Networks and Communication: Cookie, TCP Connection, and Disconnection

Verified

Added on  2023/06/05

|7
|1410
|122
Homework Assignment
AI Summary
This assignment solution provides a detailed analysis of networks and communication concepts, focusing on cookie processes and TCP protocols. The solution begins by illustrating the communication process between a server and a client device, highlighting the role of cookies in session management, including steps like session opening, unique identifier generation, and data exchange. The assignment then uses a visual representation with MS Visio to depict the cookie flow in a scenario involving Deakin University, a publicity company, and a webpage. Furthermore, the solution delves into the TCP connection establishment process, explaining the three-way handshake (SYN, SYN-ACK, ACK) and the role of sequence numbers. It also discusses the disconnection process, including the four-way handshake (FIN, ACK) and special cases such as half-open connections and simultaneous FIN transmissions. Finally, the solution includes a comprehensive list of references supporting the analysis.
Document Page
Networks and Communication 1
Networks and Communication
by (Student_Name)
Class Title
Lecturer
University Affiliation
Submission Date
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Networks and Communication 2
Question One A
In the image below, it is depicted that it a diagram that shows communication process
between the server and client computing device. A cookie is dropped on the comping device
and will generate a session with the client computing end. The steps below explains the
whole process.
1. Session opening
In this opening step, the client end device does an inquiry to besttoys.com website so that
it can create a connection for an extended communication. In the reply, the web server side
generate another cookie file with unique identifier, for instance case study scenario the
identifier is 1234.
Step 2
In this step, the cookie generates an exclusive identifier again. The ID in our case
study is 1234. The serving computer answers the client PC on the basis of the generated
identifier by the client PC.
Step 3
In the third step, the Client PC obtains a reply from the server end. The cookie
generated by the client computing device has the similar ID as the serving computer end.
That is, the client workstation will generate a cookie on the client’s end with an aim of further
communications. In the event there will be further communications, the generated cookie will
be used.
Step 4
In the fourth step, the client node obtains a reply from server end. The reply consists
of the requested price information by the client workstation in the third step above.
Document Page
Networks and Communication 3
Additionally, the response also encompass updates about the cookie in support of the
previous request made by the client node.
Step 5
In the fifth step, the payment of cash has to be done by the client node and details
dispatched to the server together with information relating to amount paid and product
information being paid for. The client cookie ID is also dispatched together. Payment
information will include currency amount paid, mode of transaction etc. on the other hand,
product data includes quantity required and the availability of the product.
Step 6
In the sixth step, which is the last step, the serving computer releases to the client
node a final verification. This verification regards client node’s receipt of the product
payment that was enquired. The cookie ID is updated on the computer server (Learning,
2017).
Question one B
(Experts, 2017 ), (Shetty, et al., 2015)
Document Page
Networks and Communication 4
In our above drawn image, the same case study in Question one A above has been
pictured out using M.s Visio drawing tool. From the image, Deakin University is taken as the
core intermediary between the publicity Enterprise Company and webpage. Deakin
University manages the visitor cookies. Once the webpage generates a cookie, the produced
cookie’s copy is accelerated to manufacturing company. The forwarded cookie copy entails
the information of the visitor who logged in on Deakin University webpage and activated the
company’s active links (Harris, 2012 ).
Question two
Connection establishment
For a connection to be initiated in a TCP environment, the TCP deploys use of a three-
way-handshake. In the first step, the client node tries to connect to the server computer, the
serving computer has to create a binding and confirms to listen to the port so that there is no
exposure for the eavesdropping interlink. This is called an inactive open communication.
Consequently, the inactive open communication is supposed to be generated, the client node
at some point may be required to recruit an active open to have a connection establishment.
The three-way-handshake occurs as in the steps below:
a. SYN: the client taking part in the open inactive releases a SYN to the serving
computer. This is done seven times.
b. A SYN-ACK: in a reply to the SYN-ACK. ACK ID is produced for instance, (A+1),
the serving computer chooses an alternative exclusive sequence number, say B.
c. ACK: in the last step, the client node receives an ACK from the server node. Ordering
ID is set to collect acknowledgement value (for instance X+1). The ACK value is
incremented by 1more than the ACK sequence identifier (Ibe, 2017).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Networks and Communication 5
At this occasion, the server computer and client nodes have obtained an
acknowledgement of interconnection. In steps and b, a connection constraint is established
for the one directional communication and acknowledgement. The last step imitates the
interlink factor. For the opposite direction and it is ascended to. As soon as the full-duplex
measures have been established, a communication is initiated (Odom, 2013).
Disconnecting an establishment
The disconnection process employs a-four-handshake steps. Every side of the
connected end terminates on individual basis. In the event that any of communicating
computer systems will want to pull off from a communication, it has to inform the other party
by sending an acknowledgement and FIN packet to the other end in connection with. The
opposite partner acknowledges by sending an ACK. Therefore, disconnection of an
establishment requires a pair of ACK and FIN sessions from every TCP finale ends. The
moment both ACK and FIN have been determined, the node that initiated a FIN before
exiting, and it has to lag for timeout before the link is closed. During this period, the
communication port is not available for new connections. This discourages misunderstanding
ever since the overdue datagrams are delivered in the sequential links.
A connection may be half-open. That is, one end is connected whereas the other end
is disconnected. The end that disconnected the link can no longer send information to the
opposite end. However, the opposite end can release information to the other party’s end. The
disconnected end has to continue assessing the info till the other opposite end comes to a
closure of the communication.
In addition, there is a possibility to end a connection in a three-handshake, when a
client node releases a FIN and node 2 replies with a FIN, node 1 replies with
acknowledgement and a connection terminates.
Document Page
Networks and Communication 6
Other special case may arise that two communicating devices send out a FIN in
coincidence. Both opposite sides will send an acknowledgement of termination. In such a
scenario, the TCP termination process is taken to be a 2-way handshake. This simply means
that he FIN sequence was achieved in a parallel form in both end sides (Clarke & Lachance,
2013).
(Mir, 2014)
Document Page
Networks and Communication 7
References
Clarke, G. E. & Lachance, ., 2013. CompTIA Security+ Certification Boxed Set (Exam SY0-301). New
York City: McGraw Hill Professional.
Experts, D., 2017 . Computer Knowledge for SBI/ IBPS Clerk/ PO/ RRB/ RBI/ SSC/ Railway. 2nd ed.
New Delhi: Disha Publications .
Harris, S., 2012 . CISSP All-in-One Exam Guide. 6th ed. New York City: McGraw Hill Professional.
Ibe, O. C., 2017. Fundamentals of Data Communication Networks. Hoboken: John Wiley & Sons.
Learning, 2017. IC3 Certification Guide Using Microsoft Windows 10 & Microsoft Office 2016. Boston:
Cengage Learning.
Mir, N. F., 2014. Computer and Communication Networks: Computer Communica Networks _c2.
Upper Sadle River: Prentice Hall.
Odom, W., 2013. CCENT/CCNA ICND1 100-101 Official Cert Guide. Indianapolis: Cisco Press.
Shetty, N. R., Prasad, . & Nalini, ., 2015. Emerging Research in Computing, Information,
Communication and Aplications. New York City: Springer.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]