What is the cleartext data that is being sent in the ping

Assignment Help Computer Engineering
Reference no: EM132511798

Assignment: Any data that is sensitive or critical for business or military purposes should be encrypted. But what does it mean to be encrypted. What does encrypted data look like? In this lab we will look at data which is unencrypted and data that is encrypted. We will use a tool called GNS3 to simulate two routers that are connected via a point-to-point link. We will run data through this link while looking at the packets going through it. The tool we will use to view the data is Wireshark which is probably the most important tool we as network engineers have in our toolbelt. Let's answer the following questions as we go through the lab.

1. What is the cleartext data that is being sent in the ping between the two PCs?

? 2. What is the protocol used for the ping utility?

3. How many ping messages do you see? Why?

4. Is this data encrypted or unencrypted?

5. Now let's make a change in the router. What types of messages do you see now? Does it look the same as the messages we saw before we made the change to the router?

6. What protocol do you see now?

7. Are you still able to see the source and destination MAC address? What layer is this you are looking at the MAC address in?

8. Are you still able to see the source and destination IP address? What layer is this you are looking at the IP address in?

9. Can you see the cleartext data you saw before?

10. Explain the ESP protocol. Does what we see in Wireshark make sense? Write a paragraph answering these two questions.

Reference no: EM132511798

Questions Cloud

Can data analytics provide business value to organisations : How can data analytics provide business value to organisations and What is the impact of data analytics in novel and interesting domains such sports
What makes ibm watson a necessity in the case : KONE is a global industry company (based in Finland) that manufactures mostly elevators and escalators and also service over 1.1 million elevators.
Communicating sensitive information over the internet : What implications do you think a business might be concerned with? What would you advise if you were the decision maker for a small company?
Represent a nash equilibrium : If the members of an oligopoly could agree on a total quantity to produce and a price to charge, what quantity and price would they choose?
What is the cleartext data that is being sent in the ping : Any data that is sensitive or critical for business or military purposes should be encrypted. But what does it mean to be encrypted. What does encrypted data.
Firm unconditional input demands : Consider a firm using the following long-run technology:q=f(x1,x2)=1/3ln?(x1)+1/6ln?(x2) Where output and input prices are given
Evaluate project performance : In your role as a Project Manager for Kingston-Bryce Limited you have been assigned to create a scorecard.
What is the y-intercept of the short-run supply function : What is the y-intercept of the short-run supply function of this firm (p is on y-axis)?(round your answer to one decimal place if necessary)
What is optimal output level that maximizes profit : A monopolist has demand function of P= 100-Q and cost functions of AVC= Q+4; FC=200

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd