Documentos de Académico
Documentos de Profesional
Documentos de Cultura
7 8
Figure 25.3 Domain names and labels Figure 25.4 FQDN and PQDN
9 10
• Register host
according to their
generic behavior
17 18
19 20
Figure 25.11 Inverse domain I.5 Resolution
• First level node is always called arpa
• Second level node is always called in-
Mapping a name to an address or an address to a name
addr (inverse address) is called name-address resolution.
• The rest of the domain defines IP
address
• Corresponding to IP address of
Topics discussed in this section:
132.34.45.121 Resolver
— IP address puts higher level label first Mapping Names to Addresses
— Domain name puts higher level label last Mapping Addresses to Names
— Address will look inverted Recursive Resolution
Caching
21 22
Name-address Resolution
Figure 25.12 Recursive resolution
23 24
Caching
Figure 25.13 Iterative resolution
25 26
27 28
DNS Message Sections
Figure 25.15 Header format
As we saw in Section 25.6, two types of records are How are new domains added to DNS? This is done
used in DNS. The question records are used in the through a registrar, a commercial entity accredited by
question section of the query and response messages. ICANN. A registrar first verifies that the requested
The resource records are used in the answer, domain name is unique and then enters it into the DNS
authoritative, and additional information sections of the database. A fee is charged.
response message.
• List of registrars is available at www.internic.net
Topics discussed in this section: —New entry can be registered with domain name and
Question Record IP address
Resource Record
31 32
I.9 Dynamic Domain Name System (DDNS) I.10 Encapsulation
The DNS master file must be updated dynamically. The DNS can use either UDP or TCP. In both cases the
Dynamic Domain Name System (DDNS) therefore was well-known port used by the server is port 53. UDP is
devised to respond to this need. In DDNS, when a used when the size of the response message is less than
binding between a name and an address is determined, 512 bytes. If the size of the response message is more
the information is sent, usually by DHCP to a primary than 512 bytes, a TCP connection is used.
DNS server. The primary server updates the zone. The
• If UDP is used and the response is larger than 512 bytes,
secondary servers are notified either actively or server will truncate message and turn on the TC bit
passively. — Resolver need to open a TCP connection and repeat the same
• Active notification: Primary server sends message to secondary request to get the full response
server about the changes
• Passive notification: Secondary server checks for changes
periodically DNS can use the services of UDP or TCP using the
• Authentication is used to prevent unauthorized changes in records well-known port 53.
33 34
• Local log-in
— Terminal driver passes
characters to the OS, which
passes them on to the
applications
• Remote log-in
— TELNET client transforms
characters to a universal
character set and delivers
them to local TCP/IP
• Called Network Virtual
Terminal (NVT) characters
• TELNET uses only one TCP connection (port 23)
—Same connection for data and control characters
37 38
39 40
Table 26.3 NVT character set for option negotiation
Table 26.2 Options
43 44
Example 26.2 Figure 26.5 Example of suboption negotiation
45 46
Figure 26.8 Third scenario in electronic mail Figure 26.9 Fourth scenario in electronic mail
51 52
Figure 26.10 Push versus pull in electronic email Figure 26.11 Services of user agent
• MTA client/server
is a push program
—MTA server needs
to run all the time
• Bob needs a pull
Handle
program (MAA Word
processor
Viewer
inboxes and
client) outboxes
When both sender and receiver are connected to the mail server Some examples of command-driven user agents are
via a LAN or a WAN, we need two UAs, two pairs of MTAs and a mail, pine, and elm.
pair of MAAs.
This is the most common situation today. Some examples of GUI-based (Graphic User Interface)
user agents are Eudora, Outlook, and Netscape.
53 54
55 56
Figure 26.14 MIME Figure 26.15 MIME header
57 58
59 60
Figure 26.16 SMTP range Figure 26.17 Commands and responses
Seldom used
63 64
Table 26.8 Responses (2) Example 26.3
$ telnet mail.adelphia.net 25
Trying 68.168.78.100 . . .
Connected to mail.adelphia.net (68.168.78.100).
67 68
Figure 26.19 POP3 and IMAP4 Figure 26.20 The exchange of commands and responses in POP3
• Client opens
connection to TCP
port 110
• Web-based email
—Sending and
retrieving via HTTP
71