Introduction of dns - domain name server, Computer Networking

Assignment Help:

Introduction of DNS

While discussing about the Internet, one things comes automatically in the n=mind and hence it is directly or indirectly depended on DNS. The DNS which stands for Domain Name Server is an offers Ans effective method in order to surf the Internet more efficiently. As today, is an era of Internet, almost everything's is dong through the Internet, the requirement of this kind of system is increasing day by day While discussing about the working of the Internet there are many things which need to consider and play a significant tale. These can the tie of communication between two points or can say machines, the tie of data, the architecture of the network etc. The most important things which need to consider is the working of the DNS. Now before proceeding further, one should know about the role of the DNA. The DNS plays a very significant and efficient role in the field of Internet. Without DNS, the accessing the Internet in the efficient and effective way is almost, next to impossible. DNS not only reduces the surfing time, but it also enhances the processing of the Internet due to which the requirement and the demand of the Internet is increasing day by day.

Whether it is a case of business outsourcing or the case of the marketing for the product, or simply a case of important communication, the Internet Becomes the major requirement of every person and due to this reason, the processing of the DNS must be increased in order to reduce the maximum effort and time. This is because like computer the human beings are not able to think like computers. They only can remember the names of the website which they want to visit or sometimes the IP address. This enables them to visit the page. But how can this be happen. The solution to this problem  is the Domain Name Server. With the help of DNS, any user can located his or her favorite web page. This is the most important behind the invention of the DNS. And hence, this becomes the new place for all types of hacker to play. The DNS is varying crucial for the Internet. This is because it acts as the bridge between the client and the server. The server can be of any type as well as the client. This is hot resign why DNS makes the sensitive area for all the servers and clients on the net. Using some protocols like http, ftp, telnet, many hackers may direct the user on their desirable page in order to access not only the private data but also to access information. This simply results in hacking of the DNS. The hacking of the DNS can be achieved in two ways, the first one is about the process of hacking by protocol attacks which is generally attributed to the working of the DNS The second so about the process of hacking by using server attacks which is generally based on the flaws of bus of the machines or can say the program executing the DNS services.


Related Discussions:- Introduction of dns - domain name server

What is a jam signal, What is a jam signal A jam signal is broadcasts ...

What is a jam signal A jam signal is broadcasts to network by the transmitting stations that detected the collision to ensure that all stations know of the collision. Every st

Define the bulletin board intranet, Define the Bulletin Board Intranet ...

Define the Bulletin Board Intranet This type of Intranet in an organisation extends to everyone the capability to review or update information that would normally be placed

What is virtual channel, What is virtual channel? Virtual channel is no...

What is virtual channel? Virtual channel is normally a connection from single source to one destination, although multicast connections are also allowed. The other name for vir

Error detecting code - parity bit, Error Detecting Code - Parity bit: ...

Error Detecting Code - Parity bit: The general idea for achieving error detection and correction is to add some redundancy (i.e., some extra data) to a message, which receiver

List all application layer and transport layer protocols, a)  A host is sen...

a)  A host is sending a HTTP request to a HTTP server. In the table below, propose a correct set of source and destination port numbers for segments sent from host to server and fr

Distinguish between physical topology and logical topology, Question: (...

Question: (a) (i) Distinguish between Physical topology and Logical topology. (ii) Explain the following statement with the help of a diagram: "A star topology can have a l

Security goals confidentiality- integrity- digital signature, Question 1   ...

Question 1   This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not

Illustrate about the working of socks protocol, Illustrate about the workin...

Illustrate about the working of Socks protocol SOCKS is an open, industry-standard protocol advanced by the Authenticated Firewall Traversal working group of the IETF (Internet

Bootrom and memory layout, Memory Memory Layout   BOOT...

Memory Memory Layout   BOOTROM This device stores the information of  the startup diagnostic  code in permanently. It performs diagnostics of  hardware  wh

What is peripheral connect interface, Q. What is Peripheral Connect Interfa...

Q. What is Peripheral Connect Interface? PCI signify Peripheral Connect Interface. It's the revolutionary high speed expansion bus presented by Intel.  With the growing signifi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd