Beruflich Dokumente
Kultur Dokumente
Name:
This is a homework assignment for CSE 4344, Computer Networks and Distributed Systems I. This homework is due on
15 September 2015 at the beginning of the class period. Print out this document, and unless directed otherwise, hand write
your answer to a question in the white space under the question. Hand in your completed homework assignment in hard copy
form at the beginning of class. All electronic documents requested to be handed in should be emailed to the instructor prior
to the class in which this homework is due unless otherwise instructed.
Collaboration is expected and encouraged; however, each student must hand in their own homework assignment. To the
greatest extent possible, answers should not be copied but, instead, should be written in your own words. Copying answers
from anywhere is plagiarism, this includes copying text directly from the textbook. Do not copy answers. Always use your
own words. Directly under each question list all persons with whom you collaborated and list all resources used in arriving at
your answer. Resources include but are not limited to the textbook used for this course, papers read on the topic, and Google
search results. Dont forget to place your name on every page.
Collaborators:
Resources:
NAME:
Question 2 :
Collaborators:
Resources:
What is the difference between a circuit-switched computer network and a packet switch
computer network? What are the advantages of each? What are the disadvantages of
each? Be as specific as possible. [Hint: Use a table to compare and contrast.] [Note:
Discuss only computer networks in your answer. Do not discuss telephone networks (the
example given in the textbook). While circuit-switched networks are traditionally used
in the wired telephony market, circuit-switched networks (typically virtual circuits) can
be used in computer networks as well.]
NAME:
Question 3 :
Collaborators:
Resources:
Perform the HW1-Lab. For all of the material required to be turned in as stated in that
lab, turn in that material with this homework.
NAME:
Question 4 :
Collaborators:
Resources:
Why is a layered model used in network design? What are the five layers in the network
model? Describe the functionality that occurs at each layer. Identify the addresses used
at each layer (if any) and describe to what that address refers.
NAME:
Question 5 :
Collaborators:
Resources:
Use the traceroute command to map the routers and networks of the world. Based upon
the routes you identify, graphically represent the network topology and indicate in some
way the links in the network that were most traveled in your traceroutes. Be complete
and have traceroutes to every continent. Be creative in your presentation. A pretty color
picture is likely to be more understandable than a black and white picture with lots of
words and numbers. Hand in a hard copy of your network picture. [Note: You should do
at least 30 traceroute to the various corners of the world. Note that traceroute does not
work on the Lyle computer network, but it does work on Perunanet. You may also use
http://traceroute.org for your trace route functions.]
NAME:
Question 6 :
Collaborators:
Resources:
With regards to Chapter 1 of Tanenbaum and Wetheral, what single concept or idea did
you find most confusing or difficult? If nothing was confusing or difficult, what did you
find of most interest? Write at least four sentences.
NAME:
Security
Question 7 :
Collaborators:
Resources:
Define the term symmetric key algorithm. Illustrate and describe all the steps involved in
encrypting and decrypting the plaintext Networks Rule using a Caesar Cipher with a
key value of 5. Begin by stating the mathematical formula used by the cipher. Be sure
to clearly identify the cipher text generated from encryption.
NAME:
Question 8 :
Collaborators:
Resources:
A symmetric key cipher must be used in a secure manner to minimize the probability
that the secret key will be discovered by an attacker. The manner in which a symmetric
key cipher is used is referred to as the mode of operation. For the five cipher modes
discussed in the textbook (Section 8.2.3), in one or two sentences describe how each
mode works and draw a diagram illustrating both the encryption and decryption process
for each mode. For each mode, describe how an attacker might exploit that mode for
some purpose. Be as specific as you can.
NAME:
Question 9 :
Collaborators:
Resources:
Describe how a digital signature is created using a public key cipher. Why is this safe?
NAME:
Question 10 :
Collaborators:
Resources:
With regards to Chapter 8 of Tanenbaum and Wetheral, what single concept or idea did
you find most confusing or difficult? If nothing was confusing or difficult, what did you
find of most interest? Write at least four sentences.
10