What type of application is being communicated how do you


1. SSK Software has their main office in Sylvania Ohio and remote locations in Chicago, Toledo, Cleveland and Cincinnati. SSK Software currently has 62 devices connected to the network in Chicago, 30 computers in Toledo, 60 computers in Cleveland, 30 computers in Cincinnati, and 63 computers in Sylvania. It is likely that there will be additional computers added in Sylvania within the year. The IT plan calls for connecting all SSK Software locations using T-1 data lines. The Sylvania site will also connect to the Internet.

SSK Software has elected to use public IP address space on all computers at each of the sites.

The network engineer for their ISP is on vacation. You are asked to perform the network engineering task for this project. You have been restricted to the IP address ranges below. The ISP charges $2 per month for each IP address allotted.

Note: When the ISP supplies the customer with a range of addresses they do not charge for the all zeroes (network address) or all ones (broadcast address) portion of the range provided.

192.168.10.0/24
192.168.11.0/24
192.168.12.0/24
192.168.13.0/24
205.127.135.0/24
205.127.136.0/24
205.125.138.0/24
210.126.137.0/25
225.113.8.0/24
225.113.9.0/24
205.128.135.0/24
205.128.136.0/24
192.168.0.0/16
10.0.0.0/8
205.128.137.0/25
205.128.137.128/25
206.122.148.0/24

a. Based on the above information, what range of IP addresses would the ISP provide to SSK Software to best meet their needs - include the cost per year of the IP addresses (dollar amount SSK Software must pay to the ISP). Show your work.

b. Using the address range provided by the ISP, propose a Subnetwork plan that will efficiently utilize the IP address space for SSK Software's network needs. Explain your plan and why it follows good network design goals.

9. Answer the following about the TTL field in the IPv4 Datagram:

a. Starts on witch bit of the datagram.
b. Starts on which octet of the datagram
c. The TTL filed consist of how many total bits?
d. What happens if the decimal value of this field is equal to Zero (0)?

10. Explain each of the good 'Network Design goals' as discussed in class.

NOTE: Answer must be your own work explained in your own words and in your handwriting.

11. The following information was obtained from a Host computer:

00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.465: S 2688560409:2688560409(0) win 16384 (DF) (ttl 46, id 20964)
00:05:17.176700 64.254.128.66.465 > 74.125.228.54.1270: S 774583594:774583594(0) ack 2688560410 win 8760 (DF) (ttl 64, id 35473)
00:05:17.302784 74.125.228.54.1270 > 64.254.128.66.465: . ack 1 win 17520 (DF) (ttl 46, id 21021)
00:05:17.906230 64.254.128.66.465 > 74.125.228.54.1270: P 1:93(92) ack Twin 8760 (DF) (ttl 64, id 35502)
00:05:18.021955 74.125.228.54.1270 > 64.254.128.66.465: P 1:29(28) ack 93 win 17520 (DF) (ttl 46, id 21354)
00:05:18.023785 64.254.128.66.465 > 74.125.228.54.1270: P 93:184(91) ack 29 win 8760 (DF) (ttl 64, id 35505)
00:05:18.140187 74.125.228.54.1270 > 64.254.128.66.465: P 29:67(38) ack 184 win 17520 (DF) (ttl 46, id 21464)
00:05:18.174986 64.254.128.66.465 > 74.125.228.54.1270: P 184:229(45) ack 67 win 8760 (DF) (ttl 64, id 35514)
00:05:18.289620 74.125.228.54.1270 > 64.254.128.66.465: P 67:99(32) ack 229 win 17520 (DF) (ttl 46, id 21594)
00:05:18.298831 64.254.128.66.465 > 74.125.228.54.1270: . ack 99 win 8760 (DF) (ttl 64, id 35523)
00:05:18.353209 64.254.128.66.465 > 74.125.228.54.1270: P 229:273(44) ack 99 win 8760 (DF) (ttl 64, id 35524)
00:05:18.469836 74.125.228.54.1270 > 64.254.128.66.465: P 99:105(6) ack 273 win 17520 (DF) (ttl 46, id 21661)
00:05:18.474644 64.254.128.66.465 > 74.125.228.54.1270: P 273:323(50) ack 105 win 8760 (DF) (ttl 64, id 35529)
00:05:18.607459 74.125.228.54.1270 > 64.254.128.66.465: P 105:1129(1024) ack 323 win 17520 (DF) (ttl 46, id 21704)
00:05:18.615449 74.125.228.54.1270 > 64.254.128.66.465: . 1129:2589(1460) ack 323 win 17520 (DF) (ttl 46, id 21705)
00:05:18.695594 64.254.128.66.465 > 74.125.228.54.1270: . ack 2589 win 8760 (DF) (ttl 64, id 35538)
00:05:18.818813 74.125.228.54.1270 > 64.254.128.66.465: P 2589:3698(1109) ack 323 win 17520 (DF) (ttl 46, id 21827)
00:05:18.834821 64.254.128.66.465 > 74.125.228.54.1270: F 323:367(44) 3698 win 8760 (DF) (ttl 64, id 21850)
00:05:18.979877 74.125.228.54.1270 > 64.254.128.66.465: F 3704:3704(0) ack 367 win 17520 (DF) (ttl 46, id 21901) 00:05:18.979957
64.254.128.66.465 > 74.125.228.54.1270: . ack 3705 win 8754 (DF) (ttl 64, id 35571)

a. What type of application is being communicated? How do you know?
b. What type of tool would be used to obtain the information above?
c. What three such tools were used/discussed in labs for this class and explain differences between each?
d. Was the entire transaction completed? How do you know?
e. Did this transaction use TCP, UDP or something else? How do you know?

Solution Preview :

Prepared by a verified Expert
Computer Network Security: What type of application is being communicated how do you
Reference No:- TGS01422509

Now Priced at $40 (50% Discount)

Recommended (97%)

Rated (4.9/5)