Assignment title: Information
SIT202 Computer Networks
Trimester 2, 2016
Problem Solving Report 3
Due Date: 5pm Tuesday September 27th, 2016
This assessment task must be completed individually,
group work and/or collaboration with other students is prohibited.
All work completed/submitted as part of this assessment task must be your own, individual work.
Any content drawn from other materials, including unit materials, must be clearly quoted where
appropriate, and/or clearly referenced. All students should review and be familiar with the content
provided by the University regarding how to reference other materials:
http://www.deakin.edu.au/students/study-support/referencing
And in particular the information provided regarding Academy Integrity:
http://www.deakin.edu.au/students/study-support/referencing/academic-integrity
Unit Learning Outcomes
As per the Unit Guide, the following Unit Learning Outcomes are relevant to this project:
ULO 3. Select a local area and design simple protocols for a given environment to track current
and future trends in computer networks.
Given current and future requirements for one or more networks, you will be required to
select/design appropriate protocols to satisfy those requirements.
ULO 4. Analyse and articulate security attacks and countermeasures, symmetric and public
cryptosystems, digital signature and authentication protocols.
You will be required to analyse one or more networks to explain the security requirements
of those networks and propose solutions.Question 1 (20 + 15 = 35 marks)
a) Consider the design of an application layer protocol for the transfer of extremely large files
(multi-terabyte files) for big data applications within a single network, i.e., there is no
router/internetworking between the source and destination hosts. Provide two
advantages and two disadvantages for selecting the TCP protocol, and two advantages and
two disadvantages for selecting the UDP protocol for this application.
b) Prepare a set of PowerPoint slides that explain reliable delivery using go-back-n. Your
slides must include the following points:
i) Introductory slide/s describing basic concepts of go-back-n;
ii) Illustration of go-back-n where the receiver discards out-of-order packets;
iii) Illustration of go-back-n where the receiver keeps out-of-order packets; and
iv) Comparison of advantages and disadvantages.
Question 2 (19 marks)
In your own words, briefly describe the functionality of each of the following socket API calls for
writing a client-server application using TCP: accept, bind, close, connect, listen, receive, send, and
socket. In your answer, indicate any pre-requisite calls, e.g., before you can call bind() you must
first have created a socket with socket().
Question 3 (18 marks)
The local network management team have highlighted a number of important observations in the
newest data captured using SNMP and TCP. For each of these observations, briefly explain the
likely causes and actions you might take as leader of the network management team:
The link from Router A to Router B has historically shown data integrity errors at a rate of
approximately 0.01% packets discarded on both ends of the link. In the last month, these
have climbed to over 3% of packets discarded. Reviewing the IT support documentation
repository, one of the networks team identifies that new Wiki software was installed on
the web server at the same time (connected to Router A).
The organisations anti-virus tool has recently identified an unusually high rate of viruses
being detected in a certain computer lab space. Over the same time period, the router
connected to that network shows a substantial increase in the number of active TCP
connections and the volume of TCP segments being sent to and from that network.
Recently a site-to-site VPN connection was established between a new branch office and
the router that acts as the connection point to the ISP. Since the VPN was established, the
average queue lengths of packets on the router (incoming packets waiting to processed /
outgoing packets waiting to be transmitted) have increased from a very small/insignificant
number to a very large number.
Question 4 (20 + 8 = 28 marks)
a) Protocols at the data-link, network, and/or transport layer often implement data integrity
checks using either a checksum or CRC mechanism. Explain why these integrity checks are
considered inadequate for the purposes of security and why digests used in Message
Authentication Codes (MACs) are more suitable.
b) A malicious student has gained administrative access to the University's DNS server and
with their new access has implemented a Man in the Middle attack against HTTP+SSL
connections by redirecting the web server to a compromised server's IP address. The
student intends to record the usernames and passwords of users who log in, unfortunately
the other students all realised that their login details would not be secure. Explain why the
students were able to identify that their login details could be compromised.Submission Requirements
Please note the following requirements when submitting your answers:
Your answers must be submitted to the correct Assignment box provided in CloudDeakin,
submissions will not be accepted outside of this assignment box, e.g., email submissions
will not be accepted.
Answers must be submitted in a format which can be read by the plagiarism detection
system. It is your responsibility to ensure your answers in a correct format.
o Acceptable formats include: Word (.doc/.docx), Excel (.xls/.xlsx), PowerPoint
(.ppt/.pptx), OpenOffice Text (.odt), Rich Text Format (.rtf), HTML (.html/.htm),
Acrobat (.pdf), and Text (.txt)
o Unacceptable formats include: ZIP/RAR/7z or any other type of archive,
submissions linked from the Portfolio (download the document from the portfolio
and upload it separately).
o Note that any diagrams you prepare as part of this Problem Solving Report can be
submitted either embedded in your document or separately using common image
formats
Late submissions are penalised as per Faculty regulations, which is based on the due date
of the submission. Note that the indication of lateness by CloudDeakin is often misleading
and not considered. For example, for a due date of 5pm Tuesday:
o Submission before Tuesday 5pm – no penalty.
o Submission after Tuesday 5pm but before Wednesday 5pm – 10% penalty
o Submission after Wednesday 5pm but before Thursday 5pm – 20% penalty
o Submission after Thursday 5pm but before Friday 5pm – 30% penalty
o Submission after Friday 5pm – not accepted.
Applications for extensions can only be considered by the unit chair. In general,
applications must be submitted before the due date (unless it is not possible to do so), and
must satisfy the rules for special consideration, i.e., reasons must fall into categories for
medical, compassionate, or hardship, and evidence must be provided. If you have to wait
to receive evidence (such as documentation from a practitioner/professional), or if the due
date has passed, you should still contact the unit chair for advice as soon as possible.Marking Scheme
Question 1 (20 + 15 = 35 marks)
Part (a)
o (5 marks) Advantages of TCP for proposed application layer protocol.
o (5 marks) Disadvantages of TCP for proposed application layer protocol.
o (5 marks) Advantages of UDP for proposed application layer protocol.
o (5 marks) Disadvantages of UDP for proposed application layer protocol.
Part (b)
o (3 marks) Introductory slides.
o (3 marks) Illustration of receiver discarding out-of-order packets.
o (3 marks) Illustration of receiver keeping out-of-order packets.
o (3 marks) Comparison of advantages.
o (3 marks) Comparison of disadvantages.
Question 2 (19 marks)
(8 x 2 = 16 marks) Descriptions of socket API calls.
(3 marks) Correct indication of pre-requisites
Question 3 (18 marks)
(3 x 3 = 9 marks) Explanation of likely causes.
(3 x 3 = 9 marks) Explanation of proposed actions and how they address causes.
Question 4 (20 + 8 = 28 marks)
Part (a)
o (5 marks) Basic concepts of checksum/CRC integrity checks.
o (5 marks) Why checksum/CRC checks are inadequate for security.
o (5 marks) Basic concepts of digests.
o (5 marks) Why digests are more suitable for security.
Part (b)
o (3 marks) Basic concepts of how SSL verifies server certificate.
o (5 marks) Explanation of how students could identify insecure connection.