What type of application is being communicated

Assignment Help Computer Network Security
Reference no: EM131076725

1. SSK Software has their main office in Sylvania Ohio and remote locations in Chicago, Toledo, Cleveland and Cincinnati. SSK Software currently has 62 devices connected to the network in Chicago, 30 computers in Toledo, 60 computers in Cleveland, 30 computers in Cincinnati, and 63 computers in Sylvania. It is likely that there will be additional computers added in Sylvania within the year. The IT plan calls for connecting all SSK Software locations using T-1 data lines. The Sylvania site will also connect to the Internet.

SSK Software has elected to use public IP address space on all computers at each of the sites.

The network engineer for their ISP is on vacation. You are asked to perform the network engineering task for this project. You have been restricted to the IP address ranges below. The ISP charges $2 per month for each IP address allotted.

Note: When the ISP supplies the customer with a range of addresses they do not charge for the all zeroes (network address) or all ones (broadcast address) portion of the range provided.

192.168.10.0/24
192.168.11.0/24
192.168.12.0/24
192.168.13.0/24
205.127.135.0/24
205.127.136.0/24
205.125.138.0/24
210.126.137.0/25
225.113.8.0/24
225.113.9.0/24
205.128.135.0/24
205.128.136.0/24
192.168.0.0/16
10.0.0.0/8
205.128.137.0/25
205.128.137.128/25
206.122.148.0/24

a. Based on the above information, what range of IP addresses would the ISP provide to SSK Software to best meet their needs - include the cost per year of the IP addresses (dollar amount SSK Software must pay to the ISP). Show your work.

b. Using the address range provided by the ISP, propose a Subnetwork plan that will efficiently utilize the IP address space for SSK Software's network needs. Explain your plan and why it follows good network design goals.

9. Answer the following about the TTL field in the IPv4 Datagram:

a. Starts on witch bit of the datagram.
b. Starts on which octet of the datagram
c. The TTL filed consist of how many total bits?
d. What happens if the decimal value of this field is equal to Zero (0)?

10. Explain each of the good 'Network Design goals' as discussed in class.

NOTE: Answer must be your own work explained in your own words and in your handwriting.

11. The following information was obtained from a Host computer:

00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.465: S 2688560409:2688560409(0) win 16384 <mss 1460> (DF) (ttl 46, id 20964)
00:05:17.176700 64.254.128.66.465 > 74.125.228.54.1270: S 774583594:774583594(0) ack 2688560410 win 8760 <mss 1460> (DF) (ttl 64, id 35473)
00:05:17.302784 74.125.228.54.1270 > 64.254.128.66.465: . ack 1 win 17520 (DF) (ttl 46, id 21021)
00:05:17.906230 64.254.128.66.465 > 74.125.228.54.1270: P 1:93(92) ack Twin 8760 (DF) (ttl 64, id 35502)
00:05:18.021955 74.125.228.54.1270 > 64.254.128.66.465: P 1:29(28) ack 93 win 17520 (DF) (ttl 46, id 21354)
00:05:18.023785 64.254.128.66.465 > 74.125.228.54.1270: P 93:184(91) ack 29 win 8760 (DF) (ttl 64, id 35505)
00:05:18.140187 74.125.228.54.1270 > 64.254.128.66.465: P 29:67(38) ack 184 win 17520 (DF) (ttl 46, id 21464)
00:05:18.174986 64.254.128.66.465 > 74.125.228.54.1270: P 184:229(45) ack 67 win 8760 (DF) (ttl 64, id 35514)
00:05:18.289620 74.125.228.54.1270 > 64.254.128.66.465: P 67:99(32) ack 229 win 17520 (DF) (ttl 46, id 21594)
00:05:18.298831 64.254.128.66.465 > 74.125.228.54.1270: . ack 99 win 8760 (DF) (ttl 64, id 35523)
00:05:18.353209 64.254.128.66.465 > 74.125.228.54.1270: P 229:273(44) ack 99 win 8760 (DF) (ttl 64, id 35524)
00:05:18.469836 74.125.228.54.1270 > 64.254.128.66.465: P 99:105(6) ack 273 win 17520 (DF) (ttl 46, id 21661)
00:05:18.474644 64.254.128.66.465 > 74.125.228.54.1270: P 273:323(50) ack 105 win 8760 (DF) (ttl 64, id 35529)
00:05:18.607459 74.125.228.54.1270 > 64.254.128.66.465: P 105:1129(1024) ack 323 win 17520 (DF) (ttl 46, id 21704)
00:05:18.615449 74.125.228.54.1270 > 64.254.128.66.465: . 1129:2589(1460) ack 323 win 17520 (DF) (ttl 46, id 21705)
00:05:18.695594 64.254.128.66.465 > 74.125.228.54.1270: . ack 2589 win 8760 (DF) (ttl 64, id 35538)
00:05:18.818813 74.125.228.54.1270 > 64.254.128.66.465: P 2589:3698(1109) ack 323 win 17520 (DF) (ttl 46, id 21827)
00:05:18.834821 64.254.128.66.465 > 74.125.228.54.1270: F 323:367(44) 3698 win 8760 (DF) (ttl 64, id 21850)
00:05:18.979877 74.125.228.54.1270 > 64.254.128.66.465: F 3704:3704(0) ack 367 win 17520 (DF) (ttl 46, id 21901) 00:05:18.979957
64.254.128.66.465 > 74.125.228.54.1270: . ack 3705 win 8754 (DF) (ttl 64, id 35571)

a. What type of application is being communicated? How do you know?
b. What type of tool would be used to obtain the information above?
c. What three such tools were used/discussed in labs for this class and explain differences between each?
d. Was the entire transaction completed? How do you know?
e. Did this transaction use TCP, UDP or something else? How do you know?

Reference no: EM131076725

Questions Cloud

Should insert sorted and remove sorted call get position : Should insert Sorted and remove Sorted call get Position ?
Culture and our general view of life : We all handle illness differently, based on our personality, our past experiences, our culture and our general view of life. Some of us do not take a sick day unless we are literally about to be hospitalized and some of us take to our beds at the..
Determine the effects of water on latent prints : In this exercise you will determine the effects of water on latent prints. Take a drinking glass and handle it, making sure to leave fingerprint impressions on it.
Provide a work-related example of a report : In a five-six sentence paragraph provide a work-related example of a report you may have to read where it is essential to consider each of these three perspectives. Include a specific example of:
What type of application is being communicated : What type of application is being communicated? How do you know? What type of tool would be used to obtain the information above? Was the entire transaction completed? How do you know?
Solve the read-and-correct problem : Your pseudo code solution should provide a corrected string of characters in the order in which they were entered at the keyboard.
Relates to your field of study : Watch an online presentation which relates to your field of study, or reflect upon a presentation which you have previously viewed, relating to your field of study. How does this presentation differ from others that you have heard? What can you le..
Recommend the use of a combination of the methods : Of the methods, which do you believe provides the most protective? would you recommend the use of a combination of the methods? why or why not?
Two-input xor circuit-using only and-or : 1.) Draw the schematic for a 2-input XOR circuit, using only AND, OR, and NOT gates. (Remember the Boolean formula for XOR, and implement this using AND, OR, and NOT gates.)

Reviews

Write a Review

Computer Network Security Questions & Answers

  Talks about the employee specific security

Following standard talks about the employee specific security, Following standard has good information on setting up IT security policies

  Elements of an effective it security policy framework

Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate and attack similar to the SCADA / Stuxnet Worm

  It security audit planning

Use the Web to conduct research on IT Security Audit Planning. Write a report which explains the Scope Definition

  Create and describe a comprehensive security policy

Create and describe a comprehensive security policy for this data-collection and analysis company that will: Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA i..

  Program to encrypt messages using the caesar cypher

The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext

  Explain cross-talk and other forms of interference

Cross-talk, and other forms of interference are a significant issue in any communications infrastructure. Compare and contrast how this problem would manifest for analog data transmitted

  What is the single most important asset of security program

What are the benefits if personnel in security management develop skills as educators for their organization's security? Analyze and explain your point of view. Why are security programs relevant? What is the single most important asset of a securi..

  Cryptography and network security

CS 470: Cryptography and Network Security,  Compare the RSA and EIGamal signature schemes' performance in terms of efficiency of the verification operation, ability to pre-compute most of the signature operation in advance.

  Explaining characteristic of san or a nas configuration

Storage Area Networks (SAN) and Network Attached Storage (NAS) each give high capacity file storage. For the following list, indicate whether the list item is more characteristic of a SAN or a NAS configuration.

  Describe real-world examples that help support your position

Prepare your paper in Word format and submit it through your Assignments Folder. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

  Assessment of the risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information (loss of confidentiality).

  Explore and analyse information security threats

Assessment Three - Cyber intelligence is the ability to define, explore and analyse information security threats. Advanced adversaries accomplish their goals using advanced tools

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd