![EBK COMPUTER NETWORKING](https://www.bartleby.com/isbn_cover_images/8220102955479/8220102955479_largeCoverImage.jpg)
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 2, Problem R22RQ
Explanation of Solution
File sharing using BitTorrent:
BitTorrent:
A communication protocol for peer to peer file sharing which is used to distribute data and electronic files over the internet.
P2P Files sharing application stands for Peer to Peer file sharing applications which use P2P file transfer protocol to allow users to access and share media files using peer to peer networking technology.
Let’s a new peer Alice joins BitTorrent without processing any chunks. Also, without any chunks, Alice cannot become a top four uploader for any other peers as she was nothing to upload...
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Trending nowThis is a popular solution!
![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
Take a new peer Alice that enters BitTorrent without chunks. Because she has little to post, she can't become a top four uploader with all of the other peers without chunks. How's Alice going to have her first chunk?
Consider a new colleague.Alice who joins BitTorrent but does not have any piecesShe can't become a top-four uploader for any of the other peers if she doesn't have any chunks to post.So, how will Alice receive her first bite?
In the BitTorrent P2P file distribution protocol, the seed breaks the file into blocks, and the peers redistribute the blocks to each other. Without any protection, an attacker can easily wreak havoc in a torrent by masquerading as a benevolent peer and sending bogus blocks to a small subset of peers in the torrent. These unsuspecting peers then redistribute the bogus blocks to other peers, which in turn redistribute the bogus blocks to even more peers. Thus, it is critical for BitTorrent to have a mechanism that allows a peer to verify the integrity of a block, so that it doesn’t redistribute bogus blocks. Assume that when a peer joins a torrent, it initially gets a .torrent file from a fully trusted source. Describe a simple scheme that allows peers to verify the integrity of blocks.
Chapter 2 Solutions
EBK COMPUTER NETWORKING
Ch. 2 - List five nonproprietary Internet applications and...Ch. 2 - Prob. R2RQCh. 2 - Prob. R3RQCh. 2 - Prob. R4RQCh. 2 - Prob. R5RQCh. 2 - Prob. R6RQCh. 2 - Prob. R7RQCh. 2 - Prob. R8RQCh. 2 - Prob. R9RQCh. 2 - Prob. R10RQ
Ch. 2 - Why do HTTP, SMTP, and POP3 run on top of TCP...Ch. 2 - Prob. R12RQCh. 2 - Prob. R13RQCh. 2 - Prob. R14RQCh. 2 - Prob. R15RQCh. 2 - Prob. R16RQCh. 2 - Prob. R17RQCh. 2 - From a users perspective, what is the difference...Ch. 2 - Prob. R19RQCh. 2 - Prob. R20RQCh. 2 - Prob. R21RQCh. 2 - Prob. R22RQCh. 2 - Prob. R23RQCh. 2 - Prob. R24RQCh. 2 - Prob. R25RQCh. 2 - In Section 2.7, the UDP server described needed...Ch. 2 - Prob. R27RQCh. 2 - Prob. P1PCh. 2 - Prob. P2PCh. 2 - Prob. P3PCh. 2 - Prob. P4PCh. 2 - Prob. P5PCh. 2 - Prob. P6PCh. 2 - Prob. P7PCh. 2 - Prob. P8PCh. 2 - Prob. P9PCh. 2 - Prob. P10PCh. 2 - Prob. P11PCh. 2 - Prob. P13PCh. 2 - Prob. P14PCh. 2 - Prob. P15PCh. 2 - Prob. P16PCh. 2 - Prob. P17PCh. 2 - Suppose you can access the caches in the local DNS...Ch. 2 - Prob. P21PCh. 2 - Prob. P22PCh. 2 - Prob. P23PCh. 2 - Prob. P25PCh. 2 - Prob. P26PCh. 2 - Prob. P27PCh. 2 - Prob. P28PCh. 2 - Prob. P29PCh. 2 - Prob. P30PCh. 2 - Prob. P31PCh. 2 - Prob. P32P
Knowledge Booster
Similar questions
- An underground resistance group wants to write articles with completely differ- ent security goals. The resistance group shared a secret at the last resistance meeting that they can all use for these articles. Here are their goals: Only users with the shared secret should be able to upload to the server. Only users with the shared secret should be able to read the articles. Any changes to the article should still be easily detectable The resistance is paranoid about both quantum computers and any mod- ern encryption algorithms so they want to avoid public key cryptography. They only trust AES (symmetric key encryption) and SHA-256 (crypto- graphic hashing) since these have been around for decades and are resistant to quantum computers. Write a protocol for the underground paper to authenticate authors before publishing to the server. (HINT: Make sure that this protocol cannot be tricked by someone who has been listening to the previous article upload) Write a protocol for the server…arrow_forwardLet your key be the IP address 234.10.90.0 and you want to hash it and then put it in a slot in the hash table with size 257. Do this using Modulo Primes Method and Polynomial Hash. Write all the details.arrow_forwardWrite the Get-Response Message as a reply to the following Get-Request Message based on the following table, then explain the relation between Request-ID in both messages and the reason for it. Community Public sysUpTime 4,567,000 udplnDatagrams 70,000 datagrams udpNoPortS 8,000 datagrams udplnErrors 200 datagrams udpOutDatagrams 20,000 datagrams noc1 > noc3 Community = public GetRequest Request ID = 456 system.sysUpTime.0 udp.udpInDatagrams.0 udp.udpNoPorts.0 udp.udpInErrors.0 udp.udpOutDatagrams.0arrow_forward
- Which statement about the Hash function (H) is false: 1 1. For a message of any length, the size of the H function is the same. 2. The H function is produced of a message only 3. The H function allows you to detect changes in the message and authenticate the sender.arrow_forwardThe inter‐block time is maintained at an average of 10 minutes. Suppose now you have 0.05% of the total network hash power, what is the average time for you to find the next block?arrow_forwardWhat type of authentication method is displayed in this picture? Multi-Factor Authentication Biometric Authentication Token-based authentication Single Sign-on 2.Wendy is examining the logs of a web server that was compromised by a remote attacker. She notices that right before the attack, the logs show a series of segmentation fault errors. Other logs indicate that the attacker sent very long input strings to the web server that had malicious commands at the end of the string. What type of attack most likely took place? SQL Injection Cross-site request forgery Cross-Site scripting Buffer Overflow 3.Jessica is combatting a security incident where a specific piece of malware is continually infecting systems on her network. She would like to use application control technology to block this file. What type of application control should she use? Greylisting Bluelisting Whitelisting Blacklistingarrow_forward
- The Bitcoin network automatically adjusts the difficulty so that the inter‐block time is maintained at an average of 10 minutes. Suppose you have 0.1% of the total network hash power. What is the average time (in minutes) for you to find the next block?arrow_forward10) Suppose a website a.com hosts the following PHP script called go.php: Go forth php echo $_GET[p] ?> : Suppose an attacker wishes to send an email with a link that will reflect the recipient's cookie from a.com back to the attacker. Write a URL that the attacker could include, specifying, which website, if any, the attacker should control. Note: do not worry about getting the URL encoding right-use a human-readable representation.arrow_forwardDescribe the reasons behind the following URLs' insecurity and what you propose to do to make them more secure.arrow_forward
- Suppose that the marks for the final exam have been shared with specific people on a web server. The files are accessible only by providing a specific username and password. Which of the following methods was used to share these files? a. The files were kept hidden on the server b. The files are protected using digest HTTP-authentication c. The files were compressed and uploaded to the server d. The files were hashed using SHA-1 hashing algorithmarrow_forward. Q: Consider Globe. Outline a simple protocol by which a secure channel is set up between a user proxy (who has access to the Alice's private key) and a replica that we know for certain can execute a given method.arrow_forwardBOB ALICE Yes Message (m) Hash MD Function Alice public-key Alice private-key Same? Hash Function MD Public-key Decryption Public-key Encryption -MD E Private-Keya MD) + message use the digital signature scheme that is shown in the scenario above as part of the network security protocol suits. But it has two very specific weaknesses that can be solved using the MAC It is very handy and practical t scheme. Explain these 2 weaknesses that can be solved using the MAC scheme.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education