StudentShare solutions
Triangle menu

Network Security - Research Paper Example

Not dowloaded yet

Extract of sample
Network Security

Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service (QoS) levels to different packets
Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service QoS) levels to different packets
Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service (QoS) levels to different packets
Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service QoS) levels to different packets
Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service (QoS) levels to different packets
+ One http connection was reset by the client itself even after gett...
Packet 6
1. Destination IP address mentioned in the description block 10.63.129.199 does not match with the IP address actually communicated in the packet ie 192.168.246.1
2. The host rejected the connection by sending RST flag instead of sending SYN, ACK flag. This indicates the destination host is not willing to initiate inbound connection on port 139.

Packet 7
1. Source IP address mentioned in the description block 10.63.129.199 does not match with the IP address actually communicated in the packet ie 192.168.246.1
2. Packet length mentioned in the description block is 40 while actual bytes mentioned are 46


Detailed Description of Packets:
Packet # 1

20:52:50.764815 IP (tos 0x0, ttl 46, id 18251, offset 0, flags [none], length: 44) 10.63.129.199.49206 > linux-server.ssh: S [tcp sum ok] 1304132321:1304132321(0) win 3072

0x0000: 4500 002c 474b 0000 2e06 d821 c0a8 f601 E..,GK.....!....
0x0010: c0a8 f60c c036 0050 4dbb 7ae1 0000 0000 .....6.PM.z.....
0x0020: 6002 0c00 95a3 0000 0204 05b4 0000 .............


Bytes of the trace
Breakdown in bits where necessary
Description and significance
45
0100 0101
1st 4 bits represent IPv4; next 4 bits represent 5 double words long IP header (ie 20 bytes header).
00

Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service (QoS) levels to different packets
002c

Length of the Layer 3 packet is 44 bytes
474b

Identification value is 18251. This value helps in assembling fragmented packets
0000

IP header flags ...Show more

Summary

Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service (QoS) levels to different packets
Author : hirthealaina
Network Security essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the research paper on your topic
"Network Security"
with a personal 20% discount.
Grab the best paper

Related Essays

Network Security
This paper discusses some of the potential threats to network security and the ways to mitigate them. The paper also renders useful information about network security policing. Information presented in paper can be used by companies to improve their network security and make the system efficient.
9 pages (2250 words) Research Paper
Network Security
As network vulnerabilities are constantly at a rise, network security vulnerabilities are evaluated in three categories i.e. logical security, internal security and external security. The logical security domain will cover technical controls such as deployment of IDS, Virtual LAN, monitoring violation logs, auditing on domain environment, ISA server and VPN security as well.
15 pages (3750 words) Research Paper
Network Security
5 Threats and Vulnerabilities to a network 6 Threats to a network 6 Types of Vulnerabilities 9 Network Security Policy 10 Firewall 11 Internet Protocol Security 11 References 13 Abstract Networks from the time of their birth have come a long way. Initially, they were only used in large firms and businesses.
10 pages (2500 words) Research Paper
Network Security
New systems are being developed to effectively handle and administer corporate working and activities. However, security has become a complex assignment for current network administration. Normally, attackers enter into a network by making use of different tools and technologies.
13 pages (3250 words) Research Paper
Network Security
This paper discusses some of the potential threats to network security and the ways to mitigate them. The paper also renders useful information about network security policing. Information presented in this paper can be used by companies to improve their network security and make the system efficient.
9 pages (2250 words) Research Paper
Network Security
In the same way, the Internet is a huge network of numerous small and medium networks. Additionally, the Internet has turned out to be an essential part of our lives and business tasks. Though, these advanced technologies offer a large number of benefits and opportunities but they also cause a wide variety of security and privacy issues.
6 pages (1500 words) Research Paper
Network security
For that matter, secure routing protocols for ad hoc and wireless sensor networks will be precisely looked at considering their policies and methods geared to help them meet their security necessities. Mobile nodes or computers in ad hoc networks collaborate and send packets to each other hence having them communicate past the direct wireless communication range set for them.
15 pages (3750 words) Research Paper
Network Security
Networks are increasingly becoming vulnerable to the threats present in the environment. The paper has researched on the threats that are posed on the network as well as the vulnerabilities that increase the security risks for the network. The final part of the paper also
10 pages (2500 words) Research Paper
Network Security
Though, these advanced technologies offer a large number of benefits and opportunities but they also cause a wide variety of security and privacy issues. These issues can be dangerous for personal information safety and privacy. Thus, network management
6 pages (1500 words) Research Paper
Network Security
According to the report for any given organization, network security involves the introduction of polices that would protect the available network to ensure unauthorized persons do not access or use the organizational information. Consequently, internet security has become one of the most researched aspects of information technology.
10 pages (2500 words) Research Paper
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation