Internet: Technology, Protocols and Services: Homework Assignment 2
- One of the TCP options permits a receiver to specify the
maximum segment size it is willing to accept. Why does TCP support an
option to specify maximum segment size when it also has a window
advertisement mechanism? (Comer 13.2)
- Lost TCP acknowledgements do not necessarily force
retransmission. Explain why. (Comer 13.4)
- What are the arguments for and against automatically closing
idle TCP connections? (Comer 13.8)
- Describe (abnormal) circumstances that can leave one end of a
connection in state FIN WAIT 2 indefinitely (hint: think of datagram
loss and system crashes). (Comer 13.18)
- Sketch a UDP echo client that sends a datagram to a specified
echo server, awaits a reply and compares it to the original message.
(Comer 19.1)
- When is the listen call important? (Comer 20.3)
- Sketch the socket-related parts of a finger server. Indicate
some of the error conditions that might occur. Assume that the
function call getuserinfo will return the necessary information
from the local system.
- GMD Fokus chose to place the following type A resource record
entry in its domain name server: localhost.fokus.gmd.de
127.0.0.1. Explain what will happen if a remote site tries to
ping a machine with domain name localhost.fokus.gmd.de.
(Comer 22.15)
- Assume that an MUA is located on an NFS server. It can send
encrypted email messages. A corporate spy manages to get an account
on a machine on the local Ethernet and wants to intercept messages
from the MUA, without cracking the encoding. Any suggestions? (Hint:
remember that on an Ethernet, every packet is broadcast. Assume that
the spy has access to the source code of the MUA.)
- In class, we saw a way of spoofing email. How can the receiver
detect (most of) these forgeries?
- What headers should an email mailing list program change or add?
(A mailing list program distributes a single message sent to an email
address to a list of receivers.)
- Why should file transport protocols compute a checksum on the
file data they receive, even when using a reliable end-to-end stream
transfer protocol like TCP? (Comer 24.4)
- What is the chief advantage of using separate TCP connections
for FTP control and data transfer? (Hint: think of abnormal
conditions) (Comer 24.4)
- Would you expect TCP or UDP-based NFS to be faster on a local
network? Reasons? How about a wide-area network?
- Would RPC be suitable for implementing a remote login service?
Why or why not?
- Write an HTML form for buying pizza on the Internet.
- Propose an extension to HTTP that allows the transfer of several
pages in a single TCP connection.
Henning Schulzrinne
Tue May 7 17:31:11 MET DST 1996