Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Instead of traceroute, you can also use ping to determine the route that packets take to a given network host.

It does so by using IP Record Route option. Try the following two commands:

ping -R www.cmu.edu

traceroute www.cmu.edu

prepare down the difference in their output? Now try the following:

ping -R www.google.com

Do you get the desired output? Describe your observation. Finally, try running the following command a few times.

traceroute www.whitehouse.gov

What do you notice about the results you get from different runs?

problem 2) Harry Bovik is working on web site which has multiple replicated servers located throughout the Internet. He plans on using DNS to help direct clients to their nearest server replica. He comes up with the hierarchical scheme. Harry has divided his server replicas into three groups (east, west and central) based on their physical location. A typical query occurs as follows:

When the client makes a query for www.distributed.hb.com, the root and.com name servers are contacted first. It returns name server (NS) record for ns1.hb.com. The TTL of this record is set to 1 day. The ns1.hb.com name server is then queried for the address. It examines source of the name query and returns a NS record for one of {east-ns, central-ns, west-ns} .distributed.com. The choice of which name server is based on where ns1 thinks the query came from. At last, one of {east-ns, central-ns, west-ns}.distributed.com. is contacted and it returns the address (A) record for the most lightly loaded server in its region.

Answer the following problems based on this design.

a) Harry's name server software has only two options for TTL settings for A and NS records - 1 day and 1 minute. Harry selects the following TTLs for each record below:

1. NS record for {east-ns, central-ns, west-ns} distributed.com - 1 day TTL.

2. A record for {east-ns, central-ns, west-ns} .distributed.com- 1 day TTL.

3. A record returned for the actual Web server - 1 minute TTL.

Briefly describe why Harry's choices are reasonable, or why you would have made different choices.

b) In general, name resolution systems map names based on the name and context. In this particular case, what are two items of context that the name resolution uses?

c) Harry's Web site is especially popular among CMU students. The CMU network administrator estimates that there is one access from CMU every 3 minutes. Each access results in the application resolving the name www.distributed.hb.com

Suppose the following:

No other DNS queries are made in CMU

All CMU clients use the same local name server. This local name server is mapped to the east-ns region. Web browsers do not do any caching on their own.

How many accesses per hour will be made to the following name servers to resolve these CMU queries? Describe your calculation.

1. The Root Servers

2. ns1.hb.com

3. east-ns.distributed.com

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96770

Have any Question? 


Related Questions in Computer Network & Security

Security configuration managementkey assignmentsignificant

Security Configuration Management Key Assignment Significant work has been completed over the past few weeks on the Network Security Architecture Design document, including the following: • Security Requirements • Perime ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, ...

Learning team recommend pki technologythe head network

Learning Team: Recommend PKI Technology The head network engineer at ACME Corp. is concerned about nefarious parties being able to freely plug in devices to the company LAN. Even though he is skilled at network administr ...

Objectivesthis assignment is designed to assess students

OBJECTIVES This assignment is designed to assess students' ability to: - Produce a concise detailed report about the importance of information security audit policy and its components - To have excellent understanding re ...

Assignmentmr smith is the director of it at a law firm

Assignment Mr. Smith is the Director of IT at a law firm located in downtown Chicago. He needs to plan for a network upgrade. He has decided that he would like to have a network analysis done before the upgrade so that h ...

1 assume a system with two processors in series where each

1. Assume a system with two processors in series where each processor has an unlimited queue in front of it; also assume FIFO queue disciplines for both servers. We need to collect data on individual entity total time in ...

Case study wireless and mobile technologiesin this very

Case Study: Wireless and Mobile Technologies In this very competitive climate, many companies are seeking ways to connect with customers in ways that add value. Mobile and wireless computing have become key focal points ...

Assignment case study handmade furniture ltdthis case study

Assignment case study: HandMade Furniture Ltd. This case study provides background information for both assignment 1 and assignment 2. As a network consultant, your initial examination of the company has discovered the f ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro