SlideShare a Scribd company logo
Internet Domains
The Domain Name System
The Domain Name Service
The Domain Name Space
DNS
Internet host name
Internet domain names are hierarchical in nature, that is, they have a tree-like structure.
A `domain' is a family, or group of names.
A `domain' may be broken down into `subdomain'.
A `toplevel domain' is a domain that is not a subdomain.
The Top Level Domains are specified in RFC-920.
.COM Commercial Organisations
.EDU Educational Organisations
.GOV Government Organisations
.MIL Military Organisations
.ORG Other organisations
.NET Network
Country Designator are two letters codes that represent a particular country.
 Each top level domain has subdomains.
 The top level domains based on country name are broken down
into subdomains, so for example you end up with: .ac.uk, .co.uk.
 The next level of division usually represents the name of the
organisation: .brad.ac.uk, .theinternetwebshop.co.uk
 Often the next level of subdomain is based on the departmental
structure of the organisation but it may be based on any criterion
considered reasonable and meaningful by the network
administrators for the organisation: .eesf.brad.ac.uk,
.eimc.brad.ac.uk
 The very left-most portion of the name is always the unique
name assigned to the host machine and is called the
`hostname', the portion of the name to the right of the hostname
is called the `domainname' and the complete name is called the
`Fully Qualified Domain Name‘: www.inf.brad.ac.uk
Internet Corporation for Assigned Names and Numbers (ICANN)
http://www.icann.com/
What Does ICANN Do?
To reach another person on the Internet you have to type an address into your computer --
a name or a number.
That address must be unique so computers know where to find each other. ICANN
coordinates these unique identifiers across the world. Without that coordination, we
wouldn't have one global Internet.
www.internic.net:
 The InterNIC® web site is a public information resource for Internet users
worldwide.
 It provides information on the domain-name system, the domain-name
registration process, and domain-name registrars.
 To access information regarding registered domains, go to the Registry Whois.
 For Whois information about country-code (two-letter) top-level domains, try
Uwhois.com.
 http://www.whois.net/
 http://www.betterwhois.com/
 http://www.nic.uk/
 Nominet UK is the registry for .uk internet names.
 Manages the authoritative database of .uk domain name registrations.
 A not-for-profit company - has members instead of shareholders.
 Nominet is officially recognised as the .uk domain name registry by the internet
industry, users and the UK Government.
DNS
 You will need to know what domain your hosts name
will belong to. Eg .eimc.brad.ac.uk
 The name resolver software provides this name
translation service by making requests to a `Domain
Name Server', so you will need to know the IP address
of a local nameserver that you can use. Eg.
143.53.238.5
 The Domain Name Server converts machine names to
IP addresses, so allowing messages to pass between
machines in a format they understand.
http://en.wikipedia.org/wiki/Dns
/var/named/eesf.zon
;This file is used to resolve hostnames to IP addresses. The origin
refers to the eesf.brad.ac.uk domain
; nameservers for eesf.brad.ac.uk domain
IN NS d4bs.eesf.brad.ac.uk.
$ORIGIN eesf.brad.ac.uk.
d4bs IN A 143.53.138.20
dforbes IN A 143.53.138.10
; services
$ORIGIN eesf.brad.ac.uk.
ftp CNAME d4bs.eesf.brad.ac.uk.
www CNAME d4bs.eesf.brad.ac.uk.
Domain Name System
 http://en.wikipedia.org/wiki/Domain_Name_System
 Paul Mockapetris invented the DNS in 1983. The Domain Name System or DNS
is a system that stores information about Internet host names and domain names.
 It provides an IP address for each host name, and lists the mail exchange servers
accepting e-mail for each domain.
 Originally, each computer on the network retrieved a file called HOSTS.TXT
from SRI - Stanford Research Institute(now SRI International), which mapped
an address to a name.
The system had inherent limitations, because every time a given computer's
address changed, every single system that wanted to communicate with that
computer would need an update to its Hosts file.
The host file is located in the following directories for each operating system:
 Linux and other Unix related operating systems - /etc
 Windows 95/Windows 98/Windows Me - C:windows
 Windows 2000/Windows XP - %SystemRoot%system32driversetc
 Windows NT - C:winntsystem32driversetc
 Mac OS - System Folder:Preferences or System Folder (Format of the file
may vary from Windows and Linux counterparts)
 Blocking ads on the Internet with a list of ad server hostnames and IP
addresses (http://pgl.yoyo.org/adservers/index.php)
Ad filtering: One useful ability of the host file is that it is capable of ad
filtering. This is accomplished by adding a line to the file that contains
127.0.0.1 (home IP) or 0.0.0.0 (no IP). That way, when a internet capable
program attempts to access the IP of an advertiser the ad is prevented
from appearing. For example, if you wanted to block Doubleclick ads, you
could add the following to your host file:
127.0.0.1 ad.doubleclick.net
How the DNS works in theory
The practical operation of the DNS system consists of three parts:
* The DNS resolver, a DNS client program which runs on a user's computer, and which
generates DNS requests on behalf of software programs;
* The recursive DNS server, which searches through the DNS in response to queries
from resolvers, and returns answers to those resolvers;
* The authoritative DNS server which hands out answers to queries from recursors,
either in the form of an answer, or in the form of a delegation (i.e. referral to another
authoritative DNS server).
 The DNS consists of a hierarchical set of DNS servers.
 Each domain or subdomain has one or more authoritative DNS servers that publish
information about that domain and the name servers of any domains "beneath" it.
 The hierarchy of authoritative DNS servers matches the hierarchy of domains.
 At the top of the hierarchy stand the root servers: the servers to query when looking up
(resolving) a top-level domain name.
DNS recursion
 http://en.wikipedia.org/wiki/Domain_Name_System
 * The process starts by the recursor asking one of these root servers - for example, the
server with the IP address "198.41.0.4" - the question "what is the IP address for
www.wikipedia.org?"
 * The root server replies with a delegation, meaning roughly: "I don't know the IP
address of www.wikipedia.org, but I do know that the DNS server at 204.74.112.1 has
information on the org domain."
 * The local DNS recursor then asks that DNS server (i.e. 204.74.112.1) the same
question it had previously put to the root servers, i.e. "what is the IP address for
www.wikipedia.org?". It gets a similar reply - essentially, "I don't know the address of
www.wikipedia.org, but I do know that the DNS server at 207.142.131.234 has
information on the wikipedia.org domain."
 * Finally the request goes to this third DNS server (207.142.131.234), which replies
with the required IP address.
 This process utilises recursive searching.
Root nameserver
http://en.wikipedia.org/wiki/Root_nameserver
 A root nameserver is a DNS server that answers requests for the root namespace domain,
and redirects requests for a particular top-level domain to that TLD's nameservers.
 All domain names on the Internet actually end in a . (period) character -- that is,
technically, Wikipedia is actually hosted on the domain "www.wikipedia.org." (try it.)
 This final dot is implied, and all modern DNS software does not actually require that the
final dot be included when attempting to translate a domain name to an IP address.
 The empty string after the final dot is called the root domain, and all other domains
(i.e. .com, .org, .net, .uk, etc.) are contained within the root domain.
 There are currently 13 root name servers, with names in the form
letter.root-servers.net where letter ranges from A to M:
Letter Old name Operator Location
A ns.internic.net VeriSign Dulles, VA
B ns1.isi.edu ISI Marina Del Rey, CA
C c.psi.net Cogent (http://www.cogent.com/) Herndon, VA
D terp.umd.edu University of Maryland College Park, MD
E ns.nasa.gov NASA Mountain View, CA
F ns.isc.org ISC (http://www.isc.org/) Palo Alto, CA
G ns.nic.ddn.mil U.S. DoD NIC Vienna, VA
H aos.arl.army.mil U.S. Army Research Lab Aberdeen, MD
I nic.nordu.net Autonomica (http://www.autonomica.se/) Stockholm
J VeriSign Dulles, VA
K RIPE London
L ICANN Los Angeles
M WIDE Project Tokyo
 the C, F, I, J and K servers exist in multiple locations on different continents
 There are quite a few alternate namespace systems with their own set of root
nameservers that exist in opposition to the mainstream nameservers.
Alternate DNS root
http://en.wikipedia.org/wiki/Alternate_DNS_root
 In addition to the Internet's main DNS root (currently consisting of 13 nominal root nameservers
working in agreement with ICANN), several organizations operate alternate DNS roots (often
referred to as alt roots).
 Each alternate root has its own set of root nameservers and its own set of top-level domains.
Legal users of domains
 No one in the world really "owns" a domain name except the Network Information Centre (NIC),
or domain name registry.
 Most of the NICs in the world receive an annual fee from a legal user in order for the legal user to
utilise the domain name (i.e. a sort of a leasing agreement exists, subject to the registry's terms and
conditions).
 Depending on the various naming convention of the registries, legal users become commonly
known as "registrants" or as "domain holders".
 ICANN holds a complete list of domain registries in the world.
 One can find the legal user of a domain name by looking in the WHOIS database held by most
domain registries.
Tools to hack DNS
 YoLinux: List of Linux Security and Hacker Software Tools
http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html
 Unix tools track hackers
http://insight.zdnet.co.uk/hardware/servers/0,39020445,2123102,00.htm
http://www.antihackertoolkit.com/tools.html
 For DNS lookups use -
'dig' (domain information groper) or
host -a 143.53.29.129 ns2.splice1.com or
nslookup Note: nslookup is deprecated and may be removed from future releases.
or
http://www.dns.net/dnsrd/tools.html
C:>nslookup 143.53.29.129 ns1.splice1.com
Server: server4.splice1.com
Address: 66.45.242.178
Name: d209.inf.brad.ac.uk
Address: 143.53.29.129
Where is the site hosted?
traceroute/tracert
Is the site on-line?
ping
Is there a back door or way in?
nmap
How is the network routing configured?
netstat -r
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
143.53.28.0 * 255.255.255.0 U 0 0 0 eth1
169.254.0.0 * 255.255.0.0 U 0 0 0 eth1
127.0.0.0 * 255.0.0.0 U 0 0 0 lo
default Skipton.cen.bra 0.0.0.0 UG 0 0 0 eth1
How are the network cards configured?
ifconfig/ipconfig
http://www.networksecuritytoolkit.org/nst/index.html
What Is a Mail Message?
 A mail message generally consists of
 a message body, which is the text of the
message,
 and special administrative data specifying
recipients, transport medium, etc., as you see
when you look at an envelope of a real letter.
A typical mail header may look like this:
Return-Path: <ph10@cus.cam.ac.uk>
Received: ursa.cus.cam.ac.uk (cusexim@ursa.cus.cam.ac.uk [131.111.8.6]) by
al.animats.net (8.9.3/8.9.3/Debian 8.9.3-6) with ESMTP id WAA04654 for
<terry@animats.net>; Sun, 30 Jan 2000 22:30:01 +1100
Received: from ph10 (helo=localhost) by ursa.cus.cam.ac.uk with local-smtp
(Exim 3.13 #1) id 12EsYC-0001eF-00; Sun, 30 Jan 2000 11:29:52 +0000
Date: Sun, 30 Jan 2000 11:29:52 +0000 (GMT)
From: Philip Hazel <ph10@cus.cam.ac.uk>
Reply-To: Philip Hazel <ph10@cus.cam.ac.uk>
To: Terry Dawson <terry@animats.net>, Andy Oram <andyo@oreilly.com>
Subject: Electronic mail chapter
In-Reply-To: <38921283.A58948F2@animats.net>
Message-ID: <Pine.SOL.3.96.1000130111515.5800A-
200000@ursa.cus.cam.ac.uk>
This list is a collection of common header fields
From: This contains the sender's email address and possibly the “real name.” A
complete zoo of formats is used here.
To: This is a list of recipient email addresses. Multiple recipient addresses are
separated by a comma.
Cc: This is a list of email addresses that will receive “carbon copies” of the
message. Multiple recipient addresses are separated by a comma.
Bcc: This is a list of email addresses that will receive “carbon copies” of the
message. The key difference between a “Cc:” and a “Bcc:” is that the
addresses listed in a “Bcc:” will not appear in the header of the mail
messages delivered to any recipient. It's a way of alerting recipients that
you've sent copies of the message to other people without telling them who
those others are. Multiple recipient addresses are separated by a comma.
Subject: Describes the content of the mail in a few words.
Reply-To: Specifies the address the sender wants the recipient's reply directed to.
This may be useful if you have several accounts, but want to receive the bulk
of mail only on the one you use most frequently. This field is optional.
How Is Mail Delivered?
 Generally, you will compose mail using a mailer interface like pine.
 These programs are called mail user agents, or MUAs. If you send a mail
message, the interface program will in most cases hand it to
another program for delivery. This is called the mail transport agent,
or MTA. On most systems the same MTA is used for both local and
remote delivery and is usually invoked as a program such as
sendmail.

 Local delivery of mail is, of course, more than just appending the incoming
message to the recipient's mailbox. Usually, the local MTA
understands aliasing (setting up local recipient addresses pointing
to other addresses) and forwarding (redirecting a user's mail to
some other destination). Also, messages that cannot be delivered
must usually be bounced, that is, returned to the sender along with
some error message.
 Mail delivered over a network using TCP/IP, commonly
uses Simple Mail Transfer Protocol (SMTP).
 SMTP was designed to deliver mail directly to a
recipient's machine, negotiating the message transfer
with the remote side's SMTP daemon.
 Today it is common practice for organizations to
establish special hosts that accept all mail for
recipients in the organization and for that host to
manage appropriate delivery to the intended recipient.
Email Addresses
 Email addresses are made up of at least two parts.
 One part is the name of a mail domain that will ultimately
translate to either the recipient's host or some host that accepts
mail on behalf of the recipient.
 The other part is some form of unique user identification that
may be the login name of that user, the real name of that user in
“Firstname.Lastname” format, or an arbitrary alias that will be
translated into a user or list of users.
 Internet sites adhere to the RFC-822 standard, which requires
the familiar notation of user@host.domain, for which
host.domain is the host's fully qualified domain name. The
character separating the two is properly called a “commercial at”
sign, but it helps if you read it as “at.”
How Does Mail Routing Work?
 The process of directing a message to the
recipient's host is called routing .
 Apart from finding a path from the sending site
to the destination, it involves error checking and
may involve speed and cost optimization.
Mail Routing on the Internet
 On the Internet, the destination host's configuration determines
whether any specific mail routing is performed.
 The default is to deliver the message to the destination by first
determining what host the message should be sent to, and then
delivering it directly to that host.
 Most Internet sites want to direct all inbound mail to a highly
available mail server that is capable of handling all this traffic
and have it distribute the mail locally.
 The Mail Exchanger is a machine that states that it is willing to
act as a mail forwarder for all mail addresses in the domain.

More Related Content

What's hot

DOMAIN NAME
DOMAIN NAMEDOMAIN NAME
DOMAIN NAME
Libcorpio
 
WWW or World Wide Web
WWW or World Wide WebWWW or World Wide Web
WWW or World Wide Web
Saransh Arora
 
The internet
The internetThe internet
The internet
Kumod Shirkande
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
Stacksol
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
uniform resource locator
uniform resource locatoruniform resource locator
uniform resource locator
rajshreemuthiah
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 
World wide web architecture presentation
World wide web architecture presentationWorld wide web architecture presentation
World wide web architecture presentationImMe Khan
 
Introduction to Web Technology
Introduction to Web TechnologyIntroduction to Web Technology
Introduction to Web Technology
Aashish Jain
 
Presentation on World Wide Web (WWW)
Presentation on World Wide Web (WWW)Presentation on World Wide Web (WWW)
Presentation on World Wide Web (WWW)
Mohak Jain
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
Latif Hyder Wadho
 
Web browser architecture
Web browser architectureWeb browser architecture
Web browser architecture
Nguyen Quang
 
World wide web ppt
World wide web pptWorld wide web ppt
World wide web ppt
Pijush Kanti Das
 
WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & Webpage
Zeeshan Alam
 
Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
Jaya Kamnani
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
Muhammad Hammad Waseem
 
System software
System softwareSystem software
System software
Harsha Sachdeva
 
Internet
InternetInternet
Internet
Harjot Singh
 

What's hot (20)

DOMAIN NAME
DOMAIN NAMEDOMAIN NAME
DOMAIN NAME
 
WWW or World Wide Web
WWW or World Wide WebWWW or World Wide Web
WWW or World Wide Web
 
The internet
The internetThe internet
The internet
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
uniform resource locator
uniform resource locatoruniform resource locator
uniform resource locator
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
World wide web architecture presentation
World wide web architecture presentationWorld wide web architecture presentation
World wide web architecture presentation
 
Introduction to Web Technology
Introduction to Web TechnologyIntroduction to Web Technology
Introduction to Web Technology
 
Presentation on World Wide Web (WWW)
Presentation on World Wide Web (WWW)Presentation on World Wide Web (WWW)
Presentation on World Wide Web (WWW)
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Web browser architecture
Web browser architectureWeb browser architecture
Web browser architecture
 
World wide web ppt
World wide web pptWorld wide web ppt
World wide web ppt
 
WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & Webpage
 
Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
System software
System softwareSystem software
System software
 
Internet
InternetInternet
Internet
 
Web browser
Web browserWeb browser
Web browser
 

Viewers also liked

Sharing information with MediaWiki
Sharing information with MediaWikiSharing information with MediaWiki
Sharing information with MediaWiki
Geert Van Pamel
 
ICT Pristine Project Overview
ICT Pristine Project OverviewICT Pristine Project Overview
ICT Pristine Project Overview
ICT PRISTINE
 
SMA Sunny Island Off Grid Solutions.
SMA Sunny Island  Off Grid Solutions. SMA Sunny Island  Off Grid Solutions.
SMA Sunny Island Off Grid Solutions.
Optimus Energy Philippines
 
Corey Eridon - 18 Hard-Earned Lessons from the Trenches of the HubSpot Blog
Corey Eridon - 18 Hard-Earned Lessons from the Trenches of the HubSpot BlogCorey Eridon - 18 Hard-Earned Lessons from the Trenches of the HubSpot Blog
Corey Eridon - 18 Hard-Earned Lessons from the Trenches of the HubSpot Blog
INBOUND
 
Conférence Minergie, Séminaire Energie&Bâtiments 2015: Standard SNBS
Conférence Minergie, Séminaire Energie&Bâtiments 2015: Standard SNBSConférence Minergie, Séminaire Energie&Bâtiments 2015: Standard SNBS
Conférence Minergie, Séminaire Energie&Bâtiments 2015: Standard SNBS
minergie-romande
 
Análisis Audiencia Gran Hermano abril'12 canarias
Análisis Audiencia Gran Hermano abril'12 canariasAnálisis Audiencia Gran Hermano abril'12 canarias
Análisis Audiencia Gran Hermano abril'12 canariasAngel Quintana
 
07 estenosis aortica
07   estenosis aortica07   estenosis aortica
07 estenosis aortica
Mocte Salaiza
 
M O D U L O A U D A C I T Y
M O D U L O  A U D A C I T YM O D U L O  A U D A C I T Y
M O D U L O A U D A C I T Y
Martin M
 
Cicle els orgues de catalunya 2010
Cicle els orgues de catalunya 2010Cicle els orgues de catalunya 2010
Cicle els orgues de catalunya 2010Apuntador
 
Corporate Social Media by SocialCraft
Corporate Social Media by SocialCraftCorporate Social Media by SocialCraft
Corporate Social Media by SocialCraft
Sergey Dolgov
 
Blas Infante 2006-2007
Blas Infante 2006-2007Blas Infante 2006-2007
Blas Infante 2006-2007
Juan Garcia Moreno
 
Curso De Ingles Nivel Alto
Curso De Ingles Nivel AltoCurso De Ingles Nivel Alto
Curso De Ingles Nivel Alto
guestc8b7cf
 
Patologías del pulmón
Patologías del pulmónPatologías del pulmón
Patologías del pulmón
Kerem Rubio
 
Reglamento iii torneo nacional de tochito nfl conade-2015
Reglamento iii torneo nacional de tochito nfl   conade-2015   Reglamento iii torneo nacional de tochito nfl   conade-2015
Reglamento iii torneo nacional de tochito nfl conade-2015
hugomedina36
 

Viewers also liked (20)

Sharing information with MediaWiki
Sharing information with MediaWikiSharing information with MediaWiki
Sharing information with MediaWiki
 
Seleccion2011
Seleccion2011Seleccion2011
Seleccion2011
 
Qué es google forms
Qué es google formsQué es google forms
Qué es google forms
 
A Guide To Finding Your Cloud Power
A Guide To Finding Your Cloud PowerA Guide To Finding Your Cloud Power
A Guide To Finding Your Cloud Power
 
ICT Pristine Project Overview
ICT Pristine Project OverviewICT Pristine Project Overview
ICT Pristine Project Overview
 
SMA Sunny Island Off Grid Solutions.
SMA Sunny Island  Off Grid Solutions. SMA Sunny Island  Off Grid Solutions.
SMA Sunny Island Off Grid Solutions.
 
Corey Eridon - 18 Hard-Earned Lessons from the Trenches of the HubSpot Blog
Corey Eridon - 18 Hard-Earned Lessons from the Trenches of the HubSpot BlogCorey Eridon - 18 Hard-Earned Lessons from the Trenches of the HubSpot Blog
Corey Eridon - 18 Hard-Earned Lessons from the Trenches of the HubSpot Blog
 
Conférence Minergie, Séminaire Energie&Bâtiments 2015: Standard SNBS
Conférence Minergie, Séminaire Energie&Bâtiments 2015: Standard SNBSConférence Minergie, Séminaire Energie&Bâtiments 2015: Standard SNBS
Conférence Minergie, Séminaire Energie&Bâtiments 2015: Standard SNBS
 
GovData, the first nine months (2nd international open data dialog 11/2013)
GovData, the first nine months (2nd international open data dialog 11/2013)GovData, the first nine months (2nd international open data dialog 11/2013)
GovData, the first nine months (2nd international open data dialog 11/2013)
 
Maki
MakiMaki
Maki
 
Análisis Audiencia Gran Hermano abril'12 canarias
Análisis Audiencia Gran Hermano abril'12 canariasAnálisis Audiencia Gran Hermano abril'12 canarias
Análisis Audiencia Gran Hermano abril'12 canarias
 
07 estenosis aortica
07   estenosis aortica07   estenosis aortica
07 estenosis aortica
 
M O D U L O A U D A C I T Y
M O D U L O  A U D A C I T YM O D U L O  A U D A C I T Y
M O D U L O A U D A C I T Y
 
Cicle els orgues de catalunya 2010
Cicle els orgues de catalunya 2010Cicle els orgues de catalunya 2010
Cicle els orgues de catalunya 2010
 
Corporate Social Media by SocialCraft
Corporate Social Media by SocialCraftCorporate Social Media by SocialCraft
Corporate Social Media by SocialCraft
 
Blas Infante 2006-2007
Blas Infante 2006-2007Blas Infante 2006-2007
Blas Infante 2006-2007
 
Inmobiliaria casas del Quindio
Inmobiliaria casas del QuindioInmobiliaria casas del Quindio
Inmobiliaria casas del Quindio
 
Curso De Ingles Nivel Alto
Curso De Ingles Nivel AltoCurso De Ingles Nivel Alto
Curso De Ingles Nivel Alto
 
Patologías del pulmón
Patologías del pulmónPatologías del pulmón
Patologías del pulmón
 
Reglamento iii torneo nacional de tochito nfl conade-2015
Reglamento iii torneo nacional de tochito nfl   conade-2015   Reglamento iii torneo nacional de tochito nfl   conade-2015
Reglamento iii torneo nacional de tochito nfl conade-2015
 

Similar to Internet Domains

Internet Host Name
Internet Host NameInternet Host Name
Internet Host Name
adil raja
 
Domain name system
Domain name systemDomain name system
Domain name system
lehri_rasheeda
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
MSharmilaDeviITDEPT
 
Lecture 5- url-dns
Lecture  5- url-dnsLecture  5- url-dns
Lecture 5- url-dns
Saman M. Almufti
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
Akshay Tiwari
 
Chapter 10 Domain Name Systems_MWSA.pptx
Chapter 10 Domain Name Systems_MWSA.pptxChapter 10 Domain Name Systems_MWSA.pptx
Chapter 10 Domain Name Systems_MWSA.pptx
manju772238
 
DNS ( Domain Name System)
DNS ( Domain Name System)DNS ( Domain Name System)
DNS ( Domain Name System)
Prakhar Rastogi
 
Internet dns introduction
Internet dns introductionInternet dns introduction
Internet dns introduction
Bogdan Chiribau
 
Domain Name Hierarchy
Domain Name HierarchyDomain Name Hierarchy
Domain Name Hierarchy
gordond312
 
Linux basics andng hosti
Linux basics andng hostiLinux basics andng hosti
Linux basics andng hosti
Patruni Chidananda Sastry
 
DNS(In_Linux).pptx
DNS(In_Linux).pptxDNS(In_Linux).pptx
DNS(In_Linux).pptx
ShanmugapriyaSenthil3
 
Dns
DnsDns
Week3 lec 2
Week3 lec 2Week3 lec 2
Week3 lec 2
syedhaiderraza
 
Domain & Shared hosting
Domain & Shared hostingDomain & Shared hosting
Domain & Shared hostingjisha-varkey
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
Serious_SamSoul
 

Similar to Internet Domains (20)

Internet Host Name
Internet Host NameInternet Host Name
Internet Host Name
 
Domain name system
Domain name systemDomain name system
Domain name system
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
Dns And Snmp
Dns And SnmpDns And Snmp
Dns And Snmp
 
Lecture 5- url-dns
Lecture  5- url-dnsLecture  5- url-dns
Lecture 5- url-dns
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
 
Chapter 10 Domain Name Systems_MWSA.pptx
Chapter 10 Domain Name Systems_MWSA.pptxChapter 10 Domain Name Systems_MWSA.pptx
Chapter 10 Domain Name Systems_MWSA.pptx
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
domain
domaindomain
domain
 
Domain name system
Domain name systemDomain name system
Domain name system
 
DNS ( Domain Name System)
DNS ( Domain Name System)DNS ( Domain Name System)
DNS ( Domain Name System)
 
Internet dns introduction
Internet dns introductionInternet dns introduction
Internet dns introduction
 
Domain Name Hierarchy
Domain Name HierarchyDomain Name Hierarchy
Domain Name Hierarchy
 
Linux basics andng hosti
Linux basics andng hostiLinux basics andng hosti
Linux basics andng hosti
 
DNS(In_Linux).pptx
DNS(In_Linux).pptxDNS(In_Linux).pptx
DNS(In_Linux).pptx
 
Dns
DnsDns
Dns
 
Week3 lec 2
Week3 lec 2Week3 lec 2
Week3 lec 2
 
Domain & Shared hosting
Domain & Shared hostingDomain & Shared hosting
Domain & Shared hosting
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 

More from adil raja

ANNs.pdf
ANNs.pdfANNs.pdf
ANNs.pdf
adil raja
 
A Software Requirements Specification
A Software Requirements SpecificationA Software Requirements Specification
A Software Requirements Specification
adil raja
 
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial VehiclesNUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
adil raja
 
DevOps Demystified
DevOps DemystifiedDevOps Demystified
DevOps Demystified
adil raja
 
On Research (And Development)
On Research (And Development)On Research (And Development)
On Research (And Development)
adil raja
 
Simulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge ResearchSimulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge Research
adil raja
 
The Knock Knock Protocol
The Knock Knock ProtocolThe Knock Knock Protocol
The Knock Knock Protocol
adil raja
 
File Transfer Through Sockets
File Transfer Through SocketsFile Transfer Through Sockets
File Transfer Through Sockets
adil raja
 
Remote Command Execution
Remote Command ExecutionRemote Command Execution
Remote Command Execution
adil raja
 
CMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor PakistanCMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor Pakistan
adil raja
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
adil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
adil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
adil raja
 
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPReal-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
adil raja
 
VoIP
VoIPVoIP
VoIP
adil raja
 
ULMAN GUI Specifications
ULMAN GUI SpecificationsULMAN GUI Specifications
ULMAN GUI Specifications
adil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
adil raja
 
ULMAN-GUI
ULMAN-GUIULMAN-GUI
ULMAN-GUI
adil raja
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
adil raja
 

More from adil raja (20)

ANNs.pdf
ANNs.pdfANNs.pdf
ANNs.pdf
 
A Software Requirements Specification
A Software Requirements SpecificationA Software Requirements Specification
A Software Requirements Specification
 
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial VehiclesNUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
 
DevOps Demystified
DevOps DemystifiedDevOps Demystified
DevOps Demystified
 
On Research (And Development)
On Research (And Development)On Research (And Development)
On Research (And Development)
 
Simulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge ResearchSimulators as Drivers of Cutting Edge Research
Simulators as Drivers of Cutting Edge Research
 
The Knock Knock Protocol
The Knock Knock ProtocolThe Knock Knock Protocol
The Knock Knock Protocol
 
File Transfer Through Sockets
File Transfer Through SocketsFile Transfer Through Sockets
File Transfer Through Sockets
 
Remote Command Execution
Remote Command ExecutionRemote Command Execution
Remote Command Execution
 
Thesis
ThesisThesis
Thesis
 
CMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor PakistanCMM Level 3 Assessment of Xavor Pakistan
CMM Level 3 Assessment of Xavor Pakistan
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIPReal-Time Non-Intrusive Speech Quality Estimation for VoIP
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
 
VoIP
VoIPVoIP
VoIP
 
ULMAN GUI Specifications
ULMAN GUI SpecificationsULMAN GUI Specifications
ULMAN GUI Specifications
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
 
ULMAN-GUI
ULMAN-GUIULMAN-GUI
ULMAN-GUI
 
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
 

Recently uploaded

Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 

Recently uploaded (20)

Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 

Internet Domains

  • 1. Internet Domains The Domain Name System The Domain Name Service The Domain Name Space DNS
  • 2. Internet host name Internet domain names are hierarchical in nature, that is, they have a tree-like structure. A `domain' is a family, or group of names. A `domain' may be broken down into `subdomain'. A `toplevel domain' is a domain that is not a subdomain. The Top Level Domains are specified in RFC-920. .COM Commercial Organisations .EDU Educational Organisations .GOV Government Organisations .MIL Military Organisations .ORG Other organisations .NET Network Country Designator are two letters codes that represent a particular country.
  • 3.  Each top level domain has subdomains.  The top level domains based on country name are broken down into subdomains, so for example you end up with: .ac.uk, .co.uk.  The next level of division usually represents the name of the organisation: .brad.ac.uk, .theinternetwebshop.co.uk  Often the next level of subdomain is based on the departmental structure of the organisation but it may be based on any criterion considered reasonable and meaningful by the network administrators for the organisation: .eesf.brad.ac.uk, .eimc.brad.ac.uk  The very left-most portion of the name is always the unique name assigned to the host machine and is called the `hostname', the portion of the name to the right of the hostname is called the `domainname' and the complete name is called the `Fully Qualified Domain Name‘: www.inf.brad.ac.uk
  • 4. Internet Corporation for Assigned Names and Numbers (ICANN) http://www.icann.com/ What Does ICANN Do? To reach another person on the Internet you have to type an address into your computer -- a name or a number. That address must be unique so computers know where to find each other. ICANN coordinates these unique identifiers across the world. Without that coordination, we wouldn't have one global Internet.
  • 5. www.internic.net:  The InterNIC® web site is a public information resource for Internet users worldwide.  It provides information on the domain-name system, the domain-name registration process, and domain-name registrars.  To access information regarding registered domains, go to the Registry Whois.  For Whois information about country-code (two-letter) top-level domains, try Uwhois.com.  http://www.whois.net/  http://www.betterwhois.com/  http://www.nic.uk/  Nominet UK is the registry for .uk internet names.  Manages the authoritative database of .uk domain name registrations.  A not-for-profit company - has members instead of shareholders.  Nominet is officially recognised as the .uk domain name registry by the internet industry, users and the UK Government.
  • 6. DNS  You will need to know what domain your hosts name will belong to. Eg .eimc.brad.ac.uk  The name resolver software provides this name translation service by making requests to a `Domain Name Server', so you will need to know the IP address of a local nameserver that you can use. Eg. 143.53.238.5  The Domain Name Server converts machine names to IP addresses, so allowing messages to pass between machines in a format they understand. http://en.wikipedia.org/wiki/Dns
  • 7. /var/named/eesf.zon ;This file is used to resolve hostnames to IP addresses. The origin refers to the eesf.brad.ac.uk domain ; nameservers for eesf.brad.ac.uk domain IN NS d4bs.eesf.brad.ac.uk. $ORIGIN eesf.brad.ac.uk. d4bs IN A 143.53.138.20 dforbes IN A 143.53.138.10 ; services $ORIGIN eesf.brad.ac.uk. ftp CNAME d4bs.eesf.brad.ac.uk. www CNAME d4bs.eesf.brad.ac.uk.
  • 8. Domain Name System  http://en.wikipedia.org/wiki/Domain_Name_System  Paul Mockapetris invented the DNS in 1983. The Domain Name System or DNS is a system that stores information about Internet host names and domain names.  It provides an IP address for each host name, and lists the mail exchange servers accepting e-mail for each domain.  Originally, each computer on the network retrieved a file called HOSTS.TXT from SRI - Stanford Research Institute(now SRI International), which mapped an address to a name. The system had inherent limitations, because every time a given computer's
  • 9. address changed, every single system that wanted to communicate with that computer would need an update to its Hosts file. The host file is located in the following directories for each operating system:  Linux and other Unix related operating systems - /etc  Windows 95/Windows 98/Windows Me - C:windows  Windows 2000/Windows XP - %SystemRoot%system32driversetc  Windows NT - C:winntsystem32driversetc  Mac OS - System Folder:Preferences or System Folder (Format of the file may vary from Windows and Linux counterparts)  Blocking ads on the Internet with a list of ad server hostnames and IP addresses (http://pgl.yoyo.org/adservers/index.php)
  • 10. Ad filtering: One useful ability of the host file is that it is capable of ad filtering. This is accomplished by adding a line to the file that contains 127.0.0.1 (home IP) or 0.0.0.0 (no IP). That way, when a internet capable program attempts to access the IP of an advertiser the ad is prevented from appearing. For example, if you wanted to block Doubleclick ads, you could add the following to your host file: 127.0.0.1 ad.doubleclick.net How the DNS works in theory The practical operation of the DNS system consists of three parts: * The DNS resolver, a DNS client program which runs on a user's computer, and which generates DNS requests on behalf of software programs; * The recursive DNS server, which searches through the DNS in response to queries from resolvers, and returns answers to those resolvers; * The authoritative DNS server which hands out answers to queries from recursors, either in the form of an answer, or in the form of a delegation (i.e. referral to another authoritative DNS server).
  • 11.  The DNS consists of a hierarchical set of DNS servers.  Each domain or subdomain has one or more authoritative DNS servers that publish information about that domain and the name servers of any domains "beneath" it.  The hierarchy of authoritative DNS servers matches the hierarchy of domains.  At the top of the hierarchy stand the root servers: the servers to query when looking up (resolving) a top-level domain name.
  • 12.
  • 13. DNS recursion  http://en.wikipedia.org/wiki/Domain_Name_System  * The process starts by the recursor asking one of these root servers - for example, the server with the IP address "198.41.0.4" - the question "what is the IP address for www.wikipedia.org?"  * The root server replies with a delegation, meaning roughly: "I don't know the IP address of www.wikipedia.org, but I do know that the DNS server at 204.74.112.1 has information on the org domain."  * The local DNS recursor then asks that DNS server (i.e. 204.74.112.1) the same question it had previously put to the root servers, i.e. "what is the IP address for www.wikipedia.org?". It gets a similar reply - essentially, "I don't know the address of www.wikipedia.org, but I do know that the DNS server at 207.142.131.234 has information on the wikipedia.org domain."  * Finally the request goes to this third DNS server (207.142.131.234), which replies with the required IP address.  This process utilises recursive searching.
  • 14. Root nameserver http://en.wikipedia.org/wiki/Root_nameserver  A root nameserver is a DNS server that answers requests for the root namespace domain, and redirects requests for a particular top-level domain to that TLD's nameservers.  All domain names on the Internet actually end in a . (period) character -- that is, technically, Wikipedia is actually hosted on the domain "www.wikipedia.org." (try it.)  This final dot is implied, and all modern DNS software does not actually require that the final dot be included when attempting to translate a domain name to an IP address.  The empty string after the final dot is called the root domain, and all other domains (i.e. .com, .org, .net, .uk, etc.) are contained within the root domain.  There are currently 13 root name servers, with names in the form letter.root-servers.net where letter ranges from A to M:
  • 15.
  • 16. Letter Old name Operator Location A ns.internic.net VeriSign Dulles, VA B ns1.isi.edu ISI Marina Del Rey, CA C c.psi.net Cogent (http://www.cogent.com/) Herndon, VA D terp.umd.edu University of Maryland College Park, MD E ns.nasa.gov NASA Mountain View, CA F ns.isc.org ISC (http://www.isc.org/) Palo Alto, CA G ns.nic.ddn.mil U.S. DoD NIC Vienna, VA H aos.arl.army.mil U.S. Army Research Lab Aberdeen, MD I nic.nordu.net Autonomica (http://www.autonomica.se/) Stockholm J VeriSign Dulles, VA K RIPE London L ICANN Los Angeles M WIDE Project Tokyo  the C, F, I, J and K servers exist in multiple locations on different continents  There are quite a few alternate namespace systems with their own set of root nameservers that exist in opposition to the mainstream nameservers.
  • 17. Alternate DNS root http://en.wikipedia.org/wiki/Alternate_DNS_root  In addition to the Internet's main DNS root (currently consisting of 13 nominal root nameservers working in agreement with ICANN), several organizations operate alternate DNS roots (often referred to as alt roots).  Each alternate root has its own set of root nameservers and its own set of top-level domains. Legal users of domains  No one in the world really "owns" a domain name except the Network Information Centre (NIC), or domain name registry.  Most of the NICs in the world receive an annual fee from a legal user in order for the legal user to utilise the domain name (i.e. a sort of a leasing agreement exists, subject to the registry's terms and conditions).  Depending on the various naming convention of the registries, legal users become commonly known as "registrants" or as "domain holders".  ICANN holds a complete list of domain registries in the world.  One can find the legal user of a domain name by looking in the WHOIS database held by most domain registries.
  • 18. Tools to hack DNS  YoLinux: List of Linux Security and Hacker Software Tools http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html  Unix tools track hackers http://insight.zdnet.co.uk/hardware/servers/0,39020445,2123102,00.htm http://www.antihackertoolkit.com/tools.html  For DNS lookups use - 'dig' (domain information groper) or host -a 143.53.29.129 ns2.splice1.com or nslookup Note: nslookup is deprecated and may be removed from future releases. or http://www.dns.net/dnsrd/tools.html C:>nslookup 143.53.29.129 ns1.splice1.com Server: server4.splice1.com Address: 66.45.242.178 Name: d209.inf.brad.ac.uk Address: 143.53.29.129
  • 19. Where is the site hosted? traceroute/tracert Is the site on-line? ping Is there a back door or way in? nmap How is the network routing configured? netstat -r Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 143.53.28.0 * 255.255.255.0 U 0 0 0 eth1 169.254.0.0 * 255.255.0.0 U 0 0 0 eth1 127.0.0.0 * 255.0.0.0 U 0 0 0 lo default Skipton.cen.bra 0.0.0.0 UG 0 0 0 eth1 How are the network cards configured? ifconfig/ipconfig http://www.networksecuritytoolkit.org/nst/index.html
  • 20. What Is a Mail Message?  A mail message generally consists of  a message body, which is the text of the message,  and special administrative data specifying recipients, transport medium, etc., as you see when you look at an envelope of a real letter.
  • 21. A typical mail header may look like this: Return-Path: <ph10@cus.cam.ac.uk> Received: ursa.cus.cam.ac.uk (cusexim@ursa.cus.cam.ac.uk [131.111.8.6]) by al.animats.net (8.9.3/8.9.3/Debian 8.9.3-6) with ESMTP id WAA04654 for <terry@animats.net>; Sun, 30 Jan 2000 22:30:01 +1100 Received: from ph10 (helo=localhost) by ursa.cus.cam.ac.uk with local-smtp (Exim 3.13 #1) id 12EsYC-0001eF-00; Sun, 30 Jan 2000 11:29:52 +0000 Date: Sun, 30 Jan 2000 11:29:52 +0000 (GMT) From: Philip Hazel <ph10@cus.cam.ac.uk> Reply-To: Philip Hazel <ph10@cus.cam.ac.uk> To: Terry Dawson <terry@animats.net>, Andy Oram <andyo@oreilly.com> Subject: Electronic mail chapter In-Reply-To: <38921283.A58948F2@animats.net> Message-ID: <Pine.SOL.3.96.1000130111515.5800A- 200000@ursa.cus.cam.ac.uk>
  • 22. This list is a collection of common header fields From: This contains the sender's email address and possibly the “real name.” A complete zoo of formats is used here. To: This is a list of recipient email addresses. Multiple recipient addresses are separated by a comma. Cc: This is a list of email addresses that will receive “carbon copies” of the message. Multiple recipient addresses are separated by a comma. Bcc: This is a list of email addresses that will receive “carbon copies” of the message. The key difference between a “Cc:” and a “Bcc:” is that the addresses listed in a “Bcc:” will not appear in the header of the mail messages delivered to any recipient. It's a way of alerting recipients that you've sent copies of the message to other people without telling them who those others are. Multiple recipient addresses are separated by a comma. Subject: Describes the content of the mail in a few words. Reply-To: Specifies the address the sender wants the recipient's reply directed to. This may be useful if you have several accounts, but want to receive the bulk of mail only on the one you use most frequently. This field is optional.
  • 23. How Is Mail Delivered?  Generally, you will compose mail using a mailer interface like pine.  These programs are called mail user agents, or MUAs. If you send a mail message, the interface program will in most cases hand it to another program for delivery. This is called the mail transport agent, or MTA. On most systems the same MTA is used for both local and remote delivery and is usually invoked as a program such as sendmail.   Local delivery of mail is, of course, more than just appending the incoming message to the recipient's mailbox. Usually, the local MTA understands aliasing (setting up local recipient addresses pointing to other addresses) and forwarding (redirecting a user's mail to some other destination). Also, messages that cannot be delivered must usually be bounced, that is, returned to the sender along with some error message.
  • 24.  Mail delivered over a network using TCP/IP, commonly uses Simple Mail Transfer Protocol (SMTP).  SMTP was designed to deliver mail directly to a recipient's machine, negotiating the message transfer with the remote side's SMTP daemon.  Today it is common practice for organizations to establish special hosts that accept all mail for recipients in the organization and for that host to manage appropriate delivery to the intended recipient.
  • 25. Email Addresses  Email addresses are made up of at least two parts.  One part is the name of a mail domain that will ultimately translate to either the recipient's host or some host that accepts mail on behalf of the recipient.  The other part is some form of unique user identification that may be the login name of that user, the real name of that user in “Firstname.Lastname” format, or an arbitrary alias that will be translated into a user or list of users.  Internet sites adhere to the RFC-822 standard, which requires the familiar notation of user@host.domain, for which host.domain is the host's fully qualified domain name. The character separating the two is properly called a “commercial at” sign, but it helps if you read it as “at.”
  • 26. How Does Mail Routing Work?  The process of directing a message to the recipient's host is called routing .  Apart from finding a path from the sending site to the destination, it involves error checking and may involve speed and cost optimization.
  • 27. Mail Routing on the Internet  On the Internet, the destination host's configuration determines whether any specific mail routing is performed.  The default is to deliver the message to the destination by first determining what host the message should be sent to, and then delivering it directly to that host.  Most Internet sites want to direct all inbound mail to a highly available mail server that is capable of handling all this traffic and have it distribute the mail locally.  The Mail Exchanger is a machine that states that it is willing to act as a mail forwarder for all mail addresses in the domain.