Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
IEEE has defined numerous protocols used with TCP/IP at the OSI data link layer.
Give two reasons why the group of people who administer an organization's security policies should be separate from the group of people who administer.
Although IPv6 addresses are assigned hierarchically, a router does not need to parse an address completely to select a route.
Read the MIB specification to find the definition of variable Ip Routing Table that corresponds to an IP routing table.
If encryption software is available on your computer, measure the time required to encrypt a 10 Mbyte file, transfer it to another computer, and decrypt it.
Are users aware that SMTP transfers messages in ASCII, and that anyone watching network traffic can see the contents of an e-mail message?
Some organizations use firewalls to isolate groups of users internally. Give examples of ways that internal firewalls can improve network performance.
Assume your organization intends to adopt IPv6. Devise an address scheme the organization will use to assign each host an address.
Consider a host that forms a link-local address by encoding its 48-bit Ethernet address with the standard link-local prefix.
DNS allows access by both TCP and UDP. Find out whether your local operating system allows a single process to accept both TCP connections.
What is the advantage of allowing arbitrary managers to read variables in all routers? The disadvantage?
Consider the implementation of an SNMP agent. Does it make sense to arrange MIB variables in memory exactly the way SNMP describes them?
It is possible to translate some application protocols into others. For example, it might be possible to build a program that accepts an FTP request.
Read the SMTP standard carefully. Then use TELNET to connect to the SMTP port on a remote machine and ask the remote SMTP server to expand a mail alias.
Argue that although bandwidth is often cited as an example of the facilities a QoS mechanism can guarantee, delay is a more fundamental resource.
Build a program that accepts your incoming mail, places your mail in a file, and then sends a reply to tell the sender you are on vacation.
The mail was sent from a computer on which the alias important-people includes no valid mailbox identifiers.
Consider translating floating point numbers from an internal form to an external form and back to an internal form.
Experiment with FI'P or an equivalent protocol to see how fast you can transfer a file between two reasonably large systems.
Some mail systems force the user to specify a sequence of machines through which the message should travel to reach its destination.
Show two sites that are both registered under .edu and a top level server. Explain how each site would treat each type of abbreviation.
The standard suggests that when a program needs to find the domain name associated with an IF' address.
Read the RFCs on the domain name system. What are the maximum and minimum possible values a DNS server can store in the TIME-TO-LNE.
Test this axiom by surveying your local computing site to see whether operating systems or communication protocols have changed more frequently.
TELNET uses TCP's urgent data mechanism to force the remote operating system to respond to control functions quickly.