CSE/EE 461: Introduction to Computer-Communication Networks, Autumn 2007
  CSE Home   About Us   Search   Contact Info 
 
Course Home
 Home
Administation
 Overview
 Using course email
 Email archive
 Anonymous feedback
 View feedback
 Homework Turnin
 
Most Everything
 Schedule
 
Information
 UW/ACM Tutorials
    Homework 1
Out: Wednesday September 26
Due: Wednesday October 3 at the start of class

(Don't forget that the reading, listed on the course schedule, is also an important part of the course assignments. Unless it's explicitly noted, I'm assuming you'll read the entire chapter, even if we don't talk about every bit of it in lecture.)

  1. Make sure to register whatever email address you'd like to use with the class mailing list.

  2. DO THESE QUESTIONS from Chapter 1 of the text, but don't hand in anything for them. (Execute them on attu.cs.washington.edu.)
    • 38 (Substitute www.seattletimes.com for www.cisco.com)
    • 39 (Use the same two sites as for the previous question.) (In the future, if you want to use this command on a Windows system, traceroute is spelled tracert.)

  3. A small programming exercise, described in this companion page.

  4. Read the fourth of the primary references from the Further Reading section of Chapter 1:
    Saltzer, J., D. Reed, and D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems 2(4):277-288, November 1984.
    Available online here.
    In a short (1 to 1 (i.e., 1) paragraph each) writeup, address these two questions:

    1. Does the operation of the USPS conform to the end-to-end argument or not? Does it provide services that the end-to-end argument might argue it shouldn't? Does it fail to provide services that the end-to-end argument might argue it should? (If you're not familiar with the USPS, pick some reasonable facsimile, e.g., UPS, or France's PTT, or whatever.)

    2. At the time the paper was written, computers were relatively rare, and it was assumed that all users would behave in non-malicious ways. The implementation of the actual Internet, which began around the time of that paper, reflects that assumption as well. Using what you know from your everyday experience with the actual Internet, identify a common problem that (a) arises because some other users of the Internet are malicious (do things that are good for them but bad for you), and (b) whose solution should be implemented as part of the Internet itself (rather than in the end hosts), even according to the end-to-end argument?

      We're not looking for tremendous technical depth here - this is just the first week of the course. Your answer should be plausible given what you can reasonably be expected to know at this point, but with particular emphasis on the "must be part of the Internet, not an end-host function" criterion. It's also okay, and expected actually, that you can argue for the solution being in the network without explaining or even knowing what the solution might be.

Turnin: TBA. (We'll be using an online procedure.)


Computer Science & Engineering
University of Washington
Box 352350
Seattle, WA  98195-2350
(206) 543-1695 voice, (206) 543-2969 FAX
[comments to zahorjan at cs.washington.edu]