IT348-Week 1 Assignment 1
IT348-Week 1 Assignment 1
Week 1: Assignment 1
Author
Affiliation
Course
Date
2
Week 1: Assignment 1
Question 1
In general, the router's function is to handle and transmit data packets so that they arrive at
their destination effectively. Whenever an IP packet arrives at a router, the router executes
(i) Managing traffic: In order to prevent congestion, routers can regulate data flow,
(ii) Examining the Destination IP Address: To determine the network's next hop, the
(iii) Packet forwarding: The router moves the packet closer to its target by
forwarding it to the next available device (either the destination host or another
router) in accordance with the directions provided in the table used for routing.
(iv)Network Address Translation (NAT): The router uses NAT to convert internal
across numerous workplace networks, allowing devices within the network to access
the web.
(v) Routing Table Lookup: It looks for information on the most efficient routes to
different networks in its routing table. Routing protocols such as OSPF (Open
Shortest Path First) and BGP (Border Gateway Protocol) modify the routing table
dynamically.
Question 2
server. For instance, DNS servers convert domain names, such as www.example.com, into IP
addresses, but they are unable to resolve domain names. As a result, although websites or
services determined by their domain names are operational, a host cannot resolve domain
3
names if it is unable to connect to the DNS server. Secondly, another issue concerns possible
Interruptions to internal services (Khormali et al., 2021). A DNS problem may cause access
problems within the workplace network for internal systems that depend on domain names,
like application servers, intranet services, or shared documents. Thirdly, another issue
concerns increased delay and possible timeouts. Applications could try to resolve names
continuously when DNS resolution fails, which might result in delays and timeouts across the
entire network.
Question 3
Question 4
target server, network, or service becomes overwhelmed with excessive traffic from a number
of infected devices, frequently used as part of a bot network. The systems being targeted
become unusable for authorized users due to the disruption or possibly shutdown caused by
this enormous load (Mahjabin et al., 2017). Consequently, one potential impact of the attack
is network outage. A distributed denial of service attack has the potential to overload an
4
organization's network's capacity, resulting in extensive outages and denying staff members
Another potential impact is productivity loss. When essential services are unavailable,
workers might not be able to carry out their responsibilities, which would have a significant
negative influence on output. Similarly, another potential challenge concerns fiscal and
professional damage. Prolonged outages may result in financial losses as well as damage to
reputation if customers or partners depend on services that have been affected by the attack
(Mahjabin et al., 2017). Nonetheless, mitigating the attack involves various solutions. For
instance, organizations implement traffic monitoring, firewall defenses, and DDoS protection
services to stop DDoS assaults by identifying and filtering unwanted traffic before it
References
Khormali, A., Park, J., Alasmary, H., Anwar, A., Saad, M., & Mohaisen, D. (2021). Domain
name system security and privacy: A contemporary survey. Computer Networks, 185,
107699.
Mahjabin, T., Xiao, Y., Sun, G., & Jiang, W. (2017). A survey of distributed denial-of-
https://www.enterprisenetworkingplanet.com/standards-protocols/what-is-a-network-
router/