Remote Accessing and Related Issues
Question Description
Part A
Remote Accessing and Related Issues
An organization’s head office is connected to its branch office over the Internet. The network connection works fine without errors. The users at the branch office connect to the head office by using telnet to access UNIX-based servers and a virtual network console (VNC) to access Windows-based servers. They transfer data across the network by using FTP. However, the users complain of a mismatch in the content sent from the head office and that received by them at the branch office.
Based on your understanding of the above scenario create a Microsoft Word document, answering the following:
- What can be the cause of the problem? Suggest some ways to resolve the problem.
- Which is the best way to resolve the problem and why?
Users from the finance department access an Oracle server for their operations. The computers on the finance department network are assigned public IP addresses. The Oracle server is on a different network than the finance department network. The users complain of slow response from the Oracle server. A detailed observation of the traffic flow in and out of the server shows a large number of ICMP echo and echo-reply packets. Consider that you are part of the network administration team of the organization. Imagine yourself as a network administrator.
Based on your understanding of the above scenario, create a Microsoft word document answering the following:
- How will you resolve the problem?
- Which would be the first place that you would look at for excessive echo and echo-reply packets?
- Explain in detail of the various commands and in what order you would diagnose to efficiently pinpoint the issue in quickest possible time.Many users on the local LAN are facing a slow response from the Oracle server. The management has asked you to produce the response time and throughput statistics between a user’s computer and the server.Based on your understanding of the above scenario, create a Microsoft Word document answering the following:
- Simulate the scenario in Etherpeek and generate the required report.
- As part of the technical proposal, document the troubleshooting tools to be used and list the steps to be taken in case of a problem.
Discuss the different problem scenarios that the client may face.
Part B
IP Security and Attacks
Based on your understanding of networking concepts, create a 2- to 3-page report in a Microsoft Word document answering the following:
- Describe ‘The Three Principles of IP Security’.
- Cite references as well as a detailed explanation for the same.
- Explain how you would as an employee of a company practice those principles.
- Describe ‘Typical IP Attacks’ that happen in networks around the world.
- Cite references for three different types of attacks that occurred recently (with current and past year) in the news.
- Explain how the attack occurred and what was needed to remedy the situation.
- Using the South University Online Library or the Internet describe security policies that would enable you to detail a security policy defensive enough for your company to integrate and adhere.
- Embed a Visio or Word canvas diagram of the network architecture which you will use to supplement your security policy.
Submission Details
- Support your responses with examples.
- Cite any sources in APA format.
Please Abstract page for this Part.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."