Escolar Documentos
Profissional Documentos
Cultura Documentos
of EEE
CS65-Computer Netowrk
Why DNS?
To identify an entity, TCP/IP uses IP address, which uniquely identify the connection of a host to the internet. But remembering a name is more convenient than numbers. Hence a system is needed to map the names into numbers. In TCP/IP, it is taken care by Domain Name System(DNS) To have a hierarchical name space, a domain name space was designed. In this design the names are defined in an inverted-tree structure with the root at the top. The tree can have only 128 levels: level 0 (root) to level 127.
1 2
S.Muralidharan
Dept. of EEE
CS65-Computer Netowrk
DNS in Internet
In internet, the Domain Name Space is divided into three : generic domains, country domains and inverse domains Generic Domains :
Define registered hosts according to their generic behavior. Each node in the tree defines a domain, which is an index to the domain name space data base.
The first level in the generic domain section allows seven possible three character labels. These labels describe the organization types.
Label com edu gov int mil net org Description Commercial organization Educational institution Government institution International organization Military groups Network support centers Nonprofit organizations Label Arts Firm Info Nom Rec Store Web Description Cultural organization Businesses or firms Information service providers Personal nomenclatures Recreation / entertainment organization Businesses offering goods to purchase Web-related organizations
S.Muralidharan
Dept. of EEE
CS65-Computer Netowrk
10
S.Muralidharan
Dept. of EEE
CS65-Computer Netowrk
14
Telnet
Users of internet wants to run several application programs in a remote site and create results that can be transferred to their local site. But it would be impossible to write a specific client-server programs for each demand. Hence a general purpose client-server program is needed which lets the user to access any application program on remote computer. TELNET (TErminaL NETwork) is a generalpurpose client/server application program.
Local Login
When a user logs into a local time sharing system it is called local login. As the user types at a terminal, the key strokes are accepted by the terminal driver and passed it to operating system. The operating system, in turn, interprets the combination of characters and invokes the desired application program or utility.
15
16
S.Muralidharan
Dept. of EEE
CS65-Computer Netowrk
Remote Login
When a user wants to access an application program or utility located on a remote machine, then it requires remote login. The user sends the keystroke to the terminal driver where the local operating system accepts the characters but does not interpret them. The characters are sent to the TELNET client, which transforms the characters to a universal character set called network terminal characters and delivers them to the local TCP/IP stack. These commands or text, in Network Virtual Terminal (N VT) form, travel through the internet and arrive at the TCP/IP stack at the remote machine. Here the characters are delivered to the operating system and passed to the TELNET server, which changes the characters to the corresponding characters understandable by the remote computer. Since the remote operating system may not be designed to receive the characters from TELNET server, it is designed to receive the characters from a pseudo terminal driver, which pretends that 17 the characters are coming from its own terminal.
18
Concept of NVT
19
20
S.Muralidharan
Dept. of EEE
CS65-Computer Netowrk
21
FTP establishes two connections between the hosts : one for data transfer and other for control information(commands and responses). Trivial File Transfer Protocol (TFTP) is designed to copy a file without the need for all of the 22 functionalities of the FTP protocol.
23
S.Muralidharan
Dept. of EEE
CS65-Computer Netowrk
Electronic Mail
One of the most popular Internet services is electronic mail (e-mail). TCP/IP protocol that (esupports electronic mail on the internet is called Simple Mail Transfer Protocol (SMTP). SMTP provides mail exchange between user on the same or different computers and supports :
Sending a single message to one or more recipients Sending message that include text, voice, video or graphics Sending message to users on networks outside the internet.
25 26
User Agent(UA)
User Agent (UA) is a software program used to send and receive mail. Some examples of command-driven user agents are mail, pine, and elm. Some examples of GUI-based user agents are Eudora, Outlook, and Netscape.
SMTP
SMTP clients and servers have two main components
User Agents Prepares the message, encloses it in an envelope. (Eudora for example) Mail Transfer Agent (MTA) Transfers the mail across the internet
27
S.Muralidharan
Dept. of EEE
CS65-Computer Netowrk
E-mail address
To deliver a mail, mail handling system must use a unique addressing system. SMTP addressing consists of the following two parts.
29
30
31
32
S.Muralidharan
Dept. of EEE
CS65-Computer Netowrk
When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs and a pair of MAAs. This is the most common situation today.
33
34
Format of an e-mail e-
SMTP range
35
36
S.Muralidharan
Dept. of EEE
CS65-Computer Netowrk
Connection Establishment
Message Progress
Connection Termination
S.Muralidharan
10