This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain.
RFC Downloads
Cited By
- De Coninck Q, Kalantari S, Sion L and Hughes D URLink: Using Names As Sole Internet Addresses to Tackle Scanning Attacks in IoT Proceedings of the First International Workshop on Security and Privacy of Sensing Systems, (15-21)
- Burnett S, Chen L, Creager D, Efimov M, Grigorik I, Jones B, Madhyastha H, Papageorge P, Rogan B, Stahl C and Tuttle J Network error logging Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (985-998)
- Stute M, Kreitschmann D and Hollick M One Billion Apples' Secret Sauce Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, (529-543)
- Tagami A, Yokota K, Sasaki C and Yamaoka K Splitting Control-User Plane on Communication Protocol for Spotty Network Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture, (26-31)
- Ellard D, Everhart C and Raj T (2012). Glitz, ACM SIGOPS Operating Systems Review, 46:3, (4-10), Online publication date: 18-Dec-2012.
- Zhu Z, Wakikawa R, Cheshire S and Zhang L Home as you go Proceedings of the 7th Asian Internet Engineering Conference, (89-95)
- Huang T and Chu K (2011). Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network, Journal of Network and Computer Applications, 34:6, (2027-2041), Online publication date: 1-Nov-2011.
- Xie M and Wang H A collaboration-based autonomous reputation system for email services Proceedings of the 29th conference on Information communications, (992-1000)
- Jacobson V, Smetters D, Thornton J, Plass M, Briggs N and Braynard R Networking named content Proceedings of the 5th international conference on Emerging networking experiments and technologies, (1-12)
- Jin S, Gyeong G and Eom Y Design and implementation of VoIP device management scheme in SOHO environments Proceedings of the 2nd international conference on Ubiquitous information management and communication, (580-584)
- Rikitake K, Nakao K, Shimojo S and Nogawa H (2008). UDP Large-Payload Capability Detection for DNSSEC, IEICE - Transactions on Information and Systems, E91-D:5, (1261-1273), Online publication date: 1-May-2008.
- Vixie P (2007). DNS Complexity, Queue, 5:3, (24-29), Online publication date: 1-Apr-2007.
- Liu F, Goering P and Heijenk G Modeling service discovery in ad-hoc networks Proceedings of the 4th ACM workshop on Performance evaluation of wireless ad hoc, sensor,and ubiquitous networks, (9-16)
- Zhang G, Ehlert S, Magedanz T and Sisalem D Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, (57-66)
- Singh K and Schulzrinne H (2007). Failover, load sharing and server architecture in SIP telephony, Computer Communications, 30:5, (927-942), Online publication date: 1-Mar-2007.
- Liquori L and Cosnard M Logical networks Proceedings of the 3rd conference on Trustworthy global computing, (90-107)
- Pala M and Smith S AutoPKI Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice, (154-169)
- Kohlmayer F, Tschofenig H, Falk R, Lopez R, Hernandez S, Segura P and Gómez Skarmeta A GSABA Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture, (51-56)
- Sohail S, Jha S, Kanhere S and Chou C (2006). QoS Driven Parallelization of Resources to Reduce File Download Delay, IEEE Transactions on Parallel and Distributed Systems, 17:10, (1204-1215), Online publication date: 1-Oct-2006.
- Wang X and Schulzrinne H (2006). Pricing network resources for adaptive applications, IEEE/ACM Transactions on Networking, 14:3, (506-519), Online publication date: 1-Jun-2006.
- Saint-Andre P (2005). Streaming XML with Jabber/XMPP, IEEE Internet Computing, 9:5, (82-89), Online publication date: 1-Sep-2005.
- Giordano M DNS-Based discovery system in service oriented programming Proceedings of the 2005 European conference on Advances in Grid Computing, (840-850)
- Uruena M and Larrabeiti D Nested Uniform Resource Identifiers Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications, (380-385)
- Turányi Z, Valkó A and Campbell A (2003). 4+4, ACM SIGCOMM Computer Communication Review, 33:5, (43-54), Online publication date: 1-Oct-2003.
- Koskelainen P, Schulzrinne H and Wu X A SIP-based conference control framework Proceedings of the 12th international workshop on Network and operating systems support for digital audio and video, (53-61)
- Bruening M, Snyder H and Logan M OTP in server farms Proceedings of the 2002 ACM SIGPLAN workshop on Erlang, (45-48)
- Guttman E (2001). Autoconfiguration for IP Networking, IEEE Internet Computing, 5:3, (81-86), Online publication date: 1-May-2001.
- Jiang W, Lennox J, Schulzrinne H and Singh K Towards junking the PBX Proceedings of the 11th international workshop on Network and operating systems support for digital audio and video, (177-185)
Recommendations
Comparing DNS resolvers in the wild
IMC '10: Proceedings of the 10th ACM SIGCOMM conference on Internet measurementThe Domain Name System (DNS) is a fundamental building block of the Internet. Today, the performance of more and more applications depend not only on the responsiveness of DNS, but also the exact answer returned by the queried DNS resolver, e.g., for ...
Securing DNS: Extending DNS Servers with a DNSSEC Validator
DNS Security Extensions (DNSSEC) is a proposed standard for securely authenticating information in the Domain Name System. DNSSEC validators check the digital signatures on DNS data. However, designing a validator worth the operational costs is a ...