Dns records and messages - application layer, Computer Networking

Assignment Help:

DNS Records  and Messages

Two types  of records  are used DNS. The  question records  are used in the question  section of the query and response  messages. The resource  records  are used in the  answer  authoritative  and additional  information sections of the  response  message.

Question Record: A questions records in used by the client  to get  information  from a server. This contains the domain  name.

Resource Record: Each domain  name is  associated  with a  record  called  the resource  record. The server database  consists  or resource  returned by the server to the client.

A resource  records is a quadruple that contains the  following  fields.

Name , Value , Type , TTL

TTL  is the time  to live of  the resource records. It determines  when a resource  should be  removed  from a cache form a  cache. In the example  records given below  we ignore the TTL  field.

The  meaning of  name  and value  depend on  type:

If a DNS  server is authoritative for a  particular host name  then the DNS  server will  contain  a type a record for the  hostname. If a server is not authoritative  for a hostname  then the  server will contain a type NS record for the  domain  that includes the hostname. It  will also  contain  a Type  a record that provides the IP address of the DNS  server in the value field of the NS  records. As an example suppose an edu TLD server is not  authoritative for the host gain cs un mass edu. Then this server will contains  a record for a  domain that includes the host cs mass. Edu. For example  ( umass edu dns unmass. Edu  NS) the du TLD server would  also contain a Type a record which maps the DNS. Server dns  umass.edu to an IP address for example  ( dns umass edu 128.119.111A)


Related Discussions:- Dns records and messages - application layer

Define power management in wireless network, Question 1 Brief the Fourth g...

Question 1 Brief the Fourth generation network. List its advantages and disadvantages Question 2 Explain the steps involved in component identification and call establishm

Networks edge and technologies - computer networks , Networks Edge  and Te...

Networks Edge  and Technologies Network  Edge  provides  information  exchange  between  the access network  and the core  network. The devices  and facilities in the network

What is unacknowledged connectionless service, What is Unacknowledged conne...

What is Unacknowledged connectionless service This service is a datagram-style service. It is a very simple service that does not involve any of the flow- and error-control mec

What is aspects of security, Q. What is Aspects of Security? - Securit...

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th

Explain the two modes of ip security, Question 1 Describe the architecture...

Question 1 Describe the architecture and usage of ISDN Question 2 Write about different network structures in use Question 3 Explain the concept of framing in Data Li

Network layer of the osi responsible for, What is the Network Layer of the ...

What is the Network Layer of the OSI responsible for? Ans) The Network Layer routes data from single node to another sends data from the source network to the destination networ

State the term - netbios and imap, State the term - NetBIOS and IMAP Ne...

State the term - NetBIOS and IMAP NetBIOS: Network Basic Input Output System is an API (applications programming interface) used with other programs to transmit messages betwee

What are intrusion detection systems, Question : a) Give three example...

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Distinguish between udp and tcp, Question: (a) Distinguish between UDP ...

Question: (a) Distinguish between UDP and TCP. (b) You have been asked to design and implement a chat application for a university. Which protocol could you used TCP or UDP

Udp segment structure - transport layer, UDP Segment Structure The  pr...

UDP Segment Structure The  primary  purpose  of the UDP protocols  is to expose datagram's to the application  layer. The UDP protocols does very  little and therefore  employ

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd