Professional Documents
Culture Documents
1
14- What is the type of the answer to a DNS query for the IP address of the
authoritative name server for the domain? (A) Type A (B) Type NS (C) Type
CNAME (D) Type MX
12. Which TCP/IP stack layers have to be passed when a computer accesses an
Internet website in a web browser __network layer____________
2
15. ___Routing protocol__ responsible for finding the shortest and free path.
16. __session layer_ The function of this layer is to provide mechanism to control
the dialogue between applications in end systems like dialogue discipline
Question three:
1- What are the typical causes of packet loss in a packet switched network?
• errors in data transmission
• network congestion.
• Network attack
• Faulty Networking Wires
2- An application layer protocol typically defines four things. What are these four
things?
• Types of messages
• syntax of messages
• semantics of messages
• timing
3- List three command used by FTP over control connection and expain it.
command Explain
3
4- What is the difference between network applications and application layer
protocols?
network applications هي التطبيقات التي تعمل بتوفر االنترنت ك الكروم
application layer protocolsهي البروتوكوالت التي تستخدمها التطبيقات للحصول على الحدمة المطلوبة
5- Both HTTP and FTP can be used for downloading and uploading files. Give one
similarity and one difference between the two protocols.
Similarity:
BASIS FOR
HTTP FTP
COMPARISON
connection.
4
BASIS FOR
HTTP FTP
COMPARISON
TCP ports HTTP uses TCP's port FTP uses TCP's port
URL If you are using HTTP, http If you are using FTP, ftp will
web pages.
authentication.
5
6- What is the purpose of the IF-MODIFIED-SINCE field in an HTTP GET message?
The if-modified-since and the last-modified header are part of the validation: A
document or resource is checked for its current validity. This reduces server requests,
data transfer and access times to control client-side waiting times, server-side
utilization and the bandwidth used for data transfer.
.Host Aliasing. A host with a complicated hostname can have one or more alias names
Mail Server Aliasing. For obvious reasons, it is highly desirable that e-mail addresses
by mnemonic
Load Distribution
6
8- if a client requests an URL but it does not know the IP Address. Explain how this
problem in context of DNS solved.
10- What information is used by a process running on one host to identify a process
running on another host?
The IP address of the destination host and the port number of the destination socket
7
11- Explain the DNS records and messages.
When you enter an internet address in the browser, the system first has to look up
which IP address belongs to this domain. This sometimes occurs even in the
computer’s memory itself, often in the internet provider’s database or other DNS
servers, and in cases of uncertainty, via one of the large root servers that monitor the
entire Domain Name System as authority entities. In order to perform a name
resolution, the DNS records, specifically the resource records, must be searched for in
the DNS and/or name servers. Here, each IP address (known to the server) is assigned
a domain name.
The DNS has a hierarchical and decentralized structure. At each level, there is a
server that is responsible for its namespace. This means that in the search for
www.example.com’s IP address, the root server only helps if it knows which server is
responsible for the Top-Level Domain (TLD). In this way, the individual levels are
run through in order to perform the name resolution. This means that the IP address of
the actual web server or mail server resides solely with the host itself. For this reason,
it is important for website operators to understand the concept of resource records.
13- List the four broad classes of services that a transport protocol can provide. For
each of the service classes, indicate if either UDP or TCP (or both) provides such a
service
1. Reliability:
• The data transfer between client and server in the form of reliable byte
stream. Therefore, TCP is reliable.
• When the data file or message is sent from source to destination there is no
chance for guaranteed delivery to destination.
• The data transfer is not possible in the form of byte stream in the case of
UDP. Therefore, UDP is unreliable.
8
2. Ordering of data:
In TCP:
• TCP protocol delivers the packets in an order. The source transmits the
second packet only after the first packet is received at the
destination. Therefore, TCP follows ordering of packets.
In UDP:
• UDP protocol does not deliver the packets in an order. The transmission of
packets from the source to destination follows no order. Therefore, UDP
follows no ordering.
3. Constant Throughput:
In TCP:
• The throughput for TCP protocol is much more than throughput for UDP
protocol because TCP is reliable.
In UDP:
• The throughput for UDP protocol is less than throughput for TCP protocol
because UDP is unreliable.
4. Timing:
In TCP:
In UDP:
9
• Therefore, no time delay in receiving acknowledgements. But the client
doesn’t know, whether the packet was dropped or delayed. Therefore, UDP
protocol satisfies the timing property but it doesn’t give the guarantee
that packet delayed or not.
14- Is it possible for an organization’s Web server and mail server to have exactly the
same alias for a hostname (for example, foo.com)? What ould be the
type for the RR that contains the hostname of the mail server?
Yes an organization's mail server and Web server can have the same alias for a host
name. The MX record is used to map the mail server's host name to its IP address.
15- Consider an HTTP client that wants to retrieve a Web document at a given URL.
The IP address of the HTTP server is initially unknown. Describe how doese the
client retrieve the Web Document
10