Domain Name System
DNS (Domain Name System)
The internet has rapidly grown and expanded. Its expansion and progress is unstoppable as the rate of growth recently has been increasing tremendously. With a few keystrokes one is able to visit an online library, bookstore, newsstands, and connect with family and friends. Nowadays searching for a website or email is like visiting a library. As is the case with physical addresses, the internet to uses addresses to locate specific devices found online. "The addresses can either be 32 or 128 bit number, which is referred to as Internet Protocol (IP) addresses" Graham, 2001, p. 35.
The virtual world too uses names referred to as domains, just as in the physical world. Domain names are easily remembered and more informative than the IP addresses. To ensure that domain names are properly associated with their respective IP addresses, the internet uses Name servers. These name servers translate the domain name into its respective IP address. "Domain Name System (DNS) is a protocol found in the set of standards that govern how computers exchange data and information on the internet" Implications & Council, 2005, p. 20.
As earlier mentioned computers on the internet are identified using their IP addresses. These addresses are not easy to remember, and that is why they are converted into domain names. DNS name resolution is the process of converting a domain name into its respective IP address. Whenever a person send an email or visits a website, the computer the person is using for this purpose will use a DNS server to search for the specific address the person is trying to access.
Domain Name System history
DNS was invented in the early 1980's. According to Bixler, Chambers, and Phillips (2002)
"before this networked computers would retrieve a HOSTS.TXT file, which was used for the mapping of domain names with numerical address." With the rapid growth of the internet, it was impossible to maintain the central hosts file because system administrators had to be disciplined enough to ensure that they always pick the updated version regularly. With the rapid growth, this meant that the administrators had to retrieve a large host's file more frequent. There was also only one single central authority that was responsible for updating, and adding names on the file. This was a problem as the authority did not have a way of ensuring that the changes are correct.
The limitations of the host file led to the need for another system that would offer the same functionality, but would also be consistent, distributed, autonomous, and reliable. This requirement is what gave birth to DNS. DNS system is hierarchical, which allows different administrators to make changes. This makes it distributed. Autonomy is allowed as administrators have the right and capability to make independent of others. DNS is reliable as changes made are propagated automatically. Consistency is ensured by having the same response been provided when requests are made from different locations.
Sekiya, Cho, Kato, & Murai, 2006()
posits "DNS servers have the sole responsibility of translating domain names into IP addresses." Though this seems to be an easy task, and it would be one were it not for some factors. These factors include currently there are many machines that are using human readable names and the IP addresses in use are in billions. The DNS servers have to process billions of requests every second. There are millions of people who keep on changing their IP addresses and domain names each day. These factors make the work of DNS servers more difficult because any changes have to be propagated automatically. DNS servers rely heavily on internet protocols and network efficiency to ensure that it handles requests effectively.
Building blocks of DNS
"DNS consists of three main components namely servers, resolvers, and content" Vixie, 2009, p. 44.
The DNS infrastructure is formed of servers and...
Riordan Manufacturing Human Resources Information Systems The Riordan Manufacturing is an organization that produces the plastic injection molding, and the management decides to take an advantage of the state of art technology to combine a variety of tools into a single application to develop the HRIS (human resources information systems). However, the organization needs to develop application architecture, process design, and system security for an effective implementation of the system. This
Here second question that is raised for the author is that till now and for the future, many healthcare architectures have been designed that increase the availability of the patient records, not only on the national but on an international scale as well. The author in the study has only focused on the national or local availability of the patient records. Content of the article is strong and there are
7 billion by 2008 establishing the fact that Linux is no more a fringe player but rather a mainstream. IDC admitted that Linux is not being used just on new hardware only. As an alternative customers frequently reinstall existing servers to run Linux. While considering for such use as also the use of Linux for secondary OS, IDC forecasts for servers running Linux to remain 26% larger in 2008. Evidently,
In this scenario, "if a bad guy wants to take over an account, he'll have someone else speak in a different language in a different location, and that's all they do. Their expertise is calling financial institutions for social engineering" (Piazza 2006). According to Piazza (2006), cybercrime consists of any crime a person commits by using a computer or computer technology. He classifies various types of cybercrime into four
Deployment and Administration - Windows Server 2012 Deployment and Server Additions The number of servers required the roles to be combined. Server Requirements: Careful evaluation of present and projected activity considerations helps decide the server configuration. The number of servers required will correspond directly to the amount of functional data handling for the next three to five years. If a growth of 33% is projected, then it would be prudent to use a RAM
SOPA Stop Online Piracy Act Dear Congressman Owens (NY), The Internet was created by the United States of America's military in order to better communicate information between computers long distances apart without requiring physical connections; thereby creating a free and open space between the computers networked. This moment was the beginning of file sharing as it exists and is contested today. The Internet has clearly changed the way the entire world absorbs and
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now