Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In this problem you will use the unix utility 'dig' to explore contents of DNS messages. Please use dig on unix.andrew.cmu.edu. The format of a dig request is simple. Just type:

dig www.princeton.edu to perform a look-up for that DNS name. As you now know, DNS requests can do more than just ask for IP address corresponding to single DNS name. Type dig princeton.edu ANY to see DNS records of all types that are associated with the domain `princeton.edu'.

(a) What IP address did computer you are logged into contact to make the DNS request? Where do you think this server is located?

(b) List all of the various kinds of records received as a result of your query. For each record, describe its purpose, using one of the entries provided in the reply as the concrete ex.

(c) Note that some of the names in the reply are not in a domain `princeton.edu'. Use the DNS names and/or `traceroute' to find the general location of one of these servers. Where is it? Given the type of record, why would Princeton do this?

(d) Use dig to find the names of two non-local servers you could contact in the process of identifying the nameserver for the domain `cnn.com' (assume no DNS information is cached anywhere).

(e) Use dig to determine the TTL for the DNS mappings of `www.cnn.com' and `www.cs.stanford.edu'. What are they? If you ask to provide two positive and two negative effects of having a short DNS TTL for company's e-commerce site, what would be your answer?

problem 2)(a) IPv6 allows for 2128 addresses. That is about 295 addresses for every person alive. Why was IPv6 designed to have so many addresses? Identify two specific reasons.

(b) IPv4 contained a checksum while IPv6 does not. describe why the designers of IPv6 decided the checksum was not needed. Give at least 2 concrete reasons why they felt they could or should drop this feature.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96761

Have any Question? 


Related Questions in Computer Network & Security

I have one question and need a response to the other

I have one question and need a response to the other part.  The question needs to be at least two paragraphs with in text references and the other response need to be at least one paragraph and no references. Part 1 - Q1 ...

Topic 1 wireless technologiescreate a short essay 1 to 3

Topic 1: Wireless Technologies Create a short essay (1 to 3 pages) that describes how you will set up a wireless network for the Nardi Pardy Corporation (a fictitious company). In this simple scenario, the company office ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

Module discussion questionpersonal factors such as anger

Module Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate se ...

Questions1 describe three factors that help to influence

Questions: 1. Describe three factors that help to influence our nation's focus on natural or man-made disasters. 2. What issues have been raised concerning some of the authorities granted to government agencies in the PA ...

Assignmentyou have been tasked with reconfiguring the

Assignment You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administra ...

Information securityfor this weeks discussion consider the

Information Security For this week's discussion, consider the following prompts: A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows ...

1 what attributes do organizations seek in a candidate when

1. What attributes do organizations seek in a candidate when hiring InfoSec professionals? Prioritize this list of attributes and justify your ranking 2. What are the critical actions that management must consider taking ...

Iriss smartphone beeped frowning she glanced at the screen

Iris's smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail. "We've really got to do something about the spam!" she muttered to herself. She scanned the header of the message. "Uh- ...

Assignment description1overview of the assessmentthe

Assignment Description 1 Overview of the assessment: The purpose of this assignment is to develop skills to independently think of a situation and Apply skills to analyze complex problems in network security under superv ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen