SlideShare a Scribd company logo
DOMAIN NAME SYSTEM
INTRODUCTION
• A DNS is a computer server that contains a database of many IP
addresses and their associated domain names.
• It serves to translate a requested domain name into an IP address, so
that the computer knows which DNS address to connect to for the
requested contents.
• The internet is a network of connected computers, and they
communicate with each other through IP addresses.
• See a DNS as a phone book, which matches a name to a telephone
number.
• Also a similar concept to smartphone’s contact list, which will match a
contact name to a phone number.
WORKING
• A DNS starts working immediately after a user enters a domain name in
the address bar of a browser.
• It will search through the internet to find the IP address that is
associated with the entered domain name.
• After successfully identifying the IP address, it then guides the user’s
browser to connect to it, which will then serve the requested website
contents.
• The process happens very quickly with little delay and the user will be
on his requested website almost immediately.
• However, in the background, a DNS has executed many processes.
WORKING
• The first step that a DNS does
is to send a DNS query to
several other DNS servers.
• A DNS is not just a single
server responding to over
billions of domain name
requests, but instead it is
distributed globally across a
network of DNS, which stores
the IP address directory in a
distributed manner.
WORKING
• If a user is looking for a specific site and there
is only one DNS server to process it, then it will
take significantly longer to search through the
millions of records in the directory.
• What if at the same time there are also millions,
if not billions of users who are also doing the
same? That is going to take a long time, and
the users’ browsing experience will definitely
be affected negatively.
• Therefore, DNS is set up to work collaboratively
across several servers to provide the best
browsing experience to users.
WORKING
• When a website address is entered by a user
in an internet browser, a DNS query is
initiated and a DNS server sends the query to
several other DNS servers, each tasked with
translating a different part of the domain
name the user entered.
• There are mainly four servers which work
together to translate the website address into
a computer readable IP address, namely the
DNS resolver server, the root server, the top-
level domain (TLD) server and the
authoritative name server.
WORKING
• The DNS resolver is the server who
does most of the process in translating
a domain name to an IP address.
• It receives the DNS query and in turn
acts like a client to query the three
other DNS servers mentioned above to
translate the domain name.
• It first queries the root server and the root
server responds to the query by returning the
IP address of a TLD server (like .Com, .Net,
.Org etc.).
WORKING
• A TLD server stores the information for its
domains, and will return the IP address of the
authoritative name server to the DNS
resolver.
• This is where the requested website is
actually located.
• It then returns the actual IP address of the
requested website to the DNS resolver, which
in turn response to the initial DNS query the
actual IP address.
WORKING
• Consider point 9 as shown in the illustration. The
DNS resolver will perform a caching function to
cache the data for a limited time, after it has
retrieved the correct IP address for a given website.
• The purpose of doing so is that in case the user
requests for the same domain name again, it can
immediately direct the user to the right web server
without having to do the entire process of
translating the domain name again.
• It is also beneficial in a sense that if there are other
users who request for the same domain name, their
request can be processed instantly, and they can
enjoy a great browsing experience.
WORKING
• DNS Recursor
• The recursor can be thought of as a librarian who is asked to go find a
particular book somewhere in a library. The DNS recursor is a server
designed to receive queries from client machines through applications
such as web browsers. Typically the recursor is then responsible for
making additional requests in order to satisfy the client’s DNS query.
• Root Nameserver
• The root server is the first step in translating (resolving) human
readable host names into IP addresses. Typically it serves as a
reference to other more specific locations.
WORKING
• TLD Nameserver
• This nameserver is the next step in the search for a specific IP
address, and it hosts the last portion of a hostname (in
example.com, the TLD server is “com”).
• Authoritative Nameserver
• The authoritative nameserver is the last stop in the nameserver
query. If the authoritative name server has access to the requested
record, it will return the IP address for the requested hostname back
to the DNS recursor (the librarian) that made the initial request.
RECURSIVE DNS RESOLVER
• The recursive resolver is the computer that responds to a recursive
request from a client and takes the time to track down the DNS record.
• It does this by making a series of requests until it reaches the
authoritative DNS nameserver for the requested record (or times out or
returns an error if no record is found).
• Luckily, recursive DNS resolvers do not always need to make multiple
requests in order to track down the records needed to respond to a
client; caching is a data persistence process that helps short-circuit the
necessary requests by serving the requested resource record earlier in
the DNS lookup.
RECURSIVE DNS RESOLVER
AUTHORITATIVE DNS SERVER
• An authoritative DNS server is a server that actually holds, and is
responsible for, DNS resource records.
• This is the server at the bottom of the DNS lookup chain that will
respond with the queried resource record, ultimately allowing the web
browser making the request to reach the IP address needed to access a
website or other web resources.
• An authoritative nameserver can satisfy queries from its own data
without needing to query another source, as it is the final source of
truth for certain DNS records.
AUTHORITATIVE DNS SERVER
TYPES OF DNS QUERIES
• In a typical DNS lookup three types of queries occur. By using a
combination of these queries, an optimized process for DNS resolution
can result in a reduction of distance traveled.
• In an ideal situation cached record data will be available, allowing a
DNS name server to return a non-recursive query.
TYPES OF DNS QUERIES
• Recursive Query
• In a recursive query, a DNS client requires that a DNS
server (typically a DNS recursive resolver) will respond to
the client with either the requested resource record or an
error message if the resolver can't find the record.
TYPES OF DNS QUERIES
• Iterative Query
• In this situation the DNS client will allow a DNS server to return the
best answer it can.
• If the queried DNS server does not have a match for the query name,
it will return a referral to a DNS server authoritative for a lower level
of the domain namespace.
• The DNS client will then make a query to the referral address.
• This process continues with additional DNS servers down the query
chain until either an error or timeout occurs.
TYPES OF DNS QUERIES
• Non-recursive Query
• Normally this will occur when a DNS resolver client queries a
DNS server for a record that it has access to either because it's
authoritative for the record or the record exists inside of its
cache.
• Typically, a DNS server will cache DNS records to prevent
additional bandwidth consumption and load on upstream
servers.
DNS LOOKUP
• DNS translates human-readable domain names (google.com) to machine-readable IP
addresses (142.251.46.238).
• To achieve better scalability, the DNS servers are organized in a hierarchical tree
structure.
DNS LOOKUP
1. google.com is typed into the browser, and the browser sends the domain name to
the DNS resolver.
2. The resolver queries a DNS root name server.
3. The root server responds to the resolver with the address of a TLD DNS server. In this
case, it is .Com.
4. The resolver then makes a request to the .Com TLD.
5. The TLD server responds with the IP address of the domain’s name
server, google.com (authoritative name server).
6. The DNS resolver sends a query to the domain’s nameserver.
7. The IP address for google.com is then returned to the resolver from the nameserver.
8. The DNS resolver responds to the web browser with the IP address (142.251.46.238)
of the domain requested initially.
• DNS lookups on average take between 20-120 milliseconds to complete.
STATIC & DYNAMIC IP ADDRESS
• IP address may be a unique numerical symbol allotted to every device
on a network to spot each affiliation clearly.
• The distinction between static and dynamic IP address lies inside the
length of allotted scientific discipline address.
• The static scientific discipline address is fastened scientific discipline
address that is manually allotted to a tool for a protracted amount of
your time.
• On the opposite hand, the dynamic scientific discipline address often
changes whenever user boots his/her machine, and it’s mechanically
allotted.
STATIC & DYNAMIC IP ADDRESS
S.NO Static IP Address Dynamic IP address
1. It is provided by ISP (Internet Service Provider).
While it is provided by DHCP (Dynamic Host Configuration
Protocol).
2.
Static IP address does not change any time, it
means if a static IP address is provided then it
can’t be changed or modified.
While dynamic IP address change any time.
3. Static IP address is less secure.
While in dynamic IP address, there is low amount of risk than
static IP address’s risk.
4. Static IP address is difficult to designate. While dynamic IP address is easy to designate.
5.
The device designed by static IP address can be
traced.
But the device designed by dynamic IP address can’t be
traced.
6.
Static IP address is more stable than dynamic IP
address.
While dynamic IP address is less stable than static IP address.
7.
The cost to maintain the static IP address is
higher than dynamic IP address.
While the maintaining cost of dynamic IP address is less than
static IP address.
8.
It is used where computational data is less
confidential.
While it is used where data is more confidential and needs
more security.
9.
Simplifies the troubleshooting as the IP is always
the same.
While dynamic IP increases the complexity of diagnosing the
network issues.
DHCP
• DHCP stands for Dynamic Host Configuration Protocol.
• It is the critical feature on which the users of an enterprise network
communicate.
• DHCP helps enterprises to smoothly manage the allocation of IP
addresses to the end-user clients’ devices such as desktops, laptops,
cellphones, etc.
COMPONENTS OF DHCP
• DHCP Server: DHCP server is basically a server that holds IP addresses
and other information related to configuration.
• DHCP Client: it is basically a device that receives configuration
information from the server. It can be a mobile, laptop, computer, or
any other electronic device that requires a connection.
• DHCP Relay: DHCP relays basically work as a communication channel
between DHCP client and server.
• IP Address Pool: it is the pool or container of IP addresses possessed by
the DHCP server. It has a range of addresses that can be allocated to
devices.
COMPONENTS OF DHCP
• Subnets: subnets are smaller portions of the IP network partitioned to
keep networks under control.
• Lease: it is simply the time that how long the information received from
the server is valid, in case of expiration of the lease, the tenant must have
to re-assign the lease.
• DNS Servers: DHCP servers can also provide DNS (domain name system)
server information to DHCP clients, allowing them to resolve domain
names to IP addresses.
• Default Gateway: dhcp servers can also provide information about the
default gateway, which is the device that packets are sent to when the
destination is outside the local network.
COMPONENTS OF DHCP
• Options: DHCP servers can provide additional configuration options to clients,
such as the subnet mask, domain name, and time server information.
• Renewal: DHCP clients can request to renew their lease before it expires to
ensure that they continue to have a valid IP address and configuration
information.
• Failover: DHCP servers can be configured for failover, where two servers work
together to provide redundancy and ensure that clients can always obtain an
IP address and configuration information, even if one server goes down.
• Dynamic Updates: DHCP servers can also be configured to dynamically update
DNS records with the IP address of DHCP clients, allowing for easier
management of network resources.
COMPONENTS OF DHCP
• Audit Logging: DHCP servers can keep audit logs of all DHCP
transactions, providing administrators with visibility into
which devices are using which IP addresses and when leases
are being assigned or renewed.
DHCP SCOPE
• A DHCP scope is a range of IP addresses that a DHCP server
can distribute to clients on a specific network segment.
• Whenever a DHCP server has to assign an IP Address to a
client device, it will randomly choose any available address to
the device.
• A DHCP server can have multiple scopes for different subnets
or VLANS, and each scope must have a unique name and ID.
WHY USE DHCP SCOPE
• It simplifies the management of IP addresses, as you don't
have to configure them manually on each device.
• It also reduces the risk of IP conflicts, as the DHCP server
ensures that each device gets a unique address.
• It also allows you to change the network settings centrally,
by modifying the scope parameters. For example, you can
change the DNS servers or the gateway without affecting the
devices.
DHCP RESERVATION
• The DHCP reservation functionality empowers the DHCP server to
allocate a dedicated IP address for a specific device within the
network.
• A reservation is based on the MAC address of the device, which is
a unique identifier for its network interface.
• A reserved address is not part of the pool of available addresses,
and it is always assigned to the same device, regardless of the
lease duration.
• A DHCP server can have multiple reservations for different devices
within a scope.
WHY USE DHCP RESERVATION
• It allows you to ensure that a device always has the same IP address,
which can be useful for security, monitoring, or access control
purposes.
• For example, you can use reservation for a printer, a server, a camera,
or a firewall, so that you can always reach them by the same address.
• It also allows you to override the scope parameters for a specific
device, by configuring them individually.
• For example, you can assign a different gateway or DNS server to a
device with a reservation.
DHCP LEASE
• A lease is defined as the time period for which a DHCP server allocates an IP address
to a client. The lease can be extended upon subsequent requests.
• If the client no longer needs the IP address, it can release the address back to the
server before the lease expires. The server is then free to assign this address to a
different client if no other idle IP address is available.
• The lease period configured for a DHCP server applies to all of the IP addresses that a
DHCP server dynamically assigns to its clients.
• A different DHCP server may have a different lease term for its clients. A statically
allocated IP address is not subject to the lease terms.
DHCP LEASE
• A DHCP client does not wait for its lease to expire, because it may be
assigned a different IP address. Instead, when a DHCP client reaches
the halfway point of its lease period, it attempts to extend its lease so
that it retains the same IP address.
ADDRESS POOLS
• An address pool is a set of all the IP addresses that a DHCP server has
reserved for dynamic client allocation.
• Along with each IP address, the server stores certain network
parameters, such as a default lease length for the IP address and other
configuration parameters (for example, a subnet mask and the address
of the default gateway) to be sent to the client when it is assigned that
IP address.
• Address pools are classified into Interface Address Pools and Global
Address Pools.
ADDRESS POOLS
• Interface Address Pool
• After an IP address is configured for an interface on a
DHCP server, you can create an address pool on the same
network segment as this interface.
• Addresses in the address pool can be allocated only to
clients connected to the interface.
• The interface address pool can allocate IP addresses to
clients on the same network segment as the DHCP server.
ADDRESS POOLS
• Global Address Pool
• On a DHCP server, you can create an address pool on the
specified network segment in the system view.
• Addresses in the address pool can be allocated to all
clients connected to the DHCP server, even if the server
and clients are on different network segments.
DYNAMIC DNS
• Dynamic DNS (DDNS) is a method of automatically updating a name
server in the domain name system (DNS), often in real time, with the
active DDNS configuration of its configured hostnames, addresses or
other information.
• The term is used to describe two different concepts.
• The first is "dynamic DNS updating" which refers to systems that are used to
update traditional DNS records without manual editing. these mechanisms
use TSIG to provide security.
• The second kind of dynamic DNS permits lightweight and immediate updates
often using an update client, which do not use the RFC2136 standard for updating
DNS records
DHCP OPTIONS
• Supplying DHCP options is a smart way to configure network clients
during the early phase of network access deployment. In addition to
providing the IP address, the DHCP protocol is able to set a large bunch
of options that are very useful for device configuration.
• Each option has a name and a numerical identifier to be transported in
the protocol frames.
• https://www.incognito.com/tutorials/dhcp-options-in-plain-english/
Domain Name System and Dynamic Host Configuration Protocol.pptx
DOMAIN NAME SYSTEM

More Related Content

Similar to Domain Name System and Dynamic Host Configuration Protocol.pptx (20)

DNS
DNSDNS
DNS
bhavanatmithun
 
Dns
DnsDns
Dns
Sanoj Kumar
 
COMPUTER COMMUNICATION AND NETWORWING LAB - 06.pptx
COMPUTER COMMUNICATION AND NETWORWING LAB - 06.pptxCOMPUTER COMMUNICATION AND NETWORWING LAB - 06.pptx
COMPUTER COMMUNICATION AND NETWORWING LAB - 06.pptx
hafiz18919
 
DNS introduction and exercises covering records
DNS introduction and exercises covering recordsDNS introduction and exercises covering records
DNS introduction and exercises covering records
kinipradeep2
 
DNS
DNSDNS
DNS
HogrGoran
 
Computer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdfComputer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdf
ShanthalaKV
 
Domain Naming Service in computer networks
Domain Naming Service in computer networksDomain Naming Service in computer networks
Domain Naming Service in computer networks
Manjunath852579
 
Intro to DNS
Intro to DNSIntro to DNS
Intro to DNS
ThousandEyes
 
Lecture 5- url-dns
Lecture  5- url-dnsLecture  5- url-dns
Lecture 5- url-dns
Saman M. Almufti
 
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
Presentation on 'The Path to Resolverless DNS'  by Geoff HustonPresentation on 'The Path to Resolverless DNS'  by Geoff Huston
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
APNIC
 
Domain Name System Explained
Domain Name System Explained Domain Name System Explained
Domain Name System Explained
HTS Hosting
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name System
Chinmay Joshi
 
Secure shell (ssh)
Secure shell (ssh)Secure shell (ssh)
Secure shell (ssh)
Ishucs
 
Deploying and configuring dns service
Deploying and configuring dns serviceDeploying and configuring dns service
Deploying and configuring dns service
latoniasmith
 
23rd PITA AGM and Conference: DNS Security - A holistic view
23rd PITA AGM and Conference: DNS Security - A holistic view 23rd PITA AGM and Conference: DNS Security - A holistic view
23rd PITA AGM and Conference: DNS Security - A holistic view
APNIC
 
Domain name system advanced power point presentation
Domain name system advanced power point presentationDomain name system advanced power point presentation
Domain name system advanced power point presentation
rituchouhan1508
 
Chapter4 configuringandmanagingthednsserverrole-140520003253-phpapp01
Chapter4 configuringandmanagingthednsserverrole-140520003253-phpapp01Chapter4 configuringandmanagingthednsserverrole-140520003253-phpapp01
Chapter4 configuringandmanagingthednsserverrole-140520003253-phpapp01
velimamedov
 
IGF 2023: DNS Privacy
IGF 2023: DNS PrivacyIGF 2023: DNS Privacy
IGF 2023: DNS Privacy
APNIC
 
Chapter 4 configuring and managing the dns server role
Chapter 4   configuring and managing the dns server roleChapter 4   configuring and managing the dns server role
Chapter 4 configuring and managing the dns server role
Luis Garay
 
2 technical-dns-workshop-day1
2 technical-dns-workshop-day12 technical-dns-workshop-day1
2 technical-dns-workshop-day1
DNS Entrepreneurship Center
 
COMPUTER COMMUNICATION AND NETWORWING LAB - 06.pptx
COMPUTER COMMUNICATION AND NETWORWING LAB - 06.pptxCOMPUTER COMMUNICATION AND NETWORWING LAB - 06.pptx
COMPUTER COMMUNICATION AND NETWORWING LAB - 06.pptx
hafiz18919
 
DNS introduction and exercises covering records
DNS introduction and exercises covering recordsDNS introduction and exercises covering records
DNS introduction and exercises covering records
kinipradeep2
 
Computer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdfComputer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdf
ShanthalaKV
 
Domain Naming Service in computer networks
Domain Naming Service in computer networksDomain Naming Service in computer networks
Domain Naming Service in computer networks
Manjunath852579
 
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
Presentation on 'The Path to Resolverless DNS'  by Geoff HustonPresentation on 'The Path to Resolverless DNS'  by Geoff Huston
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
APNIC
 
Domain Name System Explained
Domain Name System Explained Domain Name System Explained
Domain Name System Explained
HTS Hosting
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name System
Chinmay Joshi
 
Secure shell (ssh)
Secure shell (ssh)Secure shell (ssh)
Secure shell (ssh)
Ishucs
 
Deploying and configuring dns service
Deploying and configuring dns serviceDeploying and configuring dns service
Deploying and configuring dns service
latoniasmith
 
23rd PITA AGM and Conference: DNS Security - A holistic view
23rd PITA AGM and Conference: DNS Security - A holistic view 23rd PITA AGM and Conference: DNS Security - A holistic view
23rd PITA AGM and Conference: DNS Security - A holistic view
APNIC
 
Domain name system advanced power point presentation
Domain name system advanced power point presentationDomain name system advanced power point presentation
Domain name system advanced power point presentation
rituchouhan1508
 
Chapter4 configuringandmanagingthednsserverrole-140520003253-phpapp01
Chapter4 configuringandmanagingthednsserverrole-140520003253-phpapp01Chapter4 configuringandmanagingthednsserverrole-140520003253-phpapp01
Chapter4 configuringandmanagingthednsserverrole-140520003253-phpapp01
velimamedov
 
IGF 2023: DNS Privacy
IGF 2023: DNS PrivacyIGF 2023: DNS Privacy
IGF 2023: DNS Privacy
APNIC
 
Chapter 4 configuring and managing the dns server role
Chapter 4   configuring and managing the dns server roleChapter 4   configuring and managing the dns server role
Chapter 4 configuring and managing the dns server role
Luis Garay
 

Recently uploaded (20)

Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.
hok12341073
 
Improving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevExImproving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevEx
Justin Reock
 
Evaluation Challenges in Using Generative AI for Science & Technical Content
Evaluation Challenges in Using Generative AI for Science & Technical ContentEvaluation Challenges in Using Generative AI for Science & Technical Content
Evaluation Challenges in Using Generative AI for Science & Technical Content
Paul Groth
 
Agentic AI: Beyond the Buzz- LangGraph Studio V2
Agentic AI: Beyond the Buzz- LangGraph Studio V2Agentic AI: Beyond the Buzz- LangGraph Studio V2
Agentic AI: Beyond the Buzz- LangGraph Studio V2
Shashikant Jagtap
 
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdfBoosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Alkin Tezuysal
 
Your startup on AWS - How to architect and maintain a Lean and Mean account J...
Your startup on AWS - How to architect and maintain a Lean and Mean account J...Your startup on AWS - How to architect and maintain a Lean and Mean account J...
Your startup on AWS - How to architect and maintain a Lean and Mean account J...
angelo60207
 
Palo Alto Networks Cybersecurity Foundation
Palo Alto Networks Cybersecurity FoundationPalo Alto Networks Cybersecurity Foundation
Palo Alto Networks Cybersecurity Foundation
VICTOR MAESTRE RAMIREZ
 
ISOIEC 42005 Revolutionalises AI Impact Assessment.pptx
ISOIEC 42005 Revolutionalises AI Impact Assessment.pptxISOIEC 42005 Revolutionalises AI Impact Assessment.pptx
ISOIEC 42005 Revolutionalises AI Impact Assessment.pptx
AyilurRamnath1
 
How to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptxHow to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptx
Version 1 Analytics
 
Developing Schemas with FME and Excel - Peak of Data & AI 2025
Developing Schemas with FME and Excel - Peak of Data & AI 2025Developing Schemas with FME and Excel - Peak of Data & AI 2025
Developing Schemas with FME and Excel - Peak of Data & AI 2025
Safe Software
 
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
Jasper Oosterveld
 
Extend-Microsoft365-with-Copilot-agents.pptx
Extend-Microsoft365-with-Copilot-agents.pptxExtend-Microsoft365-with-Copilot-agents.pptx
Extend-Microsoft365-with-Copilot-agents.pptx
hoang971
 
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | BluebashMCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
Bluebash
 
Trends Artificial Intelligence - Mary Meeker
Trends Artificial Intelligence - Mary MeekerTrends Artificial Intelligence - Mary Meeker
Trends Artificial Intelligence - Mary Meeker
Clive Dickens
 
Oracle Cloud Infrastructure AI Foundations
Oracle Cloud Infrastructure AI FoundationsOracle Cloud Infrastructure AI Foundations
Oracle Cloud Infrastructure AI Foundations
VICTOR MAESTRE RAMIREZ
 
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOMEstablish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Anchore
 
Azure vs AWS Which Cloud Platform Is Best for Your Business in 2025
Azure vs AWS  Which Cloud Platform Is Best for Your Business in 2025Azure vs AWS  Which Cloud Platform Is Best for Your Business in 2025
Azure vs AWS Which Cloud Platform Is Best for Your Business in 2025
Infrassist Technologies Pvt. Ltd.
 
The case for on-premises AI
The case for on-premises AIThe case for on-premises AI
The case for on-premises AI
Principled Technologies
 
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto CertificateCybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
VICTOR MAESTRE RAMIREZ
 
LSNIF: Locally-Subdivided Neural Intersection Function
LSNIF: Locally-Subdivided Neural Intersection FunctionLSNIF: Locally-Subdivided Neural Intersection Function
LSNIF: Locally-Subdivided Neural Intersection Function
Takahiro Harada
 
Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.
hok12341073
 
Improving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevExImproving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevEx
Justin Reock
 
Evaluation Challenges in Using Generative AI for Science & Technical Content
Evaluation Challenges in Using Generative AI for Science & Technical ContentEvaluation Challenges in Using Generative AI for Science & Technical Content
Evaluation Challenges in Using Generative AI for Science & Technical Content
Paul Groth
 
Agentic AI: Beyond the Buzz- LangGraph Studio V2
Agentic AI: Beyond the Buzz- LangGraph Studio V2Agentic AI: Beyond the Buzz- LangGraph Studio V2
Agentic AI: Beyond the Buzz- LangGraph Studio V2
Shashikant Jagtap
 
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdfBoosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Alkin Tezuysal
 
Your startup on AWS - How to architect and maintain a Lean and Mean account J...
Your startup on AWS - How to architect and maintain a Lean and Mean account J...Your startup on AWS - How to architect and maintain a Lean and Mean account J...
Your startup on AWS - How to architect and maintain a Lean and Mean account J...
angelo60207
 
Palo Alto Networks Cybersecurity Foundation
Palo Alto Networks Cybersecurity FoundationPalo Alto Networks Cybersecurity Foundation
Palo Alto Networks Cybersecurity Foundation
VICTOR MAESTRE RAMIREZ
 
ISOIEC 42005 Revolutionalises AI Impact Assessment.pptx
ISOIEC 42005 Revolutionalises AI Impact Assessment.pptxISOIEC 42005 Revolutionalises AI Impact Assessment.pptx
ISOIEC 42005 Revolutionalises AI Impact Assessment.pptx
AyilurRamnath1
 
How to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptxHow to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptx
Version 1 Analytics
 
Developing Schemas with FME and Excel - Peak of Data & AI 2025
Developing Schemas with FME and Excel - Peak of Data & AI 2025Developing Schemas with FME and Excel - Peak of Data & AI 2025
Developing Schemas with FME and Excel - Peak of Data & AI 2025
Safe Software
 
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
Jasper Oosterveld
 
Extend-Microsoft365-with-Copilot-agents.pptx
Extend-Microsoft365-with-Copilot-agents.pptxExtend-Microsoft365-with-Copilot-agents.pptx
Extend-Microsoft365-with-Copilot-agents.pptx
hoang971
 
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | BluebashMCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
Bluebash
 
Trends Artificial Intelligence - Mary Meeker
Trends Artificial Intelligence - Mary MeekerTrends Artificial Intelligence - Mary Meeker
Trends Artificial Intelligence - Mary Meeker
Clive Dickens
 
Oracle Cloud Infrastructure AI Foundations
Oracle Cloud Infrastructure AI FoundationsOracle Cloud Infrastructure AI Foundations
Oracle Cloud Infrastructure AI Foundations
VICTOR MAESTRE RAMIREZ
 
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOMEstablish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Anchore
 
Azure vs AWS Which Cloud Platform Is Best for Your Business in 2025
Azure vs AWS  Which Cloud Platform Is Best for Your Business in 2025Azure vs AWS  Which Cloud Platform Is Best for Your Business in 2025
Azure vs AWS Which Cloud Platform Is Best for Your Business in 2025
Infrassist Technologies Pvt. Ltd.
 
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto CertificateCybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
VICTOR MAESTRE RAMIREZ
 
LSNIF: Locally-Subdivided Neural Intersection Function
LSNIF: Locally-Subdivided Neural Intersection FunctionLSNIF: Locally-Subdivided Neural Intersection Function
LSNIF: Locally-Subdivided Neural Intersection Function
Takahiro Harada
 
Ad

Domain Name System and Dynamic Host Configuration Protocol.pptx

  • 2. INTRODUCTION • A DNS is a computer server that contains a database of many IP addresses and their associated domain names. • It serves to translate a requested domain name into an IP address, so that the computer knows which DNS address to connect to for the requested contents. • The internet is a network of connected computers, and they communicate with each other through IP addresses. • See a DNS as a phone book, which matches a name to a telephone number. • Also a similar concept to smartphone’s contact list, which will match a contact name to a phone number.
  • 3. WORKING • A DNS starts working immediately after a user enters a domain name in the address bar of a browser. • It will search through the internet to find the IP address that is associated with the entered domain name. • After successfully identifying the IP address, it then guides the user’s browser to connect to it, which will then serve the requested website contents. • The process happens very quickly with little delay and the user will be on his requested website almost immediately. • However, in the background, a DNS has executed many processes.
  • 4. WORKING • The first step that a DNS does is to send a DNS query to several other DNS servers. • A DNS is not just a single server responding to over billions of domain name requests, but instead it is distributed globally across a network of DNS, which stores the IP address directory in a distributed manner.
  • 5. WORKING • If a user is looking for a specific site and there is only one DNS server to process it, then it will take significantly longer to search through the millions of records in the directory. • What if at the same time there are also millions, if not billions of users who are also doing the same? That is going to take a long time, and the users’ browsing experience will definitely be affected negatively. • Therefore, DNS is set up to work collaboratively across several servers to provide the best browsing experience to users.
  • 6. WORKING • When a website address is entered by a user in an internet browser, a DNS query is initiated and a DNS server sends the query to several other DNS servers, each tasked with translating a different part of the domain name the user entered. • There are mainly four servers which work together to translate the website address into a computer readable IP address, namely the DNS resolver server, the root server, the top- level domain (TLD) server and the authoritative name server.
  • 7. WORKING • The DNS resolver is the server who does most of the process in translating a domain name to an IP address. • It receives the DNS query and in turn acts like a client to query the three other DNS servers mentioned above to translate the domain name. • It first queries the root server and the root server responds to the query by returning the IP address of a TLD server (like .Com, .Net, .Org etc.).
  • 8. WORKING • A TLD server stores the information for its domains, and will return the IP address of the authoritative name server to the DNS resolver. • This is where the requested website is actually located. • It then returns the actual IP address of the requested website to the DNS resolver, which in turn response to the initial DNS query the actual IP address.
  • 9. WORKING • Consider point 9 as shown in the illustration. The DNS resolver will perform a caching function to cache the data for a limited time, after it has retrieved the correct IP address for a given website. • The purpose of doing so is that in case the user requests for the same domain name again, it can immediately direct the user to the right web server without having to do the entire process of translating the domain name again. • It is also beneficial in a sense that if there are other users who request for the same domain name, their request can be processed instantly, and they can enjoy a great browsing experience.
  • 10. WORKING • DNS Recursor • The recursor can be thought of as a librarian who is asked to go find a particular book somewhere in a library. The DNS recursor is a server designed to receive queries from client machines through applications such as web browsers. Typically the recursor is then responsible for making additional requests in order to satisfy the client’s DNS query. • Root Nameserver • The root server is the first step in translating (resolving) human readable host names into IP addresses. Typically it serves as a reference to other more specific locations.
  • 11. WORKING • TLD Nameserver • This nameserver is the next step in the search for a specific IP address, and it hosts the last portion of a hostname (in example.com, the TLD server is “com”). • Authoritative Nameserver • The authoritative nameserver is the last stop in the nameserver query. If the authoritative name server has access to the requested record, it will return the IP address for the requested hostname back to the DNS recursor (the librarian) that made the initial request.
  • 12. RECURSIVE DNS RESOLVER • The recursive resolver is the computer that responds to a recursive request from a client and takes the time to track down the DNS record. • It does this by making a series of requests until it reaches the authoritative DNS nameserver for the requested record (or times out or returns an error if no record is found). • Luckily, recursive DNS resolvers do not always need to make multiple requests in order to track down the records needed to respond to a client; caching is a data persistence process that helps short-circuit the necessary requests by serving the requested resource record earlier in the DNS lookup.
  • 14. AUTHORITATIVE DNS SERVER • An authoritative DNS server is a server that actually holds, and is responsible for, DNS resource records. • This is the server at the bottom of the DNS lookup chain that will respond with the queried resource record, ultimately allowing the web browser making the request to reach the IP address needed to access a website or other web resources. • An authoritative nameserver can satisfy queries from its own data without needing to query another source, as it is the final source of truth for certain DNS records.
  • 16. TYPES OF DNS QUERIES • In a typical DNS lookup three types of queries occur. By using a combination of these queries, an optimized process for DNS resolution can result in a reduction of distance traveled. • In an ideal situation cached record data will be available, allowing a DNS name server to return a non-recursive query.
  • 17. TYPES OF DNS QUERIES • Recursive Query • In a recursive query, a DNS client requires that a DNS server (typically a DNS recursive resolver) will respond to the client with either the requested resource record or an error message if the resolver can't find the record.
  • 18. TYPES OF DNS QUERIES • Iterative Query • In this situation the DNS client will allow a DNS server to return the best answer it can. • If the queried DNS server does not have a match for the query name, it will return a referral to a DNS server authoritative for a lower level of the domain namespace. • The DNS client will then make a query to the referral address. • This process continues with additional DNS servers down the query chain until either an error or timeout occurs.
  • 19. TYPES OF DNS QUERIES • Non-recursive Query • Normally this will occur when a DNS resolver client queries a DNS server for a record that it has access to either because it's authoritative for the record or the record exists inside of its cache. • Typically, a DNS server will cache DNS records to prevent additional bandwidth consumption and load on upstream servers.
  • 20. DNS LOOKUP • DNS translates human-readable domain names (google.com) to machine-readable IP addresses (142.251.46.238). • To achieve better scalability, the DNS servers are organized in a hierarchical tree structure.
  • 21. DNS LOOKUP 1. google.com is typed into the browser, and the browser sends the domain name to the DNS resolver. 2. The resolver queries a DNS root name server. 3. The root server responds to the resolver with the address of a TLD DNS server. In this case, it is .Com. 4. The resolver then makes a request to the .Com TLD. 5. The TLD server responds with the IP address of the domain’s name server, google.com (authoritative name server). 6. The DNS resolver sends a query to the domain’s nameserver. 7. The IP address for google.com is then returned to the resolver from the nameserver. 8. The DNS resolver responds to the web browser with the IP address (142.251.46.238) of the domain requested initially. • DNS lookups on average take between 20-120 milliseconds to complete.
  • 22. STATIC & DYNAMIC IP ADDRESS • IP address may be a unique numerical symbol allotted to every device on a network to spot each affiliation clearly. • The distinction between static and dynamic IP address lies inside the length of allotted scientific discipline address. • The static scientific discipline address is fastened scientific discipline address that is manually allotted to a tool for a protracted amount of your time. • On the opposite hand, the dynamic scientific discipline address often changes whenever user boots his/her machine, and it’s mechanically allotted.
  • 23. STATIC & DYNAMIC IP ADDRESS
  • 24. S.NO Static IP Address Dynamic IP address 1. It is provided by ISP (Internet Service Provider). While it is provided by DHCP (Dynamic Host Configuration Protocol). 2. Static IP address does not change any time, it means if a static IP address is provided then it can’t be changed or modified. While dynamic IP address change any time. 3. Static IP address is less secure. While in dynamic IP address, there is low amount of risk than static IP address’s risk. 4. Static IP address is difficult to designate. While dynamic IP address is easy to designate. 5. The device designed by static IP address can be traced. But the device designed by dynamic IP address can’t be traced. 6. Static IP address is more stable than dynamic IP address. While dynamic IP address is less stable than static IP address. 7. The cost to maintain the static IP address is higher than dynamic IP address. While the maintaining cost of dynamic IP address is less than static IP address. 8. It is used where computational data is less confidential. While it is used where data is more confidential and needs more security. 9. Simplifies the troubleshooting as the IP is always the same. While dynamic IP increases the complexity of diagnosing the network issues.
  • 25. DHCP • DHCP stands for Dynamic Host Configuration Protocol. • It is the critical feature on which the users of an enterprise network communicate. • DHCP helps enterprises to smoothly manage the allocation of IP addresses to the end-user clients’ devices such as desktops, laptops, cellphones, etc.
  • 26. COMPONENTS OF DHCP • DHCP Server: DHCP server is basically a server that holds IP addresses and other information related to configuration. • DHCP Client: it is basically a device that receives configuration information from the server. It can be a mobile, laptop, computer, or any other electronic device that requires a connection. • DHCP Relay: DHCP relays basically work as a communication channel between DHCP client and server. • IP Address Pool: it is the pool or container of IP addresses possessed by the DHCP server. It has a range of addresses that can be allocated to devices.
  • 27. COMPONENTS OF DHCP • Subnets: subnets are smaller portions of the IP network partitioned to keep networks under control. • Lease: it is simply the time that how long the information received from the server is valid, in case of expiration of the lease, the tenant must have to re-assign the lease. • DNS Servers: DHCP servers can also provide DNS (domain name system) server information to DHCP clients, allowing them to resolve domain names to IP addresses. • Default Gateway: dhcp servers can also provide information about the default gateway, which is the device that packets are sent to when the destination is outside the local network.
  • 28. COMPONENTS OF DHCP • Options: DHCP servers can provide additional configuration options to clients, such as the subnet mask, domain name, and time server information. • Renewal: DHCP clients can request to renew their lease before it expires to ensure that they continue to have a valid IP address and configuration information. • Failover: DHCP servers can be configured for failover, where two servers work together to provide redundancy and ensure that clients can always obtain an IP address and configuration information, even if one server goes down. • Dynamic Updates: DHCP servers can also be configured to dynamically update DNS records with the IP address of DHCP clients, allowing for easier management of network resources.
  • 29. COMPONENTS OF DHCP • Audit Logging: DHCP servers can keep audit logs of all DHCP transactions, providing administrators with visibility into which devices are using which IP addresses and when leases are being assigned or renewed.
  • 30. DHCP SCOPE • A DHCP scope is a range of IP addresses that a DHCP server can distribute to clients on a specific network segment. • Whenever a DHCP server has to assign an IP Address to a client device, it will randomly choose any available address to the device. • A DHCP server can have multiple scopes for different subnets or VLANS, and each scope must have a unique name and ID.
  • 31. WHY USE DHCP SCOPE • It simplifies the management of IP addresses, as you don't have to configure them manually on each device. • It also reduces the risk of IP conflicts, as the DHCP server ensures that each device gets a unique address. • It also allows you to change the network settings centrally, by modifying the scope parameters. For example, you can change the DNS servers or the gateway without affecting the devices.
  • 32. DHCP RESERVATION • The DHCP reservation functionality empowers the DHCP server to allocate a dedicated IP address for a specific device within the network. • A reservation is based on the MAC address of the device, which is a unique identifier for its network interface. • A reserved address is not part of the pool of available addresses, and it is always assigned to the same device, regardless of the lease duration. • A DHCP server can have multiple reservations for different devices within a scope.
  • 33. WHY USE DHCP RESERVATION • It allows you to ensure that a device always has the same IP address, which can be useful for security, monitoring, or access control purposes. • For example, you can use reservation for a printer, a server, a camera, or a firewall, so that you can always reach them by the same address. • It also allows you to override the scope parameters for a specific device, by configuring them individually. • For example, you can assign a different gateway or DNS server to a device with a reservation.
  • 34. DHCP LEASE • A lease is defined as the time period for which a DHCP server allocates an IP address to a client. The lease can be extended upon subsequent requests. • If the client no longer needs the IP address, it can release the address back to the server before the lease expires. The server is then free to assign this address to a different client if no other idle IP address is available. • The lease period configured for a DHCP server applies to all of the IP addresses that a DHCP server dynamically assigns to its clients. • A different DHCP server may have a different lease term for its clients. A statically allocated IP address is not subject to the lease terms.
  • 35. DHCP LEASE • A DHCP client does not wait for its lease to expire, because it may be assigned a different IP address. Instead, when a DHCP client reaches the halfway point of its lease period, it attempts to extend its lease so that it retains the same IP address.
  • 36. ADDRESS POOLS • An address pool is a set of all the IP addresses that a DHCP server has reserved for dynamic client allocation. • Along with each IP address, the server stores certain network parameters, such as a default lease length for the IP address and other configuration parameters (for example, a subnet mask and the address of the default gateway) to be sent to the client when it is assigned that IP address. • Address pools are classified into Interface Address Pools and Global Address Pools.
  • 37. ADDRESS POOLS • Interface Address Pool • After an IP address is configured for an interface on a DHCP server, you can create an address pool on the same network segment as this interface. • Addresses in the address pool can be allocated only to clients connected to the interface. • The interface address pool can allocate IP addresses to clients on the same network segment as the DHCP server.
  • 38. ADDRESS POOLS • Global Address Pool • On a DHCP server, you can create an address pool on the specified network segment in the system view. • Addresses in the address pool can be allocated to all clients connected to the DHCP server, even if the server and clients are on different network segments.
  • 39. DYNAMIC DNS • Dynamic DNS (DDNS) is a method of automatically updating a name server in the domain name system (DNS), often in real time, with the active DDNS configuration of its configured hostnames, addresses or other information. • The term is used to describe two different concepts. • The first is "dynamic DNS updating" which refers to systems that are used to update traditional DNS records without manual editing. these mechanisms use TSIG to provide security. • The second kind of dynamic DNS permits lightweight and immediate updates often using an update client, which do not use the RFC2136 standard for updating DNS records
  • 40. DHCP OPTIONS • Supplying DHCP options is a smart way to configure network clients during the early phase of network access deployment. In addition to providing the IP address, the DHCP protocol is able to set a large bunch of options that are very useful for device configuration. • Each option has a name and a numerical identifier to be transported in the protocol frames. • https://www.incognito.com/tutorials/dhcp-options-in-plain-english/