CSE 461: Introduction to Computer-Communication Networks, Autumn 2006
  CSE Home   About Us   Search   Contact Info 
 
Course Home
 Home
Administation
 Overview
 Using course email
 Email archive
 Anonymous feedback
 View feedback
 
Most Everything
 Schedule
 
Information
 UW/ACM Tutorials
    Homework 4
Out: Monday November 7
Due: Monday November 14 (and Thursday November 10)


Do the following questions from Chapter 4 of the text, but don't hand them in. Answers will be discussed in section on Thursday.

  • 20, 22, 31, 36


Read the following sections of the cited papers. (You're not prohibited from reading other sections of these papers, or other references you find, but none of that should be required to answer the questions.)

Note that these papers were not written specifically for students whose exposure to networking was limited to the the first four chapters of the text, so it shouldn't be surprising, or upsetting, to encounter some sentences and terms that don't mean much to you. My reading of them, keeping in mind what material we've covered and what we haven't, is that you should be able to extract the main points without too much trouble, even if you have to skip over some small pieces from time to time.

Answer the following questions. Hand in your answers in class on Monday.

Question 1

The papers all talk about problems that can caused by errors in BGP, whether produced unintentionally or intentionally. Summarize briefly what those problems are. What symptoms, if any, would an end user (say, someone surfing the web) possibly notice for each?
Question 2
A plausible implication of the observations made in the papers is that the manner in which IP prefixes are handed out and attached to the Internet exacerbates the potential problems with BGP. In particular, there is no simple way for one AS to do a sanity check on what it hears from another.

Consider trying to address that by imposing some restrictions on where prefixes could appear. For instance, as an extreme, suppose that they followed land-line telephone numbering, in the sense that a portion of a prefix would tell you something about a region in which the address must fall (much like area code and exchange for phone numbers).

Briefly discuss the trade-offs involved in this. How does it help insulate one AS from mistakes made by another? What does it make worse/harder?

Question 3
What kinds of attacks can an adversary (more successfully) launch if it is able to perform BGP hijacking?

If you find yourself interested in this topic, I suggest the following additional reading:


Computer Science & Engineering
University of Washington
Box 352350
Seattle, WA  98195-2350
(206) 543-1695 voice, (206) 543-2969 FAX
[comments to zahorjan at cs.washington.edu]