Penguin
Diff: RootNameServer
EditPageHistoryDiffInfoLikePages

Differences between current version and previous revision of RootNameServer.

Other diffs: Previous Major Revision, Previous Author, or view the Annotated Edit History

Newer page: version 5 Last edited on Wednesday, November 24, 2004 10:02:22 pm by StuartYeates
Older page: version 4 Last edited on Wednesday, November 24, 2004 4:04:04 pm by MikeBeattie Revert
@@ -1,6 +1,6 @@
 There are 13 root name servers ; they all behave identically. Most are in North America although there are also servers in Japan and London. One of them (f.root-servers.net) is replicated in many places around the world, including at [APE] in NewZealand for domestic sites. 
-[ICANN] is responsible for the root servers, although many institutions run each individual server
+[ICANN] is responsible for the root servers, although local institutions run the individual servers
  
 All they do is respond to [DNS] queries by replying with the address of a nameserver for the top level domain for that query. 
  
 If you query a root name server with "www.example.com", it will reply with the address of one of the name servers for the ".com" top level domain. Verisign are in charge of the .com top level (as well as the .net TLD), so one of their name servers will be returned for example.com. 
@@ -21,8 +21,8 @@
 so for the next 2 days, my name server will remember these name servers for the ".com" domain. 
  
 In theory, the root name servers should not have **that** many requests, as the name servers below it only need to query it once every 2 days for each top-level domain (including the country codes, ccTLDs) that an incoming request is for. 
  
-In practise, badly configured machines and networks are constantly sending requests for names that shouldn't leave private networks (such as .elvis, .tla, etc). Some companies even block incoming [UDP] packets, so they never receive the DNS reply, and so keep sending out bad requests. Recent studies suggest that over 90% of all root server queries are invalid. 
+In practise, badly configured machines and networks are constantly sending requests for names that shouldn't leave private networks (such as .elvis, .tla, etc). Some companies even block incoming [UDP] packets, so they never receive the DNS reply, and so keep sending out bad requests. Recent studies suggest that over 90% of all root server queries are invalid, partly of course, because valid queries are cached and queries have good LocalityOfReference
  
 ---- 
 CategoryDns