First Semester Examinations 2011/12 INTERNET PRINCIPLES



Similar documents
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Chapter 10. Network Security

Networking Test 4 Study Guide

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

Final for ECE374 05/06/13 Solution!!

Based on Computer Networking, 4 th Edition by Kurose and Ross

Candidates should attempt FOUR questions. All questions carry 25 marks.

Transport and Network Layer

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

EXAM questions for the course TTM Information Security May Part 1

CS 758: Cryptography / Network Security

Chapter 5. Data Communication And Internet Technology

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Computer Networks - CS132/EECS148 - Spring

Chapter 7: Network security

SECURITY IN NETWORKS

Overview of Computer Networks

Ethernet. Ethernet. Network Devices

Chapter 6 CDMA/802.11i

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

CS101 Lecture 19: Internetworking. What You ll Learn Today

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

What is network security?

Network Security Technology Network Management

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Network Security. HIT Shimrit Tzur-David

Key Management (Distribution and Certification) (1)

Answer FIVE Questions only. Each carries 20 marks.

FINAL ASSESSMENT/EXAMINATION JULY 2015 PLEASE READ ALL INSTRUCTIONS CAREFULLY BEFORE YOU BEGIN THIS EXAMINATION

Cornerstones of Security

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Client Server Registration Protocol

CS335 Sample Questions for Exam #2

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

GATE CS Topic wise Questions Computer Network

Lecture Computer Networks

Lecture 9 - Network Security TDTS (ht1)

CRYPTOGRAPHY IN NETWORK SECURITY

THE UNIVERSITY OF TRINIDAD & TOBAGO

The next generation of knowledge and expertise Wireless Security Basics

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

(Refer Slide Time: 02:17)

Written examination in Computer Networks

Chapter 8. Network Security

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

TELE 301 Network Management. Lecture 18: Network Security

IP Subnetting and Addressing

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Internetworking and IP Address

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

UPPER LAYER SWITCHING

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Overview. SSL Cryptography Overview CHAPTER 1

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Data Communication and Computer Network

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Protocol Rollback and Network Security

Multimedia Networking and Network Security

Properties of Secure Network Communication

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Internet Control Protocols Reading: Chapter 3

First Midterm for ECE374 03/09/12 Solution!!

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

Improved Digital Media Delivery with Telestream HyperLaunch

IST 220 Exam 3 Notes Prepared by Dan Veltri

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

CS263: Wireless Communications and Sensor Networks

Review: Lecture 1 - Internet History

Protocol Data Units and Encapsulation

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

Application Layer (1)

Data Communication Networks

Principles of Network Security

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

CPS221 Lecture: Layered Network Architecture

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Chapter 8 Network Security

Computer Networks/DV2 Lab

RARP: Reverse Address Resolution Protocol

Network layer: Overview. Network layer functions IP Routing and forwarding

Life of a Packet CS 640,

Chapter 17. Transport-Level Security

NETWORK ADMINISTRATION AND SECURITY

EDA385 Embedded Systems Design. Advanced Course

The OSI Model and the TCP/IP Protocol Suite

Transcription:

PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES Answer FOUR questions. If you attempt to answer more questions than the required number of questions (in any section), the marks awarded for the excess questions answered will be discarded (starting with your lowest mark). PAPER CODE COMP211 page 1 of 8 Continued

1. QUESTION ONE (a) Draw a diagram to show the standard 5-layer ( North American ) model of distributed communication. (b) For each of the following activities, which layer has primary responsibility? each (i) For arranging the orderly sending and orderly receiving of packets? (ii) For electronic transmission of bitstreams? (iii) For communications between one device and the devices connected to it? (c) For a communication session between a pair of processes, which process is the client and which is the server? (d) In the lectures we discussed a UDP server and a TCP server. (i) Which of them needed only one socket and which needed two sockets? 1 mark (ii) Explain why this is the case. Make sure to discuss the differences between the sockets and how each server distinguishes between different clients. (e) What is the difference between persistent and non-persistent HTTP? Which version of HTTP supports both? (f) Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP address of the HTTP server is initially unknown. (i) Which application layer protocols are needed in this scenario and what are they used for? (ii) Which transport layer protocols do the protocols in (i) use? PAPER CODE COMP211 page 2 of 8 Continued

2. QUESTION TWO (a) Using an example, explain the terms authentication and integrity in the context of network security. How can these principles be enforced? 4 marks (b) The Monoalphabetic cipher, as discussed in the lectures, is an encryption method that, for every letter in the plaintext, substitutes that letter with a letter determined by a one-to-one mapping M, where M is the key. Let M 1 and M 2 be two such mappings that are given as follows: M 1 : a z h y o x v w M 2 : a y h x o z v t b v i u p t w s b w i o p r w s c r j q q p x o c v j n q q x i d n k m r l y k d u k m r p y h e j l i s h z g e l l c s f z g f e m f t d f k m b t e g c n b u a g j n a u d (i) How many different keys does the Monoalphabetic cipher have? 1 mark (ii) Is the Monoalphabetic cipher a symmetric-key or a public-key cryptography technique? Explain. (iii) Using the Monoalphabetic cipher with the key M 1, decrypt the following ciphertext and write the decoded plaintext: hrux bj buyui hrulj (iv) The Polyalphabetic cipher improves upon the Monoalphabetic cipher by applying several Monoalphabetic ciphers according to a cyclic pattern. Let the following be such a cyclic pattern using M 1 and M 2 : M 1, M 1, M 2 ; M 1, M 1, M 2 ;... Using the Polyalphabetic cipher according to this pattern, encrypt the following plaintext and write the encoded ciphertext: cryptography (c) Alice wants to communicate with Bob using symmetric-key cryptography (e.g. DES) with a session-key K S. (i) In the lectures we learned how public-key cryptography (e.g. RSA) can be used to distribute a session key K S from Alice to Bob. Suppose the private keys of Alice and Bob are K and K- Ā B, while the public keys are K + A and K+ B. Draw a diagram that shows the message exchange between Alice and Bob which achieves this. 4 marks PAPER CODE COMP211 page 3 of 8 Continued

(ii) Now we want to distribute the session key without public-key cryptography using a Key Distribution Centre (KDC). The KDC is a server that shares a secret symmetric key with each registered user. For Alice and Bob denote those keys by K A K and K B K. Upon request the KDC issues a session key K S. Design a scheme that uses the KDC to distribute K S to Alice and Bob. Your scheme should use three messages: a message from Alice to the KDC requesting a session key K S with Bob, a message from the KDC to Alice, a message from Alice to Bob. Draw a diagram showing the exchanged messages. (iii) What is the main advantage of first distributing a session key and then using symmetric-key cryptography rather than using public-key cryptography techniques for the whole communication? PAPER CODE COMP211 page 4 of 8 Continued

3. QUESTION THREE (a) What are the two main functions of a router? (b) Why are there different protocols for Inter-AS and Intra-AS routing? (c) Consider a router that interconnects three subnets: A, B, and C. Suppose all of the interfaces in each of these subnets are required to have the prefix 154.1.48.0/21. Suppose subnets A and B are each required to support 500 interfaces, and subnet C is required to support 1000 interfaces. Provide network addresses for A,B and C (in the form a.b.c.d/x) that satisfy these constraints. 6 marks (d) What are the advantages and disadvantages of digital transmission? 6 marks (e) What is the signal-to-noise ratio corresponding to 20dB? Is it bigger or smaller than the typical voice signal-to-noise ratio? (f) What is the problem of network congestion? Which nodes in the Internet first know about this problem? Do they communicate their knowledge to other nodes when using TCP? If so, how? How does the sender of a message using this protocol respond to such communications? PAPER CODE COMP211 page 5 of 8 Continued

4. QUESTION FOUR (a) Suppose 6 host machines and 1 router are connected by a company network consisting of 3 subnets. The configuration is given in the following table: Subnets Host IP-addresses Router IP-Addresses 112.1.4.0/23 112.1.4.1 112.1.4.40 112.1.6.0/24 112.1.6.1 112.1.6.20 112.1.8.0/24 112.1.6.2 112.1.8.60 112.1.8.1 112.1.8.2 112.1.8.3 (i) Draw a diagram to represent this configuration. (ii) Draw the forwarding table for the host machine with IP address 112.1.6.1 (iii) Draw the forwarding table for the router. (iv) Show the steps involved when a datagram is sent from host machine 112.1.4.1 to host machine 112.1.8.2. (v) Suppose an additional host machine is connected to the company network. For each of the following IP addresses, either give the subnet to which this IP address belongs, or state that it is not a valid IP address for any of the subnets. 112.1.5.1 112.1.7.1 (b) Suppose two network interface cards (NIC) A and B are attached to the same broadcast LAN and that A wants to send a datagram to B but doesn t know B s MAC address. Which protocol can be use to resolve this? Explain step by step how A retrieves B s MAC address using this protocol. PAPER CODE COMP211 page 6 of 8 Continued

5. QUESTION FIVE (a) An ideal multiple access protocol should have 4 characteristics. List them. 4 marks (b) Explain the difference between TDMA, FDMA, CSMA/CD and Slotted ALOHA. (c) Suppose 50 hosts are sharing a broadcast channel. Further suppose at any time each host has a frame to send with probability p. Which of the multiple access protocols from (5b) are desirable if p is low (say 1%)? Why? What about if p is high (say 90%)? (d) What information is used by a process running on one host to identify a process on another host? (e) What is the 32-bit binary equivalent to the IP address 221.7.25.61? (f) What is a CRC code? What purpose does it serve? Compute the CRC bits defined by the generator 1001 and the data bit string 111010. 6 marks PAPER CODE COMP211 page 7 of 8 Continued

6. QUESTION SIX (a) Alice sends a message to Bob which is 4300 bytes long, and is broken into segments of 900 bytes each. Alice chooses a random start value of 1100 for her sequence numbers. (i) How many segments will the message be broken into? 1 mark (ii) Give the start and end bytes of each segment. (iii) Give the ACK numbers which Bob will use to indicate that each segment was received uncorrupted. (iv) Suppose Bob chooses a random start of 230 for the sequence numbers (of his ACKs), and that he only sends headers (and no data) back to Alice. What will be the ACK numbers used by Alice in response to these ACKs? (v) Draw a brief Message Sequence Chart for the interaction. (b) The Internet has been described as an unreliable communications medium. (i) What characteristics of Internet communications lead to this description? (ii) Which protocol was developed to deal with these undesirable features? 1 mark (iii) Explain how the features of this protocol address the characteristics you listed in (i). (c) Consider a communication channel with bandwidth B = 8000 Hz. (i) Suppose the channel has a signal-to-noise ratio S/N = 255. What is the maximum data rate of this channel? (ii) What is the minimum number of signal states M needed to achieve a data rate of 32000 bps? How many bits must each signal state encode? PAPER CODE COMP211 page 8 of 8 End