2 Chapter 3
Why is three way handshake used in TCP connection establishment, not two way?
The 3 way handshake is required for a full duplex conversation/connection. Two way is
not enough because the recipient cannot know that the sender knows that
1 Chapter 4
What are the differences between forwarding and routing? Describe their interplay
Routing determines route taken by packets from source to destination utilizing routing
algorithms. Its like the process of planning trip from s
1 Chapter 1
Whats a computer network protocol? List 5 Internet protocols.
A computer network protocol defines the format and the order of messages exchanged
between two or more communicating entities (hardware or software components of
some device such
4 Chapter 4
Assume the following network.
Suppose Hosts A and B are in a multicast group G1.
a) Router R sends out an IGMP query message to find out if there are members of any
multicast group. Identify the values of the following fields in the IGMP qu
2 Chapter 1
What are the four sources of nodal delay? Describe each one in detail.
The four sources of nodal delay are:
Processing delay: The time required to examine the packets header and determine
where to direct the packet. The processing delay in
1 Chapter 3
What is the difference between connectionless demultiplexing and connectionoriented demultiplexing?
With a connectionless demultiplexing, the UDP socket is identified by two-tuple (dest IP
address, dest port number). On the other hand, a con
2 Chapter 4
An organization is given the network address of 184.108.40.206 with subnet mask
255.255.255.0. See below for the binary representation of the network address and the
The organization wants to form five subnets for, one subnet for e
1 Chapter 2
What does application-layer protocol dene?
o An application-layer protocol defines
The types of messages exchanged, such as request messages and response messages.
The syntax of the various message types, such as the fields in the message an
2 Chapter 2
1. We consider the scenario that Alice sends an email to Bob using SMTP and IMAP.
What protocol (SMTP or IMAP) will be used in each stage?
Alice uses her user agent to compose message to firstname.lastname@example.org
Alices user agent sends the messa
3 Chapter 4
P26 on Page 422 of textbook (Edition 6).
Consider the following network. With the indicated link costs, use Dijkstras shortestpath algorithm to compute the shortest path from x to all network nodes. Show how the
algorithm works by computing