a)
DNS:
DNS stands for Domain Name System. It is the way that internet domain names are located and translated into internet protocol address.
TCP:
TCP stands for Transmission Control Protocol which is a standard that establishes and maintain a network conversion with the use of application programs.
Round Trip Time (RTT):
The length of time it takes for a signal to be sent along with the length of time to be acknowledged is called the round trip time.
There are “n” DNS servers in the connection.
Amount of elapsed time:
While clicking on a link to open a web page, the IP address of the associated web page is not cached in the local host and hence a DNS lookup is used to identify the local host.
As the webpage is not cached and therefore must be found before the file can be requested and then received by the contacting host.
It is given that visits to “n” DNS servers to find the site occur a round-trip time (RTT) which adds up to “RTT1, RTT2,… RTTn” ,in which the numbers of RTT represents the DNS number.
- Therefore the total time it takes for the host to obtain the IP address can be denoted as: “RTT1+RTT2+RTT3+…RTTn”.
Given Data:
The HTML file references eight very small objects on the same server.
To Find:
Non Persistent HTTP with no parallel TCP connections:
b)
DNS:
DNS stands for Domain Name System. It is the way that internet domain names are located and translated into internet protocol address.
TCP:
TCP stands for Transmission Control Protocol which is a standard that establishes and maintain a network conversion with the use of application programs.
Round Trip Time (RTT):
The length of time it takes for a signal to be sent along with the length of time to be acknowledged is called the round trip time.
There are “n” DNS servers in the connection.
Amount of elapsed time:
While clicking on a link to open a web page, the IP address of the associated web page is not cached in the local host and hence a DNS lookup is used to identify the local host.
As the webpage is not cached and therefore must be found before the file can be requested and then received by the contacting host.
It is given that visits to “n” DNS servers to find the site occur a round-trip time (RTT) which adds up to “RTT1, RTT2,… RTTn” ,in which the numbers of RTT represents the DNS number.
- Therefore the total time it takes for the host to obtain the IP address can be denoted as: “RTT1+RTT2+RTT3+…RTTn”.
Given Data:
The HTML file references eight very small objects on the same server.
To Find:
Non Persistent HTTP with browser configured for 5 parallel connections:
c)
DNS:
DNS stands for Domain Name System. It is the way that internet domain names are located and translated into internet protocol address.
TCP:
TCP stands for Transmission Control Protocol which is a standard that establishes and maintain a network conversion with the use of application programs.
Round Trip Time (RTT):
The length of time it takes for a signal to be sent along with the length of time to be acknowledged is called the round trip time.
There are “n” DNS servers in the connection.
Amount of elapsed time:
While clicking on a link to open a web page, the IP address of the associated web page is not cached in the local host and hence a DNS lookup is used to identify the local host.
As the webpage is not cached and therefore must be found before the file can be requested and then received by the contacting host.
It is given that visits to “n” DNS servers to find the site occur a round-trip time (RTT) which adds up to “RTT1, RTT2,… RTTn” ,in which the numbers of RTT represents the DNS number.
- Therefore the total time it takes for the host to obtain the IP address can be denoted as: “RTT1+RTT2+RTT3+…RTTn”.
Given Data:
The HTML file references eight very small objects on the same server.
To Find:
Persistent HTTP:
Want to see the full answer?
Check out a sample textbook solutionChapter 2 Solutions
EBK COMPUTER NETWORKING
- 3. Consider a simple application-level protocol built on top of UDP that allows a client to retrieve a file from a remote server residing at a well-known address. The client first sends a request with a file name, and the server responds with a sequence of data packets containing different parts of the requested file. To ensure reliability and sequenced delivery, client and server use a stop-and-wait protocol. Ignoring the obvious performance issue, do you see a problem with this protocol? Think carefully about the possibility of processing crashing. State conclusion: Provide Proof: Solution:arrow_forwardIn this assignment, you will develop a simple Web server in Python that is capable of processing only one request. Specifically, your Web server will (i) Create a connection socket when contacted by a client (browser) (ii) Receive the HTTP request from this connection(iii) Parse the request to determine the specific file being requested(iv) Get the requested file from the server’s file system(v) Create an HTTP response message consisting of the requested file preceded by header lines(vi) Send the response over the TCP connection to the requesting browser. If a browser requests a file that is not present in your server, your server should return a “404 Not Found” error message. Your job is to code the steps above, run your server, and then test your server by sending requests from browsers running on different hosts. If you run your server on a host that already has a Web server running on it, then you should use a different port than port 80 for your Web server. Make sure to test your…arrow_forwardAssume we have a client using a web browser that is directly connected to a web server. We are assuming there is a direct link between the client and the server. The RTT delay between the client and the server is 10 msec. The time it takes the server to transmit an object to its outgoing link is 2 msec. Now suppose that the client has the web page that it wants already cached locally. But the user wants to constantly check for updates and sends conditional get requests one after the other 20 times -- that is, once it gets a response and/or the updated object it sends out the next request. If we are using persistent HTTP and the cached object is up-to-date 40% of the time, how much time will elapse between sending the first request and the completion of the last one?arrow_forward
- Consider accessing your e-mail with POP3. Suppose you have configured your mail client to operate in the 'download-and-delete' mode. When the client (C) fetches all emails from the server (S), the sequence of messages exchanged starts as follows. C: list S: 1 498 S: 2 912 S: C: retr 1 S: blah blah S: How many messages does the server store for the client? blah It cannot be known 912 498 None of the mentionedarrow_forwardConsider an HTTP 1.1 client and server. The RTT delay between the client and server is 1 seconds. Suppose the time seconds. server needs to transmit an object into its outgoing link is 3 initiate TCP connection RTT request file RTT. time to -transmit file file received time time You can assume that any other HTTP message not containing an object sent by the client and server has a negligible (zero) transmission time. Suppose the client makes 30 requests, one after the other, waiting for a reply to a request before sending the next request. Using HTTP 1.1, how much time elapses between the client transmitting the first request, and the receipt of the last requested object?arrow_forwardPlease provide correct solution. It takes 20ms for a client to make a TCP connection. Next, it takes 100ms for an object to be transmitted. Given, the web page has 15 objects. What's the total time taken for the non-persistent HTTP to load the web page?arrow_forward
- In this programming assignment, you will implement a decentralized peer-to-peer network architec-ture (P2P), including the basic implementation of the BitTorrent protocol (BTP). General P2P architec-tures can be classified into centralized and decentralized, In P2P centralized architectures, new peers senda request to the Traker (normally done via HTTP) requesting a list containing all the IP addresses ofthe peers that are already connected to the P2P network sharing the same file. The tracker then, replieswith a response containing such list. In P2P decentralized architecture, each peer is also a Traker, and itcan share only limited resources because it only sees the partial network. On the other hand, P2P decen-tralized networks avoid single point of failure since they do not depend of centralized trackers. Examplesof P2P applications that are/were implementing centralizing architectures are Nasper, the Berkeley OpenNetwork Infrastructure (BOINC) and some versions of BitTorrent.…arrow_forwardSuppose an HTTP client makes a first GET request to the gaia.cs.umass.edu web server for a base page that it has never before requested, which contains an embedded object, which causes the client to make a second GET request. A very short time later, the client then makes a third GET request - for the same base page, with that third GET request having an If-Modified-Since field (as does the 4th GET request that the client makes for the embedded object). Neither the base object nor the jpeg object has changed. How many round trip times (RTTs) are needed from when the client first makes the third GET request (i.e., when it requests the base object for the second time) to when the base page and the jpeg file are displayed a second time, assuming that: any time needed by the server to transmit the base file, or the jpeg file into the server's link is (each) equal to 1/2 RTT the time needed to transmit an HTTP GET into the client's link is zero? the time needed by the server to transmit…arrow_forward- Consider another carelessly written Web application, which uses a servlet that checks if there was an active session, but does not check if the user is authorized to access that page, instead depending on the fact that a link to the page is shown only to authorized users. What is the risk with this scheme? (There was a real instance where applicants to a college admissions site could, after logging into the Web site, exploit this loophole and view information they were not authorized to see; the unauthorized access was however detected, and those who accessed the information were punished by being denied admission.)arrow_forward
- Consider a simple application-level protocol built on top of UDP that allows a client to retrieve a file from a remote server residing at a well-known address. The client first sends a request with a file name, and the server responds with a sequence of data packets containing different parts of the requested file. To ensure reliability and sequenced delivery, client and server use a stop-and-wait protocol. Ignoring the obvious performance issue, do you see a problem with this protocol? Think carefully about the possibility of processes crashing.arrow_forwardb) Answer the following questions related to HTTP: i) Explain how the ability of the Java Socket class to return an OutputStream would be affected if there was no TCP protocol. ii) "Pipelining reduces the number of requests/replies during an HTTP connection". Do you agree with this statement? Explain your answer. iii) "Including the string Connection: close in an HTTP GET message request is a way to ask the server to terminate the connection". Do you agree with this statement? Explain your answer.arrow_forwardPlease solve it correctly and please provide explanation of your answers. A PC and a Web Server are communicating over a TCP connection. The PC had started the three way handshake with the initial sequence number of 3069 . The Web Server's initial sequence number is 4830 . The window size of the PC is 815 bytes and the window size of the Web Server is 463 bytes. Using the third TCP handshake ack segment the PC sends the http request of the size 396 bytes to the Web Server. Then the Web Server answers with 3 segments containing the requested data. The first segment size is 42 bytes and the second segment size is 276 bytes and the third segment size is 146 bytes respectively. The PC receives all three segments within the timer. But unfortunately the second segment was corrupted. So the PC immediately sends an acknowledgement segment. Assume that the PC uses Selective Repeat/Reject ARQ. (a) What will be the sequence number of the third TCP handshake signal send from PC to webserver?…arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education