All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
computer science
computer networking
Questions and Answers of
Computer Networking
Given the message “AACCCBCCDDAB”, in which the probabilities of symbols are P(A) = 0.50, P(B) = 0.25, P(C) = 0.125, and P(D) = 0.125,a. encode the data using Huffman coding.b. find the
In predictive coding, differentiate between DM and ADM.
A program that finds the DCT transform of a two-dimensional matrix. Use matrix multiplication.
In Huffman coding, the following coding table is given.A → 0 B → 10 C → 110 D → 111Show the original message if the code
Assume object x has two simple variables: an integer and an IP address. What is the identifier for each variable?
Which of the following is not part of configuration management?a. Reconfigurationb. Rncryptionc. Documentation
Assume object x has only one table with two columns. What is the identifier for each column?
A network manager decides to replace the old router that connects the organization to the Internet with a more powerful one. What area of network management is involved here?
Assume object x has two simple variables and one table with two columns. What is the identifier for each variable and each column of the table? We assume that simple variables come before the table.
A network manager decides to replace a version of accounting software with a new version. What area of network management is involved here?
Assume object x has one simple variable and two tables with two and three columns respectively. What is the identifier for the variable and each column of each table? We assume that the simple
Distinguish between reactive fault management and proactive fault management.
Object x has two simple variables. How can SNMP refer to the instance of each variable?
If network management does not replace a component whose lifetime has been expired, what area in network management has been ignored?
Object x has one table with two columns. The table at this moment has three rows with the contents shown below. If the table index is based on the values in the first column, show how SNMP can access
Distinguish between internal and external data traffic in an organization.
One of the objects (groups) that can be managed is the ip group with the object identifier (1.3.6.1.2.1.4) in which (1.3.6.1.2.1) is the identifier of MIB-2 and (4) defines the ip group. In an agent,
Which of the following devices cannot be a manager station in SNMP?a. A routerb. A hostc. A switch
Show the encoding for the OCTET STRING "Hello world." using BER.
Does an SNMP manager run a client SNMP program or a server SNMP program?
Show the encoding for the IPAddress 112.56.23.78 using BER.
Show how the textual name "iso.org.dod" is numerically encoded in SMI.
Show the encoding for the object identifier 1.3.6.1.2.1.7.1 (the udpInDatagram variable in udp group) using BER.
Is it possible to have a textual name in SMI as "iso.org.internet"? Explain.
Using BER, show how we can encode a structured data type made of an INTEGER of value (2371), an OCTET STRING of value ("Computer"), and an IPAddress of value (185.32.1.5) as shown
Find the type (simple, sequence, sequence of) of the following objects in SMI.a. An unsigned integerb. An IP addressc. An object named. A list of integerse. A record defining an object name, an IP
Assume a data structure is made of an INTEGER of value (131) and another structure made of an IPAddress of value (24.70.6.14) and an OCTETSTRING ("UDP"). Using BER, encode the data structure.
What is the length of the value field in the following BER encoding?04 09 48 65 6C 4C …
Distinguish between SMI and MIB.
Given the code 300C02040000099806040A05030E, decode it using BER.
What does the if object in MIB define? Why does this object need to be managed?
Given the code 300D04024E6F300706030103060500, decode it using BER.
Assume an object identifier in MIB has three simple variables. If the object identifier is x, what is the identifier of each variable?
Assume a manager needs to know the number of user datagrams an agent has sent out (a udpOutDatagrams counter with the identifier 1.3.6.1.2.1.7.4). Show the code for a Varbind that is sent in a
Can SNMP reference the entire row of a table? In other words, can SNMP retrieve or change the values in the entire row of a table? Explain.
In SCTP, a packet is carrying a COOKIE ECHO message and a DATA chunk. If the size of the cookie is 200 bytes and that of the user data is 20 bytes, what is the size of the packet?
In SCTP, the state of a receiver is as follows:a. The receiving queue has chunks 1 to 8, 11 to 14, and 16 to 20.b. There are 1800 bytes of space in the queue.c. The value of lastAck is 4.d. No
(a) Consider the following HTML tag:<h1 title=‘‘this is the header’’> HEADER 1 </h1>Under what conditions does the browser use the TITLE attribute, and how?(b) How does the
You are given a text file of size 60 MB, which is to be encrypted using steganography in the low-order bits of each color in an image file. What size image would be required in order to encrypt the
The image of Fig. 8-54(b) contains the ASCII text of five plays by Shakespeare. Would it be possible to hide music among the zebras instead of text? If so, how would it work and how much could
Consider an image of 2048 × 512 pixels. You want to encrypt a file sized 2.5 MB. What fraction of the file can you encrypt in this image? What fraction would you be able to encrypt if you compressed
In the previous problem, suppose a sliding window protocol is used instead. For what send window size will the link utilization be 100%? You may ignore the protocol processing times at the sender and
Prove that in 4B/5B encoding, a signal transition will occur at least every four bit times.
You think that a computer with the domain name “aCollege.edu” has several IP addresses. Write a statement in Java to create an array of InetAddress objects associated with this host.
You think that a computer with the IP address “14.26.89.101” has more IP addresses. Write a statement in Java to create an array of InetAddress classes associated with this host.
You want to write a program in which you need to refer to the InetAddress of the computer you are working with. Write a statement in Java to create the corresponding object.
You want to create all InetAddress objects associated with the computer you are working with. Write statements in Java in order to do so.
Write a statement in Java that stores the port number 62230 in a variable in Java and guarantees that the number is stored as an unsigned number.
A socket address is the combination of an IP address and a port number that defines an application program running on a host. Can we create an instance of the InetSocketAddress class with an IP
Write a statement in Java to create a socket address bound to the local host and the HTTP server process.
Write a statement in Java to create a socket address bound to the local host and the ephemeral port number 56000.
Write a statement in Java to create a socket address bound to the host with domain name “some.com” and a client process with port number 51000.
Write a statement in Java to create a socket address bound to InetSocketAddress and the TELNET server process.
Write a statement in Java to extract the InetAddress of an InetSocketAddress named sockAd.
Write a statement in Java to extract the port number of an InetSocketAddress named sockAd.
What is the difference between the Data gram Socket class and the Socket class in Java?
What is the difference between the ServerSocket class and the Socket class in Java?
We say that in network programming a socket should be at least bound to a local socket address. The first constructor of the DatagramSocket class (see Table 25.10) has no parameters. Can you explain
In Figure 25.16, what changes are needed if a client needs to send a message other than a string (a picture, for example).Figure 25.16 Figure 25.16 Design of the UDP Client Client application program
In Figure 25.15, assume that the request is a URL to retrieve a picture. How is the URL stored in the recvBuff?Figure 25.15 Figure 25.15 Design of the UDP server Server application program Process
Explain how a UDP client program (Table 25.13) sleeps until the response comes from the server. Table 25.13 A simple UDP client program 1 import java.net.*; 2 import java.io.*: 3. 4 public class
How is a Socket object in a TCP client (Figure 25.18) created and destroyed?Figure 25.18 Figure 25.18 Design of the TCP client Client application program Create request Use response | String String
We have input stream classes in Java. Can you explain why the TCP client program does not directly use these classes to create the input stream?
In Figure 25.18, how does the client create the input and output streams to communicate with the server?Figure 25.18 Figure 25.18 Design of the TCP client Client application program Create request
Assume there is a server with the domain name www.common.com.a. Show an HTTP request that needs to retrieve the document/usr/users/doc. The client accepts MIME version 1, GIF or JPEG images, but the
During the weekend, Alice often needs to access files stored on her office desktop from her home laptop. Last week, she installed a copy of the FTP server process on her desktop at her office and a
In HTTP, draw a figure to show the application of cookies in a scenario in which the server allows only the registered customer to access the server.
Alice has a video clip that Bob is interested in getting; Bob has another video clip that Alice is interested in getting. Bob creates a web page and runs an HTTP server. How can Alice get Bob’s
In HTTP, draw a figure to show the application of cookies in a web portal using two sites.
When an HTTP server receives a request message from an HTTP client, how does the server know when all headers have arrived and the body of the message is to follow?
In HTTP, draw a figure to show the application of cookies in a scenario in which the server uses cookies for advertisement. Use only three sites.
In a nonpersistent HTTP connection, how can HTTP inform the TCP protocol that the end of the message has been reached?
Draw a diagram to show the use of a proxy server that is part of the client network:a. Show the transactions between the client, proxy server, and the target server when the response is stored in the
Can you find an analogy in our daily life as to when we use two separate connections in communication similar to the control and data connections in FTP?
In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no presentation layer. But an application-layer protocol can include some of the features defined in this layer if needed.
FTP uses two separate well-known port numbers for control and data connection. Does this mean that two separate TCP connections are created for exchanging control information and data?
In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no session layer. But an application-layer protocol can include some of the features defined in this layer if needed. Does
FTP uses the services of TCP for exchanging control information and data transfer. Could FTP have used the services of UDP for either of these two connections? Explain.
HTTP version 1.1 defines the persistent connection as the default connection. Using RFC 2616, find out how a client or server can change this default situation to nonpersistent.
In FTP, which entity (client or server) starts (actively opens) the control connection? Which entity starts (actively opens) the data transfer connection?
In SMTP, a sender sends unformatted text. Show the MIME header.
What do you think would happen if the control connection were severed before the end of an FTP session? Would it affect the data connection?
What do you think would happen if the control connection were severed before the end of an FTP session? Would it affect the data connection?
Write concurrent TCP client-server programs to simulate a simplified version of POP. The client sends a request to receive an e-mail in its mailbox; the server responds with the e-mail.
In FTP, can a server retrieve a file from the client site?
In SMTP, a.a non-ASCII message of 1000 bytes is encoded using base64. How many bytes are in the encoded message? How many bytes are redundant? What is the ratio of redundant bytes to the total
In FTP, can a server get the list of the files or directories from the client?
Encode the following message in base64:01010111 00001111 11110000
FTP can transfer files between two hosts using different operating systems with different file formats. What is the reason?
Encode the following message in quoted-printable:01001111 10101111 01110001
Does FTP have a message format for exchanging commands and responses during control connection?
According to RFC 1939, a POP3 session is in one of the following four states: closed, authorization, transaction, or update. Draw a diagram to show these four states and how POP3 moves between them.
Does FTP have a message format for exchanging files or a list of directories/files during the file-transfer connection?
POP3 protocol has some basic commands (that each client/server needs to implement). Using the information in RFC 1939, find the meaning and the use of the following basic commands:a. STATb. LISTc.
Can we have a control connection without a data-transfer connection in FTP? Explain.
POP3 protocol has some optional commands (that a client/server can implement). Using the information in RFC 1939, find the meaning and the use of the following optional commands:a. UIDLb. TOP 1 15c.
Can we have a data-transfer connection without a control connection in FTP? Explain.
Using RFC 1939, assume a POP3 client is in the download-and-keep mode. Show the transaction between the client and the server if the client has only two messages of 192 and 300 bytes to download from
Assume we need to download an audio using FTP. What file type should we specify in our command?
Using RFC 1939, assume a POP3 client is in the download-and-delete mode. Show the transaction between the client and the server if the client has only two messages of 230 and 400 bytes to download
Showing 700 - 800
of 2050
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last