Documente Academic
Documente Profesional
Documente Cultură
In order to understand what the DNS is and how it works, you need to have a basic
understanding of IP addresses and domain names. An IP address, or Internet Protocol
address, is a complex string of numbers that acts as a binary identifier for devices across
the Internet. In short, an IP address is the address that computers, servers and other
devices use to identify one another online. The vast majority of IP addresses are arranged
into four sets of digits - i.e., 12.34.56.78.
A domain name is the information that you enter into a web browser in order to reach a
specific website. When you input a URL like www.example.com/index into a web browser,
its domain name is example.com. Basically, a domain name is the human-friendly version of
an IP address. Businesses vie for easy-to-remember domain names, since they make it
easier for people to remember how to find them online. If people had to remember complex
IP addresses in order to navigate the Internet, it wouldn't be nearly as useful or enjoyable.
Although it's possible to enter an IP address into a web browser into order to get to a
website, it's a lot easier to enter its domain name instead. However, computers, servers and
other devices are unable to make heads or tails of domain names - they strictly rely on
binary identifiers. The DNS's job, then, is to take domain names and translate them into the
IP addresses that allow machines to communicate with one another. Every domain name
has at least one IP address associated with it.
The DNS is a remarkable database. It doesn't perform its work alone, though. Things called
Top Level Domains (TLDs) and root servers do a lot of the heavy lifting for the DNS. A Top
Level Domain refers to the part of a domain name that comes after the period. For instance,
the TLD of example.com is COM. While there's an ever-expanding number of domain
names, there's a relatively static number of Top Level Domains; .com, .edu and .org are just
a few key examples.
Specialized computers called root servers store the IP addresses of each Top Level
Domain's registries. Therefore, the first stop that the DNS makes when it resolves, or
translates, a domain name is at its associated root server. From there, the requested
domain name is sent along to a Domain Name Resolver, or DNR. Domain Name Resolvers,
or resolvers, are located within individual Internet Service Providers and organizations.
They respond to requests from root servers to find the necessary IP addresses. Since the
root server already recognizes the .com, .edu or other part of the equation, it simply has to
resolve the remainder of the request. It usually does this instantly, and the information is
forwarded to the user's PC.
Millions of people make changes to the DNS every day, through new domain names,
changes to IP addresses and other requests. The unique structure of the DNS, though,
keeps everything straight. Duplicate domain names cannot exist within domains, but they
can exist across them - for instance, example.com and example.gov could be two separate
locations online. Otherwise, the highly organized and efficient nature of the DNS ensures
that you never have to worry about arriving at two different places each time you input a
domain name. When you enter a domain name, its IP address will be resolved and you'll
always arrive at the same place. Without the DNS, the Internet wouldn't be useful, practical
or enjoyable.
IT departments are faced with constant pressure to improve business application performance while
reducing costs and ensuring security. Many organizations with a centralized hub-and-spoke network
topology reduce latency experienced by remote users by hosting corporate applications or providing
Internet access closer to remote sites, often referred to as "regionalizing the network".
SITA has been providing regional Internet service to customers on a dedicated basis, whereby each
customer bears the entire cost of its service. To reduce costs, we now offer a Regional Internet Gateway
(RIG) service based on a common ICT infrastructure. This enables organizations to share resources and
costs while still providing high levels of service and security.
The RIG service is designed for organizations that use a hub-and-spoke network topology and want to
improve the application performance experienced by users posted at outstations and airports far away
from the corporate data centre.
Organizations using a hub-and-spoke network topology typically connect their outstations to the corporate data centre
where the traffic is protected by firewalls, proxies, content filters, and anti-virus applications. In such a scenario, the
distance travelled by the data can be extensive, and can lead to poor application performance experienced by the
outstation users.
The RIG service will provide secure and resilient regional Internet access to users at outstations and airports that are
connected to IP VPN and Internet networks. SITA's RIGs are located closer to the outstations and airport campus
users than the corporate Internet hub. No equipment will need to be installed on the customer's premises since
communication resources typically found at the corporate hub are hosted at SITA's facilities.
Rather than having the data travel the full distance to the corporate data centre, the traffic will break out closer to the
outstation, shortening the distance travelled and reducing the latency experienced by the remote users. Breaking out
less critical browsing traffic regionally will also relieve the company's IP VPN and help speed up the exchange of
mission-critical data.
The RIG service is less expensive than a dedicated gateway service because its resources and costs are shared by
all users. Furthermore, since breaking out Internet traffic regionally reduces the amount of Internet traffic carried by
the IP VPN to your hub, IP VPN and Internet access costs at the corporate hub will also be reduced.
What is a Topology?
The physical topology of a network refers to the configuration of cables, computers, and other
peripherals. Physical topology should not be confused with logical topology which is the method
used to pass information between workstations. Logical topology was discussed in the Protocol
chapter.
The following sections discuss the physical topologies used in networks and other related topics.
Linear Bus
Star
Tree (Expanded Star)
Considerations When Choosing a Topology
Summary Chart
Linear Bus
A linear bus topology consists of a main run of cable with a terminator at each end (See fig. 1).
All nodes (file server, workstations, and peripherals) are connected to the linear cable.
Star
A star topology is designed with each node (file server, workstations, and peripherals) connected
directly to a central network hub, switch, or concentrator (See fig. 2).
Data on a star network passes through the hub, switch, or concentrator before continuing to its
destination. The hub, switch, or concentrator manages and controls all functions of the network.
It also acts as a repeater for the data flow. This configuration is common with twisted pair cable;
however, it can also be used with coaxial cable or fiber optic cable.
Fig. 2. Star topology
A tree topology combines characteristics of linear bus and star topologies. It consists of groups
of star-configured workstations connected to a linear bus backbone cable (See fig. 3). Tree
topologies allow for the expansion of an existing network, and enable schools to configure a
network to meet their needs.
What is an IP Address?
No doubt you've heard the term "IP address." Unless you're a techie, though, you may not
have more than a shadowy notion of what an IP address actually is or how it works. Let's
explore the concept.
"IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. What
does that mean? An Internet Protocol is a set of rules that govern Internet activity and
facilitate completion of a variety of actions on the World Wide Web. Therefore an Internet
Protocol address is part of the systematically laid out interconnected grid that governs
online communication by identifying both initiating devices and various Internet destinations,
thereby making two-way communication possible.
An IP address consists of four numbers, each of which contains one to three digits, with a
single dot (.) separating each number or set of digits. Each of the four numbers can range
from 0 to 255. Here's an example of what an IP address might look like: 78.125.0.209. This
innocuous-looking group of four numbers is the key that empowers you and me to send and
retrieve data over our Internet connections, ensuring that our messages, as well as our
requests for data and the data we've requested, will reach their correct Internet
destinations. Without this numeric protocol, sending and receiving data over the World Wide
Web would be impossible.
IP addresses can be either static or dynamic. Static IP addresses never change. They serve
as a permanent Internet address and provide a simple and reliable way for remote
computers to contact you. Static IP addresses reveal such information as the continent,
country, region, and city in which a computer is located; the ISP (Internet Service Provider)
that services that particular computer; and such technical information as the precise latitude
and longitude of the country, as well as the locale, of the computer. Many websites provide
IP address look-up services to their visitors, free of charge. If you're curious about your own
IP address, you can locate these websites by performing a Google search.
Dynamic IP addresses are temporary and are assigned each time a computer accesses the
Internet. They are, in effect, borrowed from a pool of IP addresses that are shared among
various computers. Since a limited number of static IP addresses are available, many ISPs
reserve a portion of their assigned addresses for sharing among their subscribers in this
way. This lowers costs and allows them to service far more subscribers than they otherwise
could.
Static IP addresses are generally preferable for such uses as VOIP (Voice over Internet
Protocol), online gaming, or any other purpose where users need to make it easy for other
computers to locate and connect to them. Easy access can also be facilitated when using a
dynamic IP address through the use of a dynamic DNS service, which enables other
computers to find you even though you may be using a temporary, one-time IP address.
This often entails an extra charge, however, so check with your ISP.
Static IP addresses are considered somewhat less secure than dynamic IP addresses,
since they are easier to track for data mining purposes. However, following safe Internet
practices can help mitigate this potential problem and keep your computer secure no matter
what type of IP address you use.
If you are working with multiple Unix systems under the same management, also check the rlogin, rcp,
and rsh commands, which provide more versatility for remote login, file copying, and remote program
execution. Those programs are available only on Unix systems, and should only be used on sets of
computers under the same management for security reasons.
Although the telnet and ftp client programs may be implemented differently on different operating
systems, and even go by other names, they operate in the same basic manner regardless of system.
On Unix systems, these programs are universally available to be run from a shell command line. You
start these programs by typing the program name followed by the name or Internet address of the
remote host as the argument, for example:
telnet toquima
ftp wasson
telnet 171.64.168.232
ftp 171.64.169.203
Windows PCs and Macintoshes usually have programs that implement the telnet and ftp client
functions with menus and graphical displays, rather than a command line. They have a "new session" or
"new connection" menu item that brings up a dialog box into which you can type the remote computer
name or IP address to connect. Stanford University has site-licensedSecureFX for Windows PCs
and Fetch for Macintosh computers. These programs support both plain ftp, as described here,
and encrypted sftp based on the ssh protocol. You can download these programs to any Stanford
computer from the Essential Stanford Software web site.
Windows 95/98/NT/2000/XP also allow you to run the command line versions of telnet and ftp, exactly
like you would do on Unix. Simply select the Run item from the Start menu, and type cmd (followed by
the RETURN key) to get a Command Promptwindow. In that window, you can
type telnet hostname or ftp hostname as the command to run (followed by the RETURN key),
substituting the remote computer name or IP address for hostname. Then proceed as you would for the
Unix commands, described below.
Because MacOS X is based on Unix, you can also run the command line versions
of telnet and ftp from MacOS X, exactly like you would do on a Unix workstation. Simply start
the Terminal application (found in the Utilities subfolder of theApplications folder). In
the Terminal window, you can type telnet hostname or ftp hostname as the command to run
(followed by the RETURN key), substituting the remote computer name or IP address for hostname.
Then proceed as you would for the Unix commands, described below.
Why Client/Server ?
The business environment of the 1990's is rapidly changing. Corporate organizations are
flattening their organization structures to be more responsive to customers and the marketplace.
Traditional competitors are now cooperating with one another while competing at the same time
in different markets. Key competitive advantages are characteristics like time-to-market,
customer serviceand simplicity. Being first to a market with a quality product or service which
delights customers can be the difference between market success or failure. Time to market is
now measured in weeks not years, and being first may be the only advantage one company has
over its competitors.Customer service means delighting the customer with both a product or
service as well as being responsive to changing customer requirements. Organizational structures
are flattening in order to empower employees to make decisions closer to the customer, to be
more responsive to the customer. Personal computers provide a whole new level of computing
flexibility, with simple easy to use programs. These programs are transportable, allowing
businesses to react instantly to customers needs. Simplicity, to the end user, is critical to the
success of client/server computing. End users need information access as easy as getting cash
from an automated teller machine (ATM). Customers can get money from their bank account at
any ATM across the country with just an ATM card and a password. Client/server computing
means changing our information systems to support the changes of the business environment.
Lets look at an analogy.
Client/Server Analogy
Client/server computing provides the seamless integration of personal computers with host
systems. This style of computing allows organizations to be responsive to their customers while
still maintaining the security and integrity to manage their business effectively. Client/server
computing generally refers to a computing model where two or more computers interact in such
a way that one provides services to the other. This model allows customers to access information
resources and services located anywhere within the customers information network. Customers
are very interested in client/server computing because it allows them to be more responsive, as
well as to effectively utilize all computing resources within their network.
As the term implies, client/server computing has two basic components, a client and a server.
Theclient requests a service to be performed. This service might be to run an application, query a
data base, print a document, or even perform a backup or recovery procedure. The server is the
resource that handles the client's request. Clients are typically thought of as personal computers
but a client can be a midrange system or even a mainframe. Servers are typically thought of as a
midrange or mainframe system, however a server can be another personal computer on the
network. Client/server networks are like our restaurant example where specific computers
provide one or more services to other computers within a network. Today's networks have
computers for file serving, data base serving, application serving, and communications serving.
Each of these servers are dedicated devices which provide a specific service to all authorized
users within a network. These servers also allow some of the processing to be handled on each
users PC and some on a centralized server, as the picture below shows.
Client/Server Definition
For example, a data base server uses the PC for the display (user
interface) and processing(application logic) portions of an application, while the server
provides data management portion of the application. On the other hand, an application server
uses the PC for the display portion of an application, while using the server for both
the processing and data management portions.
Each of these models is best suited for specific types of applications and most customers make use of
different application models based upon the business need being satisfied. This workload separation
allows small servers to handle a larger number of users. In a rapidly changing business environment
client/server computing offers customers the flexibility they need to manage their business effectively.