Illustrate domain names and address resolution, Computer Engineering

Assignment Help:

Q. Illustrate Domain Names and Address Resolution?

But what if you don't know IP address of the computer you want to connect to? What happens if you need to access a web server referred to as www.anothercomputer.com? How does your web browser know where on the Internet this computer lives? Answer to all these questions is the Domain Name Service or DNS. DNS is a distributed database, which keeps track of computer's names and their corresponding IP addresses on Internet.

Many computers connected to Internet host part of DNS database and software which allows others to access it.These computers are termed as DNS servers. No DNS server comprise the entire database; they only comprise subset of it. If a DNS server doesn't contain the domain name requested by another computer, DNS server re-directs the requesting computer to another DNS server.

679_Illustrate Domain Names and Address Resolution.png

Domain Name Service is structured like a hierarchy similar to IP routing hierarchy. Computer requesting a nameresolution would be re-directed 'up' the hierarchy until a DNS server is found that can resolve the domain name in the request. Figure explains a portion of the hierarchy. At the top of tree are the domain roots. Some of the older, more common domains are seen near the top. What isn't shown are multitude of DNS servers around the world which form rest of the hierarchy.

When an Internet connection is setup (for example For a LAN or Dial-Up Networking in Windows), one primary and one or more secondary DNS servers are generally specified as part of the installation. This way, any Internet applications which need domain name resolution will be able to function correctly. For illustration, when you enter a web address into your web browser, browser first connects to your primary DNS server. After obtaining IP address for domain name you entered, browser then connects to target computer and requests web page you wanted.


Related Discussions:- Illustrate domain names and address resolution

Mathematical applications, The current 32 and 64 bit machines can represent...

The current 32 and 64 bit machines can represent integers of around 9 digits and 30 digits respectively, while various scientific and mathematical applications have to represent in

Explain the action-object matrix, Explain the Action-object matrix A...

Explain the Action-object matrix A matrix showing how update actions influence objects.  It may be considered to be part of user object model as it summarizes user object ac

What is called when distortion caused on telephone line, Distortion caused ...

Distortion caused on telephone line by an adjacent one is called (A) Cross Fire                      (B) Inductive Disturbance (C)  Cross Talk                     (D) Non

Explain optimization process of pipelining, Q. Explain Optimization process...

Q. Explain Optimization process of Pipelining ? RISC machines can use a very efficient pipeline scheme due to the regular and simple instructions. Similarly all other instructi

What is an adaptor class or wrapper class in c++, A class that has no funct...

A class that has no functionality of its own is an Adaptor class in C++. Its member functions hide the use of a third party software component or an object with the non-compatible

Assembler directives, What are assembler directives? Ans: These are th...

What are assembler directives? Ans: These are the instructions that direct the program to be executed. They have no binary corresponding so they are called pseudo-opcodes. The

Explain the storage class auto, Explain The Storage Class auto The Stor...

Explain The Storage Class auto The Storage Class auto : Variables declared within function bodies are automatic by default. Thus, automatic is the most common of the four stora

Strategy used for the project design, This project is divided to two parts ...

This project is divided to two parts (hardware and software) each with is subtask and consideration was given in all areas in order to meet the target specification. Solutions are

# real life business subsystem, Is production, marketing, personal, materia...

Is production, marketing, personal, material, finance are the real life business subsystems? if yes, then how?

What is the security vulnerabilities for vba, Microsoft Visual basic has it...

Microsoft Visual basic has its host of problems one such being macros, Macros can be formed which can make havoc for a programmer with good intentions. Also the security issue rest

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd