Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Answer the following problems.

problem 1) There are both network-layer addresses (IP-addresses) and link-layer addresses (i.e. LAN addresses), there is a need to translate between them. For the Internet, this is the job of address resolution protocol (ARP). The command arp permits you to view ARP table which contains the mapping of IP addresses to LAN addresses on the local network.

Run arp on your machine. Is there an entry in the ARP table for every host on the same LAN? Determine how entries enter and leave ARP table and give a brief explanation. How can you use this information to find out the Ethernet address of a host on the same LAN that is currently not present in the ARP table of your machine?

problem 2) Suppose a hacker obtains control of all the BGP-speaking routers in several different Autonomous Systems (ASes). Our hacker has each AS \hijack" several IP blocks. That is, each AS under his or her control announces via BGP that it owns IP blocks for which it does not. For ex, our hacker has AS (CMU) announce a one-hop path to the IP block 18.0.0.0/8 (MIT).

i) Suppose that the AS graph still converges to a stable state, can this attack cause routing loops to form? describe why or why not.

ii) Assume the ASes under attack are identified. Can other ASes change their routing policies to ensure that their traffic  still reaches the hijacked IP blocks? describe.

iii) In response to this attack, suppose all ASes agree to check a central registry for IP block ownership before a path is considered valid. That is, whenever an AS receives a route to a prefix P, it checks that the last AS in the route actually owns P. Such as, upon receiving a path to 18.0.0.0/8 (MIT), an AS will check that last AS in the route is 3 (MIT). Can a hacker still hijack IP address blocks belonging to ASes he or she does not control? (i.e., can he or she cause traffic destined to those IP blocks to be routed to the ASes he controls?) Describe.

iv) Assume a solution was devised where IANA hosted a server on the Internet that was able to validate all AS paths. Assume that this server is always trustworthy and paths are valid if and only if the server says so.

True or false: With this solution an AS can always check the validity of a BGP path advertisement it receives.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96752

Have any Question? 


Related Questions in Computer Network & Security

You work the night shift at a software development company

You work the night shift at a software development company and mange six Web servers that host the company's e commerce solution for medical and dental supplies. You notice that traffic across the network dropped signifi ...

Security management assessmentimplementing basic security

Security Management Assessment Implementing basic security management is an important task for system administrators, as security is important to today's organizations. IT specialists are on the front lines of protecting ...

Assignmentyour have been contracted by healthfirst hospital

Assignment Your have been contracted by HealthFirst Hospital Foundation (HHF), a charitable organization that provides services to community clinics in Atlanta, Georgia. Due to the organization's tremendous growth, it wi ...

Assignmentintroductionin this assignment you will use

Assignment Introduction In this assignment you will use several network tools to look at the protocols and data exchanged between network components. We will be only scratching the surface of the usefulness of these tool ...

Assignmentyou have been hired as the chief security officer

Assignment You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that a ...

Develop a wlan plan for acme graphic design based on a

Develop a WLAN plan for Acme Graphic Design based on a chosen Blueprint and security to the owner. Write a 700- to 1,750-word document using Microsoft® Word finalizing describing your final network design incorporating y ...

Network security- as a corporate network administrator the

"Network Security" - As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects on ...

Securritypost for elprofessoripart 1based on your teams

Securrity Post for elprofessori Part 1 Based on your team's Week Five Learning Team Collaborative discussion, write the Network Security Policy section of the Information Security Policy. Include the following: • Network ...

Security configuration managementkey assignmentsignificant

Security Configuration Management Key Assignment Significant work has been completed over the past few weeks on the Network Security Architecture Design document, including the following: • Security Requirements • Perime ...

Introduction to information systems securityphysical

Introduction to Information Systems Security Physical Security Paper Research the following topic: Physical Security • What types of physical controls can be implemented to protect the perimeter of a building? • What typ ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro