AIT Assignment 1(2)

download AIT Assignment 1(2)

of 12

Transcript of AIT Assignment 1(2)

  • 8/3/2019 AIT Assignment 1(2)

    1/12

    AIT

    ASSIGNMENT NO. 1

    Submitted To: Submitted From:

    Er. Mandeep Kumar Group 5

    I.T.

    81307113041 - 400

  • 8/3/2019 AIT Assignment 1(2)

    2/12

    1)Explain the concept of layeringLayering is a common technique to simplify networking designs by dividing them intofunctional layers, and assigning protocols to perform each layer's task. Each layer of the

    model communicates with an adjacent level (above or below it). Each layer therefore

    uses the services of the lower layers and supplies them to that of the upper layer.

    For example: It is common to separate the functions of data delivery and connection

    management into separate layers, and therefore separate protocols. Thus, one protocol

    is designed to perform data delivery, and another protocol, layered above the first,

    performs connection management. The data delivery protocol is fairly simple and knows

    nothing of connection management. The connection management protocol is also fairly

    simple, since it doesn't need to concern itself with data delivery.

    It gives the ability to independently design, modify and build the functions and services

    of each layer without affecting the other layers.

    Benefits of layering:

    y Reduces Complexity - The aim of TCP/IP in layers is to separate the problem intodifferent parts (the layers) depending on their level of abstraction. This reduces thecomplexity of network operations by dividing them into simpler components.

    y Enables multi-vendor integration - It enables multi-vendor integration by definingstandard interfaces.

    y Increased Life Expectancy - Increased product working life expectancies as backwardscompatibility is made considerably easier. Devices from different technology

    generations can co-exist thus the older units do not get discarded immediately newer

    technologies are adopted.

    y Better Flexibility Layering and the greater compatibility that it delivers goes a longway to improving the flexibility; particularly in terms of options and choices, thatnetwork engineers and administrators alike crave so much.

    y Interoperability Layering promotes greater interoperability between devices fromdifferent manufacturers and even between different generations of the same type of

    device from the same manufacturer.

  • 8/3/2019 AIT Assignment 1(2)

    3/12

    y Greater Compatibility One of the greatest of all of the benefits of using a hierarchal orlayered approach to networking and communications protocols is the greater

    compatibility between devices, systems and networks that this delivers.

    y Cost Effective Quality The layered approach has proven time and time again to be themost economical way of developing and implementing any system(s) be they small,simple, large or complex makes no difference.

    2)What is protocol suite? Why we need it?A protocol suite is a collection of communications procedures, broken down into small data

    packets. Each contains its own set of rules and message formats, which work together to

    transmit information electronically across computer networks, via a common communications

    language.

    Protocol suit means a collection of PROTOCOLS that are associated with

    particular network architecture. It is also known by protocol stack. For

    example, TCP-IP is associated with a number of individual protocols which carry

    out functions such as network management and DOMAIN NAME lookup. It is

    often referred to by the term PROTOCOL STACK to stress the hierarchic

    relationship between protocols.

    Need of protocol suite:

    y A Protocol Suite defines rules and conventions for communication between networkdevices.

    y Protocol Suite include mechanisms for devices to identify and make connections witheach other, as well as formatting rules that specify how data is packaged into messages

    sent and received.

    y Computer networks consist of devices and software made by many different vendors.The only way to ensure compatibility among them all is to have common document (i.e.

    the protocol specifications) that describe the mechanics and formats of all the data

    exchanged over the network.

  • 8/3/2019 AIT Assignment 1(2)

    4/12

    y It provides reliable data delivery. Reliable means that it can guarantee that the data isdelivered to its intended destination (e.g., through the use of error checking and the

    retransmission of corrupted or missing packets).

    y Data is passed down the stack from one layer to next, until it is transmitted over thenetwork by network access layer protocols. The four layers in this reference model arecrafted to distinguish between the different ways that the data is hanled as it passed

    down the protocol stack from the one layer to another.

    y At the remote end, the data is passed up the stack to the receiving application. Theindividual layers do not need to know how the layers above or below them function;

    they only need to know how to pass data to them

    3)Define DNS.Domain Name System is an Internet service that translates domain names into IP addresses.

    Because domain names are alphabetic, they're easier to remember. The Internet however, is

    really based on IP addresses. Every time you use a domain name, therefore, a DNS service must

    translate the name into the corresponding IP address.

    For example: the domain name www.example.com might translate to 198.105.232.4.

    The Domain Name System (DNS) is a hierarchical naming system built on a distributed database

    for computers, services, or any resource connected to the Internet or a private network. It

    translates domain names meaningful to humans into the numerical identifiers associated with

    networking equipment for the purpose of locating and addressing these devices worldwide.

    The Domain Name System makes it possible to assign domain names to groups of Internet

    resources and users in a meaningful way, independent of each entity's physical location.

    Because of this, World Wide Web (WWW) hyperlinks and Internet contact information can

    remain consistent and constant even if the current Internet routing arrangements change or

    the participant uses a mobile device

  • 8/3/2019 AIT Assignment 1(2)

    5/12

    Advantages of DNS:

    y It's more reliable- DNS's Directory Services Platform currently spans 15 locations andfive continents around the world. This allows us to offer you the most reliable fully

    redundant DNS service anywhere. Each node has multiple servers, and is connected by

    several Tier 1 carriers to the Internet.

    y It's Faster- Our strategically placed nodes are located at the most optimal intersectionsof the Internet. Unlike most DNS providers, DNS's Directory Services Platform uses any

    cast routing technology - which means that no matter where you are located in the

    world, your DNS requests are answered by the closest available DNS Advantage servers.

    Combine this with our huge cache and we can get the answers you seek faster and more

    reliably than anyone else.

  • 8/3/2019 AIT Assignment 1(2)

    6/12

    y It's Smarter- Our technology allows us to automatically correct many typing errors youmay make. We don't think you should be penalized for inadvertently typing an invalid

    top level domain address into your browser, so we will correct many typos and take

    you where you intended to go automatically - saving you valuable time and improving

    your Internet experience. Our DNS Advantage Directory guides you with relevant

    alternatives when your browser's Address Bar can't resolve your search words or

    destination.

    y Its Efficient- DNS as a distributed name resolution service proved to be very efficient,even though the amount of people using it has increased tremendously with the growth

    of the Internet.

    y It's

    Safer- As the leading authoritative DNS provider, we are keenly aware of the

    dangers that plague the Internet today. That's why we've created unique security

    solutions that don't require you to install any hardware or download any software. Our

    DNS Real-Time Directory signals the DNS Advantage recursive servers anytime one of

    the DNS authoritative customers or DNS-RTD partners updates a DNS record. This

    fundamentally eliminates the concept of a TTL by invalidating the recursive server's

    cache for updated Domains, providing you the most accurate and up to date view of

    these sites.

    y Easy Maintainability. The last advantage of DNS-based redirection is its goodmaintainability. Deployment of the complete redirection mechanism boils down to

    launching a single modified DNS server, and subsequently delegating a service domain

    to this server.

    y Speed: The Domain Name System is optimized for speed. Because it is DNS-based, a .tellookup takes just a fraction of a second, and is much quicker than loading a typical web

    page.

    y Real-Time: Whenever you update your data in the DNS, the change goes liveimmediately.

    y Encryptable: Data stored in the DNS may be encrypted so that only authorized usersmay access it, ensuring total privacy.

  • 8/3/2019 AIT Assignment 1(2)

    7/12

    y Global: The DNS is ubiquitous. Everything on the Internet uses the DNS all the time andall information stored within the DNS is globally accessible from any device connected

    to the internet.

    4)Define Client-Server Model.Client/server describes the relationship between two computer programs in which one

    program, the client, makes a service request from another program, the server, which fulfills

    the request. Although programs within a single computer can use the client/server idea, it is a

    more important idea in a network.

    In a network, the client/server model provides a convenient way to interconnect programs that

    are distributed efficiently across different locations. Computer transactions using the

    client/server model are very common.

  • 8/3/2019 AIT Assignment 1(2)

    8/12

  • 8/3/2019 AIT Assignment 1(2)

    9/12

    Example: Database Server A computer system that processes database queries

    Classes of servers:

    1. Iterative: steps of iterative server Wait for a client request to arrive Process the client request. Send the response back to the client that sent the request. Go to step 1.

    2.

    Concurrent: Stepsy Wait for a client request to arrive.y Start a new server to handle this clients request. This may involve

    creating a new task, thread or a process depending upon what the

    underlying operating system supports. This new server handles the

    clients entire request. When complete, this new server terminates.

    y Go back to step 1.Advantage of concurrent over iterative:

    yEach client has its own server. In this multiple clients are servicedconcurrently that allows multiprogramming.

    y In general, TCP servers are con current and UDP are iterative.

    5)Explain TCP/IP layering.The TCP/IP reference model consists of protocol suite that allows computers of all sizes, from

    many different computer vendors, running totally different operating systems, to communicate

  • 8/3/2019 AIT Assignment 1(2)

    10/12

    with each other.

    y Link layer/ Data Link Layer:It includes the device driver in the operating system and the corresponding networking

    interface card in the computer. They handle all the hardware details of physically

    interfacing with the cable.

    At this layer TCP/IP the protocols used are:

    1. Address Resolution Protocol (ARP): It is used to find the physical address frominternet address. On a network, each device on a link is identified by a physical

    address imprinted on a NIC (Network Interface Card).

  • 8/3/2019 AIT Assignment 1(2)

    11/12

    2. Reverse Address Resolution Protocol (RARP): It allows a host to find its Internetaddress when it knows its Physical address.

    y Network/

    I

    nternet Layer:This layer handles the movement of packets around the networks. Routing of packets

    takes place here. It divides the data into packets. IP, ICMP and IGMP provide the

    Network layer.

    The various protocols used are:

    1. Internet Protocol (IP): It is an unreliable and connectionless protocol. IP doesnot keep track of the routes on which packets are sent, due to which it is

    unreliable. It has no facility for recording datagrams once they arrive at their

    destination. Each packet is sent individually of each other, due to which it is

    connectionless.

    It provides maximum efficiency. It allows the user to add only those facilities that

    are necessary for a given application.

    2. Internet Control Message Protocol (ICMP): It is a mechanism used by hosts tosend notifications of datagram problems back to the sender. ICMP sends error

    reporting messages.

    3. InternetGroup Message Protocol (IGMP): It is used to facilitate simultaneoustransmission of a message to a group of recipients.

    y Transport Layer:It provides a flow of data between two hosts. The Transport Layer establishes host-to-

    host connectivity, meaning it handles the details of data transmission that are

    independent of the structure of user data. The layer simply establishes a basic data

    channel that an application uses in its task-specific data exchange. For this purpose the

    layer establishes the concept of theport, a numbered logical construct allocated

    specifically for each of the communication channels an application needs.

    The main protocols defined in this layer are:

    1. Transmission Control Protocol (TCP): It is a transport level protocol responsiblefor delivery of a message from a process to another process. It is reliable as it

    keeps track of datagrams sent. It acknowledges the received packets. It sets

    timeouts, and if a packet is not sent successfully within the timeout. The packet

    is sent again.

  • 8/3/2019 AIT Assignment 1(2)

    12/12

    2. User Datagram Protocol (UDP): It is a connectionless protocol. It has noprocedure for making sure that packet is sent successfully at the other end. After

    UDP has placed a packet on the network (via the IP protocol), it forgets about it.

    UDP doesn't guarantee that the packet actually arrives at its destination. Thebest-known Application layer protocol that uses UDP is DNS

    y Application Layer:The Application Layer refers to the higher-level protocols used by most applications for

    network communication. This layer handles the details of a particular application. Many

    protocols are defined in this layer

    Some of them are:1. FTP File Transfer Protocol copies arbitrary files (e.g. binary, data, and source)

    from

    one machine to another.

    2. DNS Domain Name Service.3. HTTP Hyper Text Transport Protocol4. Remote Login5. SMTP - The Simple Mail Transfer Protocol is used to send mail from one machine

    to

    another.6. Telnet - Provides remote login service. It allows a user on one machine to log

    into another machine on the network. Etc.