Ask Question, Ask an Expert


Ask Computer Network & Security Expert

problem 1) In this section, you will learn a couple of practical tools: route, and ifconfig, and netstat. Below is a very brief explanation of what they do.

route The route command can be used to view and manipulate IP routing table.

netstat is a tool which can be used to exhibit network connections, routing tables, interface statistics and many other things.

ifconfig The ifconfig command is used to configure a network interface and to display the status of the currently active interfaces.

(a) Run the route command. prepare down the use of the entry with netmask

(b) Assume a malicious attacker runs \route del" to delete routing entry corresponding to on one of the machines. Now you try to run \ping". Do you expect the ping to get through? Harry Bovik, the local networking guru argues that \Well, there is still a default route, so the ping should go through!" Harry's pessimistic alter ego suggests otherwise, but does not have a reason. Should Harry believe his alter ego or dismiss it as a case of unjustified pessimism? Give a brief 1-2 line answer why.

(c) Name the command to view the routing table of your machine using netstat? What is the command to only show IP addresses and not host names in the routing table?

(d) How can you use netstat to determine what the network interfaces of your machine are? What is the MTU of your Ethernet interface?

(e) Run ifconfig. What information does the field \Mask" give you?

(f) What happens if you run ifconfig and configure an interface to be in promiscuous mode?

problem 2) A forwarding table for a router in a network using CIDR is given below.

Address prex         Next hop                 A                 B                C                     D

(a) If the router receives a packet with destination, what will the next hop be?

(b) If the router recieves a packet with destination, what will the next hop be?

(c) Assume I add the entry to the routing table. Will lookups still yield a single forwarding entry? describe.

(d) What actually happens to packet which only matches

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96749

Have any Question? 

Related Questions in Computer Network & Security

Summarize what pki is and how it works include the use of a

Summarize what PKI is and how it works. Include the use of a CA and also include why the backing up of these keys is so important. Directions: Your completed assignment should be at least 2 FULL double-spaced pages in le ...

Develop a network security policy for a global organization

Develop a network security policy for a global organization. The security was violated in different situations. There are various elements in which need to be discussed and researched to design and outline the policy. Di ...

You need to paraphrase the filesnbsp1 You need to paraphrase the files.  1. Introduction

You need to paraphrase the files.  1. Introduction Organizations can utilize internet as well as intranet framework for providing an information network. Educational institutions may use internet in order to share inform ...

1overviewthe learning objective of this assignment is for

1 Overview The learning objective of this assignment is for students to get familiar with the concepts in the security techniques such as symmetric and asymmetric encryption, hashing and certificates in Public Key Infras ...

Wb and data securitysubject web and data securitytopic

Web and Data Security Subject: Web and Data Security Topic: various types of Utility and its use to secure the data 8 pages start with executive summary, introduction, examples, its use in data security and conclusion.

1 why is the top-down approach to information security

1. Why is the top-down approach to information security superior to the bottom-up approach? 2. What is the difference between a threat agent and a threat? 3. What was important about Rand Report R-609? 4. What type of se ...

Cyber crime and security 2168alleged computer hacker gary

Cyber Crime and Security (2168) Alleged computer hacker Gary McKinnon of the United Kingdom has publicly admitted to compromising computer systems belonging to NASA and the Department of Defense. Using information from y ...

Instructionsexplain your argument in a brief and precise

Instructions Explain your argument in a brief and precise way. Give your answers in the order in which the questions are given below. Problem 1. We consider the alphabet A= {0,1,2,3,4} and the space of messages consists ...

Questions-q1 write short note on1 gigabit ethernet2 fiber

Questions- Q1. Write short note on: 1. Gigabit Ethernet 2. Fiber Distributed Data Interface (FDDI) Q2. Define and explain address resolution protocol (ARP). Describe ARP packet generation. Q3. What is the use of TCP cong ...

Problem 1 consider the following protocol there exists a

Problem 1: Consider the following protocol. There exists a trusted server, T, that shares a secret key with any participant in the network. That is, for a participant A, A and T share a secret key K A . The protocol allo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate