...NT1210 MAC and IP Addresses Exercise 5.2.1 Why must a MAC address be unique for every NIC produced? What effect will it have on the network if two devices from two different manufacturers share the last 24 bits of their MAC addresses? Explain your answer. Use your textbook and the Internet to research your answer. Think of it as your address or phone at your home it has to be unique. Has to be unique so the entire world can see it. So the network traffic couldn’t find its way to the right PC. Exercise 5.2.2 What information about the network connection is given on the Support tab of the status window? Gives you the IP address, Subnet Mask and default gateway. Exercise 5.2.3 What is the physical address (the MAC address) of the NIC (or network adapter) for this connection? Physical Address: 00-1E-65-DC-C4-DA. Exercise 5.2.4 You can determine the manufacturer of your NIC using the first six characters of your MAC address. To do this, you must search the IEEE records database for the unique OUI. You can access the IEEE database at this address: http://standards.ieee.org/develop/regauth/oui/public.html. On this page, you should locate the search box and enter the first three bytes of your MAC address separated by hyphens (such as “00-0C-44”), and then click the Search button. Who is the manufacturer for your NIC? What information is given about the manufacturer? You can see an example record returned from this site in Figure 5-5. MAC Address/OUI Vendor {Company}...
Words: 725 - Pages: 3
...Anatomy of an ARP Poisoning Attack by Corey Nachreiner, WatchGuard Network Security Analyst Hackers lie. Skillful hackers lie well. And well-rounded hackers can lie both to people and to machines. Lying to people, known as "social engineering," involves tactics (detailed at length by convicted hacker Kevin Mitnick) such as posing as a company's employee so the company's real employees will blab secrets freely. Lying to machines involves lots of different techniques, and a commonly used one -- ARP Cache Poisoning -- is the focus of this article. ARP poisoning enables local hackers to cause general networking mayhem. Because it's mostly "incurable," every administrator should be aware of how this attack works. ARP Refresher In Foundations: What Are NIC, MAC, and ARP?, we explained that Address Resolution Protocol (ARP) is how network devices associate MAC addresses with IP Addresses so that devices on the local network can find each other. ARP is basically a form of networking roll call. ARP, a very simple protocol, consists of merely four basic message types: 1. An ARP Request. Computer A asks the network, "Who has this IP address?" 2. An ARP Reply. Computer B tells Computer A, "I have that IP. My MAC address is [whatever it is]." 3. A Reverse ARP Request (RARP). Same concept as ARP Request, but Computer A asks, "Who has this MAC address?" 4. A RARP Reply. Computer B tells Computer A, "I have that MAC. My IP address is [whatever it is]" All network devices...
Words: 1643 - Pages: 7
...important knowledge required to uphold the successful results to be on-going. (WORD COUNT: 202) Background: A 4 day food observation was completed prior to the commencement of the 2 week ARP and showed that the family averages were 62% green foods, 25% amber foods and 13% red foods. The findings of primary data correlate with secondary data as recommend by the Smart Choices Policy that implies that the average person is recommended to eat 80% Green, 15% Amber and 5% Red. This shows that the family averages did not meet the recommended standard of the Smart Choices Policy. However, a pre-test was also conducted to determine the family member’s education prior to the 2 week ARP; this highlighted a lack of knowledge in relation to questions that are relevant to serving sizes. The family average was 71.5% with the highest score at 86% and the lowest 57%. This shows that the knowledge of nutritional information prior to the 2 week ARP...
Words: 921 - Pages: 4
...IPv6 Address Type - Multicast Overview: As part of your assigned readings and material covered in class lecture, you have learned about IPv6 address types, including unicast and multicast addresses. For this assignment, you will expand your knowledge of the use of multicast addresses compared to the use of broadcast addresses in IPv4. Required Resources: Textbook and lecture notes Internet access Research Resources: • IPv6 multicast address – overview o http://www.tcpipguide.com/free/t_IPv6MulticastandAnycastAddressing.htm • IPv6 subnet scanning RFC o http://www.ietf.org/rfc/rfc5157.txt Deliverables Perform additional research to understand the use of multicast addresses in IPv6 protocol compared to IPv4 broadcast addresses with emphasis on: o Neighbor discovery o All nodes address o All routers address Describe the process of neighbor discovery including the use the all nodes address for achieving the same result as the IPv4 ARP protocol. Include the IPv6 multicast address for all routers and all hosts. Perform research to determine: o Are you able to perform subnet “scanning” by simple sending an ICMP echo packet to the “all hosts” multicast address? Similar to the concept of sending an ICMP echo packet to the broadcast address on an IPv4 subnet. o Provide an estimate of how long it would take to scan, through a tool similar to NMAP, an entire /64 IPv6 subnet to find every possible host, not using the multicast “all host” address. Use...
Words: 883 - Pages: 4
...Individual Project #1 James E. Rose Jr. American Continental University Part I: Instructed to open a Command Prompt (MS-DOS Prompt) window, and complete the following activities: It explains the arp command is used to display and modify the IP-to-Physical address translation. It also displays the different functions of the arp command from displaying arp current entries by interrogating the current protocol data to deleting the host specified by inet_addr. From my research of arp prompt is used to hover the shadows of most networks. And it defines the exchanges between network interfaces connected to an Ethernet media segment in order to map an IP address to a link layer address on demand(Linux, 2011). Next, I am to ping www.aiuonline.com here are the results: Now I will ping www.mazda.co.jp and here are the results: The first time I ping the aiuonline website I made a mistake so now I will ping it again with better results: Now I will ping both websites again to check their times and compare the times: From what I am viewing on the command prompt screen the times are different from one another from the mazda web address there was a 25% loss compared to aiuonline website there was no loss. The Aiuonline website was faster in milliseconds then the mazda website. Now I will ping the www.tourism.sa.gov.au website: As you can see it is still in request timeout, so that means it is still a very busy website. I will now use the tracert www...
Words: 999 - Pages: 4
...has managed to acquire a good enough dress and the pearls she wears. The sees the necklace as a necessity to prove her own value. She must wear something of great value to be of great value herself. She does not see that her popularity is because of her beauty and charm, things that are inherent to her and that she has not made use of because she believes she cannot dress as well as she should: She dressed plainly because she could not dress well, but she was as unhappy as though she had really fallen c=6&stab=512&ai=59015&ste=16&docNum=H1420005411&bConts=16047&tab=2&vrsn=3&ca=1&tbst=arp&ST=maupassant%2C+guy+de&srchtp=athr&n=10&locID=longbeach&OP=contains. Pierce, Jason. "An overview of 'The Necklace.'" Exploring Short Stories Detroit: Gale Research, 1998: http://galenet.galegroup.com/servlet/LitRC?c=13&stab=512&ai=59015&ste=16&docNum=H1420005948&bConts=16047&tab=2&vrsn=3&ca=1&tbst=arp&ST=maupassant%2C+guy+de&srchtp=athr&n=10&locID=longbeach&OP=contains. Sosnoff, Martin. "False Values." Forbes 157(11)(3 jUNE 1996), 180. Steegmuller, Francis. Maupassant: A Lion in the Path. New York: Random House,...
Words: 277 - Pages: 2
...A SEMINAR REPORT ON | PACKET SNIFFER | SUBMITTED BY SUBMITTED ONKUNAL GOPAL THAKUR MAY 14,2010VISHAL SHIRGUPPIJUSTIN FRANCISSHAZIA ALIUNDER THE GUIDANCE OF MR. SUNIL SURVEFR. CONCEICAO RODRIGUES COLLEGE OF ENGINEERINGBANDRA(W)MUMBAI – 400 050 | CERTIFICATE This is to certify that, Mr. KUNAL GOPAL THAKUR , Mr. VISHAL SHIRGUPPI ,Mr. JUSTIN FRANCIS and Ms. SHAZIA ALI have completed their project on PACKET SNIFFER satisfactorily in partial fulfillment under the department of Computer Engineering during academic year 2009-2010. ____________________________ Teacher In-Charge ACKNOWLEDGEMENT We would like to express our sincere thanks and gratitude to our guide Mr. Sunil Surve for his valuable guidance and suggestions. We are highly indebted to him for providing us an excellent opportunity to learn and present our studies in the form of this seminar report. We take this opportunity to thank the members of the teaching and non-teaching staff of Fr.CRCE for the timely help extended by them. Lastly thanking our parents, for their morale support and encouragement. Kunal Gopal Thakur Vishal Shirguppi Justin Francis Shazia Ali ABSTRACT: Packet sniffing is a technique of monitoring every packet that crosses the network. A packet sniffer is a piece of software or hardware...
Words: 3356 - Pages: 14
...VGST grants and awards for the following VGST programmes for the financial year 2013-14 Establishment of Centers of Excellence in Science, Engineering and Medicine (CESEM) Establishment of Centers of Innovative Science Engineering and Education (CISEE) Karnataka Fund for Improvement of Science and Technology Infrastructure (K-FIST) in Higher Educational Institutions Seed Money to Young Scientists for Research (SMYSR) Awards for Research Publications (ARP) Awards for Science Teachers and Science Communicators (AST&SC) ______________________________________________________________________ 1 2 3 4 5 6 OBJECTIVES: PROPOSAL CISEE/ of VGST for programmes CESEM, VGST grants for CISEE, CESEM/ Annexure-1 Annexure-2 (Part –A, B, C & D) Annexure-3 (Part –A & B) APPLICATION AST&SC Guidelines Terms & Conditions to utilize VGST grant (GTC) List of 114 Backward Talukas (as per Prof. D. M. Nanjundappa Committee Report) under the Special Development Programmed (SDP) of GoK. K-FIST, SMYSR, ARP & ASTSC FORMAT: K-FIST/ SMYSR programmes APPLICATION FORMAT: for VGST award scheme ARP FORMAT: for VGST award schemes Annexure-4 (Part –A & B) Annexure-5 Annexure-6 7 Note: SDP Allocation Details Annexure-7 ______________________________________________________________________ 1. Paper Advertisement date : 23-06-2013 2. Last date to receive proposals : 31-07-2013 3. Submit Proposals and applications to Dr. S. Ananth Raj, Consultant, Vision Group on Science & Technology, Dept. of IT, BT and...
Words: 4506 - Pages: 19
...Lovely professional university term paper topic-system engineerring roles in software enginerring cap 590 rollno.46 section-1101 reg no-11001009 submitted to-pawan sir submitted by-jaspreet singh TABLE OF CONTENTS Introduction to tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one...
Words: 2390 - Pages: 10
...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. SSL Man-in-the-Middle Attacks TCP/IP protocols have long been subject to man-in-the-middle (MITM) attacks, but the advent of SSL/TLS was supposed to mitigate that risk for web transactions by providing endpoint authentication and encryption. The advent of Dug Song's 'webmitm' in late 2000 demonstrated the feasibility of mounting an MITM attack on the protocol, but a properlyconfigured client SSL implementation would warn the user about problems with the server certificate. This paper examines the mechanics of the SSL protocol attack, then focuses o... Copyright SANS Institute Author Retains Full Rights AD SSL Man-in-the-Middle Attacks Peter Burkholder February 1, 2002 (v2.0) Abstract TCP/IP protocols have long been subject to man-in-the-middle (MITM) attacks, but the advent of SSL/TLS was supposed to mitigate that risk for web transactions by providing endpoint authentication and encryption. The advent of Dug Song's 'webmitm' in late 2000 demonstrated the feasibility of mounting an MITM attack on the protocol, but a properlyKey fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 configured client SSL implementation would warn the user about problems with the server certificate. This paper examines the mechanics of the SSL protocol attack, then focusses...
Words: 6154 - Pages: 25
...Abstract This paper discusses couples in midlife marriage that are transitioning to the empty nest. We identify the social aspects of the marriage relationship and the midlife issues most couples face. We look at those that grieve and those that rejoice, when their nest empties, as well as the characteristics of those prone to depression during this major life event. The biological, psychological and spiritual adjustments that take place are analyzed as well as the varied reactions that parents feel during this time of loss in their lives. Lastly, we discuss the role that the Christian counselor plays and celebrate with those couples who have newfound freedom and have reconnected as a result of their nest empting. Empty Nest: Catastrophe or Transition Midlife marriage is a comfortable and rewarding time to experience. Most couples have successfully matured and built a great life together. They have a lot to be thankful for and are proud of the family they’ve raised. One of the major adjustments that occur during this time is when the children they’ve raised reach maturity and leave home. This marks a new beginning for parents known as the empty nest. In the 70s, sociologists popularized the term ‘empty-nest syndrome” to identify parents, especially mothers who experienced depression and loss of purpose and identity when their children left the nest (Clay, 2003). Although women are mentioned as suffering the most when the nest empties...
Words: 2445 - Pages: 10
...Nilson Carroll ART 353 Research Paper The Dada Text In July 1916, as the Great War raged across Europe, Hugo Ball read aloud the first Dada manifesto at the Cabaret Voltaire (Ades, Caberet 16). In typical Dada hyperbole, the manifesto made wild claims about the power of the word Dada and how it indicated a new tendency in art and literature. The manifesto, and the many that were written after it, identified and combated what the Dadaists saw as the bourgeois corruption that had caused the war and diluted art into something worthless. Through written manifestos, Dada poetry and collage, wild forms of theater and new ideas on visual art, Dada found a common voice among several different groups of artists from across Europe and in New York. Today, Dada is understood as an art movement, chronologically somewhere in between Futurism and Surrealism. Yet, Dada cannot be understood simply as a visual art movement, but instead as a literary movement. Rather than through painting or sculpture, Dada is best understood through the text, manifestos, poetry, and magazines produced by the Dadaists. Dada visual art by artists like Francis Picabia, Marcel Duchamp, or Hans Arp do not rely on traditional formal elements of art, but rather on the titles of the works. Dadaists have more in common with their contemporary, poet Guillaume Apollinaire, than with any painter, and they are more concerned with Symbolist poets Arthur Rimbaud and Comte de Lautréamont than with modern painters Édouard Manet...
Words: 2082 - Pages: 9
...Claudia Goodman IT302 Homework 2 Security-Enhanced Linux The NSA has long been involved with the computer security research community in investigating a wide range of computer security topics including operating system security. It recognizes the critical role of operating system security mechanisms in supporting security at higher levels. End systems must be able to enforce confidentiality and integrity requirements to provide system security. Unfortunately, existing mainstream operating systems lack the critical security feature required for enforcing separation: mandatory access control. Application security mechanisms are vulnerable to tampering and bypass, and malicious or flawed applications can easily cause failures in system security. The results of several of these projects in this area have yielded a strong, flexible mandatory access control architecture called Flask. This has been mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel. This provides a mechanism to enforce the separation of information based on confidentiality and integrity requirements and it allows threats of tampering and bypassing of application security mechanisms to be addressed while enabling the confinement of damage that can be caused by malicious or flawed applications. This is simply an example of how mandatory access controls that can confine the actions of any process, including an...
Words: 1522 - Pages: 7
...From an accounting view point, there are many guidelines that need to be followed for companies or universities with these plans. The GASB has proposed changes recently that will affect the pension liability on the financial statements of universities and other non-profits. I have looked at the financial statements of the Ohio State University. The Ohio State University has two basic retirement plans available to their employees. The most popular plan is “covered by the Public Employees System of Ohio (OPERS)”. Their second plan is one in which the employee can “participate in” an “Alternative Retirement Plan (ARP)”. The major difference between the two is the OPERS is a defined benefit plan which includes contributions made by the employee, contribution matches made by the university and also other fringe benefits offered to their members. The ARP is a defined contribution plan that only includes contributions made by the employee and contribution matches made by the university. GASB has provided guidelines for Statement No. 67 and Statement No. 68 which make universities and non-profits account for future obligations that they have on their current financial statements. Most university employees receive “two types of compensation”; regular salary and a deferred salary that is based on the employee’s level and years of service. Previously universities did not have to record the deferred salary portion on their financial statements; they now have to do so...
Words: 1113 - Pages: 5
...School of Computing and Mathematics Faculty of BCL Request for Ethical Approval for Individual Study / Programme of Research by University Students Students conducting PG Independent Scholarship (PG IS), UG Applied Research Project (UG ARP), UG Maths Projects (UG MP) or Learning-through-Work (LTW) projects must complete this form and submit to their project supervisors for approval. After initial approval, project supervisors need to submit these forms to PG IS, UG ARP, UG MP or LTW coordinator who would then submit these to the Chair of the Computing Ethics Committee (CREC) for further consideration. Students conducting PG Research projects (eg MPhil, PhD etc) must also complete this form and submit to their research supervisors for approval who would then submit these to the Chair of the CREC for further consideration. Feedback on your application will be via the Project/Research Supervisor. 1. Your Name: | | 2a. Programme name and code: BSc (Hons) Information Technology (G502)2b. Your student ID: | 3. Contact Info | Email: Tel No. Address: | 4. Module name and code | Applied Research Project | 5. Name of project/research supervisor: | 6. Title or topic area of proposed study: Assessing the benefits and fears of Cloud computing for the Small and Medium Enterprises | | 7. What is the aim and objectives of your study? | The aimThe aim of this study will be to perform an assessment of the extent of benefits...
Words: 3493 - Pages: 14