100%(1)1 out of 1 people found this document helpful
This preview shows page 1 - 4 out of 10 pages.
Running head: Network1Unit 3 Assignment: Kaplan University
Protecting Network Infrastructure2Part 1 1. Create a table of the four architectural layers of the TCP/IP suite. Include common protocols ateach layer. LayersProtocolsResponsibilityApplicationHTTP(s), SMTP, FTP,DNS,POP, SNMPCollect ad pass data toprotocol for deliveryHost-to-Host TCP UPDCreate session betweenNodes to pass dataInternet IP ARP ICMPRouters data between Nodes Network AccessPlace and remove packets onphysical hardware2. In a brief essay explain the concept of encapsulation. What is it and why is it important for you to understand? Are there encapsulation vulnerabilities that can be exploited? Exemplification is the procedure or "layering" the information parcels. Every layer adds particular information to guarantee the data is handled accurately. As the parcel is gone along a system every layer peruses the data relating to its part. There are numerous courses in which embodiment might be utilized to misuse a framework. Every layer has its own arrangement of vulnerabilities. Some vulned capacities are a part handshake assault, IP parodying, and Denial of Service. (Ding, 2009)
Protecting Network Infrastructure33. Designing a Secure Network. Take two of the technologies from the list in the textbook
You've reached the end of your free preview.
Want to read all 10 pages?
Screen Capture, Intrusion prevention system, Intrusion detection system