Host A sends a UDP datagram containing 8880 bytes of user data to host B over an Ethernet LAN. Ethernet frames may carry data up to 1500 bytes (i.e. MTU = 1500 bytes). Size of UDP header is 8 bytes and size of IP header is 20 bytes. There is no option field in IP header. How many total number of IP fragments will be transmitted and what will be the contents of offset field in the last fragment?
Q: Suppose N is a (6x3) matrix array. This program segment print the locations of the negative…
A: Given program contains, Two for loops and the outer loop iterates from i=0 to 6 and the inner for…
Q: What are some of the most prevalent methods of system development? In-depth evaluations of the…
A: The cascade model and the coordinated model are currently the two most utilized ways to deal with…
Q: Get to know cloud computing and social networking blogs as best you can
A: You can connect to the cloud through a network and use tools like emails and calendars to…
Q: Distinguish between wired and wireless networks, pointing out the differences between the two
A: Wireless networking: Wireless local networks are reasonably easy to set up and are ideal for…
Q: Write a Python program to demonstrate working of iterators using an example type that iterates from…
A: Let us see the answer:- Introduction:- In Python, an iterator is an object that iterates over…
Q: The process of developing software and the process of modeling software are two distinct activities.…
A: Methodology for the Development of Software: In software engineering, the division of the…
Q: What do you think are the five most essential computer graphics apps today?
A: Introduction: The top five computer graphics applications
Q: As a direct outcome of machine learning, do data structures and algorithms grow more out of date?…
A: The actions that follow can be carried out with far less effort when a graphical user interface…
Q: What are the intended outcomes of software development? Do you believe it would be beneficial to add…
A: Given: "Software development" refers to the process of generating, designing, delivering, and…
Q: Suppose N is a (6x3) matrix array. This program segment print the locations of the negative…
A: In Step 2, I have provided correct answer with brief explanation---------------
Q: What should you check for when trying to find an updated version of the printer's firmware?
A: Firmware is a physical, electronic component with integrated software instructions in electrical…
Q: If A and B are sets and f: A→ B, then for any subset S of A we define f(S) = {be B: b= f(a) for some…
A:
Q: Given Email B with its feature vector. Compute the probability of email B being “spam” and “ham”…
A: P(spam | Email B) = 0.65 x 0.6 x 0.4 x 0.7 x 0.3 / (0.65 x 0.6 x 0.4 x 0.7 x 0.3 + 0.35 x 0.02 x…
Q: Using the Black Box Testing Technique, what is the test-cases for the following: a. Equivalence…
A: Black Box Testing: Black Box Testing is a software testing method that analyses software/application…
Q: Risk analysis is typically a two-step process: qualitative risk analysis and quantitative risk…
A: We need to discuss, as a systems analyst, for which sorts of project management decisions would we…
Q: ava) The SalesCenter application stores information about three employees. There is one manager…
A: Java is a high level object oriented programming language. It is developed by James Gosling. Java is…
Q: What are the key distinctions between the ARM architecture and the Core i3 architecture?
A: Given: In point of fact, ARM, which stands for Advanced RISC Machines, is a collection of older…
Q: The information systems department is responsible for maintaining: Hardware & Software Network Data…
A: Answer: As we know the information system is combination of hardware, software, Network, Storage of…
Q: Let's imagine you're developing a browser history-preserving app. Identify the collection class that…
A: Build the Browser History class by doing the following: History of the Browser (string homepage)…
Q: What is a workflow, exactly? Compose a list of the major steps in the system building process.
A: Introduction : A Workflow is an end- to - end process that helps teams meet their goals by…
Q: I need help in creating a function that will show the first letter of the actual word. It is to be…
A: According to the question , we have to creating a function that will show the first letter of the…
Q: Tarun was completing an Algorithms project and stuck to the question. He wondered who could help…
A: Algorithm: The first line have single integer T denoting the number of test cases. The second line…
Q: What are the four most significant qualities of software development? Consider the other four…
A: To do: compose the four most crucial attributes
Q: Our group plan on making a Business Model Canvas for a business involving an app called "Recycle…
A: Key activities:- How will you reach your customers and bring your value proposition to them? The…
Q: Interprocess communication may be used to access common structures that are stored in the memory of…
A: Inter-process communication is an operating system feature that enables processes to interact with…
Q: Windy days We know the wind speed measured in N locations across the country for the last D days.…
A: We meed to write program for the given scenario. Language used is C.
Q: In software development, what are the four most significant attributes that may be subdivided?…
A: Given: What are the four most significant traits in software development that may be separated into…
Q: In the discipline of computer science, what sorts of business rules are often mirrored in the EER…
A: The answer is given in the below step
Q: Make 2 goals and 2 objectives about internet cafes in rural areas.
A: Introduction: There is a lot of requirement of internet cafes in rural areas. In big cities, we…
Q: Is there a reason why software development is so important? In your perspective, would the addition…
A: Development of software: It refers to a range of computer science tasks concerned with the creation,…
Q: What precisely do we mean when we state that requirements should be thorough and consistent?
A: Given: A good requirements document will typically contain a development plan with extra product…
Q: Composer is a tool that may be used to reduce the complexity of higher-level applications. The…
A: Compilers translate complex programmes into machine code. In addition to CPU and computer speed,…
Q: When a Facebook friend posts a picture, video, or text that includes you, who can view that post?…
A: Please upvote. I am providing you the correct answer below. Please please please.
Q: Write a case study that applies the software engineering code of ethics in a person
A: Write a case study that applies the software engineering code of ethics in a person
Q: 02 the distance between two points (x1, y₁, Z₁) and (x2, y2, Z2) in a three dimensional Cartesian…
A: Note : since programming language is not mentioned we are providing solution in c++ language. please…
Q: A sender sends a series of packets to the same destination using 4-bit sequence numbers. If the…
A: Given, Size of a sequence number = 4 bits Number of sequence numbers = 2 ( Size of sequence number )…
Q: Given network: 101.202.0.0 Design three subnetworks: N1, N2 and N3. N1 needs 900 ip addresses for…
A: As per our guidelines, only one question will be answered. So, please repost the remaining question…
Q: When using a multiprogramming or time-sharing multi-user environment. What has to be addressed in…
A: Solution: In a multiuser, multiprogramming system. How does this system safeguard processes?…
Q: Design the address encoder for the followings: 1) IN AL, 3CH 2) OUT 9DH, AL
A: The answer is given in the below step
Q: 04 write a program that accepts a day, month and year then calculate the day of year corresponding…
A: I give the code in Python along with output and code screenshot
Q: Suppose user has two browser applications active at the same time, and suppose that the two…
A: Suppose user has two browser applications active at the same time, and suppose that the two…
Q: What is the number of seats booked for the family?
A: As per the above information It is clear that the above information is about ticket booking ,This…
Q: The number of nodes in the strongest linkedlist is unknown. Is there a particular one that stands…
A: Introduction: A linked list is a special data structure in which each component (called a node) has…
Q: Design the following webpage using angular with a module as "myapp". On clicking calculate display…
A: solution in below step
Q: Do you know what the four most crucial characteristics are when it comes to software development?…
A: A software developer must be enthusiastic about their work. Or a different employee. Everyone on…
Q: What are the advantages of designing a big computer software in a modular manner?
A: Modular programming is breaking of one BIG PROgRAM INTO different functions where each function…
Q: Consider a paging system with the page table stored in memory. If a memory reference takes 150…
A: 300 nanoseconds; 150 nanoseconds to access the page table and 150 nanoseconds to access the word in…
Q: What is the dibetween one-to-many, many-to-many and one-to-one relationships.
A: The difference between one-to-many, many-to-many and one-to-one relationships is:- One to Many- This…
Q: During the early generations of operating systems, serial processing presented a number of…
A: The drawbacks of the serial processing in early versions of operating systems The first generation…
Q: A current-carrying wire has current in the downward direction. An external magnetic field is…
A: The magnetic force moves in the clockwise direction.
Step by step
Solved in 2 steps
- Q10: Complete the frames (x & y) given below with appropriate port, IP and MAC addresses. The sender Host E has two applications running; one for email with port number 49254 and the other for accessing the web server with port number 52167. The frame x is intended for the BRACU Web server and frame y is coming from the Email Server. (MAC addresses are alphabets and IP addresses are numbers) [5] Port 80 Frame y K/93 BRACU G/51 Router BRACU Web ISP Frame x Server Router I/91 Port 25 Н 52 F/25 Hub-PT Hubo A/20 Switc-PT Switcho Swich-Pr Syitch1 Email Server J/92 B/21 E/24 C/22 D/23 Sender Frame X D. Mac S. MAC D. IP S. IP D. Port S. Port Data Trailer Frame Y D. Mac S. MAC D. IP S. IP D. Port S. Port Data Trailer ** *******END***: *** *** *****Host A sends a UDP datagram containing 8880 bytes of user data to host B over an Ethernet LAN. Ethernet frames may carry data up to 1500 bytes (i.e. MTU = 1500 bytes). %3D Size of UDP header is 8 bytes and size of IP header is 20 bytes. | There is no option field in IP header. How may total number of IP fragments will be transmitted and what will be the contents of offset field in the last fragment?Accomplish the following tasks involving SNORT rules: Add an appropriate rule options part to the following rule headeralert udp any any any 53 Add an appropriate rule header to the following rule options part(msg:”possible HTTP GET request”; sid:xxxxx; rev:y;) Write a complete rule header and rule options to detect an FTP connection attempt. Explain what the following rule does.alert tcp $HOME_NET 21 any any (msg:"FTP failed login";content:"Login or password incorrect"; sid:xxxxx; rev:y;)
- Create and apply a numbered ACL that allows UDP-based services to communicate with the server on any port number higher than the well-known ports. Communication to TCP-based services on the server are permitted for the well- known ports. Other traffic is to be dropped. Show any calculations, and in a few bullet points or sentences, explain the purpose of each configuration command. Omitting an explanation is unsatisfactory. It is recommended (but optional) that you test your command syntax in Cisco Packet Tracer for accuracy. ACL Gi0/1 Gi0/2 Gio/3 172.26.0.1Q10: Complete the frames (x & y) given below with appropriate port, IP and MAC addresses. The sender Host E has two applications running; one for email with port number 49254 and the other for accessing the web server with port number 52167. The frame x is intended for the BRACU Web server and frame y is coming from the Email Server. (MAC addresses are alphabets and IP addresses are numbers) Port 80 BRACU Web Frame x Server A/20 B/21 Frame X D. Mac Frame Y D. Mac Switch-PT Switcho C/22 S. MAC S. MAC BRACU G/51, Router F/25 Frame y Switch-P Switch1 D/23 D. IP D. IP ISP Router 1/91 H/52 E/24 Sender S. IP S. IP Hub-PT Hubo D. Port D. Port K/93 Port 25 Email Server 3/92 S. Port S. Port Data Data Trailer TrailerQ' Figure below shows the IPV4 datagram format. Fill the fields from 1 to 5 by choosing the right answers 2 16-bit identifier ID flags 3 4 32 bit source IP address 5 options Data (variable length, typically a TCP or UDP segment) 1- Field (1) is for: a- Time to live b- IP protocol version number c- Type of service d- Header checksum e- Upper layer protocol f- None of them 2- Field (2) is for: a- Time to live b- IP protocol version number c- Type of service d- Header checksum e- Upper layer protocol f- None of above 3- Field (3) is for: a- Time to live b- IP protocol version number c- Type of service d- Header checksum e- 32 bit destination IP address f- None of them
- Complete the frames (x & y) given below with appropriate port, IP and MAC addresses. The sender Host E has two applications running; one for email with port number 49254 and the other for accessing the web server with port number 52167. The frame x is intended for the BRACU Web server and frame y is coming from the Email Server. (MAC addresses are alphabets and IP addresses are numbers) Port 80 Frame y K/93 BRACU Web Frame x Server BRACU G/51 Router ISP Router I/91 Port 25 H/52 F/25 Hub-PT Hubo A/20 Switc-PT Switho Swich-P Syitch1 Enail Server J/92 B/21 E/24 C/22 D/23 SenderAssignment Module 11 For the following Ips, write the network name, give 2 Ips in the same network, find the number of the possible Ips Net name 1" ip 2nd IP no. of valid IPs • 11.45.3.5 → • 180.90.27.89-→ • 190.35.177.98 → • 192.76.19.1 • 200.30.50.90> • 100.100.100.100> 107.39.50.20→IL PCAP Scanner alert udp any 61348 -> any any (content: "109 69 63 61 6e 68 61 7a 69 70 03 63 6f 6d 001; msg: "DNS Test"; Sid:1000001) Question Number 2 Scan The scan results for your snort rule will be displayed below. There is a problem with your rule. Check the alerts below to determine what went wrong and then try again. Something went wrong with your snort rule. Check the Syntax Syntax error please help! Create a rule to detect DNS requests to 'icanhazip', then test the rule with the scanner and submit the token. O X
- SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts. A TCP connection is set up between a user agent and a server program. The server listens on TCP port 25 for incoming connection requests. The user end of the connection is on a TCP port number above 1023. You have defined the packet filter rule set shown in the table below. These rules permit and/or deny inbound and outbound traffic between the user agent and the mail server. Describe the purpose of each packet filter rule in the table. Rule Direction Source Address Destination Address Protocol Destination Port Action A2 In External Internal TCP 25 Permit B2 Out Internal External TCP > 1023 Permit C2 Out Internal External TCP 25 Permit D2 In External Internal TCP > 1023 Permit E2 Either Any Any Any Any Deny1. Please access any web site so you that you can capture TCP packets from an HTTP request. 2. Please expand all the fields in the header of your HTTP request packet. Take a screenshot for all the fields in the header fields of the HTTP packet. 3. Please expand all the fields in the header of the TCP packet in your HTTP request packet. Take a screenshot for all the fields in the header of the TCP packets. Please answer the following questions based on your HTTP request, and TCP packets screenshots: 1. What is the method used in your HTTP request? 2. What is the host name you visited? 3. What is the connection status in your HTTP request? 4. What are the source port and destination port, respectively? 5. What are the sequence number and acknowledgement number, respectively? 6. Which flags are set up in the captured packet? Explain what the flags mean.CIS269 Packet Translation Lab Break down the following IP datagram into its individual fields, listing the value of each. Hint: It’s an IP datagram containing a TCP segment containing another protocol… 45 00 00 31 94 00 40 00 80 06 1B 9F 80 A3 C9 29 D8 45 29 15 04 09 00 15 00 00 C3 A1 DF 65 A8 45 50 18 20 AA 8E 8C 00 00 43 57 44 20 66 75 6E 0D 0A