Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In this problem you will use the unix utility 'dig' to explore contents of DNS messages. Please use dig on unix.andrew.cmu.edu. The format of a dig request is simple. Just type:

dig www.princeton.edu to perform a look-up for that DNS name. As you now know, DNS requests can do more than just ask for IP address corresponding to single DNS name. Type dig princeton.edu ANY to see DNS records of all types that are associated with the domain `princeton.edu'.

(a) What IP address did computer you are logged into contact to make the DNS request? Where do you think this server is located?

(b) List all of the various kinds of records received as a result of your query. For each record, describe its purpose, using one of the entries provided in the reply as the concrete ex.

(c) Note that some of the names in the reply are not in a domain `princeton.edu'. Use the DNS names and/or `traceroute' to find the general location of one of these servers. Where is it? Given the type of record, why would Princeton do this?

(d) Use dig to find the names of two non-local servers you could contact in the process of identifying the nameserver for the domain `cnn.com' (assume no DNS information is cached anywhere).

(e) Use dig to determine the TTL for the DNS mappings of `www.cnn.com' and `www.cs.stanford.edu'. What are they? If you ask to provide two positive and two negative effects of having a short DNS TTL for company's e-commerce site, what would be your answer?

problem 2)(a) IPv6 allows for 2128 addresses. That is about 295 addresses for every person alive. Why was IPv6 designed to have so many addresses? Identify two specific reasons.

(b) IPv4 contained a checksum while IPv6 does not. describe why the designers of IPv6 decided the checksum was not needed. Give at least 2 concrete reasons why they felt they could or should drop this feature.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96761

Have any Question? 


Related Questions in Computer Network & Security

1 assume a system with two processors in series where each

1. Assume a system with two processors in series where each processor has an unlimited queue in front of it; also assume FIFO queue disciplines for both servers. We need to collect data on individual entity total time in ...

Threat management and disaster recovery final paper this is

Threat Management and Disaster Recovery Final Paper This is a two part assignment that will be submitted as one final paper Part 1 I would like you to complete a limited Risk Assessment for a fictional enterprise. This a ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

Benefits of cloud-based office productivity softwarebased

Benefits of Cloud-based Office Productivity Software Based on what you have learned about using cloud-based office productivity software, create a 5-slide presentation to the department head or CEO to convince him or her ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized format ...

Iriss smartphone beeped frowning she glanced at the screen

Iris's smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail. "We've really got to do something about the spam!" she muttered to herself. She scanned the header of the message. "Uh- ...

Discussion window media servicebulldiscuss sharepoint

Discussion Window Media Service • Discuss SharePoint services and various SharePoint options as well as Windows Media Rights Management to handle the requirements of different enterprise scenarios, such as one that requi ...

Assignment description1overview of the assessmentthe

Assignment Description 1 Overview of the assessment: The purpose of this assignment is to develop skills to independently think of a situation and Apply skills to analyze complex problems in network security under superv ...

Wireless and remote access securitykey assignment

Wireless and Remote Access Security Key Assignment Draft Great progress has been made on the design of the network with the addition of the client and server security models in the previous assignment. With the increasin ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro