Domain Name Server(DNS) :

The purpose of DNS (Domain Name Server) is to translate domain names into IP addresses. Whenever we use a domain name, a service is used for translating domain names into IP addresses is known as DNS. For example: www.techbaz.org might translate to 173.208.215.106. So what DNS basically translate the domain name "techbaz" into corresponding address.

File Compression System

If one DNS sever does not know how to translate the particular domain name, it asks another DNS server and this process continue until the correct IP address is returned. As in the above example, if one domain server does not know how to translate - www.techbaz.org , it will move to another DNS until the corresponding IP address 173.208.215.106 is returned. DNS scheme uses alphabets and it is easier to remember, but actually each domain name has an address and DNS scheme is used to convert this domain name into its corresponding address. In the Internet, the domain name space(tree) is divided into three different sections:
i) Generic domains ii) Country domains iii) Inverse domains

Generic Domains :

The generic domain define registered hosts according to their generic behavior. Each to the tree defines a domain, which is an index to the domain name space database. the first level in the generic domain section allows seven possible three character labels.

Generic top-level domains(gTLDs) :

DomainIntroductionDescription
.com1985Commercial organization
.gov1985Government authorities (government)
.edu1985Organizations of the educational system (educational)
.org1985Nonprofit organizations
.mil1985Military
.net1985Internet providers
.int1988International organizations
.aero2001Aviation industry (aeronautics)
.coop2001Cooperatives (cooperatives)
.museum2001Museums
.info2001Information services
.biz2001Businesses
.name2001Private individuals
.pro2004Specific professions (professional)
.cat2005Supporters/Users of the Catalan language and culture (catalan)
.jobs2005Company job advertisements
.jobs2005Company job advertisements
.mobi2005For mobile-optimized websites (mobile)
.tel2005Telecommunication
.travel2005People, companies, and organizations in the travel industry
.asia2007People, companies, and organizations from the Asian/Pacific region
.post2012Members of the Universal Postal Union

*More(huge amount) domains available on gTLDs.


Country Domains :

The country domain section follows the same format as the generic domains but uses two-character country abbreviations (Example: "in" for "India") in place of the three-character organizational abbreviations at the first level. Second level labels can be organizational, or they can be more specific, national destination.

Country top-level domain(ccTLD) :

DomainCountry
.adAndorra
.beBelgium
.caCanada
.dkDenmark
.eeEstonia
.fiFinland
.geGeorgia
.hkHong Kong
.inIndia
.jpJapan
.keKenya
.laLaos
.mmMyanmar
.npNepal
.plPoland
.qaQatar
.roRomania
.sgSingapore
.thThailand
.ukUnited Kingdom
.vaVatican City
.wfWallis and Futuna
.yeYemen
.zwZimbabwe

*More(country domains) domains available on ccTLDs.



Inverse Domains :

The inverse domain is used to map an address to a name. This may happen, for example, when a server receive a request from a client to do a task. Whereas the server has a file that contains a list of authorized clients, the server lists only the IP address of the client. To determine if the client is on the authorized list, it can send a query to the DNS server and ask for a map ping of address to name.



Encryption and Decryption (Data), Encoding and Decoding

Encryption and Decryption (Data), Encoding and Decoding Details :

Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Encryption algorithm is difficult.

Read More
Network Security and its Protection Methods

Learn more about Network Security and its Protection Methods :

Networking offers endless possibilities and opportunities, along with convenience. But this convenience and endless benefits are not free from risks.

Read More
Basics of Asymmetric Crypto-systems

Basics of Asymmetric Crypto-systems (Encryption, Decryption & Cryptography) :

In networking and telecommunications, it cannot be read by unauthorized users. Cryptography comes from the Greek words "secret writing".

Read More

Computer Science Engineering

Special Notes

It's a special area where you can find special questions and answers for CSE students or IT professionals. Also, In this section, we try to explain a topic in a very deep way.

CSE Notes