|
|
|
|
Homework 1
Out: Wednesday September 26
Due: Wednesday October 3 at the start of class
(Don't forget that the reading, listed on the course schedule, is also
an important part of the course assignments. Unless it's explicitly noted,
I'm assuming you'll read the entire chapter, even if we don't talk about
every bit of it in lecture.)
- Make sure to register whatever email address you'd like to use with the
class mailing list.
- DO THESE QUESTIONS from Chapter 1 of the text,
but don't hand in anything for them.
(Execute them on
attu.cs.washington.edu .)
- 38 (Substitute
www.seattletimes.com for www.cisco.com )
- 39 (Use the same two sites as for the previous question.) (In the future, if you want to
use this command on a Windows system,
traceroute is spelled tracert .)
- A small programming exercise, described in
this companion page.
-
Read the fourth of the primary references from the Further Reading
section of Chapter 1:
Saltzer, J., D. Reed, and D. Clark. End-to-end arguments in system design.
ACM Transactions on Computer Systems 2(4):277-288, November 1984.
Available online here.
In a short (1 to 1 (i.e., 1) paragraph each) writeup, address these two questions:
- Does the operation of the USPS
conform to the end-to-end argument or not?
Does it provide services that the end-to-end argument might argue it shouldn't?
Does it fail to provide services that the end-to-end argument might argue it should?
(If you're not familiar with the USPS, pick some reasonable facsimile, e.g., UPS, or
France's PTT, or whatever.)
-
At the time the paper was written, computers were relatively rare, and it was assumed
that all users would
behave in non-malicious ways. The implementation of the actual Internet,
which began around the time of that paper, reflects that assumption as well.
Using what you know from your everyday experience with the actual Internet,
identify a common problem that (a) arises because some other users of the
Internet are malicious (do things that are good for them but bad for you), and
(b) whose solution should be implemented as part of the Internet itself (rather
than in the end hosts), even according to the end-to-end argument?
We're not looking for tremendous technical depth here - this is just the
first week of the course. Your answer should be plausible given what you
can reasonably be expected to know at this point, but with particular emphasis
on the "must be part of the Internet, not an end-host function" criterion.
It's also okay, and expected actually, that you can argue for the solution
being in the network without explaining or even knowing what the solution
might be.
Turnin: TBA. (We'll be using an online procedure.)
|