Preparation Material
Preparation Material
Preparation Material
Question 1
Answer the following questions with yes, no, or maybe.
Question 2
1. We run the following command dig example.edu from a terminal. Fill in the gaps (rep-
resented by ...) in the following output and answer subsequent questions:
;; QUESTION SECTION:
; ... IN A
;; ANSWER SECTION:
... 86400 IN A 93.184.216.119
;; AUTHORITY SECTION:
... 172800 IN NS b.iana-servers.net.
... 172800 IN NS ...
;; ADDITIONAL SECTION:
a.iana-servers.net. 22728 IN A 199.43.132.53
... 22728 IN AAAA 2001:500:8c::53
... 22728 IN A 199.43.133.53
... 22728 IN AAAA 2001:500:8d::53
2. Does the host b.iana-servers.net have an IPv6 address? If so give it, if not justify.
4. What are the name(s) of the domain name servers that have authority over the domain
example.edu?
Question 3
Consider the following output resulting from running the command traceroute example-ensia.dz.
1
4 ae-1-12.bar1.Vienna1.Level3.net (4.69.153.145) 170.189 ms * 149.298 ms
5 212.73.203.102 (212.73.203.102) 149.951 ms 148.335 ms 148.869 ms
6 ae0.mx1.mil2.it.geant.net (62.40.98.39) 172.626 ms 170.135 ms *
7 so-1-3-0.rt1.cat.it.geant.net (62.40.112.55) 536.250 ms 535.646 ms 540.370 ms
8 arn-gw.rt1.cat.it.geant.net (62.40.124.66) 168.936 ms 170.285 ms 172.263 ms
9 10.16.250.9 (10.16.250.9) 110.594 ms 106.447 ms 109.794 ms
10 * 172.16.100.17 (172.16.100.17) 117.839 ms 117.146 ms
11 172.16.100.30 (172.16.100.30) 130.207 ms 121.987 ms 122.015 ms
12 10.19.101.1 (10.19.101.1) 108.965 ms 106.397 ms 105.869 ms
13 10.19.101.2 (10.19.101.2) 156.436 ms 165.216 ms 160.924 ms
14 193.194.69.98 (193.194.69.98) 162.734 ms * *
1. Can the IP address of example-ensia.dz be known from the obtained output? If yes,
what is it?
2. Can the IP address of our machine be known from the obtained output? If yes, what is
it?
4. How many routers are there between our machine and example-ensia.dz?
5. What would be the response of pinging the following machines 192.168.1.1, 41.99.0.1,
172.16.100.30, and 10.19.101.2 (include an approximate value of mean round trip time in
your response)?
Question 4
Consider the following routing table:
192.168.0.128/25 If1
192.168.0.0/17 If2
192.168.0.0/25 If1
192.168.16.0/23 If3
192.168.16.0/21 If4
1. List the range of IP addresses that belong to each one of these five networks.
Question 5
Consider the following output resulting from running the command ifconfig.
user@machine:~$ ifconfig
eth0 Link encap:Ethernet HWaddr f1:dc:fa:8e:f5:35
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
2
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
Interrupt:20 Memory:f2500000-f2520000
f1:dc:fa:8e:f5:35,
c1:de:fa:82:da:0b,
192.168.1.2,
192.168.1.255
3. Is this machine connected to the Internet through wireless or wired interface? Justify.
Question 6
Consider the following routing table:
Question 7
1. What are the main differences between UDP and TCP protocols? Consider the following
elements: packet retransmission, error detection, and congestion control.
3
Live video streaming
File transfer
Mail
Web browsing
Question 8
1. What is the name of the server hosting the URL http://en.wikipedia.org/wiki/Main_Page?
3. What is the command line that gives the MAC address of your local machine?
4. What is the command line that allows checking if a given server (e.g 183.192.16.5) is
listening on port 5780?
Question 9
Answer the following questions with True or False.
10. The command ping measures the RTT between a source machine a destination machine. yes
11. A web server usually listens to connections on port number 80. yes
Question 10
Answer the following questions briefly.
1. What is the command line that allows you to know if ensia.edu.dz is running a Mail
Server? nc
2. What is the command line that gives the name of the email server to which the email
contact@ensia.edu.dz should be sent.
3. What is the main difference between POP3 and SMTP.
4. Describe the DNS spoofing attack and the Denial of Service Attack.
5. Assume that you do not trust your DNS server anymore, will you be able to continue to
browse the Internet safely? Which sites continue to be trusted. Explain.
4
6. Explain why it is important for TCP to estimate the Round Trip Time accurately.
7. What does DHCP provide to hosts connected to the network. (
8. What is the difference between unicast, multicast, and broadcast.
Question 11
Consider the configuration depicted in the figure above and answer the following questions.
1. Provide an IP configuration for the following hosts: (1) home machine A, (2) home router
X, (3) Algerie Telecom DNS server, (4) university machine B, (5) university DHCP server,
(6) university Web server, (7) university Email server.
3. Answer the following questions with Yes or No and justify your answer.
5
(c) Machine A can ping google.com.
(d) google.com can ping Machine A.
(e) Machine B can ping DHCP server.
(f) Machine A can ping Email server.
Question 12
Answer the following questions with True or False.
Question 13
Answer the following questions briefly.
6
3. Cite two major advantages of NAT.
4. What would happen if all IP addresses of hosts were fixed (same as hardware addresses)?
5. Why does DHCP use UDP but not TCP?
6. What is the purpose of the TTL field in the IP header of packets?
7. What is the difference between the delay and the jitter?
8. Explain why the round trip time would be effective in detecting congestions in wired
networks but not as effective in wireless networks.