Skip to content

Commit

Permalink
changed the example name
Browse files Browse the repository at this point in the history
  • Loading branch information
kevin-w-du committed Jul 24, 2021
1 parent 4a31cd6 commit 07dfcaf
Show file tree
Hide file tree
Showing 5 changed files with 7 additions and 7 deletions.
4 changes: 2 additions & 2 deletions examples/B02-mini-internet-with-dns/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,8 +31,8 @@ emulator. It consists of three steps:
## Loading the DNS Infrastructure and Base Network
```
emuA.load('../20-mini-internet/base-component.bin')
emuB.load('../21-dns-component/dns-component.bin')
emuA.load('../B00-mini-internet/base-component.bin')
emuB.load('../B01-dns-component/dns-component.bin')
emu = emuA.merge(emuB, DEFAULT_MERGERS)
```
Expand Down
2 changes: 1 addition & 1 deletion examples/B03-ip-anycast/README.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# IP Anycast

The purpose of this example is to demonstrate the IP anycast feature.
We will use the emulator from example-20 as the base.
We will use the emulator from example-B00 as the base.
The IP anycast technology allows multiple computers on the Internet to have
the same IP address. When another machine sends a packet to this IP address,
one of the computers will get the packet. Exactly which one will
Expand Down
2 changes: 1 addition & 1 deletion examples/B03-ip-anycast/ip-anycast.py
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
emu = Emulator()

# Load the pre-built component
emu.load('../20-mini-internet/base-component.bin')
emu.load('../B00-mini-internet/base-component.bin')
base: Base = emu.getLayer('Base')
ebgp: Ebgp = emu.getLayer('Ebgp')

Expand Down
4 changes: 2 additions & 2 deletions examples/B04-bgp-prefix-hijacking/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

This example demonstrates how to launch the network prefix hijacking
attack inside the emulator. It uses the mini-Internet built from
Example-20 as the base.
Example-B00 as the base.


# Creating a Malicious Autonomous System
Expand Down Expand Up @@ -89,7 +89,7 @@ It will be more fun to launch such an attack on the real autonomous system,
but without doing real damages to the real world. This is made possible
by the emulator. We can add a real-world autonomous system inside the emulator.

The emulator built by Example-20 already includes a real-world AS, `AS-11872`.
The emulator built by Example-B00 already includes a real-world AS, `AS-11872`.
It announces several network prefixes to the emulator, and these network
prefixes are real and they are owned by the real-world `AS-11872`.
Inside the emulator, packets going to these network prefixes
Expand Down
2 changes: 1 addition & 1 deletion examples/B04-bgp-prefix-hijacking/bgp-prefix-hijacking.py
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
emu = Emulator()

# Load the pre-built component
emu.load('../20-mini-internet/base-component.bin')
emu.load('../B00-mini-internet/base-component.bin')
base: Base = emu.getLayer('Base')
ebgp: Ebgp = emu.getLayer('Ebgp')

Expand Down

0 comments on commit 07dfcaf

Please sign in to comment.