Dns message - application layer, Computer Networking

DNS Message

There are  the only  two kinds  of DNS message DNS query and reply messages. Further mote both query  and reply message have  the same  format  as shown in figure. The  semantics of the  various fields in a DNS message  are as follows.

 

1764_NDS Message.PNG

                                                            Figure  DNS message  format

The first 12 bytes is the header section which  has a number of fields. The first  field is a 16 bit numbers  that identifies the query. This identifier is copied into the reply message to a query allowing the client  to match received replies with sent  queries. There are a  number of flags in the flag field. A 1 bit query reply flag indicates whether the message  is a query or a reply a 1 bit  authoritative flag is set in a reply message  when  a DNS server is  an authoritative server for a queried name. A 1 bit  recursion desired flag  is set  when  a client  host  or DNS  server desired that the DNs  server perform recursion  when it doesn't have  the records. A 1 bit  recursion available field  is set in a reply  if the  DNS  server  supports  recursion. In  the header there are also   four number of fields. These fields  indicate  the number  of occurrences of the four  type  of the  data section that  follow the header.

a.The question  section  carries  one or more  question that is  queries for information  being  sent to a DNS  name  server. This  section  includes a name field  that containing the name  that is  being queried and a type field that indicates the type  of question being  asked  about  the name  for example   a host  address  associated with  a name  or the mail server for a name .

b.Answer carries  one or more  resources records  that answer  the questions  indicated in the question  section above.

c.Recall that  in each  resource  records there is  the type  ( for example A , NS, MNAME, and MX), the  value  and the TTL. A reply can return multiple RRS in  the answer since  a hostname   can have multiple  IP address.

d.The authority  contains  one  more  resource  records that paid  to authoritative name  servers  that can  be used  to continue the resolution process.

e.The additional  section  conveys one or more  resource records that contain additional information  related to the query that is not  strictly necessary to answer  the queries.

 

 

Posted Date: 3/9/2013 4:33:31 AM | Location : United States







Related Discussions:- Dns message - application layer, Assignment Help, Ask Question on Dns message - application layer, Get Answer, Expert's Help, Dns message - application layer Discussions

Write discussion on Dns message - application layer
Your posts are moderated
Related Questions
Currently One more way of accessing the Internet being developed is the use of cable modems. These need that you subscribe to a cable service & let you two-way communication with t

PRAM is one of the models used for designing the parallel algorithm as given in Figure. The PRAM models have the following components: A set of identical type of processors

A communications channel is pathways over which information can be communicate. It may be described by a physical wire that connects communicating devices, or by a radio, laser, or

Explain the Acknowledged connectionless service This is a cross between the previous two services. It provides that datagrams are to be acknowledged, but no prior logical conne

WAN interface card(WIC) slots Two fixed WIC slots are present in  2600 series router except 2691. It has contained 3 WIC slots. Network Module Expansion Slot( NM) slot

Mention and explain 16 bit, basic programmable registers in 8086 operated in real mode?


RPC adumbrates the intricacies of the network by using the ordinary procedure call mechanism familiar to each programmer. A client process calls a function on a remote server and

Many benefits of configuring VLAN as listed below: • Performance Enhancements: It reduces heavy load on the network by permitting operations at lower latencies by using VLAN t

UDP sends packets 'blind' down the network, and relies on upper-layer protocols to form connections and identify errors. TCP is a connection-oriented protocol that can give reliabl