Problem 1
Question
Complete Problem P7 on page 382 in the textbook. For part (a), assume that x has already computed its distance vector update after having received w and y’s distance vectors with the information described in the problem.
fig values: , , . given , . so , from the direct w-y link.
A
bellman-ford at x. two next-hops: w (cost 2) and y (cost 5).
- (direct)
- (via w, not direct; w-y link costs 2)
- (via w)
B
drop to 1. new . min-cost path to u changed, so x sends updated DV to neighbors.
C
raise . still , y-route never competitive as long as . still 4 via w as long as . nothing changes, no update sent. the direct x-y link has slack; all minimums are via w.
Answer
(a) , (via w), (via w). (b) decrease to 1 → drops to 6, triggers update. (c) increase → no minimum changes, no update.
Problem 2
Question
Describe how loops in paths can be detected in BGP.
bgp is path vector protocol. every route advertisement carries full ordered AS-PATH, not just a scalar distance. on receipt, a router checks whether its own ASN already appears in AS-PATH; if yes, the route is dropped.
this works directly because the path is explicit. pure DV protocols don’t carry path info, so they can count to infinity around a loop. bgp doesn’t have that problem. the loop is literally visible in the attribute.
Answer
AS-PATH attribute carries the full ordered list of ASNs traversed. receiver rejects any route whose AS-PATH contains its own ASN. works because full path is explicit (path-vector, not DV); loops are directly observable rather than inferred from distances.
Problem 3
Question
Review the article here: https://tinyurl.com/4vn3krbc
Answer the following:
a. Was Google actively malicious in this incident?
b. Why was Japan most severely affected by the incident?
c. What red flag was missed by Verizon that could have decreased the severity of this incident?
A
not malicious. aug 25 2017, accidental leak. google was using ~160k more-specific prefixes internally for traffic engineering and those routes mistakenly got announced to verizon. google apologized. classic misconfig, not an attack.
B
three concurrent factors amplified each other, namely that 25k+ of the leaked routes were NTT OCN’s address space (largest single-network share in the leaked set), the KDDI (verizon transit customer) accepted roughly 95k leaked prefixes from verizon, IIJ accepted roughly 97k leaked prefixes from verizon as well. net result was KDDI and IIJ, trying to reach OCN address space, routed traffic through google’s chicago infrastructure. RTT jumped from ~15ms to ~256ms. two major japanese telcos were sending domestic traffic to a third japanese telco via chicago.
C
MAXPREF (max-prefix limit). google’s normal announcement to verizon is under ~50 prefixes. an instantaneous jump to 160,000+ should have auto-tripped the session; any sane limit would have caused verizon to reject or tear down the session. no such limit was configured, so verizon accepted and re-advertised the full flood to downstream customers.
Answer
(a) not malicious. accidental misconfig, google apologized. (b) KDDI and IIJ are verizon transit customers that each accepted ~95–97k leaked prefixes; 25k+ of those were NTT OCN’s address space, so both ended up routing domestic japan traffic through chicago. (c) verizon had no MAXPREF limit. a jump from <50 to 160k+ prefixes should have auto-tripped the session.