What type of application is being communicated

Assignment Help Computer Network Security
Reference no: EM131076725

1. SSK Software has their main office in Sylvania Ohio and remote locations in Chicago, Toledo, Cleveland and Cincinnati. SSK Software currently has 62 devices connected to the network in Chicago, 30 computers in Toledo, 60 computers in Cleveland, 30 computers in Cincinnati, and 63 computers in Sylvania. It is likely that there will be additional computers added in Sylvania within the year. The IT plan calls for connecting all SSK Software locations using T-1 data lines. The Sylvania site will also connect to the Internet.

SSK Software has elected to use public IP address space on all computers at each of the sites.

The network engineer for their ISP is on vacation. You are asked to perform the network engineering task for this project. You have been restricted to the IP address ranges below. The ISP charges $2 per month for each IP address allotted.

Note: When the ISP supplies the customer with a range of addresses they do not charge for the all zeroes (network address) or all ones (broadcast address) portion of the range provided.

192.168.10.0/24
192.168.11.0/24
192.168.12.0/24
192.168.13.0/24
205.127.135.0/24
205.127.136.0/24
205.125.138.0/24
210.126.137.0/25
225.113.8.0/24
225.113.9.0/24
205.128.135.0/24
205.128.136.0/24
192.168.0.0/16
10.0.0.0/8
205.128.137.0/25
205.128.137.128/25
206.122.148.0/24

a. Based on the above information, what range of IP addresses would the ISP provide to SSK Software to best meet their needs - include the cost per year of the IP addresses (dollar amount SSK Software must pay to the ISP). Show your work.

b. Using the address range provided by the ISP, propose a Subnetwork plan that will efficiently utilize the IP address space for SSK Software's network needs. Explain your plan and why it follows good network design goals.

9. Answer the following about the TTL field in the IPv4 Datagram:

a. Starts on witch bit of the datagram.
b. Starts on which octet of the datagram
c. The TTL filed consist of how many total bits?
d. What happens if the decimal value of this field is equal to Zero (0)?

10. Explain each of the good 'Network Design goals' as discussed in class.

NOTE: Answer must be your own work explained in your own words and in your handwriting.

11. The following information was obtained from a Host computer:

00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.465: S 2688560409:2688560409(0) win 16384 <mss 1460> (DF) (ttl 46, id 20964)
00:05:17.176700 64.254.128.66.465 > 74.125.228.54.1270: S 774583594:774583594(0) ack 2688560410 win 8760 <mss 1460> (DF) (ttl 64, id 35473)
00:05:17.302784 74.125.228.54.1270 > 64.254.128.66.465: . ack 1 win 17520 (DF) (ttl 46, id 21021)
00:05:17.906230 64.254.128.66.465 > 74.125.228.54.1270: P 1:93(92) ack Twin 8760 (DF) (ttl 64, id 35502)
00:05:18.021955 74.125.228.54.1270 > 64.254.128.66.465: P 1:29(28) ack 93 win 17520 (DF) (ttl 46, id 21354)
00:05:18.023785 64.254.128.66.465 > 74.125.228.54.1270: P 93:184(91) ack 29 win 8760 (DF) (ttl 64, id 35505)
00:05:18.140187 74.125.228.54.1270 > 64.254.128.66.465: P 29:67(38) ack 184 win 17520 (DF) (ttl 46, id 21464)
00:05:18.174986 64.254.128.66.465 > 74.125.228.54.1270: P 184:229(45) ack 67 win 8760 (DF) (ttl 64, id 35514)
00:05:18.289620 74.125.228.54.1270 > 64.254.128.66.465: P 67:99(32) ack 229 win 17520 (DF) (ttl 46, id 21594)
00:05:18.298831 64.254.128.66.465 > 74.125.228.54.1270: . ack 99 win 8760 (DF) (ttl 64, id 35523)
00:05:18.353209 64.254.128.66.465 > 74.125.228.54.1270: P 229:273(44) ack 99 win 8760 (DF) (ttl 64, id 35524)
00:05:18.469836 74.125.228.54.1270 > 64.254.128.66.465: P 99:105(6) ack 273 win 17520 (DF) (ttl 46, id 21661)
00:05:18.474644 64.254.128.66.465 > 74.125.228.54.1270: P 273:323(50) ack 105 win 8760 (DF) (ttl 64, id 35529)
00:05:18.607459 74.125.228.54.1270 > 64.254.128.66.465: P 105:1129(1024) ack 323 win 17520 (DF) (ttl 46, id 21704)
00:05:18.615449 74.125.228.54.1270 > 64.254.128.66.465: . 1129:2589(1460) ack 323 win 17520 (DF) (ttl 46, id 21705)
00:05:18.695594 64.254.128.66.465 > 74.125.228.54.1270: . ack 2589 win 8760 (DF) (ttl 64, id 35538)
00:05:18.818813 74.125.228.54.1270 > 64.254.128.66.465: P 2589:3698(1109) ack 323 win 17520 (DF) (ttl 46, id 21827)
00:05:18.834821 64.254.128.66.465 > 74.125.228.54.1270: F 323:367(44) 3698 win 8760 (DF) (ttl 64, id 21850)
00:05:18.979877 74.125.228.54.1270 > 64.254.128.66.465: F 3704:3704(0) ack 367 win 17520 (DF) (ttl 46, id 21901) 00:05:18.979957
64.254.128.66.465 > 74.125.228.54.1270: . ack 3705 win 8754 (DF) (ttl 64, id 35571)

a. What type of application is being communicated? How do you know?
b. What type of tool would be used to obtain the information above?
c. What three such tools were used/discussed in labs for this class and explain differences between each?
d. Was the entire transaction completed? How do you know?
e. Did this transaction use TCP, UDP or something else? How do you know?

Reference no: EM131076725

Questions Cloud

Should insert sorted and remove sorted call get position : Should insert Sorted and remove Sorted call get Position ?
Culture and our general view of life : We all handle illness differently, based on our personality, our past experiences, our culture and our general view of life. Some of us do not take a sick day unless we are literally about to be hospitalized and some of us take to our beds at the..
Determine the effects of water on latent prints : In this exercise you will determine the effects of water on latent prints. Take a drinking glass and handle it, making sure to leave fingerprint impressions on it.
Provide a work-related example of a report : In a five-six sentence paragraph provide a work-related example of a report you may have to read where it is essential to consider each of these three perspectives. Include a specific example of:
What type of application is being communicated : What type of application is being communicated? How do you know? What type of tool would be used to obtain the information above? Was the entire transaction completed? How do you know?
Solve the read-and-correct problem : Your pseudo code solution should provide a corrected string of characters in the order in which they were entered at the keyboard.
Relates to your field of study : Watch an online presentation which relates to your field of study, or reflect upon a presentation which you have previously viewed, relating to your field of study. How does this presentation differ from others that you have heard? What can you le..
Recommend the use of a combination of the methods : Of the methods, which do you believe provides the most protective? would you recommend the use of a combination of the methods? why or why not?
Two-input xor circuit-using only and-or : 1.) Draw the schematic for a 2-input XOR circuit, using only AND, OR, and NOT gates. (Remember the Boolean formula for XOR, and implement this using AND, OR, and NOT gates.)

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd