• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/11)
      • C4.1 (9/25)
      • C6.1 (10/9)
      • C8.1 (10/23)
      • C9.1 (10/30)
      • C10.1 (11/6)
      • C11.1 (11/13)
    • Practical Assignments
      • PA1.1 (Due 9/11)
      • PA2.1 (Due 9/18)
      • PA4.1 (Due 10/2)
      • PA5 (Due 10/9)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/30)
      • PA9.1 (Due 11/6)
      • PA10.1 (Due 11/13)
      • PA11.1 ( Due 11/20)
      • PA12.1 (Due 11/27)
      • PA13 (Due 12/4)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/18)
      • WA3.1 (Due 9/25)
      • WA4.1 (Due 10/2)
      • WA6.1 (Due 10/16)
      • WA8.1 (Due 10/30)
      • WA9.1 (Due 11/6)
      • WA10.1 (Due 11/13)
      • WA12.1 (Due 11/27)
      • WA13.1 (Due 12/4)
  • Webex
  • Gradebook

ITACS 5209 F17

Temple University

Week 12 Written Assignment

Refer to the “philosophy” sections of RFC 793 to answer the following questions about TCP:

  1. What is the URL you used to access RFC 793?
  2. Described 6 ways TCP mitigates the inherently unreliable Internet Protocol
  3. Throughout the RFC, the authors frequently refer to the term “octet”.  What is an octet?
  4. What is a “window”, and why do you suppose the receiving TCP defines this?
  5. What does it mean when the RFC states that TCP sockets are “full duplex”?
  6. Review section 2.8 (Data Communication), then review the introduction of RFC 896, which describes John Nagle’s algorithm.  How do Nagle’s observations relate to section 2.8?
  7. Review section 2.9, specifically where it discusses security.  This is a rather short section that addresses what today is a major consideration of TCP.  Do you think the methods mentioned in this section are used today?
  8. How are sequence numbers used in TCP, and how does TCP ensure they are unique?
  9. Review the scenarios described in section 3.4 (Establishing a connection).  What is the “three-way handshake”?  Describe “half-open connection discovery”.

Refer to RFC 768, which describes UDP:

  1. What is the primary difference between UDP and TCP?  Why do you think the UDP RFC is so much shorter than TCP’s?
  2. The RFP mentions some appropriate uses of UDP; what technologies rely on UDP today that perhaps the authors of this RFP did not foresee in 1980?

Refer to RFC 792, which describes ICMP:

  1. What are the primary purposes for which ICMP was designed?
  2. Why do you think many networks and firewalls block ICMP?

Refer to RFC 1149, which describes a standard for avian carriers for IP:

  1. What would you estimate is the speed of delivery using this protocol, as opposed to TCP?
  2. Does this protocol appear to be as reliable as TCP?

Refer to RFC 2795, which refers to IMPS:

  1. What are the four types of documents the author postulates could be generated using this protocol?

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in