The following scenario provides the background for all questions in this exam pa
ID: 3907469 • Letter: T
Question
The following scenario provides the background for all questions in this exam paper. You are the Network Architect for a major International Relief Agency; your role is to design the network architectures used by yourAgency in its day to day operation, and to design and implement ad-hoc network capability that will be used at disaster locations in times of crisis. You are typically based in Australia but in times of international crisis, you may be required to lead an implementation and operational team at or near the site of a disaster. You were the lead network architect for an earthquake early-warning detection system used in Asia and South America; a major earthquake, above M8, has struck a remote part ofthe Pacific Coast of Chile and it appears that the early-warning detection system did not provide any advance notice. While your ReliefAgency is attempting to understand why the early-warning detection system apparently failed, it is also attempting to mount a relief operation and it is also experiencing a significant cyber-attack that is causing significant interruption to its warehousing systems and to the operational communication systems to partner Agencies in Chile. Partner ReliefAgencies in Chile and other parts of the world are attempting to deliver supplies, rescue equipment and rebuild a communications environment, but they are also experiencing cyber-attacks in Chile.
Q-3
Consider the scenario where, as part of the relief operation, your Relief Agency is connected to a large ISP in Australia; significant volumes of traffic are originating from other Agencies as well as your Agency and are traversing the same ISP’s network with end-points managed by different ISPs. It appears that the cyber-attacks may be originating from within another Relief Agency.
a) Describe the techniques that your Agency can implement to ensure that its traffic receives highest priority and is the least affected by the cyber-attacks
b) If MPLS-Te traffic is traversing the network, describe how the traffic flow and signalling differs from a non-MPLS network and what happens to the traffic if MPLS-TE is not honoured
c) Describe why peering agreements in an MPLS network may not provide you with sufficient defence from the cyber-attacks
d) Describe the operation of an L3 VPN and compare it to the operation of an MPLS tunnel
Explanation / Answer
a)
MPLS-TE (Multi protocol label switching traffic engineering) can be used to receive highest priority in a bandwidth provided bu an ISP.
The MPLS allows to differentiate the services provided by a network and thus the priority can be obtained in the network or the cyber attacks can be defended to an extent.
The usage of VPN is also enabled to get priority in a network, using the VPN a virtual network can be developed, thus the bandwidth will be allocated for the users. Thus it enables to get the priority in the network and using a virtually dedicated channel, the cyber attacks can also be reduced.
b)
If the MPLS-TE incorporated in a network the traffic flow can be categorized to various users, even though no physical allocation is there a virtual allocation will be established through MPLS.
The performance of layer-2 switching and layer-3 routing scalability is used to develop a robust network.
More reliable network enables more congestion free traffic flow.
The existing network capabilities are used to establish the MPLS TE also, thus if MPLS-TE is not honored, then the network reliability will be reduced, since the network failure can be occured.
c)
Peering agreements allows using other ISP bandwidth.
Thus mixing of various ISP packets will reduce the security of the packet, since the network changes are required to make such an agreement.
Sending packets through a populated or rushed network will result in packet loss and this will enhance the attacks, thus cyber security will be under threat.
d)
The L3 VPN uses an encryption and encapsulation while send through the networks.
Thus the IP packet used in L3_VPN is well encapsulated and encrypted.
The labelling technology is used in the MPLS-TE technology, this produces the difference used by the two technologies.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.