Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In this section, you will learn a couple of practical tools: route, and ifconfig, and netstat. Below is a very brief explanation of what they do.

route The route command can be used to view and manipulate IP routing table.

netstat is a tool which can be used to exhibit network connections, routing tables, interface statistics and many other things.

ifconfig The ifconfig command is used to configure a network interface and to display the status of the currently active interfaces.

(a) Run the route command. prepare down the use of the entry with netmask 0.0.0.0?

(b) Assume a malicious attacker runs \route del" to delete routing entry corresponding to 128.2.13.128/26 on one of the unix.andrew.cmu.edu machines. Now you try to run \ping www.cnn.com". Do you expect the ping to get through? Harry Bovik, the local networking guru argues that \Well, there is still a default route, so the ping should go through!" Harry's pessimistic alter ego suggests otherwise, but does not have a reason. Should Harry believe his alter ego or dismiss it as a case of unjustified pessimism? Give a brief 1-2 line answer why.

(c) Name the command to view the routing table of your machine using netstat? What is the command to only show IP addresses and not host names in the routing table?

(d) How can you use netstat to determine what the network interfaces of your machine are? What is the MTU of your Ethernet interface?

(e) Run ifconfig. What information does the field \Mask" give you?

(f) What happens if you run ifconfig and configure an interface to be in promiscuous mode?

problem 2) A forwarding table for a router in a network using CIDR is given below.

Address prex         Next hop
200.0.0.0/5                 A
192.0.0.0/2                 B
128.0.0.0/2                C
0.0.0.0/0                     D

(a) If the router receives a packet with destination 199.42.13.37, what will the next hop be?

(b) If the router recieves a packet with destination 255.255.255.255, what will the next hop be?

(c) Assume I add the entry 128.25.0.0/16 to the routing table. Will lookups still yield a single forwarding entry? describe.

(d) What actually happens to packet which only matches 0.0.0.0/0?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96749

Have any Question? 


Related Questions in Computer Network & Security

Proposal projectchoose one of the following for this

Proposal Project Choose one of the following for this project and See attachment for complete instruction and please remember to send a turnitin report. 1) Metasploit 2) Wireshark 3) Back Track 4) Nessus 5) Cain & Abel P ...

Questions1 describe three factors that help to influence

Questions: 1. Describe three factors that help to influence our nation's focus on natural or man-made disasters. 2. What issues have been raised concerning some of the authorities granted to government agencies in the PA ...

Maintaining the network please respond to the following-

"Maintaining the Network" Please respond to the following: - Examine three cable maintenance tools that you would consider essential for a network team. Of the three tools that you have examined, determine the one that y ...

Network simulation projectsimulation projectobjectivesbull

Network Simulation Project Simulation Project Objectives • Design and analyze the performance of a network under different traffic conditions. • Design and analyze the performance of a wide area network. • Investigates t ...

Part-1given the following design for a money transfer

Part-1 Given the following design for a money transfer protocol which utilizes public key cryptography to assure confidentiality and authenticity of the transmission. Issuing a Check: 1. Payee (A) will contact the bank r ...

Assignmentthis assignment requires you to use presentation

Assignment This assignment requires you to use presentation tools and allows you to be creative. The presentation subject is to be network security on the Boeing 787 Dreamliner. To begin, get familiar with the topic by r ...

Analyzing network trafficone of our goals for this week is

Analyzing Network Traffic One of our goals for this week is to install and run a packet-capture utility, such as Wireshark. If you are successful with this task, run the packet capture while you do a familiar online task ...

There are many arguments about cloud based information

There are many arguments about cloud based information services and/or offering IT as a cloud-based service. Some say cloud computing is nothing more than outsourcing IT and creating a dependency that will trap the organ ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

In order to provide for the new services at the akron ohio

In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and configured. Create a security matrix spreadsheet and security strategy summary. Include the user rol ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro