Explain why telnet traffic from other “users” could be observed when using a hub.
Explain why telnet traffic from other “users” could not be observed when using a switch.
1) If we can telnet from one device to the other we have proven that the routing (layer 3) and the physical layer are working properly. Since telnet is an application layer utility it gives us confirmation that all 7 OSI layers are working correctly between the two devices.
A VLAN is a group of devices on one or more logically segmented LANs. All devices working on a VLAN will have same broadcast domain. Like routers, switches (Layer 2) have the ability to provide domain broadcast segmentation called a VLAN. Using VLAN technology, you can group switch ports and their connected users into logically defined communities of interest. A VLAN operating on a Catalyst switch limits transmission of unicast, multicast, and broadcast traffic to only the other ports belonging to that VLAN, thereby controlling broadcasts.
The benefits of VLANS include:
1. Easy Administration resulting in reduced administration costs,
2. Increased Security due to broadcast control, if you are using simple hub, you can observe traffic corresponding to any node by simply inserting a Network analyzer.
3. Grouping based on functional requirements irrespective of physical location of nodes,
4. Simplify moves, adds, changes,
5. Distribution of traffic thereby using the network bandwidth more efficiently.
2)The “show users” shows telnet/ssh connections to your router while “show sessions” shows telnet/ssh connections from your router (to other devices). The question asks about “your active Telnet connections”, meaning connections from your router so the answer should be
Even though there may be IP connectivity between a source and a destination, problems may still exist for a specific upper-layer protocols such as FTP, HTTP, or Telnet. These protocols ride on top of the basic IP transport but are subject to protocol-specific problems relating to packet filters and firewalls. It is possible that everything except mail will work between a given source and destination. Before troubleshooting at this level, it is important to first establish whether IP connectivity exists between the source and the destination. If IP connectivity exists, then the issue must be at the application layer.
The following could go wrong:
•A packet filter/firewall issue might have arisen for the specific protocol, data connection, or return traffic.
•The specific service could be down on the server.
•An authentication problem might have occurred on the server for the source or source network.
•There could be a version mismatch or incompatibility with the client and server software.
Explain why telnet traffic from other “users” could be observed when using a hub. Explain why...
Why does replacing a hub with a switch improve an Ethernet users capacity?
b) (5 pts) Complete the following table Router Switch Hub Laver of operation 1.2,3.4.5) Isolates network traffic (Yes.No) Does not require configuration from network administrator Yes,No May implement OSPF (Yes,No) Has store and forward capability Yes,No b) (5 pts) Complete the following table Router Switch Hub Laver of operation 1.2,3.4.5) Isolates network traffic (Yes.No) Does not require configuration from network administrator Yes,No May implement OSPF (Yes,No) Has store and forward capability Yes,No
3) A traffic engineer has observed the traffic at a certain intersection between 5 pm and 5:05 pm each day for 100 days. She has tabulated the frequency of the number of cars observed crossing the intersection during this period Number of Number Proportion Cars of Days of Days 36 28 15 10 0.36 0.28 0.15 0.10 0.07 0.04 2 P(x)(0.2)(0.8) P2(x) -(0.4)(0.6) a) The engineer is trying to obtain a good model for the number of cars using the...
While analyzing network traffic, a security engineer discovers that confidential emails were passing between two users who should not have had this information. The two users deny sending confidential emails to each other. Which of the following security practices would allow for non-repudiation and prevent the users from removing emails such as these from their accounts? (Select TWO). Digital Signature TSIG code signing Legal hold Authentication hashing Transport encryption PLEASE PROVIDE AN EXPLANATION TO THE TWO ANSWER CHOICES AS WELL...
Why is my answer wrong and the other correct? Could you please explain. Question 9 Using the three confidence intervals below for p , what is the correct range of the p-value when testing 8H0: p = 0 Haip 70 90% (0.0040, 0.0740) 95% (-0.0115, 0.0815) 99% (-0.0261, 0.0961). Selected Answer: 0.01 < P-value < 0.05 Answers: P-value > 0.10 P-value <0.10 0.01 < P-value < 0.05 None of the above. Response Feedback: See "Logic of Confidence intervals" (Lecture 10,...
When trans 1 phenylpropene is treated with bromine, some syn addition is observed. Explain why the presence of a phenyl group causes a loss of stereospecificity. When trans-1-phenylpropene is treated with bromine, some syn addition is observed. Explain why the presence of a phenyl group causes a loss of stereospecificity. cod. trans-Phenylpropene anti addition products yn addition products
Explain if the following scenario could be justified using the principle of double effect. And why? A health insurance company denies payment for Beth's heart transplant surgery. The insurance company is aware that without the surgery, Beth will likely die, but it argues that the procedure is risky and if they were to cover her surgery it would unfairly take funds away from other patients.
explain when an observed correlation might represent a true relationship between variables and why. give examples
(Bonus point) Explain why different colors are observed when white light passes through a prism (figure below). Explain the order of the colors and the equation that describes it. 5. 03 ö: angle of deviatiorn
1. Why financial reporting is important for investors, creditors and other users? 2. What kind of ethical issues might managers face in dealing with confidential information? 3. Please decompose Return on Assets into two components, and explain briefly each of these two components.