It4128 Abordo
It4128 Abordo
It4128 Abordo
MODULE 1:
1. Give five types of hardware resource and five types of data or software resource that can
usefully be shared. Give examples of their sharing as it occurs in practice in distributed
systems.
When they needed to request responses from back end servers the web server would use a
message queue to place the request on the appropriate queue to reduce communication delays The
back end servers would monitor their queue and pull a request for processing. The response
would be put on a queue for the web server to be able to finish and post a response back to the
original requester.
MODULE 2:
1. A search engine is a web server that responds to client requests to search in its stored
indexes and (concurrently) runs several web crawler tasks to build and update the indexes.
What are the requirements for synchronization between these concurrent activities?
The crawler tasks could build partial indexes to new pages incrementally, then merge them with
the active index (including deleting invalid references). This merging operation could be done on
an off-line copy. Finally, the environment for processing client requests is changed to access the
new index. The latter might need some concurrency control, but in principle it is just a change to
one reference to the index which should be atomic.
2. Describe possible occurrences of each of the main types of security threat (threats to
processes, threats to communication channels, denial of service) that might occur in the
Internet.
Threats to processes: without authentication of principals and servers, many threats exist. An
enemy could access other user’s files or mailboxes, or set up ‘spoof’ servers. E.g. a server could
be set up to ‘spoof’ a bank’s service and receive details of user’s financial transactions. Threats to
communication channels: IP spoofing - sending requests to servers with a false source address,
man-in-the-middle attacks. Denial of service: flooding a publicly-available service with irrelevant
messages.
3. List the types of local resource that are vulnerable to an attack by an untrusted program that is
downloaded from a remote site and run in a local computer.
Objects in the file system e.g. files, directories can be read/written/created/deleted using
the rights of the local user who runs the program
Network communication - the program might attempt to create sockets, connect to them,
send messages etc.
Access to printers.
It may also impersonate the user in various ways, for example, sending/receiving email.
MODULE 3:
a) The Internet is far too large for any router to hold routing information for all destinations. How
does the Internet routing scheme deal with this issue?
If a router does not find the network id portion of a destination address in its routing table, it
dispatches the packet to a default address an adjacent gateway or router that is designated as
responsible for routing packets for which there is no routing information available. Each router’s
default address carries such packets towards a router than has more complete routing information,
until one is encountered that has a specific entry for the relevant network id.
b) Describe how you would configure a firewall to protect the local network at your institution or
company. What incoming and outgoing requests should it intercept?
If an attacker is able to gain administrative access to your firewall it is “game over” for your network
security. Therefore, securing your firewall is the first and most important step of this process. Never
put a firewall into production that is not properly secured by at least the following configuration
actions:
a) in a single Ethernet?
The single internet is a simple which uses the transmission medium to pass the singles even
though all the message in broadcasting are handled by the operating system or by standard
process.
An Ethernet connection is known as 'wired' and is quicker and more secure than Wi-Fi. A
disadvantage is that the Ethernet cable connecting the computer and router needs to be in
place at all times.
b) in an intranet?
Broadcasting is hardly feasible in a large-scale network such as the Internet. It might just be
possible in an intranet, but ought to be avoided for the reasons given above.
Ethernet multicast addresses are matched in the Ethernet controller. Multicast message are
passed up to the OS only for addresses that match multicast groups the local host is
subscribing to. If there are several such, the address can be used to discriminate between
several daemon processes to choose one to handle each message.