logo

Problem Resolving Report on Communication and TCP Connection Establishment

   

Added on  2023-06-04

6 Pages1330 Words389 Views
Problem Resolving Report 1
Problem Solving Report
by (Name)
Class Name
Tutor
University Name
Date of Submission

Problem Resolving Report 2
Question 1.A
In the figure below, it can be perceived that it is a diagram showing a communication
amongst client and server computing systems. A cookie is deposited on a server computer
and generates a session on the client computer side. The following are the associated steps:
Step 1
In the opening step, client workstation enquiries besttoys.com webpage for it to build
a link for extended communication. In a comeback, the web server produces a cookie file on
webserver offering it with exclusive ID, for example in our case study, the exclusive ID
number is ID 12343.
Step 2
In the next step, cookie is generated with an exclusive identifier. The identifier in this
case is 12343. Server computer will answer to the client computer on the grounds of the
produced ID with client computer query.
Step 3
In this step three, the client computer will produce a cookie. The cookie produced by
the client computer has same identifier as the computer server. Let's say, the client computer
will produce a cookie on its end for the reason of forthcoming communication. In case there
are forthcoming communications, identifier 12343, will be in deployment.
Step 4
In the next step, the client will obtain a response from the server. The response
encompasses the demanded price by client computer in step 3 above. Moreover, the reply
also comprises the update cookie in cooperation with the last enquiry demanded by client.
Step 5
In step 5, the disbursement has to be done by client and send to the server in addition
to data information regarding payment amount as well as product data with client cookie
identifier. Disbursement amount possibly will include information such as amount, currency,
modes of payment and so forth. Whereas product information may comprise of quantity
requested and product availability.
Step 6
This is the last step. In the final step six, the server computer sends to the client a final
verification. The verification regards client’s receipt of payment of product order that was
requested. The cookie identifier is updated on server (Experts, 2017 ).

Problem Resolving Report 3
Question 1.B
Diagram
In the above drawing, I have pictured the same case study as in 1A using Microsoft
Visio modelling tool. From the picture, Deakin University is the chief intermediary between
the publicity company and the webpage that manages visitor cookie. The website after it
produces the cookie, the generated cookie’s copy then is forwarded to the manufacturing
company. The cookie copy forwarded to the manufacturer enterprise contains visitor’s
information who logs on the Deakin University website and activates the links available
(Shetty, et al., 2015 ).
Question 2
TCP Connection Establishment
Establishment of connection
For a connection to be established, the TCP employs use of 3-way handshake, prior the
client tries to establish a connection with computer server side, computer server has to bind
and assure to listen to a port not exposed for it interlink. This is called inactive open
communication. Subsequently the inactive open has been generated, the client computer
might recruit active open.to have an establishment, the 3-path handshake takes place as
outlined below:
1. SYN: the contributing open is performed by client releasing a SYN to server. A client
computer produces the same seven times.
2. A SYN-ACK: in comeback with SYN-ACK. The ACK identifier is generated (like,
A+1), the server computer selects alternative unique sequence number let’s say B.
3. ACK: lastly, the client workstation succeeds an acknowledgement from the server
computer. Classification identifier is set to receive ACK value (i.e. X+1). The ACK
figure is raised by 1 more than the acknowledged sequence ID.
At this instant, both the client computer and the server computer have received an ACK of
interlinking. Steps one and two establishes a connection constraint for unidirectional and the
acknowledgement. Final two steps initiate connection factor (i.e. known as identifier) for

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Networks and Communication
|7
|1410
|122

Understanding the Use of Cookies in Computer Networks
|8
|1041
|73