What is the cleartext data that is being sent in the ping

Assignment Help Computer Engineering
Reference no: EM132511798

Assignment: Any data that is sensitive or critical for business or military purposes should be encrypted. But what does it mean to be encrypted. What does encrypted data look like? In this lab we will look at data which is unencrypted and data that is encrypted. We will use a tool called GNS3 to simulate two routers that are connected via a point-to-point link. We will run data through this link while looking at the packets going through it. The tool we will use to view the data is Wireshark which is probably the most important tool we as network engineers have in our toolbelt. Let's answer the following questions as we go through the lab.

1. What is the cleartext data that is being sent in the ping between the two PCs?

? 2. What is the protocol used for the ping utility?

3. How many ping messages do you see? Why?

4. Is this data encrypted or unencrypted?

5. Now let's make a change in the router. What types of messages do you see now? Does it look the same as the messages we saw before we made the change to the router?

6. What protocol do you see now?

7. Are you still able to see the source and destination MAC address? What layer is this you are looking at the MAC address in?

8. Are you still able to see the source and destination IP address? What layer is this you are looking at the IP address in?

9. Can you see the cleartext data you saw before?

10. Explain the ESP protocol. Does what we see in Wireshark make sense? Write a paragraph answering these two questions.

Reference no: EM132511798

Questions Cloud

Can data analytics provide business value to organisations : How can data analytics provide business value to organisations and What is the impact of data analytics in novel and interesting domains such sports
What makes ibm watson a necessity in the case : KONE is a global industry company (based in Finland) that manufactures mostly elevators and escalators and also service over 1.1 million elevators.
Communicating sensitive information over the internet : What implications do you think a business might be concerned with? What would you advise if you were the decision maker for a small company?
Represent a nash equilibrium : If the members of an oligopoly could agree on a total quantity to produce and a price to charge, what quantity and price would they choose?
What is the cleartext data that is being sent in the ping : Any data that is sensitive or critical for business or military purposes should be encrypted. But what does it mean to be encrypted. What does encrypted data.
Firm unconditional input demands : Consider a firm using the following long-run technology:q=f(x1,x2)=1/3ln?(x1)+1/6ln?(x2) Where output and input prices are given
Evaluate project performance : In your role as a Project Manager for Kingston-Bryce Limited you have been assigned to create a scorecard.
What is the y-intercept of the short-run supply function : What is the y-intercept of the short-run supply function of this firm (p is on y-axis)?(round your answer to one decimal place if necessary)
What is optimal output level that maximizes profit : A monopolist has demand function of P= 100-Q and cost functions of AVC= Q+4; FC=200

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a vb windows desktop application to make online tests

Create a VB windows desktop application to make online tests. This application will be catering to an instructor interested in making online tests.

  Write a function that takes as input in the form of a matrix

Write a function that takes as input N, v, k: a weighted, undirected network N, in the form of a (numpy array) adjacency matrix.

  Write a program that reads in name and salary of an employee

Write a program that reads in the name and salary of an employee. Here the salary will denote an hourly wage, such as $9.25.

  Assume that veclist is a vector container

Suppose that vecList is a vector container and vecList = {12, 16, 8, 23, 40, 6, 18, 9, 75} Show vecList after the following statement executes.

  How to use as its input the current directory

how to use as its input the current directory.

  Mips single-cycle datapath processor

An instruction is being executed on the MIPS single-cycle datapath processor. Which class of instruction is being executed over the processor? b) Will you specify which instruction is being executing?

  Analyze the means in which data moves within organization

Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.

  Discuss the meaning information governance

Define and discuss the meaning Information Governance in context of Enterprise. Identify 5 or more questions organizations are asking themselves about.

  Explain minimum four benefits of modular design

define the design and application of arrays and how an array simplifies program development. Support your answer with a hypothetical real-world example.

  Generate the list randomly every time using the class

Write a java program to sort a list of integers using 'in place' Quicksort algorithm.

  Describe bluetooth with drawing of its architecture

Explain why the destination hardware address of an ARP request packet is a broadcast address?

  Create a 2-dimensional array of 10 by 5 elements

Create a 2-dimensional array of 10x5 elements that are populated by random numbers between 0 and 49.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd