Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In this section, you will learn a couple of practical tools: route, and ifconfig, and netstat. Below is a very brief explanation of what they do.

route The route command can be used to view and manipulate IP routing table.

netstat is a tool which can be used to exhibit network connections, routing tables, interface statistics and many other things.

ifconfig The ifconfig command is used to configure a network interface and to display the status of the currently active interfaces.

(a) Run the route command. prepare down the use of the entry with netmask 0.0.0.0?

(b) Assume a malicious attacker runs \route del" to delete routing entry corresponding to 128.2.13.128/26 on one of the unix.andrew.cmu.edu machines. Now you try to run \ping www.cnn.com". Do you expect the ping to get through? Harry Bovik, the local networking guru argues that \Well, there is still a default route, so the ping should go through!" Harry's pessimistic alter ego suggests otherwise, but does not have a reason. Should Harry believe his alter ego or dismiss it as a case of unjustified pessimism? Give a brief 1-2 line answer why.

(c) Name the command to view the routing table of your machine using netstat? What is the command to only show IP addresses and not host names in the routing table?

(d) How can you use netstat to determine what the network interfaces of your machine are? What is the MTU of your Ethernet interface?

(e) Run ifconfig. What information does the field \Mask" give you?

(f) What happens if you run ifconfig and configure an interface to be in promiscuous mode?

problem 2) A forwarding table for a router in a network using CIDR is given below.

Address prex         Next hop
200.0.0.0/5                 A
192.0.0.0/2                 B
128.0.0.0/2                C
0.0.0.0/0                     D

(a) If the router receives a packet with destination 199.42.13.37, what will the next hop be?

(b) If the router recieves a packet with destination 255.255.255.255, what will the next hop be?

(c) Assume I add the entry 128.25.0.0/16 to the routing table. Will lookups still yield a single forwarding entry? describe.

(d) What actually happens to packet which only matches 0.0.0.0/0?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96749

Have any Question? 


Related Questions in Computer Network & Security

What special function does a cache server perform why does

What special function does a cache server perform? Why does this function have value for larger organizations? How does screened-host firewall architecture differ from screened-subnet firewall architecture? Which offers ...

Benefits of cloud-based office productivity softwarebased

Benefits of Cloud-based Office Productivity Software Based on what you have learned about using cloud-based office productivity software, create a 5-slide presentation to the department head or CEO to convince him or her ...

Problem -an advanced drinks vending machine allows a mobile

Problem - An advanced drinks vending machine allows a mobile user to pay for a drink using a mobile phone billing account based on his/her fingerprint. The user is assumed to have data related to one of his/her fingerpri ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

Cloud networking and service provisioning - standard

Cloud Networking and Service Provisioning - Standard project: Auction System in the Cloud 1. Introduction The project consists of designing and implementing an auction system (AS) which offers its services as SaaS to end ...

Ppp data path completion using dummy network interface term

PPP Data Path Completion using Dummy Network Interface Term Project Goal of Term project 3 1. Completes the user level PPP program - Making a connection on both sides of the program YOU made 2. Try to make the full data ...

What are the main components of cryptology explain the

What are the main components of cryptology? Explain the relationship between plaintext and ciphertext ? Define asymmetric encryption. Why would it be of interest to information security professionals? One tenet of crypto ...

You work the night shift at a software development company

You work the night shift at a software development company and mange six Web servers that host the company's e commerce solution for medical and dental supplies. You notice that traffic across the network dropped signifi ...

Taskspecific issues that you need to address in the forum

Task Specific issues that you need to address in the forum discussions are provided within the first 3 topics. These questions are posed for you to reflect on in the form of written Discussion Board (forum) posts. As thi ...

Q1 the rijndael algorithm was chosen for the advanced

Q1: The Rijndael algorithm was chosen for the Advanced Encryption Standard (AES). Using either the attached tutorial, or your own sources of information, pick one (or more) steps of the algorithm and explain it in some d ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen