![EBK COMPUTER NETWORKING](https://www.bartleby.com/isbn_cover_images/8220102955479/8220102955479_largeCoverImage.jpg)
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 2, Problem P15P
Program Plan Intro
Given spam e-mail:
From - Fri Nov 07 13:41:30 2008
Return-Path: <tennis5@pp33head.com>
Received: from barmail.cs.umass.edu
(barmail.cs.umass.edu [128.119.240.3]) by cs.umass.edu (8.13.1/8.12.6) for <hg@cs.umass.edu>; Fri, 7 Nov 2008 13:27:10 -0500
Received: from asusus-4b96 (localhost [127.0.0.1]) by
barmail.cs.umass.edu (Spam Firewall) for <hg@cs.umass.edu>; Fri, 7 Nov 2008 13:27:07 -0500 (EST)
Received: from asusus-4b96 ([58.88.21.177]) by
barmail.cs.umass.edu for <hg@cs.umass.edu>; Fri,
07 Nov 2008 13:27:07 -0500 (EST)
Received: from [58.88.21.177] by
inbnd55.exchangeddd.com; Sat, 8 Nov 2008 01:27:07 +0700
From: "Jonny" <tennis5@pp33head.com>
To: <hg@cs.umass.edu>
Subject: How to secure your savings
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
As presented in the text, SMTP involves the exchange of several
small messages. In most cases, the server responses do not affect
what the client sends subsequently. The client might thus
implement command pipelining: sending multiple commands in a
single message.
(a) For what SMTP commands does the client need to pay
attention to the server's responses?
(b) Assume the server reads each client message with gets() or
the equivalent, which reads in a string up to a . What
would it have to do even to detect that a client had used
command pipelining?
(c) Pipelining is nonetheless known to break with some
servers; find out how a client can negotiate its use.
In the HTTP protocol, what is the primary different between a GET request and a PUT request?
GET requests send out TCP packets whereas PUT requests send out UDP packets.
O GET requests are for HTML (and CSS/JavaScript) source files only while PUT requests are for other objects such as images,
audio, and video.
O GET requests place parameters into the URL while PUT requests place parameters in the HTTP request body.
O GET requests are for downloading data and PUT requests are for uploading data.
A UDP service FlagServ is running at flagserv.cse543.rev.fish:13337. This UDP service receives a target IP address from the user, and if the user is authenticated, it will happily send a flag (a special string) via UDP to port 13337 of the target IP. Your job is to write a program that retrieves the flag. Can u help solve this problem?
Chapter 2 Solutions
EBK COMPUTER NETWORKING
Ch. 2 - List five nonproprietary Internet applications and...Ch. 2 - Prob. R2RQCh. 2 - Prob. R3RQCh. 2 - Prob. R4RQCh. 2 - Prob. R5RQCh. 2 - Prob. R6RQCh. 2 - Prob. R7RQCh. 2 - Prob. R8RQCh. 2 - Prob. R9RQCh. 2 - Prob. R10RQ
Ch. 2 - Why do HTTP, SMTP, and POP3 run on top of TCP...Ch. 2 - Prob. R12RQCh. 2 - Prob. R13RQCh. 2 - Prob. R14RQCh. 2 - Prob. R15RQCh. 2 - Prob. R16RQCh. 2 - Prob. R17RQCh. 2 - From a users perspective, what is the difference...Ch. 2 - Prob. R19RQCh. 2 - Prob. R20RQCh. 2 - Prob. R21RQCh. 2 - Prob. R22RQCh. 2 - Prob. R23RQCh. 2 - Prob. R24RQCh. 2 - Prob. R25RQCh. 2 - In Section 2.7, the UDP server described needed...Ch. 2 - Prob. R27RQCh. 2 - Prob. P1PCh. 2 - Prob. P2PCh. 2 - Prob. P3PCh. 2 - Prob. P4PCh. 2 - Prob. P5PCh. 2 - Prob. P6PCh. 2 - Prob. P7PCh. 2 - Prob. P8PCh. 2 - Prob. P9PCh. 2 - Prob. P10PCh. 2 - Prob. P11PCh. 2 - Prob. P13PCh. 2 - Prob. P14PCh. 2 - Prob. P15PCh. 2 - Prob. P16PCh. 2 - Prob. P17PCh. 2 - Suppose you can access the caches in the local DNS...Ch. 2 - Prob. P21PCh. 2 - Prob. P22PCh. 2 - Prob. P23PCh. 2 - Prob. P25PCh. 2 - Prob. P26PCh. 2 - Prob. P27PCh. 2 - Prob. P28PCh. 2 - Prob. P29PCh. 2 - Prob. P30PCh. 2 - Prob. P31PCh. 2 - Prob. P32P
Knowledge Booster
Similar questions
- The following questions are related to HTTP protocol Q1. The first line of a HTTP request from some client to some server is basically made of where the web page file path is added. The path is shown as folders separated by slash. Q2. If an HTTP server responds to a client request and the response is a success, what is the http code and string that marks a success response? Must provide the code and the string as they appear in TCPDump or Wireshark traces. (note: use upper case for the string and also proper spacing in you answers. Keep the order of the string and the code as seen in TCPDump) Answer: code and string that marks a success response Q3. What http header field is used to identify an address of a web page (i.e. the URI) that linked to the resource currently being requested. This field indicates the last page the user/requester was on by the time they link to the requested page. Answer: The field that indicates the last page the user/requester was on is Q4. What is the http…arrow_forward2- Client is connecting a server via TCP to get an object from HTTP Server. Skitch the TCPwindow connection including (establishing connection, the request from client, the response byserver, sending data from server side and closing the connection).Knowing that:1- Get request from the HTTP 1.1 server is 259 bytes.2- Response from the server is 223 bytes.3- Data size requested is 900 bytes.arrow_forwardPlease solve it correctly and give proper explanation. Question: Given, you want to visit “welcomebacktophysicalexams.com”. Your network has alocal DNS server and is using a recursive lookup to fetch IP addresses and RTT of 29 ms.Others in your network have already visited the above website a few hours before yourvisit.After fetching the IP address, your PC sends a non-persistent HTTP request of size 109bytes to bring 13 objects of size 31 bytes each. In this particular connection, it requiresthe PC 67ms to send the TCP request to the server. I. What is the total RTT in ms in the DNS lookup?II. What is the total RTT in ms required (including DNS) to bring the full object toyour PC?III. What is the total file transmission time in ms after fetching the IP address?arrow_forward
- Using Nslookup to find a hostname Analyze the sample email header given below. This includes only an IP address. Return-Path: <mgs351@hotmail.com> Received: from murder ([unix socket]) (authenticated user=djmurray bits=0) by email1.acsu.buffalo.edu (Cyrus v2.2.12-UB_mail1_2005_03_01) with LMTPA; Thu, 9 Feb 2006 23:21:45 -0500 Delivered-To: djmurray@mailspool08.dyn.acsu.buffalo.edu Received: (qmail 14244 invoked from network); 10 Feb 2006 04:21:45 -0000 Received: from unknown (HELO mailscan5.acsu.buffalo.edu) (128.205.6.137) by mail1 with SMTP; 10 Feb 2006 04:21:45 -0000 Received: (qmail 19652 invoked by uid 22493); 10 Feb 2006 04:21:45 -0000 Delivered-To: djmurray@buffalo.edu Received: (qmail 19642 invoked from network); 10 Feb 2006 04:21:45 -0000 Received: from bay105-f39.bay105.hotmail.com (HELO hotmail.com) (65.54.224.49) by front3.acsu.buffalo.edu with SMTP; 10 Feb 2006 04:21:45 -0000 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Thu, 9 Feb 2006…arrow_forwardPlease solve it correctly with a proper explanation of the calculation. Question: Given, you want to visit “welcomebacktophysicalexams.com”. Your network has alocal DNS server and is using a recursive lookup to fetch IP addresses and RTT of 29 ms.Others in your network have already visited the above website a few hours before yourvisit.After fetching the IP address, your PC sends a non-persistent HTTP request of size 109bytes to bring 13 objects of size 31 bytes each. In this particular connection, it requiresthe PC 67ms to send the TCP request to the server. I. What is the total RTT in ms in the DNS lookup?II. What is the total RTT in ms required (including DNS) to bring the full object toyour PC?III. What is the total file transmission time in ms after fetching the IP address?arrow_forwardPlease solve it correctly and please provide explanation of your answers. A PC and a Web Server are communicating over a TCP connection. The PC had started the three way handshake with the initial sequence number of 3069 . The Web Server's initial sequence number is 4830 . The window size of the PC is 815 bytes and the window size of the Web Server is 463 bytes. Using the third TCP handshake ack segment the PC sends the http request of the size 396 bytes to the Web Server. Then the Web Server answers with 3 segments containing the requested data. The first segment size is 42 bytes and the second segment size is 276 bytes and the third segment size is 146 bytes respectively. The PC receives all three segments within the timer. But unfortunately the second segment was corrupted. So the PC immediately sends an acknowledgement segment. Assume that the PC uses Selective Repeat/Reject ARQ. (d) What will be the window size of PC A after receiving only the first segment from webserver? (e)…arrow_forward
- What type of authentication method is displayed in this picture? Multi-Factor Authentication Biometric Authentication Token-based authentication Single Sign-on 2.Wendy is examining the logs of a web server that was compromised by a remote attacker. She notices that right before the attack, the logs show a series of segmentation fault errors. Other logs indicate that the attacker sent very long input strings to the web server that had malicious commands at the end of the string. What type of attack most likely took place? SQL Injection Cross-site request forgery Cross-Site scripting Buffer Overflow 3.Jessica is combatting a security incident where a specific piece of malware is continually infecting systems on her network. She would like to use application control technology to block this file. What type of application control should she use? Greylisting Bluelisting Whitelisting Blacklistingarrow_forwardQ1: The following is a dump of a UDP header in binary form 0100 0001 0010 0011 0100 0001 0010 0111 0000 0000 0010 1111 0100 0001 0011 1111 Find in decimal form the following: (a) Source port number (b) Destination port number (c) Total length of the UDP (d) Length of the data (e) Check sum. (5 Marks)arrow_forwardPlease solve it correctly and please provide explanation of your answers. A PC and a Web Server are communicating over a TCP connection. The PC had started the three way handshake with the initial sequence number of 3069 . The Web Server's initial sequence number is 4830 . The window size of the PC is 815 bytes and the window size of the Web Server is 463 bytes. Using the third TCP handshake ack segment the PC sends the http request of the size 396 bytes to the Web Server. Then the Web Server answers with 3 segments containing the requested data. The first segment size is 42 bytes and the second segment size is 276 bytes and the third segment size is 146 bytes respectively. The PC receives all three segments within the timer. But unfortunately the second segment was corrupted. So the PC immediately sends an acknowledgement segment. Assume that the PC uses Selective Repeat/Reject ARQ. (a) What will be the sequence number of the third TCP handshake signal send from PC to webserver?…arrow_forward
- A person's e-mail address is his or her login name @ the name of a DNS domain with an MX record. Login names can be first names, last names, initials, and all kinds of other names. Suppose that a large company decided too much e-mail was getting lost because people did not know the login name of the recipient. Is there a way for them to fix this problem without changing DNS? If so, give a proposal and explain how it works. If not, explain why it is impossible.arrow_forwardWrite a rule that will alert on any source IP on any port connecting to any destination IP address on the FTP control port that is referencing the content "Answers.doc". Provide the message of "Bad Student" when this information is found. Use a SID of 1, do not provide spaces in between the parameters delimited by a semicolon, using the order msg, content and sid. An incomplete example of the rule with the correct syntax is: alert tcp any any -> any any (msg: "Test1";sid:1;)arrow_forwardWrite down a full UDP client script (Python3) that will: 1- Receive a string as input from the user. 2- Send only the user input string to a UDP server with 10.11.6.27 as the IP address-and 49788 as the port number. 3- Wait for a message from the server. If the received message ends with "goodbye", print out only the last ten characters from the message and quit the script. Otherwise, just quit without printing any message. Use the editor to format your answerarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education