What type of application is being communicated

Assignment Help Computer Network Security
Reference no: EM131076725

1. SSK Software has their main office in Sylvania Ohio and remote locations in Chicago, Toledo, Cleveland and Cincinnati. SSK Software currently has 62 devices connected to the network in Chicago, 30 computers in Toledo, 60 computers in Cleveland, 30 computers in Cincinnati, and 63 computers in Sylvania. It is likely that there will be additional computers added in Sylvania within the year. The IT plan calls for connecting all SSK Software locations using T-1 data lines. The Sylvania site will also connect to the Internet.

SSK Software has elected to use public IP address space on all computers at each of the sites.

The network engineer for their ISP is on vacation. You are asked to perform the network engineering task for this project. You have been restricted to the IP address ranges below. The ISP charges $2 per month for each IP address allotted.

Note: When the ISP supplies the customer with a range of addresses they do not charge for the all zeroes (network address) or all ones (broadcast address) portion of the range provided.

192.168.10.0/24
192.168.11.0/24
192.168.12.0/24
192.168.13.0/24
205.127.135.0/24
205.127.136.0/24
205.125.138.0/24
210.126.137.0/25
225.113.8.0/24
225.113.9.0/24
205.128.135.0/24
205.128.136.0/24
192.168.0.0/16
10.0.0.0/8
205.128.137.0/25
205.128.137.128/25
206.122.148.0/24

a. Based on the above information, what range of IP addresses would the ISP provide to SSK Software to best meet their needs - include the cost per year of the IP addresses (dollar amount SSK Software must pay to the ISP). Show your work.

b. Using the address range provided by the ISP, propose a Subnetwork plan that will efficiently utilize the IP address space for SSK Software's network needs. Explain your plan and why it follows good network design goals.

9. Answer the following about the TTL field in the IPv4 Datagram:

a. Starts on witch bit of the datagram.
b. Starts on which octet of the datagram
c. The TTL filed consist of how many total bits?
d. What happens if the decimal value of this field is equal to Zero (0)?

10. Explain each of the good 'Network Design goals' as discussed in class.

NOTE: Answer must be your own work explained in your own words and in your handwriting.

11. The following information was obtained from a Host computer:

00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.465: S 2688560409:2688560409(0) win 16384 <mss 1460> (DF) (ttl 46, id 20964)
00:05:17.176700 64.254.128.66.465 > 74.125.228.54.1270: S 774583594:774583594(0) ack 2688560410 win 8760 <mss 1460> (DF) (ttl 64, id 35473)
00:05:17.302784 74.125.228.54.1270 > 64.254.128.66.465: . ack 1 win 17520 (DF) (ttl 46, id 21021)
00:05:17.906230 64.254.128.66.465 > 74.125.228.54.1270: P 1:93(92) ack Twin 8760 (DF) (ttl 64, id 35502)
00:05:18.021955 74.125.228.54.1270 > 64.254.128.66.465: P 1:29(28) ack 93 win 17520 (DF) (ttl 46, id 21354)
00:05:18.023785 64.254.128.66.465 > 74.125.228.54.1270: P 93:184(91) ack 29 win 8760 (DF) (ttl 64, id 35505)
00:05:18.140187 74.125.228.54.1270 > 64.254.128.66.465: P 29:67(38) ack 184 win 17520 (DF) (ttl 46, id 21464)
00:05:18.174986 64.254.128.66.465 > 74.125.228.54.1270: P 184:229(45) ack 67 win 8760 (DF) (ttl 64, id 35514)
00:05:18.289620 74.125.228.54.1270 > 64.254.128.66.465: P 67:99(32) ack 229 win 17520 (DF) (ttl 46, id 21594)
00:05:18.298831 64.254.128.66.465 > 74.125.228.54.1270: . ack 99 win 8760 (DF) (ttl 64, id 35523)
00:05:18.353209 64.254.128.66.465 > 74.125.228.54.1270: P 229:273(44) ack 99 win 8760 (DF) (ttl 64, id 35524)
00:05:18.469836 74.125.228.54.1270 > 64.254.128.66.465: P 99:105(6) ack 273 win 17520 (DF) (ttl 46, id 21661)
00:05:18.474644 64.254.128.66.465 > 74.125.228.54.1270: P 273:323(50) ack 105 win 8760 (DF) (ttl 64, id 35529)
00:05:18.607459 74.125.228.54.1270 > 64.254.128.66.465: P 105:1129(1024) ack 323 win 17520 (DF) (ttl 46, id 21704)
00:05:18.615449 74.125.228.54.1270 > 64.254.128.66.465: . 1129:2589(1460) ack 323 win 17520 (DF) (ttl 46, id 21705)
00:05:18.695594 64.254.128.66.465 > 74.125.228.54.1270: . ack 2589 win 8760 (DF) (ttl 64, id 35538)
00:05:18.818813 74.125.228.54.1270 > 64.254.128.66.465: P 2589:3698(1109) ack 323 win 17520 (DF) (ttl 46, id 21827)
00:05:18.834821 64.254.128.66.465 > 74.125.228.54.1270: F 323:367(44) 3698 win 8760 (DF) (ttl 64, id 21850)
00:05:18.979877 74.125.228.54.1270 > 64.254.128.66.465: F 3704:3704(0) ack 367 win 17520 (DF) (ttl 46, id 21901) 00:05:18.979957
64.254.128.66.465 > 74.125.228.54.1270: . ack 3705 win 8754 (DF) (ttl 64, id 35571)

a. What type of application is being communicated? How do you know?
b. What type of tool would be used to obtain the information above?
c. What three such tools were used/discussed in labs for this class and explain differences between each?
d. Was the entire transaction completed? How do you know?
e. Did this transaction use TCP, UDP or something else? How do you know?

Reference no: EM131076725

Questions Cloud

Should insert sorted and remove sorted call get position : Should insert Sorted and remove Sorted call get Position ?
Culture and our general view of life : We all handle illness differently, based on our personality, our past experiences, our culture and our general view of life. Some of us do not take a sick day unless we are literally about to be hospitalized and some of us take to our beds at the..
Determine the effects of water on latent prints : In this exercise you will determine the effects of water on latent prints. Take a drinking glass and handle it, making sure to leave fingerprint impressions on it.
Provide a work-related example of a report : In a five-six sentence paragraph provide a work-related example of a report you may have to read where it is essential to consider each of these three perspectives. Include a specific example of:
What type of application is being communicated : What type of application is being communicated? How do you know? What type of tool would be used to obtain the information above? Was the entire transaction completed? How do you know?
Solve the read-and-correct problem : Your pseudo code solution should provide a corrected string of characters in the order in which they were entered at the keyboard.
Relates to your field of study : Watch an online presentation which relates to your field of study, or reflect upon a presentation which you have previously viewed, relating to your field of study. How does this presentation differ from others that you have heard? What can you le..
Recommend the use of a combination of the methods : Of the methods, which do you believe provides the most protective? would you recommend the use of a combination of the methods? why or why not?
Two-input xor circuit-using only and-or : 1.) Draw the schematic for a 2-input XOR circuit, using only AND, OR, and NOT gates. (Remember the Boolean formula for XOR, and implement this using AND, OR, and NOT gates.)

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify the types of network components devices and

define the requirements and then design an appropriate network that would support this dental practice. your answer

  Finding decryption function and recovered plaintext

If you receive the ciphertext message YPHDCRPBEQTAA, decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Limited management abilities

Originally Linux/UNIX systems had one all-powerful user called root that managed systems and discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems.

  What paperwork will be needed to reach eal7 certification

Essay Question:Secure software certification. Your present company (assignment#2) is at EAL4. You are the new program manager on this effort and your job is to bring your present software secure package to EAL7.

  Describe diffie-hellman algorithm to exchange shared key

User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?

  Integrative network design project

Review the assignment instructions in the University of Phoenix Material: Integrative Network Design Project.

  Evaluate the threat environment of the organization

Evaluate the threat environment of the organization. Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.

  Compile a full draft of the final enterprise security plan

Compile a full draft of the final Enterprise Security Plan document. This will not be complete, but will have at least a short paragraph about each major section of the paper, including the suggested controls.

  Discuss the big issue, namely privacy vs convenience

Discuss the big issue, namely privacy vs. convenience, from the perspective of marketing. What are the benefits? What are the ethical issues?

  How use of such control may affect democracy and society

How the use of such control may affect democracy and society. For this Discussion, you will view and react to Pariser's TED Talk online.

  Will your file system of choice provide security

What type of OS to use along with the file system and why is this architecture is better than others? Will you use the same OS for servers and Desktops? Will your file system of choice provide security?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd