Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In this section, you will learn a couple of practical tools: route, and ifconfig, and netstat. Below is a very brief explanation of what they do.

route The route command can be used to view and manipulate IP routing table.

netstat is a tool which can be used to exhibit network connections, routing tables, interface statistics and many other things.

ifconfig The ifconfig command is used to configure a network interface and to display the status of the currently active interfaces.

(a) Run the route command. prepare down the use of the entry with netmask 0.0.0.0?

(b) Assume a malicious attacker runs \route del" to delete routing entry corresponding to 128.2.13.128/26 on one of the unix.andrew.cmu.edu machines. Now you try to run \ping www.cnn.com". Do you expect the ping to get through? Harry Bovik, the local networking guru argues that \Well, there is still a default route, so the ping should go through!" Harry's pessimistic alter ego suggests otherwise, but does not have a reason. Should Harry believe his alter ego or dismiss it as a case of unjustified pessimism? Give a brief 1-2 line answer why.

(c) Name the command to view the routing table of your machine using netstat? What is the command to only show IP addresses and not host names in the routing table?

(d) How can you use netstat to determine what the network interfaces of your machine are? What is the MTU of your Ethernet interface?

(e) Run ifconfig. What information does the field \Mask" give you?

(f) What happens if you run ifconfig and configure an interface to be in promiscuous mode?

problem 2) A forwarding table for a router in a network using CIDR is given below.

Address prex         Next hop
200.0.0.0/5                 A
192.0.0.0/2                 B
128.0.0.0/2                C
0.0.0.0/0                     D

(a) If the router receives a packet with destination 199.42.13.37, what will the next hop be?

(b) If the router recieves a packet with destination 255.255.255.255, what will the next hop be?

(c) Assume I add the entry 128.25.0.0/16 to the routing table. Will lookups still yield a single forwarding entry? describe.

(d) What actually happens to packet which only matches 0.0.0.0/0?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96749

Have any Question? 


Related Questions in Computer Network & Security

Assignmentmr smith is the director of it at a law firm

Assignment Mr. Smith is the Director of IT at a law firm located in downtown Chicago. He needs to plan for a network upgrade. He has decided that he would like to have a network analysis done before the upgrade so that h ...

Term paper chief security officeryou have been hired as the

Term Paper: Chief Security Officer You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security ...

Iriss smartphone beeped frowning she glanced at the screen

Iris's smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail. "We've really got to do something about the spam!" she muttered to herself. She scanned the header of the message. "Uh- ...

Computer scienceprimary task response within the discussion

Computer Science Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discus ...

Information securityfor this weeks discussion consider the

Information Security For this week's discussion, consider the following prompts: A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows ...

Assignment description1overview of the assessmentthe

Assignment Description 1 Overview of the assessment: The purpose of this assignment is to develop skills to independently think of a situation and Apply skills to analyze complex problems in network security under superv ...

Assignmentsummarize the principles of public-key

Assignment Summarize the principles of public-key encryption. In what way is an unprotected idle PC a danger to the internet? Suppose a PC owner leaves the PC connected to the Internet where it ultimately is used by anot ...

You work the night shift at a software development company

You work the night shift at a software development company and mange six Web servers that host the company's e commerce solution for medical and dental supplies. You notice that traffic across the network dropped signifi ...

Lab assignment- assessment questions1 explain the two

Lab Assignment- Assessment Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and ...

The us government has put in place ipv6-compliance mandates

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6. Let' ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro