Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In this problem you will use the unix utility 'dig' to explore contents of DNS messages. Please use dig on unix.andrew.cmu.edu. The format of a dig request is simple. Just type:

dig www.princeton.edu to perform a look-up for that DNS name. As you now know, DNS requests can do more than just ask for IP address corresponding to single DNS name. Type dig princeton.edu ANY to see DNS records of all types that are associated with the domain `princeton.edu'.

(a) What IP address did computer you are logged into contact to make the DNS request? Where do you think this server is located?

(b) List all of the various kinds of records received as a result of your query. For each record, describe its purpose, using one of the entries provided in the reply as the concrete ex.

(c) Note that some of the names in the reply are not in a domain `princeton.edu'. Use the DNS names and/or `traceroute' to find the general location of one of these servers. Where is it? Given the type of record, why would Princeton do this?

(d) Use dig to find the names of two non-local servers you could contact in the process of identifying the nameserver for the domain `cnn.com' (assume no DNS information is cached anywhere).

(e) Use dig to determine the TTL for the DNS mappings of `www.cnn.com' and `www.cs.stanford.edu'. What are they? If you ask to provide two positive and two negative effects of having a short DNS TTL for company's e-commerce site, what would be your answer?

problem 2)(a) IPv6 allows for 2128 addresses. That is about 295 addresses for every person alive. Why was IPv6 designed to have so many addresses? Identify two specific reasons.

(b) IPv4 contained a checksum while IPv6 does not. describe why the designers of IPv6 decided the checksum was not needed. Give at least 2 concrete reasons why they felt they could or should drop this feature.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96761

Have any Question? 


Related Questions in Computer Network & Security

Assignmentwan technologies paper research point-to-point

Assignment WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies as ...

Assignmentin this project we will design a network solution

Assignment In this project we will design a network solution that is suitable for a small business. Our business is located in an office park in one floor of a new office building. Our office has all of the modern featur ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized format ...

Question 1which of the following must you do before ip

Question 1 Which of the following must you do before IP source guard can be used on a switch port? (Select 2 choices.) A) Enable IP routing on the switch port. B) Enable DHCP snooping on the switch. C) Configure static I ...

Computer scienceprimary task response within the discussion

Computer Science Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discus ...

Learning team apply encryption standardsyour team was

Learning Team: Apply Encryption Standards Your team was invited to present to a high school IT class to explain how cryptography works. In order to explain the basics, you decide to show the class a tool called, CrypTool ...

Your assignment must be in microsoft word formatnote your

Your assignment must be in Microsoft Word format Note: Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website Question 1: Firewall Rule Design The fo ...

Two reasearch paperswan technologies paper research

Two Reasearch Papers WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission techn ...

Assignment description1overview of the assessmentthe

Assignment Description 1 Overview of the assessment: The purpose of this assignment is to develop skills to independently think of a situation and Apply skills to analyze complex problems in network security under superv ...

Presentation - tool comparisonat this point you have been

Presentation - Tool Comparison At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro