Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Are users aware that SMTP transfers messages in ASCII, and that anyone watching network traffic can see the contents of an e-mail message?
Some organizations use firewalls to isolate groups of users internally. Give examples of ways that internal firewalls can improve network performance.
Assume your organization intends to adopt IPv6. Devise an address scheme the organization will use to assign each host an address.
Consider a host that forms a link-local address by encoding its 48-bit Ethernet address with the standard link-local prefix.
DNS allows access by both TCP and UDP. Find out whether your local operating system allows a single process to accept both TCP connections.
What is the advantage of allowing arbitrary managers to read variables in all routers? The disadvantage?
Consider the implementation of an SNMP agent. Does it make sense to arrange MIB variables in memory exactly the way SNMP describes them?
It is possible to translate some application protocols into others. For example, it might be possible to build a program that accepts an FTP request.
Read the SMTP standard carefully. Then use TELNET to connect to the SMTP port on a remote machine and ask the remote SMTP server to expand a mail alias.
Argue that although bandwidth is often cited as an example of the facilities a QoS mechanism can guarantee, delay is a more fundamental resource.
Build a program that accepts your incoming mail, places your mail in a file, and then sends a reply to tell the sender you are on vacation.
The mail was sent from a computer on which the alias important-people includes no valid mailbox identifiers.
Consider translating floating point numbers from an internal form to an external form and back to an internal form.
Experiment with FI'P or an equivalent protocol to see how fast you can transfer a file between two reasonably large systems.
Some mail systems force the user to specify a sequence of machines through which the message should travel to reach its destination.
Show two sites that are both registered under .edu and a top level server. Explain how each site would treat each type of abbreviation.
The standard suggests that when a program needs to find the domain name associated with an IF' address.
Read the RFCs on the domain name system. What are the maximum and minimum possible values a DNS server can store in the TIME-TO-LNE.
Test this axiom by surveying your local computing site to see whether operating systems or communication protocols have changed more frequently.
TELNET uses TCP's urgent data mechanism to force the remote operating system to respond to control functions quickly.
Why should file transport protocols compute a checksum on the file data they receive, even when using a reliable end-to-end stream transfer protocol like TCP?
If we extended the domain name syntax to include a dot after the top level domain, names and abbreviations would be unambiguous.
Despite the large volume of notes written about TELNET, it can be argued that the protocol is still not well-defined
Devise a quantitative measure that can be used to decide when PIM-SM should switch from a shared tree to a shortest path tree.
Can DHCP guarantee that a client is not "spoofing" (i.e., can DHCP guarantee that it will not send configuration information for host A to host B)?