INTERNET INTRANET SOLVED QUESTIONS
Internet Service Provider (ISP) is an organization that provides users an access to the Internet by assigning IP addresses. Users are assigned IP addresses by ISP’s. ISPs obtain allocations of IP addresses from a National Internet Registry (NIR) or Local Internet Registry (LIR) or from their appropriate Regional Internet Registry (RIR).
Internet Service Provider (ISP) is an organization that provides users an access to the Internet by assigning IP addresses. ISPs obtain allocations of IP addresses from a National Internet Registry (NIR) or Local Internet Registry (LIR) or from their appropriate Regional Internet Registry (RIR).
In order to exchange traffic directly, two ISPs physically connect in places where they both have facilities, such as in an Internet exchange point. This is usually achieved by linking short wires between routers belonging to one ISP and routers belonging to a second ISP.
The distinguishing feature of following ISPs:
2. List advanced features of IPV6. Describe header format and IP datagram fragmentation process in IPv6. Describe internet RFC along with its streams.
The advanced feature of IPV6 are:
In IPv6, Traffic class and Flow label are used to tell the underlying routers how to efficiently process the packet and route it.
Another fact is, the header is less loaded, so routers can take forwarding decisions and forward them as quickly as they arrive.
IPV6 Basic Header Format:
An IPv6 basic header is fixed as 40 bytes long and has eight fields. Each IPv6 packet must have an IPv6 basic header that provides basic packet forwarding information, and which all devices parse on the forwarding path.
Fig. IPv6 Basic Header Format
Indicates version of Internet Protocol which contains bit sequence 0110.
The Traffic Class field indicates the class or priority of the IPv6 packet which is similar to the Service Field in IPv4 packet. It helps routers to handle the traffic based on priority of the packet. If congestion occurs on the router then packets with least priority will be discarded. As of now only 4-bits are being used (and remaining bits are under research), in which 0 to 7 are assigned to Congestion controlled traffic and 8 to 15 are assigned to Uncontrolled traffic.
Uncontrolled data traffic is mainly used for Audio/Video data. So we give higher priority to uncontrolled data traffic. Source node is allowed to set the priorities but on the way routers can change it. Therefore, the destination should not expect the same priority which was set by the source node.
Flow Label field is used by source to label the packets belonging to the same flow in order to request special handling by intermediate IPv6 routers, such as non-default quality of service or real time service. In order to distinguish the flow, intermediate router can use source address,
destination address and flow label of the packets. Between a source and destination multiple flows may exist because many processes might be running at the same time. Routers or Host that do not support the functionality of flow label field and for default router handling, flow label field is set to 0. While setting up the flow label, source is also supposed to specify the lifetime of flow.
It is a 16-bit (unsigned integer) field, indicating total size of the payload which tells routers about amount of information a particular packet contains in its payload. Payload Length field includes extension headers (if any) and upper layer packet. In case length of payload is greater than 65,535 bytes (payload up to 65,535 bytes can be indicated with 16-bits), then the payload length field will be set to 0 and jumbo payload option is used in the Hop-by-Hop options extension header.
Next Header indicates the type of extension header (if present) immediately following the IPv6 header. Whereas In some cases it indicates the protocols contained within upper-layer packet, such as TCP, UDP.
Hop Limit field is same as TTL in IPv4 packets. It indicates the maximum number of intermediate nodes IPv6 packet is allowed to travel. Its value gets decremented by one, by each node that forwards the packet and packet is discarded if value decrements to 0. This is used to discard the packets that are stuck in infinite loop because of some routing error.
Source Address is 128-bit IPv6 address of the original source of the packet.
Destination Address field indicates the IPv6 address of the final destination (in most cases). All the intermediate nodes can use this information in order to correctly route the packets
IPv6 Extension Headers:
An IPv4 packet header has an optional field (Options), which includes security, timestamp, and record route options. The variable length of the Options field makes the IPv4 packet header length range from 20 bytes to 60 bytes. When devices forward IPv4 packets with the Options field, many resources need to be used. Therefore, these IPv4 packets are rarely used in practice.
To improve packet processing efficiency, IPv6 uses extension headers to replace the Options field in the IPv4 header. Extension headers are placed between the IPv6 basic header and upper- layer PDU. An IPv6 packet may carry zero or more extension headers. The sender of a packet adds one or more extension headers to the packet only when the sender requests the destination device or other devices to perform special handling. Unlike IPv4, IPv6 has variable-length extension headers, which are not limited to 40 bytes. This facilitates further extension. To improve extension header processing efficiency and transport protocol performance, IPv6 requires that the extension header length be an integer multiple of 8 bytes.
When multiple extension headers are used, the Next Header field of an extension header indicates the type of the next header following this extension header. The Next Header field in the IPv6 basic header indicates the type of the first extension header, and the Next Header field in the first extension header indicates the type of the next extension header. If there are no extension
headers following the current one, the Next Header field indicates the upper-layer protocol type. Figure below shows the IPv6 extension header format.
An IPv6 extension header contains the following fields:
Internet RFCs with its streams
A Request for Comments (RFC) is a publication from the Internet Society (ISOC) and its associated bodies, most prominently the Internet Engineering Task Force (IETF), the principal technical development and standards-setting bodies for the Internet.
An RFC is authored by individuals or groups of engineers and computer scientists in the form of a memorandum describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems. It is submitted either for peer review or to convey new concepts, information, or occasional engineering humor.
The IETF adopts some of the proposals published as RFCs as Internet Standards. However, many RFCs are informational or experimental in nature and are not standards.The RFC system was invented by Steve Crocker in 1969 to help record unofficial notes on the development of ARPANET. RFCs have since become official documents of Internet specifications, communications protocols, procedures, and events.
There are four streams of RFCs:
• IETF:
The Internet Engineering Task Force (IETF) is an open standards organization, which develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP). It has no formal membership roster or membership requirements. All participants and managers are volunteers, though their work is usually funded by their employers or sponsors. The IETF is organized into a large number of working groups and birds of a feather informal discussion groups, each dealing with a specific topic. The IETF operates in a bottom-up task creation mode, largely driven by these working groups each of which has an appointed chairperson or co-chairs, a charter to describe its focus and what and when it is expected to produce. The basic mechanism of IETF is publication of proposed specifications, development based on the proposals, review and independent testing by participants, and republication as a revised proposal, a draft proposal, or eventually as an Internet Standard. All IETF documents are freely available over the Internet and can be reproduced at will. The IETF cooperates with the W3C, ISO/IEC, ITU, and other standards bodies.
The Internet Research Task Force (IRTF) focuses on longer-term research issues related to the Internet while the parallel organization, the Internet Engineering Task Force (IETF), focuses on the shorter term issues of engineering and standards making. The Internet Research Task Force (IRTF) promotes research of importance to the evolution of the Internet by creating focused, long- term research groups working on topics related to Internet protocols, applications, architecture and technology. The IRTF is managed by the IRTF chair in consultation with the Internet Research Steering Group (IRSG) which includes the IRTF chair, the chairs of the various Research Groups and other individuals (members at large) from the research community selected by the IRTF chair. The IRTF chair is responsible for ensuring that research groups produce coherent, coordinated, architecturally consistent and timely output as a contribution to the overall evolution of the Internet architecture. In addition to the detailed tasks related to research groups outlined below, the IRTF chair may also from time to time arrange for topical workshops attended by the IRSG and perhaps other experts in the field.
The Internet Architecture Board (IAB) is "a committee of the Internet Engineering Task Force (IETF) and an advisory body of the Internet Society (ISOC). Its responsibilities include Internet Standards Process oversight and appeal, architectural oversight of Internet protocols, liaising with other organizations on behalf of IETF, selection and appointment of IETF chair and area directors and IRTF chairs and the appointment of the Request for Comments (RFC) Editor. The IAB is also responsible for the management of the IETF protocol parameter registries and Internet standards documents (RFC series). It acts as source of advice and guidance to the Internet Society.
3. Explain different types of proxy array load balancing mechanism and also explain in detail which mechanism is appropriate for big ISPs.
Load balancing is a computer networking methodology to distribute workload across multiple computers or a computer cluster, network links, central processing units, disk drives, or other resources, to achieve optimal resource utilization, maximize throughput, minimize response time, and avoid overload. Proxy server is a server that acts as an intermediate between requests from clients seeking resources from other servers. Proxy array load balancing means a load balancing technique where multiple proxy servers operate as a single cache for client requests.
There are different types of proxy array load balancing mechanism which are described below:
- It saves network bandwidth by avoiding the query messaging between proxy servers.
It eliminates the duplication of content that occurs when proxy servers are grouped in arrays, resulting in faster response times and more efficient use of server resources.
Highly scalable
No new protocols are required
Along with all the devices mentioned above, we’ve assumed there is one access point in each lab and FTP, Mail Server along with a printer in the server room. Each building also has one router.
Physical devices required:
First, we will logically design the network topology as per the requirement then bill of quantity will be made.
We have assumed that the dedicated IP address is 103.5.150.16 and NAT has been used so that each network interface can have its own (private) IP. We assign private IP addresses from the class C range, the address assumed is 192.168.1.0/24.
Subnetting is required, VLSM will be used.
For each lab, there are 25 hosts so 5 bits is enough as it can support a maximum of (32-2)=30 hosts.
Subnetting and IP assignment for 4 labs
Lab/room |
Network IP address |
Broadcast IP address |
Number of addressable hosts |
Lab at DOECE building |
192.168.1.0/27 |
192.168.1.31/27 |
30 hosts (192.168.1.1 to 192.168.1.30) |
Lab at library building |
192.168.1.32/27 |
192.168.1.63/27 |
30 hosts (192.168.1.33 to 192.168.1.62) |
Lab at ICT building |
192.168.1.64/27 |
192.168.1.95/27 |
30 hosts (192.168.1.65 to 192.168.1.94) |
Lab at CIT building |
192.168.1.96/27 |
192.168.1.127/27 |
30 hosts (192.168.1.97 to 192.168.1.126) |
For our network server room, we need 3 hosts so 3 bits is enough as it can support a maximum of (8-2)=6 hosts. So the host part would be of 3 bits.
Room |
Network IP address |
Broadcast IP address |
Number of addressable hosts |
Network Server Room (CIT) |
192.168.1.128/29 |
192.168.1.135/29 |
6 hosts (192.168.1.129 to 192.168.1.135) |
For interconnection of Router 0 with routers 1, 2 and 3. Only 2 IPs are needed so 2 bits is enough. Host part of 2 bits and mask /30
Routers connected |
Network IP address |
Broadcast IP address |
Number of addressable hosts |
Router 1 (DOECE) <-> Router 0 |
192.168.1.136/30 |
192.168.1.139/30 |
2 hosts (192.168.1.137 and 192.168.1. 138) |
Router 2 (Library) <-> Router 0 |
192.168.1.140/30 |
192.168.1.143/30 |
2 hosts (192.168.1.141 and 192.168.1.142) |
Router 3 (ICT) <-> Router 0 |
192.168.1.144/30 |
192.168.1.147/30 |
2 hosts (192.168.1.145 and 192.168.1. 146) |
Specification Sheet / Bill Of Quantity
SN |
Item Description |
Quantity |
Units |
Summary Specification |
1 |
Router |
4 |
Pcs |
Variable specification; One at least must be capable of NAT. |
2 |
Switch |
9 |
Pcs |
24-port switch Cisco 2950-24 |
3 |
Firewall |
1 |
Pcs |
Varying Specs |
4 |
PCs |
96 |
Pcs |
Varying Specs |
5 |
Wireless AP |
4 |
Pcs |
50Mbps, Wireless N Router; 2.4 - |
2.4835GHz |
||||
6 |
Optic fiber cable |
500 |
m |
Provided by ISP |
7 |
CAT 6 UTP cable |
212 |
Pcs |
4-pair pure copper conductor PVC jacketed Foiled/UTP cable with TIA standard color 23AWG and having tested frequency range of 250-550 MHz, Support up to 1000Base-T at 100 meters |
8 |
Server Computer |
3 |
Pcs |
Mail server, FTP server, DHCP server |
9 |
Printer |
1 |
Pcs |
Varying Specs |
A figure of the intranet designed is given below:
5. Explain different types of virtual hosting with examples. Write down major steps while configuring the name based virtual hosting.
Virtual hosting is a method for hosting multiple domain names (with separate handling of each name) on a single server (or pool of servers). This allows one server to share its resources, such as memory and processor cycles, without requiring all services provided to use the same host name. The term virtual hosting is usually used in reference to web servers but the principles do carry over to other Internet services.
There are two main types of virtual hosting, name-based and IP-based:
/var/www/user/abc/site/, while request for www.bac.org, would make the server serve pages from /var/www/user/bac/site/.
For example: a server has two IPs 192.168.100.2 and 192.168.100.1 both listening to the same port. Then when a client makes request to 192.168.100.2, the server would send HTTP file from directory /var/www/user/two/site/ and for 192.168.100.1, the server would send HTTP file from directory /var/www/user/one/site/.
The major steps while configuring name based virtual hosting are listed below:
3. Restart the server for changes to take effect.
Say in a centos environment where Apaches process is called httpd
sudo systemctl restart httpd
6. Write short notes on:
WYSIWYG, an acronym for What You See Is What You Get, is a system in which editing software allows content to be edited in a form that resembles its appearance when printed or displayed as a finished product, such as a printed document, web page, or slide presentation. WYSIWYG implies a user interface that allows the user to view something very similar to the end result— while the document is being created. In general, WYSIWYG implies the ability to directly manipulate the layout of a document without having to type or remember names of layout commands.
The first true WYSIWYG editor was a word processing program called Bravo. Invented by Charles Simonyi at the Xerox Palo Alto Research Center in the 1970s, it became the basis for Simonyi's work at Microsoft and evolved into two other WYSIWYG applications called Word and Excel. An HTML WYSIWYG editor, such as Microsoft's FrontPage or Adobe's PageMill conceals the markup and allows the Web page developer to think entirely in terms of how the content should appear. Other common usages of WYSIWYG are programs that allow user to manipulate 3D models in stereo-chemistry, computer-aided design, and 3D computer graphics.
b. XML
Extensible Markup Language (XML) is a simple, very flexible text format derived from SGML (ISO 8879). The design goals of XML emphasize simplicity, generality, and usability across the Internet. It is a textual data format with strong support via Unicode for different human languages. Although the design of XML focuses on documents, the language is widely used for the representation of arbitrary data structures such as those used in web services.
XML tags identify the data and are used to store and organize the data, rather than specifying how to display it like HTML tags, which are used to display the data. XML is not going to replace HTML in the near future, but it introduces new possibilities by adopting many successful features of HTML.
There are three important characteristics of XML that make it useful in a variety of systems and solutions −
Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares many implementation details. DHCP allows hosts to obtain required TCP/IP configuration information from a DHCP server.
Every device on a TCP/IP-based network must have a unique unicast IP address to access the network and its resources. Without DHCP, IP addresses for new computers or computers that are moved from one subnet to another must be configured manually; IP addresses for computers that are removed from the network must be manually reclaimed. With DHCP, this entire process is automated and managed centrally. The DHCP server maintains a pool of IP addresses and leases an address to any DHCP-enabled client when it starts up on the network. Because the IP addresses are dynamic (leased) rather than static (permanently assigned), addresses no longer in use are automatically returned to the pool for reallocation.
DHCP provides the following benefits.
d. The efficient handling of IP address changes for clients that must be updated frequently, such as those for portable devices that move to different locations on a wireless network.
The forwarding of initial DHCP messages by using a DHCP relay agent, which eliminates the need for a DHCP server on every subnet.
Ajax (short for "Asynchronous JavaScript and XML") is a set of web development techniques using many web technologies on the client side to create asynchronous web applications. With Ajax, web applications can send and retrieve data from a server asynchronously (in the background) without interfering with the display and behaviour of the existing page. By decoupling the data interchange layer from the presentation layer, Ajax allows web pages and, by extension, web applications, to change content dynamically without the need to reload the entire page. In practice, modern implementations commonly utilize JSON instead of XML.
Ajax is not a single technology, but rather a group of technologies. HTML and CSS can be used in combination to mark up and style information. AJAX just uses a combination of:
Fig. How AJAX works Step-by-step process of how AJAX works:
6. The response is read by JavaScript
Proper action (like page update) is performed by JavaScript
An email agent is a program that is part of the email infrastructure, from composition by sender, to transfer across the network, to viewing by recipient. The best-known are mail user agents (MUAs, aka, email clients) and mail transfer agents (MTAs, programs that transfer email between clients), but finer divisions exist.
Email servers are built from one or more software packages, each of which carries out the functions of one or more MxA.
The three main types of Email agents, along with their respective functions are: