Uploaded by zahenoorofficial

Assignment 1 Solution

advertisement
EE317 – DCN
Assignment Number 1 (Solution)
EE317 – Data Communication and Networks
Assignment Number 1 (Solution)
Fall 2020
Maximum Marks: 50
Due Date: 18 September 2020
Instructions:
• Partially or fully copied assignments will be marked as zero.
• Only handwritten solution on A4 page will be accepted.
• Use the title page provided with this assignment.
• Late submissions are not allowed.
CLO No.
1
CLO Statement
Domain
Taxonomy
Level
Explain the fundamental concepts of data communication
and networks including elements of a protocol and OSI Cognitive
Model.
Question Number 1
(CLO 1)
2
(2 + 2 + 4 + 2 = 10 marks)
Explain the difference between:
• Bandwidth, Data Rate and throughput
• Internet and World Wide Web
• Malware, Virus, Worm and Botnet
• Bandwidth flooding and connection flooding
Bandwidth
Data Rate
Throughput
Throughput refers to the overall
effective
transmission
rate,
The maximum amount of The actual amount of data
considering
things
like
data that can be transferred transferred between two
transmission overhead, protocol
per second on a link.
devices is called data rate.
inefficiencies and perhaps even
competing traffic.
For Example: if the bandwidth of a link is 100 Mbps, the data can be 50 Mbps and throughput
can be 40 Mbps. It means that the link can send 100 Mbit per second, but the devices are
sending at a rate of 50 Mbit per second and after all the delays the overall effective
transmission rate is 40 Mbit per second.
Internet
World Wide Web
It is a network of networks in which several
computers are connected and provide
services to each other by using TCP/IP
protocol.
It is an information space where documents
and other web resources are identified by
URLs and can be accessed via the Internet
using HTTP protocol.
National University of Computer and Emerging Sciences – FAST, CFD Campus
1
EE317 – DCN
Assignment Number 1 (Solution)
Malware
Malware is a
malicious software
that is used to
disturb the normal
working of a
computer.
Virus
Viruses are malware
that require some
form of user
interaction to infect
the user’s device.
Worm
Worms are
malware that can
enter a device
without any
explicit user
interaction.
Botnet
a network of thousands
of similarly
compromised devices
which is used to attack
the server or network.
Bandwidth Flooding
Connection Flooding
In bandwidth flooding, the attacker sends a
deluge of packets to the targeted host—so
many packets that the target’s access link
becomes clogged, preventing legitimate
packets from reaching the server.
In connection flooding, the attacker
establishes many half-open or fully open
TCP connections at the target host. The host
can become so bogged down with these
bogus connections that it stops accepting
legitimate connections.
Question Number 2
i)
(CLO 1)
(6 + 4 = 10 marks)
Consider the following network in which source is sending 3 packets to the
destination and the router is using store-and-forward transmission. Find the amount
of time that elapses from when the source begins to send the first packet until the
destination has received all three packets. The link speed from source to router is R
bps and from router to destination is 2R bps.
The source started to transmit at t = 0 seconds
First packet will be transmitted at t = L/R + L/2R seconds
First packet will reach at destination at t = L/R + L/2R = 3L/2R
2nd packet will reach at destination at t = 3L/R + (L/R+L/R) = 5L/R
3rd packet will reach at destination at t = 5L/R + (L/R+L/R) = 7L/R
ii)
Consider the following network in which a source and destination are connected
through N – 1 routers and the source is sending P packets to the destination. Find
the amount of time that elapses from when the source begins to send the first packet
until the destination has received all P packets. The link speed for all the links is R
bps.
First packet will reach at destination at t = NL/R
Second packet will reach at destination at t = NL/R + L/R
Pth packet will reach at destination at t = (N + P – 1) / R
National University of Computer and Emerging Sciences – FAST, CFD Campus
2
EE317 – DCN
Assignment Number 1 (Solution)
Question Number 3
(CLO 1)
(5 marks)
Explain some disadvantages of Layered Network Architecture.
Some of the disadvantages of the layered network architecture are:
1) It doesn’t define any particular protocol.
2) It may find sometimes difficult to fit a new protocol in this model. This is because
this model was created before the invention of any of these protocols.
3) There might be a negative impact on the performance as we have the extra header of
passing through layers instead of calling a component directly. It will provide
encapsulation but the complexity increases.
4) There is some duplication of services at various layers. Such as, both transport and
data link layer have error control mechanisms.
5) There is also interdependence among the layers. These layers cannot work in parallel.
They must be in wait to receive data from its predecessor.
Question Number 4
(CLO 1)
(2 + 8 = 10 marks)
Explain the difference between Denial of Service (DoS) and Distributed Denial of Service
(DDoS) attacks and outline some methods to prevents these attacks.
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
A DoS attack renders a network, host, or
other piece of infrastructure unusable by
legitimate users. In DoS attack a single
attacker
cause
bandwidth
flooding,
connection flooding or vulnerability attack.
A DoS attack is not a DDoS.
In a distributed DoS (DDoS) attack, the
attacker controls multiple sources and has
each source blast traffic at the target. The
purpose of DDoS attack is same as DoS
attack, but it is more severe than DoS attack.
All the DDoS attack are DoS.
DoS Attack
DDoS Attack
Here are some suggestions to prevent DoS and DDoS attacks.
1) Buy more bandwidth.
2) Build redundancy into your infrastructure.
3) Configure your network hardware against DDoS attacks.
4) Deploy anti-DDoS hardware and software modules.
5) Deploy a DDoS protection appliance.
6) Protect your DNS servers.
National University of Computer and Emerging Sciences – FAST, CFD Campus
3
EE317 – DCN
Question Number 5
Assignment Number 1 (Solution)
(CLO 1)
(5 + 5 = 10 marks)
Consider the following network in which hosts A and B are sending some data to host C. The
link between host A and the router can send 5 packets per second and that of host B is 7 packets
per second. And the link speed from router 1 to router 2 is 200bps. If host A is sending 5 packets
and host B is sending 6 packets to host C, then:
i) Find the number of packets that will wait in the buffer of router 1
ii) Find the minimum link speed required between router 1 and router 2 to avoid queuing
delay.
(Consider that each packet consists of 32 bits)
i) The router is receiving 5 + 6 = 11 packets at the input link.
The router can send (200/32) = 6.25  6 packets per second in the output link.
Thus 5 packets will wait in the buffer.
ii) The router may receive a maximum of 12 packets (384 bits) per second at the input.
So, the minimum link speed between router 1 and router 2 should be 384bps to avoid
queuing delay.
Question Number 6
(CLO 1)
(1 + 4 = 5 marks)
Consider there are 10 hosts in a network that are sending the data to a destination. Suddenly a
single host starts to transmit 1000 packets (each packet with 1000 bits) and the remaining 9
hosts become idle. The link between hosts and destination has a speed of 1Mbps. Find the time
required by ignoring all the delays to send the data to the destination if
i) Packet switching is used
ii) Circuit switching with TDM is used
i) In packet switching all the available bandwidth will be allocated to the transmitting
host. So the host will need [(1000 x 1000) / (1 x 106)] = 1 second.
ii) In circuit switching every host will get 1 second to transmit the data regarding of
available traffic in the link. So in this case the time required to transmit the data will
be
t = (10 x 1000 x 1000) / (1x106) = 10 seconds.
National University of Computer and Emerging Sciences – FAST, CFD Campus
4
Download