Computer Networking: A Top-Down Approach, Kurose and Ross, 6th Edition, Solutions to Review Questions and Problems – Chapter 2

Ankur Kulhari

Chapter 2 Review Questions Section 2.1 Q1. List five nonproprietary Internet applications and the application-layer protocols that they use. Solution. Following are the nonproprietary Internet applications and the protocols at application-layer used by them: The Web Applications: These applications use Hyter Text Transfer Protocol (HTTP), File Transfer Applications: These applications use File Transfer Protocol (FTP), Remote Login Applications: These applications …

Computer Networking: A Top-Down Approach, Kurose and Ross, 6th Edition, Solutions to Review Questions and Problems – Chapter 1

Ankur Kulhari

  Chapter 1 Review Questions Section 1.1 Q1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? Solution. Host and end system are used interchangeably. Hosts or end systems include Desktops, Laptops (PCs), workstations, Web servers, mail servers, Personal Digital Assistants, Internet-connected game consoles, …

Introduction to Data communication

Raju Pal

Data communication is the process of transmitting data from a source to destination. The following power point presentation give some overview to this domain.   Credit: some random internet sources and the book – data communication by Frouzan