0% found this document useful (0 votes)
15 views4 pages

18CS52 - CN Assignment 1-Nov.2022

This document contains 10 questions related to computer networks and security for an assignment. The questions cover topics like network application architectures, DNS services, email protocols, non-proprietary internet applications, network vs application architectures, cookies and caching, transport layer services, DNS queries, socket programming and peer-to-peer applications.

Uploaded by

varundubeydubey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views4 pages

18CS52 - CN Assignment 1-Nov.2022

This document contains 10 questions related to computer networks and security for an assignment. The questions cover topics like network application architectures, DNS services, email protocols, non-proprietary internet applications, network vs application architectures, cookies and caching, transport layer services, DNS queries, socket programming and peer-to-peer applications.

Uploaded by

varundubeydubey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

RNS INSTITUTE OF TECHNOLOGY, BENGALURU - 98

DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

18CS52: COMPUTER NETWORKS AND


SECURITY
Assignment – I
Submission Date : 15.11.2022

Q. Bloom’s CO
Questions
No. Level Level
Common Questions

1. Explain Network application architectures with a diagram. L4 CO1


2. L4 CO1
Explain 3 important services of DNS in addition to Name/address translation.

Suppose Alice, with a Web-Based email account( such as Hotmail or


3. L3 CO1
gmail), sends a message to Bob, who accesses his mail from mail server
using POP3.Discuss how the message gets from Alice's host to Bob's host.
Be sure to list the series of application-layer protocols that are used to
move the message between the two hosts.
List five non proprietary Internet applications and the application-layer
4. L3 CO1
protocols that they use. Explain.
What is the difference between network architecture and application architecture?
5. L4 CO1
Write a short note on cookies and web caching.
6. L4 CO1
Illustrate transport services available to application.
7. L3 CO1
With diagram explain query response DNS interaction in iterative & Recursive
8. methods. L3 CO1
With the help of simple client-server application, explain socket programming for
9. both UDP & TCP.
L5 CO1

List at least four different applications that are naturally suitable for P2P
10. architectures. Explain. L2 CO1

Group -1

Look over your received emails, and examine the header of a message sent from a
1. user with an .edu email address. Is it possible to determine from the header the IP L5 CO1
address of the host from which the message was sent? Do the same for a message
sent from a gmail account.
Consider a new peer Alice that joins BitTorrent without possessing any chunks.
2. Without any chunks, she cannot become a top-four uploader for any of the other L5 CO1
peers, since she has nothing to upload. How then will Alice get her first chunk?
What is an overlay network? Does it include routers? What are the edges in the
3. overlay network? L5 CO1
Is it possible for an organization’s Web server and mail server to have exactly the
4. same alias for a hostname (for example, foo.com)? What would be the type for the L5 CO2
RR that contains the hostname of the mail server?
Print out the header of an e-mail message you have recently received. How many
5. Received: header lines are there? Analyze each of the header lines in the message. L6 CO2

Faculty in-charge:SV, RSG & KSC Department of ISE, RNSIT 1/2


Bloom’s Levels: L1: Remembering / L2: Understanding / L3: Applying /L4: Analyzing / L5: Evaluating / L6: Creating
RNS INSTITUTE OF TECHNOLOGY, BENGALURU - 98
DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Group 2

List the four broad classes of services that a transport protocol can provide.
1. L3 CO2
For each of the service classes, indicate if either UDP or TCP (or both)
provides such a service.
The UDP server described needed only one socket, whereas the TCP server needed
2. two sockets. Why? If the TCP server were to support n simultaneous connections, L5 CO2
each from a different client host, how many sockets would the TCP server need?
In BitTorrent, suppose Alice provides chunks to Bob throughout a 30-second
3. interval. Will Bob necessarily return the favor and provide chunks to Alice in this L4 CO1
same interval? Why or why not?
In TCP, why must the server program be executed before the client program? For
4. the client server application over UDP, why may the client program be executed L4 CO2
before the server program?
Read RFC 959 for FTP. List all of the client commands that are supported by the
5. L2 CO1
RFC.

Group 3

Consider an HTTP client that wants to retrieve a Web document at a given URL.
1. The IP address of the HTTP server is initially unknown. What transport and L3 CO1
application-layer protocols besides HTTP are needed in this scenario?
From a user's perspective, Discuss difference between the download and
2. L3 CO1
delete and the download and keep mode in POP3?
For a P2P file-sharing application, do you agree with the statement, “There is no
3. notion of client and server sides of a communication session”? Why or why not? L3 CO1
Suppose you can access the caches in the local DNS servers of your department.
4. L3 CO1
Can you propose a way to roughly determine the Web servers (outside your
department) that are most popular among the users in your department? Explain.
Consider an overlay network with N active peers, with each pair of peers hav-
5. ing an active TCP connection. Additionally, suppose that the TCP connections L6 CO2
pass through a total of M routers. How many nodes and edges are there in the
corresponding overlay network?
Group 4

The text below shows the reply sent from the server in response to the HTTP GET
1. message in the question above. Answer the following questions, indicating where L5 CO4
in the message below you find the answer. HTTP/1.1 200 OK<cr><lf>Date: Tue,
07 Mar 2008
12:39:45GMT<cr><lf>Server: Apache/2.0.52 (Fedora)
<cr><lf>Last-Modified: Sat, 10 Dec2005 18:27:46
GMT<cr><lf>ETag: “526c3-f22-a88a4c80”<cr><lf>AcceptRanges:
bytes<cr><lf>Content-Length: 3874<cr><lf>
Keep-Alive:timeout=max=100<cr><lf>Connection:
Keep-Alive<cr><lf>Content-Type:text/html; charset=
ISO-8859-1<cr><lf><cr><lf><!doctype html public “//w3c//dtd
html 4.0 transitional//en”><lf><html><lf><head><lf>
<meta http-equiv=”Content-Type”
content=”text/html; charset=iso-8859-1”><lf> <meta
name=”GENERATOR” content=”Mozilla/4.79 [en] (Windows NT
5.0; U) Netscape]”><lf> <title>CMPSCI 453 / 591 /
NTU-ST550A Spring 2005 homepage</title><lf></head><lf>
<much more document text following here (not shown)>
a. Was the server able to successfully find the document or not? What time
Faculty in-charge:SV, RSG & KSC Department of ISE, RNSIT 2/2
Bloom’s Levels: L1: Remembering / L2: Understanding / L3: Applying /L4: Analyzing / L5: Evaluating / L6: Creating
RNS INSTITUTE OF TECHNOLOGY, BENGALURU - 98
DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

was the document reply provided?


b. When was the document last modified?
c. How many bytes are there in the document being returned?
d. What are the first 5 bytes of the document being returned? Did the server
agree to a persistent connection?

Consider the Telnet example discussed in Section 3.5. A few seconds after the
2. L3 CO2
user types the letter ‘C,’ the user types the letter ‘R.’ After typing the letter
‘R,’ how many segments are sent, and what is put in the sequence number
and acknowledgment fields of the segments?
With the help of simple client-server application, explain socket programming
3. L2 CO2
for both UDP & TCP.
Suppose Client A initiates a Telnet session with Server S. At about the
4. L4 CO2
same
time, Client B also initiates a Telnet session with Server S. Provide possible
source and destination port numbers for
a. The segments sent from A to S.
b. The segments sent from B to S.
c. The segments sent from S to A.
d. The segments sent from S to B.
e. If A and B are different hosts, is it possible that the source port number in
the segments from A to S is the same as that from B to S?
f. How about if they are the same host?
UDP and TCP use 1s complement for their checksums. Suppose you have
5. L4 CO2
the following three 8-bit bytes: 01010011, 01100110, 01110100. What is the
1s complement of the sum of these 8-bit bytes? (Note that although UDP
and TCP use 16-bit words in computing the checksum, for this problem you
are being asked to consider 8-bit sums.) Show all work. Why is it that UDP
takes the 1s complement of the sum; that is, why not just use the sum? With
the 1s complement scheme, how does the receiver detect errors? Is it
possible that a 1-bit error will go undetected? How about a 2-bit error?
Group 5

Obtain the HTTP/1.1 specification (RFC 2616). Answer the following questions:
1. a. Explain the mechanism used for signaling between the client and server L4 CO1
to indicate that a persistent connection is being closed. Can the client, the
server, or both signal the close of a connection?
b. What encryption services are provided by HTTP?
c. Can a client open three or more simultaneous connections with a given
server?
d. Either a server or a client may close a transport connection between
them if either one detects the connection has been idle for some time. Is it
possible that one side starts closing a connection while the other side is
transmitting data via this connection? Explain.
Suppose Bob joins a BitTorrent torrent, but he does not want to upload any
2. data to any other peers (so called free-riding). L3 CO1
a. Bob claims that he can receive a complete copy of the file that is shared
by the swarm. Is Bob’s claim possible? Why or why not?
b. Bob further claims that he can further make his “free-riding” more efficient

Faculty in-charge:SV, RSG & KSC Department of ISE, RNSIT 3/2


Bloom’s Levels: L1: Remembering / L2: Understanding / L3: Applying /L4: Analyzing / L5: Evaluating / L6: Creating
RNS INSTITUTE OF TECHNOLOGY, BENGALURU - 98
DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

by using a collection of multiple computers (with distinct IP


addresses) in the computer lab in his department. How can he do that?
In the circular DHT example , suppose that peer 3 learns that
3. peer 5 has left. How does peer 3 update its successor state information? L3 CO1
Which peer is now its first successor? Its second successor?
Distinguish connection oriented and connectionless protocols.
4. L4 CO2
Identify the type of DNS messages given below.
5. i)(relay1.bar.foo.com,145.37.93.126) L4 CO2
ii)(foo.com,dns.foo.com)
iii)(foo.com, relay1.bar.foo.com)

Group 6

Suppose within your Web browser you click on a link to obtain a Web page. The
1. IP address for the associated URL is not cached in your local host, so a DNS L4 CO1
lookup is necessary to obtain the IP address. Suppose that n DNS servers are visited
before your host receives the IP address from DNS; the successive visits incur an
RTT of RTT 1 , . . ., RTT, Further suppose that the Web page associated with the
link contains exactly one object, consisting of a small amount of HTML text. Let
RTT 0 n denote the RTT between the local host and the server containing the
object. Assuming zero transmission time of the object, how much time elapses
from when the client clicks on the link until the client receives the object?
In the circular DHT example, suppose that a new peer 6 wants to join the DHT and
2. peer 6 initially only knows peer 15’s IP address. L3 CO1
What steps are taken?
Install and compile the Python programs TCPClient and UDPClient on one
3. host and TCPServer and UDPServer on another host. L3 CO2
a. Suppose you run TCPClient before you run TCPServer. What happens?
Why?
b. Suppose you run UDPClient before you run UDPServer. What happens?
Why?
c. What happens if you use different port numbers for the client and server
sides?
Can you configure your browser to open multiple simultaneous connections
4. to a Web site? What are the advantages and disadvantages of having a large L3 CO2
number of simultaneous TCP connections?
We have seen that Internet TCP sockets treat the data being sent as a byte
5. stream but UDP sockets recognize message boundaries. What are one L4 CO2
advantage and one disadvantage of byte-oriented API versus having the API
explicitly recognize and preserve application-defined message boundaries?

Faculty in-charge:SV, RSG & KSC Department of ISE, RNSIT 4/2


Bloom’s Levels: L1: Remembering / L2: Understanding / L3: Applying /L4: Analyzing / L5: Evaluating / L6: Creating

You might also like