Assume that a NAT router has a WAN side ( internet side) address of 138.1.1.1 and a LAN side address of 192.168.0.10. Assume that a connection originated from a host (IP address is 192.168.0.4) inside the LAN has a destination address of 128.1.1.1 For this connection , answer the following questions:
1) what are the source and destination address of a NAT translated packet from NAT router to the WAN ?
source=........? Destination=........?
2) What are source and destination address of a NAT translated packets from NAT router to the LAN ?
Source=.......? Destination=..........?
1)
source = 138.1.1.1 (To WAN, it looks like NAT router has made the request)
detination = 127.1.1.1 (Actual destination to which request is to be sent)
2)
source = 128.1.1.1 (Actual source from which response is coming)
detination = 192.168.0.4 (Actual destination in LAN to which response is to be sent)
Assume that a NAT router has a WAN side ( internet side) address of 138.1.1.1 and...
Consider the scenario below in which three hosts, with private IP addresses 10.0.1.13, 10.0.1.15, 10.0.1.20 are in a local network behind a NATted router that sits between these three hosts and the larger Internet. NAT Translation Table WAN side addr LAN side addr 35.122.196.219:517 10.0.1.27:3435 10.0.1.13 2 S: D, 10.0.1.27 135.122.196.219 10.0.1.15 4 3 10.0.1.20 IP datagrams being sent from, or destined to, these three hosts must pass through this NAT router. The router's interface on the LAN side has...
- Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B, C, D, E. Fand G) which are connected by a switch. The contents of the switch's CAM table is as follows: (Port 1. Host A) - (Port 2. Host B) - (Port 3. Host - Port 4, Host D) - Port S. Hosta-Port 6, Host F) - (Port 7. HostG), Also, we assume that there is/are one or many host(s) that has/have sent fake...
29. Consider the following LAN with one Ether switch S, one intra-domain router R, and two hosts X and Y Assume switch S has been just powered on. 1. Describe the routing and address resolution steps performed at X, Y, and S when X sends an IP packet to Y. 2. Describe the routing and address resolution steps performed at X, Y, and S when Y replies an IP packet to X. 3. Describe the routing and address resolution steps...
A NAT router translates a non-routable IP address to a unique IP address that can be transmitted over the Internet. True/False Each subnet within an organization has a unique subnet address. True/False
13 Ll し2 L3 C2 Cl Assume the path from host A to host B consists of 2 routers and 3 links as displayed in the diagram. Assume host A sends packets to host B. At host A, packets from A to B will be transmitted with source IP address of destination IP address of and with source MAC address of destination MAC address of 13 Ll し2 L3 C2 Cl Assume the path from host A to host B...
Question 6 A router has the following routing table: Destination Address Range Link Interface 123.46.56.0/22 1 123.46.56.0/23 2 123.46.56.0/24 3 Otherwise 4 The router uses longest-prefix matching. On which interface will the router send each of the following received packets: Packet 1 with a destination: 123.46.56.1 Packet 2 with a destination: 123.46.56.2 Packet 3 with a destination: 123.46.56.3 Packet 4 with a destination: 123.46.56.4
3. Suppose there is exactly one packet switch (or router) between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and the receiving host are R1 = 1Mbps and R2 = 2Mbps, respectively. Assuming that the switch uses store-and-forward packet switching, what is the total end-to-end delay to send a packet of length 18000bits? Assume that the propagation speed is 2 * 108 meters/sec, the distance between source...
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...
Consider the topology shown below with following requirements Three subnets A, B, C, should have enough addresses, starting from 192.100.10.0 to support 500 interfaces, 200 interfaces, and 100 interfaces, respectively. Each of subnets, D, E, and F has 32 interfaces. (not required for address assignment.) The IP addresses for three subnets should be assigned continuously, with spacing of power-2, that means, 250 will be rounded to 256, and so on. For each subnet, the assignment should take the form a.b.c.d/x...
1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24 none of the above Question 2 On which of the following devices does the transport layer NOT run? laptop router cellphone A, B and C none of the above Question 3 What is the source address contained in the discover message sent by a host that is wanting to obtain an IP address? 255.255.255.255 0.0.0.0 the IP address of the server the last IP...