Domain Name System

(redirected from DNS Protocol)

domain name system

[dō‚mān ′nām ‚sis·təm]
(computer science)
Abbreviated DNS.
A system used on the Internet to map the easily remembered names of host computers (domain names) to their respective Internet Protocol (IP) numbers.
A software database program that converts domain names to Internet Protocol addresses, and vice versa.

Domain Name System

(networking)
(DNS) A general-purpose distributed, replicated, data query service chiefly used on Internet for translating hostnames into Internet addresses. Also, the style of hostname used on the Internet, though such a name is properly called a fully qualified domain name. DNS can be configured to use a sequence of name servers, based on the domains in the name being looked for, until a match is found.

The name resolution client (e.g. Unix's gethostbyname() library function) can be configured to search for host information in the following order: first in the local hosts file, second in NIS and third in DNS. This sequencing of Naming Services is sometimes called "name service switching". Under Solaris is configured in the file /etc/nsswitch.conf.

DNS can be queried interactively using the command nslookup. It is defined in STD 13, RFC 1034, RFC 1035, RFC 1591.

BIND is a common DNS server.

Info from Virtual Office, Inc..
References in periodicals archive ?
Kaminsky had discovered a fundamental flaw in the DNS protocol.
0 describes the operations and services provided by the DNS protocol, IPv6 address notation, sample BIND and DNS configurations, DNS diagnostic tools, administrative security, and zone integrity using DNSSEC.
At that time, the Internet Architecture Board (IAB), which oversees the internet's technical standards, issued a statement saying it believed the VeriSign service contained "significant DNS protocol errors".
This new release of Impact has added the ability to communicate using the DNS protocol to agents deployed using a specific set of modules.
The DNS protocol is unlikely to be blocked (allowing
000 tests per second for the DNS protocol running over UDP.
This vulnerability is the result of a design flaw in the DNS protocol caching mechanism that allows spoofed replies from authoritative nameservers to insert malicious host entries into the vulnerable DNS server's cache.
Upon deployment, the IPS 5500 instantly identified oversized control packets and numerous DNS protocol anomalies.
For many years BIND, and its derivatives, has been the most popular software implementation of the DNS protocol running on over 75% of the nameservers on the Internet.
BIND, and its derivatives, is the most popular software implementation of the DNS protocol running on over 75% of the nameservers on the Internet.
NSI Registry will make available on its Web site a list of vendors who have qualified their software for testbed usage, and will also make available the requisite DNS protocol information that will enable registrars to create their own utilities or work with a third party.
A cyber-bandit with the right knowledge of DNS protocols will