What are the source and destination port numbers, the sequence and acknowledgement numbers and the contents of the data area? Did this segment probably originate from a client or a server process?09 6c 00 19 45 6d 70 01 3c 32 28 7d 50 18 10 00 a6 bd 00 00 45 48 4c 4f 20 72 65 64 67 75 6d 2e 62 65 6e 64 69 67 6f 2e 6c 61 74 72 6f 62 65 2e 65 64 75 2e 61 75 0d 0a
What is the "escape character" used for?ironbark 27> telnet greybox Trying 149.144.20.62... Connected to greybox.bendigo.latrobe.edu.au. Escape character is '^]'.
text/plain
text/html
audio/basic
application/octet-stream
?
MAIL FROM:
and RCPT TO:
protocol messages both
specify email addresses --- these are called envelope
addresses. The header of the RFC822 message which is being
delivered also contains From:
and
To:
lines -- these are
header addresses. The interesting question to
contemplate is: "what happens if the To:
header address and the RCPT TO:
envelope address are different"
in an SMTP delivery operation? Where does the mail get
delivered?
http://www.acm.org
.
#FFFFFF
").
GET
request (and other types as well,
but we didn't elaborate in the lecture) is terminated by
two newlines. Why are two necessary? Wouldn't
one newline be sufficient, as in HTTP 0.9?
Content-length:
" header required in
HTTP/1.0?
Content-encoding:
"
header required in HTTP/1.0 as it is for email?
What would the server return? Explain in some detail.GET /Fig1.gif HTTP/1.0<newline><newline>
HEAD
request method used for?
GET
request method
header of the form If-Modified-Since:
If-Modified-Since:
" request. Explain, very
briefly how this works.
GET
request
method to include a "Referer:
" header in the request.
Why is this considered to be a potential privacy issue?
luga.latrobe.edu.au
appears in an
MX
RR (Resource Record) for machine
ironbark.bendigo.latrobe.edu.au
?
1
if recursion is desired at the server and
0
otherwise. What would you expect to be the
result of queries in each of these situations?
ironbark
resolves
to a correct address for machines at located at the Bendigo campus.
How is this handled by the DNS, and whereabouts is it implemented
(ie, in the nameserver/s or in the resolvers)? What about
ironbark.bendigo
-- can this be handled?
in-addr.arpa
only if that fails. Why?
accept()
socket method in Java
indicate that a TCP connection has been established?
getInetAddress()
and, to a lesser
extent getPort()
, methods are probably more
useful for a socket in a server program than in a client. Why?
ironbark
.
How are each of these connections uniquely identified?
connect()
for a client socket and
bind()
followed by accept()
for a server. How does this compare with the Java approach?
Extract the network number and the host number from each of these, stating what class of network it is.205.184.10.20 139.130.17.42 138.80.128.18 10.170.45.56 149.144.20.82 192.54.252.7
127.0.0.0
is reserved as the
Internet loopback address. What do you think this
means?
255.255.255.255
. How should
this address be interpreted? Optional harder question: a broadcast
address of the form discussed in the lecture is sometimes called
a directed broadcast address. What do you think
this means?[2]
/x
" specifier at the end of the address
block which is allocated?
traceroute
command, "looking from" outside La Trobe back towards Bendigo. It
was, in fact, run on a Unix system called morinda
in
the School of IT at NTU in Darwin.
morinda> traceroute ironbark.bendigo.latrobe.edu.au [....six lines deleted] 6 nsw-vic.atm.net.aarnet.edu.au (192.12.76.2) 79 ms 79 ms 79 ms 7 vic-gw.vrn.EDU.AU (203.21.130.162) 80 ms 80 ms 87 ms 8 latrobe-gw.vrn.EDU.AU (203.21.130.133) 81 ms 83 ms 80 ms 9 r-elt-fddi.latrobe.edu.au (131.172.20.8) 80 ms 81 ms 80 ms 10 r-bgoatm34-atm.latrobe.edu.au (131.172.239.5) 81 ms 328 ms 84 ms 11 busfddi0.bendigo.latrobe.edu.au (149.144.10.1) 81 ms 81 ms 81 ms 12 ironbark.bendigo.latrobe.edu.au (149.144.21.60) 81 ms 81 ms 81 ms morinda>Use the information contained in this
traceroute
output to
fill in the missing IP addresses in the "Internet Structure" diagram in
the lecture.
149.144.20.0/24
. When registered users
dial in to this router, what would you expect the network/subnet
part of their home machines IP address to be?
name ::= OCTETSTRING -- or IA5String, see subranges, later. married ::= BOOLEAN yrsWithCompany ::= INTEGER
personnelRecord = record name : array[1..100] of char; yrswithCompany : integer; married : boolean end ;
AP-Title ipInReceives ENUMERATED ObjectDescriptor OCTET STRING sysDescr
30 08 02 01 03 04 03 48 69 21
ping
command? Give at least 3 answers. What does
ping
actually do?
traceroute
command tell the network
manager? Why is traceroute
not recommended for use in
regular network monitoring? (Hard research
question:How does traceroute work?)
/etc/mib.txt
.
ipForwarding OBJECT-TYPE ::= { ip 1 } icmpInEchos OBJECT-TYPE ::= { icmp 8 } tcpMaxConn OBJECT-TYPE ::= { tcp 4 }What are the full numeric
OBJECT IDENTIFIERS
of the
objects ipForwarding
, icmpInEchoes
and
tcpMaxConn
.
OBJECT IDENTIFIERS
are encoded for
transmission. In general, the integers which specify the
OBJECT IDENTIFIER
are simply encoded in BER as a
SEQUENCE
of single byte values. However, the first two
integers (let's call them a and b) are encoded in
a compact form, taking only a single byte, of the form 40a
+ b. So, for the Internet, the first two integers are 1.3,
therefore they are encoded as the single byte value 43. Can you
imagine a reason why this is done? What does it say about the
values of these first two integers?
[1] Internet and network management
demigod.
ipForwarding
,
icmpInEchoes
and
tcpMaxConn
? Give solutions using each of the
get and get-next commands. Use a
command syntax of your choice, although the CMU SNMPlib syntax
given in the lecture notes would be
the most appropriate.
ifTable
) in the interfaces portion of the
standard MIB, edited to fit the page. The table consists of a
sequence of ifEntry
elements. Values shown are
from the router r-bgowan
at Bendigo, which is
nowadays used as a backup (over ISDN) to the microwave link to
Bundoora.
ifSpeed
entries. You might find it
helpful to refer to your lecture notes for some useful
information here.
get-request
to discover the speed, in
bps, of interface 1.
get-next(...ifSpeed.2)
?
{ system sysDescr }
.
Of course, in the "Real World", we would normally
have to be more careful to ensure that the software we were using
was able to unambiguously fetch the variable we desired. How
should SNMP software resolve such abbreviations, especially with
numeric OBJECT IDENTIFIER strings? Hint: think of how Fully
Qualified Domain Names (FQDNs) are specified, compared to
abbreviated versions.
r-bgoatm34
to prohibit traffic from subnet 8 (ie,
149.144.8.0
) from crossing the microwave link to
Bundoora. Define an access list (address and mask pair) which will
do this, using the syntax from the lecture.
XOR
-based
monoalpabetic cryptosystem described in the lecture?
107
keys
tried per seconed)? This is called a brute force
attack on a cryptosystem.
Ciphertext: 0001010 0001001 0000010 Key: 1001011 1000101 1000111Some useful ASCII character codes:
A: 1000001 B: 1000010 C: 1000011 D: 1000100 E: 1000101 F: 1000110 G: 1000111 H: 1001000 I: 1001001 J: 1001010 K: 1001011 L: 1001100 M: 1001101 N: 1001110 O: 1001111
Ks
(the decryption, or private key) given that you know
Kp
, the public encryption key?
RB
is encrypted with
Ks
. Is this encryption necessary, or
would it have been adequate to send it back in plaintext?
p = 7
and
q = 11
,
n
and
X
.
E
. What is the
public key Kp
corresponding to
these values?
D
. What is the
private key Ks
corresponding to
these values?
p = 13, q = 31 and D = 7
, find
E
.
p
, q
, D
and E
,
<INPUT TYPE="TEXT" NAME="Name" MAXLENGTH="64" SIZE="20">
name=Phil+Scott&sex=male&occupation=Ace+Lecturer
GET
method is recommended for submission of
form data if the submission of the form does not have side
effects. What does this mean? What is the alternative?
http://www.altavista.com/cgi-bin/query?locale=au&q=%22phil+scott%22+bendigo&search=Search
<FORM METHOD=>
used to generate
it was specified as GET
or
POST
?
GET
method obtain
data from a form?
METHOD=POST
, explain how the browser sends the
form information (or QUERY_STRING
) to the Web
server. How does the CGI program access the information in this
case?
domain
and
path
specifiers impose on when your browser sends a
cookie to a server? In other words, how are the domain
and path
specifiers interpreted in the browser?
The certificate that the site 'www.unitedmedia.com' has presented does not contain the correct site name. It is possible, though unlikely, that someone may be trying to intercept your communication with this site. If you suspect the certificate shown below does not belong to the site you are connecting with, please cancel the connection and notify the site administrator.What's going on here? How could it happen?
Here is the Certificate that is being presented:
Certificate for: United Media Signed by: RSA Data Security, Inc. Encryption: Export Grade (RC4-Export with 40-bit secret key)