The Gateway to Computer Science Excellence
For all GATE CSE Questions
Toggle navigation
Facebook Login
or
Email or Username
Password
Remember
Login
Register
|
I forgot my password
Activity
Questions
Unanswered
Tags
Subjects
Users
Ask
Prev
Blogs
New Blog
Exams
Recent questions tagged application-layer-protocols
0
votes
1
answer
1
Kurose and Ross Edition 6 Exercise 2 Question P14 (Page No 174)
How does SMTP mark the end of a message body? How about HTTP? Can HTTP use the same method as SMTP to mark the end of a message body? Explain.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
58
views
computer-networks
descriptive
application-layer-protocols
application-layer
0
votes
1
answer
2
Kurose and Ross Edition 6 Exercise 2 Question P13 (Page No 174)
What is the difference between MAIL FROM: in SMTP and From: in the mail message itself?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
34
views
computer-networks
application-layer-protocols
descriptive
0
votes
1
answer
3
Kurose and Ross Edition 6 Exercise 2 Question P3 (Page No 171)
Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP address of the HTTP server is initially unknown. What transport and application-layer protocols besides HTTP are needed in this scenario?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
43
views
computer-networks
application-layer
application-layer-protocols
descriptive
0
votes
1
answer
4
Kurose and Ross Edition 6 Exercise 2 Question P2 (Page No 171)
Read RFC 959 for FTP. List all of the client commands that are supported by the RFC.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
20
views
computer-networks
application-layer
application-layer-protocols
descriptive
+1
vote
1
answer
5
Kurose and Ross Edition 6 Exercise 2 Question P1 (Page No 171)
True or false? A user requests a Web page that consists of some text and three images. For this page, the client will send one request message and receive four response messages. Two distinct Web pages (for example, ... indicates when the object in the response was last modified. HTTP response messages never have an empty message body.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
28
views
computer-networks
application-layer
application-layer-protocols
descriptive
0
votes
0
answers
6
Kurose and Ross Edition 6 Exercise 2 Question R20 (Page No 170)
Look over your received emails, and examine the header of a message sent from a user with a .edu email address. Is it possible to determine from the header the IP address of the host from which the message was sent? Do the same for a message sent from a Gmail account.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
16
views
computer-networks
application-layer
application-layer-protocols
descriptive
0
votes
1
answer
7
Kurose and Ross Edition 6 Exercise 2 Question R19 (Page No 170)
Is it possible for an organization’s Web server and mail server to have exactly the same alias for a hostname (for example, $foo.com$)? What would be the type for the RR that contains the hostname of the mail server?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
26
views
computer-networks
application-layer-protocols
application-layer
descriptive
0
votes
1
answer
8
Kurose and Ross Edition 6 Exercise 2 Question R18 (Page No 170)
From a user’s perspective, what is the difference between the download-and delete mode and the download-and-keep mode in POP3?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
31
views
computer-networks
application-layer-protocols
application-layer
descriptive
0
votes
0
answers
9
Kurose and Ross Edition 6 Exercise 2 Question R17 (Page No 170)
Print out the header of an e-mail message you have recently received. How many $Received:$ header lines are there? Analyze each of the header lines in the message.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
19
views
computer-networks
application-layer-protocols
application-layer
descriptive
0
votes
1
answer
10
Kurose and Ross Edition 6 Exercise 2 Question R16 (Page No 170)
Suppose Alice, with a Web-based e-mail account (such as Hotmail or Gmail), sends a message to Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alice’s host to Bob’s host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
28
views
computer-networks
application-layer-protocols
descriptive
0
votes
0
answers
11
Kurose and Ross Edition 6 Exercise 2 Question R15 (Page No 170)
Why is it said that FTP sends control information “out-of-band”?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
18
views
computer-networks
application-layer-protocols
descriptive
0
votes
0
answers
12
Kurose and Ross Edition 6 Exercise 2 Question R13 (Page No 170)
Describe how Web caching can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested by a user or for only some of the objects? Why?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
16
views
computer-networks
application-layer-protocols
descriptive
0
votes
0
answers
13
Kurose and Ross Edition 6 Exercise 2 Question R12 (Page No 169)
Consider an e-commerce site that wants to keep a purchase record for each of its customers. Describe how this can be done with cookies.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
13
views
computer-networks
application-layer
application-layer-protocols
descriptive
0
votes
0
answers
14
Kurose and Ross Edition 6 Exercise 2 Question R11 (Page No 169)
Why do HTTP, FTP, SMTP, and POP3 run on top of TCP rather than on UDP?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
12
views
computer-networks
application-layer
application-layer-protocols
descriptive
0
votes
0
answers
15
Kurose and Ross Edition 6 Exercise 2 Question R10 (Page No 169)
What is meant by a handshaking protocol?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
9
views
computer-networks
application-layer
application-layer-protocols
descriptive
0
votes
1
answer
16
Kurose and Ross Edition 6 Exercise 2 Question R8 (Page No 169)
List the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a service.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
42
views
computer-networks
tcp
udp
application-layer-protocols
descriptive
0
votes
0
answers
17
Kurose and Ross Edition 6 Exercise 2 Question R5 (Page No 169)
What information is used by a process running on one host to identify a process running on another host?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
11
views
computer-networks
application-layer-protocols
descriptive
0
votes
0
answers
18
Kurose and Ross Edition 6 Exercise 2 Question R4 (Page No 169)
For a P2P file-sharing application, do you agree with the statement, “There is no notion of client and server sides of a communication session”? Why or why not?
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
6
views
computer-networks
application-layer
application-layer-protocols
descriptive
0
votes
0
answers
19
Kurose and Ross Edition 6 Exercise 2 Question R1 (Page No 169)
List five nonproprietary Internet applications and the application-layer protocols that they use.
asked
Apr 10
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
10
views
computer-networks
application-layer
application-layer-protocols
descriptive
0
votes
0
answers
20
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 32 (Page No. 761)
Write a program in JavaScript that accepts an integer greater than 2 and tells whether it is a prime number. Note that JavaScript has if and while statements with the same syntax as C and Java. The modulo operator is %. If you need the square root of x, use Math.sqrt (x).
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
12
views
computer-networks
application-layer-protocols
descriptive
0
votes
0
answers
21
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 46 (Page No. 762)
Some cybersquatters have registered domain names that are misspellings of common corporate sites, for example, www.microsfot.com. Make a list of at least five such domains.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
7
views
computer-networks
application-layer-protocols
descriptive
0
votes
0
answers
22
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 47 (Page No. 762)
Numerous people have registered DNS names that consist of www.word.com, where word is a common word. For each of the following categories, list five such Web sites and briefly summarize what it is (e.g., www.stomach. ... , foods, household objects, and body parts. For the last category, please stick to body parts above the waist.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
9
views
computer-networks
application-layer-protocols
descriptive
0
votes
0
answers
23
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 48 (Page No. 762)
Rewrite the server of Fig. 6-6 as a true Web server using the GET command for HTTP 1.1. It should also accept the Host message. The server should maintain a cache of files recently fetched from the disk and serve requests from the cache when possible.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
9
views
computer-networks
application-layer-protocols
http
program
0
votes
0
answers
24
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 23 (Page No. 759)
Imagine that someone in the math department at Stanford has just written a new document including a proof that he wants to distribute by FTP for his colleagues to review. He puts the program in the FTP directory ftp/pub/forReview/newProof.pdf. What is the URL for this program likely to be?
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
15
views
computer-networks
descriptive
tanenbaum
application-layer-protocols
0
votes
0
answers
25
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 23 (Page No. 759)
Although it was not mentioned in the text, an alternative form for a URL is to use the IP address instead of its DNS name. Use this information to explain why a DNS name cannot end with a digit.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
17
views
computer-networks
tanenbaum
descriptive
application-layer-protocols
0
votes
1
answer
26
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 20 (Page No. 759)
Does Webmail use POP3, IMAP, or neither? If one of these, why was that one chosen? If neither, which one is it closer to in spirit?
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
47
views
computer-networks
application-layer-protocols
descriptive
tanenbaum
+1
vote
0
answers
27
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 15 (Page No. 759)
In any standard, such as RFC 5322, a precise grammar of what is allowed is needed so that different implementations can interwork. Even simple items have to be defined carefully. The SMTP headers allow white space between the tokens. Give two plausible alternative definitions of white space between tokens.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
18
views
computer-networks
tanenbaum
descriptive
application-layer-protocols
0
votes
0
answers
28
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 14 (Page No. 759)
Suppose that John just set up an auto-forwarding mechanism on his work email address, which receives all of his business-related emails, to forward them to his personal email address, which he shares with his wife. John' ... vacation daemon on his work machine. What happens when an email is received at John's work email address?
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
24
views
computer-networks
tanenbaum
application-layer-protocols
descriptive
0
votes
0
answers
29
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 10 (Page No. 759)
A large law firm, which has many employees, provides a single email address for each employee. Each employee's email address is <login>@lawfirm.com. However, the firm did not explicitly define the format of the login. ... for the email addresses of all its employees. How can this be done without rocking the boat too much?
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
14
views
computer-networks
tanenbaum
application-layer-protocols
descriptive
0
votes
0
answers
30
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 9 (Page No. 759)
Electronic mail systems need directories so people’s email addresses can be looked up. To build such directories, names should be broken up into standard components (e.g., first name, last name) to make searching possible. Discuss some problems that must be solved for a worldwide standard to be acceptable.
asked
Mar 19
in
Computer Networks
by
ajaysoni1924
Boss
(
10.5k
points)
|
17
views
computer-networks
application-layer-protocols
descriptive
tanenbaum
Page:
1
2
3
next »
Quick search syntax
tags
tag:apple
author
user:martin
title
title:apple
content
content:apple
exclude
-tag:apple
force match
+apple
views
views:100
score
score:10
answers
answers:2
is accepted
isaccepted:true
is closed
isclosed:true
Recent Posts
Linear Algebra Important Points
GATE 2020
OFFICIAL GATE MOCK TEST RELEASED
IIITH: Winter Research Admissions 2019 (For Spring 2020)
TIFR and JEST exam
Follow @csegate
Recent questions tagged application-layer-protocols
Recent Blog Comments
It's a question not a post..
i also don't have any pdf, actually, I added the...
i don't have , if you have upload it
@mohan123 Do you have all standard book...
bro can be upload all standard book questions in...
50,647
questions
56,467
answers
195,381
comments
100,316
users