Dns name resolution process

Assignment Help Basic Computer Science
Reference no: EM131939741

How would you respond to your classmate if they wrote:

DNS is a hierarchical, distributed database that maps logical host names to IP addresses. In the DNS name resolution process, a windows client examines its host file for the name. If the name is not in the hosts file, it examines its local DNS cache for the name. If the name is not in the hosts file or in the cache, the client sends the request to the DNS server. A windows user can verify the local DNS cache by using ipconfig /displaydns (Testout.com). I typically use this command at work a lot for users who are having issues connecting to out intranet website. To conclude, in order to make host name resolution scalable and centrally managed on a network, IP address mappings for FQDN's are stored in DNS servers. Using this method gives the user the ability to have a local database file to resolve personalized nicknames and to use globally distributed DNS database to resolve FQDN's (technet.microsoft.com).

Reference no: EM131939741

Questions Cloud

How to get the MIRR with unconventional cash flows : the work to understand how to get the MIRR with unconventional cash flows. the firm’s cost of capital is 9%, what is the project’s MIRR?
Common methods of communications today : Email is one of the most common methods of communications today. What are some of the ways that email can be investigated and used as evidence?
Discuss why virtual memory is such a wonderful invention : Use the Web to research the Achilles heel of virtual memory, which is too much paging (i.e., thrashing), and how it can kill performance.
What are the advantages of using group decision making : What are the advantages of using group decision making? Discuss the difficulties associated with sharing and collaboration in two processes
Dns name resolution process : DNS is a hierarchical, distributed database that maps logical host names to IP addresses. In the DNS name resolution process
Exploiting a wireless network : Research several publicly known security breaches made news headlines, which involved the attacker(s) exploiting a wireless network
Cause the price to be set to zero : Any other entered size invalid and should cause the price to be set to zero.
Organizing shared information : Information architecture can be simply defined as organizing shared information. There are many different ways to organize web sites
Personnel should have access to the it infrastructure : 1. How do you determine which personnel should have access to the IT infrastructure? Should a CEO automatically have access? Should a CIO?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Cyberlaw and ethics question

What is view of the Chinese government's efforts to censor the Internet? do you think the Internet's free speech properties will slowly erode any government's.

  Components of it infrastructure

What are the components of IT infrastructure and what are the functions of each component?

  Concentrate on the uml group of tools

Provide a discussion on the various object oriented tools and their purpose, you should concentrate on the UML group of tools - these might prove useful in the development of a new software development which is to be developed for theorganisation ..

  Involved in digital business

Research a company that is involved in digital business and/or the Internet of Things.

  What are the benefits of using tangible interfaces

What are the benefits of using tangible interfaces compared with other interfaces like GUI, pen-based or gesture?

  Creating truly anonymous electronic cash requires a bank to

1. refers to preventing data delays or denials.integritysecrecynecessityreadinessnbspquestion 2 refers to protecting

  Identification of business goals

Carefully explain how each step of the adoption was designed (identification of business goals, multidimensional assessment, and so on).

  Management regarding interrogation-communications

What are the restrictions upon management regarding interrogation and communications with employees during the organizing campaign? What does bargaining in good faith entail and how does that apply to mandatory, permissive, and prohibited issues?

  Change the diagram to show the three-handshake closing

Figure 24.15 shows the client and server in the transition diagram for the common scenario using a four-handshake closing. Change the diagram to show the three-handshake closing.

  Select statements to query the student schema

Write Ten SQL SELECT statements to query the STUDENT schema you created for practice lab 2. Your Select Statements should run error-free and should be valid.

  Requirement for a private color data field

My java intro programming professor has a requirement for a private color data field named guitarColor with a default value of Color.Red.

  Showing how to use the html element

Describe the attributes that you think would be useful with the HTML element. Provide an example code snippet showing how to use the HTML element. !DocType Html

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd