Assignment 2 - CN
Assignment 2 - CN
FACULTY OF COMPUTING
MAIN CAMPUS ( I-14 )
Session – Spring 2024
Question 1:
Using the site www.ietf.org, discuss the major IETF activities.
Answer:
The IETF (Internet Engineering Task Force) is continuously involved in several
key activities related to the development and improvement of Internet protocols
and standards. The major recently completed activities and upcoming activities are
following:
<---------------------------------->
Question 2:
What is the transmit time of a packet sent by a station if the length of the
packet is your Student No. (4 or 5 digits) in bytes and the bandwidth of channel is
bbb Kbps, where 'bbb' are the last 3 digits of your Student No.
Answer:
To calculate the transmit time of a packet sent by a station, we use the
formula:
1. Packet Length = 52990 bytes (since the packet length is the full Student ID
number in bytes).
2. Bandwidth = 990 Kbps (since the last three digits of Student ID).
• Steps:
1. Convert Packet Length into Bits
• 1 byte = 8 bits.
• So, 52990 bytes = 52990×8
= 423920 bits.
= 990000 bps
= 0.4282 seconds
So, the transmit time for packet whose length is 52990 bytes is approximately
0.4282 seconds.
<---------------------------------->
Question 3:
Explain the usage of these commands. Also show their snapshots after running
with proper syntax on terminal of Linux. (As an example, you can apply the
commands on www.riphah.edu.pk, where ever required)
a. Ping b. Traceroute c. Netstat d. Arp e. Route PRINT
Answer:
1. Ping Command:
• Usage:
The ping command is used to test the connectivity between the user's
computer or device with another computer or server on a network. It sends
a small packet of data to a target IP address and measures how long it takes
for the packet to return, providing valuable information about the round-
trip time and packet loss. It also helps in diagnose network connectivity
issues.
Figure 1
The Figure-1 shows the successful connection to www.riphah.edu.pk with
response times around 21 milliseconds and 2.1% packet loss. The 2.1% packet
loss may be occasional minor disruptions. While this amount of packet loss is
relatively small and may not affect the connectivity to the server so there is
stable connectivity to the server.
2. Traceroute Command:
• Usage:
Traceroute is used to trace the route of data that it takes to get from
the source to destination. It shows all intermediate devices such as routers
along the path. It can help in identifying where the network delays or where
the failures are occurring.
• Command Syntax: traceroute <hostname/IP>
• Example: traceroute www.riphah.edu.pk
• Explanation: This command traces the network path from the local device
to the Riphah University website server.
Figure 2
In Figure 2, the traceroute command attempts to trace the route to
www.riphah.edu.pk but is blocked after the first step, most likely by network
security settings or non-responsive intermediate routers.
3. Netstat Command:
• Usage:
The netstat command is used to display all network connections, routing
tables, interface statistics, and listing ports. It provides detailed information
about all open connections on a computer or device, which can be useful for
monitoring network activity and diagnosing network problems.
• Command Syntax: netstat [options]
• Options:
❖ -a: shows all active connections and listening ports
❖ -t: TCP connections
❖ -u: UDP connections
❖ -l: Listening sockets
❖ -n: Numeric addresses (avoids DNS lookup delays)
❖ -r: Displays the routing table,
❖ -p: Shows the process ID
❖ -s: Displays network statistics by protocol such as TCP, UDP, ICMP, etc.
• Example: netstat -a
Figure 3
In Figure 3, the -a option shows all active connections and listening ports on
the computer or device including TCP, UDP connections and also their states.
4. Arp Command:
• Usage:
The arp command is used to control the Address Resolution Protocol
(ARP) cache, which maps IP addresses to MAC addresses on a local network.
It helps in finding or clearing out entries in the ARP table that are used for
routing of data within a local network.
Figure 4
<---------------------------------->
Question 4:
How Computer Networks have effected our daily lives (both positively and
negatively). Discuss some important use cases to support your arguments.
Answer:
Computer networks have changed our lives in many ways. They have made life
easier in some areas but also brought new challenges. Following are some positive
and negative effect of computer networks on our lives.
1. Better Communication:
One of the most significant effects of computer networks is the
enhancement of communication. The rise of email, instant messaging, video
calls, and social media platforms like WhatsApp, Zoom, and Facebook has
made the communication easier for people to stay connected globally.
Use case: During the COVID-19 pandemic, remote working became a
normal, with tools like Microsoft Teams and google meet facilitating the
real time communication among teams.
4. Healthcare:
Telemedicine, or seeing a doctor over the internet, has become very
popular. This is especially helpful for people who live far from medical clinics.
During the pandemic, many people used video calls to consult with doctors,
which made healthcare more accessible.
Use Case: During the COVID-19 pandemic, services like Teladoc allowed
virtual consultations, improving healthcare access and safety. It continues
to grow as a convenient and cost-effective solution for receiving medical
advice and prescriptions without in person visits.
5. Entertainment:
Computer Networks give us streaming services like Netflix, Spotify, and
YouTube to enjoy movies, music, and videos whenever we want. This means
we don’t have to wait for shows to air or go to the cinema. We can watch
and listen to whatever we like, at any time.
Use case: one can watch a Netflix series during a break or listen to music
on Spotify while traveling, making entertainment more accessible and
convenient.
Use case: Studies have shown that heavy use of social media platforms
like Instagram and Facebook can contribute to feelings of loneliness, low
self-esteem, and fear especially among younger users.
4. Job Displacement:
The automation of tasks supported by computer networks and
artificial intelligence, has resulted in job displacement in various industries.
Many traditional jobs are being replaced by automated systems leaving
some workers without employment.
<---------------------------------->
Question 5:
Which of the following applications are more sensitive to delay, bandwidth and
both, and WHY.
i. Watching video on YouTube ii. Video call with your friend on Skype
iii. Web suffering iv. Sending e-mail
v. Sending audio message through WhatsApp
Answer:
Each type of application handles delay and bandwidth differently depending
on how it is used. Some applications need quick responses and fast data to work
smoothly, while others application is less affected by connection speed. Following
are the briefly explanation of how delay and bandwidth effects these applications.
3. Web surfing:
This application is mainly sensitive to bandwidth and not sensitive to delay
because browsing the web generally depends more on bandwidth. While a higher
bandwidth connection helps the pages to load faster and delay does not effect
the experience as much. Pages will still load but slower connections will cause
longer wait times for images and videos to load.
4. Sending e-mail:
This application is not sensitive to either delay or bandwidth. The reason is
that email communication is not as time sensitive. It does not matter if there is a
small delay or lower bandwidth since the message will still be sent eventually. If
there is large attachment file, now the bandwidth will matter but in generally the
process is not affected by delays.
<---------------------------------->
S