What is the protocol used for the ping utility

Assignment Help Basic Computer Science
Reference no: EM132532806

In this lab we will look at data which is unencrypted and data that is encrypted. We will use a tool called GNS3 to simulate two routers that are connected via a point-to-point link. We will run data through this link while looking at the packets going through it. The tool we will use to view the data is Wireshark which is probably the most important tool we as network engineers have in our toolbelt. Let's answer the following questions as we go through the lab.

1. What is the cleartext data that is being sent in the ping between the two PCs? _____________________

2. What is the protocol used for the ping utility? ____________________

3. How many ping messages do you see? _____________________ Why?

4. Is this data encrypted or unencrypted? _____________________________

5. Now let's make a change in the router. What types of messages do you see now? Does it look the same as the messages we saw before we made the change to the router? ________________________

6. What protocol do you see now? ____________________

7. Are you still able to see the source and destination MAC address? __________What layer is this you are looking at the MAC address in?

8. Are you still able to see the source and destination IP address? __________What layer is this you are looking at the IP address in?

9. Can you see the cleartext data you saw before? ____________________________

10. Explain the ESP protocol. Does what we see in Wireshark make sense? Write a paragraph answering these two questions.

Reference no: EM132532806

Questions Cloud

When should the bequest be recognized by Kudzoo University : The classroom building planning and construction began December 3, 2019, When should the $15,000,000 bequest be recognized by Kudzoo University
Discuss the importance of the organization policies : Discuss the importance of the organization's policies and practices as they relate to information systems and IT infrastructure.
What is the amount of the total cash outflow in year zero : What is the amount of the total cash outflow in year zero? What is the IRR of project rounded to two decimal places? What is operating cash flow for each year?
What is the corporations basis in the building : Kelly also receives $10,000 cash from the corporation. The corporation assumes a $15,000 debt that Kelly owes on the building. What is the corporations basis
What is the protocol used for the ping utility : What is the protocol used for the ping utility? Is this data encrypted or unencrypted ? Are you still able to see the source and destination MAC address?
Explain between conventional and abc : Outline some of the perceived benefits of implementing ABC. Outline with an example in a business on its areas where ABC can be applied
Presentation about obesity and osteoarthritis in dogs : Need pics and focusing more on osteoarthritis in professional way like effect of preventing overweightness and obesity on the development of osteoarthritis
Estimate of uncollectibles is determined : Prepare adjusting journal entries assuming that the estimate of uncollectibles is determined by using 4% of gross accounts receivable.
Disaster recovery plan that outlines emergency strategies : Choose either a natural or man-made disaster. Create a disaster recovery plan that outlines emergency strategies, backup procedures, recovery steps,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd