Modify hosts file to map yahoo-s ip address

Assignment Help Computer Networking
Reference no: EM1364704

1. Find the IP addresses of www.google.com and www.yahoo.com
2. Modify the hosts file to map www.google.com to yahoo's IP address and try to do a google search. Remove the modification to the host file and repeat.
3. Find the domain name of 128.252.160.200 (reverse the address and add.in-addr.arpa)
4. Find the owner of fccollege.edu.pk domain
5. Find route from your computer to www.google.com
6. Find the MAC address of your computer
7. Print your ARP cache table. Find a server on your local network. Change its ARP entry in your computer to point to your computer's MAC address. Print new ARP cache table. Now use the service and see what happens.
8. Print your routing table and explain each line (up to line #20 if too many)
9. What is the number of packets sent with "destination unreachable"
10. Find the location of 128.252.166.147 (use ipaddresslocation.org)

Reference no: EM1364704

Questions Cloud

Explain benefits of providing synchronization tool : Using a FIFO policy, slim reader-writer locks favor neither readers nor writers, nor are waiting threads ordered in a FIFO queue. Explain the benefits of providing such a synchronization tool.
Inadequate financial resources : One of the primary reasons that firms fail is inadequate financial resources. Knowing this, what steps should an entrepreneur take to obtain and maintain adequate resources? What is more important -- obtaining or maintaining financial resources? W..
Constructive receipt argument : A taxpayer, who uses the cash method of accounting for tax purposes, received income in 1989, 1990, 1991 and 1992 for illegal espionage activities performed in 1985.
South western federal taxation exercises : Discuss the key factors that should be considered when determining whether an item should be expensed. Speculate how Joe Carter arrived at his decision to expense the carpets replaced in the apartments.
Modify hosts file to map yahoo-s ip address : Modify the hosts file to map www.google.com to yahoo's IP address and try to do a google search. Remove the modification to the host file and repeat.
Ethical issues general electric-healthcare : Could you help me determine two specific ethical issues that General Electric (GE) Healthcare faced when implementing its strategy to introduce low cost diagnostic equipment to developing countries.
Several topics in accounting : Performance measurement: introduction to financial statement analysis; assessing firm level performance and an introduction to FSA.
Compute total dollar interest payments : Procter Micro-Computers, Corporation, requires $1,200,000 in financing over the next two years. The company can borrow the funds for two years at 9.5% interest per year.
Summary of asset treatment in business : Write a summary of asset treatment in a business. Examine the aspects of acquisition, depreciation, revising periodic depreciation, expenditures during useful life, and the three different means of disposal.

Reviews

Write a Review

Computer Networking Questions & Answers

  Identity intended recipient of data-statistical multiplexor

When data is transmitted using a statistical multiplexor, the individual units of data must have some form of address that tells the receiver the identity of the intended recipient of each piece of data.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  Explaining protocol to avoid defeat

Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Managing intrusion detection environment

As security manager at XYZ Corporation, you are responsible for managing intrusion detection environment. If you were given the ability to build the environment from scratch, would you use network based IDS, host based IDS, or a combination?

  Investigate employees connect using wireless and not cables

You are the Network Manager for a large bank. You have been asked to investigate having employees connect using wireless and not cables.

  Advantages-mobile computing technology to monitor patients

Analyze the advantages and disadvantages of using mobile computing technology to monitor patients.

  Difference between tcp and udp

List the primary differences between the TCP and UDP. Would you recommend UDP or TCP for the voice over IP phone call? Justify your choice.

  Brief description of rfc and its importance to internet

Choose an existing RFC and share it with the class by providing a brief description of the RFC and its importance to the Internet.

  Explaining bayesian belief networks

A quality control manager has used algorithm C4.5 to come up with rules that classify items based on several input factors. The output has two classes -- Accept and Reject. An item classified as Reject is actually good?

  Segment network to reduce scope of compliance

To avoid having whole network subject to PCI specifications, how will you segment network to reduce scope of compliance?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd