Sie sind auf Seite 1von 10

CSE 4344

Computer Networks and Distributed Systems I


Homework
Due 15 Sept 2015

Name:
This is a homework assignment for CSE 4344, Computer Networks and Distributed Systems I. This homework is due on
15 September 2015 at the beginning of the class period. Print out this document, and unless directed otherwise, hand write
your answer to a question in the white space under the question. Hand in your completed homework assignment in hard copy
form at the beginning of class. All electronic documents requested to be handed in should be emailed to the instructor prior
to the class in which this homework is due unless otherwise instructed.
Collaboration is expected and encouraged; however, each student must hand in their own homework assignment. To the
greatest extent possible, answers should not be copied but, instead, should be written in your own words. Copying answers
from anywhere is plagiarism, this includes copying text directly from the textbook. Do not copy answers. Always use your
own words. Directly under each question list all persons with whom you collaborated and list all resources used in arriving at
your answer. Resources include but are not limited to the textbook used for this course, papers read on the topic, and Google
search results. Dont forget to place your name on every page.

Network Components and Models


Question 1 :

Collaborators:
Resources:

An alternative to a LAN is simply a big client-server timesharing system with users


connecting to the server via client terminals. Compare and contrast the advantages and
disadvantages of a LAN versus a big client-server system. Provide at least two advantages
and two disadvantages for each. [Hint: Use a table to organize your advantages and
disadvantages.]

NAME:

Question 2 :

Collaborators:
Resources:

CSE 4344 HOMEWORK DUE 5 FEB 2015

What is the difference between a circuit-switched computer network and a packet switch
computer network? What are the advantages of each? What are the disadvantages of
each? Be as specific as possible. [Hint: Use a table to compare and contrast.] [Note:
Discuss only computer networks in your answer. Do not discuss telephone networks (the
example given in the textbook). While circuit-switched networks are traditionally used
in the wired telephony market, circuit-switched networks (typically virtual circuits) can
be used in computer networks as well.]

NAME:

Question 3 :
Collaborators:
Resources:

CSE 4344 HOMEWORK DUE 5 FEB 2015

Perform the HW1-Lab. For all of the material required to be turned in as stated in that
lab, turn in that material with this homework.

NAME:

Question 4 :

Collaborators:
Resources:

CSE 4344 HOMEWORK DUE 5 FEB 2015

Why is a layered model used in network design? What are the five layers in the network
model? Describe the functionality that occurs at each layer. Identify the addresses used
at each layer (if any) and describe to what that address refers.

NAME:

Question 5 :

Collaborators:
Resources:

CSE 4344 HOMEWORK DUE 5 FEB 2015

Use the traceroute command to map the routers and networks of the world. Based upon
the routes you identify, graphically represent the network topology and indicate in some
way the links in the network that were most traveled in your traceroutes. Be complete
and have traceroutes to every continent. Be creative in your presentation. A pretty color
picture is likely to be more understandable than a black and white picture with lots of
words and numbers. Hand in a hard copy of your network picture. [Note: You should do
at least 30 traceroute to the various corners of the world. Note that traceroute does not
work on the Lyle computer network, but it does work on Perunanet. You may also use
http://traceroute.org for your trace route functions.]

NAME:

Question 6 :

Collaborators:
Resources:

CSE 4344 HOMEWORK DUE 5 FEB 2015

With regards to Chapter 1 of Tanenbaum and Wetheral, what single concept or idea did
you find most confusing or difficult? If nothing was confusing or difficult, what did you
find of most interest? Write at least four sentences.

NAME:

CSE 4344 HOMEWORK DUE 5 FEB 2015

Security
Question 7 :

Collaborators:
Resources:

Define the term symmetric key algorithm. Illustrate and describe all the steps involved in
encrypting and decrypting the plaintext Networks Rule using a Caesar Cipher with a
key value of 5. Begin by stating the mathematical formula used by the cipher. Be sure
to clearly identify the cipher text generated from encryption.

NAME:

Question 8 :

Collaborators:
Resources:

CSE 4344 HOMEWORK DUE 5 FEB 2015

A symmetric key cipher must be used in a secure manner to minimize the probability
that the secret key will be discovered by an attacker. The manner in which a symmetric
key cipher is used is referred to as the mode of operation. For the five cipher modes
discussed in the textbook (Section 8.2.3), in one or two sentences describe how each
mode works and draw a diagram illustrating both the encryption and decryption process
for each mode. For each mode, describe how an attacker might exploit that mode for
some purpose. Be as specific as you can.

NAME:

Question 9 :
Collaborators:
Resources:

CSE 4344 HOMEWORK DUE 5 FEB 2015

Describe how a digital signature is created using a public key cipher. Why is this safe?

NAME:

Question 10 :

Collaborators:
Resources:

CSE 4344 HOMEWORK DUE 5 FEB 2015

With regards to Chapter 8 of Tanenbaum and Wetheral, what single concept or idea did
you find most confusing or difficult? If nothing was confusing or difficult, what did you
find of most interest? Write at least four sentences.

10

Das könnte Ihnen auch gefallen