Sie sind auf Seite 1von 6

Master Informatique 1styear 1stterm

Anonymous ID: stick number

HERE

3. Why did the server answer to the command LIST with two dierent codes during the exchange? Are those codes positive
or negative? What is the role of the PASV command (first occurrence)? Did it influence the execution of the second
LIST command? Explain.

ARes/ComNet 2014-2015

App

Final exam : Version A in English

App

Duration: 2h00
Allowed: One handwritten A4 sheet (front and back)
Forbidden: All other documents, pocket calculators, mobile phones, etc.

The exam consists of 3 sheets recto/verso, including the questions and spaces in which to write your answers. You must hand
back only these sheets at the end of the exam. To ensure anonymity, you must not write your name on the exam. Be absolutely
sure that the anonymous ID number assigned to you by the exam supervisors appears on each sheet.

Used to ask the server to send back a list of all the files in the current remote directory. The list of files is sent over a (new and non-persistent) data connection
rather than the control TCP connection.
Without PORT or PASV command data connection will not establish. there for 1st LIST command failure, 2nd be success due to PASV have set data connection

4. In the second PASV command, the server answers: 227 Entering Passive Mode (156,42,2,1,10,29). Explain the content
of the answer. What are the IP address and the port number on which the server is passively expecting a new connection?
(Provide details.)
That mean FTP enter Passive mode with
IP: 156.42.2.1
PORT: 10*256+29

You must write your answers in the frames provided for that purpose.

Master Informatique 1styear 1stterm

Applications (7 points)

5. On his Web browser, the user requests the following URL ftp://admin:$passwd$@ftp.srv.net:21/root/folder.
What application layer commands will the browser invoke for this URL? What transport-layer mechanism is used to deduce
that the command has to be interpreted by the application layer?

The following presents the messages exchanged between a user and a server:

FTP Protocol
Application transmit their data to system via socket
mux (at the sender): #add header to each block of data at a socket #collect data from several sockets
demux (at the receiver): provide the data to the correct socket

220 Welcome to ftp.srv.net.


USER admin
331 Please specify the password.
PASS $passwd$
230 Login successful.
SYST
215 UNIX Type: L8
LIST
425 Cant build data connection: Connection refused.
PASV
227 Entering Passive Mode (156,42,2,1,10,28).
LIST
150 Here comes the directory listing.
226 Directory send OK.
TYPE I
200 Switching to Binary mode.
PASV
227 Entering Passive Mode (156,42,2,1,10,29).
RETR hello
150 Opening BINARY mode data connection for hello (2620 bytes).
226 File send OK.
QUIT
221 Goodbye.

We now capture the following exchange between another user and a server. The frame is detailed below a message if necessary.
00:00:00.000000
00:00:00.003444
Frame { 0x0000:
0x0010:
0x0020:
00:00:02.661644
00:00:00.004601
Frame { 0x0000:
0x0010:
0x0020:
00:00:00.097286

IP 192.168.1.32.46679 > 192.168.1.12.69: 16 RRQ "hell" netascii


IP 192.168.1.12.46486 > 192.168.1.32.46679: UDP, length 19
4500 002f ef8f 4000 4011 c7b1 c0a8 010c E../..@.@.......
c0a8 0120 b596 b657 001b cf55 0005 0001 .......W...U....
4669 6c65 206e 6f74 2066 6f75 6e64 00
File.not.found. }
IP 192.168.1.32.41722 > 192.168.1.12.69: 17 RRQ "hello" netascii
IP 192.168.1.12.37595 > 192.168.1.32.41722: UDP, length 17
4500 002d f168 4000 4011 c5da c0a8 010c E..-.h@.@.......
c0a8 0120 92db a2fa 0019 ab8e 0003 0001 ................
6865 6c6c 6f20 7466 7470 640d 0a
hello.tftpd.. }
IP 192.168.1.32.41722 > 192.168.1.12.37595: UDP, length 4

6. What is the application that is now used? Justify.


Dest Port = 69 => TFTP application protocol

1. Which application-layer protocols are used by the user in the exchange above? Which additional application, not illustrated
in this exchange, is mandatory at the beginning of the exchange? Explain why.
FTP application protocol,
Additional Appilication (ProFTPD/ WinSCP/FileZilla FTP) is NOT mandatory due to, it does not matter effect to FTP
protocol

2. What is the identity of the user of this application? Explain whether he or she is authenticated by the server or not. If yes,
is the password clear or encrypted when sent to the server, and why? Are there users of this service who do not need to
authenticate themselves? Who are they?

7. What are the main dierences between the first application and the second for file transfer? What are the transport protocols
used for each application?
* Out-of band protocol vs In band protocol
* transport protocol: FTP use TCP, TFTP use UDP

8. Is the file hell present on the server or not? Justify. Is the file hello of the first exchange the same as the file hello
requested in the second exchange? Explain.
* RRQ hell: read request to server , server response File not found
1st exchange: RRQ hello read request, 2ns exchange: server send hello file to client

identity: admin; Yes, Authenticated server due to server response "230 Login successful"
password : $passwd$, without encrypt due to access control of FPT character "Password is clear type"

* FTP provide "anonymous" user don't need to authenticate. but has some restricted access.
https://tools.ietf.org/html/rfc1635
1/12

Version X2-2014-en-vA-b

2/12

Version X2-2014-en-vA-b

Master Informatique 1styear 1stterm

Anonymous ID: stick number

HERE

Master Informatique 1styear 1stterm


2. Provide the routing table for Router X.

ARes/ComNet 2014-2015

Trp

Final exam : Version A in English


Duration: 2h00
Allowed: One handwritten A4 sheet (front and back)
Forbidden: All other documents, pocket calculators, mobile phones, etc.

Trp

The exam consists of 3 sheets recto/verso, including the questions and spaces in which to write your answers. You must hand
back only these sheets at the end of the exam. To ensure anonymity, you must not write your name on the exam. Be absolutely
sure that the anonymous ID number assigned to you by the exam supervisors appears on each sheet.
You must write your answers in the frames provided for that purpose.

Network layer (6.5 points)

You are to determine the addressing for the TCP/IP network for a company. The network has LANs at three locations, as shown
in the topology below:
X

eth0

LAN A (25 hosts)


ppp0

ppp1

eth0

LAN B (10 hosts)

ppp0

ppp0
ppp2

eth1

Internet

LAN C (10 hosts)


ppp0

eth0

LAN D (25 hosts)

3. In what way can Router Xs routing table be optimized for this topology?

1. You must allocate addresses from the beginning of the CIDR prefix 83.1.0.0/23. Decide upon an addressing scheme for
this network that uses the smallest possible block of addresses for this topology. Indicate in a table, with one line for each
subnetwork of this network:
the subnet prefix and prefix size
the subnet mask

the broadcast address

3/12

Version X2-2014-en-vA-b

4/12

Version X2-2014-en-vA-b

Master Informatique 1styear 1stterm

Anonymous ID: stick number

HERE

Final exam : Version A in English

Serveur

01

Frm

Duration: 2h00
Allowed: One handwritten A4 sheet (front and back)
Forbidden: All other documents, pocket calculators, mobile phones, etc.

8,9

The exam consists of 3 sheets recto/verso, including the questions and spaces in which to write your answers. You must hand
back only these sheets at the end of the exam. To ensure anonymity, you must not write your name on the exam. Be absolutely
sure that the anonymous ID number assigned to you by the exam supervisors appears on each sheet.

02

6. Two segments with the bit PSH set can be seen (One
at the beginning and the other at the end of the trace).
What is their use?

9,1
0304

The sending application informs TCP that data


should be sent immediately.
The PSH flag in the TCP header informs the
receiving host that the data should be pushed up
to the receiving application immediately.

You must write your answers in the places provided for that purpose.

Client
8,7

RTT = 09.75555 - 08.701077

ARes/ComNet 2014-2015

Frm

Master Informatique 1styear 1stterm

TCP Analysis: (6.5 points)

9,3

Using TCP traces provided in Appendix page 7, answer the following questions systematically justifying all your answers.

9,5
1. What is the client address? What is the server address?
7. During the data transmission, the TCP segments always
carry 2 nop options. What is their use?

Client 10.1.1.1
Server 20.20.20.2

9,7

0. End of option list (if needed)


1. No Operation (padding)
2. Negotiate MSS
3. adaptation of window size
4. Selective ACK
8. Timestamp

2. Which user action at the client side could have initiated


this trace?
# 3way handshake with SYN

NOP used for padding.


TCP padding used to ensure TCP header end
and data begin with 32 bit boundary

9,9

10,1
8. An MSS value of 1460 bytes is exchanged during the
connection setup. Why, in the remainder of the trace,
do data segments have a maximum payload size of
1448 bytes?

10,3

1460 without TCP Option


1448 with TCP Option

10,5

3. The snier used to make this capture close to the client


or to the server?

10,7
# Client side: due to 10.1.1.1 is private IP, can
not see if sniffer closed server side.

9. What is the average user rate during this exchange?

10,9

11,1

4. Four options, other than nop or eol, are exchanged during the connection setup. Enumerate them and describe
their general use and their specific interest in the analyzed trace

5. What is the value of the observed RTT at the beginning


of the connexion?
5/12

Version X2-2014-en-vA-b

temps
(s)
11,3

10. Complete the following exchange chronogram, carefully


respecting of the proposed timescale:
6/12

Version X2-2014-en-vA-b

Dont hand back this sheet!

Dont hand back this sheet!

Appendix: TCP Trace


Fields in the trace below: [#] frame number in the capture; [1] time relative to the beginning of the capture (in seconds); [2] IPv4address:source port;
[3] IPv4address:destination port; [4] bits S (SYN), P (PSH) et F (FIN); [5] relative sequence number followed by the amount of sent data between ()
(this field may be omitted if not needed); [6] acknowledgement number (preceded by ack) if the bit ACK is set; [7] window value (preceded by win);
[8] options between <>.
[#]
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62

[1]
08.701077
09.075550
09.075614
09.075732
09.449701
09.487598
09.487605
09.487610
09.487730
09.487842
09.870727
09.870734
09.870739
09.870746
09.870751
09.870889
09.870957
09.871096
10.247564
10.258562
10.258566
10.258569
10.258573
10.258578
10.258582
10.258586
10.258648
10.258681
10.529728
10.529879
10.800725
10.800728
10.800731
10.800735
10.800738
10.800741
10.800744
10.800749
10.800752
10.800755
10.800841
10.800876
10.800899
10.800952
11.119758
11.119764
11.119769
11.119776
11.119781
11.119788
11.119793
11.119799
11.119805
11.119810
11.119956
11.120042
11.124704
11.124711
11.124716
11.124832
11.126764
11.398554

[2]
10.1.1.1:2000
20.20.20.2:80
10.1.1.1:2000
10.1.1.1:2000
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
10.1.1.1:2000
10.1.1.1:2000
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
10.1.1.1:2000
10.1.1.1:2000
10.1.1.1:2000
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
10.1.1.1:2000
10.1.1.1:2000
20.20.20.2:80
10.1.1.1:2000
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
10.1.1.1:2000
10.1.1.1:2000
10.1.1.1:2000
10.1.1.1:2000
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
10.1.1.1:2000
10.1.1.1:2000
20.20.20.2:80
20.20.20.2:80
20.20.20.2:80
10.1.1.1:2000
10.1.1.1:2000
20.20.20.2:80

>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>

[3]
[4][5] [6]
[7]
[8]
20.20.20.2:80 S 0(0)
win 65535 <mss 1460,nop,wscale 3,nop,nop,timestamp 373 0,sackOK,eol>
10.1.1.1:2000 S 0(0) ack 0 win 5792 <mss 1460,sackOK,timestamp 6552 373,nop, wscale 7>
20.20.20.2:80 . ack 1 win 65535 <nop,nop,timestamp 376 6552>
20.20.20.2:80 P 1(586) ack 1 win 65535 <nop,nop,timestamp 376 6552>
10.1.1.1:2000 . ack 587 win 55 <nop,nop,timestamp 6926 376>
10.1.1.1:2000 . 1(1448) ack 587 win 55 <nop,nop,timestamp 6953 376>
10.1.1.1:2000 . 1449(1448) ack 587 win 55 <nop,nop,timestamp 6953 376>
10.1.1.1:2000 . 2897(1448) ack 587 win 55 <nop,nop,timestamp 6953 376>
20.20.20.2:80 . ack 2897 win 65341 <nop,nop,timestamp 380 6953>
20.20.20.2:80 . ack 4345 win 65535 <nop,nop,timestamp 380 6953>
10.1.1.1:2000 . 4345(1448) ack 587 win 55 <nop,nop,timestamp 7336 380>
10.1.1.1:2000 . 5793(1448) ack 587 win 55 <nop,nop,timestamp 7336 380>
10.1.1.1:2000 . 7241(1448) ack 587 win 55 <nop,nop,timestamp 7336 380>
10.1.1.1:2000 . 8689(1448) ack 587 win 55 <nop,nop,timestamp 7338 380>
10.1.1.1:2000 . 10137(1448) ack 587 win 55 <nop,nop,timestamp 7338 380>
20.20.20.2:80 . ack 5793 win 65522 <nop,nop,timestamp 384 7336>
20.20.20.2:80 . ack 8689 win 65160 <nop,nop,timestamp 384 7336>
20.20.20.2:80 . ack 11585 win 65535 <nop,nop,timestamp 384 7338>
10.1.1.1:2000 . 11585(1448) ack 587 win 55 <nop,nop,timestamp 7721 384>
10.1.1.1:2000 . 13033(1448) ack 587 win 55 <nop,nop,timestamp 7721 384>
10.1.1.1:2000 . 14481(1448) ack 587 win 55 <nop,nop,timestamp 7721 384>
10.1.1.1:2000 . 15929(1448) ack 587 win 55 <nop,nop,timestamp 7721 384>
10.1.1.1:2000 . 17377(1448) ack 587 win 55 <nop,nop,timestamp 7721 384>
10.1.1.1:2000 . 18825(1448) ack 587 win 55 <nop,nop,timestamp 7722 384>
10.1.1.1:2000 . 20273(1448) ack 587 win 55 <nop,nop,timestamp 7722 384>
10.1.1.1:2000 . 21721(1448) ack 587 win 55 <nop,nop,timestamp 7722 384>
20.20.20.2:80 . ack 21721 win 64617 <nop,nop,timestamp 388 7721>
20.20.20.2:80 . ack 23169 win 64948 <nop,nop,timestamp 388 7722>
10.1.1.1:2000 . 23169(1448) ack 587 win 55 <nop,nop,timestamp 7953 388>
20.20.20.2:80 . ack 24617 win 65522 <nop,nop,timestamp 390 7953>
10.1.1.1:2000 . 24617(1448) ack 587 win 55 <nop,nop,timestamp 8193 393>
10.1.1.1:2000 . 26065(1448) ack 587 win 55 <nop,nop,timestamp 8193 393>
10.1.1.1:2000 . 27513(1448) ack 587 win 55 <nop,nop,timestamp 8193 393>
10.1.1.1:2000 . 28961(1448) ack 587 win 55 <nop,nop,timestamp 8193 393>
10.1.1.1:2000 . 30409(1448) ack 587 win 55 <nop,nop,timestamp 8193 393>
10.1.1.1:2000 . 31857(1448) ack 587 win 55 <nop,nop,timestamp 8193 393>
10.1.1.1:2000 . 33305(1448) ack 587 win 55 <nop,nop,timestamp 8193 393>
10.1.1.1:2000 . 34753(1448) ack 587 win 55 <nop,nop,timestamp 8193 393>
10.1.1.1:2000 . 36201(1448) ack 587 win 55 <nop,nop,timestamp 8193 393>
10.1.1.1:2000 . 37649(1448) ack 587 win 55 <nop,nop,timestamp 8193 393>
20.20.20.2:80 . ack 27513 win 65341 <nop,nop,timestamp 395 8193>
20.20.20.2:80 . ack 30409 win 64979 <nop,nop,timestamp 395 8193>
20.20.20.2:80 . ack 33305 win 65129 <nop,nop,timestamp 395 8193>
20.20.20.2:80 . ack 39097 win 64917 <nop,nop,timestamp 395 8193>
10.1.1.1:2000 . 39097(1448) ack 587 win 55 <nop,nop,timestamp 8408 395>
10.1.1.1:2000 . 40545(1448) ack 587 win 55 <nop,nop,timestamp 8408 395>
10.1.1.1:2000 . 41993(1448) ack 587 win 55 <nop,nop,timestamp 8408 395>
10.1.1.1:2000 . 43441(1448) ack 587 win 55 <nop,nop,timestamp 8408 395>
10.1.1.1:2000 . 44889(1448) ack 587 win 55 <nop,nop,timestamp 8408 395>
10.1.1.1:2000 . 46337(1448) ack 587 win 55 <nop,nop,timestamp 8408 395>
10.1.1.1:2000 . 47785(1448) ack 587 win 55 <nop,nop,timestamp 8408 395>
10.1.1.1:2000 . 49233(1448) ack 587 win 55 <nop,nop,timestamp 8408 395>
10.1.1.1:2000 . 50681(1448) ack 587 win 55 <nop,nop,timestamp 8408 395>
10.1.1.1:2000 . 52129(1448) ack 587 win 55 <nop,nop,timestamp 8408 395>
20.20.20.2:80 . ack 46337 win 64798 <nop,nop,timestamp 397 8408>
20.20.20.2:80 . ack 52129 win 64586 <nop,nop,timestamp 397 8408>
10.1.1.1:2000 . 53577(1448) ack 587 win 55 <nop,nop,timestamp 8408 395>
10.1.1.1:2000 . 55025(1448) ack 587 win 55 <nop,nop,timestamp 8408 395>
10.1.1.1:2000 FP 56473(893) ack 587 win 55 <nop,nop,timestamp 8408 395>
20.20.20.2:80 . ack 57367 win 65229 <nop,nop,timestamp 397 8408>
20.20.20.2:80 F 587(0) ack 57367 win 65535 <nop,nop,timestamp 397 8408>
10.1.1.1:2000 . ack 588 win 55 <nop,nop,timestamp 8775 397>

7/12

Version X2-2014-en-vA-b

8/12

Version X2-2014-en-vA-b

Dont hand back this sheet!

9/12

Dont hand back this sheet!

Version X2-2014-en-vA-b

10/12

Version X2-2014-en-vA-b

Dont hand back this sheet!

11/12

Dont hand back this sheet!

Version X2-2014-en-vA-b

12/12

Version X2-2014-en-vA-b

Das könnte Ihnen auch gefallen