How to perform recursive queries of other dns servers

Assignment Help Computer Networking
Reference no: EM13330337

A router with two interlaces. SO and E0. SO IS your connection to the Internet, and tne imerface you are configuring the rubs for. The internal network address is 134.39.0.0.

Users on the internal company network are allowed to access the following resources on the Internet

Mail servers
Web servers
News servers

You also have an internal DNS server that Anil need to perform recursive queries of other DNS servers on the Internet. Its IP address is 134.39.23725.

You have the following internal resources that can be accessed from the Internet: A Web server with the IP Address of 134.3923721
A News server with the IP Address of 134.39.237.22

WHAT IS EXPECTED: You are expected to turn in a network diagram. and access control lists for both incoming and outgoing traffic for the appropriate interface.

2. A router with two interfaces. SO and Ell. SO Is your connection to the Internet. and the Interface.

You also have an internal DNS server that we need to perform recursive queries of other DNS servers on the Internet. Its IP address is 134.3923726.

A user with an IP address of 134.39.237.50 is allowed to access the telnet service on two external servers. 193.100.100.1 and 194.50.65.72.

An Administrator with an IP Address of 134.39.237.24 is allowed to access external FTP servers.

You have the following internal resources that can be accessed from the Internet: A Web server with the IP Address of 134.39237.21

A News server with the IP Address of 134.39.237.22

An FTP server with the IP Address of 134.39237.23

WHAT IS EXPECTED: You are expected to turn in a network diagram. and access control lists for both incoming and outgoing traffic for the appropriate interface.

Reference no: EM13330337

Questions Cloud

Two resources-labor and wood : The Pinewood Furniture Company produces chairs and tables from two resources-labor and wood.
What is the center of mass velocity of the tall object : As part of a carnival game, a 0.578-kg ball is thrown at a stack of 19.3-cm tall, 0.423-kg objects and hits with a perfectly horizontal velocity of 12.8 m/s. What is the center of mass velocity of the tall object immediately after it is struck
State the balanced nuclear equation for the formation : Write the balanced nuclear equation for the formation of 241/95 Am through beta decay
Find the angular velocity of the platform with its load : A 97.1-kg horizontal circular platform rotates freely with no friction about its center at an initial angular velocity of 1.67 rad/s. Find the angular velocity of the platform with its load
How to perform recursive queries of other dns servers : You are expected to turn in a network diagram. and access control lists for both incoming and outgoing traffic for the appropriate interface.
Explain when a greater change in disorder occurs : For a given transfer of energy, a greater change in disorder occurs when the temperature is high.
Determine the magnitude of the frictional force : in an exciting game, a baseball player manages to slide safely into second base. the mass of the player is 80.9 kg, find the magnitude of the frictional force
Bathking industries : BathKing Industries
Characteristics associated with social disorganizationand : Statistics that either support or refute the relationshipbetween the characteristics associated with social disorganizationand those associated with being a victim of crime.

Reviews

Write a Review

Computer Networking Questions & Answers

  Presentation to a civic organization on the ''best practices''

presentation to a civic organization on the 'best practices' for home and small business wireless network security. Provide an outline of the contents of that presentation which includes suggestions for best practices for home/SOHO security.

  Research various features that were added to ipv6 protocol

Take the time to research the various features that were added to the IPv6 protocol (compared to IPv4). Choose one feature and provide a brief explanation of its benefits.

  Explain the steps take to stop cyber squatter

First protective strategy which is to register your trademark a trademark it can. Having it listed in the government registry is the right way to go, registry.

  Kind of challenges did irs encounter when implementing cdw

What kind of challenges did the IRS encounter when implementing its CDW? What management,organization, and technology issues had to be addressed?

  Why is it significant to secure windows and unix servers

CIO has asked you to describe why you suggest it is so significant to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  Sketching lan with operation over a distance

You have been asked to sketch a LAN with operation over a distance of about 100m.

  Invoke method to tell air conditioner on or not

Suppose there is a reference variable myAC to object of this class, which has already been created. Using reference variable, invoke method to tell air conditioner object to turn on.

  Create a network design for training environment

Create a network design which accommodates these requirements and keeps costs down. These training environments a maximum of one instructor and 12 students.

  Define five layers of tcp/ip protocol suite

Write a 2 page research paper (excluding the title page) on the five layers of TCP/IP protocol suite. In addition to textbook, use two other resources (Wikipedia sources are not permitted) and list each resource used at the end of paper in the ref..

  Define a new generation of wireless lan technology

In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN techno..

  Impact of a particular trend in technology

Analyze the impact of a particular trend in technology on education and analyses of various authors on innovations and technological transformations in education and in other fields.

  Describe threats to information security

Explain the relationship between privacy and IT. Describe some of the threats to information security and some of the measures you can take to protect information resources.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd