DNS Thesis of sorts

Posted on 2009-04-16
Last Modified: 2013-11-25
I am looking to do a paper on the DNS system for my high school IB extended essay.  The requirements for the paper are that the topic is well researched, which DNS obviously is, and that it is specific.  The topic, DNS, is not specific enough.  I am wondering if anyone has any ideas as to what specific topic I can look into under the general topic of DNS.  
Question by:huntson
    LVL 3

    Expert Comment

    Research on how useless the school study guide is when you practically try to set up a DNS server.
    ... I am serious.
    LVL 4

    Accepted Solution

    How about the critical infrastructure part of it and what a fundamental part of the Internet or any Network it is  that is ignored by most people.

    You can mention the mayhem caused when a part was taken down. There were several DDOS attacks in the recent months that targetted ThePlanet,, UltraDns even.  All 3 are major DNS providers for multiple sites / users and servers.

    Most other internet services depend on DNS to function correctly.



    Author Comment

    How does a DDOS attack occur?
    That is a good point - the school study guide never works.
    LVL 4

    Assisted Solution

    A DDOS attack is a malicious and criminal act that renders computer systems unreachable.

    It basically works by flooding the target machine with so much traffic, usually from compromised machines that form a botnet of many thousands of machines.  The traffic overwhelms the services DNS in this instance, causing legitimate users not being able to access the service.

    You can read more at:




    Author Comment

    I will get back to you on a thesis or two that I think are appropriate after the re-read the guidlines and you can let me know if it is feasable
    LVL 38

    Expert Comment

    How about the chronology of a DNS query, (from client to an outside server). You will learn a lot on DNS using that topic, especially how to troubleshoot it.

    Author Comment

    Well the whole idea got nixed.  Who do I award points to other than myself?

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Join & Write a Comment

    Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
    Join Greg Farro and Ethan Banks from Packet Pushers ( and Greg Ross from Paessler ( for a discussion about smart network …
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    729 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now