Find the rfc which defines ftp protocol

Assignment Help Computer Networking
Reference no: EM1365019

Tools needed for the assignment:
Download a HEX editor from the web that can be used in analyzing your programs/data generation

Find the RFC that defines the FTP protocol.
1. Take any non text file (e.g. word document, mpg, excel or any application centric file)
2. Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload section of an FTP datagram
3. Encapsulate the FTP datagram into TCP datagram (generation of TCP packets)
4. Take the TCP datagram and encapsulate it into an IP Packet
5. Repeat steps 1-3 until all the contents of the file have been segmented and the corresponding IP packets have been generated.
6. Dump the generated IP packets into a different File.
7. Use the hex editor (or any other tool) to compare the payload content of the IP packet and the original read file to ensure that the contents were not corrupted. Use can use any values within the IP and the TCP header fields. Explain why you chose those values. Make sure the TCP and the IP checksums are properly calculated. Assume that the maximum IP packet size can be of 1400 octets (bytes). Assignment due on October 1, 2008

Reference no: EM1365019

Questions Cloud

Determine the standard deviation of a portfolio : Suppose two securities, A and B, with standard deviations of 30 percent and 40 percent, respectively. Determine the standard deviation of a portfolio weighted equally between two securities,
What are areas addressed in cbk : What are the areas addressed in the CBK? Was policy explicitly listed? If not, where do you feel it is addressed in the CBK?
Role of leadership in managing quality initiatives : Use three scholarly research articles on the role of leadership in managing quality initiatives in healthcare. Use articles that demonstrate three different styles of leadership, e.g. servant, transformational, transactional, etc.
What is an average force on the child : why is it advisable to make use of a proper restraining seat rather than hold a child on your lap.
Find the rfc which defines ftp protocol : Find the RFC that defines the FTP protocol. Take any non text file (e.g. word document, mpg, excel or any application centric file) Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload sect..
Portfolio analysis and investment seminar : Suppose you have asked to participate in a portfolio analysis and investment seminar where you will be providing data to potential investors.
Basic types of conflict : Discuss the four basic types of conflict ( goal, cognitive, effective and procedural). Which type of conflict do you think occurs most often in healthcare? What are some of the pros and cons of conflict?
Differences between face-to-face and virtual presentations : Assess and explain the principal differences between face-to-face and virtual presentations.
Find the speed of the test charge : find the speed of the test charge. find the distance the car travels during this time in m.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining dns resolver queries

When a DNS resolver queries the name server, does case of the domain name affect response?

  Explaining web-based interface running on another serve

Display it via a Web-based interface running on another server. What are security issues that could plague this solution if not attended to?

  Determine maximum value in ring if there is unique initiator

Design an algorithm that, under the standard set of assumptions (bidirectional links, total reliability, connectivity), determines maximum value in the ring assuming that there is a unique initiator.

  Explaining dynamic open architecture radio system

Discuss how initiatives like the Dynamic Open Architecture Radio System (DOARS) Project and the National Task Force on Interoperability (NTFI) are paving the way for more efficient.

  Attack can be detected and mitigated by stateless firewall

For each of the following attacks, say whether the attack can be detected and mitigated (to a significant degree) by a stateless or stateful firewall. Explain briefly.

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  List possible ways to interconnect three computers

List as many ways as possible to interconnect the three computers so that they could operate on one local area network.

  Modify hosts file to map yahoo-s ip address

Modify the hosts file to map www.google.com to yahoo's IP address and try to do a google search. Remove the modification to the host file and repeat.

  Cloud computing like elastic scalability and outsourcing

It also help business to use the best features of cloud computing like, elastic scalability and outsourcing. what are your toughts on the above statement? Do you agree or disagree?

  Explaining decryption function

Determine the decryption function. What is the decrypted plaintext?

  Criteria a company chooses for use edi and an extranet

When a company opens a private market space, it may use EDI, an extranet, EDI/Internet, various web services, XML or just the Internet with regular encryption.

  Certificate authority with well-known public key

Suppose there is a Certificate Authority (CA) with well-known public key. Further suppose every user is issued a certificate for his/her public key.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd