StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Three questions need to be answer in computer Network - Assignment Example

Cite this document
Summary
This security vulnerability enables another computer to receive sensitive data by posing as the intended receiver. Also, the attacker can inspect the packets in addition to modifying the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Three questions need to be answer in computer Network
Read Text Preview

Extract of sample "Three questions need to be answer in computer Network"

Computer Networks ARP is cited as a security weakness majorly because there exists an ARP spoofing weakness. This security vulnerability enables another computer to receive sensitive data by posing as the intended receiver. Also, the attacker can inspect the packets in addition to modifying the data before forwarding the data. MAC flooding is another weakness (Abad et al. 2007). Switches will fail to open when the translation table is flooded. As such, all network frames will be broadcast to all the ports.

Generic sniffers will then exploit this weakness.2Arp is used during boot time to check for conflicting IPs. An ARP request possessing the sender and target’s protocol address is broadcast. The machine uses the address f there is no reply. However, the machine will disconnect its outbound traffic for that specific IP. Subsequently, the machine will perform another similar broadcast to ensure that the issue has been sorted. The problem with this method is that the impersonating program can ignore the queries if it figures out the hardware address is of the machine it is impersonating.

3Early revalidation should send a request to all the entries in the ARP cache since a host that replies to a request updates its table with the Ethernet and IP addresses of the host (requesting)Work CitedAbad, Cristina L., and Rafael I. Bonilla. "An analysis on the schemes for detecting and preventing ARP cache poisoning attacks." Distributed Computing Systems Workshops, 2007. ICDCSW07. 27th International Conference on. IEEE, 2007.Print

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Three questions need to be answer in computer Network Assignment”, n.d.)
Three questions need to be answer in computer Network Assignment. Retrieved from https://studentshare.org/information-technology/1661954-three-questions-need-to-be-answer-in-computer-network
(Three Questions Need to Be Answer in Computer Network Assignment)
Three Questions Need to Be Answer in Computer Network Assignment. https://studentshare.org/information-technology/1661954-three-questions-need-to-be-answer-in-computer-network.
“Three Questions Need to Be Answer in Computer Network Assignment”, n.d. https://studentshare.org/information-technology/1661954-three-questions-need-to-be-answer-in-computer-network.
  • Cited: 0 times

CHECK THESE SAMPLES OF Three questions need to be answer in computer Network

Protecting Information through Network Security

model are two of the basic units that explain the overall working on the computer network and internet.... A proxy server can be defined as one that is developed on remote basis for purpose of connection, and it may not make use of the detailed technical specifications for the purpose of fulfilling the requirements of a complete internet network.... and password are often more vulnerable to the misuse of data, and in case of JSTOR similar event took place where proxy servers were used, and this is often the case in the universities that make special websites and proxy servers for students access thereby excluding them from the ordinary network of internet and as a result increasing the chances of data stealing as it ocured in case of JSTOR website and its large repository....
7 Pages (1750 words) Book Report/Review

The Cost of Computers Over 10 Years

Robert Metcalfe, the inventor of Ethernet, stated that the value of a network is proportional to the square of the number of connected users of that particular system.... Simply put, it means that every one new user added to a particular network adds more value to that network.... It seems like only yesterday that the decision to purchase a computer or laptop was on par with purchasing a secondhand car by today's standards.... How is this important to an economic analysis of computer costs?...
7 Pages (1750 words) Essay

Can a Machine Know

hellip; Second, how will human beings recognize when a machine, most probably a computer, is starting to 'know'?... The car, or rather the computer within its engine, is distinguishing between one situation and another.... Will we turn on a computer one day and have it say "hullo, I am here", and know that it is saying it.... he idea of the thinking computer, with all the benefits and risks involved, has existed virtually since it was invented....
4 Pages (1000 words) Essay

Computer Questions Final

CRT is the imaging technology used in most desktop monitors also provides an excellent color display.... It is not completely supplanted as it is extremely bulky and is now being gradually supplanted by TFT. Code 39 (also called Code 3 of 9) is an easy-to-print barcode commonly used for various bar-coding labels such as name badges, inventory and industrial applications....
5 Pages (1250 words) Assignment

Study of Cyber Attacks

This means that the network was forced into the continued and repetitive transmission of packages which exceeded the allowable size.... P2PMemoTo: Salamanika Giorgiopolis, Corporate Counsel From: CISO Date: 05/18/2007Re: Peer to Peer and PiracyIrrespective of the popularity of Peer to Peer Networks and regardless of the fact that everyone is doing it,' company employees are explicitly prohibited from running P2P programs on company computers or from using the company's network connection to download files through these programs....
8 Pages (2000 words) Essay

Neural Networks and Conventional Computers

A neural network learns and does not need to be reprogrammed.... The paper "Neural network" tells us about artificial neurons.... hellip; In general, a biological neural network is composed of a group or groups of chemically connected or functionally associated neurons.... A single neuron may be connected to many other neurons and the total number of neurons and connections in a network may be extensive.... An Artificial Neural network is an information processing paradigm that is inspired by the way biological nervous systems, such as the brain, process information....
10 Pages (2500 words) Essay

Watson Supercomputer with the Communication Network

The paper "Watson Supercomputer with the Communication network" presents the rate of channeling messages or data packets that are delivered successfully over the channel of communication.... hellip; Watson's computer used the network File System (NFS) protocol to access files from internal customized SONA I/O storage nodes.... Networking – Watson uses a cluster of servers that requires a communication network.... Explain the requirements for the communication network between the servers in terms of throughput, transmission speed, and protocols for reliability....
8 Pages (2000 words) Assignment

Competing Through Marketing ''Managing Information ''

It constitutes a basic study… In order to be successful, business owners and managers need to know that investing on information system in a business is very crucial in The most important question that business managers and owners should try to answer is what they need in order to effectively manage the data, internet resources, software and hardware, so as to ensure that they are efficiently used for the success strategies of the business.... The business under focus is a small high quality restaurant that uses very basic computer facilities....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us