I\'m in the linux shell for these tasks. I need help making sense of what I woul
ID: 3879537 • Letter: I
Question
I'm in the linux shell for these tasks. I need help making sense of what I would need to do to complete these tasks.
1. Each official standard in the Internet community is published as a Request For
Comment (or RFC). Other RFCs are published for informational purposes. Each RFC
is identified by a number. For example, a nice historical account of the early
days of the Internet is given in RFCs 1000 and 2235. A list of tools available
on the Internet is described in RFC 2151. Some RFCs are just plain silly, for
example RFCs 1149, 2324, and 2549. For this problem, use HTTP to obtain copies
of relevant RFCs, e.g. from http://www.ietf.org. (Hint: Unix/Linux "wget" or
"curl" combined with "grep" may come in handy to quickly search the RFCs. See
their man pages.)
(a) What message should be returned when a user tries to brew coffee with a
teapot? (Hint: This is covered in one of the April 1st RFCs.)
(b) In what year did the number of hosts on the Internet break the 1,000,000
mark?
(c) What is the typical Maximum Transmission Unit (MTU) of an avian carrier?
(d) Give an example of a situation where you might set the "evil" bit on a
packet, and a situation where you would not. (Hint: This is another April
1st RFC.)
2. The Internet Engineering Task Force (IETF) also hosts a list of Internet Drafts.
Look up the Internet draft concerning TCP Retransmission Timeout Considerations,
published 3/4/2011. What are the four guidelines that apply when using a
retransmission timeout (RTO)?
Explanation / Answer
a) the message returned is error:418 I`m a teapot
b) it happened in the year 1992
c) The value of MTU is variable and mostly increases as the age of the carrier increases.
d)evil bit was created by steve bellovin since the security devices like firewalls and intrusion detection system were not able to detect whether a packet is having malicious content or not. so whenever the packet is having some malicious content the evil bit should be set to 1 by the software or the attacker and if the packet is normal then the evil bit should not be set
2. Given below are the four guidelines:
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.