Imagine that a host with IP address 162.34.42.84 wishes to download a file from the web server at IP address 190.18.20.132. Select a valid socket pair for a connection between this pair of hosts.
a. 162.34.42.84:150 and 190.18.20.132:80
b. 162.34.42.84:80 and 190.18.20.132 :3500
c. 162.34.42.84:2000 and 190.18.20.132:80
d. 162.34.42.84:80 and 190.18.20.132:80
The answer is: 162.34.42.84:2000 and 190.18.20.132:80
Generally, available port numbers will start from 2000. So, the source address will have socket port as 2000.
We are trying to download from web server. So, the destination address will have port as 80.
Imagine that a host with IP address 162.34.42.84 wishes to download a file from the web...
Besides IP address, what is the other major component that defines a socket? Compare the three types of sockets that are mainly used for programming (e.g., Java programming)? What is a loopback and when is it used? Imagine that a host with IP address 150.55.66.77 wishes to download a file from a default web server at IP address 202.28.15.123. Give an example of a valid socket pair for a connection between this pair of hosts.
The following information was obtained from a host: IP address……………205.133.127.8/24 Default Gateway…… 205.133.127.1 DNS Server………….139.100.110.10 HOSTS file entries: 140.20.10.55 www.myut.utoledo.edu 140.20.10.55 myut.utoledo.edu 127.0.0.1 www.cnn.com 127.0.0.1 cnn.com Describe the sequence of events (in detail) that would occur if this host attempts to: a) Load the Web Site of the following Domain Names using a Web Browser. http://www.utoledo.edu http://www.cnn.com
. Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number 37 and destination port number 61. What are the source and destination port numbers for the segments traveling from Host B to Host A? . Suppose a process in Host C has a UDP socket with port number 6789. Sup- pose both Host A and Host B each send a UDP segment to...
A/ Given the following IP address from the Class B address range using the default subnet mask: 100.110.0.0. Your network plan requires no more than 64 hosts on a subnet. When you configure the IP address in Cisco IOS software, which value should you use as the subnet mask? 255.255.0.0 255.255.128.0 255.255.255.128 255.255.255.252 B/ Identify how many valid host addresses can you have on 192.168.27.32 network with a subnet mask of 255.255.255.240. (2^4) - 2 (2^3) – 2 (2^2)...
This is used to separate the host address and network address from an IP address The command ipconfig/renew will renew an IP address obtained from what server?
14. (10 Points) Suppose Proces A running on Host Process B running on Host Y vi running on Host Z is communicating with Process via a TCP connection. Let x, y, and z be the IP addresses o and Host Z, respectively. Assume the port number o the port number of Process B is 464 26145, and the port number of Process D is 80. a. What are the identifiers of the socket associated with Process B when it is...
In a class B subnet, we know the IP address of one of the hosts and the subnet mask as given below: IP Address: 188.48.82.176 Subnet mask: 255.255.255.248 1) What is the first valid host address in the subnet? (in dotted decimal) 2) What is the last valid address in the subnet? (in dotted decimal) 3) What is the subnet network address? (in dotted decimal) 4) What is the subnet broadcast address? (in dotted decimal) 5) What is the number...
Wild Mask Example 220.78.168.0-A 220.78.175.0-B Web server IP add is 221.79.176.1 Wild Mask/mask A B And XOR 11011100 010011101010100000000000 Network 11011100 0100111010101111 00000000 11011100 010011101010100000000000220.78.168.0 000000000000000000000011100000000 0.0.7.255 255.255.248.0 What would be the implication for the following ACL? Access-list 101 permit tcp 220.78.168.0 0.0.7.255 host 221.79.176.1 eq 80 Questions: How many subnets can access the web server? How many hosts can access the web server?
Suppose MegaBigCompany.com has an IP address range of 222.22/16 and sets up its firewall rules table as below. Select the packet(s) or c which will go through the firewall. Firewall Rules table from Section 8.9.1 (Firewalls) on col e Port Dest Port IP outside of allow 222.22/16 TCP 1023 80 any 222.22/16 allow outside of 222.22/16 222.22/16TCP 80 1023ACK outside of o 222.22/16 222.22/16 allow 53- outside of allow 222.22/16 UDP 53 1024 222.22/16 all all O A. A user...
An IP address is a 32-bit number that uniquely identifies a host (computer or other device, such as a printer or router) on a TCP/IP network. IP addresses are normally expressed in dotted-decimal format, with four numbers separated by periods, such as 192.168.123.132. To understand how subnet masks are used to distinguish be- tween hosts, networks, and subnetworks, examine an IP address in binary notation. For example, the dotted-decimal IP address 192.168.123.132 is (in binary notation) the 32 bit num-...