Hiding Ip Address Using Anonymous Proxy Server

Published on June 2016 | Categories: Documents | Downloads: 29 | Comments: 0 | Views: 1085
of 8
Download PDF   Embed   Report

Comments

Content

ITT730

ASSIGNMENT 2

Due: 3.00PM; 24 Mac 2012

Answer ALL Questions. (Submit your answers in a filename: A2-Your name to [email protected]) 1. a) What is 11001010 in decimal? 202

b) Express the following IP address in binary: 128.171.17.13. (Hint: 128 is 10000000. Put spaces between each group of 8 bits.) 10000000. 10101011. 00010001. 00001101

c) Convert the following address in binary to dotted decimal notation: 11110000 10101010 00001111 11100011. (Spaces are added between bytes to make reading easier.) (Hint: 11110000 is 240 in decimal.) 240.170.15.227

2.

a) What kind of connection do you have at home? Broadband

3.

Go to the command line. Clear the screen. What kind of command do you get? Microsoft Windows [Version 6.1.7601] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Users\HafizaH>

4.

Use ipconfig/all or winipconfig. a) What is your computer’s IP address? 183.78.19.149

b) What is its Ethernet address? 183.78.19.149

c) What is your default router (gateway)? 172.20.196.1

NOOR HAFIZAH CHE ALI - 2011110701

d) What are the IP addresses of your DNS hosts? 183.78.0.142

e) What is the IP address of your DHCP server? 172.20.196.1

f) When you get a dynamic IP address, you are given a lease specifying how long you may use it. What is the starting time of your lease and the ending time? Lease Obtained. . . . . . . . . . : Monday, March 19, 2012 9:55:47 PM Lease Expires . . . . . . . . . . : Monday, March 19, 2012 11:25:47 PM

5.

Ping a host whose name you know and that you use frequently. What is the latency? If this process does not work because the host is behind a firewall, try pinging other hosts until you succeed. Approximate round trip times in milli-seconds: Minimum = 72ms, Maximum = 81ms, Average = 75ms

6.

Ping 127.0.0.1. Did it succeed? Yes. It did.

7.

Do a tracert on a host whose name you know and that you use frequently. You can stop the tracert process by hitting Control-C. a) What is the latency to the destination host? 98 ms

b) How many routers are there between you and the destination host? If this does not work because the host is behind a firewall, try reaching other hosts until you succeed. 13

8.

Distinguish between the information that ping provides and the data that tracert provides.

NOOR HAFIZAH CHE ALI - 2011110701

All 4 packets sent are received, then the connection is working fine. The first line is the command I typed: ping www.google.com.my. The next line shows the full name of the host, as found by the ping program. The number 209.85.175.94 is the IP address of the host. The next four lines show whether or not the host replied, with how many bytes (size of packet), round trip time (in milliseconds), and the TTL is how many routers the packet will go through before giving up trying to find the host. The last lines show the statistics from pinging the host. They include how many packets were sent, received, and lost. Also shown are round trip times and averages

The first line is the command I typed: tracert www.google.com.my. The next line shows the traceroute program acquiring the ip address from the domain. "Maximum of 30 hops" is how many routers the packet will go through before giving up trying to find the host. The next lines show each server the packets traveled through to get to the destination www.google.com.my.These show both the IP address and domain name of the actual servers that the packets passed through. Traceroutes can show where there is a break in our connection. This allows us to determine exactly where our packets are being dropped or lost. Dropped or lost packets on a traceroute will usually show as asterisks (*).

9.

Find the IP address for Microsoft.com and Apple.com. Host Name : Microsoft.com IP Address : 207.46.232.182 and 207.46.197.32 Host Name : Apple.com IP Address : 17.172.224.47 and 17.149.160.49

10.

a) Look up RFC 1149. What kind of information do you get? Standards Requests For Comment.A Standard for the Transmission of IP Datagrams on Avian Carriers

NOOR HAFIZAH CHE ALI - 2011110701

b) In layperson’s terms, what does this RFC specify? A document produced by the IETF that may become designated as an Official Internet Protocol Standard. It specify on the needs for software and two hosts to communicate

c) What are its sections? (This is a serious question. You should learn how RFCs are structured.) STD, FYI and BCP

d) On what day was it created? April 7, 1969

11.

a) In telephony, what is a circuit? Circuits give reserved capacity to the other party for the duration of the call ◦ ◦ On every switch along the way On every line along the way

b) What two types of circuits can corporations use to link terminals with hosts? Dial-up circuit Leased line circuit

c) Compare and contrast these two types of circuits. Dial-Up Circuit For homes and businesses Can call anyone Reserved capacity for duration of a call Low speeds for data (30 to 60 kbps) Inexpensive Leased Line Circuit For businesses Point-to-point connection between two sites Always on with reserved capacity Speeds of megabits or gigabits per second Expensive

d) What is good about reserved capacity? Reserved capacity is reasonably efficient for voice conversations

e) What is bad about reserved capacity? Reserved capacity is inefficient (and therefore expensive) for data transmissions NOOR HAFIZAH CHE ALI - 2011110701

f) What does it mean that data traffic is bursty? Bursty traffic refers to an uneven pattern of data transmission: sometime very high data transmission rate while other time it might be very low

g) Why is circuit switching very inefficient for bursty data traffic? Circuit switching’s reserved capacity is inefficient (and therefore expensive) for data transmissions, in which there are high-speed bursts separated by long silences in which expensive reserved capacity goes unused.

12.

a) In packet switching, what does the source host do? Fragments the application message into many smaller pieces called packets

b) About how long is a packet? 100 bytes

c) Why is fragmentation done? Easier for error correction. If there is an error transmission that destroy a packet, only the lost packet needs to be resent.

d) Where is reassembly done? At receiver

e) What is the benefit of multiplexing? Save money by multiplexing multiple conversations over expensive circuits.

f) Why is packet switching good for bursty data traffic? Packets of different conversations share the cost of trunk lines between packet switches. This makes packet switching inexpensive and suitable for bursty data traffic

g) When a packet switch receives a packet, what decision does it make? Go to the next switch

h) Do packet switches know a packet’s entire path through a network? No

NOOR HAFIZAH CHE ALI - 2011110701

13.

Why does it make sense to make only the transport layer reliable? This is not a simple question. Because transport layer usually is a fix up layer that supplies the functionality that the internet layer lacks.

14.

a) What does it mean that data transmission is bursty? There are bursts of traffic followed by long silences.

b) Why is burstiness bad in circuit switching? Burstiness is bad for circuit switching because circuit switching provides constant reserved capacity, much of which will go unused with bursty transmission. The user has to pay for reserved capacity whether or not it is used.

15.

What layer fragments application messages so that each fragment can fit inside an individual packet? Transport layer

16.

a) What device connects different networks into an internet? Router

b) What is the old name for this device? Gateways

17.

a) Distinguish between internet with a lower-case i and Internet with an uppercase I. ◦ ◦ With an upper-case “I,” Internet means the global Internet we use every day. With a lower-case “i”, internet means any internet or the internet layer.

b) Why are many networking concepts duplicated in switched networks and internets? Internetworking required adding a second layer of networking, duplicating concepts but with different names.

c) What are the two levels of addresses? 48-bit MAC address 10-bit DLCI address

NOOR HAFIZAH CHE ALI - 2011110701

d) How long are IP addresses? 32 bits

e) How are IP addresses usually expressed for humans? In dotted decimal notation. In this notation, the IP address broken into four 8-bit segment.

f)

Distinguish between packets and frames. Packets A message at the internet layer Frames A message at the data link layer

g) A host transmits a packet that travels through 47 networks. How many packets will there be along the route? 1 packet

h) How many frames will there be along the route? 47 frames

i)

Distinguish between switches and routers. Switch A device that forwards frames within a single network Router A device that forwards packets within an internet. Routers connect two or more single networks

j) Distinguish between physical links, data links, and routers. Physical Link A connection linking adjacent devices on a network Data Link The path that a frame takes across a single network (LAN or WAN) Router A device that forwards packets within an internet. Routers connect two or more single networks.

k) Distinguish between what happens at the internet and transport layers. Transport Layer Packet assembly and assembly, error correction, packet sequencing, congestion control Internet Layer Packet organization and forwarding

NOOR HAFIZAH CHE ALI - 2011110701

l) Why are application layer standards needed? To communicate between applications

m) List the numbers and names of the five layers. Number Layer 5 Application 4 Transport 3 Internet 2 Data Link 1 Physical

n) Are frames carried inside packets? No, packet always travel inside frames

18.

a) What are the roles of the Internet Protocol? This layer deals with addresses, so addresses on an internet are called IP addresses

b) What are the roles of the Transmission Control Protocol? ◦ Provides transport layer functionality to fix problems

c) When would the User Datagram Protocol be used at the transport layer? When applications do not need error correction or cannot wait for errors to be corrected. Example: VoIP cannot wait for packet retransmission because voice must flow in real time. Consequently, VoIP uses UDP at the transport layer instead of TCP.

19.

What three networks were involved in the first test of the TCP/IP standards? ARPANET, PRNET and SATNET

20.

Both DHCP servers and DNS servers send a host an IP address. These are the IP addresses of what hosts? Originating host

GOOD LUCK!

NOOR HAFIZAH CHE ALI - 2011110701

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close