Introduction to DNS and DHCP. The presentations highlights the introduction of Domain name System and Dynamic Host Configuration Protocol. These are essential study part in computer networking
in this presentation their is the detailed information regarding Domain Name System that is DNS.
What is DNS,how it works,query, resolution wtc all are being covered thoroughly in this presentation as it would have in for all new upcoming Engineering students to know about the DNS as well as would also help employees to get the better understanding regarding the protocol.
The complete agenda of the presentation is to provide the detailed knowledge regarding dns as its the most basic protocol used in Web development.
Hope you would like it. If so please do like share and subscribe.
How DNS works and How to secure it: An Introductionyasithbagya1
The document discusses DNS (Domain Name System) and how to secure it. It explains that DNS translates domain names to IP addresses, involving recursive queries to root nameservers and authoritative nameservers. Common DNS attacks are spoofing, poisoning, hijacking, amplification and flooding. Recommended security measures include DNS encryption using DNS over HTTPS and TLS, DNSSEC for response authentication, DNSCrypt for encryption and anonymity, redundant infrastructure for DDoS protection, and DNS firewalls.
Domain Name System (DNS) - Domain Registration and Website Hosting BasicsAsif Shahzad
I teach Web Technologies course at COMSATS University to undergrad students. These are lectures slides prepared for students. I thought to share it with all. Hope you would like it. It contains good enough details about how DNS, Hosting and Domain Registration works.
The Domain Name System (DNS) translates domain names to IP addresses and lists mail servers for each domain. It works by organizing domain names in a hierarchical tree structure with authoritative name servers at each level publishing information about domains below them. When resolving a domain name, a DNS server first checks its cache, then queries root servers, then name servers for higher level domains, progressing down the tree until the IP address is found.
The document discusses how the Domain Name System (DNS) works by translating domain names to IP addresses. It involves the following steps:
1) A user enters a domain name in their browser. Their computer first checks its local DNS cache for the IP address.
2) If not found locally, the computer queries a recursive DNS server, typically provided by the user's Internet Service Provider.
3) If the recursive DNS server doesn't have the IP address, it queries the root name servers which direct the query to the authoritative name servers for the top-level domain (e.g. .com, .org).
4) The authoritative name servers for the specific domain (e.g. ut
The domain name system (DNS) translates domain names that people use, like "example.com", into the IP addresses that computers use to locate websites, like "203.0.113.72". DNS servers perform this translation through a process where they first check their own records, then query other name servers like root and top-level domain servers if needed, until they can retrieve the IP address associated with the requested domain name. This process is called DNS resolution and allows browsers to load webpages by converting user-entered domain names into a format computers can understand.
The document discusses the Domain Name System (DNS) which translates human-readable domain names to machine-readable IP addresses. It describes how DNS works by querying multiple nameservers in a hierarchical system to resolve domain names. It also discusses DNS servers, clients, cache, record types including A, AAAA, CNAME, NS and SOA records, and how DNS lookups are performed to translate domains to IP addresses for web browsing or other internet uses.
The document discusses DNS (Domain Name System) which is a naming system that translates domain names to IP addresses. It explains that DNS servers map domain names that people use, like "example.com", to the corresponding IP addresses that computers use to locate websites. DNS is necessary because computers communicate using IP addresses, not domain names. The document provides details on how DNS works, the different types of DNS servers involved in lookups, and concepts like DNS caching and DNS resolution.
This document discusses the Domain Name System (DNS) and its objectives, need, services, and workings. The key points are:
DNS provides hostname to IP address translation, allowing humans to use hostnames while computers use IP addresses. It is a distributed database system with local, root, and authoritative name servers. DNS also provides host aliasing, mail server aliasing, and load distribution services. Resource records containing hostname mappings are stored across name servers, with caching to improve efficiency.
DNS is a distributed database that translates hostnames to IP addresses. It operates through a hierarchy of root servers, top-level domain servers, and authoritative name servers. DNS provides additional services like load balancing and mail server aliasing. Queries are resolved through recursive or iterative lookups between clients and servers to map names to addresses.
DNS (Domain Name System) translates domain names to IP addresses. It is a hierarchical distributed system with name servers at nodes. Third party DNS resolvers like OpenDNS have been developed to add features like phishing protection but may not improve performance over local resolvers. Content delivery networks (CDNs) bring content closer to users via global servers but assume the DNS resolver is near the requesting client, which may not be true for third party resolvers. Measurements show local resolvers generally have lower latency than third parties and are more likely to direct clients to content within their own network, improving performance for CDN content. While third parties can sometimes outperform, many rely on load balancing without caching, resulting in poorer efficiency than
Computer Networks Module 1 - part 2.pdfShanthalaKV
18CS52 VTU Computer Network & Security
MODULE 1-Part 2
DNS; The Internet's Directory Service: Services Provided by DNS, Overview of How DNS Works, DNS Records and Messages, Peer-to-Peer Applications: P2P File Distribution, Distributed Hash Tables, Socket Programming: creating Network Applications: Socket Programming with UDP, Socket Programming with TCP.
Learn about the essentials of the Domain Name System (DNS), including name resolution, different record types, roots, zones, authority and recursion.
See the full webinar and the rest of the series at https://www.thousandeyes.com/resources/intro-to-dns-webinar
Internet Technology Lectures
URL-DNS
Lecturer: Saman M. Almufti / Kurdistan Region, Nawroz University
facebook: https://www.facebook.com/saman.malmufti
YouTube link: https://youtu.be/pOx04uODo5o
Presentation on 'The Path to Resolverless DNS' by Geoff HustonAPNIC
Presentation on 'The Path to Resolverless DNS' by Geoff Huston for OARC 39 and 47th CENTR technical workshop, held in Belgrade on 22 and 23 October 2022
A Domain Name System assigns an alphabetic name to a numeric IP address and is made up of multiple Domain Name servers that enable IP address mapping for devices on the Internet (usually servers).
This document provides an overview of the Domain Name System (DNS). It discusses what DNS is, why names are used instead of IP addresses, and the history and development of DNS. It describes the hierarchical name space and domain system. It also explains different DNS record types like A, CNAME, MX, and NS records. The document discusses recursive and iterative queries, legal users of domains, and security issues with the traditional DNS system. It provides an overview of how DNSSEC aims to address some of these security issues through digital signing of DNS records.
Secure Shell (SSH) and Domain Name Server (DNS)
SSH provides strong encryption and authentication for remote login, command execution, and file transfer between machines. DNS is a distributed database that maps domain names to IP addresses through a hierarchy of name servers. It allows clients to find IP addresses for websites through queries to authoritative DNS servers. DNS organization involves storing records with domain names, IP addresses, and time-to-live information in a tree-like structure maintained across root, top-level, and authoritative name servers.
This document provides an overview of deploying and configuring DNS service. It discusses the DNS architecture based on IP addresses and name resolution. The objectives of DNS are to assign host names without duplication, store the host name database across multiple servers to avoid bottlenecks, and create a standardized naming system. DNS has three main elements - the DNS name space organized in a tree structure with domains and resource records, name servers that contain information about domains and resource records, and resolvers which are client programs that generate queries to the name servers. The document explains how the DNS process works with queries being resolved through a series of DNS servers.
23rd PITA AGM and Conference: DNS Security - A holistic view APNIC
Security Specialist Jamie Gillespie presents on DNS Security, examining the complex interactions of this system, from domain registration to name resolution, the security risks of each component, and the mitigation options currently available at 23rd PITA AGM and Annual Conference in Nadi, Fiji from 8 to 12 April 2019.
This document provides an overview of configuring and managing a DNS server, including:
1. Installing the DNS server role and configuring zones, records, and name resolution.
2. Describing DNS namespaces, zones, primary/secondary servers, and record types like SOA, NS, A, MX and SRV.
3. Explaining how DNS servers resolve queries using root hints, recursion, caching, and forwarders.
Chapter 4 configuring and managing the dns server roleLuis Garay
This document provides an overview of configuring and managing a DNS server. It discusses DNS namespaces, zones, resource records including SOA, NS, A, AAAA, CNAME, MX, and SRV records. It describes different types of DNS servers like primary, secondary, caching-only, and AD-integrated servers. It also covers topics like installing the DNS server role, configuring zones, performing zone transfers, and using root hints for name resolution.
The Domain Name System (DNS) is a critical part of Internet infrastructure and the largest distributed Internet directory service. DNS translates names to IP addresses, a required process for web navigation, email delivery, and other Internet functions. However, the DNS infrastructure is not secure enough unless the security mechanisms such as Transaction Signatures (TSIG) and DNS Security Extensions (DNSSEC) are implemented. To guarantee the availability and the secure Internet services, it is important for networking professionals to understand DNS concepts, DNS Security, configurations, and operations.
This course will discuss the concept of DNS Operations in detail, mechanisms to authenticate the communication between DNS Servers, mechanisms to establish authenticity, and integrity of DNS data and mechanisms to delegate trust to public keys of third parties. Participant will be involved in Lab exercises and do configurations based on number of scenarios.
Improving Developer Productivity With DORA, SPACE, and DevExJustin Reock
Ready to measure and improve developer productivity in your organization?
Join Justin Reock, Deputy CTO at DX, for an interactive session where you'll learn actionable strategies to measure and increase engineering performance.
Leave this session equipped with a comprehensive understanding of developer productivity and a roadmap to create a high-performing engineering team in your company.
More Related Content
Similar to Domain Name System and Dynamic Host Configuration Protocol.pptx (20)
This document discusses the Domain Name System (DNS) and its objectives, need, services, and workings. The key points are:
DNS provides hostname to IP address translation, allowing humans to use hostnames while computers use IP addresses. It is a distributed database system with local, root, and authoritative name servers. DNS also provides host aliasing, mail server aliasing, and load distribution services. Resource records containing hostname mappings are stored across name servers, with caching to improve efficiency.
DNS is a distributed database that translates hostnames to IP addresses. It operates through a hierarchy of root servers, top-level domain servers, and authoritative name servers. DNS provides additional services like load balancing and mail server aliasing. Queries are resolved through recursive or iterative lookups between clients and servers to map names to addresses.
DNS (Domain Name System) translates domain names to IP addresses. It is a hierarchical distributed system with name servers at nodes. Third party DNS resolvers like OpenDNS have been developed to add features like phishing protection but may not improve performance over local resolvers. Content delivery networks (CDNs) bring content closer to users via global servers but assume the DNS resolver is near the requesting client, which may not be true for third party resolvers. Measurements show local resolvers generally have lower latency than third parties and are more likely to direct clients to content within their own network, improving performance for CDN content. While third parties can sometimes outperform, many rely on load balancing without caching, resulting in poorer efficiency than
Computer Networks Module 1 - part 2.pdfShanthalaKV
18CS52 VTU Computer Network & Security
MODULE 1-Part 2
DNS; The Internet's Directory Service: Services Provided by DNS, Overview of How DNS Works, DNS Records and Messages, Peer-to-Peer Applications: P2P File Distribution, Distributed Hash Tables, Socket Programming: creating Network Applications: Socket Programming with UDP, Socket Programming with TCP.
Learn about the essentials of the Domain Name System (DNS), including name resolution, different record types, roots, zones, authority and recursion.
See the full webinar and the rest of the series at https://www.thousandeyes.com/resources/intro-to-dns-webinar
Internet Technology Lectures
URL-DNS
Lecturer: Saman M. Almufti / Kurdistan Region, Nawroz University
facebook: https://www.facebook.com/saman.malmufti
YouTube link: https://youtu.be/pOx04uODo5o
Presentation on 'The Path to Resolverless DNS' by Geoff HustonAPNIC
Presentation on 'The Path to Resolverless DNS' by Geoff Huston for OARC 39 and 47th CENTR technical workshop, held in Belgrade on 22 and 23 October 2022
A Domain Name System assigns an alphabetic name to a numeric IP address and is made up of multiple Domain Name servers that enable IP address mapping for devices on the Internet (usually servers).
This document provides an overview of the Domain Name System (DNS). It discusses what DNS is, why names are used instead of IP addresses, and the history and development of DNS. It describes the hierarchical name space and domain system. It also explains different DNS record types like A, CNAME, MX, and NS records. The document discusses recursive and iterative queries, legal users of domains, and security issues with the traditional DNS system. It provides an overview of how DNSSEC aims to address some of these security issues through digital signing of DNS records.
Secure Shell (SSH) and Domain Name Server (DNS)
SSH provides strong encryption and authentication for remote login, command execution, and file transfer between machines. DNS is a distributed database that maps domain names to IP addresses through a hierarchy of name servers. It allows clients to find IP addresses for websites through queries to authoritative DNS servers. DNS organization involves storing records with domain names, IP addresses, and time-to-live information in a tree-like structure maintained across root, top-level, and authoritative name servers.
This document provides an overview of deploying and configuring DNS service. It discusses the DNS architecture based on IP addresses and name resolution. The objectives of DNS are to assign host names without duplication, store the host name database across multiple servers to avoid bottlenecks, and create a standardized naming system. DNS has three main elements - the DNS name space organized in a tree structure with domains and resource records, name servers that contain information about domains and resource records, and resolvers which are client programs that generate queries to the name servers. The document explains how the DNS process works with queries being resolved through a series of DNS servers.
23rd PITA AGM and Conference: DNS Security - A holistic view APNIC
Security Specialist Jamie Gillespie presents on DNS Security, examining the complex interactions of this system, from domain registration to name resolution, the security risks of each component, and the mitigation options currently available at 23rd PITA AGM and Annual Conference in Nadi, Fiji from 8 to 12 April 2019.
This document provides an overview of configuring and managing a DNS server, including:
1. Installing the DNS server role and configuring zones, records, and name resolution.
2. Describing DNS namespaces, zones, primary/secondary servers, and record types like SOA, NS, A, MX and SRV.
3. Explaining how DNS servers resolve queries using root hints, recursion, caching, and forwarders.
Chapter 4 configuring and managing the dns server roleLuis Garay
This document provides an overview of configuring and managing a DNS server. It discusses DNS namespaces, zones, resource records including SOA, NS, A, AAAA, CNAME, MX, and SRV records. It describes different types of DNS servers like primary, secondary, caching-only, and AD-integrated servers. It also covers topics like installing the DNS server role, configuring zones, performing zone transfers, and using root hints for name resolution.
The Domain Name System (DNS) is a critical part of Internet infrastructure and the largest distributed Internet directory service. DNS translates names to IP addresses, a required process for web navigation, email delivery, and other Internet functions. However, the DNS infrastructure is not secure enough unless the security mechanisms such as Transaction Signatures (TSIG) and DNS Security Extensions (DNSSEC) are implemented. To guarantee the availability and the secure Internet services, it is important for networking professionals to understand DNS concepts, DNS Security, configurations, and operations.
This course will discuss the concept of DNS Operations in detail, mechanisms to authenticate the communication between DNS Servers, mechanisms to establish authenticity, and integrity of DNS data and mechanisms to delegate trust to public keys of third parties. Participant will be involved in Lab exercises and do configurations based on number of scenarios.
Improving Developer Productivity With DORA, SPACE, and DevExJustin Reock
Ready to measure and improve developer productivity in your organization?
Join Justin Reock, Deputy CTO at DX, for an interactive session where you'll learn actionable strategies to measure and increase engineering performance.
Leave this session equipped with a comprehensive understanding of developer productivity and a roadmap to create a high-performing engineering team in your company.
Evaluation Challenges in Using Generative AI for Science & Technical ContentPaul Groth
Evaluation Challenges in Using Generative AI for Science & Technical Content.
Foundation Models show impressive results in a wide-range of tasks on scientific and legal content from information extraction to question answering and even literature synthesis. However, standard evaluation approaches (e.g. comparing to ground truth) often don't seem to work. Qualitatively the results look great but quantitive scores do not align with these observations. In this talk, I discuss the challenges we've face in our lab in evaluation. I then outline potential routes forward.
Presentation given at the LangChain community meetup London
https://lu.ma/9d5fntgj
Coveres
Agentic AI: Beyond the Buzz
Introduction to AI Agent and Agentic AI
Agent Use case and stats
Introduction to LangGraph
Build agent with LangGraph Studio V2
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdfAlkin Tezuysal
As the demand for vector databases and Generative AI continues to rise, integrating vector storage and search capabilities into traditional databases has become increasingly important. This session introduces the *MyVector Plugin*, a project that brings native vector storage and similarity search to MySQL. Unlike PostgreSQL, which offers interfaces for adding new data types and index methods, MySQL lacks such extensibility. However, by utilizing MySQL's server component plugin and UDF, the *MyVector Plugin* successfully adds a fully functional vector search feature within the existing MySQL + InnoDB infrastructure, eliminating the need for a separate vector database. The session explains the technical aspects of integrating vector support into MySQL, the challenges posed by its architecture, and real-world use cases that showcase the advantages of combining vector search with MySQL's robust features. Attendees will leave with practical insights on how to add vector search capabilities to their MySQL systems.
Your startup on AWS - How to architect and maintain a Lean and Mean account J...angelo60207
Prevent infrastructure costs from becoming a significant line item on your startup’s budget! Serial entrepreneur and software architect Angelo Mandato will share his experience with AWS Activate (startup credits from AWS) and knowledge on how to architect a lean and mean AWS account ideal for budget minded and bootstrapped startups. In this session you will learn how to manage a production ready AWS account capable of scaling as your startup grows for less than $100/month before credits. We will discuss AWS Budgets, Cost Explorer, architect priorities, and the importance of having flexible, optimized Infrastructure as Code. We will wrap everything up discussing opportunities where to save with AWS services such as S3, EC2, Load Balancers, Lambda Functions, RDS, and many others.
Developing Schemas with FME and Excel - Peak of Data & AI 2025Safe Software
When working with other team members who may not know the Esri GIS platform or may not be database professionals; discussing schema development or changes can be difficult. I have been using Excel to help illustrate and discuss schema design/changes during meetings and it has proven a useful tool to help illustrate how a schema will be built. With just a few extra columns, that Excel file can be sent to FME to create new feature classes/tables. This presentation will go thru the steps needed to accomplish this task and provide some lessons learned and tips/tricks that I use to speed the process.
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....Jasper Oosterveld
Sensitivity labels, powered by Microsoft Purview Information Protection, serve as the foundation for classifying and protecting your sensitive data within Microsoft 365. Their importance extends beyond classification and play a crucial role in enforcing governance policies across your Microsoft 365 environment. Join me, a Data Security Consultant and Microsoft MVP, as I share practical tips and tricks to get the full potential of sensitivity labels. I discuss sensitive information types, automatic labeling, and seamless integration with Data Loss Prevention, Teams Premium, and Microsoft 365 Copilot.
MCP vs A2A vs ACP: Choosing the Right Protocol | BluebashBluebash
Understand the differences between MCP vs A2A vs ACP agent communication protocols and how they impact AI agent interactions. Get expert insights to choose the right protocol for your system. To learn more, click here: https://www.bluebash.co/blog/mcp-vs-a2a-vs-acp-agent-communication-protocols/
Trends Artificial Intelligence - Mary MeekerClive Dickens
Mary Meeker’s 2024 AI report highlights a seismic shift in productivity, creativity, and business value driven by generative AI. She charts the rapid adoption of tools like ChatGPT and Midjourney, likening today’s moment to the dawn of the internet. The report emphasizes AI’s impact on knowledge work, software development, and personalized services—while also cautioning about data quality, ethical use, and the human-AI partnership. In short, Meeker sees AI as a transformative force accelerating innovation and redefining how we live and work.
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOMAnchore
Over 70% of any given software application consumes open source software (most likely not even from the original source) and only 15% of organizations feel confident in their risk management practices.
With the newly announced Anchore SBOM feature, teams can start safely consuming OSS while mitigating security and compliance risks. Learn how to import SBOMs in industry-standard formats (SPDX, CycloneDX, Syft), validate their integrity, and proactively address vulnerabilities within your software ecosystem.
Exploring the advantages of on-premises Dell PowerEdge servers with AMD EPYC processors vs. the cloud for small to medium businesses’ AI workloads
AI initiatives can bring tremendous value to your business, but you need to support your new AI workloads effectively. That means choosing the best possible infrastructure for your needs—and many companies are finding that the cloud isn’t right for them. According to a recent Rackspace survey of IT executives, 69 percent of companies have moved some of their applications on-premises from the cloud, with half of those citing security and compliance as the reason and 44 percent citing cost.
On-premises solutions provide a number of advantages. With full control over your security infrastructure, you can be certain that all compliance requirements remain firmly in the hands of your IT team. Opting for on-premises also gives you the ability to design your infrastructure to the precise needs of that team and your new AI workloads. Depending on the workload, you may also see performance benefits, along with more predictable costs. As you start to build your next AI initiative, consider an on-premises solution utilizing AMD EPYC processor-powered Dell PowerEdge servers.
Neural representations have shown the potential to accelerate ray casting in a conventional ray-tracing-based rendering pipeline. We introduce a novel approach called Locally-Subdivided Neural Intersection Function (LSNIF) that replaces bottom-level BVHs used as traditional geometric representations with a neural network. Our method introduces a sparse hash grid encoding scheme incorporating geometry voxelization, a scene-agnostic training data collection, and a tailored loss function. It enables the network to output not only visibility but also hit-point information and material indices. LSNIF can be trained offline for a single object, allowing us to use LSNIF as a replacement for its corresponding BVH. With these designs, the network can handle hit-point queries from any arbitrary viewpoint, supporting all types of rays in the rendering pipeline. We demonstrate that LSNIF can render a variety of scenes, including real-world scenes designed for other path tracers, while achieving a memory footprint reduction of up to 106.2x compared to a compressed BVH.
https://arxiv.org/abs/2504.21627
2. INTRODUCTION
• A DNS is a computer server that contains a database of many IP
addresses and their associated domain names.
• It serves to translate a requested domain name into an IP address, so
that the computer knows which DNS address to connect to for the
requested contents.
• The internet is a network of connected computers, and they
communicate with each other through IP addresses.
• See a DNS as a phone book, which matches a name to a telephone
number.
• Also a similar concept to smartphone’s contact list, which will match a
contact name to a phone number.
3. WORKING
• A DNS starts working immediately after a user enters a domain name in
the address bar of a browser.
• It will search through the internet to find the IP address that is
associated with the entered domain name.
• After successfully identifying the IP address, it then guides the user’s
browser to connect to it, which will then serve the requested website
contents.
• The process happens very quickly with little delay and the user will be
on his requested website almost immediately.
• However, in the background, a DNS has executed many processes.
4. WORKING
• The first step that a DNS does
is to send a DNS query to
several other DNS servers.
• A DNS is not just a single
server responding to over
billions of domain name
requests, but instead it is
distributed globally across a
network of DNS, which stores
the IP address directory in a
distributed manner.
5. WORKING
• If a user is looking for a specific site and there
is only one DNS server to process it, then it will
take significantly longer to search through the
millions of records in the directory.
• What if at the same time there are also millions,
if not billions of users who are also doing the
same? That is going to take a long time, and
the users’ browsing experience will definitely
be affected negatively.
• Therefore, DNS is set up to work collaboratively
across several servers to provide the best
browsing experience to users.
6. WORKING
• When a website address is entered by a user
in an internet browser, a DNS query is
initiated and a DNS server sends the query to
several other DNS servers, each tasked with
translating a different part of the domain
name the user entered.
• There are mainly four servers which work
together to translate the website address into
a computer readable IP address, namely the
DNS resolver server, the root server, the top-
level domain (TLD) server and the
authoritative name server.
7. WORKING
• The DNS resolver is the server who
does most of the process in translating
a domain name to an IP address.
• It receives the DNS query and in turn
acts like a client to query the three
other DNS servers mentioned above to
translate the domain name.
• It first queries the root server and the root
server responds to the query by returning the
IP address of a TLD server (like .Com, .Net,
.Org etc.).
8. WORKING
• A TLD server stores the information for its
domains, and will return the IP address of the
authoritative name server to the DNS
resolver.
• This is where the requested website is
actually located.
• It then returns the actual IP address of the
requested website to the DNS resolver, which
in turn response to the initial DNS query the
actual IP address.
9. WORKING
• Consider point 9 as shown in the illustration. The
DNS resolver will perform a caching function to
cache the data for a limited time, after it has
retrieved the correct IP address for a given website.
• The purpose of doing so is that in case the user
requests for the same domain name again, it can
immediately direct the user to the right web server
without having to do the entire process of
translating the domain name again.
• It is also beneficial in a sense that if there are other
users who request for the same domain name, their
request can be processed instantly, and they can
enjoy a great browsing experience.
10. WORKING
• DNS Recursor
• The recursor can be thought of as a librarian who is asked to go find a
particular book somewhere in a library. The DNS recursor is a server
designed to receive queries from client machines through applications
such as web browsers. Typically the recursor is then responsible for
making additional requests in order to satisfy the client’s DNS query.
• Root Nameserver
• The root server is the first step in translating (resolving) human
readable host names into IP addresses. Typically it serves as a
reference to other more specific locations.
11. WORKING
• TLD Nameserver
• This nameserver is the next step in the search for a specific IP
address, and it hosts the last portion of a hostname (in
example.com, the TLD server is “com”).
• Authoritative Nameserver
• The authoritative nameserver is the last stop in the nameserver
query. If the authoritative name server has access to the requested
record, it will return the IP address for the requested hostname back
to the DNS recursor (the librarian) that made the initial request.
12. RECURSIVE DNS RESOLVER
• The recursive resolver is the computer that responds to a recursive
request from a client and takes the time to track down the DNS record.
• It does this by making a series of requests until it reaches the
authoritative DNS nameserver for the requested record (or times out or
returns an error if no record is found).
• Luckily, recursive DNS resolvers do not always need to make multiple
requests in order to track down the records needed to respond to a
client; caching is a data persistence process that helps short-circuit the
necessary requests by serving the requested resource record earlier in
the DNS lookup.
14. AUTHORITATIVE DNS SERVER
• An authoritative DNS server is a server that actually holds, and is
responsible for, DNS resource records.
• This is the server at the bottom of the DNS lookup chain that will
respond with the queried resource record, ultimately allowing the web
browser making the request to reach the IP address needed to access a
website or other web resources.
• An authoritative nameserver can satisfy queries from its own data
without needing to query another source, as it is the final source of
truth for certain DNS records.
16. TYPES OF DNS QUERIES
• In a typical DNS lookup three types of queries occur. By using a
combination of these queries, an optimized process for DNS resolution
can result in a reduction of distance traveled.
• In an ideal situation cached record data will be available, allowing a
DNS name server to return a non-recursive query.
17. TYPES OF DNS QUERIES
• Recursive Query
• In a recursive query, a DNS client requires that a DNS
server (typically a DNS recursive resolver) will respond to
the client with either the requested resource record or an
error message if the resolver can't find the record.
18. TYPES OF DNS QUERIES
• Iterative Query
• In this situation the DNS client will allow a DNS server to return the
best answer it can.
• If the queried DNS server does not have a match for the query name,
it will return a referral to a DNS server authoritative for a lower level
of the domain namespace.
• The DNS client will then make a query to the referral address.
• This process continues with additional DNS servers down the query
chain until either an error or timeout occurs.
19. TYPES OF DNS QUERIES
• Non-recursive Query
• Normally this will occur when a DNS resolver client queries a
DNS server for a record that it has access to either because it's
authoritative for the record or the record exists inside of its
cache.
• Typically, a DNS server will cache DNS records to prevent
additional bandwidth consumption and load on upstream
servers.
20. DNS LOOKUP
• DNS translates human-readable domain names (google.com) to machine-readable IP
addresses (142.251.46.238).
• To achieve better scalability, the DNS servers are organized in a hierarchical tree
structure.
21. DNS LOOKUP
1. google.com is typed into the browser, and the browser sends the domain name to
the DNS resolver.
2. The resolver queries a DNS root name server.
3. The root server responds to the resolver with the address of a TLD DNS server. In this
case, it is .Com.
4. The resolver then makes a request to the .Com TLD.
5. The TLD server responds with the IP address of the domain’s name
server, google.com (authoritative name server).
6. The DNS resolver sends a query to the domain’s nameserver.
7. The IP address for google.com is then returned to the resolver from the nameserver.
8. The DNS resolver responds to the web browser with the IP address (142.251.46.238)
of the domain requested initially.
• DNS lookups on average take between 20-120 milliseconds to complete.
22. STATIC & DYNAMIC IP ADDRESS
• IP address may be a unique numerical symbol allotted to every device
on a network to spot each affiliation clearly.
• The distinction between static and dynamic IP address lies inside the
length of allotted scientific discipline address.
• The static scientific discipline address is fastened scientific discipline
address that is manually allotted to a tool for a protracted amount of
your time.
• On the opposite hand, the dynamic scientific discipline address often
changes whenever user boots his/her machine, and it’s mechanically
allotted.
24. S.NO Static IP Address Dynamic IP address
1. It is provided by ISP (Internet Service Provider).
While it is provided by DHCP (Dynamic Host Configuration
Protocol).
2.
Static IP address does not change any time, it
means if a static IP address is provided then it
can’t be changed or modified.
While dynamic IP address change any time.
3. Static IP address is less secure.
While in dynamic IP address, there is low amount of risk than
static IP address’s risk.
4. Static IP address is difficult to designate. While dynamic IP address is easy to designate.
5.
The device designed by static IP address can be
traced.
But the device designed by dynamic IP address can’t be
traced.
6.
Static IP address is more stable than dynamic IP
address.
While dynamic IP address is less stable than static IP address.
7.
The cost to maintain the static IP address is
higher than dynamic IP address.
While the maintaining cost of dynamic IP address is less than
static IP address.
8.
It is used where computational data is less
confidential.
While it is used where data is more confidential and needs
more security.
9.
Simplifies the troubleshooting as the IP is always
the same.
While dynamic IP increases the complexity of diagnosing the
network issues.
25. DHCP
• DHCP stands for Dynamic Host Configuration Protocol.
• It is the critical feature on which the users of an enterprise network
communicate.
• DHCP helps enterprises to smoothly manage the allocation of IP
addresses to the end-user clients’ devices such as desktops, laptops,
cellphones, etc.
26. COMPONENTS OF DHCP
• DHCP Server: DHCP server is basically a server that holds IP addresses
and other information related to configuration.
• DHCP Client: it is basically a device that receives configuration
information from the server. It can be a mobile, laptop, computer, or
any other electronic device that requires a connection.
• DHCP Relay: DHCP relays basically work as a communication channel
between DHCP client and server.
• IP Address Pool: it is the pool or container of IP addresses possessed by
the DHCP server. It has a range of addresses that can be allocated to
devices.
27. COMPONENTS OF DHCP
• Subnets: subnets are smaller portions of the IP network partitioned to
keep networks under control.
• Lease: it is simply the time that how long the information received from
the server is valid, in case of expiration of the lease, the tenant must have
to re-assign the lease.
• DNS Servers: DHCP servers can also provide DNS (domain name system)
server information to DHCP clients, allowing them to resolve domain
names to IP addresses.
• Default Gateway: dhcp servers can also provide information about the
default gateway, which is the device that packets are sent to when the
destination is outside the local network.
28. COMPONENTS OF DHCP
• Options: DHCP servers can provide additional configuration options to clients,
such as the subnet mask, domain name, and time server information.
• Renewal: DHCP clients can request to renew their lease before it expires to
ensure that they continue to have a valid IP address and configuration
information.
• Failover: DHCP servers can be configured for failover, where two servers work
together to provide redundancy and ensure that clients can always obtain an
IP address and configuration information, even if one server goes down.
• Dynamic Updates: DHCP servers can also be configured to dynamically update
DNS records with the IP address of DHCP clients, allowing for easier
management of network resources.
29. COMPONENTS OF DHCP
• Audit Logging: DHCP servers can keep audit logs of all DHCP
transactions, providing administrators with visibility into
which devices are using which IP addresses and when leases
are being assigned or renewed.
30. DHCP SCOPE
• A DHCP scope is a range of IP addresses that a DHCP server
can distribute to clients on a specific network segment.
• Whenever a DHCP server has to assign an IP Address to a
client device, it will randomly choose any available address to
the device.
• A DHCP server can have multiple scopes for different subnets
or VLANS, and each scope must have a unique name and ID.
31. WHY USE DHCP SCOPE
• It simplifies the management of IP addresses, as you don't
have to configure them manually on each device.
• It also reduces the risk of IP conflicts, as the DHCP server
ensures that each device gets a unique address.
• It also allows you to change the network settings centrally,
by modifying the scope parameters. For example, you can
change the DNS servers or the gateway without affecting the
devices.
32. DHCP RESERVATION
• The DHCP reservation functionality empowers the DHCP server to
allocate a dedicated IP address for a specific device within the
network.
• A reservation is based on the MAC address of the device, which is
a unique identifier for its network interface.
• A reserved address is not part of the pool of available addresses,
and it is always assigned to the same device, regardless of the
lease duration.
• A DHCP server can have multiple reservations for different devices
within a scope.
33. WHY USE DHCP RESERVATION
• It allows you to ensure that a device always has the same IP address,
which can be useful for security, monitoring, or access control
purposes.
• For example, you can use reservation for a printer, a server, a camera,
or a firewall, so that you can always reach them by the same address.
• It also allows you to override the scope parameters for a specific
device, by configuring them individually.
• For example, you can assign a different gateway or DNS server to a
device with a reservation.
34. DHCP LEASE
• A lease is defined as the time period for which a DHCP server allocates an IP address
to a client. The lease can be extended upon subsequent requests.
• If the client no longer needs the IP address, it can release the address back to the
server before the lease expires. The server is then free to assign this address to a
different client if no other idle IP address is available.
• The lease period configured for a DHCP server applies to all of the IP addresses that a
DHCP server dynamically assigns to its clients.
• A different DHCP server may have a different lease term for its clients. A statically
allocated IP address is not subject to the lease terms.
35. DHCP LEASE
• A DHCP client does not wait for its lease to expire, because it may be
assigned a different IP address. Instead, when a DHCP client reaches
the halfway point of its lease period, it attempts to extend its lease so
that it retains the same IP address.
36. ADDRESS POOLS
• An address pool is a set of all the IP addresses that a DHCP server has
reserved for dynamic client allocation.
• Along with each IP address, the server stores certain network
parameters, such as a default lease length for the IP address and other
configuration parameters (for example, a subnet mask and the address
of the default gateway) to be sent to the client when it is assigned that
IP address.
• Address pools are classified into Interface Address Pools and Global
Address Pools.
37. ADDRESS POOLS
• Interface Address Pool
• After an IP address is configured for an interface on a
DHCP server, you can create an address pool on the same
network segment as this interface.
• Addresses in the address pool can be allocated only to
clients connected to the interface.
• The interface address pool can allocate IP addresses to
clients on the same network segment as the DHCP server.
38. ADDRESS POOLS
• Global Address Pool
• On a DHCP server, you can create an address pool on the
specified network segment in the system view.
• Addresses in the address pool can be allocated to all
clients connected to the DHCP server, even if the server
and clients are on different network segments.
39. DYNAMIC DNS
• Dynamic DNS (DDNS) is a method of automatically updating a name
server in the domain name system (DNS), often in real time, with the
active DDNS configuration of its configured hostnames, addresses or
other information.
• The term is used to describe two different concepts.
• The first is "dynamic DNS updating" which refers to systems that are used to
update traditional DNS records without manual editing. these mechanisms
use TSIG to provide security.
• The second kind of dynamic DNS permits lightweight and immediate updates
often using an update client, which do not use the RFC2136 standard for updating
DNS records
40. DHCP OPTIONS
• Supplying DHCP options is a smart way to configure network clients
during the early phase of network access deployment. In addition to
providing the IP address, the DHCP protocol is able to set a large bunch
of options that are very useful for device configuration.
• Each option has a name and a numerical identifier to be transported in
the protocol frames.
• https://www.incognito.com/tutorials/dhcp-options-in-plain-english/