18CS52 - CN Assignment 1-Nov.2022
18CS52 - CN Assignment 1-Nov.2022
Q. Bloom’s CO
Questions
No. Level Level
Common Questions
List at least four different applications that are naturally suitable for P2P
10. architectures. Explain. L2 CO1
Group -1
Look over your received emails, and examine the header of a message sent from a
1. user with an .edu email address. Is it possible to determine from the header the IP L5 CO1
address of the host from which the message was sent? Do the same for a message
sent from a gmail account.
Consider a new peer Alice that joins BitTorrent without possessing any chunks.
2. Without any chunks, she cannot become a top-four uploader for any of the other L5 CO1
peers, since she has nothing to upload. How then will Alice get her first chunk?
What is an overlay network? Does it include routers? What are the edges in the
3. overlay network? L5 CO1
Is it possible for an organization’s Web server and mail server to have exactly the
4. same alias for a hostname (for example, foo.com)? What would be the type for the L5 CO2
RR that contains the hostname of the mail server?
Print out the header of an e-mail message you have recently received. How many
5. Received: header lines are there? Analyze each of the header lines in the message. L6 CO2
Group 2
List the four broad classes of services that a transport protocol can provide.
1. L3 CO2
For each of the service classes, indicate if either UDP or TCP (or both)
provides such a service.
The UDP server described needed only one socket, whereas the TCP server needed
2. two sockets. Why? If the TCP server were to support n simultaneous connections, L5 CO2
each from a different client host, how many sockets would the TCP server need?
In BitTorrent, suppose Alice provides chunks to Bob throughout a 30-second
3. interval. Will Bob necessarily return the favor and provide chunks to Alice in this L4 CO1
same interval? Why or why not?
In TCP, why must the server program be executed before the client program? For
4. the client server application over UDP, why may the client program be executed L4 CO2
before the server program?
Read RFC 959 for FTP. List all of the client commands that are supported by the
5. L2 CO1
RFC.
Group 3
Consider an HTTP client that wants to retrieve a Web document at a given URL.
1. The IP address of the HTTP server is initially unknown. What transport and L3 CO1
application-layer protocols besides HTTP are needed in this scenario?
From a user's perspective, Discuss difference between the download and
2. L3 CO1
delete and the download and keep mode in POP3?
For a P2P file-sharing application, do you agree with the statement, “There is no
3. notion of client and server sides of a communication session”? Why or why not? L3 CO1
Suppose you can access the caches in the local DNS servers of your department.
4. L3 CO1
Can you propose a way to roughly determine the Web servers (outside your
department) that are most popular among the users in your department? Explain.
Consider an overlay network with N active peers, with each pair of peers hav-
5. ing an active TCP connection. Additionally, suppose that the TCP connections L6 CO2
pass through a total of M routers. How many nodes and edges are there in the
corresponding overlay network?
Group 4
The text below shows the reply sent from the server in response to the HTTP GET
1. message in the question above. Answer the following questions, indicating where L5 CO4
in the message below you find the answer. HTTP/1.1 200 OK<cr><lf>Date: Tue,
07 Mar 2008
12:39:45GMT<cr><lf>Server: Apache/2.0.52 (Fedora)
<cr><lf>Last-Modified: Sat, 10 Dec2005 18:27:46
GMT<cr><lf>ETag: “526c3-f22-a88a4c80”<cr><lf>AcceptRanges:
bytes<cr><lf>Content-Length: 3874<cr><lf>
Keep-Alive:timeout=max=100<cr><lf>Connection:
Keep-Alive<cr><lf>Content-Type:text/html; charset=
ISO-8859-1<cr><lf><cr><lf><!doctype html public “//w3c//dtd
html 4.0 transitional//en”><lf><html><lf><head><lf>
<meta http-equiv=”Content-Type”
content=”text/html; charset=iso-8859-1”><lf> <meta
name=”GENERATOR” content=”Mozilla/4.79 [en] (Windows NT
5.0; U) Netscape]”><lf> <title>CMPSCI 453 / 591 /
NTU-ST550A Spring 2005 homepage</title><lf></head><lf>
<much more document text following here (not shown)>
a. Was the server able to successfully find the document or not? What time
Faculty in-charge:SV, RSG & KSC Department of ISE, RNSIT 2/2
Bloom’s Levels: L1: Remembering / L2: Understanding / L3: Applying /L4: Analyzing / L5: Evaluating / L6: Creating
RNS INSTITUTE OF TECHNOLOGY, BENGALURU - 98
DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING
Consider the Telnet example discussed in Section 3.5. A few seconds after the
2. L3 CO2
user types the letter ‘C,’ the user types the letter ‘R.’ After typing the letter
‘R,’ how many segments are sent, and what is put in the sequence number
and acknowledgment fields of the segments?
With the help of simple client-server application, explain socket programming
3. L2 CO2
for both UDP & TCP.
Suppose Client A initiates a Telnet session with Server S. At about the
4. L4 CO2
same
time, Client B also initiates a Telnet session with Server S. Provide possible
source and destination port numbers for
a. The segments sent from A to S.
b. The segments sent from B to S.
c. The segments sent from S to A.
d. The segments sent from S to B.
e. If A and B are different hosts, is it possible that the source port number in
the segments from A to S is the same as that from B to S?
f. How about if they are the same host?
UDP and TCP use 1s complement for their checksums. Suppose you have
5. L4 CO2
the following three 8-bit bytes: 01010011, 01100110, 01110100. What is the
1s complement of the sum of these 8-bit bytes? (Note that although UDP
and TCP use 16-bit words in computing the checksum, for this problem you
are being asked to consider 8-bit sums.) Show all work. Why is it that UDP
takes the 1s complement of the sum; that is, why not just use the sum? With
the 1s complement scheme, how does the receiver detect errors? Is it
possible that a 1-bit error will go undetected? How about a 2-bit error?
Group 5
Obtain the HTTP/1.1 specification (RFC 2616). Answer the following questions:
1. a. Explain the mechanism used for signaling between the client and server L4 CO1
to indicate that a persistent connection is being closed. Can the client, the
server, or both signal the close of a connection?
b. What encryption services are provided by HTTP?
c. Can a client open three or more simultaneous connections with a given
server?
d. Either a server or a client may close a transport connection between
them if either one detects the connection has been idle for some time. Is it
possible that one side starts closing a connection while the other side is
transmitting data via this connection? Explain.
Suppose Bob joins a BitTorrent torrent, but he does not want to upload any
2. data to any other peers (so called free-riding). L3 CO1
a. Bob claims that he can receive a complete copy of the file that is shared
by the swarm. Is Bob’s claim possible? Why or why not?
b. Bob further claims that he can further make his “free-riding” more efficient
Group 6
Suppose within your Web browser you click on a link to obtain a Web page. The
1. IP address for the associated URL is not cached in your local host, so a DNS L4 CO1
lookup is necessary to obtain the IP address. Suppose that n DNS servers are visited
before your host receives the IP address from DNS; the successive visits incur an
RTT of RTT 1 , . . ., RTT, Further suppose that the Web page associated with the
link contains exactly one object, consisting of a small amount of HTML text. Let
RTT 0 n denote the RTT between the local host and the server containing the
object. Assuming zero transmission time of the object, how much time elapses
from when the client clicks on the link until the client receives the object?
In the circular DHT example, suppose that a new peer 6 wants to join the DHT and
2. peer 6 initially only knows peer 15’s IP address. L3 CO1
What steps are taken?
Install and compile the Python programs TCPClient and UDPClient on one
3. host and TCPServer and UDPServer on another host. L3 CO2
a. Suppose you run TCPClient before you run TCPServer. What happens?
Why?
b. Suppose you run UDPClient before you run UDPServer. What happens?
Why?
c. What happens if you use different port numbers for the client and server
sides?
Can you configure your browser to open multiple simultaneous connections
4. to a Web site? What are the advantages and disadvantages of having a large L3 CO2
number of simultaneous TCP connections?
We have seen that Internet TCP sockets treat the data being sent as a byte
5. stream but UDP sockets recognize message boundaries. What are one L4 CO2
advantage and one disadvantage of byte-oriented API versus having the API
explicitly recognize and preserve application-defined message boundaries?