Interfaces except loopback

Assignment Help Computer Networking
Reference no: EM131109201

Part A

1. Run ifconfig. For all configured interfaces except loopback, there should be an "stet" address, a "HWaddr" (hardware) address, and perhaps even an "inet6" address. Each of these addresses identifies the computer within a certain context. In what context are each of these addresses used? Specifically, for what protocol is the address used, and what other computers can access this one using this address? (Ignore NAT issues.)
2. What does MTU refer to in the output of ifconf ig? Specifically, what does the acronym mean, and what does this value determine?
3. How could you use netcat (nc) to listen on port 9200 and write received data to the file /tmp/foo?
4. What does tracepath slashdot .org return?
5. How can you get netstat to return a list of all current TCP connections and open ports, listed using numeric IP addresses (rather than DNS hostnames)?
6. How could I use lsof to find all of the processes accessing the directory /home?
7. In /proci<PID>/maps, each entry has four permission bits: & p. What do each of them indicate?

Part B
1.  Why does tt acepath return "no reply" sometimes?
2. ] nc uses very few system calls (three on Ubuntu 11.10) when actually receiving data on the network. (The other system calls are tbr setup and tor ending the connection.) What are those few system calls, and what do each of them do?
3. What file does netstat access to find out about current TCP connections on Linux? And, what is the difference between this file and the output of netstat, in syntax and semantics? Be specific.
4.  What does 1 sof sometimes get a "permission denied" error when run as a regular user? Specifically, what files is it hying to access, and why arc these protected?

Reference no: EM131109201

Questions Cloud

Show the content and structure of f''s frame : Consider the following C function. Show the content and structure of f's frame. Explain how the offsets of f's local variables are determined.
What is the fundamental group of the circle : What is the fundamental group of the circle? Sketch a proof, in a sentence or two. Let k be a positive integer. Please construct a simply connected space with a properly discontinuous action of the cyclic group Ck of order k
Impact of robotic process automation in your industry : Your major assignment for this class is to write a report (such as you might write to your boss), outlining what you see as the impact of robotic process automation in your industry.
Find the surface integral : Find the surface integral where f=(x^2+y^2)z and S is the sphere x^2+y^2+z^2=36 above z=5 - Parameterize the surface integral.
Interfaces except loopback : Run ifconfig. For all configured interfaces except loopback, there should be an "stet" address, a "HWaddr" (hardware) address, and perhaps even an "inet6" address. Each of these addresses identifies the computer within a certain context. In what cont..
Offbeat ratings in hopes of garnering attention : John Sutherland kept taking trips to the water cooler. He was not going to figure out where he  had  miscalculated  by  continuing  to  stare  at  his  computer  monitor.
Boey company reported net income : Boey Company reported net income of $25,000 in 2011. It had the following amounts related to its pension plan in 2011: Actuarial liability gain $10,000; Unexpected asset loss $14,000;
Discuss the effects of stock dividends on stockholder : Show the effects on Columbia of a 5% stock dividend. Show the effects of (1) a 10% and (2) a 20% stock dividend. In light of your answers to parts a and b, discuss the effects of stock dividends on stockholders' equity.
What run-time data structures are needed in java : What run-time data structures are needed in Java to implement the mark phase of a mark-sweep garbage collector in which all accessible ("live") heap objects are marked?

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Which of the given is a cisco ios feature which can collect

question which of the following is a cisco ios feature that can collect timestamps of traffic sent between a particular

  Each group is to prepare a written report in report format

each group is to prepare a written report in report format of approximately 3000words and an oral presentation in

  Internet resources to research some possible design network

Internet resources to research some possible design network patterns

  Describe in your own words what is meant by the term

question 1. explain in your own words what is meant by pervasive computing. give several examples.question 2. which of

  What network hardware needed for networking project

You are to network a ten story building capable of supporting 100 computers on each floor. What network hardware will be needed to accomplish the networking project?

  Text book – computer networking a top down approach

Text Book – Computer networking A top down approach, Part 1. Text reading, Part 2. Textbook questions, Chapter 7 , 7.1 Generalize the basic approaches we used for making the best out of best effort service for real-time interactive multimedia applica..

  Explaining security-aware caching resolver

Suppose a security-aware caching resolver receives DNS RRset at time t0 with signatures on it which expire at time t1 (where t0

  Evaluate security implication of implementing virtualization

Discuss why virtualization is gaining so much popularity, and compare it with other types of networks that are currently available - Evaluate security implications of implementing virtualization. With reasons, recommend a typical virtualisation set..

  What are all the protocol steps that take place

What are all the protocol steps that take place, starting from powering on your PC to getting the web page? Assume there is nothing in our DNS or browser caches when you power on your PC

  What role leadership knowledge and skills play

What role leadership knowledge and skills play - design and integrate value-added leadership learning modules into your organization''s training efforts.

  Explain how does a vlan and firewall combination help you

you are the senior network architect for a large corporation. the company has offices in l.a. new york and miami. the

  Determine the essential items on network deployment

you are preparing to deploy EIGRP in a network. Determine the essential items that you will need to consider prior to the network deployment, and explain the importance of each item in the deployment process.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd