Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Read the SMTP standard carefully. Then use TELNET to connect to the SMTP port on a remote machine and ask the remote SMTP server to expand a mail alias.
Argue that although bandwidth is often cited as an example of the facilities a QoS mechanism can guarantee, delay is a more fundamental resource.
Build a program that accepts your incoming mail, places your mail in a file, and then sends a reply to tell the sender you are on vacation.
The mail was sent from a computer on which the alias important-people includes no valid mailbox identifiers.
Consider translating floating point numbers from an internal form to an external form and back to an internal form.
Experiment with FI'P or an equivalent protocol to see how fast you can transfer a file between two reasonably large systems.
Some mail systems force the user to specify a sequence of machines through which the message should travel to reach its destination.
Show two sites that are both registered under .edu and a top level server. Explain how each site would treat each type of abbreviation.
The standard suggests that when a program needs to find the domain name associated with an IF' address.
Read the RFCs on the domain name system. What are the maximum and minimum possible values a DNS server can store in the TIME-TO-LNE.
Test this axiom by surveying your local computing site to see whether operating systems or communication protocols have changed more frequently.
TELNET uses TCP's urgent data mechanism to force the remote operating system to respond to control functions quickly.
Why should file transport protocols compute a checksum on the file data they receive, even when using a reliable end-to-end stream transfer protocol like TCP?
If we extended the domain name syntax to include a dot after the top level domain, names and abbreviations would be unambiguous.
Despite the large volume of notes written about TELNET, it can be argued that the protocol is still not well-defined
Devise a quantitative measure that can be used to decide when PIM-SM should switch from a shared tree to a shortest path tree.
Can DHCP guarantee that a client is not "spoofing" (i.e., can DHCP guarantee that it will not send configuration information for host A to host B)?
DHCP mandates a minimum address lease of one hour. Can you imagine a situation in which DHCP's minimum lease causes inconvenience? Explain.
When a BOOTP client receives a reply via hardware broadcast, how does it know whether the reply is intended for another BOOTP client on the same physical net?
BOOTP does not contain an explicit field for returning the time of day from the server to the client, but makes it part of the (optional) vendor.
The BOOTP message format is inconsistent because it has two fields for client IP address and one for the name of the boot image.
If the host stores its address on disk along with the date the lease expires, and then reboots within the lease period, can it use the address?
Devise a naming scheme that tolerates changes to the naming hierarchy. As an example, consider two large companies that each have an independent naming.
The socket file descriptor mechanism and associated read and write operations can be considered a form of object-oriented design. Explain why.
Read about the AT&T System V Transport Library Interface (TLI) and compare it to the socket interface. What are the major conceptual differences?