Networking and Telecommunications

User Generated

jrnjnxr456

Computer Science

Description

Using Wireshark, analyze your DNS traffic on your machine. Run Wireshark for at least 5 minutes or give it enough time to capture some DNS traffic. Do research DNS and talk about what it does and the trends regarding encryption. Do also talk about Wireshark - what the tool allows you to do. Use the DNS traffic capture and analyze it providing information on what is happening. Compare your traffic to what you researched about DNS. Provide screenshots (https://support.microsoft.com/en-us/help/13776/win...).

Follow APA style. Deliverable length 12-pages. Have cover page, abstract, 8-pages of content, conclusion and references page.

Attention to detail, grammar, spelling, and neatness at the collegiate level is expected. Failure to follow APA guidelines will result in a poor class grade.


Resources:

Introduction to TCP/IP:

Application Layer Protocols:

Understanding DNS:

DNS Header:

Command Prompt: https://www.techopedia.com/definition/5420/command...

How to Use the Cmd:

nslookup: https://technet.microsoft.com/en-us/library/bb4909...

VirtualBox:

The Complete Wireshark Course:

APA Sample Paper: https://owl.english.purdue.edu/media/pdf/200902120...

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1
Networking and Telecommunication

Networking and Telecommunication

Student name:
Institutional affiliation:

2
Networking and Telecommunication
The attached document contains the answer to “Networking and Telecommunication”


1

Running Head: Networking and Telecommunication

Networking and Telecommunication

Student name:
Institutional affiliation:

2

Networking and Telecommunication

Abstract
This paper contains a research on DNS, what they and the trends regarding
encryption, detailed description of Wireshark, an explanation on using the DNS traffic
capture and analyze it providing information on what is happening and a comparison of
my traffic to what you researched about DNS. A telecommunications network can be
defined as a group of terminal nodes that are interconnected so as to enable
telecommunication between the set terminals. The transmission links connect the nodes
together. The nodes use circuit switching, message switching or packet switching to pass
the signal through the correct links and nodes to reach the correct destination terminal.
Domain Name System(DNS) is a system designed locate and identify devices connected
to the internet. Wireshark is a packet analyzer that has an open and free source.
Wireshark is used in troubleshooting for networks, education, development of a
communication protocol, software and analysis. Wireshark was initially referred to as
Ethereal but it was later changed to Wireshark because trademarking issues. It is worth
noting that Wireshark has a cross-platform, applying Qt widget toolkit in present releases
for user interface implementation, and applying pcap for packet capturing; this implies
that that it runs on Solaris, BSD, macOS and Linux, Unix-like systems of operation, and
even on Microsoft Windows.

3

Networking and Telecommunication
Networking and Telecommunication
It is common for people to ask whether there is a method of using DNS to support
encryption. according to my opinion, there is a high likelihood of using encryption to
support DNS instead of using DNS to support encryption. According to my research,
Domain Name System(DNS) is a system designed locate and identify devices connected
to the internet. Moreover, DNS is database use publicly thus have high level of
insecurity. It is worth noting that since the DNS query results and requests are easily
altered or intercepted, then there is a low probability of using Domain Name
System(DNS) as a foundational tool to provide any type of support for encryption. For
example, in a situation where attackers poison DNS cache, they use this mechanism to lie
a DNS server that the information received is authentic when, in real sense, the
information is not authentic. In fact, the reason as to why there are many possible attacks
on DNS servers is because DNS responses do not bear a cryptographically signature.
There is an increasing demand for better protection of DNS responses and queries
because DNS use in expanding from its original aim since it is currently used in many
devices connectable to the internet ranging from kitchen appliances to smartphones.
However, it is important to note that it is turning to be a difficult task to secure DNS
since any alteration is supposed to achieve the internet scale and also prove compatibility
with older systems. This and poor cooperation among key Internet players are the reasons
as to there is poor adoption of initiatives such as Domain Name System Security
Extensions (DNSSEC), which are supposed to improve DNS security. (Liu & Albitz,
2009)

4

Networking and Telecommunication
Another method useful in validating the results from DNS is the use of the
Forward Confirmed Reverse DNS (FCrDNS). FCrDNS has the ability to verify whether
an IP address possesses both reverse and forward entries of DNS that are matching one
another. It is worth noting that DNS entries are useful in authenticating an appropriate
relationship between a network owner and domain name owner associated to a particular
IP address. It important to note that this authentication is strong enough to be applicable
for during whitelisting. This is because there is a correlation o...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags