Business data network and security
2.
a) Give the definition of network standards that this chapter introduced.
b) In this and protocols mean the same thing?
4.
a) Describe the simple message ordering in HTTP.
b) In HTTP, can the server transmit if it has not received a request message from the client?
c) Describe the three-step handshake in TCP connection openings.
d) What kind of message does the destination host send if it does not receive a segment during a TCP connection?
e) What kind of message does the destination host send if it receives a segment that has an error during a TCP connection?
f) Under what conditions will a source host TCP process retransmit a segment?
g) Describe the four-step handshake in TCP connection closes.
h) After a side initiates the close of a connection by sending a FIN segment, will it send any more segments? Explain.
i) In Figure 2-8, suppose Host A had already sent A6 before it realized that it would need to resend A5. When it then resent A5, A6 would arrive before A5. How would Host B be able to put the information in the two segments back in order?
5.
a) What are the three general parts of messages?
b) What does the data field contain?
c) What is the definition of a header?
d) Is there always a data field in a message?
e) What is the definition of a trailer?
f) Are trailers common?
g) Distinguish between headers and header fields.
h) Distinguish between octets and bytes.
6.
a) How long are Ethernet EUI-48 addresses?
b) What were they called traditionally?
c) What devices read Ethernet destination EUI-48 addresses?
d) If the receiver detects an error on the basis of the value in the Frame Check Sequence field, what does it do?
e) Ethernet does error detection but not error correction. Is Ethernet a reliable protocol? Explain.
11.
a) What type of port numbers do servers use for common server programs?
b) What type of port numbers do clients use when they communicate with server programs?
c) What is the range of port numbers for each type of port?
d) How are ephemeral port numbers generated?
e) Why are they called ephemeral?
12.
a) What is the syntax of a socket?
b) In Figure 2-14, when the client transmits to the mail server, what is the source port number?
c) What is the destination port number?
d) What is the source socket?
e) What is the destination socket?
f) When the SMTP server transmits to the client host, what is the source port number?
g) What is the destination port number?
h) What is the source socket?
i) What is the destination socket?
From Thought Questions in END-OF-CHAPTER QUESTIONS
2-1.
How do you think TCP would handle the problem if an acknowledgment were lost, so that the sender retransmitted the unacknowledged TCP segment, therefore causing the receiving transport process to receive the same segment twice?
2-2.
a) In Figure 2-14, what will be the value in the destination port number field if a packet arrives for the e-mail application?
b) When the HTTP program on a web server sends an HTTP response message to a client PC, in what field of what message will it place the value 80?
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A GOOD DISCOUNT


