Question

Starting at the customer's CPE and ending with a remote web server such as the New...

Starting at the customer's CPE and ending with a remote web server such as the New York Times webserver, describe the Internet Architecture which the path of a typical packet would follow.

Homework Answers

Answer #1

Description of the Internet Architecture path a typical packet follows starting at the customer's Customer Premises Equipment (CPE) such as his/her Internet web browser application software, desktop or laptop, router or modem, and ending with a remote web server such as the New York Times webserver:

The Internet is the backbone of the Web, the technical infrastructure responsible for the Web to work. When a user types in the website address of the New York Times web server in the address of a web browser and presses enter key, it in general tries to reach the below website address of theirs.

https://www.nytimes.com

* In general, the data packet goes from the web browser application software to the user's router and to his local modem, then to the ISP's router, then to the Internet (a network of networks), then to the ISP's DNS servers, finally to the webserver. The processed data packet travels all the way back to the user's computer following the reverse order of the exact same path.
* In detail, the user's web browser first checks the local on his/her computer cache for a DNS record to find the corresponding IP address of www.nytimes.com website. It checks the browser cache. Then, the browser checks the OS cache. It then checks the router cache for the same. Finally, it checks the ISP cache. ISPs maintain their own DNS servers. DNS is a database maintaining and mapping the website names or domain names (URLs) to their corresponding unique IP addresses they link to.

* In case, the requested URL (Uniform Resource Locator) is not found in the cache, his/her ISP’s DNS server triggers initiation of a DNS query looking for an IP address of the webserver hosting www.nytimes.com.

The user computer needs the IP address of www.nytimes.com. The DNS query searches for multiple DNS servers on the Internet until it finds the IP address for www.nytimes.com through recursive search through repeated search from DNS server to another DNS server until it finds the IP address for the webserver. ISP's DNS server or DNS recursor to looking for the IP address of the webserver for the domain name asking other DNS servers on the Internet. The other DNS servers are name servers as they perform a DNS search on the domain name. In the process, the request goes from the DNS recursor to the root name server. The root name server redirects it to .com (top-level domains) domain name server. .com name server redirects it to nytimes.com name server. The nytimes.com name server would find the matching IP address for www.nytimes.com in its DNS records and returns it to the ISP's DNS recursor which then sends it back to the user's web browser.

* The web browser then initiates a TCP connection with the server.
* The browser then sends an HTTP request to the webserver.
* The web server then handles the request, processes it, and responds with the page result send the user computer the HTTP response with the requested page information.
* The browser displays the HTML content of the webpage available on the website at the above-specified domain name.

Data is transmitted from the user to a desired remote or destination web server over the Internet through packets. All devices, machines, servers, routers, switches, other network devices, hosts, desktops, laptops, mobile devices, printers, etc, have their own IP addresses. A user's desktop or laptop in general, is connected and sends the data through packets from a web broser software such as Google Chrome, Mozilla Firefox, etc., to a router which is connected to a modem (MOdulator and DEModulator), the setup may even have a switch (managed or unmanaged), these are then in turn connected to the user's ISP (Internet Service Provder), which is connected to the backbone of the network or the Internet, the root servers and DNS (Domain Name System) servers are also conneted in the backbone of this network, and at the other end (logically and even physically) are the web servers connected.

All the routers connected to the Internet keep and follow routing tables that contain the information used to get packets to their destinations. These routers are packet switches. Routers connected between different networks control the flow of traffic and route packets amongst themselves and also keep their sub-networks and the IP addresses they use. These router could be wired or wireless routers. Sometimes both, the router and a switch could be in one single equipment. The Internet connection lines could either cables such as copper twisted pair or fiber optics; or wireless such as satellite communication.

Internet Architecture works ccordance with the Internet Protocol (IP), the Transport Control Protocol (TCP) and other protocols. The data packet thus, travels from the user's computer to his/her Modem, then to the Public Telephone Network (PTN), to the Modem Pool, which is connected to the user's ISP Port Server connected to a router which is inturn connected to the ISP backbone. This is only half part of the Internet architecture.

Each of the packets carry upto 1,500 bytes with a header and a footer, and letting the computers and other devices know what kind of data is in the packet, the source and the destination, and how it fits together with other data. While the data packet is being transmitted on the Internet, different packets of the message do not follow the same path. The source computer disassembles data packets of a message to transmit them, while the destination (receiver) computer or web server assembles the data packets to form the original message the source or the user computer had sent. However, whenever there is a congestion or any other issues on the Internet specifically on a certain path, packets take a different route to go through. In case a packet does not reach its destination, the computer or the server supposed to receive the data determinse the packet missing referencing the other packets based on a sequence and order mantained, asking the source to resend the data packet creating redundancy.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
When configuring a web server, you notice the following Cipher Suites are available to use for...
When configuring a web server, you notice the following Cipher Suites are available to use for TLS-based connections: • Cipher Suite 1: TLS_ECDHE_RSA_AES_128_CBC_SHA256 • Cipher Suite 2: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA Answer the following questions regarding these two cipher suites. i. What is the key exchange (Kx) algorithm in Cipher Suite 2? ii. What is the authentication (Au) algorithm in Cipher Suite 1? iii. What is the key size of the symmetric cipher in Cipher Suite 1? iv. What is the effective key...
Which architectural pattern is most appropriate for the following multi-user, web-based system for providing a film...
Which architectural pattern is most appropriate for the following multi-user, web-based system for providing a film and photograph library?(1 Point) Please read textbook Chapter 6.3 Architectural Patterns MVC Pattern which separates presentation and interaction from the system data Layered architecture which organizes the system into layers, with related functionality associated with each layer Repository architecture - all data in a system is managed in a central repository that is accessible to all system components. Components do not interact directly, only...
Beate Klingenberg managers a Poughkeepsie, New York, movie theater complex called Cinema 8. Each of the...
Beate Klingenberg managers a Poughkeepsie, New York, movie theater complex called Cinema 8. Each of the eight auditoriums plays a different film; the schedule staggers starting times to avoid the large crowds that would occur if all eight movies started at the same time. The theater has a single ticket booth and a cashier who can maintain an average service rate of 300 patrons per hour. Service times are assumed to follow an exponential distribution. Arrivals on a normally active...
Q1. Dr.Aleda Roth, a prolific author, is considering starting her own publishing company. She will call...
Q1. Dr.Aleda Roth, a prolific author, is considering starting her own publishing company. She will call it DSI Publishing, Inc. DSI’s estimated costs are as follows: Fixed cost per year= $250,000; variable cost per book = $20; selling price per book = $30. In addition to those costs, Dr.Roth wants to pay herself a salary of $50,000 per year. 1) How many books must DSI sell to break even? A. 15,000 B. 25,000 C. 30,000 D. 125,000 Answer:_________ 2) What...
I did already posted this question before, I did get the answer but i am not...
I did already posted this question before, I did get the answer but i am not satisfied with the answer i did the code as a solution not the description as my solution, so i am reposting this question again. Please send me the code as my solution not the description In this project, build a simple Unix shell. The shell is the heart of the command-line interface, and thus is central to the Unix/C programming environment. Mastering use of...
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application...
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application Security Testing. IAST Interactive Application Security Testing. PAST: Passive Application Security Testing. DAST: Dynamic Security Application Testing. 57. Question 57 Which one of the OWASP Top 10 Application Security Risks would be occur when there are no safeguards against a user being allowed to execute HTML or JavaScript in the user's browser that can hijack sessions. 1 point Insufficient logging and monitoring Security misconfiguration...
Review and submit the Donatos: Finding the New Pizza case study below. Answer the following two...
Review and submit the Donatos: Finding the New Pizza case study below. Answer the following two questions: 2. Evaluate the Wassup meeting as an exploratory methodology to help define the research question. 4. What measurement scales would you have used on the survey that was part of the in-restaurant product tests? Abstract and Written Case: The pizza segment of the fast-food industry is very aggressive. As people’s tastes change and new diets become the rage, restaurant chains must decide if...
Question 5 A plant site donated by a township to a manufacturer that plans to open...
Question 5 A plant site donated by a township to a manufacturer that plans to open a new factory should be recorded on the manufacturer's books at ___________. Question 5 options: A. the nominal cost of taking title to it i B. Its fair value C. one dollar (since the site cost nothing but should be included in the balance sheet) D. the value assigned to it by the company's directors Question 6 Which of the following costs are capitalized...
The case WorldCom On 9 June 2003, the US Bankruptcy Court of New York issued an...
The case WorldCom On 9 June 2003, the US Bankruptcy Court of New York issued an interim report (Thornburgh, 2003) which expanded on the Court’s earlier find- ings (Thornburgh, 2002) of lack of corporate gov- ernance, mismanagement and concern regarding the integrity of WorldCom’s accounting and fi- nancial reporting functions. Amongst the numer- ous incidents of mismanagement, corporate gov- ernance failure and accounting irregularities, the most salient related to the overstatement of re- ported profitability by inappropriately capitaliz- ing very...
Please answer the following Case analysis questions 1-How is New Balance performing compared to its primary...
Please answer the following Case analysis questions 1-How is New Balance performing compared to its primary rivals? How will the acquisition of Reebok by Adidas impact the structure of the athletic shoe industry? Is this likely to be favorable or unfavorable for New Balance? 2- What issues does New Balance management need to address? 3-What recommendations would you make to New Balance Management? What does New Balance need to do to continue to be successful? Should management continue to invest...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT