Distribution of dns - application layer , Computer Networking

Assignment Help:

Distribution of DNS

1.By centralized data base

The information contained in the domain  name space must be stored. A simple design  or DNS would have one DNS server that contains  all the mappings. In this centralized design. Client simply direct all  queries to the single  DNS server, and the DNS  server responds  directly  to the querying  clients. The problems  with a  centralized  design  include.

a.Traffic Volume: A single DNS server would have handle  all DNS queries (for all  the HTTP request and  e mail message  generated from  hundreds  of millions  of hosts.

b. A single  point of failure. It the DNS server  crashes so does  the entire internet.

c. Distant Centralized Database: A single  DNS  server cannot  be close  to all  querying client. If  we put  the single  DNs  server in new York city  then all quarters  form  Australia must travel  to the  other  side of the globe perhaps over slow and  congested links. This can  lead to  significant delays.

d.aintenance: This single  DNS  server would  have to keep records for all internet hosts.  Not only  would  this centralized database be huge,, but it would  have to be updated frequently to account  for every new host to those  servers. In  the internet there are 13 root DNS serves ( Ladled a through M)  most of which  are located  in north  America.

In summary  single  DNS with centralized data base has lot  of problems. To  overcome  these problems  DNS should b presented in a particular  hierarchy. Show as below.


Related Discussions:- Distribution of dns - application layer

Types of ospf configuration, Name the types of OSPF Configuration? Ans) ...

Name the types of OSPF Configuration? Ans) There are Two Types of OSPF configuration A ) SINGLE AREA b) MULTI AREA

Determine about the security systems, Determine about the Security Systems ...

Determine about the Security Systems If the company intends to connect to the Internet, then it should pay great attention to the configuration of firewalls. Just as no one wo

Why do we require a subnet mask? , If the host has the subnet ID why do we ...

If the host has the subnet ID why do we require a subnet mask?

Distance vector multicast routing protocol, DVMRP • Distance vector mu...

DVMRP • Distance vector multicast routing protocol: Distance vector multicast routing protocol are abbreviated as DVMRP. These protocols are suitable for small networks which

Evaluate error detection in crc polynomials, Q. Evaluate Error Detection in...

Q. Evaluate Error Detection in CRC Polynomials? The divisor in the CRC generator is most habitually represented as an algebraic Polynomial. Reasons: It is short

Butterfly permutation, Butterfly permutation This permutation is gettin...

Butterfly permutation This permutation is getting by interchanging the important significant bit in address with smallest significant bit.

Name the steps included in creating the checksum, List the steps included i...

List the steps included in creating the checksum. a. Separate the data into sections b. Add the sections together using 1's complement arithmetic c. Take the complement o

Different types of subnet classfull networks are present, How many dissimil...

How many dissimilar types of subnet classful networks are present?

Thin ethernet wiring, THIN ETHERNET WIRING: Thin Ethernet needs thin c...

THIN ETHERNET WIRING: Thin Ethernet needs thin coax cable that is cost effective and easier to install than thick Ethernet coax. In this case transceiver electronics are creat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd