SlideShare a Scribd company logo
1 of 6
Download to read offline
Review Questions -1
1.Is web server an end system ?
A. There is no difference between a host and an end system. In the internet, all devices are called
hosts and end systems. So, hosts and end systems are used interchangeably. The types of end
systems are PCs, Workstations, Web servers, email servers, PDAs, TVs, Cell Phones, Tablets,
etc
2. which service was invented first place them in order -web, first email
program,Ethernet,TCP/IP
A. 1980: Ethernet standard introduced
1982: TCP/IP protocol suite formalized
1991: World Wide Web (WWW)
1996: Hotmail free web-based e-mail
3. packet switching the store-and-forward feature why?
A. Prior to the deployment of the Internet, computers were connected via a variety of point-to-
point techniques, with many smaller computers using dial-up connections. The UUCP store-and-
forward protocols allowed a message (typically e-mail) to move across the collection of
computers and eventually reach its destination. Late in the 20th century, store and forward
techniques evolved into packet switching which replaced it for most purposes.
4. our internet has a full mesh topology true or false Why?
A.True, A mesh network is a local area network (LAN), wireless local area network (WLAN) or
virtual LAN (VLAN) that employs one of two decentralized connection arrangements: full mesh
topology or partial mesh topology. In a full mesh topology, each network node(workstation or
other device) is connected directly to each of the others. In a partial mesh topology, some nodes
are connected to all the others, but others are only connected to those nodes with which they
exchange the most data.
5. how many types of network delays? What are they?
A. Network delay is an important design and performance characteristic of a computer network
or telecommunications network. All of us want Internet and its services to be able to move as
much data as we want between two end users or hosts, instantaneously and without any loss of
data. Unfortunately, this is just an imaginary perception that is cannot be done in reality. Infact
computer networks necessarily introduce delays between hosts and can actually lose packets.
· Processing delay – time routers take to process the packet header
· Queuing delay – time the packet spends in routing queues
· Transmission delay – time it takes to push the packet's bits onto the link
· Propagation delay – time for a signal to reach its destination
6. what are the difference between transmission and propagation delay?
A. Propagation delay is the time taken by a bit(Mostly MSB ,Here 1) to reach from sender(A) to
receiver(B). Transmission Delay: This is the amount of time required to transmit all of the
packet's bits into the link. Transmission delays are typically on the order of microseconds or less
in practice
Propagation delay is how long it takes one bit to travel from one end of the "wire" to the other
(it's proportional to the length of the wire, crudely).
Transmission delay is how long it takes to get all the bits into the wire in the first place (it's
packet_length/data_rate).
7. Definition of network protocol?
A. A network protocol defines rules and conventions for communication between network
devices. Network protocols include mechanisms for devices to identify and make connections
with each other, as well as formatting rules that specify how data is packaged into messages sent
and received. Some protocols also support message acknowledgement and data compression
designed for reliable and/or high-performance network communication.
8. List five layers of protocols and why do we do layering?
A.Higher layers pass information to lower layers. Each layer adds information called a header to
the data being passed to it. This header contains information the layer needs to perform its job.
We will start at the Application Layer.
the Application layer is where applications requiring network communications live. Examples of
these applications include email clients and web browsers. These applications use the Transport
Layer to send requests to connect to remote hosts.
The Transport layer establishes the connection between applications running the Network layer
to access the TCP/IP network.
The Network layer is responsible for creating the packets that move across the network. It uses
IP addresses to identify the packet’s source and destination.
The Data Link layer is responsible for creating the frames that move across the network. These
frames encapsulate the packets and use MAC addresses to identify the source and destination.
The Physical layer encodes and decodes the bits found in a frame and includes the transceiver
that drives and receives the signals on the network.
Review Questions(2)
1.List at least two ways to access a web page
A. You can access the web page through an Internet service provider, an online service provider,
or a wireless service provider. An Internet service provider (ISP) provides temporary Internet
connections to individuals and companies. An online service provider (OSP) also supplies
Internet access, in addition to a variety of special content and services. A wireless service
provider (WSP) provides wireless Internet access to users with wireless modems or Web-enabled
handheld computers or devices.
2. Difference between get and post?
A. Two commonly used methods for a request-response between a client and server are: GET
and POST.
Some other notes on GET requests:
Some other notes on POST requests:
3.URL consists of which two names
www.clarkson.edu/people/index.html
A. Sub-Domain and Domain Name
The www.clarkson.edu is called sub-domain (www) and domain name (clarkson.edu . They are
unique names that will identify a specific location on your website on the Internet.
4. Using http version 1.1,write two required http headerlines to request above web page
www.clarkson.edu/people/index.html
Host: www. clarkson.edu:80
[blank line here]
5. Describe a Http request format(Header+Body)
A. Request-header: These header fields have applicability only for request messages.
A message body is the one which carries the actual HTTP request data (including form data and
uploaded, etc.) and HTTP response data from the server ( including files, images, etc.). Shown
below is the simple content of a message body:
Solution
Review Questions -1
1.Is web server an end system ?
A. There is no difference between a host and an end system. In the internet, all devices are called
hosts and end systems. So, hosts and end systems are used interchangeably. The types of end
systems are PCs, Workstations, Web servers, email servers, PDAs, TVs, Cell Phones, Tablets,
etc
2. which service was invented first place them in order -web, first email
program,Ethernet,TCP/IP
A. 1980: Ethernet standard introduced
1982: TCP/IP protocol suite formalized
1991: World Wide Web (WWW)
1996: Hotmail free web-based e-mail
3. packet switching the store-and-forward feature why?
A. Prior to the deployment of the Internet, computers were connected via a variety of point-to-
point techniques, with many smaller computers using dial-up connections. The UUCP store-and-
forward protocols allowed a message (typically e-mail) to move across the collection of
computers and eventually reach its destination. Late in the 20th century, store and forward
techniques evolved into packet switching which replaced it for most purposes.
4. our internet has a full mesh topology true or false Why?
A.True, A mesh network is a local area network (LAN), wireless local area network (WLAN) or
virtual LAN (VLAN) that employs one of two decentralized connection arrangements: full mesh
topology or partial mesh topology. In a full mesh topology, each network node(workstation or
other device) is connected directly to each of the others. In a partial mesh topology, some nodes
are connected to all the others, but others are only connected to those nodes with which they
exchange the most data.
5. how many types of network delays? What are they?
A. Network delay is an important design and performance characteristic of a computer network
or telecommunications network. All of us want Internet and its services to be able to move as
much data as we want between two end users or hosts, instantaneously and without any loss of
data. Unfortunately, this is just an imaginary perception that is cannot be done in reality. Infact
computer networks necessarily introduce delays between hosts and can actually lose packets.
· Processing delay – time routers take to process the packet header
· Queuing delay – time the packet spends in routing queues
· Transmission delay – time it takes to push the packet's bits onto the link
· Propagation delay – time for a signal to reach its destination
6. what are the difference between transmission and propagation delay?
A. Propagation delay is the time taken by a bit(Mostly MSB ,Here 1) to reach from sender(A) to
receiver(B). Transmission Delay: This is the amount of time required to transmit all of the
packet's bits into the link. Transmission delays are typically on the order of microseconds or less
in practice
Propagation delay is how long it takes one bit to travel from one end of the "wire" to the other
(it's proportional to the length of the wire, crudely).
Transmission delay is how long it takes to get all the bits into the wire in the first place (it's
packet_length/data_rate).
7. Definition of network protocol?
A. A network protocol defines rules and conventions for communication between network
devices. Network protocols include mechanisms for devices to identify and make connections
with each other, as well as formatting rules that specify how data is packaged into messages sent
and received. Some protocols also support message acknowledgement and data compression
designed for reliable and/or high-performance network communication.
8. List five layers of protocols and why do we do layering?
A.Higher layers pass information to lower layers. Each layer adds information called a header to
the data being passed to it. This header contains information the layer needs to perform its job.
We will start at the Application Layer.
the Application layer is where applications requiring network communications live. Examples of
these applications include email clients and web browsers. These applications use the Transport
Layer to send requests to connect to remote hosts.
The Transport layer establishes the connection between applications running the Network layer
to access the TCP/IP network.
The Network layer is responsible for creating the packets that move across the network. It uses
IP addresses to identify the packet’s source and destination.
The Data Link layer is responsible for creating the frames that move across the network. These
frames encapsulate the packets and use MAC addresses to identify the source and destination.
The Physical layer encodes and decodes the bits found in a frame and includes the transceiver
that drives and receives the signals on the network.
Review Questions(2)
1.List at least two ways to access a web page
A. You can access the web page through an Internet service provider, an online service provider,
or a wireless service provider. An Internet service provider (ISP) provides temporary Internet
connections to individuals and companies. An online service provider (OSP) also supplies
Internet access, in addition to a variety of special content and services. A wireless service
provider (WSP) provides wireless Internet access to users with wireless modems or Web-enabled
handheld computers or devices.
2. Difference between get and post?
A. Two commonly used methods for a request-response between a client and server are: GET
and POST.
Some other notes on GET requests:
Some other notes on POST requests:
3.URL consists of which two names
www.clarkson.edu/people/index.html
A. Sub-Domain and Domain Name
The www.clarkson.edu is called sub-domain (www) and domain name (clarkson.edu . They are
unique names that will identify a specific location on your website on the Internet.
4. Using http version 1.1,write two required http headerlines to request above web page
www.clarkson.edu/people/index.html
Host: www. clarkson.edu:80
[blank line here]
5. Describe a Http request format(Header+Body)
A. Request-header: These header fields have applicability only for request messages.
A message body is the one which carries the actual HTTP request data (including form data and
uploaded, etc.) and HTTP response data from the server ( including files, images, etc.). Shown
below is the simple content of a message body:

More Related Content

Similar to Review Questions -11.Is web server an end system A. There is no.pdf

Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Ch1 2ed 29_dec03
Ch1 2ed 29_dec03
Sugan Nalla
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
kchanaka3
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
ashrawi92
 
Networking Related
Networking RelatedNetworking Related
Networking Related
ZunAib Ali
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networks
farhan516
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Gaurav Mehndiratta
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
Renee Jones
 

Similar to Review Questions -11.Is web server an end system A. There is no.pdf (20)

Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Computer network
Computer networkComputer network
Computer network
 
Computer network
Computer networkComputer network
Computer network
 
Ch1 2ed 29_dec03
Ch1 2ed 29_dec03Ch1 2ed 29_dec03
Ch1 2ed 29_dec03
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
Networking Related
Networking RelatedNetworking Related
Networking Related
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networks
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
 
information technology
information technologyinformation technology
information technology
 
information technology
information technologyinformation technology
information technology
 

More from anjanaarts2014

A robust whistleblowing regime is now an integral part of governance.pdf
A robust whistleblowing regime is now an integral part of governance.pdfA robust whistleblowing regime is now an integral part of governance.pdf
A robust whistleblowing regime is now an integral part of governance.pdf
anjanaarts2014
 
1. In higher parts of the reef, where the wave energy is high, the c.pdf
1. In higher parts of the reef, where the wave energy is high, the c.pdf1. In higher parts of the reef, where the wave energy is high, the c.pdf
1. In higher parts of the reef, where the wave energy is high, the c.pdf
anjanaarts2014
 
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
anjanaarts2014
 
HClO3 + NaOH NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf
                     HClO3 + NaOH  NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf                     HClO3 + NaOH  NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf
HClO3 + NaOH NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf
anjanaarts2014
 
NaCl Its the coulombic interaction between Na.pdf
                     NaCl  Its the coulombic interaction between Na.pdf                     NaCl  Its the coulombic interaction between Na.pdf
NaCl Its the coulombic interaction between Na.pdf
anjanaarts2014
 
Here Jupiter is the fifth planet from the Sun a.pdf
                     Here  Jupiter is the fifth planet from the Sun a.pdf                     Here  Jupiter is the fifth planet from the Sun a.pdf
Here Jupiter is the fifth planet from the Sun a.pdf
anjanaarts2014
 
a.Times Interest Earned Ratio = EBIT interest ExpenseFor 2014.pdf
a.Times Interest Earned Ratio = EBIT  interest ExpenseFor 2014.pdfa.Times Interest Earned Ratio = EBIT  interest ExpenseFor 2014.pdf
a.Times Interest Earned Ratio = EBIT interest ExpenseFor 2014.pdf
anjanaarts2014
 
the bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdf
the bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdfthe bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdf
the bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdf
anjanaarts2014
 

More from anjanaarts2014 (20)

A robust whistleblowing regime is now an integral part of governance.pdf
A robust whistleblowing regime is now an integral part of governance.pdfA robust whistleblowing regime is now an integral part of governance.pdf
A robust whistleblowing regime is now an integral part of governance.pdf
 
1. In higher parts of the reef, where the wave energy is high, the c.pdf
1. In higher parts of the reef, where the wave energy is high, the c.pdf1. In higher parts of the reef, where the wave energy is high, the c.pdf
1. In higher parts of the reef, where the wave energy is high, the c.pdf
 
a)dydx + 2yx = xI.F. = x^2solution iy .pdf
a)dydx + 2yx = xI.F. = x^2solution iy .pdfa)dydx + 2yx = xI.F. = x^2solution iy .pdf
a)dydx + 2yx = xI.F. = x^2solution iy .pdf
 
23.C. 1 in 424. B. Homozygous25. B. 5026.All females will be .pdf
23.C. 1 in 424. B. Homozygous25. B. 5026.All females will be .pdf23.C. 1 in 424. B. Homozygous25. B. 5026.All females will be .pdf
23.C. 1 in 424. B. Homozygous25. B. 5026.All females will be .pdf
 
A is correct. The ntp server 10.0.0.5 command is entered in Global C.pdf
A is correct. The ntp server 10.0.0.5 command is entered in Global C.pdfA is correct. The ntp server 10.0.0.5 command is entered in Global C.pdf
A is correct. The ntp server 10.0.0.5 command is entered in Global C.pdf
 
A. Gene expression.B. Transcription factor.C. Gene expression..pdf
A. Gene expression.B. Transcription factor.C. Gene expression..pdfA. Gene expression.B. Transcription factor.C. Gene expression..pdf
A. Gene expression.B. Transcription factor.C. Gene expression..pdf
 
All are capable to grow in lactose medium . In presence of lactose t.pdf
All are capable to grow in lactose medium . In presence of lactose t.pdfAll are capable to grow in lactose medium . In presence of lactose t.pdf
All are capable to grow in lactose medium . In presence of lactose t.pdf
 
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
 
HClO3 + NaOH NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf
                     HClO3 + NaOH  NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf                     HClO3 + NaOH  NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf
HClO3 + NaOH NaClO3 +H2O n(HClO3) = 0.10.04 = 4.pdf
 
The -OCl ion. .pdf
                     The -OCl ion.                                    .pdf                     The -OCl ion.                                    .pdf
The -OCl ion. .pdf
 
I have already answered it. Check. .pdf
                     I have already answered it. Check.               .pdf                     I have already answered it. Check.               .pdf
I have already answered it. Check. .pdf
 
Iodide is a strong nucleophile but a weak base, s.pdf
                     Iodide is a strong nucleophile but a weak base, s.pdf                     Iodide is a strong nucleophile but a weak base, s.pdf
Iodide is a strong nucleophile but a weak base, s.pdf
 
NaCl Its the coulombic interaction between Na.pdf
                     NaCl  Its the coulombic interaction between Na.pdf                     NaCl  Its the coulombic interaction between Na.pdf
NaCl Its the coulombic interaction between Na.pdf
 
Here Jupiter is the fifth planet from the Sun a.pdf
                     Here  Jupiter is the fifth planet from the Sun a.pdf                     Here  Jupiter is the fifth planet from the Sun a.pdf
Here Jupiter is the fifth planet from the Sun a.pdf
 
moles of H+ = 42.0 x 0.120 millimoles = 5.04 mill.pdf
                     moles of H+ = 42.0 x 0.120 millimoles = 5.04 mill.pdf                     moles of H+ = 42.0 x 0.120 millimoles = 5.04 mill.pdf
moles of H+ = 42.0 x 0.120 millimoles = 5.04 mill.pdf
 
Lithium is group 1 metal, while nitrogen is group.pdf
                     Lithium is group 1 metal, while nitrogen is group.pdf                     Lithium is group 1 metal, while nitrogen is group.pdf
Lithium is group 1 metal, while nitrogen is group.pdf
 
there is some special character in ur question li.pdf
                     there is some special character in ur question li.pdf                     there is some special character in ur question li.pdf
there is some special character in ur question li.pdf
 
a.Times Interest Earned Ratio = EBIT interest ExpenseFor 2014.pdf
a.Times Interest Earned Ratio = EBIT  interest ExpenseFor 2014.pdfa.Times Interest Earned Ratio = EBIT  interest ExpenseFor 2014.pdf
a.Times Interest Earned Ratio = EBIT interest ExpenseFor 2014.pdf
 
45 yrs.Solution45 yrs..pdf
45 yrs.Solution45 yrs..pdf45 yrs.Solution45 yrs..pdf
45 yrs.Solution45 yrs..pdf
 
the bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdf
the bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdfthe bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdf
the bacteria isolated from the dead mouse is smooth (S) S. pneumonia.pdf
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

Review Questions -11.Is web server an end system A. There is no.pdf

  • 1. Review Questions -1 1.Is web server an end system ? A. There is no difference between a host and an end system. In the internet, all devices are called hosts and end systems. So, hosts and end systems are used interchangeably. The types of end systems are PCs, Workstations, Web servers, email servers, PDAs, TVs, Cell Phones, Tablets, etc 2. which service was invented first place them in order -web, first email program,Ethernet,TCP/IP A. 1980: Ethernet standard introduced 1982: TCP/IP protocol suite formalized 1991: World Wide Web (WWW) 1996: Hotmail free web-based e-mail 3. packet switching the store-and-forward feature why? A. Prior to the deployment of the Internet, computers were connected via a variety of point-to- point techniques, with many smaller computers using dial-up connections. The UUCP store-and- forward protocols allowed a message (typically e-mail) to move across the collection of computers and eventually reach its destination. Late in the 20th century, store and forward techniques evolved into packet switching which replaced it for most purposes. 4. our internet has a full mesh topology true or false Why? A.True, A mesh network is a local area network (LAN), wireless local area network (WLAN) or virtual LAN (VLAN) that employs one of two decentralized connection arrangements: full mesh topology or partial mesh topology. In a full mesh topology, each network node(workstation or other device) is connected directly to each of the others. In a partial mesh topology, some nodes are connected to all the others, but others are only connected to those nodes with which they exchange the most data. 5. how many types of network delays? What are they? A. Network delay is an important design and performance characteristic of a computer network or telecommunications network. All of us want Internet and its services to be able to move as much data as we want between two end users or hosts, instantaneously and without any loss of data. Unfortunately, this is just an imaginary perception that is cannot be done in reality. Infact computer networks necessarily introduce delays between hosts and can actually lose packets. · Processing delay – time routers take to process the packet header · Queuing delay – time the packet spends in routing queues · Transmission delay – time it takes to push the packet's bits onto the link · Propagation delay – time for a signal to reach its destination
  • 2. 6. what are the difference between transmission and propagation delay? A. Propagation delay is the time taken by a bit(Mostly MSB ,Here 1) to reach from sender(A) to receiver(B). Transmission Delay: This is the amount of time required to transmit all of the packet's bits into the link. Transmission delays are typically on the order of microseconds or less in practice Propagation delay is how long it takes one bit to travel from one end of the "wire" to the other (it's proportional to the length of the wire, crudely). Transmission delay is how long it takes to get all the bits into the wire in the first place (it's packet_length/data_rate). 7. Definition of network protocol? A. A network protocol defines rules and conventions for communication between network devices. Network protocols include mechanisms for devices to identify and make connections with each other, as well as formatting rules that specify how data is packaged into messages sent and received. Some protocols also support message acknowledgement and data compression designed for reliable and/or high-performance network communication. 8. List five layers of protocols and why do we do layering? A.Higher layers pass information to lower layers. Each layer adds information called a header to the data being passed to it. This header contains information the layer needs to perform its job. We will start at the Application Layer. the Application layer is where applications requiring network communications live. Examples of these applications include email clients and web browsers. These applications use the Transport Layer to send requests to connect to remote hosts. The Transport layer establishes the connection between applications running the Network layer to access the TCP/IP network. The Network layer is responsible for creating the packets that move across the network. It uses IP addresses to identify the packet’s source and destination. The Data Link layer is responsible for creating the frames that move across the network. These frames encapsulate the packets and use MAC addresses to identify the source and destination. The Physical layer encodes and decodes the bits found in a frame and includes the transceiver that drives and receives the signals on the network. Review Questions(2) 1.List at least two ways to access a web page A. You can access the web page through an Internet service provider, an online service provider, or a wireless service provider. An Internet service provider (ISP) provides temporary Internet connections to individuals and companies. An online service provider (OSP) also supplies Internet access, in addition to a variety of special content and services. A wireless service
  • 3. provider (WSP) provides wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices. 2. Difference between get and post? A. Two commonly used methods for a request-response between a client and server are: GET and POST. Some other notes on GET requests: Some other notes on POST requests: 3.URL consists of which two names www.clarkson.edu/people/index.html A. Sub-Domain and Domain Name The www.clarkson.edu is called sub-domain (www) and domain name (clarkson.edu . They are unique names that will identify a specific location on your website on the Internet. 4. Using http version 1.1,write two required http headerlines to request above web page www.clarkson.edu/people/index.html Host: www. clarkson.edu:80 [blank line here] 5. Describe a Http request format(Header+Body) A. Request-header: These header fields have applicability only for request messages. A message body is the one which carries the actual HTTP request data (including form data and uploaded, etc.) and HTTP response data from the server ( including files, images, etc.). Shown below is the simple content of a message body: Solution Review Questions -1 1.Is web server an end system ? A. There is no difference between a host and an end system. In the internet, all devices are called hosts and end systems. So, hosts and end systems are used interchangeably. The types of end systems are PCs, Workstations, Web servers, email servers, PDAs, TVs, Cell Phones, Tablets, etc 2. which service was invented first place them in order -web, first email program,Ethernet,TCP/IP A. 1980: Ethernet standard introduced 1982: TCP/IP protocol suite formalized 1991: World Wide Web (WWW)
  • 4. 1996: Hotmail free web-based e-mail 3. packet switching the store-and-forward feature why? A. Prior to the deployment of the Internet, computers were connected via a variety of point-to- point techniques, with many smaller computers using dial-up connections. The UUCP store-and- forward protocols allowed a message (typically e-mail) to move across the collection of computers and eventually reach its destination. Late in the 20th century, store and forward techniques evolved into packet switching which replaced it for most purposes. 4. our internet has a full mesh topology true or false Why? A.True, A mesh network is a local area network (LAN), wireless local area network (WLAN) or virtual LAN (VLAN) that employs one of two decentralized connection arrangements: full mesh topology or partial mesh topology. In a full mesh topology, each network node(workstation or other device) is connected directly to each of the others. In a partial mesh topology, some nodes are connected to all the others, but others are only connected to those nodes with which they exchange the most data. 5. how many types of network delays? What are they? A. Network delay is an important design and performance characteristic of a computer network or telecommunications network. All of us want Internet and its services to be able to move as much data as we want between two end users or hosts, instantaneously and without any loss of data. Unfortunately, this is just an imaginary perception that is cannot be done in reality. Infact computer networks necessarily introduce delays between hosts and can actually lose packets. · Processing delay – time routers take to process the packet header · Queuing delay – time the packet spends in routing queues · Transmission delay – time it takes to push the packet's bits onto the link · Propagation delay – time for a signal to reach its destination 6. what are the difference between transmission and propagation delay? A. Propagation delay is the time taken by a bit(Mostly MSB ,Here 1) to reach from sender(A) to receiver(B). Transmission Delay: This is the amount of time required to transmit all of the packet's bits into the link. Transmission delays are typically on the order of microseconds or less in practice Propagation delay is how long it takes one bit to travel from one end of the "wire" to the other (it's proportional to the length of the wire, crudely). Transmission delay is how long it takes to get all the bits into the wire in the first place (it's packet_length/data_rate). 7. Definition of network protocol? A. A network protocol defines rules and conventions for communication between network devices. Network protocols include mechanisms for devices to identify and make connections
  • 5. with each other, as well as formatting rules that specify how data is packaged into messages sent and received. Some protocols also support message acknowledgement and data compression designed for reliable and/or high-performance network communication. 8. List five layers of protocols and why do we do layering? A.Higher layers pass information to lower layers. Each layer adds information called a header to the data being passed to it. This header contains information the layer needs to perform its job. We will start at the Application Layer. the Application layer is where applications requiring network communications live. Examples of these applications include email clients and web browsers. These applications use the Transport Layer to send requests to connect to remote hosts. The Transport layer establishes the connection between applications running the Network layer to access the TCP/IP network. The Network layer is responsible for creating the packets that move across the network. It uses IP addresses to identify the packet’s source and destination. The Data Link layer is responsible for creating the frames that move across the network. These frames encapsulate the packets and use MAC addresses to identify the source and destination. The Physical layer encodes and decodes the bits found in a frame and includes the transceiver that drives and receives the signals on the network. Review Questions(2) 1.List at least two ways to access a web page A. You can access the web page through an Internet service provider, an online service provider, or a wireless service provider. An Internet service provider (ISP) provides temporary Internet connections to individuals and companies. An online service provider (OSP) also supplies Internet access, in addition to a variety of special content and services. A wireless service provider (WSP) provides wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices. 2. Difference between get and post? A. Two commonly used methods for a request-response between a client and server are: GET and POST. Some other notes on GET requests: Some other notes on POST requests: 3.URL consists of which two names www.clarkson.edu/people/index.html A. Sub-Domain and Domain Name The www.clarkson.edu is called sub-domain (www) and domain name (clarkson.edu . They are unique names that will identify a specific location on your website on the Internet.
  • 6. 4. Using http version 1.1,write two required http headerlines to request above web page www.clarkson.edu/people/index.html Host: www. clarkson.edu:80 [blank line here] 5. Describe a Http request format(Header+Body) A. Request-header: These header fields have applicability only for request messages. A message body is the one which carries the actual HTTP request data (including form data and uploaded, etc.) and HTTP response data from the server ( including files, images, etc.). Shown below is the simple content of a message body: