subject

Let us consider a concurrent server. Clients connect to the server using the TCP protocol and exchange data. The server is connected to two different networks through two interfaces, IFA and IFB with IP addresses 128.120.56.35 and 128.120.55.1, respectively. We consider two different clients, referred as Host A andHost B with IP addresses 192.132.54.66 and 214.77.91.10, respectively. The server uses port number 80. The kernel in the server maintains a table for each socket descriptor and each table has the following entries: In this question you are asked to list all the tables and their contents as clients connect to the server.
socket descriptor
remote host
remote port
local host
local port
Assume that socket descriptors are assigned from the sequence of integers starting from 1 and for simplicity we will assume that once a descriptor is assigned it is not used any more. Similarly, ephemeral port numbers in clients are chosen starting from 15000 and once a port number is assigned it is not used any more.
1. List the tables in the kernel and their contents, when the server is first started and before any client request arrives.
2. List the tables and their contents when host A connects to the server through interface A (IFA) and is accepted by the server.
3. List the tables and their contents when host B connects to the server through interface UFB) and is accepted by the server.
4. List the tables and their contents after a second request is received from host B arrives through interface B (IFB) and is accepted by the server.
5. List the tables and their contents when the request from Host A is completely processed and the associated socket is closed.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 22:00
Which of the following statements correctly identifies a problem with sanitization methods? a. methods are not available to remove data ensuring that unauthorized personnel cannot retrieve data.b. even fully incinerated media can offer extractable data.c. personnel can perform sanitization steps improperly.d. stored data is physically etched into the media.
Answers: 1
question
Computers and Technology, 22.06.2019 19:10
What a backup plan that you have created in a event you encounter a situation
Answers: 2
question
Computers and Technology, 22.06.2019 19:40
Solve the following javafx application: write a javafx application that analyzes a word. the user would type the word in a text field, and the application provides three buttons for the following: - one button, when clicked, displays the length of the word.- another button, when clicked, displays the number of vowels in the word.- another button, when clicked, displays the number of uppercase letters in the word(use the gridpane or hbox and vbox to organize the gui controls).
Answers: 1
question
Computers and Technology, 22.06.2019 22:20
Pp 4.1 design and implement a class called sphere that contains instance data that represents the sphere’s diameter. define the sphere constructor to accept and initialize the diameter and include getter and setter methods for the diameter. include methods that calculate and return the volume and surface area of the sphere (see pp 3.5 for the formulas). include a tostring method that returns a one-line description of the sphere. create a driver class called multisphere, whose main method instantiates and updates several sphere objects.
Answers: 1
You know the right answer?
Let us consider a concurrent server. Clients connect to the server using the TCP protocol and exchan...
Questions
question
Mathematics, 08.01.2021 07:10
question
Mathematics, 08.01.2021 07:10
question
Chemistry, 08.01.2021 07:10
question
Mathematics, 08.01.2021 07:10
question
Mathematics, 08.01.2021 07:10
question
Mathematics, 08.01.2021 07:10
question
Mathematics, 08.01.2021 07:10
Questions on the website: 13722367