0% found this document useful (0 votes)
29 views

Assignment 2 - CN

e

Uploaded by

53653
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Assignment 2 - CN

e

Uploaded by

53653
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

RIPHAH INTERNATIONAL UNIVERSITY ISLAMABAD

FACULTY OF COMPUTING
MAIN CAMPUS ( I-14 )
Session – Spring 2024

NAME: Ayan Shahid


SAP ID: 52990
DATE: 09-11-2024
PROGRAM: BS Cyber Security CY(3-1)
COURSE NAME: Computer Networks
SUBMITTED TO: Sir Sherjeel Gallani
ASSIGMENT NO: 02
Computer Networks
Assignment 2

Question 1:
Using the site www.ietf.org, discuss the major IETF activities.
Answer:
The IETF (Internet Engineering Task Force) is continuously involved in several
key activities related to the development and improvement of Internet protocols
and standards. The major recently completed activities and upcoming activities are
following:

• Recently Completed Activities:


1. IETF Annual Report 2023:
This report contains the overview of IETF activities over the past year
across its various groups, with highlights on noteworthy efforts from the
Internet Architecture Board (IAB) and the Internet Research Task Force
(IRTF). This report also contains the achievements in protocol development,
research initiatives, community driven updates that help evolve technical
standards underlying our internet infrastructure.
2. AI-CONTROL Workshop by IAB:
This lab was held in September of 2024, this IAB workshop analysed
possible approaches for publishers to control their data used by artificial
intelligence. The importance of ethical data was one of the main topics at
the event which also provided frameworks for AI regulation for help in
controlling data collection.
3. IETF's Green Working Group:
Addressing the increasing need for long lasting in networking, the
Green Working Group that is initiated by IETF, they focused on optimizing
energy efficiency in internet infrastructure. This group is exploring strategies
and methods to reduce power consumption across network devices and
protocols.
4. Improvements in new Participants Program:
There were many updates to this program point towards helping new
members getting informed to the IETF community. The program will now
provide enhanced guidance, resources and networking opportunities to
help new participants engage more easily and effectively at future IETF
meetings.

• Upcoming Activities of IETF:


1. IETF 122 in Bangkok:
This meeting will be scheduled on 15-March-2025 to 21-March-2025.
This meeting will focus on intensive discussion about new internet standards
and new ideas on internet technology.
2. IETF 123 in Madrid:
The second meeting will be scheduled on 19-June-2025 to 25-June-
2025. This meeting will bring together internet engineers, researchers, and
professionals to continue developing new internet standards and refining
existing ones. In this meeting, Participants can engage in workshops,
hackathons, and working group sessions to collaborate on cutting edge
solutions and improve internet protocols.

<---------------------------------->
Question 2:
What is the transmit time of a packet sent by a station if the length of the
packet is your Student No. (4 or 5 digits) in bytes and the bandwidth of channel is
bbb Kbps, where 'bbb' are the last 3 digits of your Student No.
Answer:
To calculate the transmit time of a packet sent by a station, we use the
formula:

Transmit time = Packet size / Bandwidth


• Given Data:
Student ID: 52990

1. Packet Length = 52990 bytes (since the packet length is the full Student ID
number in bytes).
2. Bandwidth = 990 Kbps (since the last three digits of Student ID).

• Steps:
1. Convert Packet Length into Bits
• 1 byte = 8 bits.
• So, 52990 bytes = 52990×8

= 423920 bits.

2. Convert Bandwidth to Bits per Second

990 Kbps = 990×1000

= 990000 bps

3. Calculate Transmit Time

Transmit Time = 423920 bits / 990000 bps

= 0.4282 seconds

So, the transmit time for packet whose length is 52990 bytes is approximately
0.4282 seconds.
<---------------------------------->

Question 3:
Explain the usage of these commands. Also show their snapshots after running
with proper syntax on terminal of Linux. (As an example, you can apply the
commands on www.riphah.edu.pk, where ever required)
a. Ping b. Traceroute c. Netstat d. Arp e. Route PRINT
Answer:

1. Ping Command:
• Usage:
The ping command is used to test the connectivity between the user's
computer or device with another computer or server on a network. It sends
a small packet of data to a target IP address and measures how long it takes
for the packet to return, providing valuable information about the round-
trip time and packet loss. It also helps in diagnose network connectivity
issues.

• Command Syntax: ping <hostname/IP>


• Example: ping www.riphah.edu.pk
• Explanation: This command checks if you can reach Riphah servers
and also measures the response time.

Figure 1
The Figure-1 shows the successful connection to www.riphah.edu.pk with
response times around 21 milliseconds and 2.1% packet loss. The 2.1% packet
loss may be occasional minor disruptions. While this amount of packet loss is
relatively small and may not affect the connectivity to the server so there is
stable connectivity to the server.

2. Traceroute Command:
• Usage:
Traceroute is used to trace the route of data that it takes to get from
the source to destination. It shows all intermediate devices such as routers
along the path. It can help in identifying where the network delays or where
the failures are occurring.
• Command Syntax: traceroute <hostname/IP>
• Example: traceroute www.riphah.edu.pk
• Explanation: This command traces the network path from the local device
to the Riphah University website server.

Figure 2
In Figure 2, the traceroute command attempts to trace the route to
www.riphah.edu.pk but is blocked after the first step, most likely by network
security settings or non-responsive intermediate routers.

3. Netstat Command:
• Usage:
The netstat command is used to display all network connections, routing
tables, interface statistics, and listing ports. It provides detailed information
about all open connections on a computer or device, which can be useful for
monitoring network activity and diagnosing network problems.
• Command Syntax: netstat [options]
• Options:
❖ -a: shows all active connections and listening ports
❖ -t: TCP connections
❖ -u: UDP connections
❖ -l: Listening sockets
❖ -n: Numeric addresses (avoids DNS lookup delays)
❖ -r: Displays the routing table,
❖ -p: Shows the process ID
❖ -s: Displays network statistics by protocol such as TCP, UDP, ICMP, etc.

• Example: netstat -a

Figure 3
In Figure 3, the -a option shows all active connections and listening ports on
the computer or device including TCP, UDP connections and also their states.
4. Arp Command:
• Usage:
The arp command is used to control the Address Resolution Protocol
(ARP) cache, which maps IP addresses to MAC addresses on a local network.
It helps in finding or clearing out entries in the ARP table that are used for
routing of data within a local network.

• Command Syntax: arp -a or arp <IP address>


• Example: arp -a
• Explanation: This command shows the current ARP table, which displays the
mappings of IP addresses to MAC addresses that are cached on the device.

5. Route PRINT Command:


• Usage:
The route print command displays the routing table on a Windows
computer. It shows the network routes that the system uses to forward
data packets to different networks. This command is very helpful for
diagnosing routing issues and ensuring that the system has correct network
routes set up or not.
• Command Syntax: route -n (For Linux) or route print (For Windows)
• Example: route print
• Explanation: This command will display a list of all routes, including
destination networks, gateway addresses, interface IDs and etc.

Figure 4

<---------------------------------->

Question 4:
How Computer Networks have effected our daily lives (both positively and
negatively). Discuss some important use cases to support your arguments.
Answer:
Computer networks have changed our lives in many ways. They have made life
easier in some areas but also brought new challenges. Following are some positive
and negative effect of computer networks on our lives.

• Positive Impacts of Computer Networks

1. Better Communication:
One of the most significant effects of computer networks is the
enhancement of communication. The rise of email, instant messaging, video
calls, and social media platforms like WhatsApp, Zoom, and Facebook has
made the communication easier for people to stay connected globally.
 Use case: During the COVID-19 pandemic, remote working became a
normal, with tools like Microsoft Teams and google meet facilitating the
real time communication among teams.

2. Access to Learning and Information:


With the internet, we can easily find information and learn new things.
We can watch tutorials, read articles, or take online courses for free or at a
low cost. Websites like Khan Academy or YouTube provide vast amount of
learning resources. People can now learn new skills from home, which is
great for anyone who wants to improve themselves.
 Use case: Platforms like Coursera, Khan Academy allow learners to
access quality education and self-improvement resources from
anywhere, making lifelong learning more accessible and easier.

3. E-commerce and Online Services:


Online shopping, digital banking, and remote healthcare services have
become integral parts of our daily routines. Computer networks enable
effortless and smooth transactions, quick access to goods and services, and
the ability to manage finances remotely.
 Use case: Amazon, eBay, and other e-commerce platforms have made
shopping more convenient by offering vast product selections and quick
delivery options, while online banking systems allow users to manage
finances securely from their devices.

4. Healthcare:
Telemedicine, or seeing a doctor over the internet, has become very
popular. This is especially helpful for people who live far from medical clinics.
During the pandemic, many people used video calls to consult with doctors,
which made healthcare more accessible.

 Use Case: During the COVID-19 pandemic, services like Teladoc allowed
virtual consultations, improving healthcare access and safety. It continues
to grow as a convenient and cost-effective solution for receiving medical
advice and prescriptions without in person visits.
5. Entertainment:
Computer Networks give us streaming services like Netflix, Spotify, and
YouTube to enjoy movies, music, and videos whenever we want. This means
we don’t have to wait for shows to air or go to the cinema. We can watch
and listen to whatever we like, at any time.

 Use case: one can watch a Netflix series during a break or listen to music
on Spotify while traveling, making entertainment more accessible and
convenient.

• Negative Impacts of Computer Networks


1. Privacy Concerns and Data Security:
Computer networks facilitate easy access to services but they also
have significant risks to personal privacy and data security. Cyberattacks,
identity theft, and data breaches are on the rise, leading to the exposure of
sensitive information.

 Use case: High-profile data breaches, like those experienced by


Facebook (Cambridge Analytica scandal) and Equifax, have raised
concerns about the misuse of personal data.

2. Addiction and Mental Health Issues:


Excessive use of digital devices and social media platforms results in
addiction to digital device and social media and also their excessive use
reduces face to face interactions.

 Use case: Studies have shown that heavy use of social media platforms
like Instagram and Facebook can contribute to feelings of loneliness, low
self-esteem, and fear especially among younger users.

3. Cybercrime and Fraud:


The rise of the internet has also led to an increase in cybercrimes such
as hacking, phishing, and online scams. Criminals exploit vulnerabilities in
computer networks to steal money, disrupt services, or spread malicious
software.
 Use case: Ransomware attacks such as WannaCry 2017 have caused
widespread damage by locking users out of their systems and
demanding ransom payments in exchange for access to their data.

4. Job Displacement:
The automation of tasks supported by computer networks and
artificial intelligence, has resulted in job displacement in various industries.
Many traditional jobs are being replaced by automated systems leaving
some workers without employment.

 Use case: In sectors like manufacturing, automation driven by computer


networks has led to job cuts, as robots and AI systems now perform tasks
previously handled by human workers.

<---------------------------------->
Question 5:
Which of the following applications are more sensitive to delay, bandwidth and
both, and WHY.

i. Watching video on YouTube ii. Video call with your friend on Skype
iii. Web suffering iv. Sending e-mail
v. Sending audio message through WhatsApp

Answer:
Each type of application handles delay and bandwidth differently depending
on how it is used. Some applications need quick responses and fast data to work
smoothly, while others application is less affected by connection speed. Following
are the briefly explanation of how delay and bandwidth effects these applications.

1. Watching video on YouTube:


This application is more sensitive to both delay and bandwidth. The reason is
that video streaming needs a stable internet connection. High definition videos
(1080p or 4K) require good bandwidth to prevent the quality drops of video.
While slight delays in loading are not noticeable but a high level of delay in live
video content would be problematic.
2. Video call with your friend on Skype:
This application is more sensitive to both delay and bandwidth because for
video calls, both bandwidth and low delay are important. If bandwidth is too low
then leading to the video and audio quality issues like low pixel or poor sound.
On the other hand, high delay can disrupt the flow of conversation making the
communication difficult and hard.

3. Web surfing:
This application is mainly sensitive to bandwidth and not sensitive to delay
because browsing the web generally depends more on bandwidth. While a higher
bandwidth connection helps the pages to load faster and delay does not effect
the experience as much. Pages will still load but slower connections will cause
longer wait times for images and videos to load.

4. Sending e-mail:
This application is not sensitive to either delay or bandwidth. The reason is
that email communication is not as time sensitive. It does not matter if there is a
small delay or lower bandwidth since the message will still be sent eventually. If
there is large attachment file, now the bandwidth will matter but in generally the
process is not affected by delays.

5. Sending audio message through WhatsApp:


This application is sensitive to both delay and bandwidth because audio
messages need both bandwidth for quick upload and download and low delay for
a smooth sending experience. While sending an audio message might not be as
time sensitive as compared to a live conversation but delay can still make the
experience frustrating if the message does not send in a reasonable time.

<---------------------------------->
S

You might also like