Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In this problem you will use the unix utility 'dig' to explore contents of DNS messages. Please use dig on unix.andrew.cmu.edu. The format of a dig request is simple. Just type:

dig www.princeton.edu to perform a look-up for that DNS name. As you now know, DNS requests can do more than just ask for IP address corresponding to single DNS name. Type dig princeton.edu ANY to see DNS records of all types that are associated with the domain `princeton.edu'.

(a) What IP address did computer you are logged into contact to make the DNS request? Where do you think this server is located?

(b) List all of the various kinds of records received as a result of your query. For each record, describe its purpose, using one of the entries provided in the reply as the concrete ex.

(c) Note that some of the names in the reply are not in a domain `princeton.edu'. Use the DNS names and/or `traceroute' to find the general location of one of these servers. Where is it? Given the type of record, why would Princeton do this?

(d) Use dig to find the names of two non-local servers you could contact in the process of identifying the nameserver for the domain `cnn.com' (assume no DNS information is cached anywhere).

(e) Use dig to determine the TTL for the DNS mappings of `www.cnn.com' and `www.cs.stanford.edu'. What are they? If you ask to provide two positive and two negative effects of having a short DNS TTL for company's e-commerce site, what would be your answer?

problem 2)(a) IPv6 allows for 2128 addresses. That is about 295 addresses for every person alive. Why was IPv6 designed to have so many addresses? Identify two specific reasons.

(b) IPv4 contained a checksum while IPv6 does not. describe why the designers of IPv6 decided the checksum was not needed. Give at least 2 concrete reasons why they felt they could or should drop this feature.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96761

Have any Question? 


Related Questions in Computer Network & Security

Q1 the rijndael algorithm was chosen for the advanced

Q1: The Rijndael algorithm was chosen for the Advanced Encryption Standard (AES). Using either the attached tutorial, or your own sources of information, pick one (or more) steps of the algorithm and explain it in some d ...

Assignment elastic and inelastic trafficwrite a three to

Assignment: Elastic and Inelastic Traffic Write a three to four page paper in which you: 1. Outline a plan for the development of an addressing and naming model in an environment of the following scenario: o Ten departme ...

Term paper chief security officeryou have been hired as the

Term Paper: Chief Security Officer You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security ...

Topic ethernet technologiescreate a short essay 1 to 3

Topic: Ethernet Technologies Create a short essay (1 to 3 pages) that describes an Ethernet frame. You will need to do some research to understand the construction of an Ethernet frame. As you describe an Ethernet frame, ...

This assignment assumes that you are one of the network

This assignment assumes that you are one of the Network Engineer of a small Company which has two branch offices, Branch 1 (BR1), Branch 2 (BR2) and a Headquarter (HQ). The branches need to be interconnected to the Headq ...

Technical paper risk assessmentglobal finance inc network

Technical Paper: Risk Assessment Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of netw ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

Global asset inc gaiglobal asset inc gai is a financial

GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GAI specializes in financial ...

In order to provide for the new services at the akron ohio

In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and configured. Create a security matrix spreadsheet and security strategy summary. Include the user rol ...

Case projectnbsp law firm companynbsp law firm lincoln

CASE PROJECT:  LAW FIRM Company:  Law Firm: Lincoln Partners, Esq. A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth.  The Law firm curre ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen