You are on page 1of 1

North

South University
Spring 2021
CSE 482/ETE334 (Internet and Web Technology) Section: 3/5
Final (Take Away Home) Assignment/Examination
Date of Assign: 09/05/2021 Total Marks: 20 Date of Submission: 18/05/2021
There are Five (05) questions and you need to answer any Four (04) of them.
Figure on the right-hand side indicate full Marks
(Effort based marks will be provided. However, any attempt to copy or plagiarise may end up with “F” grade.)

1. Explain why a domain name system (DNS) is required with the Internet and describe its main functional 5
parts. In relation to the DNS, explain why a hierarchical naming structure is used instead of a flat
structure.

2. With the aid of a diagram, explain how a movie/video is accessed from a streaming server and played 5
out by a browser. Include in your diagram the protocols that are used at both the server side and the
client side including, in the case of the various application protocols, their port numbers and use. Include
in your explanation the sequence of steps that occur when the user first selects a movie/video.

3. In the BitTorrent P2P file distribution protocol, the seed breaks the file into blocks, and the peers 5
redistribute the blocks to each other. Without any protection, an attacker can easily wreak havoc in a
torrent by masquerading as a benevolent peer and sending bogus blocks to a small subset of peers in
the torrent. These unsuspecting peers then redistribute the bogus blocks to other peers, which in turn
redistribute the bogus blocks to even more peers. Thus, it is critical for BitTorrent to have a mechanism
that allows a peer to verify the integrity of a block, so that it doesn’t redistribute bogus blocks. Assume
that when a peer joins a torrent, it initially gets a .torrent file from a fully trusted source. Describe
a simple scheme that allows peers to verify the integrity of blocks.

4. A number of companies have been invited to prepare and submit a tender for a contract using e-mail. 5
To provide a high level of privacy and to authenticate each tender and ensure nonrepudiation, each
company has been asked to encrypt their tender using PGP. By means of a block schematic diagram,
assuming no compression is to be used, show the various steps that are followed to carry out:
a. the authentication and nonrepudiation steps, and
b. the encryption and decryption of the tender contents.

5. What is the size of the multicast address space? Suppose now that two multicast groups randomly 5
choose a multicast address. What is the probability that they choose the same address? Suppose now
that 1,000 multicast groups are ongoing at the same time and choose their multicast group addresses
at random. What is the probability that they interfere with each other?

(The End)

Instructions for Answer script submission:
§ Once you are done with answering, scan you answer script and save it as a ‘single pdf’ file. The name of your file
should be: yourSection(Sec_3/Sec_5)_YourFullID _yourFirstName.pdf. (An example is: Sec_5_12345_Xyz.pdf)
§ Please upload your Scan copy of Scrip in the designated space (Final (Take Away) Examination Script Submission)
on the Google Classroom’s Classwork tab and mark it as 'Turn in'.

(All the Best)

You might also like