ASSIGNMENTS
COS2626
2022
Computer Networks I
,TABLE OF CONTENTS
Assignment 1 ....................................................................................................................... 2
Assignment 2 ..................................................................................................................... 18
Assignment 3 ..................................................................................................................... 34
Assignment 4 ..................................................................................................................... 52
, Assignment 1
Question 1
Which one of the following statements is applicable for a peer-to-peer network but NOT for a
client-server network model?
a. User accounts and passwords to the networks are all assigned in one place.
b. They are simple to configure and for this reason, they may be used in environments in which
time or technical expertise is scarce.
c. Problems on the network can be monitored, diagnosed, and fixed from one location.
d. Access to multiple shared resources can be centrally granted to a single user or a group of users.
Question 2
Which statements regarding client-server applications and their protocols used on networks
and the Internet are FALSE (More than one statement applies)?
a. The primary protocol used by Web servers and browsers (clients) is HTTP (Hypertext Transfer
Protocol).
b. In e-mail services, the recipient’s mail server delivers the message to the receiving client using
one of two protocols: POP3 (Post Office Protocol, version 3) or IMAP (Internet Message Access
Protocol, version 4). Using IMAP4, the email is downloaded to the client computer and typically
removed from the server. Using POP3 the client application manages the email while it remains
stored on the server.
c. FTP (File Transfer Protocol) is a client-server application that transfers files between two
computers, primarily using FTP. FTP uses encryption and is therefore extremely secure.
d. The Telnet protocol is a command-line application included in many operating systems, but
transmissions in Telnet are not encrypted. This has caused Telnet to be largely replaced by
other, more secure programs, such as the ssh command in the Linux operating system.
Question 3
Which one of the following applications could be used to run a website from a server?
a. Hypertext Transfer Protocol
b. FileZilla
c. Microsoft Exchange Server
d. Ngnix
COS2626
2022
Computer Networks I
,TABLE OF CONTENTS
Assignment 1 ....................................................................................................................... 2
Assignment 2 ..................................................................................................................... 18
Assignment 3 ..................................................................................................................... 34
Assignment 4 ..................................................................................................................... 52
, Assignment 1
Question 1
Which one of the following statements is applicable for a peer-to-peer network but NOT for a
client-server network model?
a. User accounts and passwords to the networks are all assigned in one place.
b. They are simple to configure and for this reason, they may be used in environments in which
time or technical expertise is scarce.
c. Problems on the network can be monitored, diagnosed, and fixed from one location.
d. Access to multiple shared resources can be centrally granted to a single user or a group of users.
Question 2
Which statements regarding client-server applications and their protocols used on networks
and the Internet are FALSE (More than one statement applies)?
a. The primary protocol used by Web servers and browsers (clients) is HTTP (Hypertext Transfer
Protocol).
b. In e-mail services, the recipient’s mail server delivers the message to the receiving client using
one of two protocols: POP3 (Post Office Protocol, version 3) or IMAP (Internet Message Access
Protocol, version 4). Using IMAP4, the email is downloaded to the client computer and typically
removed from the server. Using POP3 the client application manages the email while it remains
stored on the server.
c. FTP (File Transfer Protocol) is a client-server application that transfers files between two
computers, primarily using FTP. FTP uses encryption and is therefore extremely secure.
d. The Telnet protocol is a command-line application included in many operating systems, but
transmissions in Telnet are not encrypted. This has caused Telnet to be largely replaced by
other, more secure programs, such as the ssh command in the Linux operating system.
Question 3
Which one of the following applications could be used to run a website from a server?
a. Hypertext Transfer Protocol
b. FileZilla
c. Microsoft Exchange Server
d. Ngnix