Answer all questions in a series of html files. When these files are completed
send mail to bennett@mcs.kent.edu with the location of the web page where these
are located.
The due date for this exam is 11:59 pm on Tuesday May 11 1999.
The normal university rules on plagiarism and copying apply. If you quote
work from another source, make sure you provide proper references.
All work is expected to be your own. You may not reference or use solutions
to past exams,
or other student's work. You may use other documentation.
- What becomes of IP Packets that are unable to reach their destination?
Justify your answer.
- Describe the relationship between an X server and an X client.
- Describe the operation of DNS. Be sure to cover all classes of name
serves and resolvers. Include a diagram, and an example
name resolution from a.b.d to w.x.y.z where none of the names are cached.
- What is the secure shell? How does it work?
What will the secure shell protect a site from? What will it not protect
a site from? What are the costs (financial and otherwise) associated with
running the secure shell at your site?
- Describe the operation of a fontserver. Use the implementation of the
font server on forrestal for your answer. Discuss all of the programs involved.
Give an example session of the interaction of these programs.
- Describe the difference between starting a daemon with init and starting
a daemon with inet. Give clear examples of daemons which should be started from
each. Explain and justify your examples.
- Compare and contrast: domain names and subnets.