DNS: Domain Name System
|
|
- Sherman Waters
- 8 years ago
- Views:
Transcription
1 DNS: Domain Name System People: many identifies: m SSN, name, Passpot # Intenet hosts, outes: m IP addess (32 bit) - used fo addessing datagams (in IPv4) m name, e.g., gaia.cs.umass.edu - used by humans Q: map between IP addesses and name? Adding additional delays Domain Name System: distibuted database implemented in hieachy of many name seves application-laye potocol host, outes, name seves to communicate to esolve names (addess/name tanslation) m uns ove UDP, pot 53 m used by othe app pots. m note: coe Intenet function implemented as application-laye potocol m complexity at netwok s edge 2: Application Laye 2b-1
2 Othe DNS sevices Host aliasing: any canonical hostname may have one o moe aliases: e.g. cassius.ee.usyd.edu.au has aliases and ee.usyd.edu.au Mail seve aliasing: use of simple hostnames fo hotmail.com might be elay1.west.hotmail.com DNS pemits to have same mail seve and web seve aliased hostnames; easie fo uses Load distibution: eplicated seves fo busy seves; e.g. fo cnn.com we may have many seves DNS database otates the IP addesses of all eplicated seves wheneve eply to an inquiy; client uses the fist IP addess in the list load distibution 2: Application Laye 2b-2
3 DNS name seves Why not centalize DNS? single point of failue taffic volume distant centalized database maintenance doesn t scale! no seve has all nameto-ip addess mappings local name seves: m each ISP, company has local (default) name seve m host DNS quey fist goes to local name seve authoitative name seve: m fo a host: stoes that host s IP addess, name m can pefom name/addess tanslation fo that host s name 2: Application Laye 2b-3
4 DNS: Root name seves contacted by local name seve that can not esolve name oot name seve: m contacts authoitative name seve if name mapping not known m gets mapping m etuns mapping to local name seve ~ dozen oot name seves woldwide 2: Application Laye 2b-4
5 Simple DNS example oot name seve host suf.euecom.f wants IP addess of gaia.cs.umass.edu 1. Contacts its local DNS seve, dns.euecom.f 2. dns.euecom.f contacts oot name seve, if necessay 3. oot name seve contacts authoitative name seve, dns.umass.edu, if necessay local name seve dns.euecom.f equesting host suf.euecom.f authoititive name seve dns.umass.edu gaia.cs.umass.edu 2: Application Laye 2b-5
6 DNS example oot name seve Root name seve: may not know authoatiative name seve may know intemediate name seve: who to contact to find authoitative name seve local name seve dns.euecom.f equesting host suf.euecom.f intemediate name seve dns.umass.edu 4 5 authoitative name seve dns.cs.umass.edu gaia.cs.umass.edu 2: Application Laye 2b-6
7 DNS: iteated queies oot name seve ecusive quey: puts buden of name esolution on contacted name seve heavy load? iteated quey: contacted seve eplies with name of seve to contact I don t know this name, but ask this seve local name seve dns.euecom.f equesting host suf.euecom.f iteated quey intemediate name seve dns.umass.edu 5 6 authoitative name seve dns.cs.umass.edu gaia.cs.umass.edu 2: Application Laye 2b-7
8 DNS: caching and updating ecods once (any) name seve leans mapping, it caches mapping m cache enties timeout (disappea) afte some time [specified in TTL(time to live) field of the DNS Resouce Recod (RR)] update/notify mechanisms unde design by IETF m RFC 2136 m 2: Application Laye 2b-8
9 DNS ecods DNS: distibuted db stoing esouce ecods (RR) RR fomat: (name, value, type,ttl) Type=A Type=CNAME m name is hostname m value is IP addess Type=NS m name is domain (e.g. foo.com) m value is IP addess of authoitative name seve fo this domain m name is an alias name fo some canonical (the eal) name m value is canonical name Type=MX m value is hostname of mail seve associated with name 2: Application Laye 2b-9
10 DNS potocol, messages DNS potocol : quey and eply messages, both with same message fomat message heade identification: 16 bit # fo quey, eply to quey uses same # flags: m quey o eply m ecusion desied m ecusion available m eply is authoitative 2: Application Laye 2b-10
11 DNS potocol, messages Name, type fields fo a quey RRs in esponse to quey ecods fo authoitative seves additional helpful info that may be used 2: Application Laye 2b-11
12 Socket pogamming Goal: lean how to build a client/seve application that communicates using sockets Socket API intoduced in BSD4.1 UNIX, 1981 explicitly ceated, used, eleased by apps client/seve paadigm two types of tanspot sevice via socket API: m uneliable datagam m eliable, byte steamoiented develope decision socket a host-local, applicationceated/owned, OS-contolled inteface (a doo ) into which application pocess can both send and eceive messages to/fom anothe (emote o local) application pocess 2: Application Laye 2b-12
13 Two types of client/seve apps Implementation of a potocol standad in an RFC m Client/seve pogams obey ules of the RFC e.g., if it is FTP pocess, see RFC 959 and confom it m Client and seve pogams ae able to inteopeate m Client and seve pogams can be ceated independently m They must use the pot numbe associated with potocol A popietay client/seve application m No necessity in confoming any RFC m Client and seve pogams developed by same develope m Not to use aleady used pot numbes m This method is the one we use hee Use C, C ++, o Java pogamming 2: Application Laye 2b-13
14 Socket pogamming using TCP Socket: a doo between application pocess and endend-tanspot potocol (UDP o TCP) TCP sevice: eliable tansfe of bytes fom one pocess to anothe socket pogamming: client/seve application development contolled by application develope contolled by opeating system pocess socket TCP with buffes, vaiables Intenet pocess socket TCP with buffes, vaiables contolled by application develope contolled by opeating system client o seve client o seve 2: Application Laye 2b-14
15 Socket pogamming with TCP Client must contact seve seve pocess must fist be unning seve must have ceated socket (doo) that welcomes client s contact Client contacts seve by: ceating client-local TCP socket object specifying IP addess, pot numbe of seve pocess TCP thee way handshaking When client ceates socket: client TCP establishes connection to seve TCP When contacted by client, seve TCP ceates new socket fo seve pocess to communicate with client m allows seve to talk with multiple clients application viewpoint TCP povides eliable, in-ode tansfe of bytes ( pipe ) between client and seve 2: Application Laye 2b-15
16 Socket pogamming with TCP Example client-seve app: client eads line fom standad input (infomuse steam), sends to seve via socket (outtoseve steam) seve eads line fom socket seve convets line to uppecase, sends back to client client eads, pints modified line fom socket and pints the line on standad output (infomseve steam) Input steam: sequence of bytes into pocess Output steam: sequence of bytes out of pocess infomuse outtoseve client socket iinfomseve a typical TCPclient: 3 steams and 1 socket 2: Application Laye 2b-16
17 Client/seve socket inteaction: TCP Seve (unning on hostid) ceate socket, pot=x, fo incoming equest: welcomesocket = SeveSocket() wait fo incoming connection equest connectionsocket = welcomesocket.accept() ead equest fom connectionsocket wite eply to connectionsocket close connectionsocket TCP connection setup Client ceate socket, connect to hostid, pot=x clientsocket = Socket() send equest using clientsocket ead eply fom clientsocket close clientsocket 2: Application Laye 2b-17
18 Example: Java client (TCP) impot java.io.*; impot java.net.*; class TCPClient { Ceate input steam Ceate client socket, connect to seve Ceate output steam attached to socket public static void main(sting agv[]) thows Exception { Sting sentence; Sting modifiedsentence; BuffeedReade infomuse = new BuffeedReade(new InputSteamReade(System.in)); Socket clientsocket = new Socket("hostname", 6789); DataOutputSteam outtoseve = new DataOutputSteam(clientSocket.getOutputSteam()); 2: Application Laye 2b-18
19 Example: Java client (TCP), cont. Ceate input steam attached to socket Send line to seve Read line fom seve BuffeedReade infomseve = new BuffeedReade(new InputSteamReade(clientSocket.getInputSteam())); sentence = infomuse.eadline(); outtoseve.witebytes(sentence + '\n'); modifiedsentence = infomseve.eadline(); System.out.pintln("FROM SERVER: " + modifiedsentence); clientsocket.close(); } } 2: Application Laye 2b-19
20 Example: Java seve (TCP) impot java.io.*; impot java.net.*; class TCPSeve { Ceate welcoming socket at pot 6789 Wait, on welcoming socket fo contact by client Ceate input steam, attached to socket public static void main(sting agv[]) thows Exception { Sting clientsentence; Sting capitalizedsentence; SeveSocket welcomesocket = new SeveSocket(6789); while(tue) { Socket connectionsocket = welcomesocket.accept(); BuffeedReade infomclient = new BuffeedReade(new InputSteamReade(connectionSocket.getInputSteam())); 2: Application Laye 2b-20
21 Example: Java seve (TCP), cont Ceate output steam, attached to socket Read in line fom socket Wite out line to socket } } } DataOutputSteam outtoclient = new DataOutputSteam(connectionSocket.getOutputSteam()); clientsentence = infomclient.eadline(); capitalizedsentence = clientsentence.touppecase() + '\n'; outtoclient.witebytes(capitalizedsentence); End of while loop, loop back and wait fo anothe client connection 2: Application Laye 2b-21
22 Socket pogamming with UDP UDP: no connection between client and seve no handshaking sende explicitly attaches IP addess and pot of destination seve must extact IP addess, pot of sende fom eceived datagam UDP: tansmitted data may be eceived out of ode, o lost application viewpoint UDP povides uneliable tansfe of goups of bytes ( datagams ) between client and seve a typical UDP client: 1 steam and 1 socket 2: Application Laye 2b-22
23 Diffeences in SP with UDP no initial handshaking between two pocesses and thus no welcoming socket no steams attached to the sockets attaching IP destination addess and pot numbe to each packet by the sende etieving addess by eceive fo each packet Example: m client eads a line fom standad input and sends it out though its socket to the seve m seve eads a line fom its socket m convets it to uppecase m sends the modified line out to client m client eads the modified line though its socket and pints it on it standad output 2: Application Laye 2b-23
24 Client/seve socket inteaction: UDP Seve (unning on hostid) Client ceate socket, pot=x, fo incoming equest: sevesocket = DatagamSocket() ead equest fom sevesocket ceate socket, clientsocket = DatagamSocket() Ceate, addess (hostid, pot=x, send datagam equest using clientsocket wite eply to sevesocket specifying client host addess, pot umbe ead eply fom clientsocket close clientsocket 2: Application Laye 2b-24
25 Example: Java client (UDP) impot java.io.*; impot java.net.*; Ceate input steam Ceate client socket Tanslate hostname to IP addess using DNS class UDPClient { public static void main(sting ags[]) thows Exception { BuffeedReade infomuse = new BuffeedReade(new InputSteamReade(System.in)); DatagamSocket clientsocket = new DatagamSocket(); InetAddess IPAddess = InetAddess.getByName("hostname"); byte[] senddata = new byte[1024]; byte[] eceivedata = new byte[1024]; Sting sentence = infomuse.eadline(); senddata = sentence.getbytes(); 2: Application Laye 2b-25
26 Example: Java client (UDP), cont. Ceate datagam with data-to-send, length, IP add, pot Send datagam to seve Read datagam fom seve } DatagamPacket sendpacket = new DatagamPacket(sendData, senddata.length, IPAddess, 9876); clientsocket.send(sendpacket); DatagamPacket eceivepacket = new DatagamPacket(eceiveData, eceivedata.length); clientsocket.eceive(eceivepacket); Sting modifiedsentence = new Sting(eceivePacket.getData()); System.out.pintln("FROM SERVER:" + modifiedsentence); clientsocket.close(); } 2: Application Laye 2b-26
27 Example: Java seve (UDP) impot java.io.*; impot java.net.*; Ceate datagam socket at pot 9876 Ceate space fo eceived datagam Receive datagam class UDPSeve { public static void main(sting ags[]) thows Exception { DatagamSocket sevesocket = new DatagamSocket(9876); byte[] eceivedata = new byte[1024]; byte[] senddata = new byte[1024]; while(tue) { DatagamPacket eceivepacket = new DatagamPacket(eceiveData, eceivedata.length); sevesocket.eceive(eceivepacket); 2: Application Laye 2b-27
28 Example: Java seve (UDP), cont Get IP add pot #, of sende Sting sentence = new Sting(eceivePacket.getData()); InetAddess IPAddess = eceivepacket.getaddess(); int pot = eceivepacket.getpot(); Ceate datagam to send to client Wite out datagam to socket } } Sting capitalizedsentence = sentence.touppecase(); senddata = capitalizedsentence.getbytes(); DatagamPacket sendpacket = new DatagamPacket(sendData, senddata.length, IPAddess, pot); sevesocket.send(sendpacket); } End of while loop, loop back and wait fo anothe datagam 2: Application Laye 2b-28
29 Chapte 2: Summay Ou study of netwok apps now complete! application sevice equiements: m eliability, bandwidth, delay client-seve paadigm Intenet tanspot sevice model m connection-oiented, eliable: TCP m uneliable, datagams: UDP specific potocols: m http m ftp m smtp, pop3 m dns socket pogamming m client/seve implementation m using tcp, udp sockets 2: Application Laye 2b-29
30 Chapte 2: Summay Most impotantly: leaned about potocols typical equest/eply message exchange: m client equests info o sevice m seve esponds with data, status code message fomats: m heades: fields giving info about data m data: info being communicated contol vs. data msgs m in-based, out-of-band centalized vs. decentalized stateless vs. stateful eliable vs. uneliable msg tansfe complexity at netwok edge secuity: authentication 2: Application Laye 2b-30
DNS: Domain Names. DNS: Domain Name System. DNS: Root name servers. DNS name servers
DNS: Domain Name System DNS: Domain Names People: many identifiers: SSN, name, Passport # Internet hosts, routers: Always: IP address (32 bit) - used for addressing datagrams Often: name, e.g., nifc14.wsu.edu
More informationNetwork Programming using sockets
Network Programming using sockets TCP/IP layers Layers Message Application Transport Internet Network interface Messages (UDP) or Streams (TCP) UDP or TCP packets IP datagrams Network-specific frames Underlying
More informationData Communication & Networks G22.2262-001
Data Communication & Networks G22.2262-001 Session 10 - Main Theme Java Sockets Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences 1 Agenda
More informationDomain Name System (DNS)
Domain Name System (DNS) Instructor: Anirban Mahanti Office: ICT 745 Email: mahanti@cpsc.ucalgary.ca Class Location: ICT 121 Lectures: MWF 12:00 12:50 Notes derived from Computer Networking: A Top Down
More informationComputer Networks. Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se
Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides are adapted
More informationDNS: Distributed Name System
Distributed Name System Slides adapted from: Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2002. All material copyright 1996-2002
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationSocket programming. Socket Programming. Languages and Platforms. Sockets. Rohan Murty Hitesh Ballani. Last Modified: 2/8/2004 8:30:45 AM
Socket Programming Rohan Murty Hitesh Ballani Last Modified: 2/8/2004 8:30:45 AM Slides adapted from Prof. Matthews slides from 2003SP Socket programming Goal: learn how to build client/server application
More informationDomain Name System (or Service) (DNS) Computer Networks Term B10
Domain Name System (or Service) (DNS) Computer Networks Term B10 DNS Outline DNS Hierarchial Structure Root Name Servers Top-Level Domain Servers Authoritative Name Servers Local Name Server Caching and
More informationDNS: Domain Name System
DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers: IP address (32 bit) - used for addressing datagrams name, e.g., ww.yahoo.com - used by humans Q: map between
More informationDomain Name System Richard T. B. Ma
Domain Name System Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Names Vs. Addresses Names are easier for human to remember www.comp.nus.edu.sg
More informationApplication-layer protocols
Application layer Goals: Conceptual aspects of network application protocols Client server paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS Application-layer
More informationHow To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (
Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate
More informationChapter 2: Application layer
Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2: Application Layer 1 Some network apps e-mail
More informationDomain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet
More informationAlarm transmission through Radio and GSM networks
Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS
More informationGoal: learn how to build client/server application that communicate using sockets. An interface between application and network
Socket programming Goal: learn how to build client/server application that communicate using sockets Socket API introduced in BSD4.1 UNIX, 1981 explicitly created, used, released by apps client/server
More informationDomain Name System (DNS)
Chapter 18 CSC465 Computer Networks Spring 2004 Dr. J. Harrison These slides are based on the text TCP/IP Protocol Suite (2 nd Edition) Domain Name System (DNS) CONTENTS NAME SPACE DOMAIN NAME SPACE DISTRIBUTION
More informationChapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP
Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer the email service The
More informationDistributed Computing and Big Data: Hadoop and MapReduce
Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents
More informationCours du 22 novembre
Cours du 22 novembre Couche application DNS Application Layer 2-2 DNS: domain name system people: many identifiers: SSN, name, passport # Internet hosts, routers: IP address (32 bit) - used for addressing
More informationDigital Communication in the Modern World Application Layer cont. DNS, SMTP
Digital Communication in the Modern World Application Layer cont. DNS, http://www.cs.huji.ac.il/~com com@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top Down Approach
More informationThe Application Layer: DNS
Recap SMTP and email The Application Layer: DNS Smith College, CSC 9 Sept 9, 0 q SMTP process (with handshaking) and message format q Role of user agent access protocols q Port Numbers (can google this)
More informationDNS and P2P File Sharing
Computer Networks DNS and P2P File Sharing Based on Computer Networking, 4 th Edition by Kurose and Ross DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers:
More informationDomain Name System (DNS) Omer F. Rana. Networks and Data Communications 1
Domain Name System (DNS) Omer F. Rana Networks and Data Communications 1 What is a DNS Each institution on the internet has a host that runs a process called a Domain Name Server (also DNS!) It is not
More informationCS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.
CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail: SMTP, POP3, IMAP
More informationCMPE 80N: Introduction to Networking and the Internet
CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 11 CMPE 80N Spring'10 1 Announcements Guest lecture on intellectual property and
More informationHow To Map Between Ip Address And Name On A Domain Name System (Dns)
Computer Networks: Domain Name Service (DNS) CS 3516 D- term 2013 Instructor: Krishna Venkatasubramanian Quiz 2 DNS: domain name system people: many identifiers: SSN, name, passport # Internet hosts, routers:
More informationJava Network. Slides prepared by : Farzana Rahman
Java Network Programming 1 Important Java Packages java.net java.io java.rmi java.security java.lang TCP/IP networking I/O streams & utilities Remote Method Invocation Security policies Threading classes
More informationData Communications & Networks. Session 2 Main Theme Application Layer. Dr. Jean-Claude Franchitti
Data Communications & Networks Session 2 Main Theme Application Layer Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted from
More informationFTP: the file transfer protocol
FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that initiates transfer
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More informationCIS-162. Security Baselines. Security Baselines. Best Practice aka Beer and Pizza. Remove all unneeded processes
CIS-162 Intoduction to Netok Secuity Comptia Secuity+ Eam Domain 3 Secuity Baselines Secuity Baselines Standad that oganization systems must comply Establish the nom of consistency Detect the anomaly Pefom
More informationQuestions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing
M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow
More informationThings to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.
Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to
More informationPower Monitoring and Control for Electric Home Appliances Based on Power Line Communication
I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line
More informationComputer Networks & Security 2014/2015
Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!
More informationCh 6: Networking Services: NAT, DHCP, DNS, Multicasting
Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting Magda El Zarki Prof. of CS Univ. of CA, Irvine Email: elzarki@uci.edu http: www.ics.uci.edu/~magda Overivew of NAT NAT: Network Address Translation
More informationCMPE 80N: Introduction to Networking and the Internet
CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 80N Fall'10 1 Announcements Forum assignment #2 posted. Due Nov. 5 th.
More informationNET0183 Networks and Communications
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many
More informationCS 43: Computer Networks Naming and DNS. Kevin Webb Swarthmore College September 17, 2015
CS 43: Computer Networks Naming and DNS Kevin Webb Swarthmore College September 17, 2015 Agenda Identifiers and addressing Domain Name System History Query sequences Record types Load balancing Recall:
More information1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
More informationHEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING
U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available
More informationApplication Layer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross
Application Layer Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Web caches (proxy server) goal: satisfy client request without involving origin server v user
More informationConcept and Experiences on using a Wiki-based System for Software-related Seminar Papers
Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,
More informationDNS: Domain Name System
DNS: Domain Name System CMPSCI 491G: Computer Networking Lab V. Arun Slides adapted from Liebeherr & Zarki, Kurose & Ross, Kermani DNS: domain name system people: many identifiers: SSN, name, passport
More informationEffect of Contention Window on the Performance of IEEE 802.11 WLANs
Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,
More informationHitachi Virtual Storage Platform
Hitachi Vitual Stoage Platfom FASTFIND LINKS Contents Poduct Vesion Getting Help MK-90RD7028-15 2010-2014 Hitachi, Ltd. All ights eseved. No pat of this publication may be epoduced o tansmitted in any
More informationCS 348: Computer Networks. - DNS; 22 nd Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - DNS; 22 nd Oct 2012 Instructor: Sridhar Iyer IIT Bombay Domain Name System Map between host names and IP addresses People: many identifiers: name, Passport #, Internet hosts:
More informationDNS. Spring 2016 CS 438 Staff 1
DNS Spring 2016 CS 438 Staff 1 Host Names vs. IP addresses Host names Mnemonic name appreciated by humans Variable length, full alphabet of characters Provide little (if any) information about physical
More informationIntegrating Net2 with an intruder alarm system
Net AN035 Integating Net with an intude alam system Oveview Net can monito whethe the intude alam is set o uet If the alam is set, Net will limit access to valid uses who ae also authoised to uet the alam
More informationCh 6: Networking Services: NAT, DHCP, DNS, Multicasting, NTP
Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting, NTP Magda El Zarki Prof. of CS Univ. of CA, Irvine Email: elzarki@uci.edu http: www.ics.uci.edu/~magda Network Address Translation - NAT Private
More informationLTI, SAML, and Federated ID - Oh My!
LTI, SAML, and Fedeated ID - Oh My! Chales Seveance, Ph.D. Stephen P Vickes IMS Global Leaning Consotium http://www.imsglobal.og/ Poblem Statement We need a way to align IMS Leaning Tools Inteopeability
More informationApplications & Application-Layer Protocols: The Domain Name System and Peerto-Peer
CPSC 360 Network Programming Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer Systems Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationAutomatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*
Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:
More information2.5 DNS The Internet s Directory Service
130 CHAPTER 2 APPLICATION LAYER e-mail is also provided by Google, Yahoo!, as well as just about every major university and corporation. With this service, the user agent is an ordinary Web browser, and
More informationAutomated Hydraulic Drilling Rigs. HHSeries
Automated Hydaulic Dilling Rigs HHSeies The Shape of Things to Come CUSTOMSOLUTIONS HH600 Rig The HH Hydaulic Hoist Seies Eveything about the HH Seies is designed fo speed, safety and efficiency. You can
More informationGive me all I pay for Execution Guarantees in Electronic Commerce Payment Processes
Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092
More informationOver-encryption: Management of Access Control Evolution on Outsourced Data
Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità
More informationTHE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION
IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT
More informationFaithful Comptroller s Handbook
Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices
More informationFinancial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees
Financial Deivatives fo Compute Netwok Capacity Makets with Quality-of-Sevice Guaantees Pette Pettesson pp@kth.se Febuay 2003 SICS Technical Repot T2003:03 Keywods Netwoking and Intenet Achitectue. Abstact
More informationTransmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors
anual ystem Depatment of ealth & uman evices (D) entes fo edicae & Pub 100-20 One-Time Notification edicaid evices () Tansmittal 198 Date: DEEBE 9, 2005 hange equest 4231 UBJET: Temination of the Existing
More informationHow to create a default user profile in Windows 7
AnswesThatWok TM How to ceate a default use pofile in Windows 7 (Win 7) How to ceate a default use pofile in Windows 7 When to use this document Use this document wheneve you want to ceate a default use
More informationHow to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database
AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM
More informationNames vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System
Names vs. Addresses Computer Networks Lecture 5: Domain Name System Names are easier for human to remember www.umich.edu vs. 141.213.4.4 Addresses can be changed without changing names move www.umich.edu
More informationDomain Name System DNS
CE443 Computer Networks Domain Name System DNS Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by
More informationReview of Previous Lecture
Review of Previous Lecture Principles of app layer protocols clients and servers app requirements Web and HTTP FTP Some slides are in courtesy of J. Kurose and K. Ross Announcement All got partners and
More informationCS640: Computer Networks. Naming /ETC/HOSTS
CS640: Computer Networks Aditya Akella Lecture 17 Naming and the DNS Naming Need naming to identify resources Once identified, resource must be located How to name resource? Naming hierarchy How do we
More informationCloud Service Reliability: Modeling and Analysis
Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity
More informationLecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
More informationINITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS
INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in
More informationInstructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan
Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,
More informationChapter 1: Introduction... 7 1-1. BELSORP analysis program... 7 1-2. Required computer environment... 8
1 [Table of contents] Chapte 1: Intoduction... 7 1-1. BELSORP analysis pogam... 7 1-. Requied compute envionment... 8 Chapte : Installation of the analysis pogam... 9-1. Installation of the WIBU-KEY pogam...
More informationAn Efficient Group Key Agreement Protocol for Ad hoc Networks
An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,
More informationCollege of Engineering Bachelor of Computer Science
2 0 0 7 w w w. c n u a s. e d u College of Engineeing Bachelo of Compute Science This bochue Details the BACHELOR OF COMPUTER SCIENCE PROGRAM available though CNU s College of Engineeing. Fo ou most up-to-date
More informationLecture 5: Network Attacks I. Course Admin
Lecture 5: Network Attacks I CS 336/536: Computer Network Security Fall 2013 Nitesh Saxena Adopted from previous lectures by Keith Ross Course Admin HW/Lab 1 Due Coming Monday 11am Lab sessions are active
More informationDetermine implementation strategy, including a communications plan with trading partners and business associates (1 month)
Official CMS Industy Resouces fo the Tansition www.cms.gov/icd10 Payes Compliance Timeline The following is a timeline of essential activities needed to successfully tansition to Vesion 5010 and. While
More informationSoftware Engineering and Development
I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining
More information3. The Domain Name Service
3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records
More informationFirstmark Credit Union Commercial Loan Department
Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and
More informationString sentence = new String(receivePacket.getData()); InetAddress IPAddress = receivepacket.getaddress(); int port = receivepacket.
164 CHAPTER 2 APPLICATION LAYER connection requests, as done in TCPServer.java. If multiple clients access this application, they will all send their packets into this single door, serversocket. String
More informationTransmittal 47 Date: FEBRUARY 24, 2006
anual ystem Pub 100-03 edicae National oveage Deteminations Depatment of Health & Human evices (DHH) ente fo edicae & edicaid evices () Tansmittal 47 Date: EBUAY 24, 2006 hange equest 4257 UBJET: hanges
More informationDNS and electronic mail. DNS purposes
DNS and electronic mail Section 9.1.3 in the textbook DNS purposes Originally purpose was to translate hostnames into IP addresses www.csd. is easier to remember than 129.100.23.247 Lets us do load balancing
More informationOptimal Peer Selection in a Free-Market Peer-Resource Economy
Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:
More informationNetwork Layer 4- density - A Top Down Approach
Internet-Technologien (CS262) 2. IP und DNS 11.3.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 4-1 Wiederholung/Einstiegsfragen Was ist ein Socket? Weshalb braucht es
More informationHow to create RAID 1 mirroring with a hard disk that already has data or an operating system on it
AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve
More informationConfirmation of Booking
The Pesentes Rebecca Mogan Rebecca is a Taxation Consultant with the NTAA and has ove 15 yeas tax expeience. Rebecca holds a Bachelo of Ats and Law and a Mastes of Taxation. Rebecca has pesented a numbe
More informationSocket Programming. Announcement. Lectures moved to
Announcement Lectures moved to 150 GSPP, public policy building, right opposite Cory Hall on Hearst. Effective Jan 31 i.e. next Tuesday Socket Programming Nikhil Shetty GSI, EECS122 Spring 2006 1 Outline
More information9:6.4 Sample Questions/Requests for Managing Underwriter Candidates
9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated
More informationDistributed Systems. Naming
Distributed Systems Naming Some slides here are adapted from DNS slide material by Kurose and Ross for their textbook: Computer Networking: A Top Down Approach Featuring the Internet Any problem in computer
More informationTowards Automatic Update of Access Control Policy
Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia
More informationEngineered Systems. Configuration Guide. October, 1998 TD9007 rev. 2.0
Engineeed Systems Configuation Guide Octobe, 1998 TD9007 ev. 2.0 2 ENGINEERED SYSTES CONFIGURATION GUIDE A division of Nothen Computes, Inc. Contents Po-Watch NT Single-Use System... 3 Po-Watch NT ulti-use
More informationChapter 3 Savings, Present Value and Ricardian Equivalence
Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,
More informationDOCTORAL DEGREE PROGRAM
DOCTORAL DEGREE PROGRAM Application Fo Admission National Mose Cente fo Adult Leaning Cental Illinois: Benedictine Univesity at Spingfield 1500 Noth 5th Steet, Spingfield, IL 62702 Phone: (217) 718-5002
More informationAFFILIATE MEMBERSHIP APPLICATION
Califonia Constuction Tucking Association AFFILIATE MEMBERSHIP APPLICATION Reach and Netwok with the Lagest Concentation of Constuction Tucking Fims in the U.S. Affiliate Dues - $500 Annual CCTA 334 N.
More informationMethods for the specification and verification of business processes MPB (6 cfu, 295AA)
Methods fo the specification and veification of business pocesses MPB (6 cfu, 295AA) Robeto Buni http://wwwdiunipiit/~buni 22 - Business pocess execution language 1 Object We oveview the key featues of
More information