Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
The domain name system (DNS) is a naming database in which internet domain names
are located and translated into internet protocol (IP) addresses. The domain name
system maps the name people use to locate a website to the IP address that a
computer uses to locate a website. For example, if someone types example.com into a
web browser, a server behind the scenes will map that name to the corresponding IP
address, something similar in structure to 121.12.12.121. Just like the phone book on
our mobile phone, we need to find Manoj, so we write “Manoj”, and we don’t need to
remember his actual number.
Web browsing and most other internet activities rely on DNS to quickly provide the
information necessary to connect users to remote hosts. DNS mapping is distributed
throughout the internet in a hierarchy of authority. Access providers and enterprises, as
well as governments, universities and other organizations, typically have their own
assigned ranges of IP addresses and an assigned domain name. They also typically run
DNS servers to manage the mapping of those names to those addresses. Most URLs
are built around the domain name of the web server that takes client requests.
1. Information request - We want to visit our website and we know the domain name.
We write it in our web browser, and the first thing it does is to check for local cache if we
have visited it before, if not it will do a DNS query to find the answer.
2. Recursive DNS servers - If we haven’t visited the page before, our computer will
search the answer with our internet provider’s recursive DNS servers. They have cache
too so we can get the result from there. If they don’t, they will need to search the
information for us in another place.
3. Root name servers - Our query can travel a long way. The next step is the name
servers. They are like intermediates; they don’t know the answer, but they know where
to find it.
4. Top-Level Domain (TLD) name servers - The name servers will read from right to left
and direct we to the Top Top-Level Domain (TLD) name servers for the extension (.com
or another). These TLD servers will lead us finally to the servers which have the right
information.
5. Authoritative DNS servers - These DNS servers check the DNS records for the
information. There are different records, for example, we want to know the IP address
for a website, so our request is Address Record (A).
6. Retrieve the record - The recursive server gets the A record for the website we want
from the authoritative name servers and stores it on its local cache. If somebody else
needs the host record for the same site, the information will be already there, and it
won’t need to pass through all these steps. All this data has an expiration date. This
way, the users will get up to date information.
7. The final answer - Now that the recursive server has the A record it sends it to our
computer. The PC will save the record, read the IP and pass the information to our
browser. The browser makes the connection to the web server, and it is finally possible
for us to see the website.
Ans 5.
An advantage of a proxy server is that its cache can serve all users. If one or more
Internet sites are frequently requested, these are likely to be in the proxy's cache, which
will improve user response time. A proxy can also log its interactions, which can be
helpful for troubleshooting.
Networking - In some cases, a proxy server may be required due to our networking
configuration. If we have multiple PCs in our office, the router provided by our Internet
service provider serves as a sort of proxy for our system. All outgoing traffic first travels
to the router, which serves as our connection to the outside world. From the perspective
of the Internet, all your traffic seems to come from a single IP address, no matter how
many machines we connect on our side of the router.
Access Control - In some cases, a proxy may serve as a central node for logging or
filtering Internet traffic. A company may route all traffic through an internal proxy in order
to prevent users from accessing sites that are not work related and many even contain
inappropriate content, as well as to record the activities of its users online. A proxy may
also require a username and password for Internet access, preventing unauthorized
users from spending time online on non-company business. A proxy server can also
cache commonly accessed resources, reducing the amount of network traffic
Anonymity - Since all traffic routed through a proxy appears to originate from that proxy,
some users take advantage of this system for anonymity purposes. Using an external
proxy can make it difficult for a third party to track your activities online. It is important to
note, however, that the owner of a proxy can easily monitor activity that passes through
it, so using an insecure proxy may open you up to many security risks. In addition, since
our Web traffic must travel to the proxy server before it can navigate to the target
server, this setup can introduce considerable amounts of latency and slow down our
browsing session.
International Proxies - Proxies are also useful when we are dealing with international
restrictions. Some websites alter the content they provide based on the user’s home
country, and using an international proxy that masks our country of origin can help
bypass those restrictions. In extreme cases, users in countries that censor the Internet
can use international proxies to access banned content, and free-speech advocates and
activists can use the anonymity provided by proxies to share information freely with
other users.
Ans. 3.
A digital signature can be used with any kind of message, whether it is encrypted or not,
simply so that the receiver can be sure of the sender's identity and that the message
arrived intact. A digital certificate contains the digital signature of the certificate-issuing
authority so that anyone can verify that the certificate is real.
1. To make sure it's intact and from you, our lawyer makes a hash of the received
message.
2. Our lawyer then uses our public key to decrypt the message hash or summary.
3. If the hashes match, the received message is valid