Question: QUESTION 1 ( a ) [ 8 Marks ] Consider the network depicted above. With reference to the TCP / IP network model, and using

QUESTION 1
(a)
[8 Marks]
Consider the network depicted above. With reference to the TCP/IP network model,
and using bullet points, explain the steps involved in the creation of an ICMP echo
request (i.e. a ping) at 10.10.10.11 and its transmission to 172.16.13.32. Include in
your answer an outline of the role, if any, played by supporting protocols and routing
tables. Assume all ARP caches start empty and document any assumptions.
(b)
[7 Marks]
Consider the network depicted above. Explain how an attacker at 192.168.3.21
would go about intercepting all traffic between 192.168.3.33 and the 172.16.0.0/16
network. Mention any relevant tools in your explanation.
(c)
[5 Marks]
Consider the network depicted above. With reference to the TCP/IP network model,
and using bullet points, explain what happens when 172.16.12.31 pings
172.16.14.33(note there is no device with the latter IP address). Include in your
answer an outline of the role, if any, played by supporting protocols and routing
tables. Assume all ARP caches start empty and document any assumptions.
[END OF QUESTION 1]
QUESTION 1 ( a ) [ 8 Marks ] Consider the network

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!