Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Instead of traceroute, you can also use ping to determine the route that packets take to a given network host.

It does so by using IP Record Route option. Try the following two commands:

ping -R www.cmu.edu

traceroute www.cmu.edu

prepare down the difference in their output? Now try the following:

ping -R www.google.com

Do you get the desired output? Describe your observation. Finally, try running the following command a few times.

traceroute www.whitehouse.gov

What do you notice about the results you get from different runs?

problem 2) Harry Bovik is working on web site which has multiple replicated servers located throughout the Internet. He plans on using DNS to help direct clients to their nearest server replica. He comes up with the hierarchical scheme. Harry has divided his server replicas into three groups (east, west and central) based on their physical location. A typical query occurs as follows:

When the client makes a query for www.distributed.hb.com, the root and.com name servers are contacted first. It returns name server (NS) record for ns1.hb.com. The TTL of this record is set to 1 day. The ns1.hb.com name server is then queried for the address. It examines source of the name query and returns a NS record for one of {east-ns, central-ns, west-ns} .distributed.com. The choice of which name server is based on where ns1 thinks the query came from. At last, one of {east-ns, central-ns, west-ns}.distributed.com. is contacted and it returns the address (A) record for the most lightly loaded server in its region.

Answer the following problems based on this design.

a) Harry's name server software has only two options for TTL settings for A and NS records - 1 day and 1 minute. Harry selects the following TTLs for each record below:

1. NS record for {east-ns, central-ns, west-ns} distributed.com - 1 day TTL.

2. A record for {east-ns, central-ns, west-ns} .distributed.com- 1 day TTL.

3. A record returned for the actual Web server - 1 minute TTL.

Briefly describe why Harry's choices are reasonable, or why you would have made different choices.

b) In general, name resolution systems map names based on the name and context. In this particular case, what are two items of context that the name resolution uses?

c) Harry's Web site is especially popular among CMU students. The CMU network administrator estimates that there is one access from CMU every 3 minutes. Each access results in the application resolving the name www.distributed.hb.com

Suppose the following:

No other DNS queries are made in CMU

All CMU clients use the same local name server. This local name server is mapped to the east-ns region. Web browsers do not do any caching on their own.

How many accesses per hour will be made to the following name servers to resolve these CMU queries? Describe your calculation.

1. The Root Servers

2. ns1.hb.com

3. east-ns.distributed.com

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96770

Have any Question? 


Related Questions in Computer Network & Security

Short answer1 classify each of the following

Short Answer 1. Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether business continuity plans would be called intoplay. a. A hacker breaks into the com ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Network and internet security assignmentproblem 1 - network

NETWORK AND INTERNET SECURITY ASSIGNMENT PROBLEM 1 - Network Access Control 1) Suppose you are a network administrator and are concerned about unauthorized networked devices being plugged into your system. You have read ...

1 when an organization undertakes an infosec-driven review

1. When an organization undertakes an InfoSec-driven review of job descriptions, which job descriptions must be reviewed? Which IT jobs not directly associated with information security should be reviewed? 2. List and de ...

Topic one discuss fisma and its relevance to cybersecurity

TOPIC One: Discuss FISMA and its relevance to cybersecurity. (must be 200 words with references) Topic Two: (must be 200 words with references) Define the terms below and describe the environment in which each access con ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

Part-1given the following design for a money transfer

Part-1 Given the following design for a money transfer protocol which utilizes public key cryptography to assure confidentiality and authenticity of the transmission. Issuing a Check: 1. Payee (A) will contact the bank r ...

Short papercompare and contrast cat 6 unshielded twisted

Short Paper Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages associated with using each cable type ...

Mpi networkplease let me know if anyone is able to do it

MPI network Please, let me know if anyone is able to do it right and in the proper time. Please put Course number, your Full Name, Assignment number on top right. Submit your homework on Blackboard. Please name your file ...

Assignment1 give a generic definition of what a

Assignment 1. Give a generic definition of what a protocol is (not related to the internet). (Knowledge) 2. Using the definition you just found explain how TCP and IP fit that definition. (Evaluation) 3. What is the resp ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen