Explore chapters and articles related to this topic
Domain Naming System
Published in Giovanni Bartolomeo, Tatiana Kováčiková, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web, 2016
Giovanni Bartolomeo, Tatiana Kováčiková
Name servers are part of the distributed DNS database and contain DNS data in forms of resource records (RRs). Each RR has a structure composed of six fields (Figure 2.6). The first field is the name, followed by the record type. The type provides meta-information about the kind of information contained in the record itself. There are different record types, the most common of which are the following: Type A: A host address. This record describes an IPv4 address associated with the DNS name contained in the name field.Type NS: Defines the DNS name of the authoritative name server for the domain described in the name field. This record is used to delegate the administration of a DNS zone to another name server.Type PTR: Used for reverse translation. The value is a domain name whereas the name field is an address.* Type CNAME (canonical name): A synonym of the DNS name contained in the first field.Type SOA (Start of Authority): The record defines the DNS name of the authoritative name server that is authoritative for this particular domain.
High-Performance Switch/Routers
Published in James Aweya, Designing Switch/Routers, 2023
To implement DNS, two principal namespaces are used, the domain namespace (or domain name hierarchy), and the IP (IPv4 and IPv6) address spaces. DNS maintains the domain name hierarchy and various databases, in addition to providing mapping services between domain names and the IP address spaces. A user running a DNS client uses the DNS protocol to interact with DNS name servers to translate domain names into IP addresses. A DNS name server is a server that maintains a database in which DNS records for a domain are stored. Queries are issued to a DNS name server which then replies with answers after checking the queries against its database.
Internet of Things for Structural Health Monitoring
Published in Jayantha Ananda Epaarachchi, Gayan Chanaka Kahandawa, Structural Health Monitoring Technologies and Next-Generation Smart Composite Structures, 2016
Aravinda S. Rao, Jayavardhana Gubbi, Tuan Ngo, Priyan Mendis, Marimuthu Palaniswami
The Internet (“network of networks”) uses unique address to identify the devices connected to the network. Usually we use names, for instance, http://www.google.com to access services from Google. However, devices on the Internet do not understand this language. The machines use Internet Protocol version 4 (IPv4) to resolve the names. A domain name server matches the names with IPv4 address and helps the devices on the Internet to communicate with each other. IPv4 address (32 bit addressing scheme) can handle 232 ≃ 4.3 billion unique devices. Since the inception of the Internet, there are an estimated 3 billion users (refer to Figure 4.12) covering 40% of population, with at least a million users being added per year. Additionally, there are many devices (“objects” or “things”) connected to the Internet A staggering 8.7 billion devices were reported to be connected to the Internet [63], already exceeding the IPv4 limit of 4.3 billion. Because of networking strategies (subnetwork mask), many devices can be connected to the same IP address using Network Address Translator (NAT). However, with IoT devices expected at 50 billion devices by 2020 [63] and unique identifiers to connect to the devices, new addressing schemes are required. ToF handles more number of unique devices, IPv6 standards [62] was proposed, which has the addressing (128-bit) capability of handling 2128 ≃ 3.4 × 1038 addresses. Many devices also have the mechanism to understand both IPv4 and IPv6 addressing, making them to communicate during transition from IPv4 to IPv6. The IoT devices possess low power and ad hoc networking, hence having NAT strategy is not ideal. The future IoT devices are being envisioned to have IPv6 address so that the devices can be uniquely identified.
Generative adversarial networks for network traffic feature generation
Published in International Journal of Computers and Applications, 2023
Tertsegha J. Anande, Sami Al-Saadi, Mark S. Leeson
Cheng [8] modified the Conditional GAN framework to include inverse and conventional Convolutional Neural Network (CNN) architectures to produce the PAC-GAN model. This was implemented to encode and convert individual network traffic packet byte values, represent, and duplicate the converted values for one-to-multi mapping, and further generate network traffic packets for transmission through the internet [8]. The implementation recorded a success rate of 87.7%, averaged over generating, manipulating, and eliciting responses for Internet Control Message Protocol (ICMP) Pings, Domain Name Server (DNS) queries and Hyper Text Transfer Protocol (HTTP) get requests at the Internet Protocol (IP) individual packet byte level [8]. Although this was the first successful attempt at generating network traffic data above metadata/flow-level, it was not possible to generate multi-serial packets from varied network traffic data types. In this approach, network traffic data were first converted into 28 × 28 square matrices and encoded before being fed as input into the PAC-GAN model for training.
Cloud Computing Risk: A Decision-making Framework
Published in Journal of Computer Information Systems, 2023
Cloudflare provides web-infrastructure, content-delivery network, DDoS mitigation, Internet security and domain name server services. 21 In March 2013, Cloudflare’s servers were down for close to one hour due to crashing of their edge routers, taking down 785,000 websites.48 Similarly, on August 31, 2019, an AWS datacenter in North Virginia experienced a power failure. Additionally, their backup generators failed, taking down several servers along with their data.49 While technical outages and server downtime cannot be predicted, and are difficult to avoid, in their SLA, Cloudflare promises to deliver “100% Uptime.”36, 37 On their part, Amazon’s terms and conditions specify that Amazon is “not liable for any damages, liabilities, or losses, such as corruption, deletion or loss of data, applications or profits.” 49 This means that even with data and applications managed by cloud providers, there remains that need to have a backup/contingency plan for when – not if – there is a technical outage at the cloud servers.
Intelligent information flow management system in innovative scientific and industrial clusters
Published in International Journal of Parallel, Emergent and Distributed Systems, 2022
Artur Zaenchkovski, Alexey Lazarev, Dmitrii Tukaev, Victor Epifanov
In connection with identified problem areas in the implementation of information exchange between individual participants in scientific and industrial clusters, a neural network modelling system for the redistribution of network packets based on the IPv6 network protocol, which is a 64-bit identifier EUI-64, was developed [9]. The proposed system will allow, within the existing networks of devices interaction using standard IPv4 protocols, to exchange on the principles of the IPv6 protocol, which will directly affect the security level of such exchange. Based on the fact that the IPv6 protocol is optional when it is used on various platforms, the implemented multiplatform system includes a client–server component, one of which modules is the domain name server (DNS) [10, 11]. The proposed system provides a flexible client authentication system due to a two-way DHCP authentication server, a dynamic IPv6 address update system module is implemented that replaces the current address based on offline sequence synchronisation algorithms.