




已阅读5页,还剩1页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
第二章1. (Q2) For a communication session between a pair of processes, which process is the client and which is the server?Answer: The process which initiates the communication is the client; the process that waits to be contacted is the server. 2. (Q3) What is the difference between network architecture and application architecture?Answer: Network architecture refers to the organization of the communication process into layers (e.g., the five-layer Internet architecture). Application architecture, on the other hand, is designed by an application developer and dictates the broad structure of the application (e.g., client-server or P2P)3. (Q4) What information is used by a process running on one host to identify a process running on another host?Answer: The IP address of the destination host and the port number of the destination socket.4. (Q6) Referring to Figure 2.4, we see that none of the application listed in Figure 2.4 requires both no data loss and timing. Can you conceive of an application that requires no data loss and that is also highly time-sensitive?Answer: There are no good example of an application that requires no data loss and timing. If you know of one, send an e-mail to the authors5. (Q9) Why do HTTP, FTP, SMTP, and POP3 run on top of TCP rather than on UDP?Answer: The applications associated with those protocols require that all application data be received in the correct order and without gaps. TCP provides this service whereas UDP does not.6. (Q11) What is meant by a handshaking protocol?Answer: A protocol uses handshaking if the two communicating entities first exchange control packets before sending data to each other. SMTP uses handshaking at the application layer whereas HTTP does not.7. (Q13) Telnet into a Web server and send a multiline request message. Include in the request message the If-modified-since: header line to force a response message with the 304 Not Modified status code.Answer: Issued the following command (in Windows command prompt) followed by the HTTP GET message to the “” web server: telnet 80Since the index.html page in this web server was not modified since Fri, 18 May 2007 09:23:34 GMT, the following output was displayed when the above commands were issued on Sat, 19 May 2007. Note that the first 4 lines are the GET message and header lines input by the user and the next 4 lines (starting from HTTP/1.1 304 Not Modified) is the response from the web server.8. (Q14) Consider an e-commerce site that wants to keep a purchase record for each of its customers. Describe how this can be done with cookies.Answer: When the user first visits the site, the site returns a cookie number. This cookie number is stored on the users host and is managed by the browser. During each subsequent visit (and purchase), the browser sends the cookie number back to the site. Thus the site knows when this user (more precisely, this browser) is visiting the site.9. (Q15) Suppose Alice, with a Web-based e-mail account (such as Hotmail or gmail), sends a message to Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alices host to Bobs host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts.Answer: Message is sent from Alices host to her mail server over HTTP. Alices mail server then sends the message to Bobs mail server over SMTP. Bob then transfers the message from his mail server to his host over POP3.10. (Q10) Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate at the transport layer or the application layer? If the application developer wants TCP to be enhanced with SSL, what does the developer have to do?Answer: SSL operates at the application layer. The SSL socket takes unencrypted data from the application layer, encrypts it and then passes it to the TCP socket. If the application developer wants TCP to be enhanced with SSL, she has to include the SSL code in the application.11. (Q16) Print out the header of an e-mail message you have recently received. How many Received: header lines are there? Analyze each of the header lines in the message.Answer: from 03 (EHLO )Received: (03) by with SMTP; Sat, 19 May 2007 16:53:51 -0700from (06) by Received: with Microsoft SMTPSVC(6.0.3790.2668); Sat, 19 May 2007 16:52:42 -0700Received: from mail pickup service by with Microsoft SMTPSVC; Sat,19 May 2007 16:52:41 -0700Message-ID: Received: from 23 by with HTTP; Sat, 19 May 2007 23:52:36 GMTFrom: prithula dhungel To: Bcc:Subject: Test mailDate: Sat, 19 May 2007 23:52:36 +0000Mime-Version:1.0Content-Type: Text/html; format=flowedReturn-Path: Figure: A sample mail message headerReceived: This header field indicates the sequence in which the SMTP servers send and receive the mail message including the respective timestamps.In this example there are 4 “Received:” header lines. This means the mail message passed through 5 different SMTP servers before being delivered to the receivers mail box. The last (forth) “Received:” header indicates the mail message flow from the SMTP server of the sender to the second SMTP server in the chain of servers. The senders SMTP server is at address 23 and the second SMTP server in the chain is . The third “Received:” header indicates the mail message flow from the second SMTP server in the chain to the third server, and so on.Finally, the first “Received:” header indicates the flow of the mail message from the forth SMTP server to the last SMTP server (i.e. the receivers mail server) in the chain.Message-id: The message has been given this number BAY130-F26D9E35BF59E0D18A819AFB9310phx.gbl(by . Message-id is a unique string assigned by the mail system when the message is first created.From: This indicates the email address of the sender of the mail. In the givenexample, the sender is To: This field indicates the email address of the receiver of the mail. In the example, the receiver is Subject: This gives the subject of the mail (if any specified by the sender). In the example, the subject specified by the sender is “Test mail”Date: The date and time when the mail was sent by the sender. In the example, the sender sent the mail on 19th May 2007, at time 23:52:36 GMT.Mime-version: MIME version used for the mail. In the example, it is 1.0. Content-type: The type of content in the body of the mail message. In the example, it is “text/html”.Return-Path: This specifies the email address to which the mail will be sent if thereceiver of this mail wants to reply to the sender. This is also used by the sendersmail server for bouncing back undeliverable mail messages of mailer-daemonerror messages. In the example, the return path is“”.12. (Q18) Is it possible for an organizations Web server and mail server to have exactly the same alias for a hostname (for example, )? What would be the type for the RR that contains the hostname of the mail server?Answer: Yes an organizations mail server and Web server can have the same alias for a host name. The MX record is used to map the mail servers host name to its IP address.13. (Q19) Why is it said that FTP sends control information “out-of-band”?Answer: FTP uses two parallel TCP connections, one connection for sending control information (such as a request to transfer a file) and another connection for actually transferring the file. Because the control information is not sent over the same connection that the file is sent over, FTP sends control information out of band.14. (P6) Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP address of the HTTP server is initially unknown. What transport and application-layer protocols besides HTTP are needed in this scenario?Answer: Application layer protocols: DNS and HTTPTransport layer protocols: UDP for DNS; TCP for HTTP15. (P9) Consider Figure2.12, for which there is an institutional network connected to the Internet. Suppose that the average object size is 900,000 bits and that the average request rate from the institutions browsers to the origin servers is 10 requests per second. Also suppose that the amount of time it takes from when the router on the Internet side of the access link forwards an HTTP request until it receives the response is two seconds on average (see Section 2.2.5). Model the total average response times as the sum of the average access delay (that is, the delay from Internet router to institution router) and the average Internet delay. For the average access delay, use /(1-), where is the average time required to send an object over the access link and is the arrival rate of objects to the access link.a. Find the total average response time.b. Now suppose a cache is installed in the institutional LAN. Suppose the hit rate is 0.6. Find the total response time.Answer:a. The time to transmit an object of size L over a link or rate R is L/R. The average time is the average size of the object divided by R:= (900,000 bits)/(1,500,000 bits/sec) = 0.6 secThe traffic intensity on the link is (1.5 requests/sec)(0.6 sec/request) = 0.9. Thus, the average access delay is (0.6 sec)/(1 - 0.9) = 6 seconds. The total average response time is therefore 6 sec + 2 sec = 8 sec.b. The traffic intensity on the access link is reduced by 40% since the 40% of the requests are satisfied within the institutional network. Thus the average access delay is (0.6 sec)/1 (0.6)(0.9) = 1.2 seconds. The response time is approximately zero if the request is satisfied by the cache (which happens with probability 0.4); the average response time is 1.2 sec + 2 sec = 3.2 sec for cache misses (which happens 60% of the time). So the average response time is (0.4)(0 sec) + (0.6)(3.2 sec) = 1.92 seconds. Thus the average response time is reduced from 8 sec to 1.92 sec.16. (P12) What is the difference between MAIL FROM: in SMTP and From: in the mail message itself?Answer: The MAIL FROM: in SMTP is a message from the SMTP clien
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 家禽部位美食烹饪课程国际合作创新创业项目商业计划书
- 暗室师中秋节后复工安全考核试卷含答案
- 高中收购学校合同模板(3篇)
- 齿轮制造工国庆节后复工安全考核试卷含答案
- 个人农村土地承包合同(标准版)
- 货车买卖合同(标准版)
- 孤残儿童护理员国庆节后复工安全考核试卷含答案
- 成人学历提升教育理论真题解析
- 承建安全协议书与承揽加工合同5篇
- 钼钨冶炼辅料制备工国庆节后复工安全考核试卷含答案
- 《留置胃管的护理》课件
- 酒店业HSE管理体系及客户安全措施
- 《新能源乘用车二手车鉴定评估技术规范 第1部分:纯电动》
- 基地管理人员的岗位职责
- TCSEB 0013-2020《水下爆破工程技术设计规范》
- 《氨基酸与还原糖对美拉德反应制备浓香菜籽油影响的研究》
- 阜外体外循环手册
- 2024年度食品行业互联网营销合同协议
- DL∕T 1362-2014 输变电工程项目质量管理规程
- 劳务派遣合同(2024版)
- 《建筑消防设施检测技术规程》
评论
0/150
提交评论