Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

The main name system: an exercise in centralized computing

Published: 06 October 2005 Publication History

Abstract

Naming is a critical component of the internet architecture, and one whose complexity is often overlooked. As a global system, the DNS must satisfy millions of requests per second, while allowing distributed, delegated administration and maintenance. In this paper, we consider the design of the DNS and the widely distributed manner in which DNS records are published. We propose that the robustness and performance of the existing DNS could be dramatically improved by moving towards a centralized architecture while maintaining the existing client interface and delegated administration.

References

[1]
P. V. Mockapetris. Domain names -- concepts and facilities. RFC 1034, November 1987.]]
[2]
Open Systems Interconnection -- The Directory. Number X.500--586 in ITU--T Recommendations. ITU, 2001. (Also ISO/IEC Standard 9594:2001).]]
[3]
Paul V. Mockapetris and Kevin J. Dunlap. Development of the domain name system. In Proc. ACM SIGCOMM 1988, pages 123--133, August 1988.]]
[4]
D. Eastlake. Domain name system security extensions. RFC 2535, March 1999.]]
[5]
P. Vixie, O. Gudmundsson, D. Eastlake 3rd, and B. Wellington. Secret key transaction authentication for DNS (TSIG). RFC 2845, May 2000.]]
[6]
P. Vixie, S. Thomson, Y. Rekhter, and J. Bound. Dynamic updates in the domain name system (DNS UPDATE). RFC 2136, April 1997.]]
[7]
Internet Systems Consortium. Internet Domain Survey. http://www.isc.org/ops/ds/.]]
[8]
Jussi Kangasharju and Keith W. Ross. A replicated architecture for the domain name system. In Proc. 19th IEEE INFOCOM, volume 2, pages 660--669, March 2000.]]
[9]
Russ Cox, Athicha Muthitacharoen, and Robert T. Morris. Serving DNS using a peer-to-peer lookup service. In Proc. 1st IPTPS, volume 2429 of LNCS, pages 155--165, March 2002.]]
[10]
Venugopalan Ramasubramanian and Emin Gun Sirer. The design and implementation of a next generation name service for the internet. In Proc. ACM SIGCOMM 2004, August 2004.]]
[11]
Md Ahsan Habib and Marc Abrams. Analysis of sources of latency in downloading web pages. In Proc. 5th WebNet, October 2000.]]
[12]
Edith Cohen and Haim Kaplan. Prefetching the means for document transfer: A new approach for reducing web latency. In Proc. 19th IEEE INFOCOM, volume 2, pages 854--863, March 2000.]]
[13]
KyoungSoo Park, Vivek S. Pai, Larry Peterson, and Zhe Wang. CoDNS: Improving DNS performance and reliability via cooperative lookups. In Proc. 6th OSDI, pages 199--214, December 2004.]]
[14]
Jaeyeon Jung, Emil Sit, Hari Balakrishnan, and Robert Morris. DNS performance and the effectiveness of caching. In Proc. 1st IMW, pages 55--67, November 2001.]]
[15]
Vasileios Pappas, Zhiguo Xu, Songwu Lu, Daniel Massey, Andreas Terzis, and Lixia Zhang. Impact of configuration errors on DNS robustness. In Proc. ACM SIGCOMM 2004, August 2004.]]
[16]
D. J. Bernstein. Notes on the Domain Name System. http://cr.yp.to/djbdns/notes.html.]]
[17]
Men & Mice. BIND DNS Surveys. http://www.menandmice.com/6000/6200_bind_research.html.]]
[18]
Duane Wessels and Marina Fomenkov. Wow, that's a lot of packets. In Proc. 4th PAM, April 2003.]]
[19]
Duane Wessels. Is your caching resolver polluting the internet? In Proc. ACM SIGCOMM 2004, August 2004.]]
[20]
Paul Vixie, Gerry Sneeringer, and Mark Schleifer. Events of 21--Oct--2002. http://d.root-servers.org/october21.txt.]]
[21]
R. Bush, D. Karrenberg, M. Kosters, and R. Plzak. Root name server operational requirements. RFC 2870, June 2000.]]
[22]
Marvin Theimer and Michael B. Jones. Overlook: Scalable name service on an overlay network. In Proc. 22nd ICDCS, pages 52--61, July 2002.]]
[23]
Edith Cohen and Haim Kaplan. Proactive caching of DNS records: Addressing a performance bottleneck. In Proc. SAINT 2001, pages 85--94, January 2001.]]
[24]
Leslie Lamport. The part-time parliament. Digital SRC Research report 49, September 1989.]]
[25]
Chaoying Ma. Designing a universal name service. PhD thesis, University of Cambridge, 1992.]]
[26]
Richard Liston, Sridhar Srinivasan, and Ellen Zegura. Diversity in DNS performance measures. In Proc. 2nd IMW, pages 19--31, November 2002.]]
[27]
Jianping Pan, Y. Thomas Hou, and Bo Li. An overview of DNS-based server selections in content distribution networks. Computer Networks, 43:695--711, December 2003.]]
[28]
Jeffrey Pang, Aditya Akella, Anees Shaikh, Balachander Krishnamurthy, and Srinivasan Seshan. On the responsiveness of DNS-based network control. In Proc. 2nd IMC, pages 21--26, October 2004.]]
[29]
Amin Vahdat, Michael Dahlin, Thomas Anderson, and Amit Agarwal. Active names: Flexible location and transport of wide-area resources. In Proc. 2nd USITS, October 1999.]]
[30]
Verisign, Inc. Ensuring your company's online presence. June 2005. White paper. http://www.verisign.com/Resources/.]]
[31]
Andre Broido, Evi Nemeth, and kc claffy. Spectroscopy of DNS update traffic. In Proc. ACM SIGMETRICS 2003, pages 320--321, June 2003.]]
[32]
Tony Lee, Brad Huffaker, Marina Fomenkov, and kc claffy. On the problem of optimization of DNS root servers' placement. In Proc. 4th PAM, April 2003.]]
[33]
P. Danzig, K. Obrackza, and A. Kumar. An analysis of wide-area name server traffic. In Proc. ACM SIGCOMM 1992, 1992.]]
[34]
RIPE NCC. The RIPE Region Hostcount. http://ripe.net/info/stats/hostcount/.]]

Cited By

View all
  • (2022)Hotlist and stale content update mitigation in local databases for DNS flooding attacksTelecommunications Systems10.1007/s11235-022-00950-x81:3(417-430)Online publication date: 1-Nov-2022
  • (2020)Load Distributed and Benign-Bot Mitigation Methods for IoT DNS Flood AttacksIEEE Internet of Things Journal10.1109/JIOT.2019.29476597:2(986-1000)Online publication date: Feb-2020
  • (2019)TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchainFuture Generation Computer Systems10.1016/j.future.2019.09.037Online publication date: Sep-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 35, Issue 5
October 2005
96 pages
ISSN:0146-4833
DOI:10.1145/1096536
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 October 2005
Published in SIGCOMM-CCR Volume 35, Issue 5

Check for updates

Author Tag

  1. DNS

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Hotlist and stale content update mitigation in local databases for DNS flooding attacksTelecommunications Systems10.1007/s11235-022-00950-x81:3(417-430)Online publication date: 1-Nov-2022
  • (2020)Load Distributed and Benign-Bot Mitigation Methods for IoT DNS Flood AttacksIEEE Internet of Things Journal10.1109/JIOT.2019.29476597:2(986-1000)Online publication date: Feb-2020
  • (2019)TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchainFuture Generation Computer Systems10.1016/j.future.2019.09.037Online publication date: Sep-2019
  • (2018)Security and Privacy Analysis of National Science Foundation Future Internet ArchitecturesIEEE Communications Surveys & Tutorials10.1109/COMST.2018.279828020:2(1418-1442)Online publication date: Oct-2019
  • (2016)Decentralized Semantic IdentityProceedings of the 12th International Conference on Semantic Systems10.1145/2993318.2993348(177-180)Online publication date: 12-Sep-2016
  • (2016)On the Design of a Simple Network Resolver for DNS MiningProceedings of the 17th International Conference on Computer Systems and Technologies 201610.1145/2983468.2983513(105-112)Online publication date: 23-Jun-2016
  • (2016)Personal cloud interoperability2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)10.1109/WoWMoM.2016.7523546(1-3)Online publication date: Jun-2016
  • (2014)A CDN-based Domain Name SystemComputer Communications10.1016/j.comcom.2014.03.02145(11-20)Online publication date: Jun-2014
  • (2012)TrickleDNS: Bootstrapping DNS security using social trust2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)10.1109/COMSNETS.2012.6151334(1-10)Online publication date: Jan-2012
  • (2009)Topology Dissemination for Reliable One-Hop Distributed Hash TablesIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2008.14520:5(680-694)Online publication date: 1-May-2009
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media