Professional Documents
Culture Documents
Prepared by
Supervised by
October 2019
Application Layer
Each node in the tree has a label, which is a string with a maximum
of 63 characters.The root label is a null string (empty string). DNS
requires that children of a node (nodes that branch from the same
node) have different labels, which guarantees the uniqueness of
the domain names.
Domain Name
Each node in the tree has a domain name. A full domain name is a
sequence of labels separated by dots (.). The domain names are
always read from the node up to the root.The last label is the label
of the root (null). This means that a full domain name always ends
in a null label, which means the last character is a dot because the
null string is nothing.
Domain names and labels
•If a label is terminated by a null string, it is called a
fully qualified domain name
(FQDN).
•If a label is not terminated by a null string, it is
called a partially qualified domain name (PQDN).
?What are primary and secondary DNS servers
A server administrator has a choice of whether to designate a
DNS server as a primary or a secondary server (also known as a
slave). In some cases, a server can be primary for one zone and also
secondary for another zone.
A primary server hosts the controlling zone file, which contains all
the authoritative information for a domain (This means that it is
trusted source for important information, such as the IP address of
the domain).Primary servers get this information directly from local
files.
A Secondary servers contain read-only copies of the zone file,
and they get their info from a primary server in a communication
known as a zone transfer. Each zone can only have one primary DNS
server, but it can have any number of secondary DNS servers.
Changes to a zone’s DNS records cannot be made on a secondary
server, but in some cases a secondary server can pass along change
requests to a primary server.
Iterative Resolution
If the client does not ask for a recursive answer, the mapping can
be done iteratively. If the server is an authority for the name, it
sends the answer. If it is not, it returns (to the client) the IP address
of the server that it thinks can resolve the query. The client is
responsible for repeating the query to this second server. If the
newly addressed server can resolve the problem, it answers the
query with the IP address; otherwise, it returns the IP address of a
new server to the client. Now the client must repeat the query to the
third server. This process is called iterative resolution because the
client repeats the same query to multiple servers.
In next figure the client queries four servers before it gets an
answer from the ques10.com server.
WWW Service and HTTP
1 Request
Response 2
1 Request 1
Response 1 2
3 Request 2
Response 2 4
5 Request 3
Response 3 6
Now assume we need to retrieve a scientific document
that contains one reference to another text file and one
reference to a large image.
The main document and the image are stored in two
separate files in the same site (file A and file B); the
referenced text file is stored in another site (file C).
Since we are dealing with three different files, we need
three transactions if we want to see the whole
document.
The first transaction (request/response) retrieves a copy
of the main document (file A), which has a reference
(pointer) to the second and the third files.
Web Documents
1
Second scenario
1 5
3 4
2
Third scenario
When the sender is connected to the mail server via a
LAN or a WAN, we need two UAs and two pairs of MTAs
(client and server).
3
7
5
4 6
Fourth scenario
When both sender and receiver are connected to the mail
server via a LAN or a WAN, we need two UAs, two pairs
of MTAs (client and server), and a pair of MAAs (client
and server). This is the most common situation today.
1 9
2
8
5
4 6
What is SMTP ?
Smtp used to transfer emails over the
internet ( Sending Emails)
SMTP SMTP
1 5
3
2 4
File Transfer Protocol
(FTP)
File Transfer Protocol (FTP) :provided by TCP/IP for
copying a file from one host to another.
FTP uses two well-known TCP ports :
1. Port 21 is used for the control connection.
2. port 20 is used for the data connection.
Telnet
• TELNET is a client/server application that allows a
user to log on to a remote machine, giving the user
access to the remote system.
•client/server application program: TELNET. TELNET is
an abbreviation for TErminaL NETwork.
•TELNET uses the network virtual terminal (NVT)
system to encode characters on the local system. On
the server machine, NVT decodes the characters to a
form acceptable to the remote machine.
• Can be run from the command prompt on a PC.
•TELNET requires a logging name and password.
Thanks for Listening