Free Essay

Domain Naming System

In:

Submitted By beaverhausen
Words 3486
Pages 14
Domain Name System
By: Teresa M. Wade

In today’s society, technology has made life very convenient. One of those conveniences is the World Wide Web (WWW) commonly known as the Internet. From the touch of a button or a click of a mouse a user can gain access to a plethora of information. There are many different protocols and services that are interconnected to provide this ability. One such service is called Domain Naming System (DNS). DNS is an Internet service that translates domain names into IP addresses. This may not seem like a big deal to most but many would beg to differ if they had known that without DNS they would have to remember billions of numbers. Everything in a network has an IP address. DNS helps us designate what those devices are. There are 3 basic components of DNS which are zones (or namespace), name servers and resolvers. In the following reading you will learn what DNS is as well as the working components that make it as reliable as it is today. DNS was invented in 1983 shortly after Transmission Control Protocol/Internet Protocol (TCP/IP) was deployed. DNS operates on port 53 and utilizes User Datagram Protocol (UDP). The only time that the Transmission Control Protocol is used is when the response size exceeds 512 bytes. The only time that UDP can be used to transport more than 512 bytes is if EDNS is used. EDNS is basically an extension of DNS. Before the use of DNS, every computer on the network would retrieve a file called HOST.txt from a computer at SRI International. SRI is a contract research institute that focuses on communications, networks, robotics, and other forms of Information Technology (IT). This file would map numerical addresses to websites such as 131.22.25.212 to a website named www.teresa.com. Though this file was helpful the biggest limitation was that every time a given computer's address changed, every computer that seeks to communicate with it would need to update its hosts file. The growth of networking required a more scalable system that recorded a change in a host's address in one location only. Other hosts would learn about the change dynamically through a notification system, thus completing a globally accessible network of all hosts' names and their associated IP addresses. So before we talk about this dynamic notification let’s look at the basics of a domain. The domain name system uses a tree name structure. At the top of the tree is the root and followed by the top level domains and a number of lower levels. A domain name is separated by a period. The label on the right side is the top level domain (.com) and the left side is a sub-domain (yahoo). The terms domain and sub-domain are interchangeable. Sub-domain is typically a term relative to domain and refers to a domain contained within full domain. When a node is added to the left hand side you get a Fully Qualified Domain Name (FQDN). DNS is separated into zones and each zone is served by a name server, which can host several zones. A zone is a collection of connected nodes. A name server that has complete information for that zone is said to be an authority for that zone. When an IP address or hostname is resolved it searched through several name servers. If a name server is not working then a host cannot access any resource on the network. That is the reason for several name servers. If the primary does not respond then a host can use the secondary. Name servers are listed by name rather than by IP address. The difference between a domain and zone is subtle. A zone contains the domain names and data that a domain contains *except* for the domain names and data that are delegated elsewhere. Using the term delegated means making someone else responsible for the sub domain. This delegation property is why DNS is often called a distributed database. (DNS and BIND, 2000) The basic unit of data in DNS is called a resource record. Each record has a designated type such as A or MX (WindowsITPro, 2001). An A type is the most common. It translates a domain name into an IP address. A CNAME uses an alias for an internet address. A Pointer Record, or PTR, is used for reverse queries. That is if you have the IP address but not the hostname. That's why PTR records have become important. Originally, PTR records were just intended as a convenience. There still are no requirements that you have a PTR record but because of the abuse of the internet by spammers it is sometimes necessary. An MX record or Mail Exchanger record specifies how Internet e-mail should be routed using the Simple Mail Transfer Protocol (SMTP). Each MX record contains a preference and a host name, so that the collection of MX records for a given domain name point to the servers that should receive e-mail for that domain, and their priority relative to each other (MX Record, 2009). An NS record will list which name servers can answer the DNS requests. Records that have the same type are known as a set. There are 6 different sections to a resource record: NAME, TYPE, RDATA, TTL, RDLENGTH, and CLASS. The NAME is fully qualified domain name. The TYPE, as mentioned above, is the format of the data. RDATA depends on what the TYPE of the record is. RDATA is the data portion of the resource record. It can either be a mail host for MX records or an IP address for A records. CLASS specifies the class of the resource record being requested, normally the value 1 for Internet (TCP/IP Guide, 2005). RDLENGTH indicates the size of the RDATA field, in bytes and the TTL Specifies the number of seconds that the record should be retained in the cache of the device reading the record. A value of zero means “use this information for the current name resolution only; do not cache it”. Now let’s talk about caching on DNS servers. To begin the DNS resolution local machines contact a root server, the top node is called the root domain, who in turn contacts the next domain and so forth until it resolves the address. A recursive query is one where the DNS server will fully answer the query (or give an error). DNS servers are not required to support recursive queries. A non-recursive query is one in which the DNS server may provide a partial answer to the query (or give an error). This can sometimes be too much for the root server since at any given time there are billions of queries kicking off. To keep the server for crashing, caching is used to reduce the load on individual servers. Caching is used by DNS name servers to store the results of recent name resolution and other requests, so that if the request occurs again it can be satisfied from the cache without requiring another complete run of the name resolution process. Due to how most people use computers, a particular request is often followed by another request for the same name, so caching can significantly reduce the number of requests that result in complete name resolution procedures. Caching allows successful resolution responses to remain valid on the server for a predetermined amount of time. This time is called Time To Live (TTL) and is set by the Administrator of the DNS server and can vary from seconds to weeks. If the resolution is not successful then nothing will be saved. In the beginning of my career I have heard many co-workers discussing DNS. I have often been told that after updating a DNS record takes no time at all, however the replication takes 48 to 72 hours. This is only true if DNS servers are cached. If a new request is made then the change that was just made will be readily available. Now we know how information is saved let’s take a look at the initial resolution. The resolver within DNS is on the client side. It will initiate the request for a search which will ultimately lead to the resolution of the domain name to an IP address. The resolver negotiates use of recursive service. For querying purposes, software interprets the name segment by segment, from right to left (Hosting PHP UNIX, 2006). At each step along the way, the program queries a corresponding DNS server to provide a pointer to the next server which it should consult. A user will never directly communicate with a resolver. The resolution is actually transparent to the user. When a user makes a request from a program, such as a web browser, it will contact the resolver. A resolver will check their cache and return if the information if it is available. If the resolver does not have the information requested then it will reach out to DNS servers. There are often times where a program will maintain a separate version of cached addresses. This prevents them from having to reach out as well. This can sometimes cause issues when trying to troubleshoot DNS issues. Though we have been mostly referencing the Internet when talking about DNS and name resolution it is not the only place it is used. On a network within a company there are usually DNS servers built. Administrators will configure workstations to point to the appropriate resolvers. When it comes to an Internet Service Provider (ISP) they will provide the DNS server or allow it to be set up through Dynamic Host Configuration Protocol (DHCP). Networks within organizations heavily rely on DNS especially when working with Active Directory. Active Directory is the directory service for the Microsoft Windows Server 2003 operating system; DNS is the primary name resolution service or Windows Server 2003, and a core component of Windows Server 2003 TCP/IP networking (TechNet, 2003). To fully understand Active Directory, it helps to understand how DNS acts as an integral component in the design of Active Directory. Active Directory requires a name resolution service that enables network hosts and services to locate Active Directory domain controllers and a naming structure that enables an enterprise to reflect its organizational structure in the names of its directory service domains. DNS provides Active Directory with both a name resolution service for domain controller location and a hierarchical design that Active Directory leverages to provide a naming convention that can reflect organizational structure. Typically, a DNS domain namespace deployed to accommodate the Active Directory mirrors the Active Directory domain namespace. In cases where there is an existing DNS namespace prior to Active Directory deployment, the DNS namespace is typically partitioned for Active Directory, and a DNS sub-domain and delegation for the Active Directory forest root is created. Additional DNS domain names are then added for each Active Directory child domain. DNS data is used to support the location of Active Directory domain controllers also. During or after the creation of the DNS zones used to support Active Directory domains, the zones are populated with DNS resource records that enable network hosts and services to locate Active Directory domain controllers. An Active Directory-integrated zone is a zone that stores its zone data in Active Directory. DNS zone files are not needed. This type of zone is an authoritative primary zone. Zone data of an Active Directory-integrated zone is replicated during the Active Directory replication process. Active Directory-integrated zones also enjoy the security features of Active Directory. A few advantages that Active Directory-integrated zone implementations have over standard primary zone implementations are speed, access, and replication. Active Directory replication is faster, which means that the time needed to transfer zone data between zones is far less. The topology is used for AD replication. There is no longer a need for DNS replication when DNS and AD are integrated. The need to manage AD domains and DNS namespaces as separate entities is eliminated. When DNS and AD are integrated the zones are replicated and stored on domain controllers automatically. Synchronization takes place automatically when new domain controllers are deployed. When there is a service as important as DNS on a network it is always a good idea to know the security risks. Though it is helpful and beneficial to any network, DNS has a number of security issues. DNS caching as explained earlier as a successful resolution response that remains valid on a server for a predetermined amount of time. One security threat is called cache poisoning. Cache poisoning is when a DNS server is led into believing that it has received valid information. Cache poisoning is often used to direct user request to another website. This can be done for commercial solicitation (advertisements) or for even more malicious reasons. An attacker can alter the cache to have unsuspecting users inadvertently connect to a server that is owned by the attacker. Once this connection is complete the attacker can spoof the intended server and in turn allow the user to download worms, viruses, etc. (CompSec101, 1999). A virus can cause IP addresses of that server to be redirected to a malicious address with a long TTL. This could have far-reaching impact to potentially millions of Internet users if busy DNS servers cache the bad IP data. This would require manual purging of all affected DNS caches as required by the long TTL. To prevent this from happening, an administrator can enable DNS cache pollution protection. This protection will ensure that servers acting as a parent in the child-parent relationship will not be poisoned when resolution requests are forwarded. Techniques such as Forward Confirmed reverse DNS can also be used to help validate DNS results. This is implemented by having both forward and reverse DNS entries matching each other. That is when only the IP address is known and a user is looking for the hostname. Besides caching an attacker can also affect zone transfers. DNS servers are often configured to provide other DNS servers with updates. A secondary server performs a zone transfer to retrieve DNS data from a primary server. An attacker can use the same method to obtain all information in a DNS zone. With this information an attacker can map an organization’s network. These threats are serious and can be detrimental to a network. However, there are ways to ensure that DNS is secure. The common rule of thumb is to block everything and then begin to select what types of traffic you will allow. If there is any time that a company wants remote users to have access to items on your network then a Demilitarized Zone (DMZ) should be created. The DMZ is an area outside the firewall (InterHack, 2009).
Many networks use a split DNS design to separate their publicly accessible DNS servers and the DNS servers that resolve names internally in an organization. This designs helps prevent attackers from gaining access to internal information. The common rule of thumb is to block everything and then begin to select what types of traffic you will allow. If there is any time that a company wants remote users to have access to items on your network then a Demilitarized Zone (DMZ) should be created. The DMZ is an area outside the firewall (InterHack, 2009). This is the perfect place for an external DNS server. An administrator can also limit zone transfers. This configuration has DNS servers only going to specific secondary servers. The DNS implementation in Windows 2000 and later allows a DNS server to authenticate the identity of a computer account that attempts a zone transfer. BIND, explained later, can be configured to require DNS updates from clients to be signed. Both of these methods can prevent unauthorized clients from updating DNS registrations. Last but certainly not least is the most basic security method that can be applied. Administrators should ensure that server software has the latest updates installed to prevent DNS poisoning. When talking about DNS you will at most times here the term BIND as mentioned above. BIND stands for Berkeley Internet Name Domain Server and is an implementation of a DNS Server (The Berkeley Internet Name Domain Server). Developed in the 80s by four graduate students, it is the most commonly used software today and is mainly used on UNIX systems. It is a standard way of naming the many types of objects and resources that exist in distributed UNIX environments, and provides operations for storing and retrieving information about these objects. BIND was under heavy fire for having an open source code and eventually led to the development of alternative name servers and resolver programs. BIND Servers collectively manage a hierarchical name space that is partitioned into domains reflecting administrative entities. BIND is programmed to check whether a DNS is server is valid or not. This can prevent DNS cache poisoning Finally there are some mentionable features of DNS that are very helpful to Internet as well as network users. Nslookup is the name of a program that lets an Internet server administrator or any computer user enters a host name (for example, "yahoo.com") and find out the related IP address. It will also do reverse name lookup and find the host name for an IP address you specify. Nslookup sends a domain name query packet to a designated DNS server. Using the Linux and other versions of nslookup, you can locate other information associated with the host name or IP address, such as associated mail services. Nslookup is included with some Unix-based operating systems and in later Windows systems. DNS is not only used to translate an IP address to a hostname and vice versa. There are many other functions that most users are unaware of. DNS can also be used to for mail delivery (MX records), blacklists (restricting IPs), and storage (software updates). DNS Based Blacklist is “a list of IP addresses published through the Internets DNS” (DNSBL wiki) that are linked to spamming. Mail servers can be configured to reject messages that have been sent from a site listed on the blacklist. DNS can also be implemented with Windows Internet Name System (WINS). WINS is a name server for NetBIOS computer names. WINS is to NetBIOS names as DNS is to domain names (Windows Internet Name Service, 2009). A multiple network platform can have a UNIX based server handle a NDS request and a Windows based server handle a WINS requests. DNS and WINS work together by translating NetBIOS names and host names to IP addresses. This connection allows you to resolve names to remote computers across a Local Area Network (LAN) and across the Internet. In conclusion, the Internet has many intricacies that most of us fail to realize. When information comes so fast it is easy to forget what actions have taken place in the background to provide us this service. As explained above DNS can be used for resolution, configurations, and protection. DNS may be quiet and operate in the background but it has become almost a foundation of the networks we have come to know and love. Without DNS we would basically be lost within the World Wide Web.

Bibliography

CompSec101. (1999). Cache Poisoning Attacks. Retrieved 19 July, 2009, from http://compsec101.antibozo.net/papers/dnssec/dnssec.html
DNS and BIND. (2000, September 17). DNS and BIND Talk Notes. Retrieved 02 August, 2009, from http://www.tfug.org/helpdesk/general/dnsnotes.html
Hosting PHP UNIX. (2006). DNS Components. Retrieved 29 July, 2009, from http://www.hosting-php-unix.com/dns_components.htm
InterHack. (2009, April 01). Internet Firewalls: Frequently Asked Questions. Retrieved July 17, 2009, from http://www.interhack.net/pubs/fwfaq/
MX Record. (2009, July 29). MX Record. Retrieved 06 August, 2009, from http://en.wikipedia.org/wiki/MX_record
TCP/IP Guide. (2005, September 20). DNS
Message Resource Record Field Formats. Retrieved 30 July, 2009, from http://www.tcpipguide.com/free/t_DNSMessageResourceRecordFieldFormats-2.htm
TechNet. (2003, March 28). DNS Support for Active Directory Technical Reference. Retrieved 03 August, 2009, from http://technet.microsoft.com/en-us/library/cc781627(WS.10).aspx
TechNet. (2003, March 28). What Is DNS Support for Active Directory. Retrieved 30 July, 2009, from http://technet.microsoft.com/en-us/library/cc757136(WS.10).aspx Terry, D., Pinter, M., Riggle, D., Zhou, S. (1984). The Berkeley Internet Name Domain Server. Computer Systems Research Group, Available: (http://www.eecs.berkeley.edu/Pubs/TechRpts/1984/CSD-84-182.pdf. (July 22, 2009 WindowsITPro. (2001, July). DNS and Active Directory. Retrieved 30 July, 2009, from http://windowsitpro.com/article/articleid/21128/dns-and-active-directory.html
Windows Internet Name Service. (2009, 23 July). Windows Internet Name Service. Retrieved 25 July, 2009, from http://en.wikipedia.org/wiki/Windows_Internet_Naming_Service

Similar Documents

Free Essay

Dns (Domain Name System)

...Domain Name System Proper use reduces intranet administration costs Architecture Flexible Scalable Extensible Service Standard Robust Efficient DNS Affordable Reliable Predictable The Internet continues expanding. Its progress seems unstoppable; for years now the rate of growth has been increasing. To easily continue using a more widely spread Internet, and to keep a grip on it, DNS is vital. This article explains the benefit of DNS for business networks and the technological and administrative conditions necessary for the optimal deployment of this technology. The method described here is particularly important for organizations with many employees spread over multiple locations. Domain Name System Proper use reduces intranet administration costs N etwork addresses, such as 192.68.44.134, are difficult for people to remember. The need for associating names with network addresses has been recognized almost from the start of the Internet. Initially, a list of the names and network addresses of all computer systems was maintained in a central file, known as the hosts file. System administrators needed the discipline to regularly pick up the latest version. This method of working was no longer practical once the Internet starting rapidly expanding. System administrators needed to pick up an increasingly large file increasingly often. Also, the whole Internet was dependent on a single central authority who made changes. This authority also had no way of verifying...

Words: 2847 - Pages: 12

Free Essay

It Department

...The part of the system sending the queries is called the resolver and is the client side of the configuration. The name server answers the queries. Read RFCs 1034 and 1035. These contain the bulk of the DNS information and are superseded by RFCs 1535-1537. Naming is in RFC 1591. The main function of DNS is the mapping of IP addresses to human readable names. Three main components of DNS Resolver Name server Database of resource records (RRs) Domain Name System The Domain Name System (DNS) is basically a large database which resides on various computers and it contains the names and IP addresses of various hosts on the internet and various domains. The Domain Name System is used to provide information to the Domain Name Service to use when queries are made. The service is the act of querying the database, and the system is the data structure and data itself. The Domain Name System is similar to a file system in UNIX or DOS starting with a root. Branches attach to the root to create a huge set of paths. Each branch in the DNS is called a label. Each label can be 63 characters long, but most are less. Each text word between the dots can be 63 characters in length, with the total domain name (all the labels) limited to 255 bytes in overall length. The domain name system database is divided into sections called zones. The name servers in their respective zones are responsible for answering queries for their zones. A zone is a subtree of DNS and is administered separately...

Words: 977 - Pages: 4

Free Essay

Unit 8 – Assignment 1: Dns Zone File

...Server is a hierarchical naming system for computers and resources connected to the internet. Basically each line is a text description that defines a single resource records Domain Name Servers (DNS) are the They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. Information from all the domain name servers across the Internet are gathered together and housed at the Central Registry. Host companies and Internet Service Providers interact with the Central Registry on a regular schedule to get updated DNS information. When you type in a web address, e.g., www.jimsbikes.com, your Internet Service Provider views the DNS associated with the domain name, translates it into a machine friendly IP address (for example 216.168.224.70 is the IP for jimsbikes.com) and directs your Internet connection to the correct website. The Domain Name System is a hierarchical naming system for computers and resources connected to the internet. Basically this is the Internet's equivalent of a phone book that lets you have name to number mappings on your computers. The name decel.ecel.uwa.edu.au is the number 130.95.4.2 and vice versa. This is achieved through the DNS. The DNS is a heirarchy. There are a small number of root domain name servers that are responsible for tracking the top level domains and who is under them. The root domain servers between them know about all the people who have name servers that are authoritive for domains under the...

Words: 300 - Pages: 2

Premium Essay

Network Property

...on the address bus circuitry in order to enable the data bus to access a particular storage cell of main memory, or a register of memory mapped I/O device. | DHCP Server | 302010454 | The Dynamic Host Configuration Protocol (DHCP) is a network protocol that is used to configure network devices so that they can communicate on an IP network. A DHCP client uses the DHCP protocol to acquire configuration information, such as an IP address, a default route and one or more DNS server addresses from a DHCP server. The DHCP client then uses this information to configure its host. Once the configuration process is complete, the host is able to communicate on the internet. | DNS Server #1 | fec0:0:0:ffff:1%1 | The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet...

Words: 583 - Pages: 3

Premium Essay

Network Infrastructure

...Table of Contents INTRODUCTION 2 DESIGNING AND IMPLEMENTING AN AUTOMATIC IP-ADDRESSING MECHANISM 3 AUTOMATIC IP-ADDRESSING SCHEME FOR THE UWS NETWORK 3 INSTALLING AND AUTHORIZING A DHCP SERVER 4 CREATING AND CONFIGURATION OF DHCP SCOPES 8 CREATING AND TESTING DHCP CLIENT RESERVATIONS 10 IMPLEMENTING DHCP RELAY AGENTS 12 DOMAIN NAMING STRATEGY 16 DOMAIN NAME SERVICE INSTALLATION 17 DOMAIN NAME SERVICE LOOK UP ZONES 18 ZONE AUTHORITY DELEGATION 23 DNS DYNAMIC UPDATES 25 DNS RESOURCE RECORDS 25 NETBIOS NAME RESOLUTION 27 INSTALLATION OF WINS 27 STATIC WINS RECORD 28 CONFIGURING REPLICATION PARTNERS 30 ALTERNATIVE IP ADDRESSING STRATEGY 31 ALTERNATE NAME RESOLUTION TECHNIQUES 32 NETWORK PLAN FOR THE UWS GLASGOW SITE 32 NETWORK PLAN FOR THE UWS CLYDE SITE 33 NETWORK PLAN FOR THE UWS HEAD OFFICE SITE 33 OVERVIEW OF THE UWS NETWORK INFRASTRUCTURE AS A WHOLE 34 TROUBLESHOOTING STRATEGY FOR UWS NETWORK 34 BACK UP AND FAULT TOLERANCE STRATEGY FOR NETWORK SERVICES 38 NETWORK HEALTH MONITORING AND ANALYSES 38 CONNECTIVITY SOLUTIONS FOR MULTI-VENDOR -ENVIRONMENT 40 REMOTE CONNECTIVITY TO UWS NETWORK USING VPN 41 CONFIGURING INBOUND VPN CONNECTION 41 CONFIGURING REMOTE ACCESS POLICIES 45 CONFIGURING OUTBOUND VPN CONNECTION 48 NETWORK COUNTERACTIVE APPROACHES WITH REGARDS TO SECURITY THREATS 50 IMPLEMENTATION OF CERTIFICATE SERVICES 51 IPSEC IMPLEMENTATION 56 References 62 INTRODUCTION This is a case study about a company...

Words: 5792 - Pages: 24

Premium Essay

Information Gathering Plan

...promise of unprecedented information-gathering capabilities to lay users. Unfortunately, the promise has not yet been transformed into reality. While there are sources relevant to virtually any user-queries, the morass of sources presents a formidable hurdle to effectively accessing the information. One way of alleviating this problem is to develop a information gatherer which take the user’s query, and develop and execute an effective information gathering plan that accesses the relevant sources to answer the user’s query efficiently. Most organizations are familiar with Penetration Testing (often abbreviated to, “pen testing”) and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files. However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet, and not normally identifiable from standard log file analysis. Most critically, an attacker can passively gather this information without ever coming into direct contact with the organizations servers – thus being essentially...

Words: 596 - Pages: 3

Free Essay

Creating a Domain Model

...Creating a Domain Model Option 1 POS/421 – Windows Server Networking University of Phoenix Robert Singer The hierarchical naming system for computers, known as the Domain Name System (DNS), in any source linked to the Internet or private network. This system connects diverse information with domain names assigned to each of the participants. More importantly, it communicates the domain names that humans understand into numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.  An analogy used often to explain the Domain Name System is that it is like a phone book for the Internet. It translates language a human can understand to computer hostnames into IP addresses. For instance, www.example.com changes to 192.0.32.10. DNS known also as a distributed database that offers mapping between IP addresses and Host names.           Using the Domain Name System it is likely to assign domain names to sets of Internet users in an important way, free of each user's actual physical location. Since this is possible, World Wide Web (WWW) hyperlinks and Internet contact information will stay dependable and unbroken even if the existing Internet routing arrangements become altered or change, or the participant uses a mobile device. Internet domain names are easier to remember than IP addresses such as 209.75.188.166 (IPv4) or 2001:db8::1f70:6e8 (IPv6). Individuals take use this advantage when they talk about...

Words: 502 - Pages: 3

Premium Essay

Elastic and Inelastic Traffic

... Outline a plan for the development of an addressing and naming model in an environment of the following scenario: a. Ten (10) departments in a 1,000-employee organization b. Equal separation by geography c. Use a common data center of twenty (20) backend enterprise servers 2. Analyze the functional problems of throughput, delay, and packet loss as it pertains to your plan. 3. Analyze and explain how you would use DNS in your plan. 4. Compose a two-paragraph executive summary highlighting the main points of your plan. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: * Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. * Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. ANSWER: Lakisha Mason Dr. Hossein Besharatian CIS 505 February 7, 2014 Assignment 3: Elastic and Inelastic Traffic 1. Outline a plan for the development of an addressing and naming model in an environment of the following scenario: ◦Ten (10)...

Words: 1933 - Pages: 8

Free Essay

Nt1330 Unit 1 Assignment 1

...EN1330 Client-Server Networking 2 Unit 1. Assignment 1 9/25/2014 A Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resources connected to the internet or a private network. It associates various information with domain names assigned to each of the participating entitles. It translates easily memorized domain names to the numerical IP addresses needed for the purpose of locating computer services and devices worldwide. The best way that I have been able to explain it, it works like a phone book for the internet by translating hostnames into IP addresses. But unlike a phone book, the DNS can easily be updated and quickly. The internet maintains two principal namespaces, the domain name hierarchy and the Internet Protocol address spaces. A DNS name server is a server that stores the DNS records for a domain name, such as (A or AAA) records, name server records, and mail exchanger records. A DNS name server responds with answers to queries against its database. The Dynamic Host Configuration Protocol is a Standardized networking protocol used in Internet Protocol networks for dynamically distributing network configuration parameters, such as IP addresses for interface and services. With DHCP computers request IP addresses and networking parameters automatically from a DHCP server, reducing the need for a network administrator or a user to configure these settings manually. DHCP is used by computers for requesting Internet...

Words: 323 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Tina Nunez NT1330 Unit 1. Assignment 1 Windows 2008 Network Services Domain name system (DNS) is a naming service used on any device that can connect to the internet. It translates fully qualified domain names of websites into IP addresses for the device. There are DNS records such as address (A, AAAA) records, name server (NS) records and mail exchanger (MX) records stored in the DNS server. Regardless of how many hosts, the DNS is a system that is very important. Dynamic host configuration protocol (DHCP) is a networking protocol that allows the dynamic (automatic) distribution of IP addresses to hosts on a network. If DHCP is enabled, the hosts will each receive a leased IP address that is chosen by the DHCP server from a scope chosen by the network administrators. Sometimes the administrators can reserve IP addresses if needed. Depending on the amount of hosts, it could determine if the IT management wants to use DHCP. If the company is very small, it may not be worth the effort to set up a DHCP server. It can still work but static (manual) IP addresses would be simple to configure because there would be very few devices compared to a large company. Some of the vital devices will usually use static IP addresses anyway such as any servers. If there is a very large company, it would be extremely beneficial to use DHCP. All of the devices can automatically pick up an IP as soon as they connect to the network and the network administrators do not have to go to each and...

Words: 272 - Pages: 2

Free Essay

Failures

...A distributed system is a collection of computers connected to a network of distributed middleware (software connecting client and database: software that manages the connection between a client and a database) . This allows the computers to communicate to each other and also share resources. While allowing the user to use the computer as he or she would use a single integrated computing facility. Examples of failures in a distributed system include, stop failure, Halt failure, Network Failure, and Distributed File System Namespace access failures. Distributed File System Namespace access failures in Windows On Windows Vista and later one of the following error messages may occur: Windows cannot access \\\ The connection may fail due to any of the following reasons: Failure to connect to a domain controller to obtain a DFSN namespace referral, Failure to connect to a DFSN server, Failure of the DFSN server to provide a folder referral. This error typically occurs because the DFSN client cannot complete the connection to a DFSN path. To resolve the issue , evaluate network connectivity, name resolution, and DFSN service configuration (How to troubleshoot Distributed File System Namespace , 2010). Evaluate Connectivity "connectivity" refers to the client's ability to contact a domain controller or a DFSN server. If a client cannot complete a network connection to a domain controller or to a DFSN server, the DFSN request fails. Use the following tests to verify...

Words: 795 - Pages: 4

Premium Essay

Dns in Small Networks Step-by-Step Guide

...Step-by-Step Guide Microsoft Corporation Published: January 2008 Author: Jim Groves Editor: Jim Becker Abstract This guide helps you implement Domain Name System (DNS) on the Windows Server® 2008 operating system in a small network. Windows Server 2008 uses DNS to translate computer names to network addresses. An Active Directory® domain controller can act as a DNS server that registers the names and addresses of computers in the domain and then provides the network address of a member computer when the domain controller receives a query with the name of the computer. This guide explains how to set up DNS on a simple network that consists of a single domain. Contents Step-by-Step Guide for DNS in Small Networks 5 Planning DNS 6 Understanding the DNS namespace 6 Designing a DNS namespace 8 Creating an Internet DNS domain name 9 Creating internal DNS domain names 9 Creating DNS computer names 9 Installing and Configuring AD DS and DNS 11 Configuring Client Settings 19 Advanced DNS Configuration 27 Adding resource records 28 Automatically removing outdated resource records 29 Troubleshooting DNS 31 Step-by-Step Guide for DNS in Small Networks Domain Name System (DNS) is a system for naming computers and network services that maps those names to network addresses and organizes them into a hierarchy of domains. DNS naming is used on TCP/IP networks, such as the Internet and most corporate networks, to locate computers and services by using user-friendly names...

Words: 5078 - Pages: 21

Free Essay

Domain Name Server

...Essay The Domain Name Server Definition: The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4. The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. The DNS was designed to resolve or simply match up the IP address associated with the device to the friendly URL name on the other end. The domain name sever’s function in life is to resolve (translate) the user-friendly Web address to the hard to remember IP addresses from somewhere else. Therefore network providers are responsible for having their own DNS databases updated and in sync, with their outside counterparts, when their trying to talk to one another, because only companies IP addresses will match up with one another on the same network. DNS Server Configuration Types: DNS servers can be configured as one of the following types: Caching-only server A caching-only name server maintains a cache of resolved domain name-to-IP...

Words: 1664 - Pages: 7

Premium Essay

Nt1430

...Domain Name System (DNS) is defined by the website www.wikipedia.org as a hierarchical distributed naming system for computers, services, or any resource connected to the internet or a private network. DNS translates to numerical internet protocol IP addresses. DNS structure consists of the root level, top level and second level. The top of the DNS hierarchy is called the root domain. This is simply the starting point of the top level domain structure on the Internet. The next level in the hierarchy is divided into a series of nodes called the top-level domains. According to the website http://technet.microsoft.com,the top-level domains are assigned by organization type and by country/region. The second level domains contain the domains and names for organizations and countries/regions. The Intermodal Association of North America (IANA) manages the names and DNS servers of the root domain and the top-level domains. Individual organizations are responsible for managing the names in their second-level domains while the names in second-level domains are administered by the organization or country/region either directly or by using an Internet service provider (ISP) who manages the names on the customer's behalf. Naming in DNS is also hierarchical, and names are parsed from right to left. A domain name always ends with an implicit period, or dot (such as com, net, and org). Whenever you type a URL in to your web browsing program, you are depending on DNS records to get you to the...

Words: 581 - Pages: 3

Premium Essay

Medical

...Your Name:: Grading Breakdown: 55 points for complete activities and responses to questions 5 points for correctly submitting this worksheet to the assignment dropbox 5 points for proper sentence structure, grammar, and spelling Total: 65 points for the assignment To answer questions in this course that require you to research online and cite your source, please follow the directions below. | To research online, use Internet Explorer, Mozilla, Firefox, or another web browser and complete the following steps: 1. Choose one of the search engines listed below and type it into your browser. a. Google - http://www.google.com b. AltaVista - http://www.altavista.com c. Hotbot - http://www.hotbot.com d. Lycos - http://www.lycos.com e. Excite - http://www.excite.com f. WebCrawler - http://www.webcrawler.com 2. When the search engine page appears in your browser, you should see a text box on the page for you to enter your keyword(s), phrases or data. 3. Type in your key word(s), phrases or data and press “Enter” to initiate the search process. You should see a list of sites that contain information about the keyword(s), phrases or data you entered. 4. Select one of the links and click on it to find your answer to the question(s). 5. You may choose to repeat step four and click on a different link to verify your answer with a second source.To answer questions in your own words, use the following process: * When you answer...

Words: 918 - Pages: 4