Distribution of dns - application layer , Computer Networking

Distribution of DNS

1.By centralized data base

The information contained in the domain  name space must be stored. A simple design  or DNS would have one DNS server that contains  all the mappings. In this centralized design. Client simply direct all  queries to the single  DNS server, and the DNS  server responds  directly  to the querying  clients. The problems  with a  centralized  design  include.

a.Traffic Volume: A single DNS server would have handle  all DNS queries (for all  the HTTP request and  e mail message  generated from  hundreds  of millions  of hosts.

b. A single  point of failure. It the DNS server  crashes so does  the entire internet.

c. Distant Centralized Database: A single  DNS  server cannot  be close  to all  querying client. If  we put  the single  DNs  server in new York city  then all quarters  form  Australia must travel  to the  other  side of the globe perhaps over slow and  congested links. This can  lead to  significant delays.

d.aintenance: This single  DNS  server would  have to keep records for all internet hosts.  Not only  would  this centralized database be huge,, but it would  have to be updated frequently to account  for every new host to those  servers. In  the internet there are 13 root DNS serves ( Ladled a through M)  most of which  are located  in north  America.

In summary  single  DNS with centralized data base has lot  of problems. To  overcome  these problems  DNS should b presented in a particular  hierarchy. Show as below.

Posted Date: 3/8/2013 6:36:05 AM | Location : United States







Related Discussions:- Distribution of dns - application layer , Assignment Help, Ask Question on Distribution of dns - application layer , Get Answer, Expert's Help, Distribution of dns - application layer Discussions

Write discussion on Distribution of dns - application layer
Your posts are moderated
Related Questions
LAN Topologies The term topology explains the geographic arrangement of networking devices. It explains the actual layout of the network hardware. Given the location of worksta

Q. Explain the diffrent types of Security Attacks? Types of Security Attacks Passive Threats: - Traffic Analysis and - Release of Message Contents Active


Determine the benefits of security on internet or intranet Security has long been seen as a major threatening point in the implementation of the Internet or of Intranet technolog

This example illustrate the use of lastprivate clause void for_loop (int n, float *a, float *b) { int i; #pragma omp parallel { #pragma omp for lastprivate(i) for

You are the Senior Project Manager in a software company and have, as part of your team, a student on a three month internship. The student has proudly told you that they have stu

NETWORK OWNERSHIP:   There are two types in this case: 1. Private Network 2. Public Network

Can I get help for traffic congestion anlysis using GIS

Throughput is a calculate of the rate at which data can be transmit through the network. The throughput capability of the underlying hardware is known bandwidth. Because every fram

What is workstation? A workstation is a node in network that is more useful and can occur local information processing or graphics processing. A workstation generally has an in