Midterm Examination - Lyle School of Engineering

advertisement
Department of Computer Science and Engineering
Southern Methodist University
Dallas, Texas 75205
Internetworking Protocols
and Programming
CSE 5348/7348
Fall 2004
This is a closed book, closed-notes
exam. You may use a cheat sheet not
bigger than 8.5”x11”. This exam
should be completed in an hour and a
half
Name:_________________
Grade:__________________
1
Department of Computer Science and Engineering
Southern Methodist University
Dallas, Texas 75205
Midterm Examination
CSE 5348/7348
Fall 2004
Name: ________________________________
Student ID: ________________________________
1. Choose the most appropriate answer to the
following questions by circling the letter
corresponding to your choice. You may choose
only one of the options.
1. The Algorithm used by CSMA/CD for collision avoidance is
a. Random Early Detection
b. Binary Exponential Back-off
c. Message Tossing
d. IP shedding
2. 100 BaseT involves data transmission at
a. rates of 1 Gigabits/sec over multimode fiber
b. a rate faster than 155 Kbps
c. a rate that is 1002 Kbps
d. 100 Mbps using unshielded Twisted pair
3. Changing the Ethernet card on an interface means that
a. the interface IP address will change
b. all hubs will have to be reconfigured
c. the routers will have to be reconfigured
d. the interface MAC address will change
4. The address 0.0.0.0 indicates
a. a host that does not exist on the network
b. the logical local loopback device
c. all hosts on the network
d. “this” host
2
Department of Computer Science and Engineering
Southern Methodist University
Dallas, Texas 75205
5. The Address Resolution Protocol
a. is used for acquiring the IP address of a machine given
its MAC address
b. is a Layer three networking protocol
c. is used to find the MAC address of a machine given its
IP address
d. is used for acquiring the IP address of a machine given
its domain name
6. Well Known Ports (WKP) are those in the range
a. 0-1023
b. 3000-65535
c. 4096-65535
d. 1024-2014
7. The Reverse Address Resolution Protocol
a. is used for mapping ATM identifiers to an IP address
b. is used to find the IP address of a machine given its
MAC address
c. requires the deployment of ARP Servers on the physical
network
d. has been replaced by such protocols as DNS and SNMP
8. The destination IP address of a packet moving from a private
address space to a public address space through a NAT
a. is mapped to a public address by the NAT
b. is left untouched by the NAT
c. is mapped to its own address by the NAT
d. none of the above
9. The true statement is
a. The world will run out of IP addresses soon since IP
addresses are a lot shorter than MAC addresses
b. IP version 6 was introduced primarily to allow more
unique domain names to be deployed globally
c. A Network interface card by default picks up only
Ethernet frames whose destination MAC address
matches its own
d. A network address translator acts as a Transparent
Router
3
Department of Computer Science and Engineering
Southern Methodist University
Dallas, Texas 75205
10. The Internet Protocol uses the “DF” flag in a datagram to
indicate that
a. a packet should not be fragmented by intermediate
routers
b. the packet should be direct-forwarded
c. the packet is delay sensitive
d. the sender should be notified if the destination address
fails to exist
11. The Checksum field in the IP header
a. applies only to the data in the packet
b. applies to both header and data
c. applies to only the IP header and not to data
d. is recomputed by all routers over the entire IP datagram
12. The User Datagram Protocol is
a. used by Layer 5 protocols such as FTP
b. connection oriented but not reliable
c. a connectionless, unreliable protocol
d. a connectionless protocol that is reliable
13. The checksum field in the UDP header
a. applies only to the UDP data in the packet and not to
the header
b. is mandatory by IETF standards
c. is never used
d. applies to the entire UDP datagram
14. Port numbers in the UDP header of a datagram
a. uniquely identify the end-point machines
b. uniquely identify the end-point applications
c. identify the end-point machines and the applications
involved in the UDP transaction
d. can never be the same
15. The ICMP protocol
a. is a Layer 2 protocol co-existing with ARP/RARP
b. is used only for error detection and correction
c. has no associated port numbers and is therefore a Layer
3 protocol
d. is encapsulated in IP and is therefore a Layer 4 protocol
4
Department of Computer Science and Engineering
Southern Methodist University
Dallas, Texas 75205
16. A UDP client
a. can talk only to a UDP server
b. can talk either to a UDP server or a TCP server
c. cannot invoke the connect function call
d. should never be several hops away from the server due
to the lack of a mandatory checksum field
17. The local loopback device
a. supports only ICMP sockets
b. cannot be used for inter-process communications on the
same machine
c. is always assigned the address 127.0.0.1
d. supports only UDP sockets
18. A Class D IP address
a. should never be seen in the destination field of an IP
datagram on the network
b. is reserved for use by routers alone
c. is an experimental block of IP addresses
d. is used for multicasting packets to several hosts
19. Raw sockets are
a. sockets that haven’t yet been bound to an IP address
b. standardized and portable across a variety of platforms
c. malicious and should never be used on the internet
d. sockets that allow you to construct ICMP packets
20. When the TTL field of the IP header in a packet becomes zero,
the router handling the packet
a. bounces the packet back to the sender
b. drops the packet and generates an ICMP “TTL expired
in transit” message to the intended receiver
c. silently drops the packet
d. drops the packet and generates an ICMP “TTL expired
in transit” message to the sender
_________________________________________________________
5
Department of Computer Science and Engineering
Southern Methodist University
Dallas, Texas 75205
2. Reasoning Exercises
You will be given credit for using proper
terminology and for being concise. Give your
answer in the space provided.
1. A dual-homed host machine has two Ethernet interfaces
connected to the same physical network. One is assigned the IP
address 129.0.0.4 and the other 129.0.0.5. A UDP server
application offers database services at address 129.0.0.4 port
3305. A client application running on port 3010 of 129.0.0.5
requests services by sending a request message to the server.
The request datagram is 900 bytes long and is carried in a UDP
packet. Frames on the LAN can be observed with the help of a
Sniffer.
a. Assuming the Ethernet MTU is set to 512 bytes, how
many frames will be seen on the Ethernet LAN during
the exchange?
b. How many frames would you observe on the LAN if
the “Don’t Fragment” Flag were set in the IP datagram
that the client sends?
6
Department of Computer Science and Engineering
Southern Methodist University
Dallas, Texas 75205
2. A Physical network has a network ID of 47.104.56.0 and a
subnet mask of 255.255.248.0 written as 47.104.56.0/21. The
network consists of three machines A, B, C and a gateway R
(default router). The static IP address assignments and default
router configuration for the network is as shown in the table
below. The person who configured machine C erroneously set
its subnet mask to 255.255.255.0, or a prefix of 24 instead of
21. All other parameters are properly and statically assigned.
Machine
Router
A
B
C
IP address
47.104.56.1
47.104.56.3
47.104.59.115
47.104.59.117
Subnet mask
255.255.248.0
255.255.248.0
255.255.248.0
255.255.248.0
Assigned mask
255.255.248.0
255.255.248.0
255.255.248.0
255.255.255.0
Indicate what happens for each of the following use cases.
Explain the request/response messaging in each case:
a. Host A sends out ARP request for Host B.
b. Host C sends out ARP request for Host B
7
Department of Computer Science and Engineering
Southern Methodist University
Dallas, Texas 75205
c. Host B sends an ICMP echo request to Host C
d. Host A sends an ICMP echo request to Host C
3. The traceroute application was run on a machine named
“Cycloid” [192.168.0.7/24] to get the following output. Answer
the following questions based on the screen shot:
8
Department of Computer Science and Engineering
Southern Methodist University
Dallas, Texas 75205
a. How many routers exist between the machines Cycloid
and Rapid? Does this correspond to the shortest
geographical distance between Cycloid and Rapid?
b. Do you notice any private networks with non-routable
IP addresses being traversed? If so, what functional
device might have been used to implement this?
4. The Record Route Option in an IP datagram holds a length
field and a pointer field. A router forwarding a packet with this
option inspects the pointer field and the length field in the IP
optional header.
8
0
Code (7)
24
16
Length
31
Pointer
First IP address
Second IP address
...
9
Department of Computer Science and Engineering
Southern Methodist University
Dallas, Texas 75205
Answer the following questions:
a. Explain router action if the length field holds the
number 0000 10112 and the pointer field holds the
number 0000 01002.
b. Explain router action if the length field holds the
number 0000 10112 and the pointer field holds the
number 0000 11002
10
Department of Computer Science and Engineering
Southern Methodist University
Dallas, Texas 75205
3. Design Problems
You will be given credit for using proper terminology
and for being concise. Give your answer in the space
provided.
1. A router has learned of all reachable networks from neighboring routers.
The list of networks is shown in the table below:
Classless
Addresses
53.0.0.0
70.0.0.0
86.0.0.0
97.0.0.0
170.240.0.0
Identify the unique prefixes and construct a binary trie for the above
information.
11
Department of Computer Science and Engineering
Southern Methodist University
Dallas, Texas 75205
2. An address block 47.104.56.0/21 is made available to you for
deployment. The network you have to implement consists of
three subnets interconnected by two routers. Each subnet will
hold no more than 254 host machines. Fill in the blanks in the
topology diagram. Supply IP addresses for all Router
Interfaces. Identify each cloud with its Network ID and subnet
mask. Fill in the information for the Client and Server
machines. You are free to choose addresses as long as they fall
within the allocated block.
12
Download