subject

Let us consider a concurrent server. Clients connect to the server using the TCP protocol and exchange data. The server is connected to two different networks through two interfaces, IFA and IFB with IP addresses 128.120.56.35 and 128.120.55.1, respectively. We consider two different clients, referred as Host A andHost B with IP addresses 192.132.54.66 and 214.77.91.10, respectively. The server uses port number 80. The kernel in the server maintains a table for each socket descriptor and each table has the following entries: In this question you are asked to list all the tables and their contents as clients connect to the server.
socket descriptor
remote host
remote port
local host
local port
Assume that socket descriptors are assigned from the sequence of integers starting from 1 and for simplicity we will assume that once a descriptor is assigned it is not used any more. Similarly, ephemeral port numbers in clients are chosen starting from 15000 and once a port number is assigned it is not used any more.
1. List the tables in the kernel and their contents, when the server is first started and before any client request arrives.
2. List the tables and their contents when host A connects to the server through interface A (IFA) and is accepted by the server.
3. List the tables and their contents when host B connects to the server through interface UFB) and is accepted by the server.
4. List the tables and their contents after a second request is received from host B arrives through interface B (IFB) and is accepted by the server.
5. List the tables and their contents when the request from Host A is completely processed and the associated socket is closed.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 23:30
Creating "smart interfaces" in all sectors of industry, government, and the public arena is one of the fastest growing hct areas. these interfaces model, interpret, and analyze such human characteristics as speech, gesture, and vision. the field of biometrics, in which humans authenticate themselves to machines, is an area of considerable interest to hct practitioners. fingerprint scans are one of the most frequently used biometric options, and this article, biometric student identification: practical solutions for accountability & security in schools, makes a case for the implementation of fingerprint scans in schools. critique the article, and answer the following questions: according to the author, what are the main benefits of adopting fingerprint scans in schools for student identification? according to the author, what are the main drawbacks of adopting fingerprint scans in schools for student identification? do you agree with the author's assessment of the pl
Answers: 2
question
Computers and Technology, 23.06.2019 20:50
3.11.3 quiz: comparing and analyzing function typesquestion 4 of 102 pointswhat can you say about the y-values of the two functions f(x) = 3x2-3 andg(x)=2* - 3?
Answers: 2
question
Computers and Technology, 24.06.2019 17:30
Click on the tab on the ribbon to open the backstage view. file view insert review
Answers: 1
question
Computers and Technology, 24.06.2019 20:00
Which element will you include to present numerical on a slide? a: graph b: text c: flowchart d: shapes
Answers: 1
You know the right answer?
Let us consider a concurrent server. Clients connect to the server using the TCP protocol and exchan...
Questions
question
English, 19.03.2020 09:25
question
Mathematics, 19.03.2020 09:25
question
Mathematics, 19.03.2020 09:26
Questions on the website: 13722360