Você está na página 1de 10

Dept.

of EEE

CS65-Computer Netowrk

Why DNS?
To identify an entity, TCP/IP uses IP address, which uniquely identify the connection of a host to the internet. But remembering a name is more convenient than numbers. Hence a system is needed to map the names into numbers. In TCP/IP, it is taken care by Domain Name System(DNS) To have a hierarchical name space, a domain name space was designed. In this design the names are defined in an inverted-tree structure with the root at the top. The tree can have only 128 levels: level 0 (root) to level 127.
1 2

S.Muralidharan

Dept. of EEE

CS65-Computer Netowrk

DNS in Internet
In internet, the Domain Name Space is divided into three : generic domains, country domains and inverse domains Generic Domains :
Define registered hosts according to their generic behavior. Each node in the tree defines a domain, which is an index to the domain name space data base.

The first level in the generic domain section allows seven possible three character labels. These labels describe the organization types.
Label com edu gov int mil net org Description Commercial organization Educational institution Government institution International organization Military groups Network support centers Nonprofit organizations Label Arts Firm Info Nom Rec Store Web Description Cultural organization Businesses or firms Information service providers Personal nomenclatures Recreation / entertainment organization Businesses offering goods to purchase Web-related organizations

Existing Generic domain labels

Proposed Generic domain labels

S.Muralidharan

Dept. of EEE

CS65-Computer Netowrk

Inverse Domain Country Domains


Uses two-character country name abbreviations. Second levels can be organizational or more specific Used to map an address to a name. This will happen when a server wants to verify the authentication of a clients identity with its list of authorized clients list.
For instance, if a server receives a request from a client and this server has only the ip addresses of the clients in its list then the server needs to find out if this client is on its authorized client list. In order to determine if the client is on the authorized client list,server asks its resolver to query to the DNS server to map an address to name.

When referring De Anza College in Cupertino in California in the US

10

Domain names and labels


Name servers The Domain Name System is maintained by a distributed database system, which uses the client-server model. The nodes of this database are the name servers. Each domain has at least one authoritative DNS server that publishes information about that domain and the name servers of any domains subordinate to it. The top of the hierarchy is served by the root name servers, the servers to query when looking up (resolving) a Top Level Domain.
11

S.Muralidharan

Dept. of EEE

CS65-Computer Netowrk

Working of DNS Server

14

Telnet
Users of internet wants to run several application programs in a remote site and create results that can be transferred to their local site. But it would be impossible to write a specific client-server programs for each demand. Hence a general purpose client-server program is needed which lets the user to access any application program on remote computer. TELNET (TErminaL NETwork) is a generalpurpose client/server application program.

Local Login
When a user logs into a local time sharing system it is called local login. As the user types at a terminal, the key strokes are accepted by the terminal driver and passed it to operating system. The operating system, in turn, interprets the combination of characters and invokes the desired application program or utility.

15

16

S.Muralidharan

Dept. of EEE

CS65-Computer Netowrk

Remote Login
When a user wants to access an application program or utility located on a remote machine, then it requires remote login. The user sends the keystroke to the terminal driver where the local operating system accepts the characters but does not interpret them. The characters are sent to the TELNET client, which transforms the characters to a universal character set called network terminal characters and delivers them to the local TCP/IP stack. These commands or text, in Network Virtual Terminal (N VT) form, travel through the internet and arrive at the TCP/IP stack at the remote machine. Here the characters are delivered to the operating system and passed to the TELNET server, which changes the characters to the corresponding characters understandable by the remote computer. Since the remote operating system may not be designed to receive the characters from TELNET server, it is designed to receive the characters from a pseudo terminal driver, which pretends that 17 the characters are coming from its own terminal.

Remote log-in log-

18

Concept of NVT

Some NVT control characters

19

20

S.Muralidharan

Dept. of EEE

CS65-Computer Netowrk

File Transfer Protocol (FTP)


FTP is a mechanism provided by TCP/IP for copying a file from one host to another. FTP helps to resolve the problems like
When two hosts follow different file name conventions When two hosts follow different ways to represent text and data. When two systems have different directory structures.

21

FTP establishes two connections between the hosts : one for data transfer and other for control information(commands and responses). Trivial File Transfer Protocol (TFTP) is designed to copy a file without the need for all of the 22 functionalities of the FTP protocol.

23

S.Muralidharan

Dept. of EEE

CS65-Computer Netowrk

Electronic Mail
One of the most popular Internet services is electronic mail (e-mail). TCP/IP protocol that (esupports electronic mail on the internet is called Simple Mail Transfer Protocol (SMTP). SMTP provides mail exchange between user on the same or different computers and supports :
Sending a single message to one or more recipients Sending message that include text, voice, video or graphics Sending message to users on networks outside the internet.
25 26

User Agent(UA)
User Agent (UA) is a software program used to send and receive mail. Some examples of command-driven user agents are mail, pine, and elm. Some examples of GUI-based user agents are Eudora, Outlook, and Netscape.

SMTP
SMTP clients and servers have two main components
User Agents Prepares the message, encloses it in an envelope. (Eudora for example) Mail Transfer Agent (MTA) Transfers the mail across the internet

27

S.Muralidharan

Dept. of EEE

CS65-Computer Netowrk

E-mail address
To deliver a mail, mail handling system must use a unique addressing system. SMTP addressing consists of the following two parts.

Mail Transfer Agent(MTA)


Mail exchange takes place via MTA To send a mail, a system must have a client MTA, and to receive a mail, a system must have a server MTA.

29

30

First scenario in electronic mail


When the sender and the receiver of an e-mail are on the same system, we need only two user agents

Second scenario in electronic mail


When the sender and the receiver of an e-mail are on different systems, we need two UAs and a pair of MTAs (client and server).

31

32

S.Muralidharan

Dept. of EEE

CS65-Computer Netowrk

Third scenario in electronic mail


When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server).

Fourth scenario in electronic mail

When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs and a pair of MAAs. This is the most common situation today.

33

34

Format of an e-mail e-

SMTP range

35

36

S.Muralidharan

Dept. of EEE

CS65-Computer Netowrk

Connection Establishment

TCP Connection Establishment

Message Progress

Connection Termination

TCP Connection Termination

S.Muralidharan

10

Você também pode gostar