You are on page 1of 3

Ch1.

1 Assignment (15 points)                                


Name: 
Date: 

1. Short-answer questions. Use your own words to explain answers. (1*6=6 points)
1. What services do Internet service providers provide?
Internet service providers (ISP) provides internet access to all the users. Few examples of ISP’s are
AT&T, T-Mobile, Verizon, etc. which provides internet access to the users and provides various plans
and offers so that users can select a plan that meets their requirements. They usually use satellite,
fiber-optics to provide access to customers and control the traffic between the source and
destination.

2. What do we mean by the “Internet of Things”?


Internet of things (IoT) is a system of connecting devices using internet so that any task can be
performed without the involvement of a human. The name Internet of things itself says that getting
things connected to internet.
3. In what two ways was the KrebsOnSecurity.com DDoS attack unusual?
The two ways that the KrebsOnSecurity.com DDoS attack was unusual are:

 It floods the site with enormous traffic of about 620Gbps at a time. Even Akamai that was
protecting KrebsOnSecurity.com at that time cannot control the traffic since this is the first
time it encountered such a traffic which was almost twice it had ever encountered.
 The type of devices used for the attack were IoT devices which were small nontraditional
devices such as home routers, VCR’s and security cameras. These devices have weak security
so the cybercriminals used these devices to attack the site.

4. What are the characteristics of the Internet of Things?


The characterstics of Internet of Things include:
 Intelligence: IoT allows devices to respond in an intelligent way to any situation and support
them in carrying out specific tasks.
 Connectivity: IoT allows to connect each and every device that we use daily. With this
internet connectivity to the devices, many smart devices emerged into the market.
 Heterogeneity: IoT allows devices from one network to interact with the devices on another
network and also allows to communicate with devices upon different platforms.
 Dynamic: IoT collects data from the environment which changes dynamically. So, the devices
also change dynamically depending on the situation.

5. Distinguish between client and server hosts.


Client hosts are those that requests services from server hosts. For example, when you browse
something on your laptop, you are requesting the server to provide the data you need. So here,
laptop is the client host and the webserver is the server host. 

6. What does the transport process do to the application message if it is short enough to fit in a
single packet?
The transport process in a network adds a TCP header to the short application message and transmit
it to the internet process in a network stack.

2. According to the following figure, answer the following questions. Indicate the specific notes
in the figure to describe the links (2*3=6 points)

1. For the entire network, how many data links will there be? What are they?
A data link is any connection between host-host, host-router, router-router. So, in this entire network
there are 6 datalinks. They are:
 Router A - Server Host X
 Router A - Client Host Y
 Router A - Router B
 Router B - Server Host X
 Router B - Client Host Y
 Server Host X - Client Host Y

2. When Client Host Y sends a packet to Router B, how many data links will be there, and what
are they? How many physical links will there be and what are they?
When a Client Host Y sends a packet to Router B, there will be 

 1 data link between Client Host Y - Router B


 2 physical links between Client Host Y - Ethernet Switch 3 and Ethernet Switch 3 - Router B

3. When Client Host Y sends a packet to Host X, how many data links will be there, and what
are they? How many physical links will there be and what are they?
When a Client Host Y sends a packet to Server Host X, there will be

 1 data link between Client Host Y - Server Host X


 4 physical links between Client Host Y - Ethernet Switch 3, Ethernet Switch 3 - Ethernet
Switch 2, Ethernet Switch 2 - Ethernet Switch 1, Ethernet Switch 1 – Server Host X

3. Draw a complete figure to explain the encapsulation and decapsulation processes when
Host A successfully sends a short application message to Host B (include and indicate
multiple hosts, app messages, transport process, TCP segments, IP packets, frames, single
networks, and routers in the picture. You can determine the number of nodes by yourself).
You can refer class notes and hand draw a figure. Capture a picture and insert it here. (3
points)

You might also like