Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Answer the following problems.

problem 1) There are both network-layer addresses (IP-addresses) and link-layer addresses (i.e. LAN addresses), there is a need to translate between them. For the Internet, this is the job of address resolution protocol (ARP). The command arp permits you to view ARP table which contains the mapping of IP addresses to LAN addresses on the local network.

Run arp on your machine. Is there an entry in the ARP table for every host on the same LAN? Determine how entries enter and leave ARP table and give a brief explanation. How can you use this information to find out the Ethernet address of a host on the same LAN that is currently not present in the ARP table of your machine?

problem 2) Suppose a hacker obtains control of all the BGP-speaking routers in several different Autonomous Systems (ASes). Our hacker has each AS \hijack" several IP blocks. That is, each AS under his or her control announces via BGP that it owns IP blocks for which it does not. For ex, our hacker has AS (CMU) announce a one-hop path to the IP block 18.0.0.0/8 (MIT).

i) Suppose that the AS graph still converges to a stable state, can this attack cause routing loops to form? describe why or why not.

ii) Assume the ASes under attack are identified. Can other ASes change their routing policies to ensure that their traffic  still reaches the hijacked IP blocks? describe.

iii) In response to this attack, suppose all ASes agree to check a central registry for IP block ownership before a path is considered valid. That is, whenever an AS receives a route to a prefix P, it checks that the last AS in the route actually owns P. Such as, upon receiving a path to 18.0.0.0/8 (MIT), an AS will check that last AS in the route is 3 (MIT). Can a hacker still hijack IP address blocks belonging to ASes he or she does not control? (i.e., can he or she cause traffic destined to those IP blocks to be routed to the ASes he controls?) Describe.

iv) Assume a solution was devised where IANA hosted a server on the Internet that was able to validate all AS paths. Assume that this server is always trustworthy and paths are valid if and only if the server says so.

True or false: With this solution an AS can always check the validity of a BGP path advertisement it receives.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96752

Have any Question? 


Related Questions in Computer Network & Security

Case study wireless and mobile technologiesin this very

Case Study: Wireless and Mobile Technologies In this very competitive climate, many companies are seeking ways to connect with customers in ways that add value. Mobile and wireless computing have become key focal points ...

Data information decision please respond to the

"Data Information Decision" Please respond to the following: · With the obvious pace of current technology development, data continues to grow daily. Imagine that you are a Database Administrator for a large organization ...

Research paperfor this writing assignment you find a

Research Paper For this writing assignment, you find a current event that has occurred in the last year. Your paper will be a minimum of 3 pages and include a summary of the event, the perceived impact of the event on th ...

Wireless and remote access securitykey assignment

Wireless and Remote Access Security Key Assignment Draft Great progress has been made on the design of the network with the addition of the client and server security models in the previous assignment. With the increasin ...

Short paperwan technologies paper research point-to-point

Short Paper WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies a ...

Case studyyour company security professionals inc has been

Case study Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as "Case # 2 - W ...

Cloud computing assignmentq1 you need to prepare a short

Cloud Computing Assignment Q1. You need to prepare a short report that describes the benefits of Cloud Computing for smartphone-like devices apps development and growing in the marketplace. Your discussion should be 400- ...

Topic one discuss fisma and its relevance to cybersecurity

TOPIC One: Discuss FISMA and its relevance to cybersecurity. (must be 200 words with references) Topic Two: (must be 200 words with references) Define the terms below and describe the environment in which each access con ...

Learning team apply encryption standardsyour team was

Learning Team: Apply Encryption Standards Your team was invited to present to a high school IT class to explain how cryptography works. In order to explain the basics, you decide to show the class a tool called, CrypTool ...

Cryptool lab-first download and install cryptool from the

Cryptool lab- First, download and install Cryptool from the website at http://cryptool.com - If using a windows PC, installed crytool1 - If using a MAC PC, install jcryptool Part1.1 a. Identify the digital signature sche ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen