Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Answer the following problems.

problem 1) There are both network-layer addresses (IP-addresses) and link-layer addresses (i.e. LAN addresses), there is a need to translate between them. For the Internet, this is the job of address resolution protocol (ARP). The command arp permits you to view ARP table which contains the mapping of IP addresses to LAN addresses on the local network.

Run arp on your machine. Is there an entry in the ARP table for every host on the same LAN? Determine how entries enter and leave ARP table and give a brief explanation. How can you use this information to find out the Ethernet address of a host on the same LAN that is currently not present in the ARP table of your machine?

problem 2) Suppose a hacker obtains control of all the BGP-speaking routers in several different Autonomous Systems (ASes). Our hacker has each AS \hijack" several IP blocks. That is, each AS under his or her control announces via BGP that it owns IP blocks for which it does not. For ex, our hacker has AS (CMU) announce a one-hop path to the IP block 18.0.0.0/8 (MIT).

i) Suppose that the AS graph still converges to a stable state, can this attack cause routing loops to form? describe why or why not.

ii) Assume the ASes under attack are identified. Can other ASes change their routing policies to ensure that their traffic  still reaches the hijacked IP blocks? describe.

iii) In response to this attack, suppose all ASes agree to check a central registry for IP block ownership before a path is considered valid. That is, whenever an AS receives a route to a prefix P, it checks that the last AS in the route actually owns P. Such as, upon receiving a path to 18.0.0.0/8 (MIT), an AS will check that last AS in the route is 3 (MIT). Can a hacker still hijack IP address blocks belonging to ASes he or she does not control? (i.e., can he or she cause traffic destined to those IP blocks to be routed to the ASes he controls?) Describe.

iv) Assume a solution was devised where IANA hosted a server on the Internet that was able to validate all AS paths. Assume that this server is always trustworthy and paths are valid if and only if the server says so.

True or false: With this solution an AS can always check the validity of a BGP path advertisement it receives.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96752

Have any Question? 


Related Questions in Computer Network & Security

Why do networking components need more examination from an

Why do networking components need more examination from an InfoSec perspective than from a systems development perspective? What value would an automated asset inventory system have for the risk identification process? W ...

Assignmentpart 1the new network administrator at health

Assignment Part 1 The new network administrator at Health Care HQ wants to be clear about your duties as the system administrator. In 1 paragraph, you will provide the following: • Explain your job duties to the new netw ...

Assignmentyou are hired as a chief technology officer cto

Assignment You are hired as a Chief Technology Officer (CTO) of a startup company, which has two branches; one Los Angeles and one in San Francisco. The company hired employees to begin working on the design of the produ ...

Q1 a subnetted or hierarchical backbone can also be called

Q1. A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone Q2. A backbone network that connects many backbone networks span ...

Q1 the first transcontinental telephone service was

Q1. The first transcontinental telephone service was established in the 1940s. a. true b. false Q2. The Internet was started by the U.S. Department of defense in 1969 as a network of four computers called ARPANET. a. tru ...

What special function does a cache server perform why does

What special function does a cache server perform? Why does this function have value for larger organizations? How does screened-host firewall architecture differ from screened-subnet firewall architecture? Which offers ...

Information securityfor this weeks discussion consider the

Information Security For this week's discussion, consider the following prompts: A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows ...

What is the typical relationship between the untrusted

What is the typical relationship between the untrusted network, the firewall, and the trusted network? How is an application-layer firewall different from a packet filtering firewall? Why is an application-layer firewall ...

Your assignment must be in microsoft word formatnote your

Your assignment must be in Microsoft Word format Note: Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website Question 1: Firewall Rule Design The fo ...

Securritypost for elprofessoripart 1based on your teams

Securrity Post for elprofessori Part 1 Based on your team's Week Five Learning Team Collaborative discussion, write the Network Security Policy section of the Information Security Policy. Include the following: • Network ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro