ch13 Sol
ch13 Sol
ch13 Sol
3. (a)The arp query on the local host of NMS would contain the router IP-MAC
address. The router could also be discovered by doing traceroute, and
identifying the gateway out of the subnetwork.
(b)
arp -a
noc3.btc.gatech.edu (199.77.147.143) at 00:60:97:DD:F4:D4 [ether] on eth0
cicada.btc.gatech.edu (199.77.147.28) at 00:60:4E:00:56:FE [ether] on eth0
main-rtr.gcatt.gatech.edu (199.77.147.1) at 00:60:3E:C0:24:40 [ether] on eth0
noc4.btc.gatech.edu (199.77.147.144) at 00:A0:24:48:86:81 [ether] on eth0
noc6.btc.gatech.edu (199.77.147.183) at * PERM PUP on eth0
The router is 199.77.147.1 (the last decimal also gives it as router due to
convention).
traceroute netman.cc.gatech.edu
traceroute to netman.cc.gatech.edu (130.207.8.31), 30 hops max, 40 byte
packets
1 main-rtr.gcatt.gatech.edu (199.77.147.1) 1.244 ms 1.463 ms 1.057 ms
2 130.207.251.2 (130.207.251.2) 2.487 ms 1.836 ms 1.623 ms
3 netman.cc.gatech.edu (130.207.8.31) 2.346 ms * 1.982 ms
4. There are many alternative approaches to this problem, one of which is given
here.
1. Execute broadcast ping or hosts to discover the hosts in the local subnet.
13-1
2. Execute arp to discover the router.
3. Execute route to discover the addresses in the routing table.
4. Identify the new hosts and routers and keep increasing the scope one
additional hop at a time.
6. Make sure that the location field is filled in the MIB System group has location
filled. It is a good practice.
When there is a failure, immediately identify the arp table in the switched hub
which will identify the address to port that would contain the port of the failed
host.
If the trouble is tracked after sometime, you can use Interfaces MIB on the
hubs to trace the failed port.
10. (a) The reason for having a high and low threshold is to provide a hysteresis
in generating the alarm. Thus, if the alarm is generated while crossing the
high end in the upward direction, it will not be generated until it crosses the
lower threshold at least once before crossing upper threshold again. For
sustained alarm, the alarm could be turned on while crossing the high
threshold in the upward direction and off when crossing the low threshold in
the downward direction.
(b)For the particular interface, define the values in the RMON Alarm table
alarmInterval = 1
alarmVariable = etherStatsCollisions
alarmSampleType = 2
13-2
alarmStartupAlarm = 3
alarmRisingThreshold = 120000
alarmFallingThreshold = 100000
alarmRisingEventIndex = 1
alarmFallingEventIndex = 2
12. Report
13. TBD
14. TBD
15. Report
16. Report
17. TBD
18. TBD
21. (a) If Ian sends you an email, you can authenticate his signature. You can
also send him email.
(b) In most cases, yes. This lets anybody send you a private mail. The
unsecure email is like a postcard, whereas secure email is like receiving a
mail in an envelope.
13-3
23. Ian would encrypt the message once per message using the Data Encryption
Key (DEK) for each message. He may also use it for signed representations
in the asymmetric key management communication.
He encrypts the DEK using shared secret key and send the message to Rita.
He encrypts the DEK using public key and sends the message to Ted.
24. In PGP, the encryption is done using a public key and signature is generated
using a private key. Hence, Ian generates the signature once per message
and encrypts the message twice with the public keys of Rita and Ted to send
it to Rita and Ted respectively.
13-4