Notes On Computer Networks Unit5
Notes On Computer Networks Unit5
Application Layer Examples: Following are the common examples of the Application Layer
protocols:
Question No-(2): What do you understand by File Transfer Protocol? Explain at least 10
Commands of FTP? How FTP is different from TFTP?
Answer: - File Transfer Protocol:- File Transfer Protocol(FTP) is an important Application Layer
protocol. It is a reliable, connection-oriented service that uses TCP to transfer files between
systems.
where machinename is the full machine name of the remote machine, e.g.,
dbitdoon.com. If the name of the machine is unknown, you may type
ftp machinennumber
where machinennumber is the net address of the remote machine, e.g., 129.82.45.181.
In either case, this command is similar to logging onto the remote machine. If the remote
machine has been reached successfully,
When you enter your own loginname and password for the remote machine, it returns the
prompt
ftp>
and permits you access to your own home directory on the remote machine. You should
be able to move around in your own directory and to copy files to and from your local
machine using the FTP interface commands given on the following page.
Anonymous FTP
At times you may wish to copy files from a remote machine on which you do not have a
login name. This can be done using anonymous FTP.
When the remote machine asks for your loginname, you should type in the word
anonymous. Instead of a password, you should enter your own electronic mail address.
This allows the remote site to keep records of the anonymous FTP requests.
Once you have been logged in, you are in the anonymous directory for the remote
machine. This usually contains a number of public files and directories. Again you should
be able to move around in these directories. However, you are only able to copy the files
from the remote machine to your own local machine; you are not able to write on the
remote machine or to delete any files there.
Question No-(3): Explain working of E-mail System with the help of suitable diagrams?
Answer: Working of an Email System: - Email system is based on the working of two protocols
viz. SMTP and POP3.
SMTP is a relatively simple, text-based protocol, in which one or more recipients of a message
are specified (and in most cases verified to exist) along with the message text and possibly other
encoded objects. The message is then transferred to a remote server using a procedure of
queries and responses between the client and server.
An email client knows the outgoing mail SMTP server from its configuration. A relaying server
typically determines which SMTP server to connect to by looking up the each recipient's domain
name (the part of the email address to the right of the at (@) sign).
The SMTP client initiates a TCP connection to server's port 25 (unless overridden by
configuration). SMTP is a "push" protocol that does not allow one to "pull" messages from a
remote server on demand. To do this a mail client must use POP3 through port No 110.
However E-mail servers communicate with each other using the Simple Mail Transport Protocol
(SMTP) to send and receive mail.
Question No-(4): What do you understand by Virtual Terminals? What is the use of Virtual
Terminals?
Answer: Virtual Terminals: Virtual Terminal refers to an application service that :-
(a) Allows host terminals on a multi-user network to interact with other hosts regardless of
hardware, terminal type and characteristics
(b) Allows remote log-on by local-area-network managers for the purpose of management,
(c) Allows users to access information from another host processor for transaction
processing, and
(d) Serves as a backup facility.
This is a software in user's computer that emulates a particular type of hardware terminal in order
to access a server. When personal computers began to proliferate in the late 1980s, virtual
terminals enabled users to access the corporate minicomputers and mainframes from their PCs
without having to use dedicated terminals. These provide access to a database or an information
system via a common interface such as a Web browser on any user's computer.
Virtual terminal protocol based on the OSI application layer protocols has been defined. However,
the virtual terminal protocol is not widely used on the Internet.
Question No-(5): What do you understand by SNMP? Explain how networks are managed
by SNMP? Highlight terms used in SNMP?
Answer:-SNMP (Simple Network Management Protocol):- The Simple Network Management
Protocol (SNMP) is an application layer protocol that facilitates the exchange of management
information between network devices.
In above URL protocol is http(hyper text transfer protocol), System name is www.dbitdoon.com
.point1 portion of file Index.html is being accessed through the port no 80 of this machine.
Index.html residing inside the IT folder that in turn resides inside CS folder.
•A domain is a group of computers that are associated by their geographical location or their
business type.
•There are more than 200 top-level domains on the Internet, examples of which include the
following:
us – United States
.uk – United Kingdom
.edu – educational sites
.com – commercial sites
.gov – government sites
.org – non-profit sites
.net – network service
How DNS works in theory : DNS working may be understood with the help of following terms:-
The domain name space :-The domain name space consists of a tree of domain names. Each
node or leaf in the tree has zero or more resource records, which hold information
associated with the domain name. The tree sub-divides into zones beginning at the root
zone. A DNS zone consists of a collection of connected nodes authoritatively served by
an authoritative DNS nameserver. (Note that a single nameserver can host several
zones.)
When a system administrator wants to let another administrator control a part of the domain
name space within the first administrator’s zone of authority, control can be delegated to the
second administrator. This splits off a part of the old zone into a new zone, which comes under
the authority of the second administrator's nameservers. The old zone ceases to be authoritative
for the new zone.
A domain name usually consists of two or more parts (technically a label), which is conventionally
written separated by dots, such as example.com.
• The rightmost label conveys the top-level domain (for example, the address
www.example.com has the top-level domain com).
• Each label to the left specifies a subdivision, or subdomain of the domain above it. Note:
“subdomain” expresses relative dependence, not absolute dependence. For example:
example.com comprises a subdomain of the com domain, and www.example.com
comprises a subdomain of the domain example.com. In theory, this subdivision can go
down 127 levels. Each label can contain up to 63 characters. The whole domain name
does not exceed a total length of 253 characters.
• A hostname refers to a domain name that has one or more associated IP addresses; ie:
the 'www.example.com' and 'example.com' domains are both hostnames, however, the
'com' domain is not.
DNS servers
The Domain Name System consists of a hierarchical set of DNS servers. Each domain or
subdomain has one or more authoritative DNS servers that publish information about that domain
and the name servers of any domains "beneath" it. The hierarchy of authoritative DNS servers
matches the hierarchy of domains. At the top of the hierarchy stand the root nameservers: the
servers to query when looking up (resolving) a top-level domain name
DNS resolvers
A resolver looks up the resource record information associated with nodes. A resolver knows how
to communicate with name servers by sending DNS queries and heeding DNS responses.
A DNS query may be either a recursive query or a non-recursive query:
• A non-recursive query is one where the DNS server may provide a partial answer to the
query (or give an error). DNS servers must support non-recursive queries.
• A recursive query is one where the DNS server will fully answer the query (or give an
error). DNS servers are not required to support recursive queries.
The resolver (or another DNS server acting recursively on behalf of the resolver) negotiates use
of recursive service using bits in the query headers.
Resolving usually entails iterating through several name servers to find the needed information.
However, some resolvers function simplistically and can communicate only with a single name
server. These simple resolvers rely on a recursive query to a recursive name server to perform
the work of finding information for them.
In practice, full host names will frequently consist of just three segments (e.g.
www.inadomain.example).
For querying purposes, software interprets the name segment by segment, from right to left,
using an iterative search procedure. At each step along the way, the program queries a
corresponding DNS server to provide a pointer to the next server which it should consult.
1. the local system is pre-configured with the known addresses of the root servers in a file of
root hints, which need to be updated periodically by the local administrator from a reliable
source to be kept up to date with the changes which occur over time.
2. query one of the root servers to find the server authoritative for the next level down (so in
the case of our simple hostname, a root server would be asked for the address of a
server with detailed knowledge of the example top level domain).
3. querying this second server for the address of a DNS server with detailed knowledge of
the second-level domain (inadomain.example in our example).
4. repeating the previous step to progress down the name, until the final step which would,
rather than generating the address of the next DNS server, return the final address
sought.
Question No-(8): What do you mean by public network? Make a note on Internet?
Answer :- (Students must prepare a good short note on Internet.)