How aliases are used in DNS, Computer Engineering

Assignment Help:

How aliases are used in DNS? Explain.

CNAME entries are analogous to a symbolic link in a file system- the entry gives an alias for other DNS entry. Corporation of expertsmind has two computers named as hobbes.expertsmind.com and calvin. expertsmind.com. Assume that expertsmind choose to run a web server and needs to follow the convention of using the name www for the computer which runs the organization's Web server. Though, the organizations could select to rename one of their computers, a much easier solution exists: the organization can create a CNAME entry for www.expertsmind.com which points to hobbes. At any time a resolver sends a request for www. expertsmind.com , the server returns the address of computer hobbes.

The utilization of aliases is particularly convenient since it permits an organization to modify the computer used for a special service without changing the addresses or names of the computers. For illustration expertsmind Corporation can move its web service from computer hobbes to computer calvin through moving the server and changing the CNAME record into the DNS server- the two computers retain their original IP addresses and names.


Related Discussions:- How aliases are used in DNS

Find the conversion time & conversion rate of A/D converter, Find the conve...

Find the conversion time of a Successive Approximation A/D converter which uses a 2 MHz clock and a 5-bit binary ladder containing 8V reference. What is the Conversion Rate? An

Non repudiation, What is non-repudiation? how can it be achieved in designi...

What is non-repudiation? how can it be achieved in designing e-cash based system?

What do you meant by static and dynamic modeling, Static modeling is used t...

Static modeling is used to state structure of the objects that are in the problem domain. These are expressed using class, object and USECASE diagrams. But Dynamic modeling sig

Virtual memory and organization of a cache memory, Described virtual memory...

Described virtual memory Ans: Data is to be stored in physical memory locations that have addresses different from those that specified by the program. The memory control circu

Explain about the acoustic tablet, Explain about the Acoustic tablet Ac...

Explain about the Acoustic tablet Acoustic (or sonic) tablet use sound waves to detect a stylus position. Either strip microphones or point microphones can be used to detect th

What is imprecise and precise exception, What is imprecise and precise exce...

What is imprecise and precise exception? Situation in which one or more of the succeeding instructions have been implemented to completion is known as imprecise exception. Situ

Layers of distributed system architecture, Q. Layers of Distributed System ...

Q. Layers of Distributed System architecture? Layers of Distributed System architecture are: Presentation Layer is actual user interface. This layer receives input and

Interactive computer graphics.., graphical adapters and input methods in co...

graphical adapters and input methods in computer graphics

Why disable statements are not allowed in functions, Why disable statements...

Why disable statements are not allowed in functions? If  disble  statement  is used  in function,it  invalids  function  and  its  return  value.  So  disable statements aren't

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd