Académique Documents
Professionnel Documents
Culture Documents
SOLUTIONS
Internet Protocol
2. What is fragmentation?
3. What are the two key functions for the network layer?
The Maximum Transmission Unit (largest datagram the network can handle)
20 bytes
6. What is the contents of the first byte of an IPv4 datagram? (use hexadecimal
notation)
0x45
8 bytes
996 bytes
ICMP Time exceeded and ICMP Port unreachable (UDP data too).
16.What are the two networks obtained by splitting in half the network
158.42.0.0/16?
18.We are given a computer with two network connections (i.e: eth0 and eth1).
How can it be determined which one can reach www.upv.es?
ping www.upv.es and disconnect eth0. If ping answers are stopped then it is
eth0 otherwise it is eth1.
19.List the values you need to configure your computer's TCP/IP network
interface?
20.How can you know your Window's computer IP address? And when it is a
Linux system?
22.Why would you want to clone a computer's MAC address on the router's
MAC?
The change not be detected by the ISP (and maybe to obtain the same IP
address as the cloned computer when using DHCP).
Neighbors
25.What type of routing is used for link state routing algorithm messages?
Flooding (broadcast)
27.Why do you need to use 'sudo' with wireshark (former ethereal) application?
Because putting the NIC into promiscuos mode needs root permits.
28.What filter do you use in wireshark to capture all web traffic only?
29.When a telnet login is sniffed with wireshark the username appears with
double characters. Why?
Stations listen before transmitting, if channel is busy the station defers to try
again later, if channel is clear transmission starts inmediately
15 minutes (3 exchanges)
Broadcast (ff:ff:ff:ff:ff:ff)
48 bits
4 addresses
48.Secret key encryption algorithms are based on the use of two basic
techniques. Name them.