Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged application-layer-protocols
0
votes
1
answer
31
Kurose and Ross Edition 6 Exercise 2 Question R8 (Page No 169)
List the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a service.
List the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a se...
ajaysoni1924
2.1k
views
ajaysoni1924
asked
Apr 10, 2019
Computer Networks
computer-networks
kurose-and-ross
tcp
udp
application-layer-protocols
descriptive
+
–
0
votes
1
answer
32
Kurose and Ross Edition 6 Exercise 2 Question R5 (Page No 169)
What information is used by a process running on one host to identify a process running on another host?
What information is used by a process running on one host to identify a process running on another host?
ajaysoni1924
343
views
ajaysoni1924
asked
Apr 10, 2019
Computer Networks
computer-networks
kurose-and-ross
application-layer-protocols
descriptive
+
–
0
votes
0
answers
33
Kurose and Ross Edition 6 Exercise 2 Question R4 (Page No 169)
For a P2P file-sharing application, do you agree with the statement, “There is no notion of client and server sides of a communication session”? Why or why not?
For a P2P file-sharing application, do you agree with the statement, “There is no notion of client and server sides of a communication session”? Why or why not?
ajaysoni1924
283
views
ajaysoni1924
asked
Apr 10, 2019
Computer Networks
computer-networks
kurose-and-ross
application-layer
application-layer-protocols
descriptive
+
–
0
votes
0
answers
34
Kurose and Ross Edition 6 Exercise 2 Question R1 (Page No 169)
List five nonproprietary Internet applications and the application-layer protocols that they use.
List five nonproprietary Internet applications and the application-layer protocols that they use.
ajaysoni1924
373
views
ajaysoni1924
asked
Apr 10, 2019
Computer Networks
computer-networks
kurose-and-ross
application-layer
application-layer-protocols
descriptive
+
–
0
votes
0
answers
35
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 32 (Page No. 761)
Write a program in JavaScript that accepts an integer greater than 2 and tells whether it is a prime number. Note that JavaScript has if and while statements with the same syntax as C and Java. The modulo operator is %. If you need the square root of x, use Math.sqrt (x).
Write a program in JavaScript that accepts an integer greater than 2 and tells whetherit is a prime number. Note that JavaScript has if and while statements with the same...
ajaysoni1924
196
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
0
answers
36
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 46 (Page No. 762)
Some cybersquatters have registered domain names that are misspellings of common corporate sites, for example, www.microsfot.com. Make a list of at least five such domains.
Some cybersquatters have registered domain names that are misspellings of commoncorporate sites, for example, www.microsfot.com. Make a list of at least five such domains...
ajaysoni1924
208
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
0
answers
37
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 47 (Page No. 762)
Numerous people have registered DNS names that consist of www.word.com, where word is a common word. For each of the following categories, list five such Web sites and briefly summarize what it is (e.g., www.stomach. ... , foods, household objects, and body parts. For the last category, please stick to body parts above the waist.
Numerous people have registered DNS names that consist of www.word.com, whereword is a common word. For each of the following categories, list five such Web sitesand brie...
ajaysoni1924
321
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
0
answers
38
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 48 (Page No. 762)
Rewrite the server of Fig. 6-6 as a true Web server using the GET command for HTTP 1.1. It should also accept the Host message. The server should maintain a cache of files recently fetched from the disk and serve requests from the cache when possible.
Rewrite the server of Fig. 6-6 as a true Web server using the GET command for HTTP1.1. It should also accept the Host message. The server should maintain a cache offiles ...
ajaysoni1924
179
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
http
program
+
–
0
votes
0
answers
39
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 23 (Page No. 759)
Imagine that someone in the math department at Stanford has just written a new document including a proof that he wants to distribute by FTP for his colleagues to review. He puts the program in the FTP directory ftp/pub/forReview/newProof.pdf. What is the URL for this program likely to be?
Imagine that someone in the math department at Stanford has just written a new documentincluding a proof that he wants to distribute by FTP for his colleagues to review.H...
ajaysoni1924
392
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
descriptive
tanenbaum
application-layer-protocols
+
–
0
votes
0
answers
40
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 23 (Page No. 759)
Although it was not mentioned in the text, an alternative form for a URL is to use the IP address instead of its DNS name. Use this information to explain why a DNS name cannot end with a digit.
Although it was not mentioned in the text, an alternative form for a URL is to use theIP address instead of its DNS name. Use this information to explain why a DNS nameca...
ajaysoni1924
409
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
descriptive
application-layer-protocols
+
–
0
votes
1
answer
41
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 20 (Page No. 759)
Does Webmail use POP3, IMAP, or neither? If one of these, why was that one chosen? If neither, which one is it closer to in spirit?
Does Webmail use POP3, IMAP, or neither? If one of these, why was that one chosen?If neither, which one is it closer to in spirit?
ajaysoni1924
960
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
application-layer-protocols
descriptive
tanenbaum
+
–
1
votes
0
answers
42
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 15 (Page No. 759)
In any standard, such as RFC 5322, a precise grammar of what is allowed is needed so that different implementations can interwork. Even simple items have to be defined carefully. The SMTP headers allow white space between the tokens. Give two plausible alternative definitions of white space between tokens.
In any standard, such as RFC 5322, a precise grammar of what is allowed is needed sothat different implementations can interwork. Even simple items have to be definedcare...
ajaysoni1924
352
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
descriptive
application-layer-protocols
+
–
0
votes
0
answers
43
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 14 (Page No. 759)
Suppose that John just set up an auto-forwarding mechanism on his work email address, which receives all of his business-related emails, to forward them to his personal email address, which he shares with his wife. John' ... vacation daemon on his work machine. What happens when an email is received at John's work email address?
Suppose that John just set up an auto-forwarding mechanism on his work email address,which receives all of his business-related emails, to forward them to his personalema...
ajaysoni1924
246
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
1
answer
44
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 10 (Page No. 759)
A large law firm, which has many employees, provides a single email address for each employee. Each employee's email address is <login>@lawfirm.com. However, the firm did not explicitly define the format of the login. ... for the email addresses of all its employees. How can this be done without rocking the boat too much?
A large law firm, which has many employees, provides a single email address for eachemployee. Each employee’s email address is <login>@lawfirm.com. However, thefirm did...
ajaysoni1924
737
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
0
answers
45
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 9 (Page No. 759)
Electronic mail systems need directories so people’s email addresses can be looked up. To build such directories, names should be broken up into standard components (e.g., first name, last name) to make searching possible. Discuss some problems that must be solved for a worldwide standard to be acceptable.
Electronic mail systems need directories so people’s email addresses can be lookedup. To build such directories, names should be broken up into standard components(e.g....
ajaysoni1924
398
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
application-layer-protocols
descriptive
tanenbaum
+
–
0
votes
0
answers
46
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 8 (Page No. 759)
Some email systems support a Content Return: header field. It specifies whether the body of a message is to be returned in the event of nondelivery. Does this field belong to the envelope or to the header?
Some email systems support a Content Return: header field. It specifies whether thebody of a message is to be returned in the event of nondelivery. Does this field belong...
ajaysoni1924
430
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
descriptive
application-layer-protocols
+
–
0
votes
0
answers
47
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 7 (Page No. 759)
The number of companies with a Web site has grown explosively in recent years. As a result, thousands of companies are registered in the com domain, causing a heavy load on the top-level server for this domain. ... introducing new top-level domain names). It is permitted that your solution requires changes to the client code.
The number of companies with a Web site has grown explosively in recent years. Asa result, thousands of companies are registered in the com domain, causing a heavyload on...
ajaysoni1924
335
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
1
votes
0
answers
48
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 3 (Page No. 759)
The number of companies with a Web site has grown explosively in recent years. As a result, thousands of companies are registered in the com domain, causing a heavy load on the top-level server for this domain. ... introducing new top-level domain names). It is permitted that your solution requires changes to the client code.
The number of companies with a Web site has grown explosively in recent years. Asa result, thousands of companies are registered in the com domain, causing a heavyload on...
ajaysoni1924
319
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
1
answer
49
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 6 (Page No. 759)
Can a machine with a single DNS name have multiple IP addresses? How could this occur?
Can a machine with a single DNS name have multiple IP addresses? How could thisoccur?
ajaysoni1924
551
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
0
answers
50
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 4 (Page No. 759)
John wants to have an original domain name and uses a randomized program to generate a secondary domain name for him. He wants to register this domain name in the com generic domain. The domain name that was generated is 253 characters long. Will the com registrar allow this domain name to be registered?
John wants to have an original domain name and uses a randomized program to generatea secondary domain name for him. He wants to register this domain name in thecom gener...
ajaysoni1924
396
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
1
answer
51
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 4 (Page No. 759)
DNS uses UDP instead of TCP. If a DNS packet is lost, there is no automatic recovery. Does this cause a problem, and if so, how is it solved?
DNS uses UDP instead of TCP. If a DNS packet is lost, there is no automatic recovery.Does this cause a problem, and if so, how is it solved?
ajaysoni1924
2.1k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
1
answer
52
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 3 (Page No. 759)
Consider a situation in which a cyberterrorist makes all the DNS servers in the world crash simultaneously. How does this change one’s ability to use the Internet?
Consider a situation in which a cyberterrorist makes all the DNS servers in the worldcrash simultaneously. How does this change one’s ability to use the Internet?
ajaysoni1924
811
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
1
answer
53
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 1 (Page No. 759)
Many business Computers have three distinct world wide unique identifiers. what are they?
Many business Computers have three distinct world wide unique identifiers. what are they?
ajaysoni1924
366
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
11
votes
6
answers
54
GATE CSE 2019 | Question: 16
Which of the following protocol pairs can be used to send and retrieve e-mails (in that order)? $\textsf{IMAP, POP3}$ $\textsf{SMTP, POP3}$ $\textsf{SMTP, MIME}$ $\textsf{IMAP, SMTP}$
Which of the following protocol pairs can be used to send and retrieve e-mails (in that order)?$\textsf{IMAP, POP3}$$\textsf{SMTP, POP3}$$\textsf{SMTP, MIME}$$\textsf{IMA...
Arjun
12.5k
views
Arjun
asked
Feb 7, 2019
Computer Networks
gatecse-2019
computer-networks
application-layer-protocols
1-mark
+
–
0
votes
0
answers
55
UPPCL AE 2018:9
Consider the following application layer services: Domain names to $\text{IP}$ Address mapping Data communication over the World Wide Web Electronic mail transmission Retrieve e-mail from a remote server Transfer files from one host to another host Which one of the following order of application ... $\text{DNS, FTP, SMTP, POP, FTP}$ $\text{HTTP, FTP, POP, SMTP, DNS}$
Consider the following application layer services:Domain names to $\text{IP}$ Address mappingData communication over the World Wide WebElectronic mail transmissionRetriev...
admin
254
views
admin
asked
Jan 5, 2019
Computer Networks
uppcl2018
computer-networks
application-layer-protocols
+
–
1
votes
2
answers
56
Application layer protocol
Which of the following Application Layer Protocol cannot be used between mail server and receiver’s client machine? SMTP HTTP POP3 IMAP4
Which of the following Application Layer Protocol cannot be used between mail server and receiver’s client machine?SMTPHTTPPOP3IMAP4
Sandy Sharma
2.6k
views
Sandy Sharma
asked
Nov 28, 2018
Computer Networks
computer-networks
application-layer-protocols
+
–
0
votes
0
answers
57
MadeEasy Subject Test 2019: Computer Networks - Application Layer protocols
jatin khachane 1
678
views
jatin khachane 1
asked
Nov 26, 2018
Computer Networks
made-easy-test-series
computer-networks
application-layer-protocols
+
–
0
votes
1
answer
58
#CN SMTP MCQ
Which one of the following protocol is used to receive mail messages? a) smtp b) post office protocol c) internet message access protocol d) all of the mentioned Doubt : Do SMTP also able to receive mail messages?
Which one of the following protocol is used to receive mail messages?a) smtpb) post office protocolc) internet message access protocold) all of the mentioned Doubt : Do S...
iarnav
4.6k
views
iarnav
asked
Nov 25, 2018
Computer Networks
computer-networks
application-layer-protocols
computer-networks
application-layer-protocols
+
–
0
votes
1
answer
59
#CN Application Layer MCQ
Application layer offers _______ service a) End to end b) Process to process c) Both End to end and Process to process d) None of the mentioned
Application layer offers _______ servicea) End to endb) Process to processc) Both End to end and Process to processd) None of the mentioned
iarnav
2.4k
views
iarnav
asked
Nov 25, 2018
Computer Networks
computer-networks
application-layer-protocols
computer-networks
application-layer-protocols
+
–
0
votes
1
answer
60
Application Layer
Is SMTP connection-oriented or connectionless ?
Is SMTP connection-oriented or connectionless ?
Subham Nagar
809
views
Subham Nagar
asked
Nov 13, 2018
Computer Networks
application-layer-protocols
+
–
Page:
« prev
1
2
3
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register