Professional Documents
Culture Documents
Q1:-Define Only Five Terms: ARP Application-Layer: (Hatthe A
Q1:-Define Only Five Terms: ARP Application-Layer: (Hatthe A
I , AL IRAQIA UNIVERSITY
COLLEGE OF ENGINEERING
Network ENGINEERING DEPARTMENT
FINAL EXAM 2OL7-2OL8
SECOND ATTEMPT- SEMESTER I
-7'.-
15 Degrees
Q1:- Define only five terms:
HTTP, Content-Length, Stateless protocol, Symmetric key crypto, ARP and Application-Layer
Protocols.
Q4:- An error deteition technique based on cyclic redundancy check (CRC) codes, the received message
information string M(x) ='1011000, and the Generator code C(x) = 1011. Check received
message error or not.
15 Degrees
Q5:- Suppose some user enters this URL: www. . School.edu/Department/home.index (contains text,
refgrencds to 5 jpeg images). Use the non-persistent HTTP method to explain the process.-
(t S ,n-k r)
\ !
I /
I \-- l
-.
,L->.
t
rl
!
I
ivunrsr,{v oF HTGHER EDUcATtoN & sctENTIFtc REsEARcH
AL TRAQIA UNIVERSITY
COLLEGE OF ENGINEERING
I - HTTP defines the structure of these messages and how the client and server exchange the
messages.
2-TheContent-Length: header line indicates the number of bytes in the object being
3- Stateless Protocol: HTTP server maintains no information about the clients, HTTP is said to be
a stateless Protocol.
4- Symmetric key crypto: sender, receiver keys identical public-key crypto: encryption key public,
decryption key secret (Private).
5- ARP: The Address Resolution Protocol (ARP) is a communications protocol used for
discovering the link layer address associated with a given IPv4 address.
6 Application layer: The application layer is responsible for supporting network applications. The
appliiation layer includes many protocols, including HTTP to support the Web, SMTP to support
electronic mail, and FTP to support file transfer.
e2- a) Web servers use cookies for many different purposes, briefly clarified?
,l
1 If a server requires authentication biit doeSh't want to hassle (Disturbance) a user with a
usemame and password prompt every time the user visits the site, it can set a cookie.
2 lf a server wants to remember a usefs preferences so that it can provide targeted
advertisement during subsequent visits, it can set a cookie.
3 If a user is shopping at a site (e.g., buying several CDs), the server can use cookies to keep
track of the items that the user is purchasing, i.e., to create a virtual shopping cart'
g
Q3-
LastByteRead: thre number of the last byte in the data stream read from the bufferby the application
process in B. '
LastByteRcvd - the number of the last byte in the data stream that has arrived from the network and
has been placed in the receive buffer at B. ,, ;
Cannct bebookrnarked
whenserdlrgdata,theGETmerhodadds No re*rktions
datatotheURL; andthe length of a UFI-G
U RL lergth G 2048 cltaraaers!
15a
passrdqrdsor other
3
I
,
t
Q4:-
usodlvlsorO0o0 91
ffi'fiu''*ihbo*
-
Lettmostb'rt:O 0101
Olviso,:0000 -.+0000
r011
t 0l l
0000
no 6flOr
4
a
I
Q5:- Suppose some user enters this URL:. www. School.edu/Department/home.index (contains
text,
references to 5 jpeg images). Use the non-persistent HTTP
-.ihod to explain the process.
time
I
time
6, Steps {-5 repeatedfor
each of 5 jpeg objects
END...
r: oulluo dl ::
SLOZ$te