What advantage(s) and disadvantage(s) does port-mapped NAT have when compared with regular NAT or multi-address NAT

What advantage(s) and disadvantage(s) does port-mapped NAT have when compared with regular NAT or multi-address NAT? How does a client that has sent a DHCP request recover when the reply is lost in transit? Why are security extensions being developed and applied to the DNS system? Also, what limitations do the current security features have?. Explain each of the following security conceptsa. Data Integrityb. Data Availabilityc. Confidentialityd. Authorizatione. Authenticationf. Replay Avoidance Why cant the contents of datagrams traveling across the Internet be trusted? Consider figure 30.6 with the following scenario and question. An IP datagram (containing a TCP SYN segment) with source 128.5.255.255:1025 and destination 128.5.1.1:80 arrives on interface 2 of router R. Why would the administrator of this router (which has a firewall built in) want to block this type of traffic and what rule could be added to the table in figure 30.6 to do this effectively? What problem were stateful firewalls developed to solve?.

Still stressed from student homework?
Get quality assistance from academic writers!