Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Instead of traceroute, you can also use ping to determine the route that packets take to a given network host.

It does so by using IP Record Route option. Try the following two commands:

ping -R www.cmu.edu

traceroute www.cmu.edu

prepare down the difference in their output? Now try the following:

ping -R www.google.com

Do you get the desired output? Describe your observation. Finally, try running the following command a few times.

traceroute www.whitehouse.gov

What do you notice about the results you get from different runs?

problem 2) Harry Bovik is working on web site which has multiple replicated servers located throughout the Internet. He plans on using DNS to help direct clients to their nearest server replica. He comes up with the hierarchical scheme. Harry has divided his server replicas into three groups (east, west and central) based on their physical location. A typical query occurs as follows:

When the client makes a query for www.distributed.hb.com, the root and.com name servers are contacted first. It returns name server (NS) record for ns1.hb.com. The TTL of this record is set to 1 day. The ns1.hb.com name server is then queried for the address. It examines source of the name query and returns a NS record for one of {east-ns, central-ns, west-ns} .distributed.com. The choice of which name server is based on where ns1 thinks the query came from. At last, one of {east-ns, central-ns, west-ns}.distributed.com. is contacted and it returns the address (A) record for the most lightly loaded server in its region.

Answer the following problems based on this design.

a) Harry's name server software has only two options for TTL settings for A and NS records - 1 day and 1 minute. Harry selects the following TTLs for each record below:

1. NS record for {east-ns, central-ns, west-ns} distributed.com - 1 day TTL.

2. A record for {east-ns, central-ns, west-ns} .distributed.com- 1 day TTL.

3. A record returned for the actual Web server - 1 minute TTL.

Briefly describe why Harry's choices are reasonable, or why you would have made different choices.

b) In general, name resolution systems map names based on the name and context. In this particular case, what are two items of context that the name resolution uses?

c) Harry's Web site is especially popular among CMU students. The CMU network administrator estimates that there is one access from CMU every 3 minutes. Each access results in the application resolving the name www.distributed.hb.com

Suppose the following:

No other DNS queries are made in CMU

All CMU clients use the same local name server. This local name server is mapped to the east-ns region. Web browsers do not do any caching on their own.

How many accesses per hour will be made to the following name servers to resolve these CMU queries? Describe your calculation.

1. The Root Servers

2. ns1.hb.com

3. east-ns.distributed.com

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96770

Have any Question? 


Related Questions in Computer Network & Security

Assignmentinstructionsutilizing your comprehensive security

Assignment: Instructions: Utilizing your comprehensive security plan outline as a guide, develop the identity management and security awareness training plan strategy for the organization. Upload the assignment in Micros ...

Assignment submissionyour assignment must be in microsoft

Assignment Submission Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website Question 1 -Cryptographic Operations with GPG Objective: gain experience ...

Project effect of legislation on organizationsthe purpose

Project: Effect of Legislation on Organizations The purpose of this is assignment is to 1) conduct research related to the impact of legislation on the HHS security program and 2) write a research paper. Learning Objecti ...

Assignment questionsquestion 1 assuming you can do 230

Assignment Questions Question 1. Assuming you can do 2 30 encryptions per second and key size is 64 bits: i. How long would a brute force attack take? (Both maximum and average values) ii. Give a scenario where this woul ...

Assignment a complete home networkdevelop an entire home

Assignment: A Complete Home Network Develop an entire home network with a budget of $5,000.00. Your configuration must assume the purchase of associated hardware for access to both wireless and wired connections and a br ...

Tcpip network assignmentneed 8 ppt slides with at least 2

TCP/IP Network Assignment Need 8 ppt slides with at least 2 references. Your manager has tasked you to create two network diagrams that illustrate the Remote Employee Connection options for VPN connectivity. These diagra ...

Coit20261 network routing and switching assignment-

COIT20261 Network Routing and Switching Assignment- Objectives - This assessment task requires you to demonstrate your knowledge of basic routing concepts by completing a number of exercise questions. Instructions - You ...

Security networkplease write short essay answers discussing

Security Network Please write short essay answers discussing the following "questions: 1. Give an (example of why data encryption is needed and when you would use encryption. 2. Name three data elements examples that wou ...

Goals1 to understand the challenges of protocol design2 to

Goals: 1. To understand the challenges of protocol design. 2. To discover and appreciate the challenges of developing complex, real-world network applications. 3. Make sense of real-world sockets programming APIs. 4. To ...

Network assignmentoverviewyou will provide a detailed

Network Assignment Overview You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria: • Each Classroom Computer Lab will be on a separate n ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate