Question

In: Computer Science

1. (A) A Web server is identified by port number 25 while an email server process...

1.

(A) A Web server is identified by port number 25 while an email server process using the SMTP protocol is identified by port number 80.

True

False

(b) Both SMTP with HTTP are used to transfer files from one host to another.

True

False

(c) We are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2*108 meters/sec, and the distance between source and destination is 10,000 km. Now suppose there is only one link between source and destination. Also suppose that the entire MP3 file is sent as one packet. How many bits will the source have transmitted when the first bit arrives at the destination?

A.

30,000,000 bits

B.

1 bit

C.

500,000 bits

D.

none of the above

(d) Suppose a client sends an HTTP request message with the "If-modified-since": header. Suppose the object in a server has not changed since the last time a client retrieved the object. Then the server will send a response message with the status code ____.

A.

200 OK

B.

404 Not Found

C.

304 Not Modified

D.

none of the above

(e) UDP provides a flow-control service to its applications to eliminate the possibility of the sender overflowing the receiver’s buffer.

True

False

(F)The TCP connection is not an end-to-end TDM or FDM circuit as in a packet-switched network.

True

False

Solutions

Expert Solution

a.) The correct answer is True because of the fact that the a Web server is identified by port number 80. A mailserver process (using the SMTP protocol) is identified by port number 25. A list of well-known and most used port numbers for all Internet based standard protocols can be found in directory of window netwrok manager.

b.) the correct option is True because for transmitting data from one host to another, all protocols are used: HTTP passes data (also called objects) from a Web server to a Web client (usually a browser); SMTP passes files (i.e. e-mail messages) from one mail server to another mail server.

c.) The correct option is C. 500,000 bits because it is given that the data travel as 2X10^8m/sec , which means 20,000km/sec and the distance in between is 10,000km , so we need 0.5 second to reach the first bit to destination and it is given that we have data transmission rate of 10Mbps , in 0.5 second , it will send 5 mb into the link , we means 500,000bits will sent into the link in 0.5seconds , which is time needed for first bit to reach destination.

d.) The correct option is option C. 304 Not Modified because of fact that the server will send a response message with this status code if the client is sending is a HTTP request message with the "If-modified-since": header and  that there is no need to retransmit the requested resources.


Related Solutions

Describe the process involving the transmission of a Web page from a Web server to a...
Describe the process involving the transmission of a Web page from a Web server to a user’s computer.
Let N be the number of requests to a web server per day and let N...
Let N be the number of requests to a web server per day and let N Poisson(). Each request comes from a human with probability p or from a spam bot with probability 1 ? p. Assume that the requests are independent of each other. Let X be the number of requests from humans per day and Y be the number of requests from spam bots per day. (a) State the conditional distribution of X given N = n, and...
A transport layer protocol uses the id of the process rather than the port number to...
A transport layer protocol uses the id of the process rather than the port number to specify the destination. (Explain the reason) 1. Is there any problem for senders who wish to connect to a well-defined service (for example, Apachewebserver)? 2. Will there be any problems with the process of multiple network connections? 3. If the host has a different operating system, will there be any problem?
1. A Client-side digital signature can be used to authenticate to a web server through SSL,...
1. A Client-side digital signature can be used to authenticate to a web server through SSL, but confidentiality can still be vulnerable to attack. Identify a type of attack to which the use of SSL is vulnerable and justify your answer. 2. Discuss the benefits of MPLS LSP (multiprotocol label switching label switched path) to support high availability of service with illustration of use for Push, Swap and Pop. 3. The manager wishes to access confidential company data while travelling...
Will rate answer 1) Assume a user requests a large object from a web server. Assume...
Will rate answer 1) Assume a user requests a large object from a web server. Assume that for the TCP running on the web server: • the MSS is 1,460 bytes (a more precise value for TCP when operating over an Ethernet), • each segment transmitted contains 66 bytes of headers (for TCP and all lower-level protocols), and • flow and congestion control mechanisms do not limit the rate at which the web server transmits data. a) Derive an expression...
During 1 30 minute observation, a web server received 2700 requests. The mean response time was...
During 1 30 minute observation, a web server received 2700 requests. The mean response time was 2 seconds. What is the mean number of queries in the system? Give both formula and result. Does your formula depend upon distributional assumptions?
There are two servers. Hiba has just started service at server 1, while Daniella has just...
There are two servers. Hiba has just started service at server 1, while Daniella has just started service at server 2. Hiba’s service time at server 1 is exponentially distributed with mean 1/4 hour. Daniella’s service time at server 2 is exponentially distributed with mean 1/6 hour. Daniella’s service time and Hiba’s service time are independent. (a) What is the probability that Hiba finishes service before Daniella? (b) What is the expected time in minutes until the first person finishes?...
1) Explain the process of port mirroring 2) difference between network media and networking device vulnerabilities
1) Explain the process of port mirroring 2) difference between network media and networking device vulnerabilities
1. The online site has members, each of whom is identified by a unique member number...
1. The online site has members, each of whom is identified by a unique member number and is described by an e-mail address, name, password, home address, and phone number. 2. A member may be a buyer or a seller. 3. A buyer has a shipping address recorded in the database. 4. A seller has a bank account number and routing number recorded in the database. 5. Items are placed by a seller for sale and are identified by a...
Question 2 (25 marks/Bond Valuation) David Palmer identified the following bonds for investment: 1) Bond A:...
Question 2 (25 marks/Bond Valuation) David Palmer identified the following bonds for investment: 1) Bond A: A $1 million par, 10% annual coupon bond, which will mature on July 1, 2025. 2) Bond B: A $1 million par, 14% semi-annual coupon bond (interest will be paid on January 1 and July 1 each year), which will mature on July 1, 2031. 3) Bond C: A $1 million par, 10% quarterly coupon bond (interest will be paid on January 1, April...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT