Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Distribution of DNS
1.By centralized data base
The information contained in the domain name space must be stored. A simple design or DNS would have one DNS server that contains all the mappings. In this centralized design. Client simply direct all queries to the single DNS server, and the DNS server responds directly to the querying clients. The problems with a centralized design include.
a.Traffic Volume: A single DNS server would have handle all DNS queries (for all the HTTP request and e mail message generated from hundreds of millions of hosts.
b. A single point of failure. It the DNS server crashes so does the entire internet.
c. Distant Centralized Database: A single DNS server cannot be close to all querying client. If we put the single DNs server in new York city then all quarters form Australia must travel to the other side of the globe perhaps over slow and congested links. This can lead to significant delays.
d.aintenance: This single DNS server would have to keep records for all internet hosts. Not only would this centralized database be huge,, but it would have to be updated frequently to account for every new host to those servers. In the internet there are 13 root DNS serves ( Ladled a through M) most of which are located in north America.
In summary single DNS with centralized data base has lot of problems. To overcome these problems DNS should b presented in a particular hierarchy. Show as below.
how to install xp via network
Describe some common threats to the hardware Theft of a computer, printer, or other resources. Tampering by a disinterested or frustrated employee who takes every chan
TCP/IP is a name provided to the collection (or suite) of networking protocols that have been used to construct the global Internet. The protocols are also referred to as the DoD (
Wait protocol The wait protocol is used for resolving the conflicts, which arise due to number of multiprocessors demanding the same resource. There are two types of wait prot
Question 1 Explain the process of Components Identification and call establishment Question 2 Discuss on Basic services in GSM Question 3 Explain the Protocols Use
Question: (a) Distinguish between Flow Control and Congestion Control. (b) Explain clearly how a URL is resolved by a computer. (c) List one application that uses TCP
Discuss about the Software in detail Software contain a number of components such as SQL Server for database connectivity, Systems Management Server for easy Web management,
Synchronous Synchronous traffic is able to consume a portion of the 100 Mbps total bandwidth of an FDDI network while asynchronous traffic can consume the rest. Synchronous
Internet Service Provider (ISP) This supper fast network spanning the world from one major metropolitan area to another is provided by a handful of national internet
Determine about unique least-cost path If there is a unique least-cost path, the two algorithms will yield the similar result because they are both guaranteed to search the lea
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd