CMPT 471 SAMPLE FINAL EXAMINATION PART 1: SHORT ANSWER PROBLEMS (35 of 100 points) 1) [5 points] Consider host A’s routing table, shown below. Entry number (for reference) network gateway Netmask Interface 1 196.168.1.0 196.168.0.2 255.255.255.128 eth1 2 196.168.0.0 * 255.255.255.0 eth1 3 172.17.0.0 172.32.0.3 255.255.0.0 eth2 4 172.18.0.0 * 255.255.0.0 eth3 5 172.32.0.0 * 255.248.0.0 eth2 Consider packets with destination addresses 172.17.55.92, 172.51.1.253 and 196.168.1.132. For each address indicate which row in the routing table is used to forward the packet, which interface the packet will be forwarded through, and the IP address of the host the packet will be sent to in the Ethernet layer. 2) Consider the small IPv6 network illustrated below. Assume the IPv6 global address or addresses of each of the hosts on this network are allocated using auto-configuration. Host A is an IPv6 router. Host A advertises prefixes 2000:45a:bbb:1::/64 and fdd0:44:ee:100::/64 in the router advertisements it periodically sends to the hosts on the illustrated network. Auto configuration assigns host B a global address fdd0:44:ee:100:21b:2cff:fe3d:4e5f. a) [1 point] Can an IPv6 host have more than one global address? b) [4 points] If an IPv6 host can have one global address what would the auto configured global address of host K be? If an IPv6 host can have more than one global address what global addresses would the auto configured host K have? c) [4 points] Give a step by step explanation of how you determined one global address. Indicate what data you used to derive the address and how you used that data. Ethernet addresses of each host are shown 00:1b:2c:3d:4e:5f 00:1c:2c:aa:bb:cc B C 00:1d:2d:dd:ee:ff D A E 00:1f:22:33:44:5f K 00:1e:2d:34:cf:5a H 00:1d:00:3a:4b:5c 3) [6 points] You are logged on to host A. Host A is using DNS to determine the correspondence between domain names and IP addresses. Host A is not a DNS server. Host A and DNS servers it queries are all located in domain summer.edu.. We wish to find the IP address of host B. The fully qualified domain name of host B is NAME1.a3.summer.edu.. You use a resolver on host A to make a query for the unqualified domain name NAME1. • The resolver sends a query for NAME1.a1.summer.edu. to the DNS server at 128.46.11.1. No response is received. • Then the resolver sends query for NAME1.a1.summer.edu. to the DNS server at 128.46.134.2. A response indicating that there is no such host is received from the DNS server. • Then the resolver sends a query for NAME1.a2.summer.edu. to the DNS server at 128.46.11.1. A response indicating that there is no such host is received from the DNS server. • Finally, the resolver sends a query for NAME1.a3.summer.edu. to the DNS server at 128.46.11.1 and receives a response containing the desired IP address. What are the contents of the /etc/resolv.conf file on host A? 4) Consider the ASs illustrated below. The communication between ASs uses BGP. If a route to AS6 used by AS2 has the form PATH: sequence AS4, AS6 reaches 224.5.0.0/17 224.4.16.0/20 Then a) [1 points] What would be the simplest (not aggregated) route used by AS2 to reach AS7? b) [2 points] Assume that AS2 advertises the route in a) to AS1. What would be the route used by AS1 to reach AS7? c) [4 points] AS1 wants to reduce the number of routes in its database. AS1 decides that the routes to AS5, AS6 and AS7 could be aggregated into a single route. What would that single route be? AS3 225.5.0.0/17 AS1 AS2 225.0.0.0/15 AS5 224.4.64.0/19 AS4 ASx 224.5.0.0/17 AS6 224.4.16.0/20 AS7 224.4.32.0/20 224.5.128.0/18 5) [8 points] Consider the autonomous system shown below. A 1 B 2 F 4 1 C 2 1 N J 3 2 1 3 1 G K 2 O 2 3 2 3 1 3 1 2 2 2 1 M I 1 2 1 1 E 3 4 2 1 D 1 2 1 H L P 3 2 Each of the capitalized letters is the name of a router in the AS. Each number indicated the interface number (eth#) for each interface on each router. Each router has one or more local networks connected to it (local networks are connected to only one router). The routers in this network are all running a dense mode multicasting protocol (DVMRP or PIM DM) that is based on reverse path multicasting. You may assume that all connections between pairs of routers have equal cost and the unicast routing protocol is determining the best routes from each router in the AS to router B based on minimizing the number of hops. State your assumption about how to choose a path if two paths with the same number of hops are available. Assume that truncated reverse path forwarding (no pruning) is being used. Router B is sending a multicast packet to all members of group 224.1.2.3. Every router has at least one local network attached. Local networks on routers P, G, and D include no members of the multicast group 224.1.2.3; all other routers have members of the multicast group 224.1.2.3 within their local networks. Based on the diagram above draw the truncated reverse path forwarding tree (showing only the routers that the multicast packets have reached) after a) the multicast packet sent by router B is received by all routers 1 hop distant from router B b) the copies of the multicast packets sent by the routers that received multicast packets in i) have been received by all routers 2 hops distant from router B c) The copies of the multicast packets sent by the routers that received multicast packets in ii) have been received by all routers 3 hops distant from router B. 6) [5 points BONUS PROBLEM] List four approaches to proxying. Give a 2-3 sentence explanation of each of these four approaches. PART 2: PROBLEMS (65 of 100 marks) 7) Answer the following questions about network security a) [8 points] Give step by step explanations of how public key / private key pairs are used for encryption? For authentication? b) [4 points] Consider using the tunnel mode of the ESP protocol to authenticate and encrypt a packet. Give a step by step description of the steps you would need to take to transform a regular IP packet to an encrypted and authenticated packet consistent with the tunnel mode of the ESP protocol. Use only ESP protocol, do not use AH protocol. c) [5 points] Draw a well annotated diagram to illustrate a screened network firewall architecture. What are two of the purposes of having one or more bastion hosts in a screened network architecture? d) [2 points] What is the purpose of encryption? What is one purpose of authentication 8) A series of packets captured when a TCP connection was made. The connection was made to a passive server socket. The packets, as captured by tcpdump, are shown below. Each packet is labeled with a capital letter to use to refer to that packet in your answers. Based on the packets below and the TCP state machine also shown below answer the following questions. a) [3 points] Could any of the packets in the TCP dump below be fragmented if they reached a b) [12 points] Draw a partial TCP state machine showing only the states that are passed through when the captured packets below are transferred. Make sure to indicate (on your partial state machine diagram), using the labels added to the tcpdump output (A-H), which packet in the tcpdump corresponds to each packet that is received or sent to initiate a transition. You are provided with a copy of the full state machine for reference. A: 11:48:52.913278 IP (tos 0x0, ttl 64, id 32738, offset 0, flags [DF], proto 6, length: 60) july.1106 > july.20015: S [tcp sum ok] 3249991378:3249991378(0) win 1840 <mss 460,sackOK,timestamp 421826864 0,nop,wscale 2> B 11:48:52.913407 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 6, length: 60) july.20015 > july.1106: S [tcp sum ok] 3250876723:3250876723(0) ack 3249991379 win 1792 <mss 460,sackOK,timestamp 421826864 421826864,nop,wscale 2> C 11:48:52.913505 IP (tos 0x0, ttl 64, id 32740, offset 0, flags [DF], proto 6, length: 52) july.1106 > july.20015: . [tcp sum ok] ack 1 win 460 <nop,nop,timestamp 421826864 421826864> D 11:48:52.913821 IP (tos 0x0, ttl 64, id 32742, offset 0, flags [DF], proto 6, length: 500) july.1106 > july.20015: . 1:449(448) ack 1 win 460 <nop,nop,timestamp 421826865 421826864> E 11:48:52.931285 IP (tos 0x0, ttl 64, id 57364, offset 0, flags [DF], proto 6, length: 500) july.20015 > july.1106: . 1:449(448) ack 449 win 2016 <nop,nop,timestamp 421826882 421826865> F 11:48:53.032371 IP (tos 0x0, ttl 64, id 32788, offset 0, flags [DF], proto 6, length: 52) july.1106 > july.20015: F [tcp sum ok] 4502:4502(0) ack 4502 win 2700 <nop,nop,timestamp 421826983 421826973> G 11:48:53.033676 IP (tos 0x0, ttl 64, id 57392, offset 0, flags [DF], proto 6, length: 52) july.20015 > july.1106: F [tcp sum ok] 4502:4502(0) ack 4503 win 2464 <nop,nop,timestamp 421826984 421826983> H 11:48:53.033763 IP (tos 0x0, ttl 64, id 32790, offset 0, flags [DF], proto 6, length: 52) july.1106 > july.20015: . [tcp sum ok] ack 4503 win 2700 <nop,nop,timestamp 421826985 421826984> 9) Consider routing packets within an AS between many ASs. a) [4 points] Name 1 interior routing protocol based on the link state approach. Name 1 interior routing protocol based on the distance vector approach. Name 1 exterior routing protocol. What are interior routing protocols and an exterior routing protocols used for? Is the exterior routing protocol you named based on the distance vector approach? Is the exterior routing protocol you named based on the link state approach? b) [6 points] Give a step by step procedure explaining how two routers who have just established a adjacency relationship synchronize their OSPF databases. c) [2 points] Describe what information would be in a summary LSA sent from R3 to the other routers in the backbone region. Give a 2-3 sentence general description of the contents of a summary LSA. d) [4 points] Give a step by step explanation of the process for electing backup designated router and the designated router. Consider only the case when all the routers on the local network segment are being restarted at the same time. You may assume there is no nominated (current) designated router or backup designated router in any of the hello packets being sent by any of the routers on the local network segment. You may assume that all the routers on the local network segment have already become OSPF neighbors. YOU MUST ANSWER ONE OF THE FOLLOWING TWO PROBLEMS IF YOU ANSWER BOTH PROBLEMS ONLY THE FIRST ANSWER TO APPEAR IN YOUR EXAMINATION BOOKLET WILL BE CONSIDERED 10) [15 points] Consider the following fragment of sample code from a TCP echo server. Explain step by step the execution of the parent server. Explain step by step the execution of the child server. Steps should explain the purpose of each line (or group of lines) of code. 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 0025 } for ( ; ; ) { /* tcpsd is the descriptor of the listening socket */ connfd = accept(tcpsd, (struct sockaddr *)&cad, &len); if( (fork()) == 0) { close(tcpsd); for( ; ; ) { if( nread = read(connfd, echobuf, LENBUF ) < 0) { fprintf(stderr, "error reading from TCP socket"); } else if (nread > 0 ) { tcpcharcntin += nread; nwrite = write(connfd, echobuf, nread); tcpcharcntout += nwrite; } else { break; } close(connfd); exit(1); } } close(connfd); 11) [15 points] Router X is a DVMRP multicast router. X is part of a broadcast network A. Network A presently has members in multicast groups group1 and group2. How does router X determine if any hosts on network A wish to remain members of group1 or group2? When and how often does router X determine if any hosts on network A wish to remain members of group1 or group2? a) Answer assuming router X is running IGMPv2 b) Answer assuming router X is running MLDv2
© Copyright 2024