Question

ND-OF-CHAPTER QUESTIONS Thought Questions 1. How do you think TCP would handle the problem if an acknowledgment were lost, so

a packet arrives for the e-mail applica- tion? b) When the HTTP program on a webserver sends an HTTP response message to a cl

Client 60.171.18.22 Webserver 1.33.17.13 Port 80 Source: 60.171.18.22:2707 Destination: 1.33.17.13:80 3 Source: 1.33.17.13:80

ND-OF-CHAPTER QUESTIONS Thought Questions 1. How do you think TCP would handle the problem if an acknowledgment were lost, so that the sender retrans- mitted the unacknowledged TCP seg- ment, therefore causing the receiving transport process to receive the same segment twice? 2-2. a) Compute the minimum number of TCP segments required to open a con- nection, send an HTTP request and response message, and close the con- nection. Justify this number by creating a table showing each message and its sequence number. b) Repeat the ques- tion, this time if the HTTP response mes- sage is damaged during transmission. 2-3. Compute the minimum number of TCP segments required to open a con- nection, send an HTTP request and response message, and close the con- nection if the HTTP response message must be fragmented across ten packets. Justify this number by creating a table showing each message and its sequence number a) In Figure 2-16, what will be the value in the destination port number field if 2-4. ternet Research: April 1 RFCS
a packet arrives for the e-mail applica- tion? b) When the HTTP program on a webserver sends an HTTP response message to a client PC, in what field of what message will it place the value 80? 2-5. Do the following without using a cal- culator or computer, but check your answers with a calculator or a com- puter. a) Convert 6 to binary. (Answer: 110) b) Convert 47 to binary. c) Convert 100 to binary. d) Convert 110100 to deci- mal. (Answer: 52) e) Convert 001100 to decimal. 2-6. Do the following without using a cal- culator or a computer, but check your answers with a calculator or a com puter. You need to represent 1,026 dif- ferent city names. How many bits will this take if you give each city a different binary number? Explain your answer 2-7. a) The port number fields in TCP and UDP are 16 bits long. How many port numbers can they represent? b) In IP, the Time to Live Field is 8 bits in size. How many values can it represent? c) How many values can a flag field represent? Comments). Select one of the RFCs listed on the page and write a para- graph on its claimed purpose. (Don't
Client 60.171.18.22 Webserver 1.33.17.13 Port 80 Source: 60.171.18.22:2707 Destination: 1.33.17.13:80 3 Source: 1.33.17.13:80 Destination: 60.171.18.22:2707 4 Source: 60.171.18.22:4400 Destination: 123.30.17.120:25 SMTP Server 123.30.17.120 Port 25 Server Programs use Well-Known Port Numbers (0 to 1023) Client Uses Ephemeral Port Number 2700 with the Webserver 4400 with the SMTP Server 2 Clients use Ephemeral Port Numbers (usually 1024 to 4999) FIGURE 2-16 Client Port Numbers and Sockets
0 0
Add a comment Improve this question Transcribed image text
Answer #1

The to ahies in the ToP Prtocol establish a Gonnection before hy Can serd Rackts of dta to nnechon each othe Thi receiving thcl an of the three o handso send SYN is transmitted menl.

Add a comment
Know the answer?
Add Answer to:
ND-OF-CHAPTER QUESTIONS Thought Questions 1. How do you think TCP would handle the problem if an ...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • You can refer chapter 2 and chapter 3 of Computer Networking: A Top-Down approach by Kurose...

    You can refer chapter 2 and chapter 3 of Computer Networking: A Top-Down approach by Kurose and Ross for the following labs. Please read the instructions below for submissions. Upload the shared pcap file (Homework5.pacp) into wireshark. HTTP In this lab, we’ll explore several aspects of the HTTP protocol. Capture packets and filter for http protocol and answer the following questions. (Hint: Apply http filer) What version of HTTP version(1.0 or 1.1) is client running and what is the version...

  • Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID...

    Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID Port number UDP HTTP ( ) a ( ) b ( ) c ( ) d 2 points Question 35 Mail server port number is usually 8080 80 2525 25 ( ) a ( ) b ( ) c ( ) d 2 points Question 36 TCP Head length indicates ( ) The size of the segment ( ) The capacity of data that...

  • 166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls...

    166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...

  • Q1. Hierarchical IP Address 1.1 Give a non-network example of hierarchical addressing, and discuss how it...

    Q1. Hierarchical IP Address 1.1 Give a non-network example of hierarchical addressing, and discuss how it reduces the amount of work needed in physical delivery. Do not use any example in the book, the postal service, or the telephone network.1.2 A firm is assigned the network part 128.171. It selects a 10-bit subnet part. a) Draw the bits for the four octets of the IP address of the first host on the first subnet. (Hint: as we don’t use all...

  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

  • pls answer all questions 1) A step-by-step solution to a problem is called a. hardware b....

    pls answer all questions 1) A step-by-step solution to a problem is called a. hardware b. an operating system c. a computer language d. an algorithm 2) separated the programming task from the computer operation tasks. a. Algorithms b. Data processors c. High-level programming languages d. Operating systems 3) is a 16-bit code that can represent symbols in languages other than English. a. ASCII b. Extended ASCII c. EBCDIC d. Unicode 4) When you want to download music to a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT