Podcast
Questions and Answers
How and where can DNS be attacked? (Give 3 different answers)
How and where can DNS be attacked? (Give 3 different answers)
Why is DNS vulnerable?
Why is DNS vulnerable?
Unencrypted requests/responses, non-verified answers, non-authorized servers, unprotected caches - all is based on the simple assumption: “don't lie about others” and trust among the involved systems.
What can happen, if DNS gives wrong answers? What can be done against this (name two solutions)?
What can happen, if DNS gives wrong answers? What can be done against this (name two solutions)?
How does DNS ensure the uniqueness of names? Who owns the names in DNS?
How does DNS ensure the uniqueness of names? Who owns the names in DNS?
Signup and view all the answers
What is the difference between recursive and iterative name resolution?
What is the difference between recursive and iterative name resolution?
Signup and view all the answers
What is the focus of congestion and flow control, respectively? Why are they needed?
What is the focus of congestion and flow control, respectively? Why are they needed?
Signup and view all the answers
What does a duplicated ACK in TCP tell the sender? What is the idea of fast recovery?
What does a duplicated ACK in TCP tell the sender? What is the idea of fast recovery?
Signup and view all the answers
What determines the flow of data in TCP? Name three issues and describe!
What determines the flow of data in TCP? Name three issues and describe!
Signup and view all the answers
How can TCP detect a congestion? Describe briefly! What are the pros and cons of the two solutions?
How can TCP detect a congestion? Describe briefly! What are the pros and cons of the two solutions?
Signup and view all the answers
Why can't we build large networks with many nodes based on switches only?
Why can't we build large networks with many nodes based on switches only?
Signup and view all the answers
How is routing scalability in the Internet handled?
How is routing scalability in the Internet handled?
Signup and view all the answers
What are differences between routing and forwarding? Name two!
What are differences between routing and forwarding? Name two!
Signup and view all the answers
Give 3 examples for routing metrics!
Give 3 examples for routing metrics!
Signup and view all the answers
Besides scalability, what is missing in standard link-state and distance vector routing protocols? How does BGP handle these issues?
Besides scalability, what is missing in standard link-state and distance vector routing protocols? How does BGP handle these issues?
Signup and view all the answers
Why is it so easy to announce "false" paths?
Why is it so easy to announce "false" paths?
Signup and view all the answers
Why can RPKI also help in the web ecosystem - isn't it enough to encrypt web pages?
Why can RPKI also help in the web ecosystem - isn't it enough to encrypt web pages?
Signup and view all the answers
What does “ossification” of the transport layer mean? What causes this "ossification" (give 2 examples)?
What does “ossification” of the transport layer mean? What causes this "ossification" (give 2 examples)?
Signup and view all the answers
Why does simply sending different data packets of a single TCP connection over different paths not work?
Why does simply sending different data packets of a single TCP connection over different paths not work?
Signup and view all the answers
How does MPTCP circumvent the "ossification"?
How does MPTCP circumvent the "ossification"?
Signup and view all the answers
Why may TCP slow down HTTP and thus the rendering of web pages?
Why may TCP slow down HTTP and thus the rendering of web pages?
Signup and view all the answers
How does QUIC solve this issue and how does it circumvent the “ossification” of the transport layer?
How does QUIC solve this issue and how does it circumvent the “ossification” of the transport layer?
Signup and view all the answers
Can we directly transmit data? What is always required?
Can we directly transmit data? What is always required?
Signup and view all the answers
What are the effects of bandwidth limitation of a physical medium?
What are the effects of bandwidth limitation of a physical medium?
Signup and view all the answers
How to achieve bit synchronization between sender and receiver? Give two examples!
How to achieve bit synchronization between sender and receiver? Give two examples!
Signup and view all the answers
Why is it impossible to detect all possible errors?
Why is it impossible to detect all possible errors?
Signup and view all the answers
Study Notes
Exam Telematics - Solutions
- The solutions provided are examples, not exhaustive, but sufficient for full marks. Correct keywords and coherent arguments are essential.
DNS (16 points)
-
DNS Attacks (3):
- Cache poisoning
- Spoofing of DNS servers (at various levels)
- Forging requests/responses
- Redirection
-
DNS Vulnerability (2):
- Unencrypted requests/responses
- Non-verified answers
- Unauthorised servers
- Unprotected caches
-
Incorrect DNS Answers (4):
- Consequences: Name to IP mapping errors, redirection to wrong servers, reduced web access.
- Solutions: Direct use of trusted DNS servers (e.g., 8.8.8.8), DNSSEC implementation
-
DNS Name Uniqueness (3):
- Uniqueness ensured through hierarchical structure (top-level, second-level, etc).
- Each level's Network Information Center (NIC)/administrator manages/assigns names to owners.
- Owner registration in a database.
-
Recursive vs. Iterative Resolution (4):
- Recursive: Query answered by the requested node, possibly involving further requests without user involvement.
- Iterative: Node provides pointers to the requester for further queries.
Congestion and Flow Control (20 points)
-
Congestion Control Focus (4):
- Focus on the network
- Aims to prevent congestion
- Necessary for network stability
-
Flow Control Focus (4):
- Focus on the end-system
- Prevents receiver overload
- Necessary for preventing packet loss
-
Duplicated ACKs in TCP (4):
- Indication of successful packet transmission.
- Fast recovery avoids 'slow start'. 'Slow start' initializes the congestion window at one maximum segment size (MSS) but starts right away.
-
TCP Flow Determination (6):
- RTT: Round trip time
- Error rate: Determines retransmission amount
- Receiver window: Defines receiver capacity
-
TCP Congestion Detection (6):
- Explicit: Using ECN bits in the IP header (set by routers experiencing congestion, reflected to sender).
- Implicit: Sender detects time-outs or missing ACKs (indicating congestion).
Routing (18 points)
-
Limitations of Switches (2):
- Flat address space requires storing all addresses
- Inefficient for large networks.
- Requires logical tree structure to avoid loops.
-
Routing Scalability (2):
- Hierarchies
- Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs)
- Autonomous Systems (AS) boundaries
-
Routing vs. Forwarding (3):
- Forwarding is time-critical with one choice
- Routing is less time-critical and multiple paths.
-
Routing Metrics (3):
- Delay
- Hop count
- Data rate
-
Routing Issue Handling (Routing Protocols) (3):
- Policies and paths
- Handling asymmetric routing
- Different policies applied to paths
-
False Path Announcement (2):
- Lack of verification mechanisms
- Trust-based system
- Manipulating announcements
-
RPKI Support on Web (3):
- Enables encrypting website content
- Protection against routing manipulation
- Protection against Denial of Service (DoS).
Ossification/New Protocols (18 points)
-
Transport Layer Ossification (4):
- Established protocols (TCP/UDP) are widely used and integrated.
- Changes to protocols are difficult due to widespread use.
- Middleboxes cause dependency on existing protocols.
-
TCP Connection Handling (4):
- Maintaining state during packet delivery over different paths often fails.
- Middleboxes follow connections, making it difficult.
-
MPTCP Circumvention (2):
- Breaks up connections into multi-path TCP (MPTCP) individual segments.
-
HTTP Slowdown (4):
- Lost segments block correct data delivery
- TCP congestion can cause delays
- User experience is negatively affected.
Bits and Signals (18 points)
-
Data Transmission Requirement (4):
- Physical representation mapping needed
- Signal modulation crucial
-
Bandwidth Limitation (2):
- Shannon's law defines data rates dependent on bandwidth and signal-to-noise ratio.
-
Quantization Challenges (2):
- Decreasing signal levels lead to increasing interference, potential for data corruption.
-
Bit Synchronization (4):
- Manchester encoding (edge-based): Transitions in the middle of a bit
- Differential encoding: Transitions based on difference between previous and current bit values
-
Frame Alignment (4):
- Defining and separating frame starts/limits.
- Including checksums/length information for error checks.
-
Transmission Error Detection (2):
- CRC (Cyclic Redundancy Check).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the solutions to DNS attacks, vulnerabilities, and incorrect answers. It explores the importance of DNSSEC implementation and the uniqueness of DNS names. Assess your understanding of these concepts relevant to telematics and network security.