Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Answer the following problems.

problem 1) There are both network-layer addresses (IP-addresses) and link-layer addresses (i.e. LAN addresses), there is a need to translate between them. For the Internet, this is the job of address resolution protocol (ARP). The command arp permits you to view ARP table which contains the mapping of IP addresses to LAN addresses on the local network.

Run arp on your machine. Is there an entry in the ARP table for every host on the same LAN? Determine how entries enter and leave ARP table and give a brief explanation. How can you use this information to find out the Ethernet address of a host on the same LAN that is currently not present in the ARP table of your machine?

problem 2) Suppose a hacker obtains control of all the BGP-speaking routers in several different Autonomous Systems (ASes). Our hacker has each AS \hijack" several IP blocks. That is, each AS under his or her control announces via BGP that it owns IP blocks for which it does not. For ex, our hacker has AS (CMU) announce a one-hop path to the IP block 18.0.0.0/8 (MIT).

i) Suppose that the AS graph still converges to a stable state, can this attack cause routing loops to form? describe why or why not.

ii) Assume the ASes under attack are identified. Can other ASes change their routing policies to ensure that their traffic  still reaches the hijacked IP blocks? describe.

iii) In response to this attack, suppose all ASes agree to check a central registry for IP block ownership before a path is considered valid. That is, whenever an AS receives a route to a prefix P, it checks that the last AS in the route actually owns P. Such as, upon receiving a path to 18.0.0.0/8 (MIT), an AS will check that last AS in the route is 3 (MIT). Can a hacker still hijack IP address blocks belonging to ASes he or she does not control? (i.e., can he or she cause traffic destined to those IP blocks to be routed to the ASes he controls?) Describe.

iv) Assume a solution was devised where IANA hosted a server on the Internet that was able to validate all AS paths. Assume that this server is always trustworthy and paths are valid if and only if the server says so.

True or false: With this solution an AS can always check the validity of a BGP path advertisement it receives.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96752

Have any Question? 


Related Questions in Computer Network & Security

Research paperfor this writing assignment you find a

Research Paper For this writing assignment, you find a current event that has occurred in the last year. Your paper will be a minimum of 3 pages and include a summary of the event, the perceived impact of the event on th ...

Project infrastructure and securitythis assignment consists

Project: Infrastructure and Security This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of t ...

Assignmentwan technologies paper research point-to-point

Assignment WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies as ...

Two reasearch paperswan technologies paper research

Two Reasearch Papers WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission techn ...

Case studyyour company security professionals inc has been

Case study Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as "Case # 2 - W ...

Problem -an advanced drinks vending machine allows a mobile

Problem - An advanced drinks vending machine allows a mobile user to pay for a drink using a mobile phone billing account based on his/her fingerprint. The user is assumed to have data related to one of his/her fingerpri ...

Cloud networking and service provisioning - standard

Cloud Networking and Service Provisioning - Standard project: Auction System in the Cloud 1. Introduction The project consists of designing and implementing an auction system (AS) which offers its services as SaaS to end ...

Assessment project network securityyou have been recently

Assessment Project Network Security You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your ...

Assignmentyour boss has had an intrusion or so she says on

Assignment Your boss has had an intrusion (or so she says) on his home network. She has brought in a packet capture file for you to analyze. She says: "Something has happened on my home network. I use my network for inte ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro