Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Distribution of DNS
1.By centralized data base
The information contained in the domain name space must be stored. A simple design or DNS would have one DNS server that contains all the mappings. In this centralized design. Client simply direct all queries to the single DNS server, and the DNS server responds directly to the querying clients. The problems with a centralized design include.
a.Traffic Volume: A single DNS server would have handle all DNS queries (for all the HTTP request and e mail message generated from hundreds of millions of hosts.
b. A single point of failure. It the DNS server crashes so does the entire internet.
c. Distant Centralized Database: A single DNS server cannot be close to all querying client. If we put the single DNs server in new York city then all quarters form Australia must travel to the other side of the globe perhaps over slow and congested links. This can lead to significant delays.
d.aintenance: This single DNS server would have to keep records for all internet hosts. Not only would this centralized database be huge,, but it would have to be updated frequently to account for every new host to those servers. In the internet there are 13 root DNS serves ( Ladled a through M) most of which are located in north America.
In summary single DNS with centralized data base has lot of problems. To overcome these problems DNS should b presented in a particular hierarchy. Show as below.
State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all
List the Advantages of microwaves. a. They need no right of way acquisition among towers. b. They can carry high quantities of information because of their high operating f
Create a custom chi-square function in matlab, MATLAB in Statistics
Q. Define V - 32 modem? - ITU-T's V.32 standard was issued in 1989 for asynchronous and full-duplex operation at 9600 bps. - Even though designed for asynchronous DTEs two
What is client/server? Client/server is a type of network wherein one or more computers act as servers. Servers give a centralized repository of resources like printers and fil
Question: a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys. b) Using Pla
Base 64 Encoding The Simple Mail Transfer Protocol (SMTP) is a protocol used on the Internet for sending email. When you send an email, your mail client establishes an SMTP co
Firewalls Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to des
Store-and-forward switch The layer 2 switch accepts a frame on an input line, buffers it briefly, and then routes it to the appropriate output line. Cut-through switch
Recognize the two commands that copies the configuration in NVRAM to RAM Ans) a) Copy startup-config running-config b) Configure memory
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd