Dns message - application layer, Computer Networking

Assignment Help:

DNS Message

There are  the only  two kinds  of DNS message DNS query and reply messages. Further mote both query  and reply message have  the same  format  as shown in figure. The  semantics of the  various fields in a DNS message  are as follows.

 

1764_NDS Message.PNG

                                                            Figure  DNS message  format

The first 12 bytes is the header section which  has a number of fields. The first  field is a 16 bit numbers  that identifies the query. This identifier is copied into the reply message to a query allowing the client  to match received replies with sent  queries. There are a  number of flags in the flag field. A 1 bit query reply flag indicates whether the message  is a query or a reply a 1 bit  authoritative flag is set in a reply message  when  a DNS server is  an authoritative server for a queried name. A 1 bit  recursion desired flag  is set  when  a client  host  or DNS  server desired that the DNs  server perform recursion  when it doesn't have  the records. A 1 bit  recursion available field  is set in a reply  if the  DNS  server  supports  recursion. In  the header there are also   four number of fields. These fields  indicate  the number  of occurrences of the four  type  of the  data section that  follow the header.

a.The question  section  carries  one or more  question that is  queries for information  being  sent to a DNS  name  server. This  section  includes a name field  that containing the name  that is  being queried and a type field that indicates the type  of question being  asked  about  the name  for example   a host  address  associated with  a name  or the mail server for a name .

b.Answer carries  one or more  resources records  that answer  the questions  indicated in the question  section above.

c.Recall that  in each  resource  records there is  the type  ( for example A , NS, MNAME, and MX), the  value  and the TTL. A reply can return multiple RRS in  the answer since  a hostname   can have multiple  IP address.

d.The authority  contains  one  more  resource  records that paid  to authoritative name  servers  that can  be used  to continue the resolution process.

e.The additional  section  conveys one or more  resource records that contain additional information  related to the query that is not  strictly necessary to answer  the queries.

 

 


Related Discussions:- Dns message - application layer

Explain pipeline processing, Pipeline Processing Pipelining is a scheme...

Pipeline Processing Pipelining is a scheme to realize, overlapped parallelism in the proposed way out of a problem on a digital computer in an economical way. To understand the

Determine about the tcp/ip, Determine about the TCP/IP Stands for Tr...

Determine about the TCP/IP Stands for Transmission Control Protocol/Internet Protocol. This is the group of protocols that define the Internet and communication method used

How intranets encourage integration of applications, How Intranets encourag...

How Intranets encourage integration of applications Intranets encourage integration of applications; such as the simple word processing application could be easily linked with

Explain about congestion control, Q. Explain about Congestion control? ...

Q. Explain about Congestion control? Congestion control Open-loop congestion control - prevent congestion before it happens retransmission policy - Ret

Subletting, Ask Design private subnetworks (using Class A range for CIDR) f...

Ask Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table. Hints: Consider how many network bits are required to a

Name the protocol responsible for finding the mac address , a)  What does t...

a)  What does the "CD" mean in the CSMA/CD? How is it implemented in the Ethernet?   b)  Consider an Ethernet hub with 8 ports and an Ethernet switch with 8 ports. In both cases

Subscriber database - computer network, Subscriber Database Core ne...

Subscriber Database Core network  also hosts  the subscribers  database ( for e, g HLR in GSM systems). Subscriber  database  is accessed by core  network  nodes fro  funct

Working of TCP - buffers, Q. Working of  TCP - buffers? TCP - buffers ...

Q. Working of  TCP - buffers? TCP - buffers Sending & receiving buffers - Processes don't consume data at the same speed Sending site: - White section: unfilled

How does a firewall protect, How Does a Firewall Protect Firewalls work...

How Does a Firewall Protect Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information

Additional bandwidth does each scheme require, Recalling two FEC schemes fo...

Recalling two FEC schemes for internet phone described. Suppose the first scheme generates a redundant chunk for every four original chunks. Suppose the second scheme uses a low-ra

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd