1. Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the above description. State clearly in your submission the choices you have made for these addresses.! Do not give the addresses in binary but in the X.X.X.X decimal format for the IP addresses, the hexadecimal format for MAC addresses and decimal numbers for the port numbers.!
2. For the delivery of the message from Computer A to Computer B, for each step along the way show the source and destination!
a. MAC addresses!
b. IP addresses!
c. Port addresses!
Making it clear which is the source and which is the destination, in what packet or frame these addresses appear (IP, TCP, Ethernet) and what the order of encapsulation is.!
3. The same as number 2, but for the reply from computer B to computer A!
4. These messages are sensitive. What security vulnerabilities and threats can you see?
What measures would you put in place to remove or minimize the vulnerabilities?!