Assignment-2 Problem 1: a)false Here the user request the web page in which we have some text and three images which is a just single response .This single reponse consisits the web page which consists some text and three images. b)true c)false In a non-persistent connection the connection close after each connection.the connection gets closed after every message have been received completely and then opens new connection for the next message. d)false The DATE give the date at which date the request was created not the modification date. e)false HTTP response message must all have message body Problem 3: application layer protocol uses DNS and HTTP Transport layer protocol uses udp for DNS,tcp for http. Problem 4: a) The URL …show more content…
of the document requested by the browser is http://gaia.cs.umass.edu/cs453/index.html cs453/index.html is file name and the remaining part is server name.
b)The version is 1.1 as indicated before the first
data, Internet delay=2sec L=900,000 bits R=15,000,000 bits\sec beta=1.5 request\sec Average access delay =delta/(1-delta beta) delta=L/R delta=900,000 bits\15,000,000 bits\sec =0.06sec Average access delay =delta/(1-delta beta) =0.06(1-(1.5request \sec*0.06sec)) =0.06593sec Total average response time=internet delay+Average access delay =0.06593+2 =2.06593 b)Given, cache-miss=0.4 Total average response time=internet delay+Average access delay beta'=1.5 request/sec * (1-0.4) = 0.9 request/sec Average access delay =delta/(1-delta beta) =0.06(1-(0.9request \sec*0.06sec)) =0.06432sec Total average response time=0.06432+2 =2.06432 Problem 15: MTA stands for Mail Transfer Agent.
Here the host sends a message to MTA,which follows a sequence of MTA's to reach the receiver mail. Here the spam message also follows a sequence of MTA's. A honest MTA must report from where it receives the message. From the given message “asusus-4b96([58.88.21.177])”doesn't report from where it receive the message. since we assume the only originator is dishonest. so“asusus-4b96([58.88.21.177])” is the originator. Problem
31: a) If you run TCP client first,then the client will make an attempt to make a TCP connection with the non-existing server .A TCP connection will not be made. b)It does not establish a TCP connection with the server .Thus ,everything works good if you first run UDP client and then UDP server and then type some input to the keyboard. c)If you use different port numbers then the client will be in ambiguity and try to establish a TCP connection with the non-existent process which leads to error.
For the proposed system, chatting will be one-to-one basis. That is why; there will be one dedicated operator for a specific ...
From the above part (b), Yahoo.com and google.com are the web servers that have multiple IP addresses
By doing this the message will go only to the original sender as opposed to the whole list of recipients. If replies are sent to all of the original recipients then each reply is also considered a mass mailing.
done by anyone (a private person or legal entity) who has an email address. When the money is transferred, a message is
header to see if the packet is for it. If not, it is sent furt...
RSS version 0.90,original RSS, was designed by Netscape as a format for building portals of headlines to mainstream news sites in 1999.it was extremely complex for its aim so a simpler version, 0.91, was evolved but dropped due to Netscape’s interest lost in the portal-making business. After that UserLand Software picked up 0.91 and planned to use it as the basis of its weblogging products.
...end by validation of client end along with validation of received message on server end.
... moves messages from one e-mail server to another over TCP/IP based networks. SNMP is a protocol that manages hardware devices on a TCP/IP network (Microsoft).
A tiny bit of text assist requests and pages as they go between the Web server and browser is called a cookie. The information that can be read by the web application will be checked by the cookie whenever the site is being visited by the user.
Emails have been dominating in the communication methods that are available. Traditional mailing of physical documents is no longer practiced with big organization. Every business mailing is going Electronic. Electronic mails use the WWW to transfer messages, documents a...
· The server returned the HTML text for the web page to the browser. The browser read the HTML tags and formatted the page onto your screen.
The e-mail application using the standard protocol for sending emails namely Simple Mail Transfer Protocol (SMTP). While, the most commonly used protocol for e-mail receiving is Post Office Protocol v3 (POP3) and Internet Message Access Protocol (IMAP). The receiving protocol is used by email client to extract email message from domain’s email server. Figure 5 below shows the e-mail processing diagram using specified protocol.
Electronic mail is rather a means of communication that is undergoing increasing progress around the world. E-mail messages can be sent across various sorts of networks, both locally and globally. Apart from the Internet there are thousands of local area networks and wide area networks that send millions more messages every day across diverse kinds of transmission cable. Electronic mail over the Internet, the world's greatest computer network, is experiencing exploding growth daily.
a) There is no physical appearance of the communicator and the receiver since it is via online.
The Internet provides access to a wealth of information on countless topics contributed by people throughout the world. A user has access to a wide variety of services and access protocols. These protocols such as http and e-mail allow users to search and retrieve material.