UNIT 2 LESSON 10 CS PRINCIPLES. UNIT 2 LESSON 10 OBJECTIVES Students will be able to: Describe how a system of DNS servers support IP lookups. Explain.

Slides:



Advertisements
Similar presentations
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Advertisements

1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Information Services Portal Login/Logout. LOGIN PAGE Please refer to the following pages for scenarios 1, 2 and 3 Please refer to the ‘Guest User’ User.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
20101 The Application Layer Domain Name System Chapter 7.
Application Layer At long last we can ask the question - how does the user interface with the network?
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
DNS: Revising the Current Protocol Matt Gustafson Matt Weaver CS522 Computer Communications University of Colorado, Colorado Springs.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Intro to Computer Networks DNS (Domain Name System) Bob Bradley The University of Tennessee at Martin.
CSE 461 Section (Week 0x02). Port numbers for applications MAC addresses for hardware IP addresses for a way to send data in a smart, routable way.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
The internet and the WWW
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
IT 210 The Internet & World Wide Web introduction.
Domain Name System (DNS)
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Got DNS? A review of Domain Name Services and how it impacts website developers. By Jason Baker Digital North.
Chapter 9 - Applications We will look at three main applications DNS (name services) SMTP ( ) HTTP (World Wide Web) Our main focus will be on DNS.
How the Internet Works CPA. Internet Addresses How do you get to the school’s website? What you as the user sees is a web address or URL – Uniform Resource.
DNS: Domain Name System
1 DNS: Domain Name System People: many identifiers: m SSN, name, Passport # Internet hosts, routers: m IP address (32 bit) - used for addressing datagrams.
By Chris Racki. Outline  Introduction  How DNS works  A typical DNS lookup  Caching for later  Vulnerabilities of DNS  Anatomy of a cache poisoning.
1 Application Layer Lecture 6 Imran Ahmed University of Management & Technology.
1 Computer Communication & Networks Lecture 26 Application Layer: Domain Name System Waleed Ejaz.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 7 1 Mass Communication on the Internet Using Mailing Lists Tutorial.
Created by, Nancy Harris, James Madison University, VA FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
Naming March 8, Networks What is naming?  Associations between some elements in a set of names and some elements in a set of values  Binding.
CPSC 441: DNS 1. DNS: Domain Name System Internet hosts: m IP address (32 bit) - used for addressing datagrams m “name”, e.g., - used by.
Networks: LANs, WANs and Communication Protocols How do computers communicate?
UNIT 2 LESSON 4 CS PRINCIPLES. OBJECTIVES Students will be able to: Describe the redundancy of routing between two points on the Internet. Send messages.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
UNIT 2 LESSON 9 CS PRINCIPLES. UNIT 2 LESSON 9 OBJECTIVES Students will be able to: Explain the inefficiencies of everyone managing their own name-to-
DNS/IP. WHAT IS DNS?...IP?  Domain Name System (DNS) is a database system that translates a computer's fully qualified domain name into an IP address.
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
Informatics Institute of Technology 3SFE611 Network Design 1 DNS (Domain Name System) RFC1035 Why names? Computers use addresses. Humans cannot remember.
COMP 431 Internet Services & Protocols
Internet Naming Service: DNS* Chapter 5. The Name Space The name space is the structure of the DNS database –An inverted tree with the root node at the.
Basics of the Domain Name System (DNS) By : AMMY- DRISS Mohamed Amine KADDARI Zakaria MAHMOUDI Soufiane Oujda Med I University National College of Applied.
THE LARGEST NAME SERVICE ACTING AS A PHONE BOOK FOR THE INTERNET The Domain Name System click here to next page 1.
CSE 461 Section. Port numbers for applications MAC addresses for hardware IP addresses for a way to send data in a smart, routable way.
DNS Domain Name System. Lots of people use the internet for different reasons. DNS Plays a big role in the internet. The DNS translates domain names into.
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
Understand Names Resolution
Routers and Redundancy
DNS Security Advanced Network Security Peter Reiher August, 2014
HTTP and Abstraction on the Internet
What’s the relationship here?
HTTP and Abstraction on the Internet
Routers and Redundancy
THE NEED FOR DNS DOMAIN NAME SYSTEM
Lesson 2-9 AP Computer Science Principles
IMPLEMENTING NAME RESOLUTION USING DNS
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Lesson 2-9 AP Computer Science Principles
Modelling the internet
Modelling the internet
HTTP and Abstraction on the Internet / The Need for DNS
DNS: Domain Name System
The Internet and Electronic mail
Q/ Compare between HTTP & HTTPS? HTTP HTTPS
Presentation transcript:

UNIT 2 LESSON 10 CS PRINCIPLES

UNIT 2 LESSON 10 OBJECTIVES Students will be able to: Describe how a system of DNS servers support IP lookups. Explain that DNS is a hierarchical system that supports growth and change.

DNS DNS (Domain Name Server) is a hierarchical system that translates domain names into IP addresses. At the top level of DNS are the root servers, which contain information for domains for such as.com or.org. By accessing the correct root, and looking at each of its branches, it is possible for the DNS to follow the branches down to second level and subdomains to find the appropriate IP address. A single DNS may not know all of the information necessary to find an IP address, but by asking other DNSes, it is able to find that information.

DNS The DNS is an open standard protocol, which makes it vulnerable to security issues. These issues include DNS cache poisoning and DDoS attacks, among others. In DNS cache poisoning, DNS servers are given an incorrect IP address, thus routing anyone looking for that information to an incorrect website. DDoS attacks occur when a DNS server is sent too many requests at once and is unable to field all of them. This results in the DNS being unable to serve any request, essentially blocking the DNS from use.

UNIT 2 JOURNAL #10 While we can’t actually see what’s going on in the DNS in real life, we can compare it to a system that you’ve seen before: the postal service. How can you relate DNS and the postal service? How do DNS and the postal service function differently?

POSSIBLE RESPONSE Scaling of DNS requires system of servers organized in a hierarchy, just like there is a system of post offices and hierarchy (main city post office and local neighborhood post offices). Hierarchy of DNS/IP is analogous to country/state/city/zip/street/direction/number. New URL/IP address pairs are sometimes added, just like new homes and addresses are added and the post office needs to know. IP addresses for web pages sometimes do change, just like people sometimes move. When you move, you send in a change of address card; when a web page's IP address changes, it needs to update its DNS, which then shares the IP change with other DNS servers. If you send mail to someone who has moved, it sometimes comes back undelivered. The Internet cannot have undelivered messages, so the DNS server is queried for the current IP address for EVERY web page you visit.

U2L10 ACTIVITY To learn more about DNS you will be reading articles about how it works and some of the vulnerabilities of the system, namely DDoS (Distributed Denial of Service) attacks. You will have 20 minutes to read, then we will perform a jigsaw and you will learn about the other articles from your classmates. What is DDoS?, how to launch, and how to stop Growing threat of DDoS: age.com/technology/security/ /growing-threat-ddos-attacks-dnshttp:// age.com/technology/security/ /growing-threat-ddos-attacks-dns Details of DDoS attacks: details-behind-a-denial-of-service-attack-what-it-is-why-it-matters-and-what-you- can-do-to-stop-it http:// details-behind-a-denial-of-service-attack-what-it-is-why-it-matters-and-what-you- can-do-to-stop-it Launching and stopping a DDoS attack: problem/ problem/