Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Instead of traceroute, you can also use ping to determine the route that packets take to a given network host.

It does so by using IP Record Route option. Try the following two commands:

ping -R www.cmu.edu

traceroute www.cmu.edu

prepare down the difference in their output? Now try the following:

ping -R www.google.com

Do you get the desired output? Describe your observation. Finally, try running the following command a few times.

traceroute www.whitehouse.gov

What do you notice about the results you get from different runs?

problem 2) Harry Bovik is working on web site which has multiple replicated servers located throughout the Internet. He plans on using DNS to help direct clients to their nearest server replica. He comes up with the hierarchical scheme. Harry has divided his server replicas into three groups (east, west and central) based on their physical location. A typical query occurs as follows:

When the client makes a query for www.distributed.hb.com, the root and.com name servers are contacted first. It returns name server (NS) record for ns1.hb.com. The TTL of this record is set to 1 day. The ns1.hb.com name server is then queried for the address. It examines source of the name query and returns a NS record for one of {east-ns, central-ns, west-ns} .distributed.com. The choice of which name server is based on where ns1 thinks the query came from. At last, one of {east-ns, central-ns, west-ns}.distributed.com. is contacted and it returns the address (A) record for the most lightly loaded server in its region.

Answer the following problems based on this design.

a) Harry's name server software has only two options for TTL settings for A and NS records - 1 day and 1 minute. Harry selects the following TTLs for each record below:

1. NS record for {east-ns, central-ns, west-ns} distributed.com - 1 day TTL.

2. A record for {east-ns, central-ns, west-ns} .distributed.com- 1 day TTL.

3. A record returned for the actual Web server - 1 minute TTL.

Briefly describe why Harry's choices are reasonable, or why you would have made different choices.

b) In general, name resolution systems map names based on the name and context. In this particular case, what are two items of context that the name resolution uses?

c) Harry's Web site is especially popular among CMU students. The CMU network administrator estimates that there is one access from CMU every 3 minutes. Each access results in the application resolving the name www.distributed.hb.com

Suppose the following:

No other DNS queries are made in CMU

All CMU clients use the same local name server. This local name server is mapped to the east-ns region. Web browsers do not do any caching on their own.

How many accesses per hour will be made to the following name servers to resolve these CMU queries? Describe your calculation.

1. The Root Servers

2. ns1.hb.com

3. east-ns.distributed.com

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96770

Have any Question? 


Related Questions in Computer Network & Security

1 what attributes do organizations seek in a candidate when

1. What attributes do organizations seek in a candidate when hiring InfoSec professionals? Prioritize this list of attributes and justify your ranking 2. What are the critical actions that management must consider taking ...

Discussion window media servicebulldiscuss sharepoint

Discussion Window Media Service • Discuss SharePoint services and various SharePoint options as well as Windows Media Rights Management to handle the requirements of different enterprise scenarios, such as one that requi ...

You work the night shift at a software development company

You work the night shift at a software development company and mange six Web servers that host the company's e commerce solution for medical and dental supplies. You notice that traffic across the network dropped signifi ...

Network security paper in this paper you will define the

Network Security Paper: In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disa ...

Project on security policyin this running case project you

Project on Security Policy In this running case project, you continue developing a secure network for SunGrafix, the video game development company for which you designed a network in the first week and are starting to p ...

The us government has put in place ipv6-compliance mandates

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6. Let' ...

Pros amp cons of very simple vs very planned networkwrite a

Pros & Cons of Very Simple Vs Very Planned Network Write a 3-5 page report that discusses the pros and cons of very simple plans versus detailed plans, although the standards mandate very specific requirements for the pl ...

Develop a wlan plan for acme graphic design based on a

Develop a WLAN plan for Acme Graphic Design based on a chosen Blueprint and security to the owner. Write a 700- to 1,750-word document using Microsoft® Word finalizing describing your final network design incorporating y ...

Assignment1many more square-wave digital encoding schemes

Assignment 1. Many more square-wave digital encoding schemes exist than NRZ-L, NRZI, Manchester, differential Manchester, and bipolar-AMI. List three other encoding techniques and show an example of how each encodes. 2. ...

Assignment give an answer to the following topicswhat are

Assignment: Give an answer to the following topics: What are the security issues with wireless LANs and WANs in a data processing environment? What are the recommended solutions to the issues identified? What are the sec ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro