EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 2, Problem P26P
a)
Program Plan Intro
Given Information:
Bob joins a BitTorrent torrent. Bob does not want to upload any data to other peers which is called free riding.
Bob claims that he can receive a complete copy of the file that is shared by the swarm.
b)
Program Plan Intro
Given Information:
Bob joins a BitTorrent torrent. Bob does not want to upload any data to other peers which is called free riding.
Bob claims that he can further make his “free-riding” more efficient by using a collection of multiple computers with distinct IP addresses in the computer lab in his department.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Https is a protocol used to secure websites from being tampered with by other parties without proper authorization. it bridges the gap between sender and receiver.Using protocols like secure socket layer/TLS, HTTPS encrypts data sent over the internet, making it unreadable to anybody who shouldn't have it.This prevents a "man in the middle" assault on the system.Such assaults intercept messages before they reach their intended recipient.It then transmits the revised information to the user.It guarantees the server's authenticity, too.
In the BitTorrent P2P file distribution protocol, the seed breaks the file into blocks, and the peers redistribute the blocks to each other. Without any protection, an attacker can easily wreak havoc in a torrent by masquerading as a benevolent peer and sending bogus blocks to a small subset of peers in the torrent. These unsuspecting peers then redistribute the bogus blocks to other peers, which in turn redistribute the bogus blocks to even more peers. Thus, it is critical for BitTorrent to have a mechanism that allows a peer to verify the integrity of a block, so that it doesn’t redistribute bogus blocks. Assume that when a peer joins a torrent, it initially gets a .torrent file from a fully trusted source. Describe a simple scheme that allows peers to verify the integrity of blocks.
The token bucket algorithm is a popular method for traffic shaping (recapthe algorithm in textbook Ch. 5.3.2). A computer uses a token bucket with a capacity of 400megabytes (MB), and a rate of 10 MB per second. The machine starts generating 20 MB persecond continuously when the bucket contains 200 MB. How long will it take to send 1000 MB?
Chapter 2 Solutions
EBK COMPUTER NETWORKING
Ch. 2 - List five nonproprietary Internet applications and...Ch. 2 - Prob. R2RQCh. 2 - Prob. R3RQCh. 2 - Prob. R4RQCh. 2 - Prob. R5RQCh. 2 - Prob. R6RQCh. 2 - Prob. R7RQCh. 2 - Prob. R8RQCh. 2 - Prob. R9RQCh. 2 - Prob. R10RQ
Ch. 2 - Why do HTTP, SMTP, and POP3 run on top of TCP...Ch. 2 - Prob. R12RQCh. 2 - Prob. R13RQCh. 2 - Prob. R14RQCh. 2 - Prob. R15RQCh. 2 - Prob. R16RQCh. 2 - Prob. R17RQCh. 2 - From a users perspective, what is the difference...Ch. 2 - Prob. R19RQCh. 2 - Prob. R20RQCh. 2 - Prob. R21RQCh. 2 - Prob. R22RQCh. 2 - Prob. R23RQCh. 2 - Prob. R24RQCh. 2 - Prob. R25RQCh. 2 - In Section 2.7, the UDP server described needed...Ch. 2 - Prob. R27RQCh. 2 - Prob. P1PCh. 2 - Prob. P2PCh. 2 - Prob. P3PCh. 2 - Prob. P4PCh. 2 - Prob. P5PCh. 2 - Prob. P6PCh. 2 - Prob. P7PCh. 2 - Prob. P8PCh. 2 - Prob. P9PCh. 2 - Prob. P10PCh. 2 - Prob. P11PCh. 2 - Prob. P13PCh. 2 - Prob. P14PCh. 2 - Prob. P15PCh. 2 - Prob. P16PCh. 2 - Prob. P17PCh. 2 - Suppose you can access the caches in the local DNS...Ch. 2 - Prob. P21PCh. 2 - Prob. P22PCh. 2 - Prob. P23PCh. 2 - Prob. P25PCh. 2 - Prob. P26PCh. 2 - Prob. P27PCh. 2 - Prob. P28PCh. 2 - Prob. P29PCh. 2 - Prob. P30PCh. 2 - Prob. P31PCh. 2 - Prob. P32P
Knowledge Booster
Similar questions
- Over a network using WEP, we were able to capture two frames with the sameInitialization Vector (IV). The following are the encrypted messages:• First frame encrypted message:1 0 0 1 0 0 1 0 1 0 1 1 0 0 0 0 0 1 1 1 0 1 0 1 1 0 0 1 0 1 1 1 1 0 1 1 0 1 1 0 1 0 0 11 1 1 1 1 0 0 1 0 0 0 1 0 0 1 1 1 0 0 0• Second frame encrypted message:1 1 0 0 0 0 0 1 1 1 1 0 0 0 0 1 0 0 1 1 0 1 1 1 1 1 0 0 1 0 1 1 1 1 1 0 0 0 1 1 1 1 0 11 0 1 0 1 1 0 0 1 1 0 0 0 1 1 0 1 1 1 0We also know that one of the messages is a control message with the following plaintext content:0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 0 0 01 0 0 1 1 0 0 1 0 0 0 1 1 1 0 0 01. Find the plaintext of the other message.2. If the captured messages were from two different stations on a network that usesTKIP, is it possible to find the plaintext of the other message? Explain why orwhy not possible.arrow_forwardIn cryptography, the Caesar cipher is a type of scroll cipher and is one of the simplest and best-known ciphers. When encrypting a message in the Caesar cipher, each letter is usually replaced by the letter three letters in the alphabet. Let the alphabetic scrollback look like this: aw w ww ww m ww w ww w vwwwwwww www ww wwm w w wwwm www ww defg hijkI mnop 9rstuvwxy z abc a bcd efghilj kI P9rstu v w xy z m Keep the encryption in the Python dictionary structure. www ww Write a Python program that takes the three-letter message as input and prints the encrypted message. Guidance: An empty string can be inserted one by one by replacing the letters of the input. wwwwwwwwwww www wn ww wn ww w www wwh m Entry: Message: kar Encrypted message: hxo Entry: Message: yel Encrypted message: vbi Entry: Message: ses Encrypted message: pbp Entry: Message: mtk Encrypted message: jqharrow_forwardProblem 3. Two texts were encrypted with a Vigenère cipher, both using the same key. The ciphertexts are We found out that the first message begins with HELLOBOB, and ends with ALICE, but we don't know what is in between. ALLYY TUJRM ZKXAT BXAMP OIGKE LVRXS ZBCMH YNHLC VSIMV TVIX AHVRK FOKZJ EKTR Decrypt the second message.arrow_forward
- Consider a piece of software that enables a surgeon in one location to participate in a surgery on a patient in another city through the internet. Who could be interested in watching the show? What kind of harm do they want to inflict? What flaws would they try to exploit in order to do you harm? Is it possible that such flaws might inflict harm even if there isn't an active, hostile enemy attempting to exploit them?arrow_forwardThe Caesar Cipher Algorithm was introduced in Week #1. Encryption is the act of encoding a message with the intent of allowing only authorized people the knowledge of how to read that message. An encrypted message can be decoded, allowing the secured content to be read after decryption. Recall that the Caesar Cipher uses alphabets as the primary source of information but shifted a certain number of letters to the left or right as a key to create the encrypted data. The Caesar Cipher is easily hacked because of the simple technique used to build the key that encrypts and decrypts the data. In this lab, the key is the number of alphabets shifted, and the direction is always toward the increasing alphabetical order. This provides 26 ways of encrypting a message and therefore makes it easier to be hacked by guessing the key within the range of 0 - 25. Write the function caesar_hack( ) that takes three parameters: a Caesar Cipher encrypted message, an alphabet list, and the original…arrow_forwardThe Caesar Cipher Algorithm was introduced in Week #1. Encryption is the act of encoding a message with the intent of allowing only authorized people the knowledge of how to read that message. An encrypted message can be decoded, allowing the secured content to be read after decryption. Recall that the Caesar Cipher uses alphabets as the primary source of information but shifted a certain number of letters to the left or right as a key to create the encrypted data. The Caesar Cipher is easily hacked because of the simple technique used to build the key that encrypts and decrypts the data. In this lab, the key is the number of alphabets shifted, and the direction is always toward the increasing alphabetical order. This provides 26 ways of encrypting a message and therefore makes it easier to be hacked by guessing the key within the range of 0 - 25. Write the function caesar_hack( ) that takes three parameters: a Caesar Cipher encrypted message, an alphabet list, and the original…arrow_forward
- A cryptography student has accidentally used the same keystream to encrypt two different messages, M1M1 and M2M2. We know that the ciphertexts are C1=0x42e8ede51496d10cC1=0x42e8ede51496d10c and C2=0xa5ec5666da7419d0C2=0xa5ec5666da7419d0. We also happen to know that M1=0x713dc2f31c1e6c87M1=0x713dc2f31c1e6c87. a) What is M2M2 in hexadecimal? Please give your answer a leading 0x and use lowercase letters only. b) What is the keystream? Please give your answer a leading 0x and use lowercase letters only. Hint: These are all 8 byte numbers and will fit in an unsigned long type on most systems.arrow_forwardUse RSA cipher from the example we did in class to translate the following message into numeric equivalent and encrypt it. WELCOME 12 15 23 27 20 52 15arrow_forwardExercise 8. In the peap-based sniffer program shown in Listing 15.3 (Sec- tion 15.2.3), we replace Line 1 with the following line. After that, when we run the sniffing program, we can only capture the packets in or out of our own computer, but we are not able to capture the packets among other computers that are on the same network. What is the cause of this problem? handle - pcap_open_live("eth3", BUFSIZ, 0, 1000, errbuf);arrow_forward
- Consider a computer system with three users: Alice, Bob, and Cyndy. Alice owns the file alicerc, and Bob and Cyndy can read it. Cyndy can read and write the file bobrc, which Bob owns, but Alice can only read it. Only Cyndy can read and write the file cyndyrc, which she owns. Assume that the owner of each of these files can execute it. Create the corresponding access control matrix. Cyndy gives Alice permission to read cyndyrc, and Alice removes Bob's ability to read alicerc. Show the new access control matrixarrow_forwardSuppose a plaintext message x is encrypted using the Caesar cipher b = a +26 10 where each letter of the alphabet is assigned a numerical value (A = 0, B = 1, C = 2, ..., Z = 25), the variable a represents the numerical value of a letter in x, and b represents the numerical value of the corresponding letter in the ciphertext message y. If y = WKDR SC MYYV, then decrypt y to obtain the plaintext message x. Enter the decryption of each letter of y in the boxes below. NOTE: All answers should be capitalized and do not insert extra blank spaces. W → K →→ D→ R→ S→ C → M→ Y → Y → RemakingMIN... V →arrow_forwardConsider a program that allows a surgeon in one city to assist in an operation on a patient in another city via an internet connection. Who might want to attack the program? What type of harm might they want to cause? What kind of vulnerabilities might they exploit to cause harm? Could those vulnerabilities also cause harm in the absence of an active, malicious, attacker?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education