Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

DNS Records  and Messages

Two types  of records  are used DNS. The  question records  are used in the question  section of the query and response  messages. The resource  records  are used in the  answer  authoritative  and additional  information sections of the  response  message.

Question Record: A questions records in used by the client  to get  information  from a server. This contains the domain  name.

Resource Record: Each domain  name is  associated  with a  record  called  the resource  record. The server database  consists  or resource  returned by the server to the client.

A resource  records is a quadruple that contains the  following  fields.

Name , Value , Type , TTL

TTL  is the time  to live of  the resource records. It determines  when a resource  should be  removed  from a cache form a  cache. In the example  records given below  we ignore the TTL  field.

The  meaning of  name  and value  depend on  type:

If a DNS  server is authoritative for a  particular host name  then the DNS  server will  contain  a type a record for the  hostname. If a server is not authoritative  for a hostname  then the  server will contain a type NS record for the  domain  that includes the hostname. It  will also  contain  a Type  a record that provides the IP address of the DNS  server in the value field of the NS  records. As an example suppose an edu TLD server is not  authoritative for the host gain cs un mass edu. Then this server will contains  a record for a  domain that includes the host cs mass. Edu. For example  ( umass edu dns unmass. Edu  NS) the du TLD server would  also contain a Type a record which maps the DNS. Server dns  umass.edu to an IP address for example  ( dns umass edu 128.119.111A)

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9527214

Have any Question?


Related Questions in Computer Network & Security

A develop a caesar cipher-type encryption algorithm with a

a. Develop a Caesar cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by the amount of the key value. V ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Overviewthis assignment has three major aims- to help

Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to prepare for tests, examination ...

Network project management assignment -purpose of the

Network Project Management Assignment - Purpose of the assessment - The purpose of this assignment is to build a clear understanding of project management fundamentals and their application, specifically: demonstrate pro ...

1 these assignments need to be properly supported with

1. These assignments need to be properly supported with references to the scientific literature. 2. Use a 12pt font for the body of your assignment. 3. The assignment many be up to four (4) pages long, including any appe ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Nbspfor the remaining questions consider a 4-bit block

For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You c ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As