Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Multicast Domain Name System“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Multicast Domain Name System" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Multicast Domain Name System"
Hanna, Fouad, Lionel Droz-Bartholet und Jean-Christophe Lapayre. „Toward a Faster Fault Tolerant Consensus to Maintain Data Consistency in Collaborative Environments“. International Journal of Cooperative Information Systems 26, Nr. 03 (14.08.2017): 1750002. http://dx.doi.org/10.1142/s0218843017500022.
Der volle Inhalt der QuelleDettmer, R. „What's in a name [Internet Domain Name System]“. IEE Review 49, Nr. 11 (01.12.2003): 38–40. http://dx.doi.org/10.1049/ir:20031105.
Der volle Inhalt der QuelleBonastre, Oscar M., Andreu Vea und David Walden. „Origins of the Domain Name System“. IEEE Annals of the History of Computing 41, Nr. 2 (01.04.2019): 48–60. http://dx.doi.org/10.1109/mahc.2019.2913116.
Der volle Inhalt der QuelleCasalicchio, E., M. Caselli und A. Coletta. „Measuring the global domain name system“. IEEE Network 27, Nr. 1 (Januar 2013): 25–31. http://dx.doi.org/10.1109/mnet.2013.6423188.
Der volle Inhalt der QuelleMockapetris, Paul V., und Kevin J. Dunlap. „Development of the Domain Name System“. ACM SIGCOMM Computer Communication Review 25, Nr. 1 (11.01.1995): 112–22. http://dx.doi.org/10.1145/205447.205459.
Der volle Inhalt der QuelleMockapetris, P., und K. J. Dunlap. „Development of the domain name system“. ACM SIGCOMM Computer Communication Review 18, Nr. 4 (August 1988): 123–33. http://dx.doi.org/10.1145/52325.52338.
Der volle Inhalt der QuelleQin, Zhen, Chunjing Xiao, Qiyao Wang, Yuehui Jin und Aleksandar Kuzmanovic. „A CDN-based Domain Name System“. Computer Communications 45 (Juni 2014): 11–20. http://dx.doi.org/10.1016/j.comcom.2014.03.021.
Der volle Inhalt der QuelleLi, Bo, und Jinlin Wang. „An Identifier and Locator Decoupled Multicast Approach (ILDM) Based on ICN“. Applied Sciences 11, Nr. 2 (08.01.2021): 578. http://dx.doi.org/10.3390/app11020578.
Der volle Inhalt der QuelleLi, Bo, und Jinlin Wang. „An Identifier and Locator Decoupled Multicast Approach (ILDM) Based on ICN“. Applied Sciences 11, Nr. 2 (08.01.2021): 578. http://dx.doi.org/10.3390/app11020578.
Der volle Inhalt der QuelleChandramouli, R., und S. Rose. „Challenges in securing the domain name system“. IEEE Security & Privacy Magazine 4, Nr. 1 (Januar 2006): 84–87. http://dx.doi.org/10.1109/msp.2006.8.
Der volle Inhalt der QuelleDissertationen zum Thema "Multicast Domain Name System"
Biolek, Martin. „Klientská aplikace protokolu DNS s grafickým rozhraním pro účely výuky“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442404.
Der volle Inhalt der QuelleFontanella, Shaun. „Indexing Geographic Information Using the Domain Name System“. The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1345531139.
Der volle Inhalt der QuelleSchomp, Kyle Graham. „Complexity and Security of the Domain Name System“. Case Western Reserve University School of Graduate Studies / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=case1453329135.
Der volle Inhalt der QuelleMontes, Io. „Legal framework for domain names /“. [S.l.] : [s.n.], 2005. http://aleph.unisg.ch/hsgscan/hm00153322.pdf.
Der volle Inhalt der QuelleKarstensen, Lasse. „Skjult IP-kommunikasjon basert på Domain Name System (DNS)“. Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-11320.
Der volle Inhalt der QuelleAhmed, Sarah 1975. „A scalable Byzantine fault tolerant secure domain name system“. Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/8936.
Der volle Inhalt der QuelleIncludes bibliographical references (p. 98-101).
The domain name system is the standard mechanism on the Internet to advertise and access important information about hosts. At its inception, DNS was not designed to be a secure protocol. The biggest security hole in DNS is the lack of support for data integrity authentication, source authentication, and authorization. To make DNS more robust, a security extension of the domain name system (DNSSEC) was proposed by the Internet Engineering task force (IETF) in late 1997. The basic idea of the DNS security extension is to provide data integrity and origin authentication by means of cryptographic digital signatures. However, the proposed extension suffers from some security flaws. In this thesis, we discuss the security problems of DNS and its security extension. As a solution, we present the design and implementation of a Byzantine-fault-tolerant domain name system. The system consists of 3f+1 tightly coupled name servers and guarantees safety and liveness properties assuming no more than f replicas are faulty within a small window of vulnerability. To authenticate communication between a client and a server to provide per-query data authentication, we propose to use symmetric key cryptography. To address scalability concerns, we propose a hierarchical organization of name servers with a hybrid of iterative and recursive query resolution approaches. The issue of cache inconsistency is addressed by designing a hierarchical cache with an invalidation protocol using leases. Because of the use of hierarchical state partitioning and caching to achieve scalability in DNS, we develop an efficient protocol that allows replicas in a group to request operations from another group using very few messages. We show that the scalable Byzantine-fault tolerant domain name system, while providing a much higher degree of security and reliability, performs as well or even better than an implementation of the DNS security extension.
by Sarah Ahmed.
M.Eng.
Eckhard, Rolf Andreas. „Das Domain-Name-System : eine kritische Bestandsaufnahme aus kartellrechtlicher Sicht /“. Frankfurt am Main [u.a.] : Lang, 2001. http://www.gbv.de/dms/spk/sbb/recht/toc/332838439.pdf.
Der volle Inhalt der QuelleSnyder, Mark E. „Critical infrastructure protection and the Domain Name Service (DNS) system“. Diss., Rolla, Mo. : Missouri University of Science and Technology, 2008. http://scholarsmine.mst.edu/thesis/pdf/Snyder_09007dcc805e0f32.pdf.
Der volle Inhalt der QuelleVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed January 15, 2009) Includes bibliographical references.
Sit, Emil 1977. „A study of caching in the Internet Domain Name System“. Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86513.
Der volle Inhalt der QuelleFilippi, Geoffrey George. „A High-Availability Architecture for the Dynamic Domain Name System“. Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/32869.
Der volle Inhalt der QuelleDNS, DDNS, BGP, anycast, DHCP, replication, LDAP, multi-master, high-availability, reliability
The Domain Name System (DNS) provides a mapping between host names and Internet Protocol (IP) addresses. Hosts that are configured using the Dynamic Host Configuration Protocol (DHCP) can have their assigned IP addresses updated in a Dynamic DNS (DDNS). DNS and DDNS are critical components of the Internet. Most applications use host names rather than IP addresses, allowing the underlying operating system (OS) to translate these host names to IP addresses on behalf of the application. When the DDNS service is unavailable, applications that use DNS cannot contact the hosts served by that DDNS server. Unfortunately, the current DDNS implementation cannot continue to operate under failure of a master DNS server. Although a slave DNS server can continue to translate names to addresses, new IP addresses or changes to existing IP addresses cannot be added. Therefore, those new hosts cannot be reached by the DDNS.
A new architecture is presented that eliminates this single point of failure. In this design, instead of storing resource records in a flat text file, all name servers connect to a Lightweight Directory Access Protocol (LDAP) directory to store and retrieve resource records. These directory servers replicate all resource records across each other using a multi-master replication mechanism. The DHCP servers can add records to any of the functioning DNS servers in event of an outage. In this scheme, all DNS servers use the anycast Border Gateway Protocol (BGP). This allows any of the DNS servers to answer queries sent to a single IP address. The DNS clients always use the same IP address to send queries. The routing system removes routes to non-functional name servers and delivers the request to the closest (according to network metrics) available DNS server.
This thesis also describes a concrete implementation of this system that was created to
demonstrate the viability of this solution. A reference implementation was built in a laboratory to
represent an Internet Service Provider (ISP) with three identical regions. This implementation
was built using Quagga as the BGP routing software running on a set of core routers and on each
of the DNS servers. The Berkeley Internet Name Daemon (BIND) was used as an
implementation of the DNS. The BIND Simplified Database Backend (SDB) interface was used
to allow the DNS server to store and retrieve resource records in an LDAP directory. The Fedora
Directory Server was used as a multi-master LDAP directory. DHCP service was provided by
the Internet Systems Consortium's (ISC) DHCP server.
The objectives for the design were high-availability, scalability and consistency. These
properties were analyzed using the metrics of downtime during failover, replication overhead,
and latency of replication. The downtime during failover was less than one second. The precision
of this metric was limited by the synchronization provided by the Network Time Protocol (NTP)
implementation used in the laboratory. The network traffic overhead for a three-way replication
was shown to be only 3.5 times non-replicated network traffic. The latency of replication was
also shown to be less than one second. The results show the viability of this approach and
indicate that this solution should be usable over a wide area network, serving a large number of
clients.
Master of Science
Bücher zum Thema "Multicast Domain Name System"
Herrmann, Dominik. Beobachtungsmöglichkeiten im Domain Name System. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-13263-7.
Der volle Inhalt der QuelleCheung, YiuChung. Multi-lingual domain name system. Oxford: Oxford Brookes University, 2001.
Den vollen Inhalt der Quelle findenLiu, Cricket. Understanding the Domain Name System (DNS). Sebastopol, CA: O'Reilly & Associates, Inc., 1998.
Den vollen Inhalt der Quelle findenThe domain name registration system: Liberalisation, consumer protection, and growth. Abingdon, Oxon [UK]: Routledge, 2012.
Den vollen Inhalt der Quelle findenDas Domain-Name-System: Eine kritische Bestandsaufnahme aus kartellrechtlicher Sicht. Frankfurt am Main: Peter Lang, 2001.
Den vollen Inhalt der Quelle findenNg, Jenny. The domain name registration system: Liberalisation, consumer protection, and growth. Abingdon, Oxon [UK]: Routledge, 2012.
Den vollen Inhalt der Quelle findenResearch, United States Congress House Committee on Science Subcommittee on Basic. The domain name system, parts I-II: Joint hearings before the Committee on Science, Subcommittee on Basic Research and Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, second session, March 31 and October 7, 1998. Washington: U.S. G.P.O., 1999.
Den vollen Inhalt der Quelle findenDomain name system privatization, is ICANN out of control?: Hearing before the Subcommittee on Oversight and Investigations of the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, first session, July 22, 1999. Washington: U.S. G.P.O., 1999.
Den vollen Inhalt der Quelle findenLiska, Allan. DNS Security: Hacking and Defending the Domain Name System. Elsevier Science & Technology Books, 2016.
Den vollen Inhalt der Quelle findenNg, Jenny. Domain Name Registration System: Liberalisation, Consumer Protection and Growth. Taylor & Francis Group, 2014.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Multicast Domain Name System"
Weik, Martin H. „Domain Name System“. In Computer Science and Communications Dictionary, 453. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_5504.
Der volle Inhalt der QuelleGoerzen, John. „Domain Name System“. In Foundations of Python Network Programming, 65–85. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0752-8_4.
Der volle Inhalt der QuelleFox, Richard, und Wei Hao. „Domain Name System“. In Internet Infrastructure, 161–218. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, [2017]: CRC Press, 2017. http://dx.doi.org/10.1201/9781315175577-5.
Der volle Inhalt der QuelleBök, Patrick-Benjamin, Andreas Noack, Marcel Müller und Daniel Behnke. „Domain Name System (DNS)“. In Computernetze und Internet of Things, 203–9. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_10.
Der volle Inhalt der QuelleJayakar, Krishna. „Internet Domain Name System“. In Handbook of Computer Networks, 305–19. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256114.ch22.
Der volle Inhalt der QuelleSimpkins, Stacy. „Domain Name System (DNS)“. In Building a SharePoint 2016 Home Lab, 117–31. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2170-9_5.
Der volle Inhalt der QuelleGoswami, Subrata. „The Domain Name System“. In Internet Protocols, 119–37. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0385-9_6.
Der volle Inhalt der QuelleRuff, Andreas. „Das Domain-Name-System“. In DomainLaw, 7–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-642-56116-0_2.
Der volle Inhalt der QuelleBadach, Anatol, und Erwin Hoffmann. „Domain Name System (DNS)“. In Technik der IP-Netze, 231–302. München: Carl Hanser Verlag GmbH & Co. KG, 2019. http://dx.doi.org/10.3139/9783446455115.005.
Der volle Inhalt der QuelleBadach, Anatol, und Erwin Hoffmann. „Domain Name System (DNS)“. In Technik der IP-Netze, 175–238. München: Carl Hanser Verlag GmbH & Co. KG, 2015. http://dx.doi.org/10.3139/9783446439863.004.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Multicast Domain Name System"
Deccio, Casey, Chao-Chih Chen, Prasant Mohapatra, Jeff Sedayao und Krishna Kant. „Quality of name resolution in the Domain Name System“. In 2009 17th IEEE International Conference on Network Protocols (ICNP). IEEE, 2009. http://dx.doi.org/10.1109/icnp.2009.5339693.
Der volle Inhalt der QuelleMockapetris, Paul, und Kevin Dunlap. „Implementation of the Domain Name System“. In the 2nd workshop. New York, New York, USA: ACM Press, 1986. http://dx.doi.org/10.1145/503956.503991.
Der volle Inhalt der QuelleMockapetris, P., und K. J. Dunlap. „Development of the domain name system“. In Symposium proceedings. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/52324.52338.
Der volle Inhalt der QuelleZou, Futai, Siyu Zhang, Bei Pei, Li Pan, Linsen Li und Jianhua Li. „Survey on Domain Name System Security“. In 2016 IEEE First International Conference on Data Science in Cyberspace (DSC). IEEE, 2016. http://dx.doi.org/10.1109/dsc.2016.96.
Der volle Inhalt der QuelleFan, Xun, John Heidemann und Ramesh Govindan. „Evaluating anycast in the domain name system“. In IEEE INFOCOM 2013 - IEEE Conference on Computer Communications. IEEE, 2013. http://dx.doi.org/10.1109/infcom.2013.6566965.
Der volle Inhalt der QuelleDeccio, Casey, Jeff Sedayao, Krishna Kant und Prasant Mohapatra. „Measuring Availability in the Domain Name System“. In IEEE INFOCOM 2010 - IEEE Conference on Computer Communications. IEEE, 2010. http://dx.doi.org/10.1109/infcom.2010.5462270.
Der volle Inhalt der QuelleRose, Scott, Ramaswamy Chandramouli und Anastase Nakassis. „Information Leakage through the Domain Name System“. In Technology Conference for Homeland Security (CATCH). IEEE, 2009. http://dx.doi.org/10.1109/catch.2009.10.
Der volle Inhalt der QuelleJung, Younchan, und Matnel Peradilla. „Domain Name to IP Address Resolution System with Multiple Name Servers Adaptable to MANETs“. In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.132.
Der volle Inhalt der QuelleWei Zhou und Liu Chen. „A secure domain name system based on intrusion tolerance“. In 2008 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2008. http://dx.doi.org/10.1109/icmlc.2008.4621016.
Der volle Inhalt der QuelleKhan, Sarmad Ullah, Rafiullah Khan und Arif Ali. „Implementation of Content Centric Networks through Domain Name System“. In 2015 International Conference on Emerging Technologies (ICET). IEEE, 2015. http://dx.doi.org/10.1109/icet.2015.7389212.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Multicast Domain Name System"
Josefsson, S. Domain Name System Media Types. RFC Editor, April 2005. http://dx.doi.org/10.17487/rfc4027.
Der volle Inhalt der QuelleEastlake, D., und M. Andrews. Domain Name System (DNS) Cookies. RFC Editor, Mai 2016. http://dx.doi.org/10.17487/rfc7873.
Der volle Inhalt der QuelleEastlake, D., und C. Kaufman. Domain Name System Security Extensions. RFC Editor, Januar 1997. http://dx.doi.org/10.17487/rfc2065.
Der volle Inhalt der QuelleEastlake, D. Domain Name System Security Extensions. RFC Editor, März 1999. http://dx.doi.org/10.17487/rfc2535.
Der volle Inhalt der QuelleEastlake, D. Domain Name System (DNS) IANA Considerations. RFC Editor, März 2011. http://dx.doi.org/10.17487/rfc6195.
Der volle Inhalt der QuelleJosefsson, S. Domain Name System Uniform Resource Identifiers. RFC Editor, Mai 2006. http://dx.doi.org/10.17487/rfc4501.
Der volle Inhalt der QuelleEastlake, D., E. Brunner-Williams und B. Manning. Domain Name System (DNS) IANA Considerations. RFC Editor, September 2000. http://dx.doi.org/10.17487/rfc2929.
Der volle Inhalt der QuelleEastlake, D. Detached Domain Name System (DNS) Information. RFC Editor, März 1999. http://dx.doi.org/10.17487/rfc2540.
Der volle Inhalt der QuelleEastlake, D. Secure Domain Name System Dynamic Update. RFC Editor, April 1997. http://dx.doi.org/10.17487/rfc2137.
Der volle Inhalt der QuellePostel, J. Domain Name System Structure and Delegation. RFC Editor, März 1994. http://dx.doi.org/10.17487/rfc1591.
Der volle Inhalt der Quelle