Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Why should file transport protocols compute a checksum on the file data they receive, even when using a reliable end-to-end stream transfer protocol like TCP?
If we extended the domain name syntax to include a dot after the top level domain, names and abbreviations would be unambiguous.
Despite the large volume of notes written about TELNET, it can be argued that the protocol is still not well-defined
Devise a quantitative measure that can be used to decide when PIM-SM should switch from a shared tree to a shortest path tree.
Can DHCP guarantee that a client is not "spoofing" (i.e., can DHCP guarantee that it will not send configuration information for host A to host B)?
DHCP mandates a minimum address lease of one hour. Can you imagine a situation in which DHCP's minimum lease causes inconvenience? Explain.
When a BOOTP client receives a reply via hardware broadcast, how does it know whether the reply is intended for another BOOTP client on the same physical net?
BOOTP does not contain an explicit field for returning the time of day from the server to the client, but makes it part of the (optional) vendor.
The BOOTP message format is inconsistent because it has two fields for client IP address and one for the name of the boot image.
If the host stores its address on disk along with the date the lease expires, and then reboots within the lease period, can it use the address?
Devise a naming scheme that tolerates changes to the naming hierarchy. As an example, consider two large companies that each have an independent naming.
The socket file descriptor mechanism and associated read and write operations can be considered a form of object-oriented design. Explain why.
Read about the AT&T System V Transport Library Interface (TLI) and compare it to the socket interface. What are the major conceptual differences?
Explain how it is possible to build a client and server that can communicate on a single machine without learning the host's IP address.
Examine the format of data broadcast by the servers that implement the 4BSD UNIX mp time command.
Build a simple server that accepts multiple concurrent connections to test it, have the process that handles a connection print a short message.
Characterize situations in which a server can be located on a separate physical network from its client.
What are the advantages and disadvantages of having an application program (user process) per server?
Under what conditions is it incorrect to create new IP addresses by reversing the source and destination IP addresses?
What servers are running on computers at your site? If you do not have access to system configuration files that list the servers started for a given computer.
Consider an alternative interface design that provides an interface for every layer of protocol software (e.g., the system allows an application program).
IP does not have a mechanism to associate datagrams traveling across an ATM network with a specific ATM virtual circuit.
Under what circumstances will a VPN transfer substantially more packets than conventional IP when sending the same data across the Internet?
Consult the mobile IP specification. When a foreign agent forwards a registration request to a mobile's home agent, which protocol ports are used? Why?
The mobile IF' specification defines three conceptually separate forms of authentication: mobile to home agent, mobile to foreign agent.