Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Distribution of DNS
1.By centralized data base
The information contained in the domain name space must be stored. A simple design or DNS would have one DNS server that contains all the mappings. In this centralized design. Client simply direct all queries to the single DNS server, and the DNS server responds directly to the querying clients. The problems with a centralized design include.
a.Traffic Volume: A single DNS server would have handle all DNS queries (for all the HTTP request and e mail message generated from hundreds of millions of hosts.
b. A single point of failure. It the DNS server crashes so does the entire internet.
c. Distant Centralized Database: A single DNS server cannot be close to all querying client. If we put the single DNs server in new York city then all quarters form Australia must travel to the other side of the globe perhaps over slow and congested links. This can lead to significant delays.
d.aintenance: This single DNS server would have to keep records for all internet hosts. Not only would this centralized database be huge,, but it would have to be updated frequently to account for every new host to those servers. In the internet there are 13 root DNS serves ( Ladled a through M) most of which are located in north America.
In summary single DNS with centralized data base has lot of problems. To overcome these problems DNS should b presented in a particular hierarchy. Show as below.
You are the network administrator for the City of Joshua Texas. The city government offices are located in five buildings separated by a State Highway controlled by the State of Te
SONET SDH To satisfy the requirements of ever increasing data rate for diverse applications, ANS developed a standard known as synchronous optical network by utili
Firewalls Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to des
Token Passing Station is able to send only when it receives a special frame called a token Token circulates around the ring If station wishes to sen
Routing Table A routing table has columns for at three types o information the network ID the cost and the ID of the next router. The network ID is the final desti
Take the maximum packet lifetime, T. It's stated that T must be big enough to make sure the packet and its ACK have vanished. Why do we have to have the ACK?
MAC address called Physical address Because it's not changeable
What everyday object is the same as The RAM function to the computer?
It's a Hybrid device that joins the features of both bridges and routers.
Explain in detail about wireless network Think about unseen terminal problem. Imagine a wireless network consist of five stations, A through E, such that each one them is in r
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd