0% found this document useful (0 votes)
146 views4 pages

Assignment 1 DCN

Data communication networks can be vulnerable to hackers intercepting personal information being transmitted online. Hackers have accessed large databases in incidents like the Ashley Madison hack, obtaining private photos and details of users. To better protect information and privacy, people should use secure connections like VPNs, avoid public WiFi networks, and utilize strong passwords and antivirus software. Additionally, the limited IPv4 address space is no longer sufficient for the massive number of internet-connected devices, necessitating an eventual transition to IPv6 which provides vastly more unique addresses.

Uploaded by

kainat Khalid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
146 views4 pages

Assignment 1 DCN

Data communication networks can be vulnerable to hackers intercepting personal information being transmitted online. Hackers have accessed large databases in incidents like the Ashley Madison hack, obtaining private photos and details of users. To better protect information and privacy, people should use secure connections like VPNs, avoid public WiFi networks, and utilize strong passwords and antivirus software. Additionally, the limited IPv4 address space is no longer sufficient for the massive number of internet-connected devices, necessitating an eventual transition to IPv6 which provides vastly more unique addresses.

Uploaded by

kainat Khalid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Data Communication Network

Data Communication
Network
Assignment 1
Name: Kainat Khan
Class: MCS/MIT 1
Submitted to: Dr Ishtiaq
DATA COMMUNICATION NETWORK

Question 1: Are there any chances of the data on the internet i i i i i i i i i

being captured? Justify your answer with some example.


i i i i i i i i

Mention some ways to secure yourself.


i i i i i i

Yes, data can be captured on the internet. If you have a internet connection then it
i i i i i i i i i i i i i i i

must be provided by an ISP (Internet service provider). You connect to your ISP,
i i i i i i i i i i i i i i

and your ISP routes the data to where it’s supposed to go elsewhere on the
i i i i i i i i i i i i i i i

internet. There are hackers on the internet and they can steal your personal
i i i i i i i i i i i i i

information.
i

For Example
i

Some of the biggest examples are the Ashley Madison hack or the Starbucks app
i i i i i i i i i i i i i

hack. In the Ashley Madison hack, hackers were able to break into the customer
i i i i i i i i i i i i i i

database and get access to all the information including many private pictures of
i i i i i i i i i i i i i

popular celebrities. This incident was a big shakeup in the Internet world which also
i i i i i i i i i i i i i i

affected private lives of many people.


i i i i i i

To protect yourself:
i i

 Use secure connections i i

 Don’t use free Wi-Fi i i i

 Don’t use public computers i i i

 Use VPN whenever you’re online i i i i

 Have good passwords i i

 Use good antiviral products i i i

 Use good cryptography i i

 Have good firewalls i i

Question 2: Do you think IPv4 addresses are enough for all the i i i i i i i i i

internet users/devices? Justify your answer while giving some


i i i i i i i i

scenario.
i
Not only are there not enough IPv4 addresses, but what we (as an industry) are
i i i i i i i i i i i i i i

doing is making a bad situation even worse.


i i i i i i i i

The problem is that IP addresses get allocated in blocks, and the blocks have “holes”
i i i i i i i i i i i i i i

in them. So, for example, suppose I was given a /24 block. That means I have 254
i i i i i i i i i i i i i i i i i

addresses available for my use. However, I don’t need 254 addresses, I only need
i i i i i i i i i i i i i i

100 addresses. So I could get by with a /25. So what I do is I sell you my unused /25.
i i i i i i i i i i i i i i i i i i i i i

After all, they are never going to be used. BUT…. you are probably far away from
i i i i i i i i i i i i i i i i

me, so an entry has to be in the routing tables all over the internet on how to get to
i i i i i i i i i i i i i i i i i i i i

my /25 and your /25. One entry is no big deal. But thousands and thousands of
i i i i i i i i i i i i i i i i

these deals are getting made. So the routing tables are getting bigger There have
i i i i i i i i i i i i . i i

been a couple of cases where the routing tables got so large that the routers ran out
i i i i i i i i i i i i i i i i i

of memory to hold them, which means that the network going through those
i i i i i i i i i i i i i

routers separated. Very hard problem to track down.


i i i i i i i i

The real solution is to tell everybody just stop using IPv4. Use IPv6 everywhere. That
i i i i i i i i i i i i i i

probably won’t happen, however. Nobody wants to take the first step.
i i i i i i i i i i i

Question 3: What could be the possible issues if you increase i i i i i i i i

the number of layers in TCP/IP model or if you reduce the


i i i i i i i i i i i i

number of layers?
i i i

TCP/IP is not a “model”. It is a practical implementation of layered communication


i i i i i i i i i i i i

protocols. Increasing or reducing the number of layers would destroy the design
i i i i i i i i i i i i

and in effect turn it into something else entirely.


i i i i i i i i i

If we increase the number of layers in TCP/IP model then it takes time to transmit
i i i i i i i i i i i i i i i

data over the network because it has to go through from many layers so it is time
i i i i i i i i i i i i i i i i i

consuming. Even in OSI model has 7 layers that is enough but if we increase more 7
i i i i i i i i i i i i i i i i i

layers then it takes a lot of time. TCP/IP model has 5 layers and that is large enough
i i i i i i i i i i i i i i i i i i

to avoid complexity but if we reduce the number of layers in TCP/IP model then it
i i i i i i i i i i i i i i i i

increases the level of complexity.


i i i i i

Question 4: If you are not using any STANDARD for your device i i i i i i i i i

manufacturing, then what sort of problems you may


i i i i i i i i

encounter? And what is the solution for that?


i i i i i i i i
 Once you have purchased your equipment you are locked into that i i i i i i i i i i

manufacturer. i

 You cannot sensibly compare equipment as they use different standards.


i i i i i i i i i

 There is a lack of price competition which can result in higher prices.


i i i i i i i i i i i i

 There may be less encouragement for technical development due to fewer


i i i i i i i i i i

competitors. i

A standard reduces the number of variables that come into play while trouble
i i i i i i i i i i i i

shooting problems, which will result in better, service for information technology
i i i i i i i i i i i

users. Networking standards exist to help ensure products of different vendors are
i i i i i i i i i i i i

able to work together in a network without risk of incompatibility.


i i i i i i i i i i i

Question 5: How many layers of your packet are processed at i i i i i i i i

the router and why? What if we increase or decrease the


i i i i i i i i i i i

number of layers being processed by the router?


i i i i i i i i

In the network layer, there are the services that direct the data from the host to the
i i i i i i i i i i i i i i i i

destination. In many scenarios, the packets might have to travel through many
i i i i i i i i i i i i

intermediary devices such as routers. Routing ensures that the path taken to the
i i i i i i i i i i i i i

destination is the most efficient as defined by the administrator. But the packet has
i i i i i i i i i i i i i i

been processed by the physical layer, data link layer and network layer.
i i i i i i i i i i i i i

The network layer, or OSI Layer 3, provides services to allow end devices to
i i i i i i i i i i i i i

exchange data across the network. To accomplish this end-to-end transport, the
i i i i i i i i i i i

network layer uses four basic processes:


i i i i i i

1. Addressing end devices i i

2. Encapsulation
3. Routing
4. De-encapsulation
And if increase or reduce the number of layers being processed by router then
i i i i i i i i i i i i i

Dynamic router communications cause additional network overhead, which results


i i i i i i i i i

in less bandwidth for user data. And also Routers are slower than other devices
i i i i i i i i i i i i i i

because they must analyze a data transmission from the Physical through the
i i i i i i i i i i i

Network layer.
i i

You might also like