We have been working very hard since 2009 to facilitate in your learning Read More. We can't keep up without your support. Donate Now.

www.bit.ly/vucodes

+ Link For Assignments, GDBs & Online Quizzes Solution

www.bit.ly/papersvu

+ Link For Past Papers, Solved MCQs, Short Notes & More

Graded Discussion Board

Graded Discussion Board (GDB) of CS610 will be launched on Tuesday, August 18, 2020 and close on Wednesday, August 19, 2020 it will remain open for two days. You can post your comments on the below mentioned topic till Wednesday, August 19, 2020.

GDB Topic

ICMP handles error and control messages and are very useful especially when an error occurs in WAN. ICMP messages are encapsulated and sent within IP datagrams while specific hosts and routers use ICMP to send reports of problems about the datagrams. There are several different types of ICMP messages depending on what the ICMP message is reporting. However, malicious users have found a way to turn a good network into an attack through which attacker attempts to disrupt a target machine causing the target machine to become inaccessible to normal traffic.

(A) In your opinion which type of attack from the following can become the cause of inaccessibility of the target machine? Justify your answer with sold reason in maximum five lines.

1: Ping of Flood

2: Ping of Death

(B) ICMP can also be used to test different tools. In your opinion, which are the 2 most common tools that use ICMP for basic management and troubleshooting on a network?



Instructions:

Please read the following instructions carefully before submitting the GDB:

A concise, coherent and to the point comment is preferred over lengthy comment having irrelevant details. Your comment must not be more than 4-5 lines.
Comments posted on MDB or sent through email will NOT be considered in any case.
You must post your answer on the Graded Discussion Board (GDB).
For any queries, please email at cs610@vu.edu.pk


+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)

+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)

+ Click Here to Search (Looking For something at vustudents.ning.com?)

+ Click Here To Join (Our facebook study Group)


Views: 583

Replies to This Discussion

Please Discuss here about this GDB.Thanks

Our main purpose here discussion not just Solution

Students having same subject can start discussion here to solve assignment, GDB & Quiz and can clear their concepts until solution is provided. 

 

P.S:    Please always try to add the discussion in proper format title like “CS101 Assignment / GDB No 01 Solution & Discussion Due Date: ___________”

Then copy Questions from assignment file and paste in Discussion.

 

http://bit.ly/vucodes (For Assignments, GDBs & Online Quizzes Solution)

http://bit.ly/papersvu (For Past Papers, Solved MCQs, Short Notes & More)

Click Here to Search (Looking For something at vustudents.ning.com?)

Click Here to Join (Our facebook study Group)

According to my point of view the Ping of Death will cause of inaccessibility of the target machine. Because Ping of Death is a Denial of Service (DoS) attack in which no need of detailed knowledge of the machine intruder was attacking, except for its IP address. Ping of Death attacks were particularly effective because the attacker's identity could be easily spoofed. While in Ping of Flood attacker's need more bandwidth than victim and more knowledge about network.
(B) ICMP can also be used to test different tools. In your opinion, which are the 2 most common tools that use ICMP for basic management and troubleshooting on a network?
The ICMP used for the following most Common Test
1. TEST REACHABILITY (Specific Command Ping or Echo)
2. USING ICMP TEST TO TRACE A ROUTE (Specific Command Trace route or Tracert)

#CS610 Gdb Idea

CS610 GDB No. 1 Spring 2020 Due date 19-08-2020

GDB Topic

ICMP handles error and control messages and are very useful especially when an error occurs in WAN. ICMP messages are encapsulated and sent within IP datagrams while specific hosts and routers use ICMP to send reports of problems about the datagrams. There are several different types of ICMP messages depending on what the ICMP message is reporting. However, malicious users have found a way to turn a good network into an attack through which attacker attempts to disrupt a target machine causing the target machine to become inaccessible to normal traffic.



(A) In your opinion which type of attack from the following can become the cause of inaccessibility of the target machine? Justify your answer with sold reason in maximum five lines.

1: Ping of Flood

2: Ping of Death

(B) ICMP can also be used to test different tools. In your opinion, which are the 2 most common tools that use ICMP for basic management and troubleshooting on a network?



Instructions:

Please read the following instructions carefully before submitting the GDB:

A concise, coherent and to the point comment is preferred over lengthy comment having irrelevant details. Your comment must not be more than 4-5 lines.
Comments posted on MDB or sent through email will NOT be considered in any case.
You must post your answer on the Graded Discussion Board (GDB).
For any queries, please email at cs610@vu.edu.pk                

Solution :

 

 

#CS610 #GDB Idea from some one

According to my point of view the Ping of Death will cause of inaccessibility of the target machine. Because Ping of Death is a Denial of Service (DoS) attack in which no need of detailed knowledge of the machine intruder was attacking, except for its IP address. Ping of Death attacks were particularly effective because the attacker's identity could be easily spoofed. While in Ping of Flood attacker's need more bandwidth than victim and more knowledge about network.
(B) ICMP can also be used to test different tools. In your opinion, which are the 2 most common tools that use ICMP for basic management and troubleshooting on a network?
The ICMP used for the following most Common Test
1. TEST REACHABILITY (Specific Command Ping or Echo)
2. USING ICMP TEST TO TRACE A ROUTE (Specific Command Trace route or Tracert)

CS610 Computer Network GDB Solution & Discussion Spring 2020


CS610 GDB Solution idea:

 

Ping of Flood

A) An internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-request (ping). Normally, ICMP echo-request and echo-reply message are used to ping a network device in order to diagnose the health and connectivity of the device and the connection between the sender and the device. By flooding the target with request packets, the network is forced to respond with an equal number of reply packets. This causes the target to become inaccessible to normal traffic.

 

(B) Another useful troubleshooting technique using ping is to send ICMP echo request to the entire network by using the broadcasting address as the target host. The ping utility sends ICMP echo request packets to the target host or hosts. Once ICMP echo responses are received, the message target is alive, where target is the hostname of the device receiving the ICMP echo requests, is displayed.

The traceroute basic tool of ICMP that is useful when you perform network troubleshooting. You can quickly determine if the expected route is being taken when communicating or attempting to communicate with target network device. As with most network troubleshooting, it is useful to have a benchmark against which current traceroute output can be compared. The traceroute output can report network problems to other network troubleshooters.

CS610 GDB No. 1 Spring 2020 Due date 19-08-2020

GDB Topic

ICMP handles error and control messages and are very useful especially when an error occurs in WAN. ICMP messages are encapsulated and sent within IP datagrams while specific hosts and routers use ICMP to send reports of problems about the datagrams. There are several different types of ICMP messages depending on what the ICMP message is reporting. However, malicious users have found a way to turn a good network into an attack through which attacker attempts to disrupt a target machine causing the target machine to become inaccessible to normal traffic.



(A) In your opinion which type of attack from the following can become the cause of inaccessibility of the target machine? Justify your answer with sold reason in maximum five lines.

1: Ping of Flood

2: Ping of Death

(B) ICMP can also be used to test different tools. In your opinion, which are the 2 most common tools that use ICMP for basic management and troubleshooting on a network?



Instructions:

Please read the following instructions carefully before submitting the GDB:

A concise, coherent and to the point comment is preferred over lengthy comment having irrelevant details. Your comment must not be more than 4-5 lines.
Comments posted on MDB or sent through email will NOT be considered in any case.
You must post your answer on the Graded Discussion Board (GDB).
For any queries, please email at cs610@vu.edu.pk                

Solution :

 

 

#CS610 #GDB Idea from some one

According to my point of view the Ping of Death will cause of inaccessibility of the target machine. Because Ping of Death is a Denial of Service (DoS) attack in which no need of detailed knowledge of the machine intruder was attacking, except for its IP address. Ping of Death attacks were particularly effective because the attacker's identity could be easily spoofed. While in Ping of Flood attacker's need more bandwidth than victim and more knowledge about network.
(B) ICMP can also be used to test different tools. In your opinion, which are the 2 most common tools that use ICMP for basic management and troubleshooting on a network?
The ICMP used for the following most Common Test
1. TEST REACHABILITY (Specific Command Ping or Echo)
2. USING ICMP TEST TO TRACE A ROUTE (Specific Command Trace route or Tracert)

RSS

Looking For Something? Search Here

HELP SUPPORT

This is a member-supported website. Your contribution is greatly appreciated!

© 2020   Created by +M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service

.