loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive



Similar documents
Computer Networks - CS132/EECS148 - Spring

1 Introduction: Network Applications

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

Application Layer. CMPT Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

Lecture 2 CS An example of a middleware service: DNS Domain Name System

Application Layer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Network Technologies

Computer Networking LAB 2 HTTP

The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam.

First Midterm for ECE374 03/24/11 Solution!!

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

Domain Name System (DNS)

DATA COMMUNICATOIN NETWORKING

DNS: Domain Names. DNS: Domain Name System. DNS: Root name servers. DNS name servers

FTP: the file transfer protocol

DNS and P2P File Sharing

DATA COMMUNICATOIN NETWORKING

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14

Computer Networks & Security 2014/2015

The Application Layer: DNS

NET0183 Networks and Communications

Distributed Systems. 2. Application Layer

First Midterm for ECE374 02/25/15 Solution!!

BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Chapter 2 Application Layer

Wireshark Lab: HTTP SOLUTION

3. The Domain Name Service

CS101 Lecture 19: Internetworking. What You ll Learn Today

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Introduction to Computer Networks

Computer Networks. Examples of network applica3ons. Applica3on Layer

Networking Applications

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.

Configuring Web services

CMPE 80N: Introduction to Networking and the Internet

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, , Web, DNS, and Network Management. Maximum Points: 60

MailEnable Scalability White Paper Version 1.2

FTP: the file transfer protocol

internet technologies and standards

How to Configure the Windows DNS Server

CSCI-1680 CDN & P2P Chen Avin

OCS Training Workshop LAB14. Setup

CS43: Computer Networks . Kevin Webb Swarthmore College September 24, 2015

The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:

Domain Name System :49:44 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

The Application Layer. CS158a Chris Pollett May 9, 2007.

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Domain Name System (DNS)

Chapter 6 Virtual Private Networking Using SSL Connections


Network Layers. CSC358 - Introduction to Computer Networks

Connecting with Computer Science, 2e. Chapter 5 The Internet

Remote login (Telnet):

Alteon Global Server Load Balancing

Talk-101 User Guides Mailgate Administration Guide

Install MS SQL Server 2012 Express Edition

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace

Application-layer protocols

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012

Use Domain Name System and IP Version 6

Chakchai So-In, Ph.D.

Debugging With Netalyzr

DNS: a statistical analysis of name server traffic at local network-to-internet connections

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T PIN6 T PIN7 R+ PIN8 R-

Appendix D: Configuring Firewalls and Network Address Translation

Figure 41-1 IP Filter Rules

Understanding DNS (the Domain Name System)

Terminology. Internet Addressing System

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer

Protocols. Packets. What's in an IP packet

B6: GET /started/with/ HTTP Analysis

Cloud Testing Production Applications CloudTest Strategy and Approach

EdgeCast Networks Inc. Flash Media Streaming Administration Guide

How to Configure edgebox as an Server

HTTP. Internet Engineering. Fall Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

To configure Outlook Express for your InfoMetrics address:

Application Layer -1- Network Tools

IxLoad TM : Data HTTP, SSL, and FTP

Web Caching and CDNs. Aditya Akella

Working With Virtual Hosts on Pramati Server

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

Domain Name System (DNS) Omer F. Rana. Networks and Data Communications 1

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS

ShoreTel Advanced Applications Web Utilities

Wireshark Lab: DNS. 1. nslookup

Lab - Observing DNS Resolution

CPSC Network Programming. , FTP, and NAT.

Transcription:

CS326e Quiz 5 The first correct 10 answers will be worth 1 point each. Each subsequent correct answer will be worth 0.2 points. Circle the correct answer. UTEID The transfer of an html file from one host to another is loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive A browser will generate header lines as a function of whether the browser has a cached version of the requested object browser type and version user configuration of browser all of the above Suppose a client sends an HTTP request message with the If-modified-since: header. Suppose the object in a server has not changed since the last time a client retrieved the object. Then the server will send a response message with the status code: 404 Not Found 200 OK 304 Not Modified

Suppose the hit rate is.5 (instead of.4) in the caching example in the text. Then the average delay is greater than two seconds between 1.0 and 1.1 seconds between 1.2 and 1.3 seconds SMTP is used to to transfer messages from one mail server to another to transfer messages from mail server to a user agent to define the format of message headers all of the above Suppose a DNS resource record has Type=MX. Then Value is the hostname of the mail server that has the alias hostname Name. Value is the IP address of the mail server that has the alias hostname Name. Value is the hostname of the DNS server that is authoritative for Name.

Local DNS name servers cache resource records, but discard them after a period of time that is on the order of a few days cache resource records and never discard them obtain resource records from Web caches never cache resource records Streams are not needed in which of the following programs: UDPserver TCPserver UDPclient TCPclient Consider the minimum time for P2P file distribution, as discussed in Section 2.6. Suppose the upload rate of the server is10 Mbps, the upload rates of all peers is 1 Mbps, and the download rates of all peers is 10 Mbps. Further suppose that there are 100 peers and the file is 100 million bits. The minimum distribution time is approximately 1000 seconds approximately 1 second approximately 10 seconds approximately 100 seconds

For BitTorrent, which of the following is true: Among the chunks that a peer does not have, the peer will request chunks that appear to be relatively rare in the torrent. At a given instant of time, a peer A may upload to a peer B, even if peer B is not sending anything to A. Although a peer may have 50 concurrent TCP connections with other peers, at any given instant of time it sends data to less than 10 other peers. All of the above.

A server can use cookies to determine a user's postal address without the user's consent. The Web typically sends multiple objects in a Web page within a multipart MIME message. It is possible for a mail client to send e-mail messages over HTTP rather than SMTP. If a POP3 client does not send the dele command, copies of the messages that the client has retrieved remain in the mail server. With SMTP, it is possible to send multiple mail messages over the same TCP connection.

DNS lookups often involve a combination of recursive and iterative queries. With non-persistent connections between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages. The Date: header in the HTTP response message indicates when the object in the response was last modified. In BitTorrent, a peer s instantaneous download rate can never exceed its instantaneous upload rate. Skype relay nodes are typically peers under the control of Skype users.