What are the services provided by tcp

Assignment Help Computer Networking
Reference no: EM13896515

Question 1:

a) Name four socket functions (C functions) used to create client/server applications.

b) Name the five layers in a typical TCP/IP computer network.

c) What are the services provided by TCP?

d) The source and destination port numbers are included in the packet header. Which layer needs to be able to read these port numbers?

Question 2: (The Application Layer)

a) If an FTP client is in active mode, what are the two FTP commands (protocol commands) issued by the client when the user issues:
ftp> ls

b) If an FTP client is in passive mode, what are the two FTP commands (protocol commands) issued by the client when the user issues:
ftp> get

c) The command netstat is used by a system administrator. Explain the difference between LISTEN and ESTABLISHED states.

Proto    Recv-Q     Send-Q      Local Address        Foreign Address       State
tcp         0              0             localhost:1234          *:*                    LISTEN
tcp         0              0             localhost:43000       it046500:20        ESTABLISHED

d) How many simultaneous connections does HTTP needs in order to download a single file? How many simultaneous connections does FTP needs in order to download a single file?

e) Briefly explain what is a DNS (Domain Name Service) iterated query. Explain why this method is important to keep the scalability of the DNS.

Question 3: (The Transport Layer)

a) A distributed system uses UDP to transfer files between nodes. You are asked to design a simple reliable protocol to replace it. What are the essential elements that you need to include in such a protocol? Your solution should focus on possible lost and damaged packets, not performance.

b) Explain the difference between Go-Back-N and Selective Repeat. Given a choice, which one is better for the performance of the network?

c) Explain the difference between "Congestion Control" and "Flow Control" from the view point of a transport protocol.

Question 4. (Network Layer)

a) What are the two important functions provided by the network layer protocols? Emphasize the importance of the difference between the two functions.

b) The network administrator checks an Ethernet card configuration using the command ipconfig. He extracts the values for the IP address and for the Mask:
IP address   192.123.246.12
Mask           255.255.255.128

Write two examples of IP addresses that this machine can access:

1) one IP address that is accessible directly (no routing) by this machine.
2) one IP address that is only accessible via the gateway (router).

c) There are four routers connected via certain links (Figure 1). Suppose that the following table is used for the initialisation of D's routing table:

2272_router.png

And the minimum cost is an array of 4 integers in the order A, B, C, D:

A advertises its minimum costs as: 0, 12, 7, 3
B advertises its minimum costs as: 12, 0, ∞, 70
C advertises its minimum costs as: 7, ∞, 0, 2

Show the first update on D's table if node D simultaneously receives packets with the minimum cost information from the routers A, B and D.

d) There are possibly hundreds of millions of IP addresses in the Internet. Explain why the routing tables in TCP/IP routers do not need to contain lots of entries, and are usually rather small.

Question 5. (Data-link and Physical Layers)

a) What is the purpose of CRC (Cyclic Redundancy Check)?

b) Compute the CRC value for the character "1110 0001" considering:

- the algorithm uses a standard polynomial method with 16 bits
- the generator is 0x8005
- no reverse bytes, no reverse results

Write the final result of the CRC in hexadecimal.

c) Collisions are a challenging problem for data link protocols. Explain the main differences between data-link layer protocols for wired networks and protocols for wireless networks.

d) Explain brifly how the ARP protocol keeps a table with the IP addresses and correspondent MAC (hardware) addresses.

Question 6. (Network Security)

a) MD5 is a well known method for message digests. Message digests find a fixed-length number (say, 128 bits) that correlates to a certain file.

Give two reasons why CRC is not a suitable method to be used as a message digest, even though CRC also finds a fixed-length number that correlated to a file.

b) Considering the RSA algorithm, find suitable e and d for the following pair of prime numbers, explaining how you chose them:

p = 5   q = 11

n = ?
z = ?

e = ?    d = ?

c) Discuss the difference between asymetric encryption and symmetric encryption. Complete the table stating advantages and disadvantages of these two encryption methods.

d) Explain briefly what is a "packet sniffing" attack. Discuss and compare the implications of such atacks for wired networks and wireless networks.

Reference no: EM13896515

Questions Cloud

Case study on the night supervisor : Jimmy needs to make a decision quickly. What should the night supervisor do in this situation? What procedures are in place?
Describe the impact of aids : Explain how differential punishments for homicide may be based on the relationship of the killer to the victim. Describe the impact of AIDS and other emerging diseases. Suggest ways of reducing the risk.
The force exerted by the man on the rope will be : A man of mass m stands on a crate of mass M. He pulls on a light rope passing over a smooth light pulley. The other end of the rope is attached to the crate. For the system to be is equilibrium, the force exerted by the man on the rope will be:
How do you find the percentage of z score : How do you find the percentage of z score that is below a negative number?
What are the services provided by tcp : Name four socket functions (C functions) used to create client/server applications. Name the five layers in a typical TCP/IP computer network. What are the services provided by TCP
Discuss the effects of the new technology : Discuss the effects of the "new technology" (computers) on education as well as business and finance.
How would you describe the team member morale at given point : How would you describe the team members' morale at this point? What are their primary concerns?
Create a timeline that displays the development : Create a timeline that displays the development of abnormal psychology. Include at least five to seven main milestones.
What are some strengths of the proposal quality improvement : What are some strengths and weaknesses of the proposal quality improvement initiative

Reviews

Write a Review

Computer Networking Questions & Answers

  Fault tolerance for communicating between the floors

fault tolerance for communicating between the floors

  What tools you would use in each given case

Please explain what tools you would use in each case and how it would validate the customer complaint. Customer says that when he receives messages, the message is periodically missing some characters.

  What is the size of data in the ipv4 datagram

What is the size of data in the IPv4 datagram and what type of higher-level protocol is this datagram carrying?

  Designing an application server to host web sites

You have been tasked with researching and designing an application server to host Web sites, FTP sites, and streaming media. This server will be used for both internal and external access. In order to complete this task, you must answer the follow..

  Network administrator to protect the network attacks

Prepare a 2-page memo outlining what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against worms, viruses, DoS attacks, spyware, and other such network ..

  Assume that you are an administrator for a growing company

imagine you are an administrator for a growing company. your company decides to purchase another company that designs

  Explain the usefulness of a traffic analysis

Identify the protocols in your design and provide rationale for your decision. Define the overall network architecture. Explain the usefulness of a traffic analysis

  Determine maximum value for tcp sequence numbers

Determine the maximum value of L such that TCP sequence numbers are not exhausted? Recall that TCP sequence number filed has four bytes.

  Identify and clearly state the problem and issues

Provide a detailed analysis of the causes of the problem/issue. Be sure the causes you identify relate directly to the problem/issue.

  Configure a network printer on tcpip port

Configure a network printer on TCPIP port 192.168.2.250 with a printer name of Admissions Printer Configure a local printer that is shared as Admissions Color InkJet. Create the folder structure shown below.

  The interconnections between network devices

The interconnections between network devices

  The types and role of distributed software architecture

the types and role of distributed software architecture.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd