The following information was obtained from a host:
IP address……………205.133.127.8/24
Default Gateway…… 205.133.127.1
DNS Server………….139.100.110.10
HOSTS file entries: 140.20.10.55 www.myut.utoledo.edu
140.20.10.55 myut.utoledo.edu
127.0.0.1 www.cnn.com
127.0.0.1 cnn.com
Describe the sequence of events (in detail) that would occur if this host attempts to:
a) Load the Web Site of the following Domain Names using a Web Browser.
http://www.utoledo.edu
http://www.cnn.com
For http://www.utoledo.edu:
1. The host types "http://www.utoledo.edu" in the address bar of
the web browser from its own IP address "205.133.127.8/24".
2. The browser checks the cache for a DNS record for the IP
address(140.20.10.55) which corresponds to
"http://www.utoledo.edu".
There are 4 caches where the DNS record is searched for:
a) Browser cache: It keeps the records of DNS entries
previously accessed for a certain amount of time.
b) OS cache: If not found in the browser cache, search
in the OS cache.
c) Router cache: If not found in the OS, search in
host system's router.
d) ISP cache: If all 3 above don't yeild any result,
ISP cache is the final checkpost.
As in our case, we notice that there are host entries agains this
website, so we find it in browser cache itself.
Hence the server knows the domain name server and name server and
retrieves the matching IP address.
3. After the browser receives the correct IP address, it will build
a TCP connection via a three-way-handshaking protocol, with the
server that matches IP address to transfer
information.
4. Once the TCP connection is established, it starts transfering
data. The browser sends a GET request requesting for web page with
name "utoledo.edu".
5. The server contains a web server which receives the request
handler to read and generate a response for the request. The
request handler is a module that reads the requests from the hosts,
the header information and cookies (if any), then it creates a
response in JSON,XML or HTML format.
6.The server response contains the web page you requested as well
as the status code, compression type , cache-control, cookies,
privacy information, etc.
For http://www.cnn.com:
1. The host types "http://www.cnn.com" in the address bar of the
web browser from its own IP address "205.133.127.8/24".
2. The browser checks the cache for a DNS record for the IP
address(127.0.0.1) which corresponds to "http://www.cnn.com".
There are 4 caches where the DNS record is searched for:
a) Browser cache: It keeps the records of DNS entries
previously accessed for a certain amount of time.
b) OS cache: If not found in the browser cache, search
in the OS cache.
c) Router cache: If not found in the OS, search in
host system's router.
d) ISP cache: If all 3 above don't yeild any result,
ISP cache is the final checkpost.
As in this case, we find that there are no host
entries for "http://www.cnn.com", there fore the subsequent caches
are checked for.
3. If the requested URL is not in the cache,as in our case, ISP's
DNS initiates a DNS query to find the correct IP address for the
website.
a)ISP's DNS server will contact the root name, here
".com" domain name server.
b)".com" domain name server will redirect it to
"cnn.edu" name server.
c)"cnn.edu" name server will find the matching for the
IP address "127.0.0.1" in its' DNS records and send it back to the
browser.
4. After the browser receives the correct IP address, it will build
a TCP connection via a three-way-handshaking protocol, with the
server that matches IP address to transfer
information.
5. Once the TCP connection is established, it starts transfering
data. The browser sends a GET request requesting for web page with
name "cnn.com".
6. The server contains a web server which receives the request
handler to read and generate a response for the request. The
request handler is a module that reads the requests from the hosts,
the header information and cookies (if any), then it creates a
response in JSON,XML or HTML format.
7.The server response contains the web page you requested as well
as the status code, compression type , cache-control, cookies,
privacy information, etc.
The following information was obtained from a host: IP address……………205.133.127.8/24 Default Gateway…… 205.133.127.1 DNS Server………….139.100.110.10 HOSTS...
Question: Your Answer: What is the IP Address of the computer? If this computer could reach the Internet but could not resolve names on the Internet, assuming that these settings are correct, which computer would you check to make sure it is running? What is the fully qualified domain name for this computer? What is the MAC address of this Network Adapter? What is the IP address of the device that provided the computer IP Address? What is the CIDR...
Imagine that a host with IP address 162.34.42.84 wishes to download a file from the web server at IP address 190.18.20.132. Select a valid socket pair for a connection between this pair of hosts. a. 162.34.42.84:150 and 190.18.20.132:80 b. 162.34.42.84:80 and 190.18.20.132 :3500 c. 162.34.42.84:2000 and 190.18.20.132:80 d. 162.34.42.84:80 and 190.18.20.132:80
please give me clear picture Section 1: DNS nslookup The Domain Name System (DNS) translates hostnames to IP addresses, fulfilling a critical role in the Internet infrastructure. In this lab, we’ll take a closer look at the client side of DNS. Recall that the client’s role in the DNS is relatively simple – a client sends a query to its local DNS server, and receives a response back. Much can go on “under the covers,” invisible to the DNS clients,...
A/ Given the following IP address from the Class B address range using the default subnet mask: 100.110.0.0. Your network plan requires no more than 64 hosts on a subnet. When you configure the IP address in Cisco IOS software, which value should you use as the subnet mask? 255.255.0.0 255.255.128.0 255.255.255.128 255.255.255.252 B/ Identify how many valid host addresses can you have on 192.168.27.32 network with a subnet mask of 255.255.255.240. (2^4) - 2 (2^3) – 2 (2^2)...
Addressing Table IPv4 Address Subnet Mask Device Interface Default Gateway IPv6 Address/Prefix IPv6 Link-local N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A G0/O 2001 DB8:ACAD:: 1/64 FE80::1 G0/1 2001:DB8:ACAD:1:1/64FE80::1 R1 G0/2 2001:DB8:ACAD:21/64FE80::1 172.16.1.2 2001:DB8:2::1/64 209.165.200.226 2001:DB8:1::1164 172.16.1.1 2001:DB8:2:2/64 255.255.255.252 FE80::1 255.255.255.252 FE80::2 255.255.255.252 FE80:2 S0/0/1 S0/0/0 Central S0/0/1 S1 S2 S3 VLAN 1 VLAN 1 VLAN 1 Staff NIC 2001:DB8:ACAD::2/64FE80::2 FE80::1 Sales 2001 DB8:ACAD:1:2/64FE80::2 FE80::1 IT 2001 DB8:ACAD:2: 2/64 FE80::2 64.100.0.3 2001 DB8 CAFE::3/64 192.168.0.196 2001:DB8...
on calculations can i see how did the expect come to the solution ,all the workout should be included QUESTION 1 A file of size F = 8 Gbits needs to be distributed to10 peers. Suppose the server has an upload rate of u = 68 Mbps, and that the 10 peers have upload rates of: u1 = 20 Mbps, u2 = 22 Mbps, u3 = 12 Mbps, u4 = 19 Mbps, u5 = 25 Mbps, u6 = 24 Mbps,...
ANSWER NETWORKS QUESTIONS (MCQS AND CALCULATIONS) QUESTIONS ( 11 - 20) QUESTION 11 1. Consider the following excerpt from a simple server side UDP program: Server.py from socket import * sName=’127.0.0.1’ sSocket=socket(AF_INET,SOCK_DGRAM) sSocket.bind((sName, 12005)) while True: msg, cAddr =sSocket.recvfrom(2048) newMsg = msg.decode().lower() sSocket.sendto(*********************) What code could be used to replace the **********’s in line 8? newMsg.encode(), cAddr newMsg.encode() msg.encode(), cAddr msg.encode() none of the above 1 points QUESTION 12 For a client to obtain an IP address from the local...
Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.) APIPA DHCP DNS Static IP addressing You need to install a new Windows 10 machine into Site A with a subnet mask of 255.255.255.224. Which TCP/IP address can you assign to the new Windows 10 machine as a valid host address? 192.168.2.63 Which subnet mask would you utilize if you had a class C network and you wanted to connect 23 branch offices back...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...