Describe or propose a way to detect ARP spoofing attack. What could be a possible weakness in your proposed method? Please do not discuss any prevention method
. [16 points total, TCP/IP] Unlike IP fragmentation (which can be done by intermediate devices), IP reassembly can be done only at the final destination. What problems do you see if IP reassembly is attempted in intermediate devices like routers? [8 points] Answer: Let’s assume that Host A (receiver) receives a TCP segment from Host B (sender) with an out-of-order […]