Distribution of dns - application layer , Computer Networking

Distribution of DNS

1.By centralized data base

The information contained in the domain  name space must be stored. A simple design  or DNS would have one DNS server that contains  all the mappings. In this centralized design. Client simply direct all  queries to the single  DNS server, and the DNS  server responds  directly  to the querying  clients. The problems  with a  centralized  design  include.

a.Traffic Volume: A single DNS server would have handle  all DNS queries (for all  the HTTP request and  e mail message  generated from  hundreds  of millions  of hosts.

b. A single  point of failure. It the DNS server  crashes so does  the entire internet.

c. Distant Centralized Database: A single  DNS  server cannot  be close  to all  querying client. If  we put  the single  DNs  server in new York city  then all quarters  form  Australia must travel  to the  other  side of the globe perhaps over slow and  congested links. This can  lead to  significant delays.

d.aintenance: This single  DNS  server would  have to keep records for all internet hosts.  Not only  would  this centralized database be huge,, but it would  have to be updated frequently to account  for every new host to those  servers. In  the internet there are 13 root DNS serves ( Ladled a through M)  most of which  are located  in north  America.

In summary  single  DNS with centralized data base has lot  of problems. To  overcome  these problems  DNS should b presented in a particular  hierarchy. Show as below.

Posted Date: 3/8/2013 6:36:05 AM | Location : United States







Related Discussions:- Distribution of dns - application layer , Assignment Help, Ask Question on Distribution of dns - application layer , Get Answer, Expert's Help, Distribution of dns - application layer Discussions

Write discussion on Distribution of dns - application layer
Your posts are moderated
Related Questions
Cost Involved in Inter-Processor Communication As the data is assigned to many processors in a parallel computer while implementing a parallel algorithm, the processors might


How does the cut-through switching technique work? Ans) Cut-Through switching copies only the destination address which is the first 6 bytes after the =frame preamble into its b

State the Disadvantages of adaptive routing process  (1) The routing decision is more difficult; thus, the processing burden on network nodes enhances. (2) In most cases, ad

Dotted decimal representation is a syntactic form the IP software uses to express 32-bit binary numbers when communicating with humans. Dotted decimal presents every octet in decim

what is variable ip address

Architecture of Cisco IOS software Cisco IOS might not  applications like ms word,multimedia softwares. It is mainly for switching data packet and concentrated on switching p

Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

Advantages of OSPF OSPF an is having different  advantages. These are as follows. OSPF  is an open standard supported by many  vendors. OSPF converges quickly. OSPF au

Components of the VPN When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  nec