Network

1) HIDS vs NIDS 

HIDS is host intrusion detection system - placed on each host
NIDS is network intrusion detection system - placed in the network
Both the systems work on the similar lines. It’s just that the placement in different. 
For an enterprise, NIDS is preferred as HIDS is difficult to manage, plus it consumes processing power of the host as well.

2) How does tracert/traceroute work? What protocol does it use?
In case you can’t ping the final destination, tracert will help to identify where the connection stops or gets broken, whether it is 
firewall, ISP, router etc.
It actually keeps sending packets to the final destination; the only change is the TTL that’s used. The extra credit is the fact that 
Windows uses ICMP by default while Linux uses UDP

The Time To Live (TTL) field in an IP header was intended to hold the number of seconds for which the IP packet is valid, after which 
it can be dropped. In practice, it is used as a decrementing hop count, whereby every router that forwards the packet reduces the TTL 
value by one.

IP Packet Headers: Source, Destination, TimetoLive (TTL)
When TTL=0, router sends a message says "I dropped the packets"

Addresses

Hosts

Netmask

Amount of a Class C

/ 30

4

2

255.255.255.252

1 / 64

/ 29

8

6

255.255.255.248

1 / 32

/ 28

16

14

255.255.255.240

1 / 16

/ 27

32

30

255.255.255.224

1 / 8

/ 26

64

62

255.255.255.192

1 / 4

/ 25

128

126

255.255.255.128

1 / 2

/ 24

256

254

255.255.255.0

1

/ 23

512

510

255.255.254.0

2

/ 22

1024

1022

255.255.252.0

4

/ 21

2048

2046

255.255.248.0

8

/ 20

4096

4094

255.255.240.0

16

/ 19

8192

8190

255.255.224.0

32

/ 18

16384

16382

255.255.192.0

64

/ 17

32768

32766

255.255.128.0

128

/ 16

65536

65534

255.255.0.0

256

Last updated

Was this helpful?