1. Briefly explain the end-to-end principle. 2. Why are there two separate, stan
ID: 3890684 • Letter: 1
Question
1. Briefly explain the end-to-end principle.
2. Why are there two separate, standard internet transport protocol: TCP and UDP? How are they similar? How are they different?
3. Briefly explain how TCP establishes a connection.
4. What mechanism does TCP use to provide acknowledgements and flow control?
5. Why do some websites block “ping” request? Explain whether websites still need to do this?
6. Identify and briefly explain two or more denial-of-service attacks that exploit TCP/IP protocols.
7. Identify and briefly explain two or more attacks on TCP/IP that may route packets to the wrong hosts.
8. Briefly explain the structure and components of a three-part domain name, like www.amawig.com
9. Explain how DNS looks up a domain name using redirection.
Explanation / Answer
1. Briefly explain the end-to-end principle.
- A design framework which is used in the technology of computer networking is known as end to end principle.
- Here the application specific features reside in the communicating end nodes not in the intermediary nodes like gateways and routers which are exist to create the network.
- The end to end principle will addressed the requirement of network reliability when the building blocks are unreliable.
- The end-to-end principle seen as a direct precursor to the principle of net neutrality.
2. Why are there two separate, standard internet transport protocol: TCP and UDP? How are they similar? How are they different?
- The TCP is know as Transmission Control Protocol
- The UDP is know as User Datagram Protocol
- These protocals are used as a transportation protocol that is one of the core protocols of the Internet protocol suite.
- Both TCP and UDP work at transport layer TCP/IP model and both have very different usage.
Differences of TCP and UDP :
- TCP is connection-oriented protocol.
- UDP is connectionless protocol.
- If we send two messages along a connection one by one we know the first message will get there first.
we don’t have to worry about data arriving in the wrong order.
- If we send two messages out we don’t know what order they’ll arrive in that is known as no ordered.
- Data is read as a stream with nothing distinguishing where one packet ends and another begins. There may be multiple packets per read call.
- Packets are sent individually and are guaranteed to be whole if they arrive. One packet per one read call.
3. Briefly explain how TCP establishes a connection.
- TCP is the most commonly used protocol on the Internet.
- When we request a web page in our browser our computer sends TCP packets to the web server’s address, asking it to send the web page back to us.
- The web server responds by sending a stream of TCP packets, which your web browser stitches together to form the web page.
- When we click a link, sign in, post a comment, or do anything else, our web browser sends TCP packets to the server and the server sends TCP packets back.
4. What mechanism does TCP use to provide acknowledgements and flow control?
- TCP achieves this in two ways.
* It orders packets by numbering them.
* It error-checks by having the recipient send a response back to the sender saying that it has received the message.
- If the sender doesn’t get a correct response, it can resend the packets to ensure the recipient receives them correctly.
5. Why do some websites block ping request? Explain whether websites still need to do this?
- Due to some internet malware functions few browsers pop up for enable and disable the internet security.
- Place your Exit Pop-Up on your product landing pages and lead-generation pages, as well as blog.
- Have different pop-ups for each page offer a free demo for your product pages
- pop-up for our lead generation pages and an ebook promotional pop-up for your blog site.
- Ensure our not spamming our readers or visitors with an exit pop-up every time they visit your site.
- Test our pop-ups appearing a maximum of three times per week.
- Ensure we are not spamming existing leads or clients with our pop-ups, as nothing causes an unsubscribe faster.
- If we need some inspiration, check out these examples to see how to create a good exit popup.
6. Identify and briefly explain two or more denial-of-service attacks that exploit TCP/IP protocols.
The attacks that exploit protocols are
- CHARGEN and ECHO
CHARGEN is a simple service provided by most TCP/IP implementation under UNIX.
- SYN Flooding
SYN flooding is a specially designed attack, which employs a flood of SYN packet to consume all available new network connections
on a targeted host, resulting in delays responding to legitimate network connection requests and eventual halting the service provider
7. Identify and briefly explain two or more attacks on TCP/IP that may route packets to the wrong hosts.
The two attacks which are from TCP/IP are
- Client-Side Spoofing
- Server-Side Spoofing
9. Explain how DNS looks up a domain name using redirection.
- Top level domain is a name used to indicate a country/region or the type of organization using a name.
- Second level domain is a Variable-length names registered to an individual or organization for use on the Internet.
- These names are always based upon an appropriate top-level domain, depending on the type of organization or geographic location where a name is used.
- Subdomain is a Additional names that an organization can create that are derived from the registered second-level domain name.
- These include names added to grow the DNS tree of names in an organization and divide it into departments or geographic locations.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.