Distribution of dns - application layer , Computer Networking

Distribution of DNS

1.By centralized data base

The information contained in the domain  name space must be stored. A simple design  or DNS would have one DNS server that contains  all the mappings. In this centralized design. Client simply direct all  queries to the single  DNS server, and the DNS  server responds  directly  to the querying  clients. The problems  with a  centralized  design  include.

a.Traffic Volume: A single DNS server would have handle  all DNS queries (for all  the HTTP request and  e mail message  generated from  hundreds  of millions  of hosts.

b. A single  point of failure. It the DNS server  crashes so does  the entire internet.

c. Distant Centralized Database: A single  DNS  server cannot  be close  to all  querying client. If  we put  the single  DNs  server in new York city  then all quarters  form  Australia must travel  to the  other  side of the globe perhaps over slow and  congested links. This can  lead to  significant delays.

d.aintenance: This single  DNS  server would  have to keep records for all internet hosts.  Not only  would  this centralized database be huge,, but it would  have to be updated frequently to account  for every new host to those  servers. In  the internet there are 13 root DNS serves ( Ladled a through M)  most of which  are located  in north  America.

In summary  single  DNS with centralized data base has lot  of problems. To  overcome  these problems  DNS should b presented in a particular  hierarchy. Show as below.

Posted Date: 3/8/2013 6:36:05 AM | Location : United States







Related Discussions:- Distribution of dns - application layer , Assignment Help, Ask Question on Distribution of dns - application layer , Get Answer, Expert's Help, Distribution of dns - application layer Discussions

Write discussion on Distribution of dns - application layer
Your posts are moderated
Related Questions
Question 1 Videoconferencing is used to conduct meetings with the people who are located in far distance. Videoconferencing is an example of which type of computer networks? Expla


QUESTION a) Security is a very crucial component in a Distributed System. Describe three properties of a secure channel. b) During packet transmission, messages are subdivid

a)  Assume that the time required to transmit one packet (i.e. the packet length divided by link data rate) is 10ms and the Round Trip Time (from Source to Destination and back) is

What is IPv6? IPv6, or Internet Protocol version 6, was developed to change IPv4. At present, IPv4 is being used to control internet traffic, butis expected to get saturated in

Differentiate between Fast fading and Slow fading Fast fading refers to changes in signal strength among a transmitter and receiver as the distance among the two changes by a s

Control Commands: The STAT command is used as a way for the client to confirm that the server is still responding properly. The server must simply send a positive command res

When using access lists, it is important where those access lists are placed. Which Statement best defines access list placement Ans) Put standard access lists as near the desti

Round Trip Time (RTT) and Time Out The  size and  the complexity  of computer  networks  have grown  in past years. To achieve  an efficient  and reliable transmission  some

Explain the terms - LAN extension and Ad hoc network LAN extension: a wireless LAN integrated with a wired LAN to extend the coverage area of the LAN complex; Cross-building