What are the important parameters and settings of a network router or a switch, which we need to be set correctly?

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
  1. What are the important parameters and settings of a network router or a switch, which we need to be set correctly?

  2. Describe the structure of the router routing table and the structure of the individual entries?

  3. A large law firm, which has many employees, provides a single email address for each employee. Each employee’s email address is <login>@lawfirm.com. However, the firm did not explicitly define the format of the login. Thus, some employees use their first names as their login names, some use their last names, some use their initials, etc. The firm now wishes to make a fixed format, for example:

       firstname.lastname@lawfirm.com,
that can be used for the email addresses of all its employees. How can    this be done without rocking the boat too much?

4. Suppose that John just set up an auto-forwarding mechanism on his work email address, which receives all of his business-related emails, to forward them to his personal email address, which he shares with his wife. John’s wife was unaware of this, and activated a vacation agent on their personal account. Because John forwarded his email, he did not set up a vacation daemon on his work machine. What happens when an email is received at John’s work email address?

5. In any standard, such as RFC 5322, a precise grammar of what is allowed is needed so that different implementations can interwork. Even simple items have to be defined carefully. The SMTP headers allow white space between the tokens. Give two plausible alternative definitions of white space between tokens

6. Is the vacation agent part of the user agent or the message transfer agent? Of course, it is set up using the user agent, but does the user agent actually send the replies? Explain your answer.

7. Does Webmail use POP3, IMAP, or neither? If one of these, why was that one chosen? If neither, which one is it closer to in spirit?

8. Is it possible that when a user clicks on a link with Firefox, a particular helper is started, but clicking on the same link in Internet Explorer causes a completely different helper to be started, even though the MIME type returned in both cases is identical? Explain your answer.

9. Sloth Bank wants to make online banking easy for its lazy customers, so after a customer signs up and is authenticated by a password, the bank returns a cookie containing a customer ID number. In this way, the customer does not have to identify himself or type a password on future visits to the online bank. What do you think of this idea? Will it work? Is it a good idea?

10. Does it make sense for a single ISP to function as a CDN? If so, how would that work? If not, what is wrong with the idea?

11. Describe the structure of the domain name system and the process of name resolution?

12. Describe the process of sending and receiving emails! What are the protocols required for each process to work?

Assignment Questions
1. What are the important parameters and settings of a network router or a switch, which we need
to be set correctly?
2. Describe the structure of the router routing table and the structure of the individual entries?
3. A large law firm, which has many employees, provides a single email address for each employee.
Each employee's email address is <login>@lawfirm.com. However, the firm did not explicitly
define the format of the login. Thus, some employees use their first names as their login names,
some use their last names, some use their initials, etc. The firm now wishes to make a fixed
format, for example:
firstname.lastname@lawfirm.com,
that can be used for the email addresses of all its employees. How can this be done without
rocking the boat too much?
4. Suppose that John just set up an auto-forwarding mechanism on his work email address, which
receives all of his business-related emails, to forward them to his personal email address, which
he shares with his wife. John's wife was unaware of this, and activated a vacation agent on their
personal account. Because John forwarded his email, he did not set up a vacation daemon on his
work machine. What happens when an email is received at John's work email address?
5. In any standard, such as RFC 5322, a precise grammar of what is allowed is needed so that
different implementations can interwork. Even simple items have to be defined carefully. The
SMTP headers allow white space between the tokens. Give two plausible alternative definitions
of
white
space
between
tokens
6. Is the vacation agent part of the user agent or the message transfer agent? Of course, it is set up
using the user agent, but does the user agent actually send the replies? Explain your answer.
7. Does Webmail use POP3, IMAP, or neither? If one of these, why was that one chosen? If neither,
which
one
is
it
closer
to
in
spirit?
8. Is it possible that when a user clicks on a link with Firefox, a particular helper is started, but
clicking on the same link in Internet Explorer causes a completely different helper to be started,
even though the MIME type returned in both cases is identical? Explain your answer.
9. Sloth Bank wants to make online banking easy for its lazy customers, so after a customer signs
up and is authenticated by a password, the bank returns a cookie containing a customer ID
number. In this way, the customer does not have to identify himself or type a password on future
visits to the online bank. What do you think of this idea? Will it work? Is it a good idea?
10. Does it make sense for a single ISP to function as a CDN? If so, how would that work? If not, what
is wrong with the idea?
11. Describe the structure of the domain name system and the process of name resolution?
12. Describe the process of sending and receiving emails! What are the protocols required for each
process to work?
Transcribed Image Text:Assignment Questions 1. What are the important parameters and settings of a network router or a switch, which we need to be set correctly? 2. Describe the structure of the router routing table and the structure of the individual entries? 3. A large law firm, which has many employees, provides a single email address for each employee. Each employee's email address is <login>@lawfirm.com. However, the firm did not explicitly define the format of the login. Thus, some employees use their first names as their login names, some use their last names, some use their initials, etc. The firm now wishes to make a fixed format, for example: firstname.lastname@lawfirm.com, that can be used for the email addresses of all its employees. How can this be done without rocking the boat too much? 4. Suppose that John just set up an auto-forwarding mechanism on his work email address, which receives all of his business-related emails, to forward them to his personal email address, which he shares with his wife. John's wife was unaware of this, and activated a vacation agent on their personal account. Because John forwarded his email, he did not set up a vacation daemon on his work machine. What happens when an email is received at John's work email address? 5. In any standard, such as RFC 5322, a precise grammar of what is allowed is needed so that different implementations can interwork. Even simple items have to be defined carefully. The SMTP headers allow white space between the tokens. Give two plausible alternative definitions of white space between tokens 6. Is the vacation agent part of the user agent or the message transfer agent? Of course, it is set up using the user agent, but does the user agent actually send the replies? Explain your answer. 7. Does Webmail use POP3, IMAP, or neither? If one of these, why was that one chosen? If neither, which one is it closer to in spirit? 8. Is it possible that when a user clicks on a link with Firefox, a particular helper is started, but clicking on the same link in Internet Explorer causes a completely different helper to be started, even though the MIME type returned in both cases is identical? Explain your answer. 9. Sloth Bank wants to make online banking easy for its lazy customers, so after a customer signs up and is authenticated by a password, the bank returns a cookie containing a customer ID number. In this way, the customer does not have to identify himself or type a password on future visits to the online bank. What do you think of this idea? Will it work? Is it a good idea? 10. Does it make sense for a single ISP to function as a CDN? If so, how would that work? If not, what is wrong with the idea? 11. Describe the structure of the domain name system and the process of name resolution? 12. Describe the process of sending and receiving emails! What are the protocols required for each process to work?
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY