EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 2, Problem P20P
Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the Web servers (outside your department) that are most popular among the users in your department? Explain.
Expert Solution & Answer
Learn your wayIncludes step-by-step video
schedule03:15
Students have asked these similar questions
Sort DNS records according to their kind. Give a short description of each with examples, as well as an explanation of why they are utilized. Is it feasible for a web server and a mail server in an organization to use the same alias for a hostname?
A person's e-mail address is his or her login name @ the name of a DNS domain with
an MX record. Login names can be first names, last names, initials, and all kinds of
other names. Suppose that a large company decided too much e-mail was getting lost
because people did not know the login name of the recipient. Is there a way for them to
fix this problem without changing DNS? If so, give a proposal and explain how it works.
If not, explain why it is impossible.
For DNS query, it is natural to expect that the local DNS server may not know how to resolve an
address. In this case, further queries will be made by this local DNS server. If a hacker can find
"a way" to make a certain DNS server report back the wrong IP address, then anyone trying to
get to one Web address will be sent to a bogus one, without any obvious way for the user to
detect that anything is wrong. Likewise, email could be delivered to the wrong destination.
1) Describe two possible attacks to make the resolver report the wrong IP address.
Chapter 2 Solutions
EBK COMPUTER NETWORKING
Ch. 2 - List five nonproprietary Internet applications and...Ch. 2 - Prob. R2RQCh. 2 - Prob. R3RQCh. 2 - Prob. R4RQCh. 2 - Prob. R5RQCh. 2 - Prob. R6RQCh. 2 - Prob. R7RQCh. 2 - Prob. R8RQCh. 2 - Prob. R9RQCh. 2 - Prob. R10RQ
Ch. 2 - Why do HTTP, SMTP, and POP3 run on top of TCP...Ch. 2 - Prob. R12RQCh. 2 - Prob. R13RQCh. 2 - Prob. R14RQCh. 2 - Prob. R15RQCh. 2 - Prob. R16RQCh. 2 - Prob. R17RQCh. 2 - From a users perspective, what is the difference...Ch. 2 - Prob. R19RQCh. 2 - Prob. R20RQCh. 2 - Prob. R21RQCh. 2 - Prob. R22RQCh. 2 - Prob. R23RQCh. 2 - Prob. R24RQCh. 2 - Prob. R25RQCh. 2 - In Section 2.7, the UDP server described needed...Ch. 2 - Prob. R27RQCh. 2 - Prob. P1PCh. 2 - Prob. P2PCh. 2 - Prob. P3PCh. 2 - Prob. P4PCh. 2 - Prob. P5PCh. 2 - Prob. P6PCh. 2 - Prob. P7PCh. 2 - Prob. P8PCh. 2 - Prob. P9PCh. 2 - Prob. P10PCh. 2 - Prob. P11PCh. 2 - Prob. P13PCh. 2 - Prob. P14PCh. 2 - Prob. P15PCh. 2 - Prob. P16PCh. 2 - Prob. P17PCh. 2 - Suppose you can access the caches in the local DNS...Ch. 2 - Prob. P21PCh. 2 - Prob. P22PCh. 2 - Prob. P23PCh. 2 - Prob. P25PCh. 2 - Prob. P26PCh. 2 - Prob. P27PCh. 2 - Prob. P28PCh. 2 - Prob. P29PCh. 2 - Prob. P30PCh. 2 - Prob. P31PCh. 2 - Prob. P32P
Additional Engineering Textbook Solutions
Find more solutions based on key concepts
The smallest unsigned integer that can be represented in a 16-hit memory location is 02.
Prelude to Programming
Suppose someone had used the false kinetics (i.e., wrong E, wrong n)? Would the catalyst weight be overdesigned...
Elements of Chemical Reaction Engineering (5th Edition) (Prentice Hall International Series in the Physical and Chemical Engineering Sciences)
1.1 What is the difference between an atom and a molecule? A molecule and a crystal?
Manufacturing Engineering & Technology
Assume that dog and cat are instances of the Pet class, which has overloaded the operator. Rewrite the followi...
Starting Out with C++: Early Objects
Show the output of the following JavaFX program: import javafx.application.Application; import javafx.stage.Sta...
Introduction to Java Programming and Data Structures, Comprehensive Version (11th Edition)
Porter’s competitive forces model: The model is used to provide a general view about the firms, the competitors...
Management Information Systems: Managing The Digital Firm (16th Edition)
Knowledge Booster
Similar questions
- You may organize DNS records by type. All of them need to be broken down into bite-sized chunks, with examples and justifications. Can a company's web server and email server have the same hostname?arrow_forwardSort DNS records by type. Each should be defined in depth, including examples and justifications for its use. A web server and an internal mail server may share a hostname, but is this possible?arrow_forwardFor the sake of argument, let's say you have permission to use the DNS caches on your organization's DNS servers. When working with clients outside of your organization, how would you go about determining which web servers are most often used, and why? Justify your pick by explaining why you made it.arrow_forward
- Show step by step how native authentication and authorization services are implemented whenever a web client attempts to access the protected resources of a web server. There are primarily two camps of people that support layered protocols: the You may be able to demonstrate that what you are saying is correct by providing instances.arrow_forwardWhen a web client attempts to get access to protected resources hosted by a web server, it is important to demonstrate the step-by-step implementation of native authentication and authorization services. What are the two most persuasive arguments in favor of layered protocols and why should they be used? You need to provide specific examples to back up your point.arrow_forwardSuppose DNS transaction IDs were extended from 16 bits to 32 bits. Based on a "birthday attack" analysis (see the hint in #2 above, which is a brief explanation of this technique), how many DNS requests (each with 1,024 fake responses) would an attacker need to make in order to get a 50% chance of succeeding in a DNS cache poisoning attack?arrow_forward
- When a web client requests access to a web server's restricted resources, display the full chain of native authentication and authorization services. What are the best two reasons in favour of a layered protocol? Prove your point.arrow_forwardWhen a web client requests access to protected server resources, show how to implement native authentication and authorisation services on a web server. What are the two strongest justifications for layered protocols? Give examples to back up your claim.arrow_forwardSort DNS records based on their type.Explain why they are used and briefly describe each one with examples.Is it possible for a web server and a mail server in the same company to have the same alias for a hostname?arrow_forward
- Exhibit how to configure native authentication and authorization services on a web server when a web client requests access to protected resources on a web server. Do you believe that the first of these two reasons in support of layered protocols is the stronger? Can you provide specific examples to support your claim?arrow_forwardShow how to turn on native authentication and authorization services on the web server when a web client seeks access to restricted resources. Which of these two justifications for layered protocols do you find to be more convincing? Can you provide instances to support your claim?arrow_forwardMake a list of all the different sorts of DNS records in a catalog. You are required to provide a comprehensive rationale for each of these, replete with examples. Is it possible to share the same hostname alias for a website's server and an email server?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education