a) What is the path taken the packet of data from your computer to Google?
b) How does your computer find the location google.com?
c) Explain how the data gets back from Google if your public IP address (shear to Google) is different than your private IP address. How does Google’s response (over http) make it back to the proper destination especially since your computer uses a subnet?
1.
The above screenshot shows the command to get the routes in which my computer establishes the connection and the time taken to establish the connection and the different servers or data centers ip address mentioned from source to destination.
2.When you type www.google.com, the DNS recursor will contact the root name server. The root name server will redirect it to .com domain name server. .com name server will redirect it to www.google.com name server. www.google.com name server will find the matching IP address for www.google.com in its’ DNS records and return it to your DNS recursor which will send it back to your browser. These requests are sent using small data packets which contain information such as the content of the request and the IP address. These packets travel through multiple networking equipment between the client and the server before it reaches the correct DNS server. This equipment use routing tables to figure out which way is the fastest possible way for the packet to reach its’ destination. If these packets get lost you’ll get a request failed error. Otherwise, they will reach the correct DNS server, grab the correct IP address, and come back to your browser.
3. The browser which is installed in
your computer receives the correct IP address from the server and
it will build a connection with the server that matches IP address
to transfer information. Browsers use internet protocols to build
such connections. The most common protocol used is TCP for any type
of HTTP request.
So a TCP connection will be established between my browser and
server. This connection is established using a process called the
TCP/IP three-way handshake also includes subnet address. This is a
three step process where the client and the server exchange
SYN(synchronize) and ACK(acknowledge) messages to establish a
connection.
1. Client machine sends a SYN packet to the server over the
internet asking if it is open for new connections.
2. If the server has open ports that can accept and initiate new
connections, it’ll respond with an Acknowledgment of the SYN packet
using a SYN/ACK packet.
3. The client will receive the SYN/ACK packet from the server and
will acknowledge it by sending an ACK packet.
Once the TCP connection is established, it is time to start
transferring data! The browser will send a GET request asking for
www.google.com web page. This request will also contain additional
information such as browser identification, types of requests that
it will accept, and connection headers asking it to keep the TCP
connection alive for additional requests.
a) What is the path taken the packet of data from your computer to Google? b)...
PING: Finding Other Computers The PING sends a small packet to any computer on the Internet to show you how long it takes the packet to travel from your computer to the target computer and back again. You can ping a computer using its IP address or Web URL Not all computers respond to ping commands, so not every computer you ping will answer. Start by pinging your default gateway: just type PING followed by the IP address of your...
PLEASE ATTACH A SCREENSHOT OF YOUR SUCCESSFUL PING IN PACKET TRACER FOR THE END!!!!!!!!!!! THANK YOU! Objectives Part A: Configure a simple static routing . Part B: Configure a simple RIP routing Part A: Configure a simple static routing 1. Create the following network topology on Packet Tracer Router-PT Router-PT Addressing Table Device Interface IP Address Subnet Mask Default Gatewa 10.0.0.1 20.0.0.1 30.0.0.1 20.0.0.2 0.0.0.10 30.0.0.10 N/A 255.0.0.0 255.0.0.0 255.0.0.0 255.0.0.0 255.0.0.0 255.0.0.0 Routero 2/0 NIA NIA NIA 10.0.0.1 30.0.0.1...
Test Your Understanding 10. a) Distinguish between Step 1 and Step 2 in the routing process. b) If any row other than the default row matches an IPv4 address, why will the router never choose the default row? c) Which rows in Figure 8-11 match 128.171.17.13? (Don't forgst the default row.) Show your calculations for rows that match. d) Which of these is the best-match row? Justify your answer. e) What rows match 172.40.17.6? Show your calculations for rows that...
Question 26 (1 point) In Lab 1 (Exploring Encryption), what did you need to configure on the server or on the client? Question 26 options: Only (a) and (b) (c) The client's public key (a), (b), and (c) (a) The server's certificate (b) Enable TLS on the server Save Question 27 (1 point) The following question is Lab 2 related (Ports and Firewalls). At what point does the HTTP daemon service actively begin listening for traffic on the network? Question...
can you please help me with this homework. DCOM 101 – Introduction to Data Communications Final Project Instructions: In this Final Project, you will test the skills and knowledge gained throughout this course. The steps listed below are loosely based on the Assignments you have completed thus far, so don’t hesitate to look back and use those resources. Follow the steps in each section, and paste screenshots when prompted. This assignment is worth 10% of your final grade. Basic Network...
In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...
computer networks help please !!! could someone help with the following tasks! ANY HELP WILL BE IMMENSELY APPRECIATED! THANKS. Task 1 In the following scenario, we would like to find out more information about a host that is on out network. Given an IP address we would like to search for additional information, we can start with obtaining the IP address off the default route. When running on a Linux VM, this like most likely to be the internal IP...
Project 4-3: In the following steps, you will learn more about the PING (Packet Internet Grouper) utility, which can be used on a network running IPv4 to verify that TCP/IP is configured correctly and communicating with the network. A ping test is typically the first thing network professionals try when troubleshooting a TCP/IP connection problem. For this project, you can use any type of workstation that's running TCP/IPv4, preferably one connected to the Internet. The output described in the following...
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...
Computer Architecture Project Description: farh-to-cel.asm : # Revised and added code taken from Hennesey and Patterson 5th edition # to work with this simulator. # # Prompts a user to enter a Fahrenheit temperature as a floating point. # Displays the converted temperature in Celcius. # 10/28/2015 .data const5: .float 5.0 # store a floating point constant 5.0 const9: .float 9.0 const32: .float 32.0 .align 2 # align the next string on a word boundary .space 100 prompt: .asciiz "Please...