SlideShare a Scribd company logo
1 of 10
Ariti Intesli
R sharma
Birthday
• Since your mom already has all the gardening tools, how about something to enhance
her garden experience or something related to gardening that she might not have
thought of getting herself? Here are some ideas:
• Gardening Books: Look for books on specific gardening techniques, plant care, or maybe
even a beautiful coffee table book featuring stunning gardens from around the world.
• Garden Decor: Consider decorative items like garden statues, wind chimes, or outdoor
lanterns to add a touch of charm to her garden.
• Plants or Seeds: If she enjoys planting new things, consider getting her some unique
plants or seeds that she might not have in her garden yet.
• Gardening Apparel: A stylish sun hat, gardening gloves, or a comfortable apron designed
for gardening could be both practical and thoughtful.
• Subscription Boxes: There are subscription boxes specifically curated for gardeners,
offering seeds, tools, and other gardening-related items delivered to her doorstep
Continue
• Garden Journal: A beautiful journal where she can keep track of her
gardening activities, jot down notes, or plan future projects.
• Bird Feeder or Bath: If she enjoys wildlife in her garden, a bird feeder or
bath could be a great addition.
• Outdoor Furniture: Consider a comfortable bench or chair where she can
relax and enjoy her garden.
• Garden Workshop or Class: Look for local workshops or online classes
related to gardening that she might enjoy attending.
• Personalized Items: You could personalize a garden sign, stepping stones,
or even a set of gardening tools with her name or a special message.
xcxcxc
• Flynn's taxonomy is a classification system used in the field of computer architecture to
categorize different types of instruction-level parallelism (ILP) that can be found in a
computer processor. It was proposed by Michael J. Flynn in 1966 and has since been
widely referenced in the design and analysis of computer architectures. Flynn's taxonomy
defines four categories of computer architectures based on the number of instruction
streams and data streams that can be processed concurrently:
• Single Instruction, Single Data (SISD): This is the traditional type of computer
architecture where a single stream of instructions operates on a single stream of data.
Most conventional computers, including early personal computers and mainframes, fall
into this category.
• Single Instruction, Multiple Data (SIMD): In SIMD architectures, a single instruction is
applied to multiple data items simultaneously. This type of architecture is often used in
parallel processing for tasks like multimedia processing, scientific simulations, and certain
types of computations where the same operation is performed on large sets of data in
parallel (e.g., graphics processing units or GPUs).
sakjdhsakj
• DNS stands for Domain Name System. It is a hierarchical and decentralized naming
system for computers, services, or any resource connected to the Internet or a private
network. DNS translates domain names, which are human-readable names like
"example.com," into IP addresses, which are numerical identifiers used by computers to
locate and communicate with each other on a network.
• When you type a domain name into a web browser, your device needs to know the
corresponding IP address to establish a connection with the server hosting that website.
DNS servers are responsible for providing this translation. They store a distributed
database that contains records of domain names and their associated IP addresses,
allowing them to respond to DNS queries and facilitate the routing of network traffic.
• DNS operates through a hierarchical system of domain names, organized into a tree-like
structure. At the top of the hierarchy are the root DNS servers, which are responsible for
directing queries to the appropriate top-level domain (TLD) servers. These TLD servers
manage domain names at the highest level of the DNS hierarchy, such as .com, .org, .net,
and country-code TLDs like .uk, .de, and .jp.
sdsadad
• Below the TLD servers are authoritative DNS servers, which are responsible
for specific domains and subdomains. When a DNS query is made for a
domain name, the request is typically routed from the user's device to a
recursive DNS resolver, which then communicates with the appropriate
authoritative DNS servers to obtain the necessary information.
• In addition to translating domain names into IP addresses, DNS also
supports other types of data records, such as mail exchange (MX) records
for email routing, canonical name (CNAME) records for aliasing one domain
name to another, and more.
• Overall, DNS is a critical component of the Internet's infrastructure,
enabling the seamless resolution of domain names to IP addresses and
playing a fundamental role in the functioning of virtually all online services
and communication.
xcxcx
• The Domain Name System (DNS) works as a distributed database and hierarchical naming
system for translating domain names (e.g., www.example.com) into IP addresses (e.g.,
192.0.2.1) that computers use to communicate with each other over a network, such as
the Internet. Here's a simplified overview of how DNS works:
• DNS Query Initiation: When you enter a domain name into a web browser (e.g.,
www.example.com) or any other application that requires a network connection, your
device initiates a DNS query to resolve the domain name to an IP address.
• Local DNS Cache Check: Your device first checks its local DNS cache to see if it already
has the IP address for the domain name from a previous lookup. If the IP address is
found in the cache and is still valid (i.e., not expired), the DNS resolution process is
complete, and the device can proceed with establishing the network connection.
• Recursive DNS Resolver: If the IP address is not found in the local cache or has expired,
your device sends a DNS query to a recursive DNS resolver, which is typically provided by
your Internet Service Provider (ISP) or configured in your network settings. The recursive
resolver is responsible for finding the IP address on behalf of your device.
cvcxvcx
• Root DNS Servers: If the recursive resolver doesn't have the IP address in its cache, it
starts the resolution process by querying the root DNS servers. These servers are a
crucial part of the DNS infrastructure and maintain information about the authoritative
name servers for all top-level domains (TLDs).
• TLD DNS Servers: Based on the response from the root DNS servers, the recursive
resolver then queries the DNS servers responsible for the appropriate top-level domain
(e.g., .com, .org, .net). These servers provide information about the authoritative name
servers for the domain in question.
• Authoritative DNS Servers: The recursive resolver sends a query to the authoritative
name servers for the specific domain (e.g., example.com). These servers hold the
definitive information about the domain, including its IP address and other DNS records
like MX (Mail Exchange) records for email routing, CNAME (Canonical Name) records for
aliases, etc.
• Response to Recursive Resolver: The authoritative name servers respond to the
recursive resolver with the requested information, including the IP address associated
with the domain name.
dfdgdg
• Response to Device: Finally, the recursive resolver sends the IP
address back to your device, which can now use it to establish a
connection with the server hosting the website or service associated
with the domain name.
• Throughout this process, DNS caching is used at various levels to store
recently resolved DNS records, improving the efficiency of future DNS
queries by reducing the need to repeatedly query authoritative
servers for the same information. DNS operates using the UDP (User
Datagram Protocol) or TCP (Transmission Control Protocol) for
communication between DNS servers and clients, depending on the
type of query and other factors.
• Thanku

More Related Content

Similar to fdssdsdsdsdsdsdsdsdsdsddsdsdssdssss.pptx

Chapter 4 configuring and managing the dns server role
Chapter 4   configuring and managing the dns server roleChapter 4   configuring and managing the dns server role
Chapter 4 configuring and managing the dns server role
Luis Garay
 

Similar to fdssdsdsdsdsdsdsdsdsdsddsdsdssdssss.pptx (20)

Internet Domains
Internet DomainsInternet Domains
Internet Domains
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name System
 
slide on DNS
slide on DNSslide on DNS
slide on DNS
 
Secure shell (ssh)
Secure shell (ssh)Secure shell (ssh)
Secure shell (ssh)
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Dns ppt
Dns pptDns ppt
Dns ppt
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Directory Services Nma Unit-1
Directory Services Nma Unit-1Directory Services Nma Unit-1
Directory Services Nma Unit-1
 
DNS_Presentation.pptx
DNS_Presentation.pptxDNS_Presentation.pptx
DNS_Presentation.pptx
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application Layer.pptx
 
How DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An IntroductionHow DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An Introduction
 
Intro to DNS
Intro to DNSIntro to DNS
Intro to DNS
 
10 - Domain Name System.ppt
10 - Domain Name System.ppt10 - Domain Name System.ppt
10 - Domain Name System.ppt
 
2 technical-dns-workshop-day1
2 technical-dns-workshop-day12 technical-dns-workshop-day1
2 technical-dns-workshop-day1
 
Chapter 4 configuring and managing the dns server role
Chapter 4   configuring and managing the dns server roleChapter 4   configuring and managing the dns server role
Chapter 4 configuring and managing the dns server role
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
DOMAIN NAME SYSTEM.pptx
DOMAIN NAME SYSTEM.pptxDOMAIN NAME SYSTEM.pptx
DOMAIN NAME SYSTEM.pptx
 
Dns1111111111
Dns1111111111Dns1111111111
Dns1111111111
 
Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptx
 
Domain Name System and Dynamic Host Configuration Protocol.pptx
Domain Name System and Dynamic Host Configuration Protocol.pptxDomain Name System and Dynamic Host Configuration Protocol.pptx
Domain Name System and Dynamic Host Configuration Protocol.pptx
 

Recently uploaded

Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
dannyijwest
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
INTERRUPT CONTROLLER 8259 MICROPROCESSOR
INTERRUPT CONTROLLER 8259 MICROPROCESSORINTERRUPT CONTROLLER 8259 MICROPROCESSOR
INTERRUPT CONTROLLER 8259 MICROPROCESSOR
TanishkaHira1
 

Recently uploaded (20)

Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Compressing and Sparsifying LLM in GenAI Applications
Compressing and Sparsifying LLM in GenAI ApplicationsCompressing and Sparsifying LLM in GenAI Applications
Compressing and Sparsifying LLM in GenAI Applications
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
INTERRUPT CONTROLLER 8259 MICROPROCESSOR
INTERRUPT CONTROLLER 8259 MICROPROCESSORINTERRUPT CONTROLLER 8259 MICROPROCESSOR
INTERRUPT CONTROLLER 8259 MICROPROCESSOR
 

fdssdsdsdsdsdsdsdsdsdsddsdsdssdssss.pptx

  • 2. Birthday • Since your mom already has all the gardening tools, how about something to enhance her garden experience or something related to gardening that she might not have thought of getting herself? Here are some ideas: • Gardening Books: Look for books on specific gardening techniques, plant care, or maybe even a beautiful coffee table book featuring stunning gardens from around the world. • Garden Decor: Consider decorative items like garden statues, wind chimes, or outdoor lanterns to add a touch of charm to her garden. • Plants or Seeds: If she enjoys planting new things, consider getting her some unique plants or seeds that she might not have in her garden yet. • Gardening Apparel: A stylish sun hat, gardening gloves, or a comfortable apron designed for gardening could be both practical and thoughtful. • Subscription Boxes: There are subscription boxes specifically curated for gardeners, offering seeds, tools, and other gardening-related items delivered to her doorstep
  • 3. Continue • Garden Journal: A beautiful journal where she can keep track of her gardening activities, jot down notes, or plan future projects. • Bird Feeder or Bath: If she enjoys wildlife in her garden, a bird feeder or bath could be a great addition. • Outdoor Furniture: Consider a comfortable bench or chair where she can relax and enjoy her garden. • Garden Workshop or Class: Look for local workshops or online classes related to gardening that she might enjoy attending. • Personalized Items: You could personalize a garden sign, stepping stones, or even a set of gardening tools with her name or a special message.
  • 4. xcxcxc • Flynn's taxonomy is a classification system used in the field of computer architecture to categorize different types of instruction-level parallelism (ILP) that can be found in a computer processor. It was proposed by Michael J. Flynn in 1966 and has since been widely referenced in the design and analysis of computer architectures. Flynn's taxonomy defines four categories of computer architectures based on the number of instruction streams and data streams that can be processed concurrently: • Single Instruction, Single Data (SISD): This is the traditional type of computer architecture where a single stream of instructions operates on a single stream of data. Most conventional computers, including early personal computers and mainframes, fall into this category. • Single Instruction, Multiple Data (SIMD): In SIMD architectures, a single instruction is applied to multiple data items simultaneously. This type of architecture is often used in parallel processing for tasks like multimedia processing, scientific simulations, and certain types of computations where the same operation is performed on large sets of data in parallel (e.g., graphics processing units or GPUs).
  • 5. sakjdhsakj • DNS stands for Domain Name System. It is a hierarchical and decentralized naming system for computers, services, or any resource connected to the Internet or a private network. DNS translates domain names, which are human-readable names like "example.com," into IP addresses, which are numerical identifiers used by computers to locate and communicate with each other on a network. • When you type a domain name into a web browser, your device needs to know the corresponding IP address to establish a connection with the server hosting that website. DNS servers are responsible for providing this translation. They store a distributed database that contains records of domain names and their associated IP addresses, allowing them to respond to DNS queries and facilitate the routing of network traffic. • DNS operates through a hierarchical system of domain names, organized into a tree-like structure. At the top of the hierarchy are the root DNS servers, which are responsible for directing queries to the appropriate top-level domain (TLD) servers. These TLD servers manage domain names at the highest level of the DNS hierarchy, such as .com, .org, .net, and country-code TLDs like .uk, .de, and .jp.
  • 6. sdsadad • Below the TLD servers are authoritative DNS servers, which are responsible for specific domains and subdomains. When a DNS query is made for a domain name, the request is typically routed from the user's device to a recursive DNS resolver, which then communicates with the appropriate authoritative DNS servers to obtain the necessary information. • In addition to translating domain names into IP addresses, DNS also supports other types of data records, such as mail exchange (MX) records for email routing, canonical name (CNAME) records for aliasing one domain name to another, and more. • Overall, DNS is a critical component of the Internet's infrastructure, enabling the seamless resolution of domain names to IP addresses and playing a fundamental role in the functioning of virtually all online services and communication.
  • 7. xcxcx • The Domain Name System (DNS) works as a distributed database and hierarchical naming system for translating domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that computers use to communicate with each other over a network, such as the Internet. Here's a simplified overview of how DNS works: • DNS Query Initiation: When you enter a domain name into a web browser (e.g., www.example.com) or any other application that requires a network connection, your device initiates a DNS query to resolve the domain name to an IP address. • Local DNS Cache Check: Your device first checks its local DNS cache to see if it already has the IP address for the domain name from a previous lookup. If the IP address is found in the cache and is still valid (i.e., not expired), the DNS resolution process is complete, and the device can proceed with establishing the network connection. • Recursive DNS Resolver: If the IP address is not found in the local cache or has expired, your device sends a DNS query to a recursive DNS resolver, which is typically provided by your Internet Service Provider (ISP) or configured in your network settings. The recursive resolver is responsible for finding the IP address on behalf of your device.
  • 8. cvcxvcx • Root DNS Servers: If the recursive resolver doesn't have the IP address in its cache, it starts the resolution process by querying the root DNS servers. These servers are a crucial part of the DNS infrastructure and maintain information about the authoritative name servers for all top-level domains (TLDs). • TLD DNS Servers: Based on the response from the root DNS servers, the recursive resolver then queries the DNS servers responsible for the appropriate top-level domain (e.g., .com, .org, .net). These servers provide information about the authoritative name servers for the domain in question. • Authoritative DNS Servers: The recursive resolver sends a query to the authoritative name servers for the specific domain (e.g., example.com). These servers hold the definitive information about the domain, including its IP address and other DNS records like MX (Mail Exchange) records for email routing, CNAME (Canonical Name) records for aliases, etc. • Response to Recursive Resolver: The authoritative name servers respond to the recursive resolver with the requested information, including the IP address associated with the domain name.
  • 9. dfdgdg • Response to Device: Finally, the recursive resolver sends the IP address back to your device, which can now use it to establish a connection with the server hosting the website or service associated with the domain name. • Throughout this process, DNS caching is used at various levels to store recently resolved DNS records, improving the efficiency of future DNS queries by reducing the need to repeatedly query authoritative servers for the same information. DNS operates using the UDP (User Datagram Protocol) or TCP (Transmission Control Protocol) for communication between DNS servers and clients, depending on the type of query and other factors.