Host A with IP address 90.100.100.100 and MAC address
Mar 13,23Question:
Background:
Submission guidelines:
- Deadline for submission on Moodle is by 5pm Friday 25 September
- You must submit a word document that provides answers to the questions given
Your answers must be concise and brief.
- You can use online material present on the Internet in relevant research articles/books, however, you have to cite them in proper APA or Harvard
- Remember not to copy/paste anything directly from above mentioned resources, you should provide answer to the questions in your own
- Avoid any sort of plagiarism (Do not copy anything from your class fellows).
- This tutorial carries 7.5% weightage.
Question 1: Host A with IP address 90.100.100.100 and MAC address AB:AB:AB:AB:AB:AB sends a packet to a Host B located in the internet. The IP address and MAC address of Host B are 10.10.10.8 and CC:CC:CC:CC:CC:CC, respectively. The default gateway of host A is router R1 which is further connected to the router of the ISP (R_ISP). Note that R1 has one interface connected to Host A and another interface connected to R_ISP. The IP addresses and MAC addresses of all interfaces of R1 and R_ISP are shown in the figure below.
Answer the following questions (4 marks)
- In order to communicate with Host B, Host A sends a packet to R1. What are the source and destination IP addresses, and source and destination MAC addresses in the packet transmitted by the Host A to R1?
(0.5*4 = 2 marks)
- The packet above (in part a) now traverses from R1 to R_ISP. What are the source and destination IP addresses, and source and destination MAC addresses now?
(0.5*4 = 2 marks)
Question 2: Answer the questions regarding the given topology. Router A and Router B have 50 PCs and 20 PCs connected to them, respectively. The IP address space given to you is 192.168.10.0/25.
(8 marks)
- Write Subnet Mask, Network ID, Broadcast ID and host address range for Router A You must clearly explain all the steps involved otherwise no marks will be given.
(4 marks)
- Write Subnet Mask, Network ID, Broadcast ID and host address range for Router B Subnet. You must clearly explain all the steps involved otherwise no marks will be
(4 marks)
Question 3: What is a Distributed Denial of Service attack (DDoS)? Briefly explain the UDP Flood DDoS attack (1+2 = 3 marks)
Answer:
Introduction
Question 1
Part a
If the host A sends a packet to R1 in order to communicate with the host B then the destination IP address and Mac address and Source Ip address and Mac address are:
Source IP address = 90.100.100.100
Destination IP address = 10.10.10.8
Source MAC address = AB:AB:AB:AB:AB:AB
Destination MAC address = CC:CC:CC:CC:CC:CC
Part b:
When packet moves to R_ISP from R1 then the new destination IP address and Mac address and Source Ip address and Mac address are
Source IP address = 100.10.10.2
Destination IP address = 10.10.10.8
Source MAC address = BB:BB:BB:BB:BB:BB
Destination MAC address = CC:CC:CC:CC:CC:CC
Question 2
The subnetting for router A and Router B for IP address are:
For Router A:
Subnet Mask = 255.255.255.192
Network ID = 192.168.10.0/26
Broadcast Address = 192.168.10.63
Host Address Range = 192.168.10.1 – 192.168.10.62 (any 50 IP address within this range can be used by router A)
For Router B:
Subnet Mask = 255.255.255.192
Network ID = 192.168.10.64/26
Broadcast Address = 192.168.10.127
Host Address Range = 192.168.10.65 – 192.168.10.126 (any 20 IP address within this range can be used by router B).
Explanation:
Given Ip address was 192.168.10.0/25 which means the network address was 192.168.10.0 and subnet mask was 255.255.255.128. As given scenario was to create subnets for router A with 50 PCs and router B with 2-0 Pcs. To accommodate the maximum hosts the formula used is 2^n-2. Here n is number of bits and -2 subtracts unused addresses. Thus, the subnets mentioned above were create using this process.
Question 3
The distributed Denial of Service Attack (DDOS) is such attack that occurs when multiple face systems flood the resources of the targeted network or targeted system. This attack happens due to multiple compromised system. In simple, words, the hacker increases the traffic to a system or network with fake bots and as the result the network gets overloaded or crash sometimes. (Kolias, 2017)
UDP flood is one of the types of DOS attack. In this attack the hacker overpowers random ports of the targeted system with such Ip packets that are containing UDP (which is a connectionless networking protocol) datagram. (Bijalwan, 2015) The targeted system checks the packets and find nothing. As more and more data packets with UDP data grama re received and opened, the system becomes and overpower the system which becomes unresponsive to other users and clients. There are several commercial softwares available that can be sued to perform this attack.
References
Bijalwan, A. a. W. M. a. P. E. S. a. J. R. C., 2015. Forensics of random-UDP flooding attacks. Journal of Networks, 10(5), p. 287.
Kolias, C. a. K. G. a. S. A. a. V. J., 2017. DDoS in the IoT: Mirai and other botnets. Computer, 50(7), pp. 80-84.
0 responses on "Host A with IP address 90.100.100.100 and MAC address"