection between two or more networks, such as a corporate network and a branch office netw ...

Course

ICTNWK509

Subject

Networking

University

Victoria University

Season

Fall

ITNE1001-Network Architecture

Question

Answered

Assignment Description

You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading network designer and security provider for the small-scale offices. As the Network and security engineer you are required to perform the following tasks.

Task 1: Propose a network design for small scale office (Ex: Business type, departments, building plan). You are free to assume the name of the office and number of staffs

➢ Purpose of the Project

➢ Network overview (ex: connecting PCs, subnetworks, servers or wi-fi networks)

• Explain briefly about the device used.

➢ Requirements of the project including network diagram

• Draw and explain the proposed network diagram

• Design a network using packet tracer. Configure routers, switches and end devices you have used. Test your network by pinging end devices across different departments.

➢ What are the common attacks plaguing your network? How to prevent from attacking your network?

➢ Critically analyse possible security issues in your network and suggest some prevention techniques.

Task 2: Use Wireshark to Capture, Filter and Inspect Packets

➢ Install Wireshark and start a sample capture using your wireless interface. Save your capture file on the desktop with name_studentID.pcap (Example: jack_451245.pcap), and close Wireshark. Provide a screenshot in your report.

➢ Open your name_studentID.pcap capture file in Wireshark and check how many packets you captured in total?

➢ Which pane displays information about packet details and explain what information’s are available?

➢ Which pane displays information in the HEX and ASCII form for each packet you've captured? Explain 

ITNE1001-Network Architecture

Answer in Detail

Solved by qualified expert

Get Access to This Answer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

9 More Pages to Come in This Document. Get access to the complete answer.

More ITNE1001 ITNE1001-Network Architecture: Questions & Answers

Q
icon

We aren't endorsed by this University

Perimeter Topology

Table of contents Introduction 1. Determine, and document, the level and nature of the security needed to the meet requirements of the enterprise. 2. Identify, and record, the security threats. 3. Research the perimeter security options that are available. 4. Design the securit ...

View Answer
Q
icon

We aren't endorsed by this University

Campus Wide Networks

International Journal of Computer Networks and Communications Security VOL. 5 , NO. 2 , FEBRUARY 2017 , 20 27 Available online at: www.ijcncs.org E - ISSN 2308 - 9830 (Online) / ISSN 2410 - 059 5 (Print) Case Study on Firewall Rules Analysis for CWN MANIKRAO L DHORE ...

View Answer
Q
icon

We aren't endorsed by this University

Vulnerability Investigation

!!!!"#$% &'(()*)+,-./0)123)$/,43)50647.89 )!"" #$%&'%( )*)+),-.%'/01#.#(2 )3%4'"(#$0(#5%) )!:;07;.0# 52&$&5(00 ,#$-#'))> #'-0.$&-"'< ##@-$)#$%($#$%&'# $('> #5("#1)#&"4&6&4.(0#-2# (#72-.; #/-2> #-8# *(A&*.*#B# *)*1)2 'M ###N-/#4-)'#$%)#/-2>#2)0($)#$-#-$%)2#$-;&5'#;2)6&-.'0,#5-6)2)4#&"#50(''M ##K ...

View Answer
Q
icon

We aren't endorsed by this University

Virtual Private Network

Site - to - site virtual private network (VPN) S ite - to - site virtual private network (VPN) is a connection between two or more networks, such as a corporate network and a branch office network . Many organizations use site - to - site VPNs to leverage an internet connection for private tr ...

View Answer

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.io then please raise the content removal request.

Choose Our Best Expert to Help You

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile Chat Now
Have any Query?
close
Subtraction Payment required!

Only one step away from your solution of order no.