Enviar pesquisa
Carregar
Networking & dns 101
•
2 gostaram
•
1,295 visualizações
Marc Cluet
Seguir
Lynx Consultants presentation to train Junior Engineers into the basics of networking
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 25
Baixar agora
Baixar para ler offline
Recomendados
Network tunneling techniques
Network tunneling techniques
inbroker
Virtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
Darshana Viduranga
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
Amit Kumar , Jaipur Engineers
There and back again
There and back again
Jon Spriggs
More on Using Haystack + DASH7 with MQTT
More on Using Haystack + DASH7 with MQTT
Haystack Technologies
Introduction P2p
Introduction P2p
Davide Carboni
MQTT + DASH7 Integration
MQTT + DASH7 Integration
Haystack Technologies
Tunneling vpn security and implementation
Tunneling vpn security and implementation
Mohibullah Saail
Recomendados
Network tunneling techniques
Network tunneling techniques
inbroker
Virtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
Darshana Viduranga
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
Amit Kumar , Jaipur Engineers
There and back again
There and back again
Jon Spriggs
More on Using Haystack + DASH7 with MQTT
More on Using Haystack + DASH7 with MQTT
Haystack Technologies
Introduction P2p
Introduction P2p
Davide Carboni
MQTT + DASH7 Integration
MQTT + DASH7 Integration
Haystack Technologies
Tunneling vpn security and implementation
Tunneling vpn security and implementation
Mohibullah Saail
Haystack Integration of NFC and DASH7
Haystack Integration of NFC and DASH7
Haystack Technologies
Ipv6 packet fomat
Ipv6 packet fomat
Deena Siva
Network interview questions
Network interview questions
rajasekar1712
Introduction of routing
Introduction of routing
CBitss Technologies
VPN Theory
VPN Theory
LJ PROJECTS
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptions
Uday Bhatia
Nat
Nat
lyndyv
Vpn
Vpn
KamalPreet Saluja
Nat presentation
Nat presentation
hassoon3
VoIP
VoIP
Mustafa Lashen
VOIP QOS
VOIP QOS
Thomas Mangin
Internet protocol
Internet protocol
Kollins Lolong
L2 tp
L2 tp
Ramya Chowdary
Types of VPN
Types of VPN
NetProtocol Xpert
Remote server
Remote server
Rijosh vk
Nat cisco
Nat cisco
moonmanik
class12_Networking2
class12_Networking2
T. J. Saotome
Ipv6 routing
Ipv6 routing
srikrishna mallavarapu
BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and Discussion
APNIC
Campus networking
Campus networking
Jisc
Networking 101
Networking 101
NAFCareerAcads
IPv6 introduction
IPv6 introduction
Guider Lee
Mais conteúdo relacionado
Mais procurados
Haystack Integration of NFC and DASH7
Haystack Integration of NFC and DASH7
Haystack Technologies
Ipv6 packet fomat
Ipv6 packet fomat
Deena Siva
Network interview questions
Network interview questions
rajasekar1712
Introduction of routing
Introduction of routing
CBitss Technologies
VPN Theory
VPN Theory
LJ PROJECTS
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptions
Uday Bhatia
Nat
Nat
lyndyv
Vpn
Vpn
KamalPreet Saluja
Nat presentation
Nat presentation
hassoon3
VoIP
VoIP
Mustafa Lashen
VOIP QOS
VOIP QOS
Thomas Mangin
Internet protocol
Internet protocol
Kollins Lolong
L2 tp
L2 tp
Ramya Chowdary
Types of VPN
Types of VPN
NetProtocol Xpert
Remote server
Remote server
Rijosh vk
Nat cisco
Nat cisco
moonmanik
class12_Networking2
class12_Networking2
T. J. Saotome
Ipv6 routing
Ipv6 routing
srikrishna mallavarapu
BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and Discussion
APNIC
Campus networking
Campus networking
Jisc
Mais procurados
(20)
Haystack Integration of NFC and DASH7
Haystack Integration of NFC and DASH7
Ipv6 packet fomat
Ipv6 packet fomat
Network interview questions
Network interview questions
Introduction of routing
Introduction of routing
VPN Theory
VPN Theory
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptions
Nat
Nat
Vpn
Vpn
Nat presentation
Nat presentation
VoIP
VoIP
VOIP QOS
VOIP QOS
Internet protocol
Internet protocol
L2 tp
L2 tp
Types of VPN
Types of VPN
Remote server
Remote server
Nat cisco
Nat cisco
class12_Networking2
class12_Networking2
Ipv6 routing
Ipv6 routing
BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and Discussion
Campus networking
Campus networking
Destaque
Networking 101
Networking 101
NAFCareerAcads
IPv6 introduction
IPv6 introduction
Guider Lee
Attacking the spanning tree protocol
Attacking the spanning tree protocol
Asmadzakirah
IP, DNS and MAC concepts
IP, DNS and MAC concepts
Irshaad Abdool
224_xDSL-ADSL-SDSL
224_xDSL-ADSL-SDSL
Elior Boukhobza
Configuring a Cisco Router as a PPPoE Client for DSL Connectivity
Configuring a Cisco Router as a PPPoE Client for DSL Connectivity
3Anetwork com
Adsl, adsl2, adsl2+ etc
Adsl, adsl2, adsl2+ etc
Prince Mehra
Ipv 4 and ipv6
Ipv 4 and ipv6
Tehmina Gulfam
VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)
Naveen Soni
Adsl
Adsl
Mohd Arif
VTP
VTP
Haidar-Mohammed
Laser on Hard Tissue
Laser on Hard Tissue
Shaheed Suhrawardy Medical College
Dns protocol design attacks and security
Dns protocol design attacks and security
Michael Earls
Lan chat system
Lan chat system
Wipro
Presentation on DSL & ADSL
Presentation on DSL & ADSL
rewa_monami
DSL - ADSL
DSL - ADSL
tucho
Lan architecture
Lan architecture
Little Chixcath Guinet
Lan, man and wan ppt final
Lan, man and wan ppt final
Arushi Garg
Destaque
(18)
Networking 101
Networking 101
IPv6 introduction
IPv6 introduction
Attacking the spanning tree protocol
Attacking the spanning tree protocol
IP, DNS and MAC concepts
IP, DNS and MAC concepts
224_xDSL-ADSL-SDSL
224_xDSL-ADSL-SDSL
Configuring a Cisco Router as a PPPoE Client for DSL Connectivity
Configuring a Cisco Router as a PPPoE Client for DSL Connectivity
Adsl, adsl2, adsl2+ etc
Adsl, adsl2, adsl2+ etc
Ipv 4 and ipv6
Ipv 4 and ipv6
VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)
Adsl
Adsl
VTP
VTP
Laser on Hard Tissue
Laser on Hard Tissue
Dns protocol design attacks and security
Dns protocol design attacks and security
Lan chat system
Lan chat system
Presentation on DSL & ADSL
Presentation on DSL & ADSL
DSL - ADSL
DSL - ADSL
Lan architecture
Lan architecture
Lan, man and wan ppt final
Lan, man and wan ppt final
Semelhante a Networking & dns 101
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
Internet architecture protocol
Internet architecture protocol
GLIM Digital
Basic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
Mohammed Adam
Network and security concepts
Network and security concepts
sonuagain
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
ManishKumarH
Unit III
Unit III
APARNA P
Ip, subnet, gateway and routers
Ip, subnet, gateway and routers
Adrian Suarez
TCP/IP Introduction
TCP/IP Introduction
Dineesha Suraweera
IPS NAT and VPN.pptx
IPS NAT and VPN.pptx
karthikvcyber
network Fundaa.pptx
network Fundaa.pptx
ssusercb53d4
NETWORKING
NETWORKING
MuhammadShoaibHussai2
Internet architecture
Internet architecture
Naman Rastogi
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
Network Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) Essay
Jill Crawford
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
SamyakJain710491
Future protocol IP v6
Future protocol IP v6
Manesh Sharma
Final ppt
Final ppt
SAGAR RAJ
How the internet works
How the internet works
ftcim
Sharing and Controlling the IoT
Sharing and Controlling the IoT
APNIC
Mcse question
Mcse question
Computer Hardware & Trouble shooting
Semelhante a Networking & dns 101
(20)
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
Internet architecture protocol
Internet architecture protocol
Basic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
Network and security concepts
Network and security concepts
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
Unit III
Unit III
Ip, subnet, gateway and routers
Ip, subnet, gateway and routers
TCP/IP Introduction
TCP/IP Introduction
IPS NAT and VPN.pptx
IPS NAT and VPN.pptx
network Fundaa.pptx
network Fundaa.pptx
NETWORKING
NETWORKING
Internet architecture
Internet architecture
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Network Address Translation ( Nat ) Essay
Network Address Translation ( Nat ) Essay
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
Future protocol IP v6
Future protocol IP v6
Final ppt
Final ppt
How the internet works
How the internet works
Sharing and Controlling the IoT
Sharing and Controlling the IoT
Mcse question
Mcse question
Mais de Marc Cluet
Your Kernel and You
Your Kernel and You
Marc Cluet
Managing DevOps teams, staying alive
Managing DevOps teams, staying alive
Marc Cluet
The DevOps journey - How to get there painlessly
The DevOps journey - How to get there painlessly
Marc Cluet
Elastic Beanstalk, usos prácticos y conceptos
Elastic Beanstalk, usos prácticos y conceptos
Marc Cluet
Service discovery and puppet
Service discovery and puppet
Marc Cluet
Puppet Camp London Fall 2015 - Service Discovery and Puppet
Puppet Camp London Fall 2015 - Service Discovery and Puppet
Marc Cluet
Puppet and your Metadata - PuppetCamp London 2015
Puppet and your Metadata - PuppetCamp London 2015
Marc Cluet
Consul First Steps
Consul First Steps
Marc Cluet
Autoscaling Best Practices - WebPerf Barcelona Oct 2014
Autoscaling Best Practices - WebPerf Barcelona Oct 2014
Marc Cluet
Microservices and the Cloud - DevOps Cardiff Meetup
Microservices and the Cloud - DevOps Cardiff Meetup
Marc Cluet
Microservices and the Cloud
Microservices and the Cloud
Marc Cluet
How to implement microservices
How to implement microservices
Marc Cluet
A Metadata Ocean in Chef and Puppet
A Metadata Ocean in Chef and Puppet
Marc Cluet
Autoscaling Best Practices
Autoscaling Best Practices
Marc Cluet
Rackspace Hack Night - Vagrant & Packer
Rackspace Hack Night - Vagrant & Packer
Marc Cluet
Innovation in the Cloud - Rackspace Zurich Event
Innovation in the Cloud - Rackspace Zurich Event
Marc Cluet
Introduction to DevOps - Rackspace tech night
Introduction to DevOps - Rackspace tech night
Marc Cluet
Hadoop operations
Hadoop operations
Marc Cluet
Introduction to hadoop
Introduction to hadoop
Marc Cluet
Ssh that wonderful thing
Ssh that wonderful thing
Marc Cluet
Mais de Marc Cluet
(20)
Your Kernel and You
Your Kernel and You
Managing DevOps teams, staying alive
Managing DevOps teams, staying alive
The DevOps journey - How to get there painlessly
The DevOps journey - How to get there painlessly
Elastic Beanstalk, usos prácticos y conceptos
Elastic Beanstalk, usos prácticos y conceptos
Service discovery and puppet
Service discovery and puppet
Puppet Camp London Fall 2015 - Service Discovery and Puppet
Puppet Camp London Fall 2015 - Service Discovery and Puppet
Puppet and your Metadata - PuppetCamp London 2015
Puppet and your Metadata - PuppetCamp London 2015
Consul First Steps
Consul First Steps
Autoscaling Best Practices - WebPerf Barcelona Oct 2014
Autoscaling Best Practices - WebPerf Barcelona Oct 2014
Microservices and the Cloud - DevOps Cardiff Meetup
Microservices and the Cloud - DevOps Cardiff Meetup
Microservices and the Cloud
Microservices and the Cloud
How to implement microservices
How to implement microservices
A Metadata Ocean in Chef and Puppet
A Metadata Ocean in Chef and Puppet
Autoscaling Best Practices
Autoscaling Best Practices
Rackspace Hack Night - Vagrant & Packer
Rackspace Hack Night - Vagrant & Packer
Innovation in the Cloud - Rackspace Zurich Event
Innovation in the Cloud - Rackspace Zurich Event
Introduction to DevOps - Rackspace tech night
Introduction to DevOps - Rackspace tech night
Hadoop operations
Hadoop operations
Introduction to hadoop
Introduction to hadoop
Ssh that wonderful thing
Ssh that wonderful thing
Último
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
V3cube
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
Último
(20)
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Networking & dns 101
1.
Marc Cluet –
Lynx Consultants
2.
What we’ll cover? ¡
Understand how networking works ¡ Understand all the basic networking protocols ¡ Understand how DNS works ¡ Be more awesome! Lynx Consultants © 2013
3.
What is a
Network? ¡ A computer network, or simply a network, is a collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information.[1] Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. A network is a group of devices connected to each other. Networks may be classified into a wide variety of characteristics, such as the medium used to transport the data, communications protocol used, scale, topology, benefit, and organizational scope. (gotta love Wikipedia) Lynx Consultants © 2013
4.
So in plain
words… ¡ A network connects 2 or more computers together § LAN (Local Area Network) is inside a known location (office, home, etc) § WAN (Wide Area Network) is a network that connects two or more LANs Lynx Consultants © 2013
5.
The Internet ¡ Internet
is a network that connects in a fault tolerant way many networks ¡ Our current version of the Internet works over the protocol IPv4 with the new protocol IPv6 starting to have some presence Lynx Consultants © 2013
6.
Internet IPv4 ¡ The
most common protocol in Internet is right now IPv4 ¡ IPv4 has been the Internet protocol since 1980 (RFC 760) ¡ IPv4 uses 32 bit addresses, having a total space of 4,294,967,296 unique IPs Lynx Consultants © 2013
7.
IPv4 IP address ¡
An IPv4 IP address is divided in 8 bit chunks (1 byte per number) Lynx Consultants © 2013
8.
IPv4 IP netmask ¡
A netmask defines what your local network is, anything inside that netmask is considered local to you Lynx Consultants © 2013
9.
IPv4 Problems ¡ IPv4
is running out of IP addresses (last /8 delivered this year) ¡ IPv4 is not secure for most uses ¡ IPv4 was designed in the 70ies so its up for a review Lynx Consultants © 2013
10.
IPv6 saves the
day! ¡ IPv6 is the new internet protocol ¡ Uses 128 bit addresses ¡ There’s more IP addresses in IPv6 than atoms on planet Earth Lynx Consultants © 2013
11.
IP gateways ¡ As
IP is the Internet Protocol it has to know how to talk to other networks ¡ A gateway server is the one who sits in two networks at the same time, relying packets between those networks Lynx Consultants © 2013
12.
So then how
the Internet works? ¡ Gateways keep relying your message from network to network until it reaches the destination ¡ The path to reach its destination can change all the time Lynx Consultants © 2013
13.
IP protocols ¡ IP
can run lots of different protocols inside, the most known ones are § TCP (Transmission Control Protocol) § UDP (User Datagram Protocol) § ICMP (Internet Control Message Protocol) Lynx Consultants © 2013
14.
IP protocol definitions ¡
TCP sends packets with complete assurance that they’ll reach their destination ¡ UDP sends packets without any kind of assurance that they’ll reach their destination ¡ ICMP sends control messages auxiliary to the IP protocol (like ping, traceroute, etc) Lynx Consultants © 2013
15.
TCP Protocol ¡ Keeps
track of all the packets it sends (serial num) ¡ Destination acknowledges (ACK) every packet received ¡ Packets can arrive in any order and they’ll be reordered at destination Lynx Consultants © 2013
16.
TCP Ports ¡ TCP
can listen or talk in several “channels” at the same time ¡ Ports are the channels where TCP (and UDP) talk, there’s a total of 65,536 channels ¡ Most common Ports § 80 http § 443 https § 25 smtp § 110 pop3 § 143 imap Lynx Consultants © 2013
17.
UDP Protocol ¡ UDP
sends packets as TCP to ports, but there’s no guarantee that the packets will reach its destination. ¡ This is ideal for any kind of protocol that doesn’t need all its packets § Video Streaming § Radio Streaming Lynx Consultants © 2013
18.
ICMP Protocol ¡ ICMP
sends auxiliary messages that help Internet routing ¡ Used in all of our common diagnostic tools § PING (icmp echo) § TRACEROUTE (icmp route) Lynx Consultants © 2013
19.
ICMP - Ping ¡
Ping sends a packet to a destination and reads the reply ¡ Bases itself on ICMP echo ¡ Can be filtered by routers and inbetween policy filters Lynx Consultants © 2013
20.
ICMP - Traceroute ¡
Traceroute sends requests to every single hop between us and a destination ¡ This is based on one special type of ICMP packet ¡ Some routers can decide to filter traceroute, in that case * will appear instead of the TTL Lynx Consultants © 2013
21.
What is DNS? ¡
The Internet works with IP addresses ¡ How can we remember always that google is 173.194.67.103? ¡ It’s humanly impossible! Lynx Consultants © 2013
22.
DNS saves the
day ¡ DNS is a service (listens on UDP port 53) ¡ DNS will give you the IP address of any name you want ¡ It can give you more than one address for extra redundancy Lynx Consultants © 2013
23.
DNS Servers ¡ DNS
is also a security risk, you don’t want everyone to know your full DNS structure ¡ Big companies will show you a different DNS “view” based on where you are Lynx Consultants © 2013
24.
DNS Geo Balanced ¡
DNS is also very useful to be able to send you to the nearest point ¡ Try resolving www.google.com from different parts of the world! Lynx Consultants © 2013 www.google.com is 173.194.41.84 www.google.com is 74.125.26.104
25.
Questions? Lynx Consultants ©
2013
Baixar agora