Free Essay

Domain Name Server

In:

Submitted By MASON0357
Words 1664
Pages 7
Linux Networking
Finals Essay

The Domain Name Server

Definition: The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites.

Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4. The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. The DNS was designed to resolve or simply match up the IP address associated with the device to the friendly URL name on the other end. The domain name sever’s function in life is to resolve (translate) the user-friendly Web address to the hard to remember IP addresses from somewhere else. Therefore network providers are responsible for having their own DNS databases updated and in sync, with their outside counterparts, when their trying to talk to one another, because only companies IP addresses will match up with one another on the same network. DNS Server Configuration Types:
DNS servers can be configured as one of the following types: Caching-only server A caching-only name server maintains a cache of resolved domain name-to-IP address mapping. The caching-only server does not have control over any specific zone, but it communicates with other master servers in resolving the IP addresses. Master with no slave server A master server has control over a specific DNS zone and is regarded as the authoritative server for address resolution of the specific zone. The master server also responds to resolution requests for this specific zone, coming in from other caching servers. You can choose the Master with no slave server configuration without adding an additional slave server to the network. Master and slave server In this configuration, the slave server functions as a backup to the master server, if the master server is unreachable. A slave server is sometimes referred to as a subordinate server. A master server can be a master control for one or more zones, but also it can act as a slave to other zones.
Some other more in depth examples of DNS, servers are the following below: Types of DNS:
Domain name system translate domain name to IP address. There are different types of DNS server available we can install any of them as per our requirement. 1) BIND -> BIND is the reference implementation of a DNS server and usually serves as the base for experimentation with DNS protocol extensions. BIND is free and has been ported to many operating systems; see the respective entries in the index. Most BIND servers run on some variant of Unix, although BIND on Windows is also available. Url:- http://www.bind9.net/download
2) djbdns:- The two main name server functions of caching and acting as an authoritative server are sensibly split into two separate programs (dnscache and tinydns). The djbdns package is free, and comes with a $500 security guarantee. http://http://www.djbdnsrocks.org/single/download.htm
3) ANS/CNS:- ANS/CNS full form is Authoritative Name Server/ Caching Name Server. ANS/CNS are commercial DNS servers from Nominum, for enterprise applications that need maximum performance. Url:- http://www.nominum.com/products.php?id=6
4) PowerDNS:- PowerDNS has developed a complete suite of technologies surrounding Internet Naming and email. Internet Naming is at the core of all online activities and is involved in each and every transaction on the net. Url:- http://www.powerdns.com/
5) NSD:- NSD full form is Name Server Daemon. NSD is an authoritative only, high performance, simple and open source name server. Url:- http://www.nlnetlabs.nl/ 6) MaraDNS:- MaraDNS is a package that implements the Domain Name Service (DNS), an essential internet service. MaraDNS is easy to use highly secure. Url:- http://www.maradns.org/
7) MyDNS:- MyDNS is a free DNS server for UNIX. MyDNS does not include recursive name service, nor a resolver library. It is primarily designed for organizations with many zones and/or resource records who desire the ability to perform real-time dynamic updates on their DNS data via MySQL. Url:- http://mydns.bboy.net/
8) RBLDNSD :- Meaning is “DNS daemon suitable for running DNS-based blocklists”. rbldnsd is a small DNS-protocol daemon which is designed to handle queries to DNS-based IP-listing or NAME-listing services. Such services are a simple way to share/publish a list of IP addresses or (domain) names which are “listed” for for some reason, for example in order to be able to refuse a service to a client which is “listed” in some blocklist. Url:- http://www.corpit.ru/mjt/rbldnsd.html
9) Pdnsd:- pdnsd is a proxy DNS server that caches entries permanently to disk. pdnsd allows you to configure one address as the DNS server for all your internet software. This can be localhost, but I personally use a separate machine that I’ve configured as a gateway to the internet for my home LAN. pdnsd can then be configured to contact your ISP’s DNS servers when you make a dial-up connection. Url:- http://www.phys.uu.nl/~rombouts/pdnsd.html
10) Dents:- Dents is a from scratch implementation of the server side of the Domain Name System (DNS) protocol and it shares no code with any other project. Among its several features are compatibility with the named DNS daemon, a modular driver system and an extensible control facility which allows the administrator to control the running server. Url:- http://sourceforge.net/projects/dents/ or http://www.europe.redhat.com/documen....1-1.i386.php3
11) Microsoft’s DNS server :- The DNS server in Windows 2003 has seen increasing adoption since its first release for Windows 2000 in 1999. It is regarded as stable and is well-integrated with Microsoft’s server administration tools. Url:- http://www.microsoft.com/downloads/d...displaylang=en
12) Simple DNS Plus:- Simple DNS Plus is commercial software for Windows (any version from Windows 95 to 2003). It seems fully functional and targeted to small sites and home users with permanent Internet connections.

Users who are considering making a change from Windows to Linux or Linux to Windows commonly want to know the advantages and disadvantages of each of the operating systems. Here are the notes from what I found:
Price: The majority of Linux variants are available for free or at a much lower price than Microsoft Windows.
Microsoft Windows can run between $50.00 - $150.00 US dollars per each license copy.
Easy for the user: Although the majority Linux variants have improved dramatically in ease of use, Windows is still much easier to use for most computer users because of the familiarity of Windows and because it's more likely they are using a Windows computer at home, in school, or at the office, Microsoft has made several advancements and changes that have made it a much easier to use operating system, and although arguably it may not be the easiest operating system, it is still Easier than Linux.
Reliability:
The majority of Linux variants and versions are notoriously reliable and can often run for months and years without needing to be rebooted. On the otherhand Microsoft Windows has made great improvements in reliability over the last few versions of Windows, it still cannot match the reliability of Linux.
Software : Linux has a large variety of available software programs, utilities, and games. However, Windows has a much larger selection of available software and because of the large amount of Microsoft Windows users, there is a much larger selection of available software programs, utilities, and games for Windows.
Software Cost: Many of the available software programs, utilities, and games available on Linux are freeware or open source. Even such complex programs such as Gimp, Open Office, StarOffice, are available for free or at a low cost. Also Windows does have software programs, utilities, and games for free, the majority of the programs will cost anywhere between $20.00 - $200.00+ US dollars per copy.
Hardware: The hardware manufacturers have made great advancements in supporting Linux it still will not support most hardware devices. However, for the hardware devices that have driver support they will usually work in all versions of Linux, because of the amount of Microsoft Windows users and the broader driver support, Windows has a much larger support for hardware devices and almost all hardware manufacturers will support their products in Microsoft Windows.
Security: Linux is and has always been a very secure operating system however it still can be attacked when compared to Windows, it much more secure. Although Microsoft has made great improvements over the years with security on their operating system, their operating system continues to be the most vulnerable to viruses and other attacks.
Open Source: Many of the Linux variants and many Linux programs are open source and enable users to customize or modify the code however they wish to but Microsoft Windows is not open source and the majority of Windows programs are not open source.
Support: It may be difficult to find users familiar with all Linux variants, there are vast amounts of available online documentation and help, available books, and support available for Linux but Microsoft Windows includes its own help section, has vast amount of available online documentation and help, as well as books on each of the versions of Windows.

Work Cited:
Linux vs Windows www.goggle.com www.geeksquad.com www.bestbuy.com www.answer.com
Books cited
Introduction to Telelcommunications (M.A. Rosengrant)
Introduction to Networking (Pearson)
Routers and Routing Basics (CCNA 2 LABs and Study Guide)

Similar Documents

Free Essay

E-Commerce and Law

...ELECTRONIC COMMERCE Electronic Commerce 1 Validity of electronic transactions 1 Writing 2 Signatures 2 Production of documents 2 Retention of information and documents 2 Time of dispatch of electronic communications 3 Time of receipt of electronic communications 3 Place of dispatch and receipt of electronic communications 4 Attribution of electronic communications 4 Types of online contracts 4 Shrinkwrap contracts 4 Clickwrap contracts 4 Browsewrap contracts 5 The position in Australia 5 Domain names 6 Cybersquatters 6 Remedies 6 Passing off 7 The position in Australia 7 Enforcement of judgements outside of Australia 8 Dispute resolution policies 8 Jurisdiction in cyberspace 9 Electronic Commerce * Regulation of electronic transactions * Commonwealth level – Electronic Transactions Act 1999 (Cth) * State level – Electronic Transactions (Victoria) Act 2000 Vic Validity of electronic transactions * Provides that a transaction is not invalid because it took place wholly or partly by means of one or more electronic communications (s 8 Cth, s 7 Vic). * The term ‘electronic communication’ is defined to include emails, web chatting, phone-texting and voice recognition systems. * May also exclude the general rule in relation to specified transactions and specified laws. * Where the electronic version serves the same function as the traditional paper-based requirement, it should be treated equally before the law. Writing * Where a...

Words: 2978 - Pages: 12

Free Essay

Plag Check

...Multi-Layered Security Plan The following Multi-Layered Security Plan outline I am submitting for approval and implementation for Richman Investments, will provide a sound security plan for the firms most important mission critical assets, identifying and reducing vulnerabilities, Risks and threats to the firms confidential proprietary intelligence, sensitive customer data and other important assets within each of the Seven Domains that make up the core for the IT infrastructure as a whole. An aggressive approach should be mapped out in a 3-5 year progressive implementation achievement plan starting with one or two security initiatives where success can be clearly demonstrated and evaluated. First, indentifying Risk, Threat and Vulnerabilities within each of the seven Domains that make-up the firms IT infrastructure. Secondly, proposed security measures and controls for headquarters and each branch office. Keeping information assets secure is challenging for any business, regardless of its size. It seems there's no limit to the ingenuity and maliciousness of today's cybercriminals, hackers and identity thieves. In fact, hackers have become so sophisticated and organized that their operational methods are similar to those of traditional software development and business practices(Symantec 2008). What's more, while yesterday's attack activity consisted of a single compromise...

Words: 866 - Pages: 4

Premium Essay

Business Information Technology

...1. Enabler means it provides businesses with rich information from the Web. An example of a business activity that is enabled by the web is a companies website. The website is a key marketing tool for any company. 2. HTML is a markup language for presentation of Web pages. It determines the look and location of text, pictures, animations, and other elements on a Web page. 3. XML is a markup language for delivery of information about data communicated through Web pages. It is used to convey the meaning or content of the data. 4. Each Web page has its own URL, which contains the IP address or domain name of the site. Because the domain name must be unique, when an owner of a Web site reserves a domain name to be associated with an IP address, no other site can be associated with that domain name. 5. File Transfer Protocol 6. Instant messaging is real-time chat. It is used to form synchronized email, chat rooms and allows customers to chat with sales or support reps. Many online retailers post a special button on their Web pages that lets shoppers establish real-time communication with a sales representative. The instant access fosters more personal service and saves telephone costs. 7. Really Simple Syndication (RSS) is a family of XML file formats that allows automatic downloads of content such as news, sports, or other information of particular interest to users. This software is especially useful for news Web sites and sites that host blogs and podcats. 8. A blog...

Words: 823 - Pages: 4

Premium Essay

Snhu It-200 Milestone 2

...Ethernet Switch. The Ethernet Switch then has a Fiber Optic cable connecting to the warehouse Remote Ethernet Switch. This allows the connectivity from the Remote Ethernet Switch to be connected to the PC’s in the shipping office. Going back to the Ethernet Switch, it is also connected to a Cross Patch Panel from which an Ethernet Drop is made allowing the data to be accessed from the offices. It is important for the company to have access to all resources throughout the company. Having these connections allows it to do so. The key aspects to the network consists of Routers, Switches, Firewall, Servers, and PC’s. Amongst these, the Routers direct the data in which direction it needs to go while the Switches are forwarding the information to the devices that it is intended to go to. The Firewall is allowing certain information to be processed through to help protect the LAN from harm. The Servers are useful for storing data and allowing the users to access the resources. However, another important part of the LAN, is the PC’s that the users use in order to access such information. Creating a wireless system for Swagger Distribution is incredibly fun. Starting out with the WAN going into the computer room, there is the firewall, modem and wireless router...

Words: 1209 - Pages: 5

Premium Essay

Computer and Network Security

...Lab 2 and Assessment 2 Unit 2 Crystal McLey Kaplan University Lab 2 The three most common risk/threats/vulnerabilities that are commonly found in the user domain are: The “domain enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges” (CVE, 2013), If the domain user logs into the domain with a space at the end of the domain name it will cause an error and wont accurately download a system policy (CVE, 2013), and the domain user or admin have a guessable password in Windows NT (CVE, 2013). In the first article it discusses the use of USB devices in the workplace. USB’s are used for transporting data from one computer to another. These allow for business requirements to be reached at a faster pace but they also pose a number of security challenges. Those challenges may be “disgruntled workers, careless users and malicious individuals” (Couture, 2009, p. 6). Ways to migrate this issue is by gluing shut the ports, disable USB ports in BIOS, prevent users from installing a USB device by denying permission on files called usbstor.pnf and usbstor.inf, making USB ports read only, disable USB ports in Group Policy, or disable Autorun (Couture, 2009, p. 11). In the second article it discusses the vulnerabilities of the BIOS. The BIOS performs power up test amongst the hardware components and memory and without this program the computer wouldn’t know what to do after it was turned on. The BIOS can be accessed by the use of backdoor passwords...

Words: 1760 - Pages: 8

Free Essay

Work Group Senarios

...company you would need to sign into the server through the desktop. Next you need to click on the start menu and go to applications. A list of alternatives will incorporate what one requires. Locate administrative tools and click on active directory users and computers. Once open you will need to find out under which domain the new user’s account will be. Each will have four different domains that enable various users to gain access to various programs to their own domain. This will help prevent users from accessing program which are on other domains. Setting up one and two way trusts that require to be set up for programs in which will permit other users from various domains to get access to the trusts. Each user will be required to input four different domain names that include: Sales, Education, Manufacturing, and Research. Each one of the domains will require their own individual domain. Next you will have to set up application authorizations, which means that users who are in the Sales domain will have to access to Sales and so on. You need to make sure all users have complete access to the correct domain. The authorization is approved one the domains are developed. Now you can begin to input the different user information. You can perform this by using the action button and then new and domain. You want to make sure the correct user is being added to the proper domain. You don’t want to add a user to the education domain in case they are section of the Sales...

Words: 289 - Pages: 2

Premium Essay

The Document Object Model

...can be used to dynamically change the document object and to change and control elements like images, which can themselves be considered the image object. The Document object and the image object both contain methods and properties that can be used to dynamically change the web page. The methods used with the document object are close, open, getElementById, getElementsByName, getElementsByTagName, write and writeIn. The open method creates a new window or a frame. The close method closes the document that was opened with the open method. The getElementById method retrieves an element by the specified ID. The getElementsByName method retrieves an array of elements that have a specific name. The getElementsByTagName method will retrieve all the specified elements with a specific tag name and set them in an array. The write method writes text to the web page. The writeIn method also writes text to the web page but also includes a line break after the text. The properties used with the document object include the anchors, body,...

Words: 685 - Pages: 3

Free Essay

It/240

...February 4, 2013 IT/240 Domain Name When looking for a new domain name I would first start out with a search of a name that I like and would consider as the new site name. For example with the organization name being Free Flu, I would want to search that name and see what results come up. For the search I would sites such as Domain.com or godaddy.com to see if it was available to purchase.  After deciding on the name of the new site I would then try find out what address is available. When researching the domain name of Free Flu .com was already taken along with .org leaving .net as the only choice. In most circumstances .org would be the way to go as the .org address was for non-profit organizations. However all three are open for any person/ company/ organization to purchase. Finally choosing the amount of web pages or web servers would depend on the size of organization. Considering it is a non profit organization that gives the elderly people with the flu vaccine I would think that they would have limited funds to pay for things like this so some sites like Godaddy.com will provide a certain amount of webpages and web hosting for a fee when you purchase the domain name. In the pages they would need mission statements, a home, and a contact page at the very least for their pages. Then the web server is there to hold all of the organizations information such as volunteers or members, names of those that get the shots, when the last time they had a shot and the next...

Words: 304 - Pages: 2

Premium Essay

Cgjfjfhjgf

...ARTIFICIAL INTELLIGENCE Artificial intelligence is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956 defines it as "the science and engineering of making intelligent machines. The field was founded on the claim that a central property of humans, intelligence—the sapience of Homo sapiens—can be so precisely described that it can be simulated by a machine. This raises philosophical issues about the nature of the mind and the ethics of creating artificial beings, issues which have been addressed by myth, fiction and philosophy since antiquity.Artificial intelligence has been the subject of optimism, but has also suffered setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science. AI research is highly technical and specialized, and deeply divided into subfields that often fail to communicate with each other.]Subfields have grown up around particular institutions, the work of individual researchers, the solution of specific problems, longstanding differences of opinion about how AI should be done and the application of widely differing tools. The central problems of AI include such traits as reasoning...

Words: 7912 - Pages: 32

Premium Essay

Windows Network Proposal

...Dallas and Houston offices. Data security is priority since patent and trademarks are at stake. Los Angeles sales personnel will need secure remote access to Houston office. The WAN connectivity is in place and it is not an issue. There is ample bandwidth in place. Feel free to make other assumptions but they need to be noted in the paper. Topic to Cover Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information. Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2012 operating system should be used for all aspects of the solution. The topics include: -Active Directory: What forest/domain model should Shiv LLC implement? What is the domain name? Where should the domain controllers be place? Should RODC be part of the consideration? FSMO Roles placement Plan for AD backup and recovery -Group Policy: Is Group Policy needed? What settings might be considered via Group Policy? -DNS: What namespace should Shiv LLC implement? What types of zones needed? -File Services: How will the shares be secured? Will quotas be used? FSRM be configured? Will DFS be implemented? -Remote Services: What technology will be implemented to provide secure remote access for users? Who should have remote access? -WSUS: How...

Words: 547 - Pages: 3

Premium Essay

Web Site Publication Process

...must be clearly delineated before doing anything. Then how the public. This takes into account the resources and knowledge which we have or could have. The primary budget will define what kind of publication can take shape. If we do not have sufficient funding to pay for a hosting, a domain, we have sufficient training or to edit our pages the best choice is to use a wizard to publish a free hosting service or sponsored. The choice of site hosting quite fit with final scope of our project. If your site has dynamic pages need to have databases, but any host that suits us in terms of speed, stability and service is adequate. We must also consider other issues such as how many e-mail allows us to hold that share file transfer and offers support when implementing forms and other services such as domain aliases, sub domains, statistics, etc.. This is an example of a check list we can use to verify the publication of a web site. 1. Have I found that my domain has no previous penalties in search engines? 2. Is the domain name contains keywords useful / relevant? 3. Did I choose wisely the domain (. Com,. Net,. Org, etc ...)? Should I use a domain associated with a country (. Com.mx,. Is. Co.cr, etc ...)? 4. Do I...

Words: 814 - Pages: 4

Premium Essay

Scenario Analysis Report

...Custom Designed Server Room 3 3. Project Management 4 4. Computer Hardware 5 5. Computer Software 6 6. Security 7 7. Naming and Directory Services 8 8. Business Continuity 9 9. On-going Management 10 10. Overall Summary 11 11. Bibliography 12 1. Introduction The main focus of this report is to detail the necessary resources and preparations that would be necessary in order to create and manage the ICT systems for this University. By using information from outside sources, I will make observations as to the various aspects that will be necessary to create and manage our network in an efficient and efficient manner and in a way that allows the ease of use to the various users who will be using the network and its resources. These resources would include both the hardware that would be running and managing the network such as the mail and web servers in addition to the hardware that the users will be interacting with such as the desktop computers, printers amongst others. 2. Custom Designed Server Room As this room would function as the nerve centre for the entirety of our network, stringent security measures should be implemented to protect the room itself as well as the equipment stored within it. As detailed both in a further section of this report a high priority should be placed on the security and maintenance of it. From what I have read from the mentioned reference points, I have determined that while situating the server room in a basement...

Words: 5666 - Pages: 23

Free Essay

Creating a Domain Model

...Creating a Domain Model Option 1 POS/421 – Windows Server Networking University of Phoenix Robert Singer The hierarchical naming system for computers, known as the Domain Name System (DNS), in any source linked to the Internet or private network. This system connects diverse information with domain names assigned to each of the participants. More importantly, it communicates the domain names that humans understand into numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.  An analogy used often to explain the Domain Name System is that it is like a phone book for the Internet. It translates language a human can understand to computer hostnames into IP addresses. For instance, www.example.com changes to 192.0.32.10. DNS known also as a distributed database that offers mapping between IP addresses and Host names.           Using the Domain Name System it is likely to assign domain names to sets of Internet users in an important way, free of each user's actual physical location. Since this is possible, World Wide Web (WWW) hyperlinks and Internet contact information will stay dependable and unbroken even if the existing Internet routing arrangements become altered or change, or the participant uses a mobile device. Internet domain names are easier to remember than IP addresses such as 209.75.188.166 (IPv4) or 2001:db8::1f70:6e8 (IPv6). Individuals take use this advantage when they talk about...

Words: 502 - Pages: 3

Free Essay

Omraj007

...Dec 8 ISA Server Installation step by step Insert the ISA Server 2004 Enterprise CD and follow the installation instructions. You must choose to Install Configuration Storage Server. This will install an ADAM-Instance on this computer which will be used to store the configuration of ISA Server Arrays. ISA Server Array Members will connect to the Configuration Storage Server to receive the configuration. Figure 1: Installation of a Configuration Storage Server If you choose Install Configuration Storage Server you can see in Figure 2 that only the ISA Management Option and the Configuration Storage Server will be installed. Figure 2: Component Selection On the next page we must select create a new ISA Server enterprise (Figure 3). This configuration option creates a new ISA Server Enterprise during the installation. Figure 3: Create a new ISA Server Enterprise Figure 4 shows a warning message that Microsoft recommends only deploying a single Enterprise in your Organization. Multiple Enterprises could be hard to manage. You can deploy multiple Arrays within one ISA Server Enterprise. Figure 4: Warning message when you install a new ISA Enterprise The next step (Figure 5) is to name the new ISA Server Enterprise and enter a description for the new Enterprise. Figure 5: Enter a name and description for the new Enterprise If you are using ISA Server 2004 Enterprise in a single domain or in domains with trust relationships, you must choose the Setup Option I am...

Words: 1049 - Pages: 5

Free Essay

Advance Web Development

...Q.1 Discuss the Following: * Internet Domain * A domain name is a unique name that identifies a website. For example, the domain name of the Google is "google.com." Each website has a domain name that serves as an address, which is used to access the website * Whenever you visit a website, the domain name appears in the address bar of the web browser. Some domain names are preceded by "www" while others omit the "www" prefix. * All domain names have a domain suffix, such as .com, .net, or .org. The domain suffix helps identify the type of website the domain name represents. For example, ".com" domain names are typically used by commercial website, while ".org" websites are often used by non-profit organizations * NOTE: When you access a website, the domain name is actually translated to an IP address, which defines the server where the website located. This translation is performed dynamically by a service called DNS. * Web Server * A Web server is a computer system that hosts websites. It runs Web server software, such as Apache or Microsoft IIS, which provides access to hosted webpages over the Internet. Every Web server has an IP address and possibly a domain name. For example, if you enter the URL http://www.google.com in your browser, this sends a request to the Web server whose domain name is google.com. * Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet...

Words: 5169 - Pages: 21