LESSON PLAN #65 Per. Name - Brooklyn Technical High School

advertisement
1
L E S S O N P L A N #65
Per.
Name:
CLASS: Networking
DATE: Tuesday April 20th, 2010
TOPIC: TCP/IP
AIM: How does DNS Work?
NOTE:
1) At the end of the period, leave your computer on the desktop screen, put the keyboard on top of the monitor and push in your chair.
H.W. # 65:
1) Why was classless routing created?
2) How else can you access a website aside from its domain name?
3) What is name resolution?
DO NOW:
Go to http://public.pacbell.net/dedicated/cidr.html. Read about CIDR.
What is CIDR?
PROCEDURE:
Write the AIM and DO NOW.
Get students working!
Take attendance.
Go Over HW
Collect HW
Go over the Do Now
Assignment #1:
To access a computer on the Internet, you could refer to the IP address of that computer. For example, open up your web browser and go
to the IP address 216.239.51.99 by typing http://216.239.51.99. Whose computer is this?
Alternately, you can take the IP address, in binary form (all 32 bits together) and convert that into a decimal value, then type that decimal
value after the http://
For example, the IP address 1.0.0.1 in binary looks like 00000001 00000000 00000000 00000001
Using place values for power of 2, we have
1(2 24 )  1(2 0 ) = 16777216 + 1 = 16777217
Instead of doing this by hand, you could use a program like bosncalc.exe and select Decimal IP from the menu; we can then convert
from dotted decimal IP to full decimal IP or vice versa.
Use the program to convert Google’s IP of 216.239.51.99 into full decimal and use that after http:// to go to Google’s site.
If a filter (such as the one that filters our Internet traffic) is not configured to also check for full decimal address, you can sometimes
bypass the filter.
Assignment #2:
The inventors of the Internet decided early on that it was too difficult for humans to refer to computer systems using dotted
decimal IP address or full decimal IP address, much less 32-bit binary IP addresses. They decided to have a list of IP addresses matched
up with corresponding human-friendly names, that any computer on the Internet could use to translate a human-friendly computer name to
an IP address (LMHOSTS files and WINS servers do this for NetBIOS names, not TCP/IP names). This is called name resolution.
The original IP specification implemented name resolution using a special text file call HOSTS. A copy of this file was stored on
every computer system on the Internet. The HOSTS file contained a list of IP addresses for every computer on the Internet, matched to
the corresponding system names. Part of an old HOSTS file could look like this:
192.168.2.1
fred
2
201.32.16.4 school2
123.21.44.16 server
Search for the file called HOSTS on your computer
Every HOSTS file on every system on the Internet was updated at 2AM. This worked well while the Internet was still small. But when it
grew to about 5000 systems, it became too tedious to maintain the HOSTS file.
Instead, the Domain Name System or DNS (another TCP/IP protocol along with ARP and IP) was created. The Domain Name
System is the system used on the Internet for the mapping of names, such as www.google.com, to IP Addresses such as 216.239.51.99.
One computer alone can’t handle all the domain name resolution
At the top of the Domain Name System, you have Root Servers running DNS software, making them DNS servers.
Just below the DNS root servers, in the hierarchy of DNS servers, is a set of DNS servers that handle what are known as
top-
level domain names such COM, ORG, NET, EDU, GOV, MIL, INT, etc.
These top-level DNS servers delegate to thousands of second-level DNS servers. They handle the millions of names like
whitehouse.gov, where whitehouse is the second level part and gov is the top level part. You may also have sub domain names, such as
north.mhteched.com. The owner of a second level domain maintains any subdomains on its own DNS servers, or its ISP’s DNS servers.
Subdomains may contain a further layer of subdomains, for example, bravo.north.mhteched.com.
Every system on the Internet also has a host name added on to the left of its domain name, such as www. A fully qualified
domain name (FQDN) contains the complete DNS name of a system, from its host name to the top-level domain name.
Every time a new domain, like bleepingcomputer.com, is registered, that domain is entered into one of the Root Servers
spread throughout the world and overseen by an organization called ICANN. Because your domain is in one of these servers, it can be
reached and understood by the rest of the users on the Internet.
Any time you connect to a site, your ISP
DNS Server must find out what name server has the
information about the domain for the site you are
trying to reach. Your ISP's DNS Server will
connect to a Root Server and ask it who the name
server is that knows the information about the site
you are trying to reach. The Root Server will tell
your ISP's DNS Server what server they should
next contact for information. Next your ISP's DNS
Server will then contact the server that the Root
Server told it to contact, where it will be given the
IP Address associated with the site you are trying to
reach.
The following flowchart illustrates this concept
As you can see, the Domain Name System is
essential in the use of the Internet. Without it, you
would not be able to type in names, but would have
to remember the numerical IP Addresses in order to
get anywhere on the Internet.
Assignment #3:
Where is DNS information typed in?
Find out the IP address of your current DNS server settings.
3
Assignment #4:
What four settings have we discussed that can be set in the TCP/IP properties?
Depending on which of these had to change, we would have to go to every machine and reset these TCP/IP properties. Fortunately for us,
there is something called Dynamic Host Configuration Protocol (DHCP)
Review:
Look up the following related terms at www.techweb.com/encyclopedia.
1) domain name
2) domain name address
3) Domain name registrar
4) Domain name resolver
5) Domain name server
6) DNS
7) FQDN
8) ICANN
9) Internet domain name
10) URL
Sample Test Questions:
1) The IP address 192.23.45.123 has a default subnet mask of
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
2) Scott’s system wants to send data to Roger’s system. Scott’s system knows Roger’s IP address, but it doesn’t know the MAC address,
which it needs. What does the system use to request a MAC address for a known IP address?
A) ARP
B) WINIPCFG
C) IPCONFIG
D) MACIP
3) Mike is running Windows 2000. He wants to find out his MAC address and IP address. What utility can Mike use to provide this
information?
A) ARP
B) WINIPCFG
C) IPCONFIG
D) MACIP
4) The binary number 11000101 has the decimal equivalent of
A) 197 B) 169
C) 94 D) 82
5) Which of the following represents a Class A address?
A) 17.2.3.5
B) 145.16.5.6
C) 192.168.0.1
D) 255.255.255.255
6) Which of the following represents a Class C address?
A) 17.2.3.5
B) 145.16.5.6
C) 192.168.0.1
D) 255.255.255.255
7) An IPv4 address consists of __________ octets divided by dots
A) 2
B) 4
C) 8
D) TCP/IP doesn’t use octets
8) What function of an IP configuration defines which numbers in the IP address identify the network?
A) The gateway
B) DNS
C) The first octet D) The subnet mask
4
9) A host is
A) any server on a TCP/IP network
B) Any device on a TCP/IP network that can send or receive data packets
C) A device on a TCP/IP network that forwards data packets to other networks
D) A device on a TCP/IP network that resolves names to IP addresses
10) What is the loopback address for IPv4?
A) 127.0.0.1
B) 0:0:0:0:0:0:0:0
C) ::1
D) 0:0:0:0:0:0:0:0
11) How many bits are in an IP address?
A) 16
B) 32
C) 64
D) None of the above
12) What is the maximum decimal value of each octet in an IP address?
A) 28
B) 255 C) 256
D) None of the above
13) The network number plays what part in an IP address?
A) It specifies the network to which the host belongs.
C) It specifies which node on the subnetwork is being addressed
D) It specifies which networks the device can communicate with
B) It specifies the identity of the computer on the network
14) Convert the binary IP address 11000000.00000101.00100010.00001011 to its decimal form
A) 190.4.34.11
B) 192.4.34.10
C) 192.4.32.11
D) None of the above
15) If using classful addressing, what portion of the IP address 129.219.51.18 represents the network?
A) 129.219 B) 129
C) 14.1
D) 1
16) Which of the following addresses is an example of a broadcast address on the network 123.10.0.0 with a subnet mask of 255.255.0.0
A) 123.255.255.255
B) 123.10.255.255
C) 123.13.0.0
D) 123.1.1.1
17) How many host addresses can be used in a Class C network?
A) 253
B) 254
C) 255
D) 256
18) What is the minimum number of bits that can be borrowed to form a subnet?
A) 1
B) 2
C) 4
D) None of the above
19) How many bits are in a subnet mask?
A) 16
B) 32
C) 64
D) None of the above
20) With a Class C address of 197.15.22.31 and a subnet mask of 255.255.255.224, how many bits have been borrowed to create a
subnet?
A) 1
B) 2
C) 3 D) None of the above
Assignment #5:
Look up Airport at www.techweb.com/encyclopedia. What is the Airport Equivalent in the PC world? 802.11b
What is Airport Extreme equivalent to in the PC world? 802.11g
Look up WiMAX. What is WiMAX? Wireless devices that operate at longer distances.
What IEEE Standard number is used by WiMAX? Uses the 802.16 Standard
Assignment #6: Download the program A-MAC Address from www.downloads.com and explore what in can do with respect to MAC
addresses.
Assignment #7: Go to http://standards.ieee.org/develop/regauth/oui/public.html and enter the first 6 hex digits of your MAC address in
the search box to find out the
Assignmeng #8: One of the easiest ways to get your MAC address is to type in the getmac command from the command line. But see if
you can spot your MAC address after running the net config workstation command.
5
Sample Test Questions:
1) VLANs break up ____________ domains in a Layer 2 switched network
2) Switches, by default, only break up _________ domains.
3) What does trunking provide?
4) You connect a host switch port, but the new host cannot log into the server
Download