1. List 5 applications that use the Internet. e-mail, file transfer, remote login, WWW, file sharing (P2P systems such as E-mule, etc), skype, VoIP based applications, teleconference applications (e.g., NetMeeting, WebEx, etc.). 2. What are "stand-alone" computers? Give an example mentioned in class. Stand Alone computers are those which are unconnected from other computers. Such as a single home pc, not connected to the Internet or older-generation mainframe computers. 3. What is the main principle behind the telephone network? Explain. The main purpose was to allow for voice communication from one end user to another. This is done as a direct connection between the end users. The telephone network was designed for voice communication and as its main design principle used "circuit switching". Circuit switching networks establish a physical circuit or connection between the end points engaged in the communication. By doing so, it reserves the necessary resources to guarantee a successful call. These resources are used exclusively by the call in progress, i.e., are not shared with any other call even when the call is idle. 4. How is it different from the main principle behind the internet? Explain The internet was instead developed with the goal of providing data communication between users. It uses the principle of "packet switching", which allows several calls, or connetions, to share the same set of resources. 5. What are packets? Packets are the body of a message, as well as the encapsulation of that packet, transmitted over the internet. In the Internet, application-layer messages are broken down into smaller self-contained pieces that can be routed from the source of the message to its destination, independent of one another. 6. What were the first 3 internet applications? Email, File Transfer, Remote Login 7. What is a "killer app"? In your opinion, what is/was the internet's "killer app"? A killer app is one which is the hottest thing out there, the application which all services and providers will build up upon / make use of, in order to draw in their customers. In my opinion, the general killer app would be email, which has allowed communication on a much larger and faster scale than previously [there are many possible answers here as long as they are justified/explained; e.g., i would say that the Internet's killer app is the Web.] 8. What is the IETF? The IETF is the Internet Engineering Task Force, which is charged with providing standardized documentation to influence the design, use, and management of the Internet. 9. How are IP addresses assigned? From Wikipedia: The Internet Assigned Numbers Authority (IANA) is the entity that oversees global IP address allocation, root zone management for the Domain Name System (DNS), media types, and other Internet Protocol related assignments. It is operated by the Internet Corporation for Assigned Names and Numbers, better known as ICANN. Prior to the establishment of ICANN for this purpose, IANA was administered primarily by Jon Postel at the Information Sciences Institute at the University of Southern California, under a contract USC/ISI had with the United States Department of Defense, until ICANN was created to assume the responsibility under a United States Department of Commerce contract. IP addresses are assigned by essentially the same process depending on the scale. Externally, as seen by the world, IP addresses are assigned by the IANA, the Internet Assigned Numbers Authority, which allows for ISPs and businesses to obtain a block of IP addresses which can then be sold to and used by their respective customers. Inside of a local network, a similar situation is seen where IP Addresses are assigned by the local network administrator manually or automatically (via a protocol called DHCP). 10. What is the End to End Principle and how does it apply to the internet? The end to end principle states that whenever possible, communications protocol operations should be set up to occur at the end points of the communications system, as close to the end point as possible. This allows for the heavier weight protocols to be handled out of the main stream of the data, while the lighterweight protocols necessary to transmit the data are used by the network itself.