Ae
Back to Notes

DNS: how the Internet turns names into destinations

14 min read9 days agoTechnical
Table of contents

DNS is not a giant contact book or a simple IP database. It is a hierarchical and distributed system that makes the Internet usable at human scale without requiring every user to memorize numerical addresses.

The problem DNS came to solve

Machines work well with addresses and formal structures. Humans, not so much. In the early years of connected networks, a rudimentary way of mapping names to addresses was using local files like HOSTS.TXT or other equivalents. While the ecosystem was small, that was manageable. But as the number of hosts, organizations, and changes grew, the model stopped scaling. There were too many entries, too many updates, and too much administrative friction.

DNS arose precisely to solve that bottleneck. Its goal was not just "translating a name to an IP," although that is the most common introductory explanation. Its goal was to create a distributed, scalable, and operationally viable naming mechanism across hosts, networks, protocol families, and different administrative institutions.

What DNS is, precisely

DNS, Domain Name System, is a hierarchical and distributed name system. Hierarchical because authority and the namespace are organized in a tree structure, from the root to top-level domains and from there to subdomains. Distributed because no single central database contains and serves all the answers in the world; authority is delegated across multiple zones and servers.

The practical consequence of this design is important: when a user queries a name, the system does not need to depend on a single omniscient machine. It can resolve iteratively or through a recursive resolver, relying on caches, referrals, and authoritative responses.

The basic structure: root, TLDs, zones, and authoritative servers

At the very top sits the DNS root. From there, delegation flows to top-level domains such as .com, .org, .net, .es, and many others. Below them appear the actual domains and their subdomains. What matters is not just the nomenclature, but the delegation of authority. An authoritative zone is a portion of the namespace over which a set of servers can respond with authority.

That allows administration to be distributed. The root does not need to know in detail every record of every domain in the world. It only needs to know whom to refer for each TLD. Likewise, a TLD does not need to hold all the information for every deep subdomain — it just needs to delegate correctly to whoever is responsible.

How a normal query is resolved

If a user types a domain in the browser, a recursive resolver usually intervenes — typically operated by the access provider, a company, or a public/private resolution service. If the answer is not in cache, the resolver starts searching. First it gets information from the root; then from the corresponding TLD; and finally from the authoritative servers for the specific domain. Once it retrieves the appropriate record, it returns the response to the client and usually caches it temporarily according to the TTL.

That path explains two things. First: DNS is not a query to a single magic server. Second: the system gains a lot of performance thanks to caching. If every query had to go up and down the full hierarchy every time, resolution would be considerably less efficient.

How a DNS lookup works

Step 1 of 6

Browser
Resolver
Root
TLD (.com)
Authoritative

You type a domain name into your browser

Resolvers, recursion, and iteration

There is often terminological confusion here. A stub resolver is the lightweight component of the operating system or application that formulates the initial query. A recursive resolver is the service that, if necessary, does the work of asking different levels of the system until it gets an answer. Authoritative servers, for their part, do not "search across the Internet"; they respond with authority over the zone they administer.

Understanding this separation avoids many misunderstandings. Your laptop normally does not interrogate the root, the TLD, and the authoritative server one by one: it delegates that work to a recursive resolver. And that resolver improves overall performance because it reuses cached responses for many clients.

Record types that really matter

Although it is sometimes simplified by saying DNS translates names to IPs, the system does more. A and AAAA records associate names with IPv4 and IPv6 addresses. CNAME records create aliases. NS records indicate which servers are authoritative for a zone. MX records serve to route email. TXT records are used for various operational and validation purposes, including many modern authentication and configuration mechanisms. And many other types exist depending on the need.

This turns DNS into a resource and service discovery layer, not just an address book. When a modern platform verifies a domain, publishes policies, or signals which services certain traffic should be sent to, it is very often using DNS as an operational signaling channel.

DNS record types

example.com
93.184.216.34

Zone file

example.com. 300 IN A 93.184.216.34

Points a domain to an IPv4 address. The most fundamental record type.

Why the system scales

DNS scales for three main reasons. First, because it distributes authority across zones instead of centralizing it completely. Second, because it uses caching to avoid repeating unnecessary work. And third, because it separates the naming problem from the transport problem fairly cleanly. DNS does not move a page's final content; it helps locate where the request needs to go.

Additionally, the system benefits from a global and very mature deployment. The root servers are not just thirteen isolated machines, but thirteen named authorities backed by a network of many internationally distributed instances. That combination of historical logic and modern anycast deployment helps provide resilience and operational proximity.

Where ICANN, IANA, and who maintains what

DNS does not exist in an institutional vacuum. The coordination of the root zone and many unique identifiers depends on IANA functions, today operated by PTI within the ICANN ecosystem. That does not mean ICANN manages every DNS response on the planet or dictates domain content. It means there is a coordination layer to maintain a coherent global namespace. Without it, it would be easier to fall into conflicts, duplications, or fragmentation.

At a more practical level, TLD registries, registrars, root server operators, resolver operators, and authoritative zone administrators also participate. DNS is, therefore, both a technical system and a system coordinated by multiple actors.

Limits and security problems

Classic DNS was designed in an era when the threat environment was very different. That is why it carries vulnerabilities and tensions that have been progressively mitigated over time. DNSSEC adds origin authentication and integrity to DNS data, but does not provide confidentiality. That is, it helps verify that certain data is authentic and has not been altered, but does not by itself hide the content of a query from anyone observing the traffic.

On the other hand, query privacy and confidentiality have been addressed with mechanisms like DNS over TLS and DNS over HTTPS, which do not replace the logical function of DNS but encapsulate resolution in encrypted transports to reduce exposure. This demonstrates once again a historical pattern of the Internet: base protocols rarely start out perfect; they tend to evolve by adding layers and mitigations as scale and the adversarial environment change.

TTL and propagation

Authoritative Server

example.com →93.184.216.34

ISP Madrid

Stale

93.184.216.34

ISP New York

Stale

93.184.216.34

CDN Edge

Stale

93.184.216.34

Corporate DNS

Stale

93.184.216.34

Waiting for DNS change

Why DNS matters more than it seems

DNS tends to be treated as a boring layer until it fails. And that is precisely where its importance becomes visible. If a company breaks a critical record, it can leave services inaccessible, email misconfigured, or validations impossible. If a resolver fails, the user's perception is that "the Internet is not working," even though the physical network is still up. If a zone is poorly delegated, the problems are not always obvious, but they can be severe.

That makes DNS one of the most invisible and, at the same time, most operationally sensitive technologies in the stack. It is unglamorous, but without it the human experience of the Internet would be much clumsier, more fragile, and more manual.

Closing

TCP/IP made it possible for networks to talk to each other. DNS made it possible for humans to move through that system without memorizing numerical addresses and without locally managing giant host maps. That is why DNS is not a minor appendage of the Internet, but one of its civilizing layers: the one that translates a complex technical architecture into a much more manageable cognitive interface. From here, the series can open naturally toward BGP, autonomous systems, root servers, DNS security, cloud, interconnection, and the physical geography of the network.