Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment 1: DNS & Transport Layer

For this assignment you are required to do BOTH Part A and Part B.

Part A

Submit short answers that discuss the following questions:

1. Briefly define six of the nine most commonly used resource record types.
2. What are some of the shortcomings of DNS?
3. Briefly discuss the type of tasks typically handled by connectionless protocols.
4. What are the functions of a connection-oriented protocol?
5. Briefly discuss four limitations of UDP.

Part B: Wireshark Lab

This week you will continue working with Wireshark. Complete the following hands-on labs in the textbook.

1. Hands-On Project 8-3: Convert an IPv6 Address Into an ipv6-literal.net Name page 493
2. Hands-On Project 8-4: Capture and Examine Your Own DNS Traffic page 494
3. Hands-On Project 9-1: Examine the UDP Header Structure page 544
4. Hands-On Project 9-2: Examine the TCP Header in IPv4 and IPv6 page 545
5. Hands-On Project 9-3: Examine the TCP Handshake Process page 547

Reflection

1. Describe the IPv6 conversion experience
2. Briefly describe the DNS Traffic.
3. Answer the questions in the Projects 91 through 9-3.
4. How was your experience with these labs? Did you have any issues?

Include these things with your file:

• A lab write up answering the questions in the reflection section.
• The image you captured above, as an attachment

Assignmemnt 2: DNS & Transport Layer

For this assignment you are required to do BOTH Part A and Part B.

Part A

Submit short answers that discuss the following questions:

1. Briefly explain how to tunnel through the IPv4 cloud.
2. What are some of the network elements that you must consider when transitioning to IPv6?
3. What are some of the utilities designed to monitor, report on, and manage the network infrastructure?
4. Briefly describe the Host-to-Router and Router-to-Host tunneling topology.

Part B: Wireshark Lab

This week you will continue working with Wireshark. Complete the following hands-on labs in the textbook.

Hands-On Project 10-1 through Hands-On Project 10-3 page 598 to page 602 (note you will need to use the textbook companion pcapng files for these labs.)

Reflection

1. Include your summary notes of the questions asked during labs.
2. How was your experience with these labs? Did you have any issues?

Include these things with your file:

• A lab write up answering the questions in the reflection section.
• The image you captured above, as an attachment

Assignment 3: IPv6 Deployment Planning

Submit short answers that discuss the following questions:

1. What are some of the architectural decisions that you need to make when deploying IPv6?
2. How does the nature of networks affect the deployment of IPv6?
3. Describe two ways to handle the IPv4-to-IPv6 migration process.
4. Briefly describe how to start migrating applications during IPv6 deployment.

Assignment 4: Scan Labs

This week you will continue working with Wireshark. Complete the following hands-on labs in the textbook.

Hands-On Project 12-1 through Hands-On Project 12-6 page 686 to page 690 (note you will need to use the textbook companion pcapng files for these labs.)

Reflection

1. Include your summary notes of the questions asked during labs
2. How was your experience with these labs? Did you have any issues?

Turning in your Project

Include these things with your file:

• A lab write up answering the questions in the reflection section.
• The image you captured above, as an attachment

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92346083

Have any Question?


Related Questions in Computer Network & Security

What are three ways that even every forecast model should

What are three ways that even every forecast model should be evaluated to obtain the best forecast result.

Discussion bulldefine a packet analyzer and describe its

Discussion: • Define a packet analyzer and describe its use • List commonly used packet analyzers (beyond WireShark) • List best practices for analyzing packets • Describe uses (good and bad, ie. hacker) of a packetanaly ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

You just signed a 30-year lease agreement for a business

You just signed a 30-year lease agreement for a business property. The monthly rent for the first year is $1,000/month, with the ?rst month's rent due today. Starting from the second year onward, the monthly rent will be ...

Design and implementation of secure enterprise wireless

Design and implementation of secure enterprise wireless network Purpose of the assessment  (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering th ...

What comparison of means test was used to answer the

What comparison of means test was used to answer the question I need it now is there a relationship between parents highest level of education and socioeconomic status\need the entire script

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Backgroundyou have obtained a contract position at a small

Background: You have obtained a contract position at a small marketing and advertising firm called the Colour Ability Corporation (CAC). Your contract responsibilities are to help them plan their emerging networking and ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As