SHARE

The Tradition of Sharing

Help your friends and juniors by posting answers to the questions that you know. Also post questions that are not available.


To start with, Sr2Jr’s first step is to reduce the expenses related to education. To achieve this goal Sr2Jr organized the textbook’s question and answers. Sr2Jr is community based and need your support to fill the question and answers. The question and answers posted will be available free of cost to all.

Computer Networking : A Top-Down Approach

Computer Networking : A Top-down Approach

Authors: James F. Kurose, Keith W. Ross Chapter: Computer Networks And The Internet
ISBN: 9780132856201 Exercise: Review
Edition: 6 Question: 28

 

Question

Suppose Alice and Bob are sending packets to each other over a computer network. Suppose Trudy positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice. List some of the malicious things Trudy can do from this position.

Answer

Consider the given data:

  • Alice and Bob are sending packets to each other over a computer network.
  • Trudy positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob

The following steps to list some of the malicious things Trudy can do from this position:

  • She can observe the contents of all the packet and possiblity to modify content of packets and sent appropriate receiver.
  • Trudy is chance to drop the packets from Alice to Bob or from Bob to Alice.
0 0

Discussions

Post the discussion to improve the above solution.