
HI6006 Competitive Strategy Editing Service
Delivery in day(s): 4
| PCA | PCB | S1 | S4 | R12 | R45 | R3 |
Source MAC Address | 00D0.D301.877B | 0030.A3B6.1701 | 00D0.D301.877B | 0030.A3B6.1701 | N/A | 0030.A3B6.1701 | 000D.BDB6.0302 |
Destination MAC Address | 0002.17C6.D301 | 00E0.F7AE.5C84 | 0002.17C6.D301 | 00E0.F7AE.5C84 | N/A | 00E0.F7AE.5C84 | 0030.A3B6.1702 |
Source IP Address | 192.168.1.1 | N/A | N/A | N/A | 192.168.1.1 | 192.168.1.1 | 192.168.1.1 |
Destination IP Address | 192.168.1.4 | N/A | N/A | N/A | 192.168.1.4 | 192.168.1.4 | 192.168.1. |
Answer 7.2
HDLC Protocols is a synchronize protocol which uses SLARP (Serial Line ARP) that is endpoints connection. So HDLC will be not required the MAC Address to know next hop address. PDU is also not needs MAC Address because it uses no Ethernet frame that already contained source and destination MAC Address. So we can say HDLC is purely two end connections.
Network components
1.Four personal system (like computer, laptops)
2.One sever
3.Switch crystal 2960
4.Router Cisco 1900
Addressing Scheme:
In the network, Addressing Scheme is known as naming Schema. Each Network device is distinctive in the network through the Addressing Scheme. It gives an IP Address to a device which unique in the single network. It plays a major role in the Small organization network. USQEntertaiment is a small network which holds two different addresses in the network such as 200.100.100.128/30 and 200.100.100.0/25.
Provision of redundancy:
Address Schema offers more IP Address when the Organization will be increasing their staffs’ member. It offers integration in the network during the device connection.
1.The networkmay be caused the malware infection during the USB device connection.
2.Multiple Device access ports contain the switch which allows for the attacker to attack the network.
3.Sometimes, an unauthorized user can be accessed by the Network Server.
1.Dynamic Routing protocolsmust be correctly configured in the Network because it only allowed authorized network devices access the Network.
2.There are designed an ACL (Access control List) that filters unauthorized users in the network.
3.For the unique IP address, Network use VLNS segmentation that does not allow identical IP address in the network various departments.
4.Some time, Router has console ports which allow unauthorized access to the network. It harms the security of the network.
5.Each network device contains fix number of ports to access 2 MAC address but Switch allows accessing the multiple devices that created a threat system in the network.
6.Telnet access the Virtual Line that may be caused the security issue.
1.IDS (Intrusion Detection System), DMS, and IPS (Intrusion Prevention System) technologies used the network to create a secure environment with the SOC (Security Operation Center).
2.The networkcontainsPatch, Backup, Update and Upgrade data for the security point of view.
3.For the Network device Security, AAA method used such as Authentication, Authorization, and Accounting that allows only to access authorized user and control the network configuration.
4.Firewall use in the network as filters which filters Packet filtering, URL filtering, State full packet inspection, and Application filtering. It offers network security through control traffic and unauthorized access.
5.For Network devices security, they use a password. Password must be protected through security algorithms such as hash algorithm and MD5 Algorithm with encryption.
6.Switch turn on their security ports that allow only authorized connection of the laptop and PC.