Develop the dns server

Assignment Help Computer Networking
Reference no: EM133008024

SIT202 Secure Networking

Task 6.2C

As you are targeting above the pass grade, you will be expected to gain deeper understanding of the topics we cover in this unit, going above and beyond in your learning journey. For this credit task, you will be developing a DNS server using Python.

Task Requirement

Present evidence that you have been able to develop the DNS server according to the instructions provided. You need to submit your summary and reflections on your learning & evidence to OnTrack.

Task Instruction
For this task, you will build a DNS server using Python. Your DNS server must have the following features and functionality.
• As we have learnt in Module 2, DNS uses UDP as the transport layer protocol.
• Uses the query and response messages.
• Capable of supporting two types of resource records, A and CNAME.
• Capable of supporting Hostname-to-IP-address translation and host aliasing.
• The server must display a message on the terminal when it is started to indicate it is running.
You must also build a client program to test the DNS server. The client program must be able to provide the hostname /alias name in the terminal and send a DNS query to the server. The client process must display the response received from the server in the terminal. Client program should also prompt the user to check whether the user would like to continue with another DNS query or not.

Attachment:- DNS.rar

Reference no: EM133008024

Questions Cloud

Explain the operation and handshake process : Explain the operation and handshake process of TLS using the screen captures of Wireshark - You need to clearly identify the message sequence and protocols
Enhance the performance of cavinkare : Discuss any five human capital interventions that Ranganathan implemented to enhance the performance of Cavinkare.
Identify the message sequence and protocols : Demonstrate that you have been able to use what you have learnt in the unit to extend your knowledge on the chosen topics.
Should you sell to this firm on credit : You are willing to sell inventory to the firm on credit provided that you will be paid within 60 days. Should you sell to this firm on credit
Develop the dns server : Understanding of the topics we cover in this unit, going above and beyond in your learning journey. For this credit task, you will be developing a DNS server
Compensation policies for pharmacists : Four pharmacists have been hired in a pharmacy, two of them have been hired in May and the other two in December. Compensation policies for these pharmacists ar
Aspects of management : Give real world examples of the following aspects of management: planning, communication, decision-making, risk management, ethics, social responsibility, human
Discuss intentional rating error-unintentional rating error : Discuss one intentional rating error and one unintentional rating error. How can supervisors be helped to avoid these kinds of errors?
Physical layer and connection module : Provide an overview of what you have learnt in Physical Layer and Connection Module - how you overcame these difficulties, and what you learnt from them.

Reviews

Write a Review

Computer Networking Questions & Answers

  Installing of hardwares

When replacing a failing hard drive, unplug the computer and press the power button to drain the electricity (Andrews, 2010).

  What is the implication of the switch-over to

when will the switch-over from ipv4 to ipv6 happen? what is the implication of the switch-over to companies? nbspassume

  Construct a diagram to map the arguments about a moral claim

Construct a diagram to map the arguments about a moral claim that you have identified in the article and undertake further research about your chosen case. to assist you in analysing and discussing it in your essay.

  Differences between symmetric and asymmetric encryption

Explain the key differences between symmetric and asymmetric encryption.- Which can the computer process faster? Which lowers the costs associated with key management?

  Wirte about implementaion on GNS

Wirte about implementaion on GNS3 (what,why,how)and integrate with VMare and explain the pic

  Global finance inc network diagram

Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of network devices as displayed in the diagram

  What did you do to allow pings from outside your network

Using Windows Firewall with Advanced Security to Limit Access to Your Computer Time Required: 15 to 30 minutes Objective: Limit access to your computer's Remote

  Port security configuration of a cisco switch port

If you need to verify the port security configuration of a Cisco switch port, which command would be used?

  Perform a planning operation

You are required to perform a planning operation for a simple multi-floor environment. The floor plan details are shown in appendix 1. The building is a multi-floor

  Explore how public key cryptography works

Explore how Public Key Cryptography works - Explore how Public Key Cryptography works and summarise this in your own words with particular attention

  Describe the various transmission mediums

Describe the various transmission mediums and explain the best use of each with various examples of business use. Identify communications capabilities of each medium and the types of signals that are used for each

  BN309 Computer Forensics Assignment

BN309 Computer Forensics Assignment Help and Solution, Melbourne Institute of Technology - Assessment Writing Service

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd