Computer Networks - Chapter 2 - Application Layer
Computer Networks - Chapter 2 - Application Layer
of CSE, UIU
CHAPTER 2
Application Layer
Knowledge Test # 1
Q.1 Write down 3 (Three) distinct differences between Client-server and Peer-to-peer architecture.
Client-Server Peer-to-peer
Q.2 What information is used by a process running on one host to identify a process running on
another host?
Q.3 Suppose you wanted to do a transaction from a remote client to a server as fast as possible.
Would you use UDP or TCP? Why?
Q.4 List the four broad classes of services that a transport protocol can provide. For each of the
service classes, indicate if either UDP or TCP (or both) provides such a service. (Hints: Data loss,
Timing, Bandwidth and Security)
Q.5 What are the four things defined in an application layer protocol?
Exercise 1: Suppose, a client (web browser) requests an html file, which contains 8 .jpg images
and 2 .mov video files. How many requests will be sent by the browser? Which one of i) non-
persistent and ii) persistent HTTP will take less time to transfer the files. Why?
Knowledge Test # 2
Q.1 True or false?
a. A user requests a Web page that consists of some text and three images. For this page, the client will send
one request message and receive four response messages.
b. Two distinct Web pages (for example, www.mit.edu/research.html and www.mit.edu/students. html) can
be sent over the same persistent connection.
c. With non-persistent connections between browser and origin server, it is possible for a single TCP
segment to carry two distinct HTTP request messages.
d. The Date: header in the HTTP response message indicates when the object in the response was last
modified.
e. HTTP response messages never have an empty message body.
Q.2 What are the message types in HTTP? Describe different fields of the messages.
Exercise 2: Suppose Alice, with a Web-based e-mail account (such as Hotmail or gmail), sends a
message to Bob, who accesses his mail from his mail server using POP3. Discuss how the
message gets from Alice's host to Bob's host. Be sure to list the series of application-layer
protocols that are used to move the message between the two hosts. From a user's perspective,
what is the difference between the download-and-delete mode and the download-and-keep
mode in POP3?
Exercise 3:
Figure on the left shows how Bob and Alice can
communicate to each other through email. Suppose
SMTP is used for the email transfer. Bob has sent Alice
an email. We know that Alice has not checked this mail
(assume Alice’s PC is off till now). Where is this email
currently stored?
i. Email Server 1 ii. Email Server 2
iii. Email Server 1 or 2 iv. Bob’s PC
© 2017 – Mohammad MamunElahi Page 6 of 9
Study Guide & Workbook – CSE 323 – Computer Networks Dept. of CSE, UIU
DNS hierarchy
Exercise 4: Draw a diagram (containing different types/levels of DNS servers) to show the steps
of an iterated query for a DNS request (Suppose there is no DNS cache) to get the name-to-IP-
address mapping from a client PC connected to Internet.
DNS records
Exercise 5: Suppose you have a Host C, a local name server L, and authoritative name servers
Aroot, Acom, and Agoogle.com, where the naming convention Ax means that the name server
knows about the name zone x. Ax is a variable and NOT a hostname. Aroot is a root name server
known to L, with IP address 198.41.0.4. Assume that all name servers initially have nothing in their
caches.
a) Using the resource records below, provide the hostnames and IP addresses for Acom and
Agoogle.com
b) List the sequence of DNS queries and corresponding resource records that are exchanged
when C wants to lookup the address for www.google.com. When a name server Ax contacts Ay, please
specify the IP address for Ay. The following represents the level of detail we are looking for:
i) Ax contacts Ay at 1.2.3.4 to resolve www.foobar.com
ii) Ay returns resource records R1, R2, : : : , Rn.
c) Client C performs a lookup for mail.google.com immediately after the previous request. Assume
all records have long TTLs. List the sequence of DNS queries and corresponding resource records
exchanged during the lookup.
Knowledge Test # 3
Q.1 What are the 3 (Three) main components of an E-mail system? Describe the steps how an e-
mail system works.
Q.2 What are the protocols used as mail forwarding protocol and mail access protocols?
Q.3 Why Domain Name System (DNS) is used? What are the different types of DNS servers? What
are the problems of using a centralized DNS server in Internet?
Q.4
a. You want to find out what the authoritative name servers are for the domain “kth.se.”
Describe the DNS query you use to get the answer.
b. You want to find out what the incoming mail server is for the domain “ict.kth.se.”
Describe the DNS query you use to get the answer.
c. The domain “ict.kth.se.” is a subdomain of “kth.se.” When the name server (or servers) are
set up for these two domains, it is possible to use delegation. Explain how the name
server(s) are configured if delegation is used, compared to the case if there is no
delegation.
d. Describe how you could use DNS queries to find out whether there is delegation in place
for a certain domain (for example, to see if there is a delegation from “kth.se.” to
“ict.kth.se.”).