Generated by GPT-5-mini| Domain (computer networking) | |
|---|---|
| Name | Domain (computer networking) |
| Caption | Logical and administrative segmentation in networking |
| Introduced | 1980s |
| Standards | Internet Engineering Task Force, ICANN, IANA |
| Related | Domain Name System, Active Directory, Kerberos, LDAP |
Domain (computer networking) A domain in computer networking denotes a logical grouping of networked resources, administrative authority, and policy boundaries used to organize, identify, and control access to computers, services, and users across networks. Domains underpin addressing, authentication, and management models deployed by organizations such as Internet Assigned Numbers Authority, ICANN, Microsoft Corporation, and standards bodies like the Internet Engineering Task Force. Domains intersect with internet architecture, directory services, and security frameworks used by institutions including National Institute of Standards and Technology, MITRE Corporation, and European Union agencies.
A domain represents an administrative and technical scope in which naming, policy, and control apply, comparable to the administrative zones operated by United Nations, World Health Organization, and The World Bank in governance contexts; it can be instantiated as a namespace, authentication realm, or management boundary managed by entities such as Microsoft Corporation, Red Hat, Oracle Corporation, and Google. Domains are central to architectures promulgated by Internet Engineering Task Force working groups, referenced in operational practice at Amazon Web Services, IBM, Cisco Systems, and in regulatory discussions involving European Commission. Use cases span enterprise networks at Harvard University, Stanford University, and NASA to public infrastructures maintained by Verizon Communications and AT&T.
The Domain Name System provides hierarchical naming and resolution services for internet domains, a protocol family standardized by Internet Engineering Task Force and operationalized by ICANN, IANA, and root server operators including those run by Verisign, AFNIC, and RIPE NCC. DNS zones map to domain names used by organizations like The New York Times, BBC, and Amazon.com; resolvers follow specifications in RFCs authored by engineers such as Paul Mockapetris and working groups coordinated by IETF. DNS supports delegation, resource records, and distributed management practiced by cloud providers such as Microsoft Azure and Google Cloud Platform, and is implicated in incidents investigated by agencies like Federal Bureau of Investigation and EUROPOL.
Administrative domains denote control by a single organization—examples include the network realms of Microsoft Corporation's Active Directory, the cloud accounts of Amazon Web Services, and the institutional networks of University of Oxford or Massachusetts Institute of Technology. Administrative boundaries reflect policy demarcations similar to those in treaties like the Treaty of Maastricht for political union; they are implemented in enterprise settings by vendors such as Cisco Systems, Juniper Networks, and VMware. Security domains relate to trust and authentication frameworks like Kerberos deployed by MIT, Carnegie Mellon University, and corporations including IBM; security domains map to accreditation regimes used by National Institute of Standards and Technology and compliance regimes followed by Federal Aviation Administration.
Domain names follow hierarchical rules with top-level domains administered by ICANN and registries like Verisign for .com, Public Interest Registry for .org, and country-code operators such as Nominet for .uk and AFNIC for .fr. Second-level and subdomains are managed by registrants including The Walt Disney Company, Sony, and Walmart; naming conventions are shaped by standards from IETF and governance discussions involving World Trade Organization stakeholders. Internal naming inside enterprise domains is handled by directory services such as Active Directory, OpenLDAP, and identity platforms from Okta and Ping Identity, with schema influences from projects at MITRE Corporation and specifications like LDAP RFCs.
Domain management encompasses registration, delegation, zone administration, and policy enforcement conducted by registrars like GoDaddy, Network Solutions, and registries operated by APNIC, ARIN, and LACNIC. Enterprise domain administration involves identity lifecycle and group policy enforced by Microsoft Corporation's Active Directory, virtualization and segmentation by VMware, and orchestration platforms from Kubernetes contributors such as Google and Red Hat. Change control and incident response intersect with standards and frameworks provided by ISO, NIST, and organizations like SANS Institute that train administrators at institutions including Stanford University and Carnegie Mellon University.
Trust within domains is established through authentication, authorization, and accounting models using technologies such as Kerberos, Public Key Infrastructure, and protocols standardized by IETF and implemented by vendors including Microsoft, Apple Inc., and Red Hat. Certificate authorities such as DigiCert and Let's Encrypt anchor trust for DNSSEC and TLS used by services like Cloudflare and Akamai Technologies, while federated identity systems from SAML and OAuth ecosystems are adopted by platforms including Salesforce, Slack Technologies, and Dropbox. Threat modeling and mitigation reference guidance from NIST, historical incidents investigated by FBI, and defense-in-depth practices employed by critical infrastructure operators like Department of Energy and Department of Defense.
Category:Computer networking