I need help with my QUiz on tuesday, please show me how you got the answers plea
ID: 3864899 • Letter: I
Question
I need help with my QUiz on tuesday, please show me how you got the answers please , espcially number 5
Part 1: Of what my quiz will look like, I need explainations how you got the answer # 2,5, and 6
1. What are cookies in the HTTP protocol and what are they used for. Give an example. (8 pts.)
2. In a circular Distributed Hash Table (DHT) data base, 8 peers participate. These peers have the following integer identifiers. Assume that the closest algorithm is used in assigning records with hash values to a peer for a database of 4096 records.
Peer #
Identifier
1
12
2
158
3
754
4
1560
5
2124
6
2768
7
3212
8
4000
a) In which peer a record with hash number 4012 is stored? How about hash number 1001? (12 pts.)
b) If a user places a query on peer #4, asking for a record of hash number 112, what is the sequence of peers this query and its response would have to go thru for the user to receive its response? (12 pts.)
3. Explain multiplexing and demultiplexing in TCP. (8 pts.)
4. Explain main functions of TCP. Describe TCP header fields and explain which field is used in which function of TCP. (12 pts.)
5. Find the checksum (one’s compliment) of the following set of data. (8 pts.)
Data 1: 01010101
Data 2: 11100001
Data 3: 11001100
6. Consider a TCP connection between two hosts that are 500 miles away from each other (propagation delay is 100 miles per msec.). Assume that there is no error or loss in this communication and the receive window size is set to 64000 bytes. The size of data that needs to be transmitted is 1.6 Mbytes. Assume that maximum size of each segment is 1600 bytes. If this connection speed is 100 Mbps, what is the link utilization, ignoring the effects of the slow start? (20 pts.)
7. Explain main differences between Go-Back-N and Selective Repeat algorithms of TCP. (8 pts.)
8. Explain TCP slow start algorithm and describe the differences between Reno and Tahoe types of this algorithm for congestion control. (12)
Part 2 another sample of the quiz from the previous before, I need help number 4
1. In a circular Distributed Hash Table (DHT) data base, 8 peers participate. These peers have the following integer identifiers. Assume that the closest algorithm is used in assigning records with hash values to a peer for a database of 5000 records.
Peer #
Identifier
1
118
2
367
3
884
4
1324
5
2124
6
2843
7
3456
8
4290
a) In which peer a record with hash number 4012 is stored? How about hash number 2001? (8 pts.)
b) If a user places a query on peer #6, asking for a record of hash number 422, what is the sequence of peers this query and its response would have to go thru for the user to receive its response? (8 pts.)
2. Explain main functions of TCP. Describe TCP header fields and explain which field is used in which function of TCP. (18 pts.)
3. Find the checksum (one’s compliment) of the following set of data. (8 pts.)
Data 1: 1110000010101010
Data 2: 0110000111110011
Data 3: 1101110000111010
4. Consider a TCP connection between two hosts that are 400 miles away from each other (propagation delay is 100 miles per msec.). Assume that there is no error or loss in this communication and the receive window size is set to 32000 bytes. The size of data that needs to be transmitted is 1.6 Mbytes. Assume that maximum size of each segment is 1600 bytes. If this connection speed is 10 Mbps, what is the link utilization, ignoring the effects of the slow start? (20 pts.)
5. What are cookies in the HTTP protocol and what are they used for. Give an example. (8 pts.)
6. Explain TCP slow start algorithm and describe the differences between Reno and Tahoe types of this algorithm for congestion control. (14)
7. Explain why the size of the receive window field should be half of the size of sequence number field in TCP. (16 pts.)
Peer #
Identifier
1
12
2
158
3
754
4
1560
5
2124
6
2768
7
3212
8
4000
Explanation / Answer
cookie:
An protocol cookie (also referred to as internet cookie, net cookie, browser cookie or just cookie) could be a tiny piece of knowledge sent from a web site and hold on on the user's laptop by the user's browser whereas the user is browsing
Cookies ar principally used for these 3 purposes:
• Session management (user logins, looking carts)
• Personalization (user preferences)
• Tracking (analyzing user behavior)
cookies in HTTP protocol:
Session cookie.
Persistent cookie
Secure cookie
HttpOnly cookie
SameSite cookie
Third-party cookie
Supercookie
Zombie cookie
example:
Creating cookies:
When receiving associate HTTP request, a server will send a Set-Cookie header with the response. The cookie is sometimes keep by the browser and, afterwards, the cookie price is distributed together with each request created to a similar server because the content of a Cookie HTTP header.
The Set-Cookie and Cookie headers
The Set-Cookie HTTP response header is employed to send cookies from the server to the user agent. an easy cookie is set like this:
Set-Cookie: <cookie-name>=<cookie-value>
The server tells the shopper to store a cookie . The response sent to the browser can contain the Set-Cookieheader and therefore the browser can store the cookie.
http/1.0 200 OK
Content-type: text/html
Set-Cookie: yummy_cookie=choco
Set-Cookie: tasty_cookie=strawberry
Now, with each new request to the server, the browser can challenge all antecedently keep cookies to the server victimization the Cookie header.
GET /sample_page.html HTTP/1.1
Host: www.example.org
Cookie: yummy_cookie=choco; tasty_cookie=strawberry
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.