Dns records and messages - application layer, Computer Networking

Assignment Help:

DNS Records  and Messages

Two types  of records  are used DNS. The  question records  are used in the question  section of the query and response  messages. The resource  records  are used in the  answer  authoritative  and additional  information sections of the  response  message.

Question Record: A questions records in used by the client  to get  information  from a server. This contains the domain  name.

Resource Record: Each domain  name is  associated  with a  record  called  the resource  record. The server database  consists  or resource  returned by the server to the client.

A resource  records is a quadruple that contains the  following  fields.

Name , Value , Type , TTL

TTL  is the time  to live of  the resource records. It determines  when a resource  should be  removed  from a cache form a  cache. In the example  records given below  we ignore the TTL  field.

The  meaning of  name  and value  depend on  type:

If a DNS  server is authoritative for a  particular host name  then the DNS  server will  contain  a type a record for the  hostname. If a server is not authoritative  for a hostname  then the  server will contain a type NS record for the  domain  that includes the hostname. It  will also  contain  a Type  a record that provides the IP address of the DNS  server in the value field of the NS  records. As an example suppose an edu TLD server is not  authoritative for the host gain cs un mass edu. Then this server will contains  a record for a  domain that includes the host cs mass. Edu. For example  ( umass edu dns unmass. Edu  NS) the du TLD server would  also contain a Type a record which maps the DNS. Server dns  umass.edu to an IP address for example  ( dns umass edu 128.119.111A)


Related Discussions:- Dns records and messages - application layer

Find the main problems with access points in a wireless lan, Question: ...

Question: Wireless Access points have been known to have various security vulnerabilities that can lead to breach of Secured wired networks. IEEE 802.11 standards have identifi

What is the difference between a hub and a switch, What is the difference b...

What is the difference between a hub and a switch? A hub acts as a multiport repeater. Though, as more and more devices connect to it, it would not be able to efficiently manag

What is a tp monitor, What is a TP Monitor? There is no commonly accept...

What is a TP Monitor? There is no commonly accepted explanation for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".

What is project 802, What is Project 802? It is a project begins by IEE...

What is Project 802? It is a project begins by IEEE to set standards that enable intercommunication among equipment from a variety of manufacturers. It is a way for specifying

Explain the basic of network properties, Explain the basic of Network Prope...

Explain the basic of Network Properties   The subsequent properties are related with interconnection networks. 1)  Topology: It refers how the nodes a network are systema

Software overheads in parallel programming , Besides these hardware overhea...

Besides these hardware overheads, there are certain software overheads imposed by libraries, parallel compilers, tools and operating systems. The parallel programming languages

Networks edge and technologies - computer networks , Networks Edge  and Te...

Networks Edge  and Technologies Network  Edge  provides  information  exchange  between  the access network  and the core  network. The devices  and facilities in the network

Data structures for parallel algorithms, To execute any algorithm, selectio...

To execute any algorithm, selection of a proper data structure is very crucial. A particular operation may be executed with a data structure in a smaller time but it may have a ver

Explain the technique- backpressure, Explain the technique- Backpressure ...

Explain the technique- Backpressure This technique produces an effect same to backpressure in fluids flowing down a pipe. It includes link-by-link use of flow control in a dire

Explain silly window syndrome, Q. Explain Silly window syndrome? When e...

Q. Explain Silly window syndrome? When either sending application sends data gradually or receiving application consumes data slowly - Illustration when 1 byte sent 40 bytes

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd