Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1) What information is used by a process running on one host to identify a proce

ID: 666350 • Letter: 1

Question

1) What information is used by a process running on one host to identify a process

running on another host? Explain.

2) Why HTTP is said to be a stateless protocol? Explain.

3) DNS is a commonly used service in the Internet. Describe the roles of the local name servers, the authoritative name servers, and the root name servers.

4) List and briefly describe passive and active security attacks.

5) Explain the principal responsibilities of the transport layer and the network layer in detail.

6) Provide a brief, high-level description of how the Internet’s connection-oriented service provides reliable transport.

Explanation / Answer

1. What information is used by a process running on one host to identify a process running on another host? Explain.

Source Port number, destination port number,IP address

2) Why HTTP is said to be a stateless protocol? Explain.

HTTp is a stateless protocol, because each and every commands are executing separately, without any knowledge of the previous commands. so only it is very difficult to implement into websites. It is a hyper text transfer protocol. HTTP request methods are Get, Post, head , Trace, delete, Options and Put. It is a protocol is mainly used to convey information of world wide web.

3) DNS is a commonly used service in the Internet. Describe the roles of the local name servers, the authoritative name servers, and the root name servers.

Root server
these servers are at the base of the name server hierarchy. They are a fixed set of name servers that maintain a list of the master/slave name servers for every registered domain. T

Authoritative server
a master/slave server for a particular domain that has been configured by an administrator with the hostname information for that domain. Information about these servers is added to the root servers when the domain is registered.

Local server
a local name server that only caches information for local clients once it has been retrieved from an authoritative name server. The local server can effectively speed up name queries for the local network by serving up names found by prior queries, preventing a request to the authoritative server for that host's domain


4) List and briefly describe passive and active security attacks.
Passive attack are unauthorized disclosure. It includes trafffic analysis, monitoring of un protected communications.
Active attack are desception, disruption and usurpation. attackers tries to by pass into secured systems through viruses and worms.

5) Explain the principal responsibilities of the transport layer and the network layer in detail.

Transport layer
Creating end to end connection between different network
Error recovery
Flow control
Avoidance of congestion


Network layer

Network routing
Error handling
Logical addressing
Network segmentation and de- segmentation

6) Provide a brief, high-level description of how the Internet’s connection-oriented service provides reliable transport.

TCP provides connection-oriented, reliable communications for Applications that use TCP typically transfer large amounts of data at one time;
TCP is also used for applications that require an acknowledgment for data received, e.g., telnet and ftp.