Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In this section, you will learn a couple of practical tools: route, and ifconfig, and netstat. Below is a very brief explanation of what they do.

route The route command can be used to view and manipulate IP routing table.

netstat is a tool which can be used to exhibit network connections, routing tables, interface statistics and many other things.

ifconfig The ifconfig command is used to configure a network interface and to display the status of the currently active interfaces.

(a) Run the route command. prepare down the use of the entry with netmask 0.0.0.0?

(b) Assume a malicious attacker runs \route del" to delete routing entry corresponding to 128.2.13.128/26 on one of the unix.andrew.cmu.edu machines. Now you try to run \ping www.cnn.com". Do you expect the ping to get through? Harry Bovik, the local networking guru argues that \Well, there is still a default route, so the ping should go through!" Harry's pessimistic alter ego suggests otherwise, but does not have a reason. Should Harry believe his alter ego or dismiss it as a case of unjustified pessimism? Give a brief 1-2 line answer why.

(c) Name the command to view the routing table of your machine using netstat? What is the command to only show IP addresses and not host names in the routing table?

(d) How can you use netstat to determine what the network interfaces of your machine are? What is the MTU of your Ethernet interface?

(e) Run ifconfig. What information does the field \Mask" give you?

(f) What happens if you run ifconfig and configure an interface to be in promiscuous mode?

problem 2) A forwarding table for a router in a network using CIDR is given below.

Address prex         Next hop
200.0.0.0/5                 A
192.0.0.0/2                 B
128.0.0.0/2                C
0.0.0.0/0                     D

(a) If the router receives a packet with destination 199.42.13.37, what will the next hop be?

(b) If the router recieves a packet with destination 255.255.255.255, what will the next hop be?

(c) Assume I add the entry 128.25.0.0/16 to the routing table. Will lookups still yield a single forwarding entry? describe.

(d) What actually happens to packet which only matches 0.0.0.0/0?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96749

Have any Question? 


Related Questions in Computer Network & Security

Q1 the rijndael algorithm was chosen for the advanced

Q1: The Rijndael algorithm was chosen for the Advanced Encryption Standard (AES). Using either the attached tutorial, or your own sources of information, pick one (or more) steps of the algorithm and explain it in some d ...

Objectivesthis assignment is designed to assess students

OBJECTIVES This assignment is designed to assess students' ability to: - Produce a concise detailed report about the importance of information security audit policy and its components - To have excellent understanding re ...

Cryptography assignment1 decrypt the following message

Cryptography Assignment 1. Decrypt the following message. Assume direct letter substitution. blf szev yvvm z tivzg xozhh. I drhs blf zoo hfxxvhh zmw hzkkrmvhh. 2. Research the RSA cryptographic algorithm. a. If the Publi ...

There are many arguments about cloud based information

There are many arguments about cloud based information services and/or offering IT as a cloud-based service. Some say cloud computing is nothing more than outsourcing IT and creating a dependency that will trap the organ ...

Network management paper in this paper you will research

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

Taskspecific issues that you need to address in the forum

Task Specific issues that you need to address in the forum discussions are provided within the first 3 topics. These questions are posed for you to reflect on in the form of written Discussion Board (forum) posts. As thi ...

Topic one discuss fisma and its relevance to cybersecurity

TOPIC One: Discuss FISMA and its relevance to cybersecurity. (must be 200 words with references) Topic Two: (must be 200 words with references) Define the terms below and describe the environment in which each access con ...

Assignmentyour have been contracted by healthfirst hospital

Assignment Your have been contracted by HealthFirst Hospital Foundation (HHF), a charitable organization that provides services to community clinics in Atlanta, Georgia. Due to the organization's tremendous growth, it wi ...

Multiple-choice questions1 which of the following is not a

Multiple-Choice Questions: 1. Which of the following is NOT a feature of an Intranet? A. uses Internet based standards, such as HTML and SMTP B. is used to connect both local and remote sites into one network C. is used ...

Introduction to information systems securityphysical

Introduction to Information Systems Security Physical Security Paper Research the following topic: Physical Security • What types of physical controls can be implemented to protect the perimeter of a building? • What typ ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro