DNS Performance and the Effectiveness of Caching

Size: px
Start display at page:

Download "DNS Performance and the Effectiveness of Caching"

Transcription

1 DNS Performance and the Effectiveness of Caching Jaeyeon Jung, Emil Sit, Hari Balakrishnan, Robert Morris Presenter: Gigis Petros

2 Introduction Two factors contribute to the scalability of DNS hierarchical design around delegated name spaces aggressive use of caching Reduce the load on the root servers Successful caching hopes to limit client-perceived delays and wide-area bandwidth usage

3 Motivation What performance, in terms of latency and failures, do DNS clients perceive? How does varying the TTL and degree of cache sharing impact caching effectiveness?

4 DNS overview Mapping human-readable host names to IP addresses Reverse mapping & mail-routing information Mapping in the DNS name space are called resource records A record: name s IP address NS record: name of DNS server Caching in DNS Time To Live: expiration time by the originator of a neem Negative caching Caches work well because DNS changes slowly

5 Terminology A lookup refers to the entire process of translating a domain name A query refers to a DNS request packet sent to a DNS server A response refers to a packet sent by DNS server in reply to a query packet An answer is a response from a DNS server that terminates the lookup (successfully or unsuccessfully)

6 DNS Lookup Sequence

7 Questions What is the ratio of TCP connections to DNS A record lookups? What is the number of DNS queries per lookup? DNS errors What percentage of lookups do never get an answer? Performance of retransmission protocol What is the effect of varying TTLs and degrees of caching sharing on cache hit rate?

8 Key Findings TCP / DNS lookup ratio suggests that the hit rate of DNS caches inside MIT is between 70% and 80% DNS queries per lookup Unanswered produces 10 query packets Answered 1.3 query packets 23% of all client lookups in the most recent MIT trace fail to elicit any answer 13% of lookups result in an answer that indicates a failure. Most of these failures indicate NXDOMAIN % of TCP connections made to names with low TTL values increased from 12% to 25% in 2000 Setting all A-record TTL s to a value as small as 10 minutes is not likely to degrade the scalability of DNS

9 MIT Dataset MIT s laboratory for Computer science (LCS) and Artificial Intelligence laboratory (AI) to the rest internet 24 internal subnetworks sharing the border router Data collected in January and December users, 1200 hosts

10 KAIST Dataset Korea Advanced Institute of Science and Technology (KAIST) to the rest internet Collected May users, 5000 hosts Only International TCP traffic

11 Methodology Collection Methodology Wide-area DNS query/response Outgoing TCP connections: SYN/FIN/RST Anonymized internal addresses Analysis of Methodology Sliding window of 60 seconds A referral occurs when a server does not know the answer to a query, but does know where the answer can be found

12 Data Summary Categorize lookups 1. Negative answer: lookup gets a response with nonzero response code 2. Zero answer: is authoritative and indicates no error, but has no ANSWER, AUTHORITY or ADDITIONAL records 3. Answered with success: terminates with a response that has a NOERROR code and one or more ANSWER All other lookups are considered unanswered

13 Data Summary

14 Latency Latency distribution vs. number of referrals for the mit-dec00 trace Latency is affected by the number of referrals

15 Latency Cached NS records reduce the load on root servers Distribution of latencies for lookups that do and do not involve querying root servers.

16 Retransmissions A querying name server retransmits a query if it does not get a response from destination within a timeout period Unanswered lookups categories Zero referrals (nothing received) Non-zero referrals (not lead to answer) Loops (misconfigured information)

17 Retransmissions Cumulative distribution of number of retransmissions for answered (top most curved) and unanswered lookups 99.9% of answered lookups have <= 2 retransmissions

18 Retransmissions Each lookup that elicited zero referrals generated about five times as many wide-area query packets We conclude that many DNS name servers are too persistent in their retry strategies Results show that it is better for them to give up after 2 or 3 retransmissions and let client program decide Loops generated on average about 10 query packets

19 Retransmissions Query packets generated by lookups that obtained no answer - 59% (mit-jan00) 63% (mit-dec00) Names servers are using inappropriate setting for the number of retries or excessive timeout value Nore transmissions within 60 seconds: 12% (mit-jan00), 19% (mit-dec00)

20 Failures Negative answers are mostly errors of NXDOMAIN or SERVFALL NXDOMAIN: request name doesn t exist SERVFALL: supposed to be authoritative but does not have a valid copy or is out of memory The largest cause of these error responses are inverse lookups for IP addresses Non-existent top-level domains: loopback, index.htm Large number of distinct names makes negative caching ineffective

21 Interactions with Root Servers 15-27% of the lookups sent to root name servers resulted in negative responses Most of these appear to be mistyped names The percentages are of the total number of lookups in the trace

22 Effectiveness of DNS Caching How useful is it to share DNS caches among many client machines? Locality of references among clients What is the likely impact of choice of TTL on caching effectiveness? Locality of references in time Quantify two important statistics 1. Distribution of name popularity 2. The distribution of TTL values

23 Name Popularity The top 10% account for more than 68% of total lookups A long tail : 9.0% are unique names

24 TTL Distribution The fraction of accesses to short TTLs has doubled Increased deployment of DNS-based server selection

25 Trace-driven Simulation Two databases: name database maps every IP in A answer to the domain name TTL database maps each domain name to the highest TTL A record for that domain Algorithm Randomly divide TCP clients into groups of size s For each new TCP connection, determine the group g and look for a name n in the cache of group g If n exists and the cached TTL has not expired, record a hit. Otherwise record a miss

26 Effect of Sharing on Hit rates Most of the benefit of sharing is obtained with as few as 10 or 20 clients per cache

27 Impact of TTL on Hit rates Most of the benefit of caching is achieved with TTLs less than about 1000 seconds. 5-min TTLs would increase DNS traffic by factor of 1.5 NS record caching is critical

28 Conclusions 1. About a quarter of all DNS lookups never get an answer, which corresponds over 50% of DNS packets in the wide-area Internet 2. The DNS retransmission protocol appears to be overly persistent, but in 10%-12% of cases, no retransmissions occur 3. Setting all A-record TTL s to a value as small as 10 minutes is not likely to degrade the scalability of DNS in any noticeable way 4. The cache ability of NS records enhances scalability by reducing load on the root and top-level name servers 5. Little benefit is obtained from sharing a forwarding DNS cache among than clients

29

DNS Performance and the Effectiveness of Caching

DNS Performance and the Effectiveness of Caching IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 10, NO. 5, OCTOBER 2002 589 DNS Performance and the Effectiveness of Caching Jaeyeon Jung, Emil Sit, Hari Balakrishnan, Member, IEEE, and Robert Morris Abstract

More information

The Internet Domain Name System

The Internet Domain Name System The Internet Domain Name System Hari Balakrishnan 6.829 Fall 2002 Goals DNS architecture How DNS works DNS uses Mail Content Distribution Networks (CDNs) DNS Performance How well does it work? Why does

More information

DNS Measurements. Hua Huang CS8803 NTM

DNS Measurements. Hua Huang CS8803 NTM DNS Measurements Hua Huang CS8803 NTM Outline "DNS measurements at a root server Nevil Brownlee, Kimberly Claffy, and Evi Nemeth, Proceedings of the IEEE GlobeCom, San Antonio, TX, Nov. 2001 "DNS Performance

More information

DNS: a statistical analysis of name server traffic at local network-to-internet connections

DNS: a statistical analysis of name server traffic at local network-to-internet connections DNS: a statistical analysis of name server traffic at local network-to-internet connections Chris J. Brandhorst 1, Aiko Pras 2 1 Electrical Engineering, Mathematics and Computer Science, University of

More information

Domain Name System. DNS is an example of a large scale client-server application. Copyright 2014 Jim Martin

Domain Name System. DNS is an example of a large scale client-server application. Copyright 2014 Jim Martin Domain Name System: DNS Objective: map names to IP addresses (i.e., high level names to low level names) Original namespace was flat, didn t scale.. Hierarchical naming permits decentralization by delegating

More information

An Empirical Study of Spam Traffic and the Use of DNS Black Lists

An Empirical Study of Spam Traffic and the Use of DNS Black Lists An Empirical Study of Spam Traffic and the Use of DNS Black Lists Jaeyeon Jung jyjung@csail.mit.edu Emil Sit sit@csail.mit.edu MIT Computer Science and Artificial Intelligence Laboratory 32 Vassar Street,

More information

DNS. Spring 2016 CS 438 Staff 1

DNS. Spring 2016 CS 438 Staff 1 DNS Spring 2016 CS 438 Staff 1 Host Names vs. IP addresses Host names Mnemonic name appreciated by humans Variable length, full alphabet of characters Provide little (if any) information about physical

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites

More information

Introduction to Network Operating Systems

Introduction to Network Operating Systems As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the

More information

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14 1 Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit

More information

Week 3 / Paper 2. Bernhard Ager, Wolfgang Mühlbauer, Georgios Smaragdakis, Steve Uhlig ACM IMC 2010.

Week 3 / Paper 2. Bernhard Ager, Wolfgang Mühlbauer, Georgios Smaragdakis, Steve Uhlig ACM IMC 2010. Week 3 / Paper 2 Comparing DNS Resolvers in the Wild Bernhard Ager, Wolfgang Mühlbauer, Georgios Smaragdakis, Steve Uhlig ACM IMC 2010. Main point How does ISP DNS compare with Google DNS and OpenDNS?

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

Carnegie Mellon Computer Science Department. 15-744 Spring 2007 Theory Problem Set 2

Carnegie Mellon Computer Science Department. 15-744 Spring 2007 Theory Problem Set 2 Carnegie Mellon Computer Science Department. - Spring Theory Problem Set This problem set has questions. Answer them as clearly and concisely as possible. You may discuss ideas with others in the class,

More information

Teldat Router. DNS Client

Teldat Router. DNS Client Teldat Router DNS Client Doc. DM723-I Rev. 10.00 March, 2003 INDEX Chapter 1 Domain Name System...1 1. Introduction...2 2. Resolution of domains...3 2.1. Domain names resolver functionality...4 2.2. Functionality

More information

DNS traffic analysis -- Issues of IPv6 and CDN --

DNS traffic analysis -- Issues of IPv6 and CDN -- DNS traffic analysis -- Issues of IPv6 and CDN -- Kazunori Fujiwara ^, Akira Sato, Kenichi Yoshida University of Tsukuba ^Japan Registry Services Co., Ltd (JPRS) July 29, 2012 IEPG meeting at Vancouver

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Homework 4 Solutions Out: 12/03 Due: 12/10 1. Routers and QoS Packet # Size Flow 1 100 1 2 110 1 3 50 1 4 160 2 5 80 2 6 240 2 7 90 3 8 180 3 Suppose a router has three input

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

Network Working Group. Category: Best Current Practice S. Bradner Harvard University M. Patton Consultant July 1997

Network Working Group. Category: Best Current Practice S. Bradner Harvard University M. Patton Consultant July 1997 Network Working Group Request for Comments: 2182 BCP: 16 Category: Best Current Practice R. Elz University of Melbourne R. Bush RGnet, Inc. S. Bradner Harvard University M. Patton Consultant July 1997

More information

Application layer Protocols application transport

Application layer Protocols application transport Application layer Protocols application transport data link physical Network Applications and Application Layer Protocols Network applications: running in end systems (hosts) distributed, communicating

More information

Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.

Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Load Balancing and Sessions C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Scalability multiple servers Availability server fails Manageability Goals do not route to it take servers

More information

2 TCP-like Design. Answer

2 TCP-like Design. Answer Homework 3 1 DNS Suppose you have a Host C, a local name server L, and authoritative name servers A root, A com, and A google.com, where the naming convention A x means that the name server knows about

More information

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This

More information

DNS Caching: Running on Zero

DNS Caching: Running on Zero DNS Caching: Running on Zero Randall Atkinson Extreme Networks Saleem Bha7 University of St Andrews 09 July 2009 (c) 2009, Ran Atkinson & Saleem BhaD 1 Domain Name Service Distributed name resoluhon service

More information

EXPERIMENTAL STUDY OF DNS PERFORMANCE

EXPERIMENTAL STUDY OF DNS PERFORMANCE EXPERIMENTAL STUDY OF DNS PERFORMANCE Ananya Tripathi, Farhat Khan, Akhilesh Sisodia Amity School of Engineering & Technology, Amity University, Uttar Pradesh, India {ananya.tripathi9, efarhatkhan, sisodiaakhilesh}@gmail.com

More information

The Domain Name System

The Domain Name System Internet Engineering 241-461 Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre DNS The Domain Name System Kurose & Ross: Computer Networking Chapter 2 (2.5) James F. Kurose

More information

Development of the Domain Name System. Joey Brown David Margolies

Development of the Domain Name System. Joey Brown David Margolies Development of the Domain Name System Joey Brown David Margolies Introduction DNS provides name service for the Internet 1982 - HOSTS.TXT Centrally maintained Too large Too costly to distribute Organizations

More information

Understanding DNS (the Domain Name System)

Understanding DNS (the Domain Name System) Understanding DNS (the Domain Name System) A white paper by Incognito Software January, 2007 2007 Incognito Software Inc. All rights reserved. Understanding DNS (the Domain Name System) Introduction...2

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

dnsperf DNS Performance Tool Manual

dnsperf DNS Performance Tool Manual dnsperf DNS Performance Tool Manual Version 2.0.0 Date February 14, 2012 Copyright 2002-2012, Inc. - All Rights Reserved This software and documentation is subject to and made available pursuant to the

More information

Simulation of DNS(Domain Name System) Using SimLib

Simulation of DNS(Domain Name System) Using SimLib Simulation of DNS(Domain Name System) Using SimLib Submitted by Prem Tamang Submitted to Dr. Lawrence J. Osborne Table of Contents 1. Introduction 3 2. Motivation and Challenges. 5 3. Assumptions 5 4.

More information

Use Domain Name System and IP Version 6

Use Domain Name System and IP Version 6 Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY. 6.033 Computer Systems Engineering: Spring 2013. Quiz I Solutions

MASSACHUSETTS INSTITUTE OF TECHNOLOGY. 6.033 Computer Systems Engineering: Spring 2013. Quiz I Solutions Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.033 Computer Systems Engineering: Spring 2013 Quiz I Solutions There are 11 questions and 8 pages in this

More information

3. The Domain Name Service

3. The Domain Name Service 3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records

More information

Domain Name System (DNS)

Domain Name System (DNS) Chapter 18 CSC465 Computer Networks Spring 2004 Dr. J. Harrison These slides are based on the text TCP/IP Protocol Suite (2 nd Edition) Domain Name System (DNS) CONTENTS NAME SPACE DOMAIN NAME SPACE DISTRIBUTION

More information

Information- Centric Networks. Section # 3.2: DNS Issues Instructor: George Xylomenos Department: Informatics

Information- Centric Networks. Section # 3.2: DNS Issues Instructor: George Xylomenos Department: Informatics Information- Centric Networks Section # 3.2: DNS Issues Instructor: George Xylomenos Department: Informatics Funding These educational materials have been developed as part of the instructors educational

More information

Serving DNS using a Peer-to-Peer Lookup Service

Serving DNS using a Peer-to-Peer Lookup Service Serving DNS using a Peer-to-Peer Lookup Service Russ Cox, Athicha Muthitacharoen, Robert T. Morris MIT Laboratory for Computer Science {rsc,athicha,rtm}@lcs.mit.edu Abstract The current domain name system

More information

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.

More information

Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Domain Name System (DNS) Fundamentals

Domain Name System (DNS) Fundamentals Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center mike.jager@synack.co.nz These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Measuring IP Performance. Geoff Huston Telstra

Measuring IP Performance. Geoff Huston Telstra Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour

More information

An Introduction to the Domain Name System

An Introduction to the Domain Name System An Introduction to the Domain Name System Olaf Kolkman Olaf@nlnetlabs.nl October 28, 2005 Stichting NLnet Labs This Presentation An introduction to the DNS Laymen level For non-technologists About protocol

More information

Wireshark Lab: DNS. 1. nslookup

Wireshark Lab: DNS. 1. nslookup Wireshark Lab: DNS Version: 2.0 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. As described in Section 2.5 of the textbook, the Domain Name System

More information

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15 1 Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15 ote: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit

More information

Ethereal Lab: DNS. 1. nslookup

Ethereal Lab: DNS. 1. nslookup Ethereal Lab: DNS Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. As described in Section 2.5 of the textbook,

More information

The Root of the Matter: Hints or Slaves

The Root of the Matter: Hints or Slaves The Root of the Matter: Hints or Slaves David Malone October 21, 2003 Abstract We consider the possibility of having a name server act as a slave to the root zone, rather than caching

More information

This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.

This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same. This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the

More information

Flash Crowds & Denial of Service Attacks

Flash Crowds & Denial of Service Attacks Flash Crowds & Denial of Service Attacks Characterization and Implications for CDNs and Web sites Jaeyeon Jung MIT Laboratory for Computer Science Balachander Krishnamurthy and Michael Rabinovich AT&T

More information

Impact of Local Domain Name System (DNS) on Corporate Network Bandwidth

Impact of Local Domain Name System (DNS) on Corporate Network Bandwidth Impact of Local Domain Name System (DNS) on Corporate Network Bandwidth Mohit Dhawan 1, OP Gupta 2 M.Tech Student, SEEIT, COAET, PAU Ludhiana, India 1 Associate Professor, SEEIT, COAET, PAU Ludhiana, India

More information

- Domain Name System -

- Domain Name System - 1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize

More information

DNS : Domain Name System

DNS : Domain Name System 1/30 DNS : Domain Name System Surasak Sanguanpong nguan@.ac.th http://www...ac.th/~nguan Last updated: May 24, 1999 Outline 2/30 DNS basic name space name resolution process protocol configurations Why

More information

The Problem with TCP. Overcoming TCP s Drawbacks

The Problem with TCP. Overcoming TCP s Drawbacks White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,

More information

Network Layers. CSC358 - Introduction to Computer Networks

Network Layers. CSC358 - Introduction to Computer Networks Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

ECE 4321 Computer Networks. Network Programming

ECE 4321 Computer Networks. Network Programming ECE 4321 Computer Networks Network Programming Name Space System.Net Domain Name System (DNS) To resolve computer naming Host database is split up and distributed among multiple systems on the Internet

More information

DNS Best Practices. Mike Jager Network Startup Resource Center mike@nsrc.org

DNS Best Practices. Mike Jager Network Startup Resource Center mike@nsrc.org DNS Best Practices Mike Jager Network Startup Resource Center mike@nsrc.org This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be

More information

DNS, CDNs Weds March 17 2010 Lecture 13. What is the relationship between a domain name (e.g., youtube.com) and an IP address?

DNS, CDNs Weds March 17 2010 Lecture 13. What is the relationship between a domain name (e.g., youtube.com) and an IP address? DNS, CDNs Weds March 17 2010 Lecture 13 DNS What is the relationship between a domain name (e.g., youtube.com) and an IP address? DNS is the system that determines this mapping. Basic idea: You contact

More information

How To Manage Dns On An Elfiq Link Load Balancer (Link Balancer) On A Pcode (Networking) On Ipad Or Ipad (Netware) On Your Ipad On A Ipad At A Pc Or Ipa

How To Manage Dns On An Elfiq Link Load Balancer (Link Balancer) On A Pcode (Networking) On Ipad Or Ipad (Netware) On Your Ipad On A Ipad At A Pc Or Ipa White paper The IDNS module for incoming load balancing For Elfiq Operating System (EOS) version 3.x Document Revision 1.5 October 2007 Elfiq Solutions www.elfiq.com COPYRIGHT The content of this document

More information

HOST AUTO CONFIGURATION (BOOTP, DHCP)

HOST AUTO CONFIGURATION (BOOTP, DHCP) Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration

More information

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0) for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5

More information

Mitigating DNS DoS Attacks

Mitigating DNS DoS Attacks Mitigating DNS DoS Attacks Hitesh Ballani and Paul Francis Cornell University ACM CCS 2008 DoS attacks on DNS Attack: Flood the nameservers of a DNS zone Goal: Disrupt the resolution of The zone s resource

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

DNS Basics. DNS Basics

DNS Basics. DNS Basics DNS Basics 1 A quick introduction to the Domain Name System (DNS). Shows the basic purpose of DNS, hierarchy of domain names, and an example of how the DNS protocol is used. There are many details of DNS

More information

A Standard Modest WebSite

A Standard Modest WebSite A Standard Modest WebSite 3-tier application using Servlets and JDBC HTTP Servlet JDBC JSP...... Servlet DBMS Clients Application Server Roadmap Want to grow to robust enterprise-scale systems: replicated

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

F5 Silverline DDoS Protection Onboarding: Technical Note

F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

DNSSEC in your workflow

DNSSEC in your workflow DNSSEC in your workflow Presentation roadmap Overview of problem space Architectural changes to allow for DNSSEC deployment Deployment tasks Key maintenance DNS server infrastructure Providing secure delegations

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Meeting Worldwide Demand for your Content

Meeting Worldwide Demand for your Content Meeting Worldwide Demand for your Content Evolving to a Content Delivery Network A Lucent Technologies White Paper By L. R. Beaumont 4/25/01 Meeting Worldwide Demand for your Content White Paper Table

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

The Domain Name System

The Domain Name System The Domain Name System Antonio Carzaniga Faculty of Informatics University of Lugano October 9, 2012 2005 2007 Antonio Carzaniga 1 IP addresses and host names Outline DNS architecture DNS process DNS requests/replies

More information

Networks 3. 2015 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

Networks 3. 2015 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content Networks 3 Lecture Networks 3/Slide 1 Content What is a communications protocol? Network protocols TCP/IP High-level protocols Firewalls Network addresses Host name IP address Domain name system (DNS)

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

DNS at NLnet Labs. Matthijs Mekking

DNS at NLnet Labs. Matthijs Mekking DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the

More information

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol

More information

DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING

DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING PolyServe High-Availability Server Clustering for E-Business 918 Parker Street Berkeley, California 94710 (510) 665-2929 wwwpolyservecom Number 990903 WHITE PAPER DNS ROUND ROBIN HIGH-AVAILABILITY LOAD

More information

Introduction to DNS CHAPTER 5. In This Chapter

Introduction to DNS CHAPTER 5. In This Chapter 297 CHAPTER 5 Introduction to DNS Domain Name System (DNS) enables you to use hierarchical, friendly names to easily locate computers and other resources on an IP network. The following sections describe

More information

page 1 DNS Rate Limiting W. Matthijs Mekking matthijs@nlnetlabs.nl http://www.nlnetlabs.nl/ 28 Feb 2013 Stichting NLnet Labs

page 1 DNS Rate Limiting W. Matthijs Mekking matthijs@nlnetlabs.nl http://www.nlnetlabs.nl/ 28 Feb 2013 Stichting NLnet Labs page 1 DNS Rate Limiting W. Matthijs Mekking matthijs@nlnetlabs.nl page 2 One slide DNS Root www.nlnetlabs.nl A Referral: nl NS www.nlnetlabs.nl A 213.154.224.1 www.nlnetlabs.nl A www.nlnetlabs.nl A 213.154.224.1

More information

Domain Name System (DNS)

Domain Name System (DNS) Domain Name System (DNS) Instructor: Anirban Mahanti Office: ICT 745 Email: mahanti@cpsc.ucalgary.ca Class Location: ICT 121 Lectures: MWF 12:00 12:50 Notes derived from Computer Networking: A Top Down

More information

TCP for Wireless Networks

TCP for Wireless Networks TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted

More information

Web Caching and CDNs. Aditya Akella

Web Caching and CDNs. Aditya Akella Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion

More information

An Intrusion Detection System for Kaminsky DNS Cache poisoning

An Intrusion Detection System for Kaminsky DNS Cache poisoning An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati drbj153@alumni.iitg.ernet.in, b.kaushik@iitg.ernet.in Abstract : Domain

More information

First Midterm for ECE374 02/25/15 Solution!!

First Midterm for ECE374 02/25/15 Solution!! 1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1

Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science August-Schmidt-Str. 12

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

SIDN Server Measurements

SIDN Server Measurements SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources

More information

Wireshark DNS. Introduction. nslookup

Wireshark DNS. Introduction. nslookup Wireshark DNS Introduction The Domain Name System (DNS) translates hostnames to IP addresses, fulfilling a critical role in the Internet infrastructure. In this lab, we ll take a closer look at the client

More information

How-to: DNS Enumeration

How-to: DNS Enumeration 25-04-2010 Author: Mohd Izhar Ali Email: johncrackernet@yahoo.com Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS

More information

Wireshark Lab: DNS v6.01

Wireshark Lab: DNS v6.01 Wireshark Lab: DNS v6.01 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb

More information

DG Forwarding Algorithm

DG Forwarding Algorithm DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information