Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In this problem you will use the unix utility 'dig' to explore contents of DNS messages. Please use dig on unix.andrew.cmu.edu. The format of a dig request is simple. Just type:

dig www.princeton.edu to perform a look-up for that DNS name. As you now know, DNS requests can do more than just ask for IP address corresponding to single DNS name. Type dig princeton.edu ANY to see DNS records of all types that are associated with the domain `princeton.edu'.

(a) What IP address did computer you are logged into contact to make the DNS request? Where do you think this server is located?

(b) List all of the various kinds of records received as a result of your query. For each record, describe its purpose, using one of the entries provided in the reply as the concrete ex.

(c) Note that some of the names in the reply are not in a domain `princeton.edu'. Use the DNS names and/or `traceroute' to find the general location of one of these servers. Where is it? Given the type of record, why would Princeton do this?

(d) Use dig to find the names of two non-local servers you could contact in the process of identifying the nameserver for the domain `cnn.com' (assume no DNS information is cached anywhere).

(e) Use dig to determine the TTL for the DNS mappings of `www.cnn.com' and `www.cs.stanford.edu'. What are they? If you ask to provide two positive and two negative effects of having a short DNS TTL for company's e-commerce site, what would be your answer?

problem 2)(a) IPv6 allows for 2128 addresses. That is about 295 addresses for every person alive. Why was IPv6 designed to have so many addresses? Identify two specific reasons.

(b) IPv4 contained a checksum while IPv6 does not. describe why the designers of IPv6 decided the checksum was not needed. Give at least 2 concrete reasons why they felt they could or should drop this feature.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96761

Have any Question? 


Related Questions in Computer Network & Security

Windows server deployment proposaleach student will create

Windows Server Deployment Proposal Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and ...

Web and data securitybullyour company security

Web and Data Security • Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as ...

Assignmentall questionscarry equal weight do not change the

Assignment All Questionscarry equal weight. Do not change the order of questions. To receive full credit, show all of your work. Answers must be typed in, following APA style. Handwritten solutions will not be accepted a ...

Short paperwan technologies paper research point-to-point

Short Paper WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies a ...

This assignment assumes that you are one of the network

This assignment assumes that you are one of the Network Engineer of a small Company which has two branch offices, Branch 1 (BR1), Branch 2 (BR2) and a Headquarter (HQ). The branches need to be interconnected to the Headq ...

Why do networking components need more examination from an

Why do networking components need more examination from an InfoSec perspective than from a systems development perspective? What value would an automated asset inventory system have for the risk identification process? W ...

Taskspecific issues that you need to address in the forum

Task Specific issues that you need to address in the forum discussions are provided within the first 3 topics. These questions are posed for you to reflect on in the form of written Discussion Board (forum) posts. As thi ...

Lab assignment- assessment questions1 explain the two

Lab Assignment- Assessment Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and ...

Short answer1 classify each of the following

Short Answer 1. Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether business continuity plans would be called intoplay. a. A hacker breaks into the com ...

Assignmentyou have been tasked with reconfiguring the

Assignment You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administra ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro