Dns records and messages - application layer, Computer Networking

Assignment Help:

DNS Records  and Messages

Two types  of records  are used DNS. The  question records  are used in the question  section of the query and response  messages. The resource  records  are used in the  answer  authoritative  and additional  information sections of the  response  message.

Question Record: A questions records in used by the client  to get  information  from a server. This contains the domain  name.

Resource Record: Each domain  name is  associated  with a  record  called  the resource  record. The server database  consists  or resource  returned by the server to the client.

A resource  records is a quadruple that contains the  following  fields.

Name , Value , Type , TTL

TTL  is the time  to live of  the resource records. It determines  when a resource  should be  removed  from a cache form a  cache. In the example  records given below  we ignore the TTL  field.

The  meaning of  name  and value  depend on  type:

If a DNS  server is authoritative for a  particular host name  then the DNS  server will  contain  a type a record for the  hostname. If a server is not authoritative  for a hostname  then the  server will contain a type NS record for the  domain  that includes the hostname. It  will also  contain  a Type  a record that provides the IP address of the DNS  server in the value field of the NS  records. As an example suppose an edu TLD server is not  authoritative for the host gain cs un mass edu. Then this server will contains  a record for a  domain that includes the host cs mass. Edu. For example  ( umass edu dns unmass. Edu  NS) the du TLD server would  also contain a Type a record which maps the DNS. Server dns  umass.edu to an IP address for example  ( dns umass edu 128.119.111A)


Related Discussions:- Dns records and messages - application layer

url connection instance, What is the difference among URL instance and URL...

What is the difference among URL instance and URL Connection instance? Ans) A URL instance represents the location of a resource, and a URL Connection instance shows a link for

Tools that an attacker can use to crack wep, Question: Consider that yo...

Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f

Configure the physical topology- ccna, Configure the Physical Topology ...

Configure the Physical Topology Step 1: Cable the network. Refer to the figure and table below for the essential cables. Step 2: Physically connect lab devices. C

Command to configure a explanation on an interface, Recognize the command t...

Recognize the command to configure a explanation on an interface Ans) Router(config-if)# explanation Finance department

State the types of performance of computer hardware, State the types of per...

State the types of performance of computer hardware The hardware, i.e., the server or computer has a direct relationship on performance in the following areas: Reliabili

Describe some common threats to the hardware, Describe some common threats ...

Describe some common threats to the hardware Theft of a computer, printer, or other resources. Tampering by a disinterested or frustrated employee who takes every chan

What are the various security measures, What are the various security meas...

What are the various security measures A matter of prime concern to companies is the overheads in the form of huge investment on extra hardware and software. It is quite possi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd