You are on page 1of 2

1. It is said that IPsec may not work with network address translation (NAT) (RFC 1631).

However, whether IPsec will work with NAT depends on which mode of IPsec and NAT
we use. Suppose we use true NAT, where only IP addresses are translated (without port
translation). Will IPsec and NAT work in each of the following cases? Explain why or
why not.
(a) IPsec uses ESP transport mode.
(b) IPsec uses ESP tunnel mode.
(c) What if we use port address translation (PAT), also known as network address/port
translation (NAPT) in NAT, where in addition to IP addresses, port numbers will be
translated to share one IP address from outside the private network.
2. Consider an Internet backbone network having two routers, A and B, interconnected
by a communication link with the transmission speed of exactly 1.5 Mbps. The physical
length of this link is 7500 kilometers and propagation speed over the link is 2.5 x 108
meters/second. What is the total end-to-end delay for transmitting a packet of 600,000
bits size in a continuous stream from router A to router B if processing and queuing
delays are negligible?
3. (i) To make an HTTP request, the client establishes a TCP connection and sends an
HTTP request message. An HTTP request message has a Host header than includes
the name of the server (e.g., Host: www.bits-pilani.ac.in). Why is the Host necessary?
Wouldnt the server already know its own name? Does Webmail use POP3, IMAP or
neither? If one of these, why was that one chosen? If neither, which one is it closer to in
spirit?
(ii)Suppose that a message has been encrypted using DES in ciphertext block chaining
mode. One bit of cipher text in block Ci is accidentally transformed from a 0 to a 1
during transmission. How much plain text will be garbled as a result?
4. Host A wants to send voice to Host B over a packet switched network (for example
internet phone). Host A converts analog voice to a digital 64 Kbps bit stream on the fly.
Host A then groups the bits into 48 byte packets. There is one link between host A and
B. Its transmission rate is 1 seconds. As soon as host A gathers a packet, it sends it to
host B. As Soon as host B receives an entire packet, it converts the packets bits to an
analog signal. How much time elapses from the time when a bit is created (from the
original analog signal at host A) until the bit is decoded (as part of the analog signal at
host B)?
5. We need to use synchronous TDM and combine 20 digital sources, each of 100
Kbps. Each output slot carries 1 bit from each digital source, but one extra bit is added
to each frame for synchronization. Answer the following questions
a. What is the size of an output frame in bits?

b.
c.
d.
e.

What is the output frame rate?


What is the duration of an output frame?
What is the output data rate?
What is the efficiency of the system (ratio of useful bits to the total bits).

6. Show a request that retrieves the document /usr/users/doc/docl. Use at least two
general headers, two request headers, and one entity header. Show the response to (a)
for successful request and (b) for a document that has permanently moved to
/usr/deads/doc1.
7. A 3000-km-long T1 trunk is used to transmit 64-byte frames using protocol 5. If the
propagation speed is 6 sec/km, how many bits should the sequence numbers be?
8. The following character encoding is used in a data link protocol:
A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence
transmitted (in binary) for the four-character frame: A B ESC FLAG when each of the
following framing methods are used:
(a) Character count. (b) Flag bytes with byte stuffing. (c) Starting and ending flag bytes,
with bit stuffing.
9. Using only the data given in the text, what is the maximum number of telephones that
the existing U.S. system can support without changing the numbering plan or adding
additional equipment? Could this number of telephones actually be achieved? For
purposes of this problem, a computer or fax machine counts as a telephone. Assume
there is only one device per subscriber line.
10. Suppose that a message has been encrypted using DES in ciphertext block
chaining mode. One bit of ciphertext in block Ci is accidentally transformed from a 0 to a
1 during transmission. How much plaintext will be garbled as a result?
Suppose that a system uses PKI based on a tree-structured hierarchy of CAs. Alice
wants to communicate with Bob, and receives a certificate from Bob signed by a CA X
after establishing a communication channel with Bob. Suppose Alice has never heard of
X. What steps does Alice take to verify that she is talking to Bob?

You might also like