Questions By CC12

Saturday, October 3, 2009
How can one setup the browser to use proxy?
 
By CC12:
Sahana.P.Shankar
Sai Janaki Tejaswi P
Shruthi Raghavan
Raksha J

Qs from CC3(Sagar, Arpit, Prashant, Prateek)



Q's for CC7(Rishi and Group)

What is the need of using the proxy, if the IP is transparent(was mentioned in types of proxy)?
What Tunnel/IRC and SSL Proxy?? How they help security??

Q's for CC1(Soumya and Group)
Think that i have to send a mail what are the protocols involved? and explain the work of each layer in transmission of mail.


Team
Arpith
Prashant
Prateek
Sagar

PROTOCOL STACK AND ADDRESSING

Thursday, October 1, 2009
BY
CC01

Questions!!

@ Sowmya and group:
 
1. How is IP a connectionless protocol? Agreed that data can be transmitted without the consent of the reciever, but its not a rule which it follows always.
 
@ Rajani and group :
 
1.How secure is reverse proxy mechanisim? Consider google itself , if they use a combination of servers under same ip to handle the requests anybody else can do the same and pretend to be google right? This applies for any scenario where we can pretend to be some other standard servers? Is it possible? How secure is proxy mechanism?



--
Sahana

Video of protocol stack data transmission

Group cc01:
rashmi kamat
roopavani.r
soumya.v.n
suma.p

video of protocol stack data transmission:

Questions on 29th september presentations

Wednesday, September 30, 2009
question on proxy server:
 what is PAC (proxy auto config) file?

question for protocol stacking?
how different are transport layers of TCP and UDP?

submitted by CC16
darshan thappa
priya m.s.
satchidanand das
karthik k.

Questions by CC10

Tuesday, September 29, 2009
HTTP Proxy Server:
How did the proxyfire select the 17 proxies?

Protocol Stack and Addressing:
Consider a system with a DSL modem/router and a wifi router. The modem connects to the router through the WAN port on the router. Assume that DHCP is enabled on both. The ip range for DHCP is 192.168.0.X to 192.168.0.Y on the modem and on the router. There is a machine which is connected to the router through the LAN port and a system that accesses the internet wirelessly. If the two machines want to access the network resources simultaneously, will there be a conflict? If yes, why and how to resolve it. If no, why not?

--
Srikanth.V.Goutham
Surakshith.B
Shreyas.V
Amith Nayaka T.E

Questions by CC4

What is the difference between wan IP and local IP?
How HTTP is different from SOCKS?

BY CC4

Presentation by CC15

To view the pdf or download please follow the link below:
http://www.keepandshare.com/doc/view.php?id=1419143&da=y

QUESTIONS by CC19

HTTP PROXY SERVER
1)How to block some IP addresses of users so that they cann't access some defined sites by use of Webmin in Squid Server(access contol) ?
2)What is Proxy Chaining?
PROTOCOL STACK
1)What is ISDN protocol stack?

2)What Network Management Protocol does the OSI Protocol Stack use?

Question:CC20

QUESTIONS:- HTTP PROXY SERVER:

1. what is inbound/netbound traffic and how is it recognised in reverse proxy?


QUESTION:-IP ADDRESSING AND PROTOCOL STACK:

1. what is cataloging in enterprise ip address manager
a.what is hop?
b.what is classless addressing

TEAM MEMBERS:- CC20
1.swetha.m
2.shilpa.s
3.padma.b.s
4.shruthi.k.n

Question on http proxy server

Explain more about transparent server?

from cc11
Shreyas.H.D
Prabhakara.S.H
Vijay.S.S
Sharath.S

Questions by CC9

Question for Proxy Servers:

Why use a proxy server to get a different IP when you can simply mask it?

Question for Protocol Stack:

How does Real Hide IP protect from hackers?


Team members:

Rajavardhan
Rishikesh
Siddharth
Sriniketan
Rishabh

Questions for Sessions on 29th September by CC6

Monday, September 28, 2009
# HTTP Proxy Server :
1) How HTTP proxy server keeps system as anonymous?
2) What is secure socket layer (SSL)?
3) How is Proxy Server different from Open DNS?

# Protocol Stack:
1)Wat is the role of presentation layer in transfer of data?
2) How does routing selection happen in network layer?

# Questions by-
Team Noesis (CC 6)

# Members-
  • Sourav
  • Renuka
  • Siddesh
  • Masoud

An introduction to TCP/IP utilities

 

Transmission Control Protocol/Internet Protocol is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.

TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they'll be reassembled at the destination.

TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be "stateless" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.)

Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a "suite."

Personal computer users with an analog phone modem connection to the Internet usually get to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP). These protocols encapsulate the IP packets so that they can be sent over the dial-up phone connection to an access provider's modem.

Protocols related to TCP/IP include the User Datagram Protocol (UDP), which is used instead of TCP for special purposes. Other protocols are used by network host computers for exchanging router information. These include the Internet Control Message Protocol (ICMP), the Interior Gateway Protocol (IGP), the Exterior Gateway Protocol (EGP), and the Border Gateway Protocol (BGP).
 
The common TCP/IP utilities are as follows:
 
  • ARP
ARP stand for Address Resolution Protocol. This provides IP to Ethernet addresses. Each hardware card has an address coded in. This allows deletion and addition to the ARP cache.
 
  • Nbtstat
This is a very useful little tools if networked and/or using Win servers or Lmhost file. It displays TCP/IP connections using netbios.  The switches to be used will be shown if typing nbtstat from the command prompt.
 
  • Netstat
This utility provides the connection both the local and remote, ports and the state of the connection. It has several switches which maybe found by typing netstat /? from the command prompt. It provides the IP addresses and the ports of the remote computer(S) to which the socket is connected. It shows the the port numbers as well as IP address for the local computer.
 
  • Ping
This is a simple diagnostic tool to verify connection and also used quite frequently as a troubleshooting tools. The available switches can be obtained by typing ping from command prompt.
 
  • Route
This command is very useful if using networking. It allows you to view and manipulate the routing tables. It is a very useful tool for diagnosing and modifying networking routing issues.
 
  • Tracert
This is a utility which allows you to see the route taken by packages from yourself to a destination. It also show the time it takes. It can also be used to determined the IP address of a service were you only know the name.
 
  • Winipcfg
A very useful little utility. Use Start ---->Run and type in winipcfg. It will tell you your present IP address and your subnet mask.
 
By-CC 18
1.Sharath babu
2.Vatsal. Doshi
3.Sushma Rao
4.Rakshita shetty
5.Sahana. P