Distribution of dns - application layer , Computer Networking

Distribution of DNS

1.By centralized data base

The information contained in the domain  name space must be stored. A simple design  or DNS would have one DNS server that contains  all the mappings. In this centralized design. Client simply direct all  queries to the single  DNS server, and the DNS  server responds  directly  to the querying  clients. The problems  with a  centralized  design  include.

a.Traffic Volume: A single DNS server would have handle  all DNS queries (for all  the HTTP request and  e mail message  generated from  hundreds  of millions  of hosts.

b. A single  point of failure. It the DNS server  crashes so does  the entire internet.

c. Distant Centralized Database: A single  DNS  server cannot  be close  to all  querying client. If  we put  the single  DNs  server in new York city  then all quarters  form  Australia must travel  to the  other  side of the globe perhaps over slow and  congested links. This can  lead to  significant delays.

d.aintenance: This single  DNS  server would  have to keep records for all internet hosts.  Not only  would  this centralized database be huge,, but it would  have to be updated frequently to account  for every new host to those  servers. In  the internet there are 13 root DNS serves ( Ladled a through M)  most of which  are located  in north  America.

In summary  single  DNS with centralized data base has lot  of problems. To  overcome  these problems  DNS should b presented in a particular  hierarchy. Show as below.

Posted Date: 3/8/2013 6:36:05 AM | Location : United States







Related Discussions:- Distribution of dns - application layer , Assignment Help, Ask Question on Distribution of dns - application layer , Get Answer, Expert's Help, Distribution of dns - application layer Discussions

Write discussion on Distribution of dns - application layer
Your posts are moderated
Related Questions
Distance vector-based routing algorithms (also called as Bellman-Ford algorithms) pass periodic copies of a routing table from router to router. Regular updates among routers commu

Advantages of Bridges By forwarding  frames  only to  the segment  where  host  resides  a bridge server the  following  purpose. a.Unwanted  traffic  as well  as network  c

Explain about the Digital traffic channels The most notable difference among the two generations is that first generation systems are almost purely analog, while second generat


Instruction Pipelines The stream of instructions in instruction execution cycle may be realized by a pipeline where overlapped executions of various operations are performed. T

What are the working of software team The software team has to learn every bit of things related to computers. Since different users work on different platforms and application

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

Advantages of VPNs Advantages discussed in the following  section include those related to security. Consolidation transparency cost. And administration. a. Improved secur

When using access lists, it is important where those access lists are placed. Which Statement best defines access list placement Ans) Put standard access lists as near the desti

Ping and Traceroute are used by ICMP for Testing. Destination Unreachable messages are obtained by a router when it does not have a route to the network.