a) Describe the simple message ordering in HTTP. [53]

a) Describe the simple message ordering in HTTP. [53]
b) In HTTP, can the server transmit if it has not received a request message from the client? [53]
c) Describe the three-step handshake in TCP connection openings. [53-55]
d) What kind of message does the destination host send if it does not receive a segment during a TCP connection? [54-55]
e) What kind of message does the destination host send if it receives a segment that has an error during a TCP connection? [54-55]
f) Under what conditions will a source host TCP process retransmit a segment? [55]
g) Describe the four-step handshake in TCP connection closes. [56]
h) After a side initiates the close of a connection by sending a FIN segment, will it send any more segments? Explain. [56]
i) In Figure 2-7, suppose Host A had already sent A6 before it realized that it would need to resend A5. When it then resent A5, A6 would arrive before A5. How would Host B be able to put the information in the two segments back in order? [55-56]
4. a) What are the three general parts of messages? [57-58]
b) What does the data field contain? [58]
c) What is the definition of a header? [58]
d) Is there always a data field in a message? [58]
e) What is the definition of a trailer? [58]
f) Are trailers common? [58]
g) Distinguish between headers and header fields. [58]
h) Distinguish between octets and bytes. [58]
5. a) How long are Ethernet MAC addresses? [60]
b) What devices read Ethernet destination MAC addresses? [59]
c) If the receiver detects an error on the basis of the value in the Frame Check Sequence field, what does it do? [60]
d) Ethernet does error detection but not error correction. Is Ethernet a reliable protocol? Explain. [60]
8. a) Why are sequence numbers good? [62]
b) What are 1-bit fields called? [61]
c) If someone says that a flag field is set, what does this mean? [61]
d) If the ACK bit is set, what other field must have a value? [61, 63]
e) What is the purpose of the acknowledgment number field? [61, 63]
9. a) What are the four fields in a UDP header? [43]
b) Describe the third. [43]
c) Describe the fourth. [43]
d) Is UDP reliable? Explain. [43]
11. a) What is the syntax of a socket? [65]
b) In Figure 2-13, when the client transmits to the webserver host, what is the source port number? [65]
c) What is the destination port number? [65]
d) What is the source socket? [65]
e) What is the destination socket? [65]
f) When the SMTP server transmits to the client host, what is the source port number? [65]
g) What is the destination port number? [65]
h) What is the source socket? [65]
i) What is the destination socket? [65]
12. a) Is the application layer standard always HTTP? [65-66]
b) Which layer has the most standards? [65]
c) At which layer would you find standards for voice over IP? (The answer is not explicitly in this section.) [65-66]
d) Are all application layer standards simple like HTTP? [67]
e) In HTTP response headers, what is the syntax of most lines (which are header fields)? [67]
f) In HTTP request and response message, how is the end of a field indicated? [67]
g) Do HTTP request messages have headers, data fields, and trailers?
h) Do HTTP response messages that deliver files have headers, data fields, and trailers? [67]
18. a) What is encapsulation? [72]
b) Why is encapsulation necessary for there to be communication between processes operating at the same layer but on different hosts, routers, or switches? [72]
c) After the internet layer process in Figure 2-19 receives the TCP segment from the transport layer process, what two things does it do? [72-73]
d) After the data link layer process in Figure 2-19 receives the IP packet from the internet layer process, what two things does it do? [72-73]
e) After the physical layer process receives a frame from the data link layer process, what does the physical layer process do? [72-73]
f) If encapsulation occurs on the source host, what analogous process do you think will occur on the destination host? (The answer is not in the text.) [72-73]
19. a) What does a network standards architecture do? [75]
c) What are the two dominant network standards architectures? [75]
d) What is the dominant network standards architecture in most real firms today? [75]
e) Are the two network standards architectures competitors? [75]
23. a) Which layers of the hybrid TCP/IP–OSI standards architecture use OSI standards? [80]
b) Which layers use TCP/IP standards? [80]
c) Do wireless LAN standards come from OSI or TCP/IP? Explain. (The answer is not explicitly in this section.) [80]
d) Do switched WAN standards come from OSI or TCP/IP? Explain. (Again, the answer is not explicitly in this section.) [80]
*24. a) At which layers do OSI standards dominate usage? [80]
b) Name and describe the functions of OSI Layer 5. [82]
c) Name and describe the intended use of OSI Layer 6. [81]
d) How is the OSI presentation layer actually used? [81]
e) Beginning with the physical layer (Layer 1), give the name and number of the OSI layers. [80-81]

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Still stressed with your coursework?
Get quality coursework help from an expert!