All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer science
computer networking
Questions and Answers of
Computer Networking
Using BER, show how we can encode a structured data type made of an INTEGER of value (2371), an OCTET STRING of value ("Computer"), and an IPAddress of value (185.32.1.5) as shown
Find the type (simple, sequence, sequence of) of the following objects in SMI.a. An unsigned integerb. An IP addressc. An object named. A list of integerse. A record defining an object name, an IP
Assume a data structure is made of an INTEGER of value (131) and another structure made of an IPAddress of value (24.70.6.14) and an OCTETSTRING ("UDP"). Using BER, encode the data structure.
What is the length of the value field in the following BER encoding?04 09 48 65 6C 4C …
Distinguish between SMI and MIB.
Given the code 300C02040000099806040A05030E, decode it using BER.
What does the if object in MIB define? Why does this object need to be managed?
Given the code 300D04024E6F300706030103060500, decode it using BER.
Assume an object identifier in MIB has three simple variables. If the object identifier is x, what is the identifier of each variable?
Assume a manager needs to know the number of user datagrams an agent has sent out (a udpOutDatagrams counter with the identifier 1.3.6.1.2.1.7.4). Show the code for a Varbind that is sent in a
Can SNMP reference the entire row of a table? In other words, can SNMP retrieve or change the values in the entire row of a table? Explain.
In SCTP, a packet is carrying a COOKIE ECHO message and a DATA chunk. If the size of the cookie is 200 bytes and that of the user data is 20 bytes, what is the size of the packet?
In SCTP, the state of a receiver is as follows:a. The receiving queue has chunks 1 to 8, 11 to 14, and 16 to 20.b. There are 1800 bytes of space in the queue.c. The value of lastAck is 4.d. No
(a) Consider the following HTML tag:<h1 title=‘‘this is the header’’> HEADER 1 </h1>Under what conditions does the browser use the TITLE attribute, and how?(b) How does the
You are given a text file of size 60 MB, which is to be encrypted using steganography in the low-order bits of each color in an image file. What size image would be required in order to encrypt the
The image of Fig. 8-54(b) contains the ASCII text of five plays by Shakespeare. Would it be possible to hide music among the zebras instead of text? If so, how would it work and how much could
Consider an image of 2048 × 512 pixels. You want to encrypt a file sized 2.5 MB. What fraction of the file can you encrypt in this image? What fraction would you be able to encrypt if you compressed
In the previous problem, suppose a sliding window protocol is used instead. For what send window size will the link utilization be 100%? You may ignore the protocol processing times at the sender and
Prove that in 4B/5B encoding, a signal transition will occur at least every four bit times.
You think that a computer with the domain name “aCollege.edu” has several IP addresses. Write a statement in Java to create an array of InetAddress objects associated with this host.
You think that a computer with the IP address “14.26.89.101” has more IP addresses. Write a statement in Java to create an array of InetAddress classes associated with this host.
You want to write a program in which you need to refer to the InetAddress of the computer you are working with. Write a statement in Java to create the corresponding object.
You want to create all InetAddress objects associated with the computer you are working with. Write statements in Java in order to do so.
Write a statement in Java that stores the port number 62230 in a variable in Java and guarantees that the number is stored as an unsigned number.
A socket address is the combination of an IP address and a port number that defines an application program running on a host. Can we create an instance of the InetSocketAddress class with an IP
Write a statement in Java to create a socket address bound to the local host and the HTTP server process.
Write a statement in Java to create a socket address bound to the local host and the ephemeral port number 56000.
Write a statement in Java to create a socket address bound to the host with domain name “some.com” and a client process with port number 51000.
Write a statement in Java to create a socket address bound to InetSocketAddress and the TELNET server process.
Write a statement in Java to extract the InetAddress of an InetSocketAddress named sockAd.
Write a statement in Java to extract the port number of an InetSocketAddress named sockAd.
What is the difference between the Data gram Socket class and the Socket class in Java?
What is the difference between the ServerSocket class and the Socket class in Java?
We say that in network programming a socket should be at least bound to a local socket address. The first constructor of the DatagramSocket class (see Table 25.10) has no parameters. Can you explain
In Figure 25.16, what changes are needed if a client needs to send a message other than a string (a picture, for example).Figure 25.16 Figure 25.16 Design of the UDP Client Client application program
In Figure 25.15, assume that the request is a URL to retrieve a picture. How is the URL stored in the recvBuff?Figure 25.15 Figure 25.15 Design of the UDP server Server application program Process
Explain how a UDP client program (Table 25.13) sleeps until the response comes from the server. Table 25.13 A simple UDP client program 1 import java.net.*; 2 import java.io.*: 3. 4 public class
How is a Socket object in a TCP client (Figure 25.18) created and destroyed?Figure 25.18 Figure 25.18 Design of the TCP client Client application program Create request Use response | String String
We have input stream classes in Java. Can you explain why the TCP client program does not directly use these classes to create the input stream?
In Figure 25.18, how does the client create the input and output streams to communicate with the server?Figure 25.18 Figure 25.18 Design of the TCP client Client application program Create request
Assume there is a server with the domain name www.common.com.a. Show an HTTP request that needs to retrieve the document/usr/users/doc. The client accepts MIME version 1, GIF or JPEG images, but the
During the weekend, Alice often needs to access files stored on her office desktop from her home laptop. Last week, she installed a copy of the FTP server process on her desktop at her office and a
In HTTP, draw a figure to show the application of cookies in a scenario in which the server allows only the registered customer to access the server.
Alice has a video clip that Bob is interested in getting; Bob has another video clip that Alice is interested in getting. Bob creates a web page and runs an HTTP server. How can Alice get Bob’s
In HTTP, draw a figure to show the application of cookies in a web portal using two sites.
When an HTTP server receives a request message from an HTTP client, how does the server know when all headers have arrived and the body of the message is to follow?
In HTTP, draw a figure to show the application of cookies in a scenario in which the server uses cookies for advertisement. Use only three sites.
In a nonpersistent HTTP connection, how can HTTP inform the TCP protocol that the end of the message has been reached?
Draw a diagram to show the use of a proxy server that is part of the client network:a. Show the transactions between the client, proxy server, and the target server when the response is stored in the
Can you find an analogy in our daily life as to when we use two separate connections in communication similar to the control and data connections in FTP?
In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no presentation layer. But an application-layer protocol can include some of the features defined in this layer if needed.
FTP uses two separate well-known port numbers for control and data connection. Does this mean that two separate TCP connections are created for exchanging control information and data?
In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no session layer. But an application-layer protocol can include some of the features defined in this layer if needed. Does
FTP uses the services of TCP for exchanging control information and data transfer. Could FTP have used the services of UDP for either of these two connections? Explain.
HTTP version 1.1 defines the persistent connection as the default connection. Using RFC 2616, find out how a client or server can change this default situation to nonpersistent.
In FTP, which entity (client or server) starts (actively opens) the control connection? Which entity starts (actively opens) the data transfer connection?
In SMTP, a sender sends unformatted text. Show the MIME header.
What do you think would happen if the control connection were severed before the end of an FTP session? Would it affect the data connection?
What do you think would happen if the control connection were severed before the end of an FTP session? Would it affect the data connection?
Write concurrent TCP client-server programs to simulate a simplified version of POP. The client sends a request to receive an e-mail in its mailbox; the server responds with the e-mail.
In FTP, can a server retrieve a file from the client site?
In SMTP, a.a non-ASCII message of 1000 bytes is encoded using base64. How many bytes are in the encoded message? How many bytes are redundant? What is the ratio of redundant bytes to the total
In FTP, can a server get the list of the files or directories from the client?
Encode the following message in base64:01010111 00001111 11110000
FTP can transfer files between two hosts using different operating systems with different file formats. What is the reason?
Encode the following message in quoted-printable:01001111 10101111 01110001
Does FTP have a message format for exchanging commands and responses during control connection?
According to RFC 1939, a POP3 session is in one of the following four states: closed, authorization, transaction, or update. Draw a diagram to show these four states and how POP3 moves between them.
Does FTP have a message format for exchanging files or a list of directories/files during the file-transfer connection?
POP3 protocol has some basic commands (that each client/server needs to implement). Using the information in RFC 1939, find the meaning and the use of the following basic commands:a. STATb. LISTc.
Can we have a control connection without a data-transfer connection in FTP? Explain.
POP3 protocol has some optional commands (that a client/server can implement). Using the information in RFC 1939, find the meaning and the use of the following optional commands:a. UIDLb. TOP 1 15c.
Can we have a data-transfer connection without a control connection in FTP? Explain.
Using RFC 1939, assume a POP3 client is in the download-and-keep mode. Show the transaction between the client and the server if the client has only two messages of 192 and 300 bytes to download from
Assume we need to download an audio using FTP. What file type should we specify in our command?
Using RFC 1939, assume a POP3 client is in the download-and-delete mode. Show the transaction between the client and the server if the client has only two messages of 230 and 400 bytes to download
Both HTTP and FTP can retrieve a file from a server. Which protocol should we use to download a file?
In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no presentation layer. But an application-layer protocol can include some of the features defined in this layer if needed.
Are the HELO and MAIL FROM commands both necessary in SMTP? Why or why not?
In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no session layer. But an application-layer protocol can include some of the features defined in this layer if needed. Does
In Figure 26.13 in the text, what is the difference between the MAIL FROM in the envelope and the FROM in the header?Figure 26.13 Figure 26.13 Format of an e-mail Behrouz Forouzan 20122 Olive Street
In FTP, assume a client with user name John needs to store a video clip called video2 on the directory /top/videos/general on the server. Show the commands and responses exchanged between the client
Alice has been on a long trip without checking her e-mail. She then finds out that she has lost some e-mails or attachments her friends claim they have sent to her. What can be the problem?
In FTP, a user (Jane) wants to retrieve an EBCDIC file named huge from /usr/users/report directory using the ephemeral port 61017. The file is so large that the user wants to compress it before it is
Assume a TELNET client uses ASCII to represent characters, but the TELNET server uses EBCDIC to represent characters. How can the client log into the server when character representations are
In FTP, a user (Jan) wants to make a new directory called Jan under the directory/usr/usrs/letters. Show all of the commands and responses.
The TELNET application has no commands such as those found in FTP or HTTP to allow the user to do something such as transfer a file or access a web page. In what way can this application be useful?
In FTP, a user (Maria) wants to move a file named file1 from /usr/users/report directory to the directory /usr/top/letters. Note that this is a case of renaming a file. We first need to give the name
Can a host use a TELNET client to get services provided by other clientserver applications such as FTP or HTTP?
In DNS, which of the following are FQDNs and which are PQDNs?a. xxxb. xxx.yyy.netc. zzz.yyy.xxx.edu.
Assume we design a new client-server application program that requires persistent connection. Can we use UDP as the underlying transport-layer protocol for this new application?
Write a method in Java to change an unsigned 32-bit integer representing a mask to an integer representing a prefix (/n).
Explain how a client process finds the IP address and the port number to be inserted in a remote socket address.
Write a method in Java to change an integer representing a prefix to an unsigned 32-bit integer representing the numeric mask.
A source socket address is a combination of an IP address and a port number. Explain what each section identifies.
Write a method in Java to add a given prefix (as an integer) at the end of an IP address to create a string representing the CIDR notation (“x.y.z.t/n”).
Which of the following can be a source of data?a. A keyboardb. A monitorc. A socket
Modify, compile, and test the client program in Table 25.17 and the server program in Table 25.16 to simulate a local DNS client and server. The server has a short table made of two columns, domain
Write a method in Java to extract the IP address (without the prefix) as a string in dotted-decimal notation from a string representing the CIDR notation (“x.y.z.t/n”).
A new application is to be designed using the client-server paradigm. If only small messages need to be exchanged between the client and the server without concern for message loss or corruption,
Showing 700 - 800
of 2026
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last