Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

COLLEGE OF ENGINEERING & TECHNOLOGY

Department : Computer Engineering


Lecturer : Dr. Hassan Abounaser
Assoc. Teacher : Eng. Ahmed Zakaria
Course Title : Computer Networks
Course Code : CC431
Date : Fall 2017-2018

Sheet (2): APPLICATION LAYER


1. List five nonproprietary Internet applications and the application-layer protocols that they
use.
2. What is the difference between network architecture and application architecture?
3. For a communication session between a pair of processes, which process is the client and
which is the server?
4. What information is used by a process running on one host to identify a process running
on another host?
5. Why do HTTP, FTP, SMTP, and POP3 run on top of TCP rather than on UDP?
6. Explain the differences between Persistent and non-persistent HTTP.
7. Consider an HTTP client that wants to retrieve a Web document at a given URL. The IP
address of the HTTP server is initially unknown. What transport and application-layer
protocols beside HTTP are needed in this scenario?

8. GET / CS 453/ index.html HTTP/1.1 <cr><lf>Host: gaia.cs.umass.edu<cr><lf>User-


Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US;rv:1.7.2)Gecko/20040804
Netscape/7.2(ax)<cr><lf>Accepttext/xml,application/xml,application/xhtml+xml,
text/html; q=0.9, text/plain; q=0.8,image/png, */*;q=0.5 <cr><lf> Accept-Language: en-
us,en;q=0.5<cr><lf> Accept-Encoding: gzip,deflate <cr><lf> Accept-Charset: ISO-8859-
1,utf-8;q=0.7,*;q=0.7 <cr><lf> Keep-Alive: 300 <cr><lf> Connection: keep-alive
<cr><lf><cr><lf>
a. What is the URL of the document requested by the browser?
b. What version of HTTP is the browser running?
c. Does the browser request a non-persistent or a persistent connection?
d. What is the IP address of the host on which the browser is running?

9. HTTP/1.1 200 OK <cr><lf>Date: Thu, 07 Mar 2006 12:39:45GMT


<cr><lf>Server:Apache/2.0.52 (Fedora) <cr><lf> Last-Modified: sat, 10 Jun
200518:27:46GMT<cr><lf>ETag:"526c3-f22-a88a4c80"Accept-Ranges:bytes<cr><lf>
Content-Length:3874<cr><lf>Keep-Alive:timeout=10, max=100 <cr><lf> Connection:
Keep-Alive:timeout=max=100 <cr><lf> Content-Type: text/html; charset=ISO-8859-
1<cr><lf> <cr><lf><!doctype html public “-//w3c//dtd html 4.0
transitional//en><lf><lf><head><lf> <meta http-equiv=”content-type” content=
text/html; charset=ISO-8859-1<lf> <meta name= “GENERATOR” content=”
Mozilla/4.79 [en] [Windows NT 5.0; U) Netscape]”><lf> <title>CMPSCI 453/ 591
/NTU-ST550A Spring 2005 homepage </tite ><lf> </head><lf>
a. Was the server able to successfully find the document or not? What time was the
document reply provided?

Page 1/5
b. When the document was last modified?
c. How many bytes are there in the document being returned?
d. What are the first 5 bytes of the document being returned? Did the server agree to
a persistent connection?

10. Suppose the total amount of time to get the IP address of a web page is X and let the RTT
between the local host and the server containing the object is RTT0. Now suppose the
page contains three objects. Neglecting transmission times, how much time elapses with
a. Non-persistent HTTP
b. Persistent HTTP

11. Consider a network path between a browser and server. If the propagation delay between
the client and the server is 150 msec, and assume the response time in case non-persistent
HTTP connections is 6.001 sec. Solve the following:
a. Find number of objects in the requested file.
b. Assume persistent HTTP connections, what is the response time?

12. Consider an e-commerce site that wants to keep a purchase record for each of its
customers. Describe how this can be done with cookies.
13. Describe how Web caching can reduce the delay in receiving a requested object. Will
Web caching reduce the delay for all objects requested by a user or for only some of the
objects? Why?
14. Consider the figure below, for which there is an institutional network connected to the
Internet. Suppose that the average object size is 850,000 bits and that the average request
rate from the institution’s browsers to the origin servers is 16 requests per second. Also
suppose that the amount of time it takes from when the router on the Internet side of the
access link forwards an HTTP request until it receives the response is three seconds on
average. Model the total average response time as the sum of the average access delay
(that is, the delay from Internet router to institution router) and the average Internet delay.
For the average access delay, use ∆/(1 – ∆β), where ∆ is the average time required to send
an object over the access link and β is the arrival rate of objects to the access link.
a. Find the total average response time.
b. Now suppose a cache is installed in the institutional LAN. Suppose the miss rate
is 0.4. Find the total response time.

Page 2/5
15. For the network shown below, calculate the difference between the average delay for the
following two cases:
a. If no Cache (i.e., no proxy) is used, and average object size is 100,000 bits,
average request rate from institution browsers to servers 100/sec, and delay from
institution routers to servers and back is 2 sec.
b. Same as above, but a proxy is used, where the hit rate is 40% (i.e., 40% of the
requests are being satisfied by the proxy).
(Hint: consider large queuing delay to be 20sec and small queuing delay to be 0.1 sec).

public

Internet

1.5 Mbps

institutional Access link


10 Mbps LAN
network

16. Solve the previous problem but to calculate the saving in time between the two cases
using the following values instead:
 Access Link bandwidth = RLink = 1.5Mbps
 LAN bandwidth = RLAN = 10Mbps
 average object size = L = 100,000bits
 average request rate = a = 40 packets/sec
 Internet delay = dInternet = 1 sec
 Proxy hit rate = h = 50%
(Hint: consider large queuing delay to be 60sec and small queuing delay to be 1sec)
17. Why is it said that FTP sends control information “out-of-band”?
18. How does SMTP differ from HTTP in terms of data format?
19. The figure below shows a mail server with three user agents. Answer the following

Page 3/5
questions:
a. The user agent can be a program that can be installed on the computer, or a web
based interface that can be accessed using a normal web browser. What is the
difference between the two?
b. What is the protocol name that the user agent uses to retrieve messages from the
mail server?
c. What is the protocol name that the mail server uses to send the messages to the
other mail servers?

20. From user’s perspective, what is the difference between the download-and-delete mode
and the download-and-keep mode in POP3?
21. What is the primary advantage of IMAP over POP3?
22. Consider accessing your email with POP3:
a. Suppose you have configured your pop mail client to operate in download-and-
delete mode. Complete the following transaction.

C: list
S: 1 498
S: 2 912
S: .
C: retr 1
S: blah blah …
S: ……….blah
S: .
?

b. Suppose you have configured your POP mail client to operate in the download-
and-keep mode. Complete the following transaction.

C: list
S: 1 498
S: 2 912
S: .
C: retr 1
S: blah blah …
S: ……….blah
S: .
?

c. Suppose you have configured your POP mail client to operate in the download-
and-keep mode. Using your transcript in part (b), suppose you retrieve messages 1
and 2, exit POP and then five minutes later you again access POP to retrieve new
email. Suppose that in the five-minute interval no new messages have been sent to
you. Provide a transcript of this second POP session.

Page 4/5
23. List at least four different applications that are naturally suitable for P2P architectures.
(Hint: File distribution and instant messaging are two.)
24. For the network shown below, assume the following values:
 Server upload bandwidth us=100bps.
 Peer1 & Peer2 upload/download bandwidths are 40/50 bps respectively.
 Peer3 upload/download bandwidths are 20/25 bps respectively.
Calculate how much time to distribute a file of size F=500Kbits from one server to the 3
peers in each of the following scenarios:
a. Client to server system
b. Peer to peer system
c. In case of increasing the number of peers to 10, comment on the efficiency for
part (a) and part (b) assuming all upload/download bandwidths are 40/50 bps
respectively.

25. Consider a new peer Alice who joins BitTorrent without processing any chunks. Without
any chunks, she cannot become a top-four uploader for any of the other peers, since she
has nothing to upload. How then will Alice get her first chunk?

GOOD LUCK ☺!

Page 5/5

You might also like