Sunteți pe pagina 1din 15

1.

REVIEW OF NETWORK CONCEPTS


1.1. PACKETS, FRAMES AND ERROR DETECTION

Packets: - Logical grouping of information that includes a header containing control


information and user data is called packet. Packets are most often used to refer to network
layer units of data.
Frame: - The basic package of information on a network channel is called frame. In other
words, it is a logical grouping of information sent as a data link layer unit over a transmission
medium.
Error Detection: - Error control provides error detection and correction. There are two basic
strategies for dealing with errors. These are: -
(a) To include only enough redundancy to allow the receiver to confirm that an error
occurred, but not aware of which error and therefore request it for re-transmission.
(b) Second method is to include enough unwanted data along with each block of data
sent to enable the receiver to extract what the transmitted character must have
been.
1.2. NETWORK TOPOLOGY, REPEATERS, BRIDGES, SWITCHES

Network Topology: - Topology is the method in which networks are physically connected
together. Topology determines the complexity of connecting computer, the strategy for
physically expanding the network, in future. There are three type of topology is used: -
(i) Bus Topology: - Bus topology is a network geometric arrangement in which a single
connecting line is shared by a number of nodes. In linear bus topology, all computers are
connected by a single length of cable with a terminator at each end. Each node is
connected to two others except the machines at either end of the cable, which are
connected only to one other node. Examples of Bus Topology are Ethernet, Local Talk etc.
Advantage of Bus Topology:
(a) This topology is simple, reliable, and easy to use and understand in small sized LANs.
(b) This topology requires least amount of cable to connect the computers together.
(c) This type of topology is easy to extend.
(d) This topology is less expensive than other cabling arrangements.
Disadvantage of Bus Topology:
(a) There is possibility of collision, thus in this case data packets may be lost.
(b) Heavy network traffic can slow down a bus considerably.
(c) It is difficult to troubleshoot a bus.
(ii) Ring Topology: - Physical layout of Ring Topology based LAN is circular. Means that each
workstation is connected with it neighbors. Transmission can be done in only one direction,
either clockwise or anticlockwise. It is decided at the time of network design.
Token Passing: - It is a mechanism i.e. used with Ring Topology based LAN to make
transmission possible between two or more work stations.
Token is nothing but a small program. When network is on, this program starts
moving from one node to another in specific direction.
If a work station has to access the service of network, then it has to wait for token.
Once token becomes available to the node, it grabs the token make its transmission /work,
after completion of transmission, it has to release the token.
Advantage of Ring Topology:
(a) Installation cost of Ring Topology may cheaper.
(b) No one computer can monopolize the network.
(c) The fair sharing of the network allows the network to degrade gracefully as more
users can added.
Disadvantage of Ring Topology:
(a) Failure of a node may interrupt the system.
(b) It is difficult to troubleshoot a ring network.
(c) Adding or removing computers disrupts the network.
INTERNET AND WEB TECHNOLOGY
(iii) Star Topology: - Star Topology based LAN based on an electronic device namely
Hub. All terminals including server are connected with central Hub. A Hub receives the
signal from source and sends it to the destination. Example of Star Network is ATM
(Asynchronous transmission Mode). There are two types of Hub: -
(a) Active Hub: - The active hub regenerates the electrical signal and sends it to all
connected computers.
(b) Passive Hub: - Passive hub doesn’t generate electrical signal but acts as a connecting
point.
Advantage of Star Topology:
(a) It is easier to modify i.e. easy to add new terminal and easy to remove a
particular terminal from a network. It doesn’t disturb/affect the network.
(b) It is easy to troubleshoot.
(c) Failure of a single terminal doesn’t interrupt the whole network.
(d) To install this network several types of cables can be used.
Disadvantage of Star Topology:
(a) Failure of central hub interrupts the whole network.
(b) It is considered as expensive network.
(c) Additional resources are required in case of broadcast implementation.
1.3. WAN TECHNOLOGIES AND ROUTING

WAN (Wide Area Network): - WANs operate at a much wider geographical distance than LANs.
They combine the continuous error detection and correction techniques included in
synchronous communications with robust network problem determination and data routing to
form powerful backbones that ensure high-quality, reliable service for end users. These
networks allow multiple users to access a variety of host computers simultaneously through
the same physical medium, while separating each user’s session so that no user is aware of
another on the network. Some of the functions that can be performed on WANs are given
below:-
Remote Data and Job Entry: - It is possible to enter data of the sales and transactions at
the point-of-sale terminals using WANs. It is also possible to centralize this data in a computer
for processing or reporting purposes. Remote Job Entry at colleges and universities enable
faculty and students to write and execute their own
programs on a central computer.
Centralizing information – It is often convenient for a Application Layer
business to centralize regional/national information. WANs
enable such dealers to query centralized databases.
Facilitating Communications – Corporations in advanced
countries often use WANs to facilitate employee Presentation Layer
communications, to save on long-distance phone calls and
letter writing, to cut costs on the preparation of written
documents, and to overcome the time lags involved in
overseas communications. Video-conferencing, in which
Session Layer
users communicate with each other through their computer
systems, is another possible function of WANs.
Routing: - A Router interconnects two or more physically and Transport Layer
logically separate network segments and operates at the
Network layer. Segments are joined together with a router,
which maintains a separate logical identity. It constitutes an
Internet work-a group of networks linked by routers.
Network Layer
The process of choosing the best path
throughout the LAN. Routing lets PCs which are not directly
connected communicate by passing messages along to Data Link Layer
adjacent PCs.
1.4. OSI STACK AND TCP/IP MODEL

OSI Stack: -
Physical Layer

NOTES BY – BALJEET SINGH SINWAR OSI STACK


14
INTERNET AND WEB TECHNOLOGY
Main objectives of OSI Models are: -
 Allow to interconnected two systems through standard interface.
 Each layer performs a well-defined function.
 The function of each layer should be chosen according to international
standard protocols.
 Each lower level protocol provides its services to higher-level protocol.
 The seven layers of OSI reference Model are: -
(i) Physical Layer: - All electrical and mechanical devices, these are used to connect two
terminals, two nodes, medium etc. considered as the devices of physical layer. In other
words mostly hardware are categorized into physical layer. These are involved in
interconnecting two points of a network as well as carry bit stream.
(ii) Data Link Layer: - The Data Link Layer is the second layer of OSI Model. The Data Link
Layer together with physical layer and the interconnectivity medium provide a data link
connection between source station and destination station for reliable transfer of
database.
Services provide by Data Link Layer: -
(a) Flow Control – Flow Control deals with how to keep the fast sender from over flowing a
slow receiver by buffer at the receiver sides and acknowledgement.
(b) Framing – Some control bits are added to the data packets these are received from
network layer. The bits are associated with start and end frames.
(c) Error Detection and Correction Course – Various methods are use for such purpose. Some
popular methods are parity bit, checksum etc.
(iii) Network Layer: - The Network Layer provides services to the transport layer. It can be
based on ether virtual circuits or data grams. In both cases its main job is routing
packets from source to destination. In case of virtual circuit subnet, a routing decision is
made when virtual circuit is setup.
In case of data gram subnet, routing decision is made on
every incoming package.
(iv) Transport Layer: - This Layer is responsible provide reliable cost effective data transport
from source machine to destination machine. Transport Layer also provides some
additional services associated with data transportation. Two protocols are used with
transport layer to provide such services. These are: -
(a) TCP (Transmission Control Protocol)
(b) UDP (User Data Protocol)
(v) Session Layer: - Main functionality of this layer is to establish and release the session.
The session layer allows users on different machines to establish session between them.
Session can allow going both directions. One of the services of the session layer is to
manage dialog control.
(vi) Presentation Layer: - Presentation Layer mainly manages the formats of information.
(vii) Application Layer: - Several protocols are available under this layer. Large number of
terminals are connected with the system and requires verify of services.

TCP/IP: - TCP reference model is implemented with or suitable form those computer network
architecture that allow communication across multiple
divers network. TCP/IP network architecture consists of four Application Layer
layers: -
(i) Application Layer: - The Application Layer provides
services that can be used by other
Transport Layer
applications for example protocols have been
developed for remote login, for e-mail, for file
transfer etc. the application layer program run
directly over the transport layer. Internet Layer
(ii) Transport Layer: - Two basic services are provided
by this layer: -
NOTES BY – BALJEET SINGH SINWAR Network Interface Layer
14
TCP/IP Suite
INTERNET AND WEB TECHNOLOGY
The first service consists of reliable connection
Oriented transfer of byte stream, which is provided by TCP. The second service
consists of connectionless transfer of individual package i.e. provided by UDP.
UDP is used for applications that require quick but reliable delivers.
The TCP/IP Model doesn’t require strict layering.
In other words the application layer has the option of by passing intermediate
layer.
(iii) Internet Layer: - The Internet layer handles the transfer of information access
multiple networks through the use of gateways or routers. It has similar function
as network layer of OSI Model. A key aspect of the Internet layer is the definition
of global unique address for the machines that are attached with the Internet.
The Internet layer provides a single service namely best effort connectionless
packet transfer. For this packets are also called data grams. The connectionless
approach makes the system robust i.e. if failures occur in the network the
packets are routed around the point of failure. There is no need to setup the
connection.
(iv) Network Interface Layer: - Network Interface Layer is concern with the network
specific aspects of the transfer of packets. It must deal with port of network layer
and data link layer. The network interface layer is particularly concern with the
protocols that access the intermediate networks.

2. IP ADDRESSING
02.01. SCHEME

An IP address is a software address, not a hardware address, which is a hard code in the
machine or network interface card. This address is made up of 32 bits of information. These
bits are divided into four sections containing one byte (8 bit each). These sections are
referred to as Octets. There are three methods for depicting an IP address:
• Dotted-decimal, as in 130.57.30.56
• Binary, as in 10000010.00111001.00011110.00111000
• Hexadecimal, as in 82 39 1E 38
All the three examples given above represent the same IP address. The 32 bit IP addressing is
a two level hierarchical addressing scheme. The first part is designated as network address
and the other part of the address is designated as a node address. The network address
uniquely identifies each network. Every machine on the same network shares that network
address as part of its IP address.
The node address is assigned to, and uniquely identifies, each machine on the network.
This part of the address must be unique because it identifies a particular machine. The
number can also be referred to as a host address.
02.02. HIERARCHY CLASS

The designers of the Internet decided to create classes of networks based on network size.
For a small number of networks possessing a very large number of nodes, they created the
rank Class A Network. At the other stream is the Class C Network, reserved for the numerous
networks with a small number of nodes. The class distinction for networks in between very
large and very small is called a Class B Network.
(a) Class A Network –
In Class A Network, the first byte is assigned to the network address, and the three
remaining bytes are used for the node addresses. The Class A format is:
Network.Node.Node.Node
For example, in the IP address 49.22.102.70, 49 is the network address and 22.102.70 is
the node address.
(b) Class B Network –
In Class B Network, the first two bytes are assigned to the network address, and the
remaining two bytes are used for the node addresses. The Class B format is:
NOTES BY – BALJEET SINGH SINWAR
14
INTERNET AND WEB TECHNOLOGY
Network.Network.Node.Node
For example, in the IP address 130.57.30.56, 130.57 is the network address and 30.56 is
the node address.
(c) Class C Network –
In Class C Network, the first three bytes are assigned to the network address, and the
remaining one byte is used for the node address. The Class C format is:
Network.Network.Network.Node
For example, in the IP address 198.21.74.102, 198.21.74 is the network address and 102 is
the node address.
(d) Additional Classes of Networks –
Another class of network is Class D. this range of addresses is used for multicast pakets.
The range of numbers is from 224.0.0.0 to 239.255.255.255. a multicast transmission is
used when a host wants to broadcast to multiple destinations. Hosts do this when
attempting to learn of all the routers on its network.
There is also a Class E range of numbers starting at 240.0.0.0 and running to
255.255.255.255. These numbers are reserved for future use. One should not assign Class
D and E addresses to nodes on any networks.

3. IP DATAGRAM
03.01. HEADER

During Transportation TCP/IP adds some additional information to the data packet i.e.
associated with transportation service, called TCP Header. Sections of TCP Header:
(i) Source and destination port number – values of this field identifies the local port
number.
(ii) Sequence
Number –
sequence
number
identifies the
current
sequence
number of data
segment.
(iii) Data offset –
values of this
field identifies the
start of data.
(iv) Flags –
(a) URG (Urgent Flag) – value of this field identifies the urgent pointer. It is
considered as urgent flag.
(b) ACK (Acknowledgement Flag) – value of this field associated with
acknowledgement of the packet.
(c) PSH (Push Flag) – This flag performs push function.
(d) RST (Reset Flag) – it performs reverse of push function.
(e) SYN (Synchronization Flag) – value of this field associated with sequence
synchronization.
(f) FIN (Final) – End of transmission flag.
(v) Window Size – This field contains the values associated with strength of destination
station, how many byte (data block) the receiving host can accept at a time?
(vi) Checksum – Checksum for data and header.
(vii) Urg Ptr(Urgent Point) – The value of this field identifies specific type of data area.

03.02. VIRTUAL PACKET

NOTES BY – BALJEET SINGH SINWAR


14
INTERNET AND WEB TECHNOLOGY
Connectionless internet service allows a sender to transmit individual packets of data across
an internet. Each packet travels independently and contains information that identifies the
internet recipient. These types of packets are called virtual packet. A router is used to send
and receive these packets from one network to another. As the term virtual implies, protocol
software creates and handles internet packets, the underlying hardware does not understand
or recognize the internet packet format.

03.03. ROUTING TABLES

The Routing table contains a set of entries that each specifies a destination and the next hop
used to reach that destination. Each destination listed in a routing table is a network, not an
individual host. The distinction is important because an internet can contain over 1000 times
as many hosts as networks. For example in given below figure, router R 2 connects directly to
the networks labeled Net 2 and Net 3. Therefore R2 deliver a datagram to any destination
attached to those networks. When a datagram is destined for network 4, R2 sends the
datagram to router R3.
R1 R2 R3

Destination Next Hop


Net 1 R1
Net 2 Deliver direct
Net 3 Deliver direct
Net 4 R3
03.04. DATAGRAM FORWARDING

The process of using a routing table to select a next hop for a given datagram is called routing
or forwarding. Now we assume that the datagram contains a destination IP address D. the
routing software must find an entry in the routing table that specifies a next hop for D. to do
so, the software examines each entry in the table by using the mask in the entry to extract a
prefix of address D and comparing the result to the Destination field of the entry. If the two
are equal, the datagram will be forwarded to the Next hop in the entry.

03.05. ENCAPSULATION, FRAGMENTATION, REASSEMBELY

Encapsulation – Encapsulation is a technique to transmit datagram across a physical layer.


When an IP datagram is encapsulated in a frame, the entire datagram is placed in the data
area of a frame. The network hardware treats a frame that contains a datagram exactly like
any other frame.

Fragmentation – The technique IP uses to divide a large datagram into smaller datagrams
called fragments. The ultimate destination reassembles the fragments. The fragmentation
scheme has been planned carefully to make it possible to further fragment a fragment.
Another router along the path divides the fragment into smaller fragments. In a poorly
designed internet where networks are arranged in a sequence of decreasing MTUs, each
router along the path must further fragment each fragment.
Reassembly – The process of creating a copy of the original datagram from fragments is
called reassembly. Each fragment begins with a copy of the original datagram header, all
fragments have the same destination address as the original datagram from which they were
derived. The fragment that carries the final piece of data has an additional bit set in the

NOTES BY – BALJEET SINGH SINWAR


14
INTERNET AND WEB TECHNOLOGY
header. Thus a receiver performing reassembly can tell whether all fragments have arrived
successfully.

4. FDD
04.01. DATAGRAM FORMAT

The general form of an IPv6 datagram given below. An IPv6 datagram begins with a base
header, which is followed by zero or more extension headers, followed by data. In particular,
some extension headers are larger than the base header, while other can be smaller.

04.02. FRAGMENTATION

IPv6 fragmentation resembles IPv4 fragmentation, the details differ. Like IPv4, a prefix of the
original datagram is copied into each fragment, and the payload length is modified to be the
length of the fragment. Unlike Ipv4, however, IPv6 does not include fields for fragmentation
information in the base header. Instead, IPv6 places them in a separate fragment extension
header; the presence of the header identifies the datagram as a fragment. Figure illustrates
IPv6 fragmentation.

04.03. REASSEMBLY

The process of creating a copy of the original datagram from fragments is called reassembly.
Each fragment begins with a copy of the original datagram header, all fragments have the
same destination address as the original datagram from which they were derived. The
fragment that carries the final piece of data has an additional bit set in the header. Thus a
receiver performing reassembly can tell whether all fragments have arrived successfully.

04.04. PATH MTU, ADDRESSING AND HEXADECIMAL NOTATION

Path MTU - The minimum MTU along a path from a source to destination is known as the path
MTU and the process of learning the path MTU is known as path MTU discovery. In general,
path MTU discovery is an iterative procedure. A host sends a sequence of various-size
datagrams to the destination to see if they arrive without error. Once a datagram is small
enough to pass through without fragmentation, the host chooses a datagram size equal to the
path MTU.

NOTES BY – BALJEET SINGH SINWAR


14
INTERNET AND WEB TECHNOLOGY
Addressing – Like IPv4, IPv6 assigns a unique address for each connection between a
computer and a physical network. Thus, if a computer (e.g. a router) connects to three
physical networks, the computer is assigned three addresses. Also like IPv4, IPv6 separates
each such address into a prefix that identifies the network and a suffix that identifies a
particular computer on the network.
Hexadecimal Notation – An address that occupies 128 bits can accommodate Internet growth,
writing such numbers can be unwidely. For example, consider a 128-bit number written in
dotted decimal notation:
105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255
The designers of Ipv6 propose using a more compact syntactic form known as colon
hexadecimal notation in which each group of 16 bits is written in hexadecimal with a colon
separating groups. For example, when the above number is written in colon hex, it becomes:
69DC:8864:FFFF:FFFF:0:1280:8C0A:FFFF

5. TCP
05.01. PROTOCOL

Protocol means the set of rules or standards designed to enable computers to be connected
with one another and to exchange information among them with very little error. Protocol can
describe low level details of machine-to-machine interfaces or high-level exchange between
allocation programs.
Protocol specifies the computer language used to transfer information.
Specifically, a protocol tells the browser where the information is located. It also tells the
browse what to expect from the document retrieval process.
Transport protocols provide reliability, which is fundamental for many
applications. The Transmission Control Protocol (TCP) is the transport level protocol that
provides reliability in the TCP/IP protocol suite.

05.02. SERVICE TO APPLICATION

TCP provides a completely reliable, connection-oriented, full-duplex stream transport service


hat allows two application programs to form a connection, send data in either direction, and
then terminate the connection. Each TCP connection is started reliably and terminated
gracefully, with all data being delivered before the termination occurs. From an application
program’s point of view, the service offered by TCP has seven major features:
 Connection Oriented – TCP provides connection oriented service in which an application
must first request a connection to a destination, and then use the connection to
transfer data.
 Point-to-Point Communication – Each TCP connection has exactly two endpoints.
 Complete Reliability – TCP guarantees that the data sent across a connection will be
delivered exactly as sent, with no data missing out of order.
 Full Duplex Communication – TCP connection allows data to flow in either direction, and
allows either application program to send data at any time.
 Stream Interface – TCP provides a stream interface in which an application sends a
continuous sequence of octets across a connection.
 Reliable Connection Startup – TCP requires that when two applications create a
connection, both must agree to the new connection.
 Graceful Connection Shutdown – An application program can open a connection, send
arbitrary amounts of data, and than request that the connection be shut down.

05.03. RELIABILITY, RETRANSMISSION, FLOW CONTROL

NOTES BY – BALJEET SINGH SINWAR


14
INTERNET AND WEB TECHNOLOGY
Reliability – TCP must be carefully designed to achieve reliability. The major problems are:
unreliable delivery by the underlying communication system and computer reboot. To
understand the scope of the problem, consider a situation in which two application programs
from a TCP connection, communicate, close the connection and then form a new connection.
Because any
message can be lost,
duplicated, delayed,
or delivered out of
order, messages
from the first
connection can be
duplicated and a
copy delayed long
enough for the
second connection to
be established.
Messages must be
unambiguous, or the
protocol will accept
duplicate messages
from the old
connection and allow
them to interface
with the new
connection.

Retransmission – TCP uses a variety of techniques to handle parts of the problem. One of the
most important techniques is retransmission. When TCP sends data, the sender compensates
for packet loss by implementing a retransmission scheme. Both sides of a communication
participate. When TCP receives data, it sends an acknowledgement back to the sender.
Whenever it sends data, TCP starts a timer. If the timer expires before an acknowledgement
arrives, the sender retransmits the data. Figure illustrates retransmission.

Flow Control – TCP uses a window mechanism to control the flow of data. When a connection
is established, each end of the connection allocates a buffer to hold incoming data, and sends
the size of the buffer to the other end. As data arrives, the receiver sends acknowledgements,
which also specify the remaining buffer size. The amount of buffer space available at any time
is called the window, and a notification that specifies the size is called a window
advertisement. A receiver sends a window advertisement with each acknowledgement.

05.04. THREE WAY HANDSHAKE

To guarantee that connections are established or terminated reliably, TCP uses a 3-way
handshake in which three messages are exchanged. TCP uses term synchronization segment
(SYN segment) to describe messages in a 3-way handshake used to create a connection, and
the term FIN segment to describe messages in a 3-way handshake used to close a connection.
Part of 3-way handshake used to create a connection requires each end to
generate a random 32-bit sequence number. If an application attempts to establish a new TCP
connection after a computer reboot, TCP chooses a new random number.

05.05. CONGESION CONTROL, SEGMENT FORMAT

Congestion Control – If congestion triggers excessive retransmission, the entire system can
reach a state of congestion collapse, analogous to a traffic jam on a highway. To avoid the
problem, TCP always uses packet loss as a measure of congestion, and responds to
congestion by reducing the rate at which it retransmits data.

NOTES BY – BALJEET SINGH SINWAR


14
INTERNET AND WEB TECHNOLOGY
TCP congestion control takes over when a message is lost. Instead of
retransmitting enough data to fill the receiver’s buffer, TCP begins by sending a single
message containing data. If the acknowledgement arrives without additional loss, TCP
doubles the amount of data begin sent, and sends two additional messages. If
acknowledgements arrive for those two, TCP sends four more, and so on. The exponential
increase continues until TCP is sending half of the receiver’s advertised window, at which time
TCP slows down the rate of increase. TCP then increases the window size linearly.
TCP Segment Format – TCP uses a single format for all messages, including messages that
carry data, those that carry acknowledgements, and messages that are part of the 3-way
handshake used to create or terminate a connection. TCP uses the term segment to refer to a
message.
SOURCE PORT DESTINATION PORT
SEQUENCE NUMBER
ACKNOWLEDGEMENT NUMBER
HLEN NOT CODE WINDOW
USED BITS
CHECKSUM URGENT POINTER
OPTIONS (if any)
BEGINNING OF DATA
• Source Port – It identifies the application program that sent the data.
• Destination Port – It identifies which application program on the receiving computer
should receive the data.
• Sequence Number – It gives the sequence number of the first octet of data being
carried in the segment. The receiver uses the sequence number to reorder segments
that arrive out of order and to compute an acknowledgement number.
• Acknowledgement Number – It specifies the sequence number of the data that is
expected next.
• Window – It specifies how much additional buffer space is available for data starting at
the position given by the acknowledgement.
• Checksum – This field contains a checksum that covers the TCP segment header and
the data.

6. DOMAIN NAME SYSTEM

06.01. STRUCTURE

Structure of Computer Names –


The naming scheme used in the internet is called the Domain Name System
(DNS). Syntactically, each computer name consists of a sequence of alpha-numeric segments
separated by periods. For example, a computer in the Computer Science Department at
Purdue University has the domain name:
Mordred.cs.purdue.edu
The domain name system does specify values for the most significant segment,
which is called a top-level domain (TLD). The lists of top-level domains of the DNS are given
below:
Domain Name Assigned To Domain Name Assigned To
Aero Air transport Int International
industry treaty
organizations
Arpa Infrastructure Mil United states
domain military
Biz Businesses Museum Museums
Com Commercial Name Individuals
organization
Coop Cooperative Net Major network
associations support center
NOTES BY – BALJEET SINGH SINWAR
14
INTERNET AND WEB TECHNOLOGY
Edu Education Org Non-commercial
institution organizations
Gov United states pro Credentialed
government professionals
Info information Country code A country
Top-level domains are controlled by the Internet Corporation for Assigned Names
and Numbers (ICANN). ICANN designates one or more domain registrars to administer a given
top-level domain and approve specific names. To obtain a domain, an organization must
register with an approved registrar. A unique domain suffix is assigned to each organization.
Geographic Structure –
In addition to the familiar organizational structure, the DNS allows organizations
to use a geographic registration. For example the Corporation For National Research
Initiatives registered the domain:
cnri.reston.va.us
because the corporation is located in the town of Reston, Virginia in the United States. Thus,
names of computer at the corporation end in .us instead of .com.
06.02. DNS CLIENT, SERVER MODEL

One of the main features of the Domain Naming System is autonomy. The naming hierarchy
helps achieve autonomy by allowing an organization to control all names with a particular
suffix.
In addition to hierarchy names, the DNS uses client-server interaction to aid
autonomy. In essence, the entire naming system operates as a large, distributed database.
Most organizations that have an Internet connection run a domain name server. Each server
contains information that links the server to the other domain name servers; the resulting set
of servers functions as a large, coordinated database of names.
Whenever an application needs to translate a name to an IP address, the
application becomes a client of the naming system. The client places the name to be
translated in a DNS request message, and sends the request to a DNS server. The server
extracts the name from the request, translates the name to an equivalent IP address, and
returns the resulting address to the application in a reply message.
06.03. HIERARCHY MULTIPLE SEREVER

DNS servers are arranged in a hierarchy that matches the naming hierarchy, with each being
the authority for part of the naming hierarchy. A root server occupies the top of the hierarchy,
and is an authority for the top-level domains. Although it does not contain all possible domain
names, a root server contains information about how to reach other servers.
Although the hierarchy of DNS servers follows the naming hierarchy, the
structure is not identical. A corporation can choose to place all its domain names in a single
server, or can choose to run servers. For example, figure 1 illustrates two ways Foobar
Corporation might choose to allocate its naming hierarchy to two servers. In figure 1, the
server for foobar.com also includes the soap division, while in figure 2 the server for
foobar.com includes everything except the walnut subdivision.

NOTES BY – BALJEET SINGH SINWAR


14
INTERNET AND WEB TECHNOLOGY

com Root server

Server for
candy.foobar.com Server for
foobar Foobar.com

candy
soap

peanut almond walnut

Figure-1 com
Root server

foobar
Server for
foobar.com

candy soap

peanut Figure-2
almond walnut

06.04. RESOLVING A NAME

The translation of a domain name into an equivalent IP address is called name resolution, and
the name is said to be resolved to an address. Software to perform the translation is known as
name resolver software.
Today, the Domain Name System (DNS) is the standard for resolving names to
addresses. However, the hosts file still plays a role in name resolution during the booting of a
system and as a means to provide LAN resolution when DNS is down. In a nutshell, DNS is a
distributed database whose structure looks like the UNIS file system. DNS is a client/server
system in which the resolvers query name servers to find an address record for a domain
name. The query process begins with the root name servers. If the root name server does not
know the answer, it returns the addresses of a name server that knows more details about
the domain name. The resolver then queries the new name server. This iterative process
continues until a name server responds with the address for the domain name.

7. E-MAIL AND FILE TRANSFER


07.01. SMTP

SMTP stands for Simple Mail Transfer Protocol. It is a TCP/IP protocol that specifies how
computers exchange electronic mail. It works with post office protocol (POP).

NOTES BY – BALJEET SINGH SINWAR


14
INTERNET AND WEB TECHNOLOGY
Working of SMTP – SMTP is a simple ASCII protocol. After establishing the TCP connection, the
sending machine, operating as the client, waits for the receiving machine, operating as the
server, to talk first. The server starts by sending a line of text giving its identity and telling
whether or not it is prepared to receive mail. If it is not, the client releases the connection and
tries again later. If the server is willing to accept e-mail, the client announces whom the e-
mail is coming from and whom it is going to. If such a recipient exists at the destination, the
server gives the client the o-ahead to send the message. Then the client sends the message
and the server acknowledges it.

07.02. MAIL TRANSFER

A user interacts with an e-mail interface program when composing or reading messages. The
underlying e-mail system contains a mail transfer program that handles the details of sending
a copy of a message to a remote computer. When a user finishes composing an outgoing
message, the e-mail interface places the message in a queue that the mail transfer program
handles.
The mail transfer program waits for a message to be placed on its queue, and
then transfers a copy of the message to each recipient. Sending a copy of a message to a
recipient on the local computer is trivial because the transfer program can append the
message to the user’s mailbox. Sending a copy to a remote user is more complex. The mail
transfer program becomes a client that contacts a server on the remote machine. The client
sends the message to the server, which places a copy of the message in the recipient’s
mailbox. The given below figure illustrates the interaction.
Recipient’s
User interface on mailbox
sender’s computer
Mail transfer program Server on recipient’s
on sender’s computer computer

Internet

07.03. DIAL UP AND POP

Dial up – This is the simplest and cheapest type of connection to internet. All we need is a
computer with a modem and any of the popular telecommunications packages. Windows 9.X
and other OS have bulletin facility. The individual user dials-in to an internet service provider.
Each user has an account on the provider’s internet services host computer to the internet.
Pop – It is a simple protocol used for opening the remote e-mail boxes. This protocol is defined
in RFC 1225. it has the commands for the user to
• Log in the remote mailbox
• Log out the remote mailbox
• Fetch messages from the remote mailbox
• Delete messages from the remote mailbox
This protocol also defines the method for transfer of the e-mail from the remote
mailbox to the user’s local machine for reading mail later.

07.04. FTP GENERAL MODEL AND USER INTERFACE

FTP is designed to be run from a program (browser) or for interactive use. When a program
invokes FTP, the program must handle all details and then inform the user whether the
operation succeeded or failed; the user never sees the FTP interface. When a user invokes FTP
interactively, the user communicates with a command-driven interface. FTP issues a prompt
to which the user responds by entering a command. FTP executes the command, and then
issues another prompt.

NOTES BY – BALJEET SINGH SINWAR


14
INTERNET AND WEB TECHNOLOGY

07.05. FILE NAME TRANSLATION AND NETWORK FILE SYSTEM

File Name Translation – File name differences can be especially important when using an
abbreviation. In such commands, a user can specify an abbreviation that FTP expands into a
list of names. Unfortunately, a file name that is valid on one computer may be illegal on
another.
To handle incompatibilities among computer systems, the BSD interface to FTP
permits a user to define rules that specify how to translate a file name when moving to a new
computer system.
Network File System – The file access mechanism used with TCP/IP is known as Network File
System (NFS). NFS allows an application to open a remote file, move to a specified position in
the file, and read or write data starting at that position.
In addition to reducing the load on the network, the file access scheme used by
NFS allows shared file access. A file that resides at an NFS server can be accessed by multiple
clients. To prevent other from interfering with file updates, NFS allows a client to lock a file.
The interface to NFS is unlike the interface to FTP. NFS provides the conventional
file operations such as open, read, and write. To configure NFS, a special directory is created
in the computer’s file system and associated with a remote computer.

8. WORLD WIDE WEB(WWW)


08.01. INTERFACE

A browser is an interactive program used to access the web. A browser implements a point
and click interface-the browser displays information on the computer’s screen and permits a
user to navigate using the mouse. A browser can display both text and graphics. In other
words we can say that a browser is an interactive program that permits a user to view
information from the World Wide Web.

08.02. HYPERTEXT

To ensure that web browsers correctly interpret the contents of each page, the web uses a
standard representation known as the Hyper Text Markup Language (HTML). HTML allows a
document to contain general guidelines for display, and allows a browser to choose details;
consequently, two browsers may display an HTML document differently.

08.03. HYPERMEDIA

The term hypermedia is used to distinguish the web from a traditional hypertext system
which restricts documents to textual information-the web allows documents to contain
digitized photographic images or graphics. A hypermedia document available on the web is
called a page.

08.04. HTML FORMAT AND REPRESENTATION

Each HTML document is divided into a head that contains information about the document,
and a body that contains the information to be displayed.
An HTML document consists of a text file that contains markup tags embedded in
the document. A tag is bracketed by less-than and greater-than symbols: <TAGNAME> and its
corresponding tag has the form: </TAGNAME>.
An HTML document starts with the tag <HTML>. The pair of tags <HEAD> and
</HEAD> bracket the head, while the pair of tags <BODY> and </BODY> bracket the body.
In the head, the tags <TITLE> and </TITLE> bracket the text that forms the document title.
Example shown below:
<HTML>
<HEAD>
NOTES BY – BALJEET SINGH SINWAR
14
INTERNET AND WEB TECHNOLOGY
<TITLE>
Text that forms the document title
</TITLE>
</HEAD>
<BODY>
Body of the document appears here
</BODY>
</HTML>

08.05. EMBEDDING GRAPHICS AND IMAGES

In general, nontextual information such as a graphics image or digitized photo is not inserted
directly in an HTML document. Instead, the data resides in a separate location, and the
document contains a reference to the data. When a browser encounters such a reference, the
browser goes to the specified location, obtains a copy of the image, and inserts the image in
the displayed document. HTML uses the IMG tag to encode a reference to an external image.
For example, the tag: <IMG SRC=”fred_photo.gif”> specifies that the file fred_phoo.gif
contains an image that the browser should insert in the document.

08.06. HTTP

HTTP protocol is used to manage the links between one hypertext document and another.
HTTP is the mechanism that opens the related documents when we select a hypertext link.
HTTP allows a browser to request a specific item, which the server then returns.
HTTP request are sent as text encoded in ASCII. HTTP supports four basic operations that a
browser can specify when making a request:
• GET requests a specified item from the server.
• HEAD requests status information about an item.
• POST sends data to server. The server appends the data to a specified item.
• PUT sends data to the server. The server uses the data to replace a specified item.

*****
***
*

NOTES BY – BALJEET SINGH SINWAR


14

S-ar putea să vă placă și