Вы находитесь на странице: 1из 7

The Internet and many larger private Internet Protocol (IP) networks rely on Domain Name System

(DNS) to help direct traffic. The DNS maintains a distributed database of network names and
addresses, and it provides methods for computers to remotely query the database. Some people call
DNS the "phone book of the Internet."

DNS and the World Wide Web


All public Web sites run on servers connected to the Internet with public IP addresses.

The Web servers at About.com, for example, have addresses like 207.241.148.80. Although people
can type address information like http://207.241.148.80/ into their Web browser to visit sites, being
able to use proper names like http://www.about.com/ is much more practical.

The Internet utilizes DNS as a worldwide name resolution service for public Web sites. When
someone types a site's name into their browser, DNS looks up the corresponding IP address for that
site, the data required to make the desired network connections between Web browsers and Web
servers.

DNS Servers and Name Hierarchy


DNS uses a client/server network architecture. DNS servers are the computers designated to store
DNS database records (names and addresses), while clients of the DNS include PCs, phones and
other devices of end users. DNS servers also interface with each other, acting as clients to each other
when needed.

The DNS organizes its servers into a hierarchy. For the Internet, so-called root name servers reside at
the top of the DNS hierarchy. The Internet root name servers manage DNS server information for the
Web's top-level domains (TLD) (like ".com" and ".uk"), specifically the names and IP addresses of the
original (called authoritative) DNS servers responsible for answering queries about each TLD
individually.

Servers at the next lower level of the DNS hierarchy track second-level domain names and addresses
(like "about.com") , and additional levels manage Web domains (like "compnetworking.about.com").

DNS servers are installed and maintained by private businesses and Internet governing bodies
around the world. For the Internet, 13 root name servers (actually redundant pools of machines
around the world) support the hundreds of Internet top-level domains, while About.com provides
authoritative DNS server information for the sites within its network. Organizations can similarly
deploy DNS on their private networks separately, on the smaller scale.

The Domain Name System (DNS) translates Internet domain and host names to IP addresses and
vice versa.

On the Internet, DNS automatically converts between the names we type in our Web browser address
bar to the IP addresses of Web servers hosting those sites. Larger corporations also use DNS to
manage their own company intranet. Home networks use DNS when accessing the Internet but do
not use it for managing the names of home computers.

How DNS Works


DNS is a client/server network communication systems: DNS clients send requests to and receive
responses from DNS servers. Requests containing a name, that result in an IP address being
returned from the server, are called forward DNS lookups. Requests containing an IP address and
resulting in a name, called reverse DNS lookups, are also supported. DNS implements a distributed
database to store this name and last-known address information for all public hosts on the Internet.

The DNS database resides on a hierarchy of special database servers. When clients like Web
browsers issue requests involving Internet host names, a piece of software (usually built into the
network operating system) called the DNS resolver first contacts a DNS server to determine the
server's IP address. If the DNS server does not contain the needed mapping, it will, in turn, forward
the request to a different DNS server at the next higher level in the hierarchy.

After potentially several forwarding and delegation messages are sent within the DNS hierarchy, the
IP address for the given host eventually arrives at the resolver, that in turn completes the request
over Internet Protocol.

DNS additionally includes support for caching requests and for redundancy. Most network operating
systems support configuration of primary, secondary, and tertiary DNS servers, each of which can
service initial requests from clients.

What is FTP? One of the most popular uses of the Internet is to download files - that is, transfer files
from a computer on the Internet to your computer. Many thousands of files are downloaded every day
from the Internet. Most of these files are downloaded using the Internet's File Transfer Protocol,
commonly referred to as FTP. This protocol can also be used to upload files from your computer to
another computer on the Internet.

FTP (File Transfer Protocol)

File Transfer Protocol is a standard network protocol used to exchange and manipulate files over a
TCP/IP-based network, such as the Internet. FTP is built on client-server architecture and utilizes
separate control and data connections between the client and server applications. FTP is used with
user-based password authentication or with anonymous user access. Applications were originally
interactive command-line tools with standardized command syntax, but graphical user interfaces
have been developed for all desktop operating systems in use today. The Trivial File Transfer Protocol
(TFTP) is a similar, but simplified, not interoperable, and unauthenticated version of FTP.

Numerous FTP servers all over the world allow users anywhere on the Internet to log in and down-
load files placed on them. The main competitor for FTP is HTTP (Hyper Text Transfer Protocol) and
the day is not very far when sites would run HTTP servers instead of the FTP servers. It is so because
HTTP servers can do whatever FTP server can do and do it more efficiently.

As the Web gains popularity, downloading software is becoming even easier. You can use your Web
browser and click on links to files; behind the scenes, FTP is often still downloading the files.

One problem with downloading files over the Internet is that some files are so large that it can take a
tremendous amount of time to download them. As a way to speed up file transfers and save space on
the FTP server, files are commonly compressed. Many different methods are used to compress files.
After the files have been downloaded, you will need to run the decompression software such as PK
UNZIP to decompress the files to use them.

Once you have the compressed file such as data. zip, you will need to unzip or decompress it to get to
the setup file and install the program. You can use the WinZip file to uncompress this file.

Features of FTP

The basic features of FTP are:


1. Data representation

FTP handles three types of data representations-ASCII (7 bit), EBCDIC (8-bit) and 8-binary data.

The ASCII file is the default format for transferring text files

Each character is encoded using 7-bit ASCII. The sender transforms the file from its own
representation into ASCII characters and the receiver transforms the ASCII character to its own
representation.

The image file is the default format for transferring binary files. The file is sent as continuous
streams of bits without any interpretation or encoding.

2. File organization and Data structures

FTP supports both unstructured and structured file.

An unstructured file contains string of bytes and is enl-marked by EOF (End of file). The data
structure that corresponds to such a file is called file structure.

A structured file contains a list of records and each record is delimited by EDR (End of Record). The
data structure of such file is called record structure i.e. file is divided into records.

Another structured file contains pages, with each page having a page number and a page header. The
pages can be stored and accessed randomly or sequentially. The corresponding data structure is
called page structure i.e. file is divided into pages.

3. Transmission modes

FTP can transfer a file by using one of the following three modes:

Stream mode

It is the default mode.

File is transmitted as continuous stream of bytes to TCP.

TCP is responsible for chopping data into segments of appropriate size.

If data is simply a stream of bytes (file structure), no end-of-file is needed. EOF in this case is the
closing of the data connection by the sender.

If data is divided into records (record structure), each record has a I-byte EOR (End-of-Record)
character and the end of the file has a I-byte EOF (End-of-file) character.

Block mode

Data is delivered from FTP to TCP in blocks.

Each block is preceded by 3 bytes header.

The first byte is called the block descriptor.

The second and third byte defines the size of the block in bytes.

Compressed mode

Data is usually compressed if the file to be transmitted is very big.


The compression method normally used in Run-length encoding.

In a text file, usually spaces (blanks) are removed.

In a binary file, null characters are compressed.

4. Error control

Since TCP is used for data transfer no additional error recovery mechanism is required.

5. Access control

File access protection is done using login procedure with login name and password.

FTP operation

FTP uses client/server model for communication.

Two TCP connections are used for file transfer.

On one connection control signals (commands and responses) are exchanged and the other
connection is used for actual data transfer. These two connections are called control connection and
data connection respectively.

HTTP (Hypertext Transfer Protocol) provides a network protocol standard that Web browsers and
servers use to communicate.

The Hypertext Transfer Protocol (HTTP) is a protocol used mainly to access data on the World
Wide Web. This protocol transfers data in the form of plain text, hypertext, audio, video, and so on.
However, it is called the hypertext transfer protocol because its efficiency allows its use in a hypertext
environment, where there are rapid jumps from one document to another.

The idea of HTTP is very simple. A client sends a request, which looks like mail, to the server. The
server sends the response, which looks like a mail reply, to the client. The request and response
messages carry data in the form of a letter with MIME-like format.

The commands from the client to the server are embedded in a letter-like request message. The
contents of the requested file or other information are embedded in a letter-like response message.

HTTP Transaction The client initializes the transaction by sending a request message. The server
replies by sending a response.

Messages There are two general types of HTTP messages: request and response. Both message types
follow almost the same format.

Request Messages A request message consists of a request line, headers and sometimes a body.

Response Messages A response message consists of a status line, headers and sometimes, a body.
Uniform Resource Locator (URL) A client that wants to access a document needs an address. To
facilitate the access of documents distributed throughout the world, HTTP uses the concept of
locations. The Uniform Resource Locator (URL) is a standard for specifying any kind of information
on the Internet. The URL defines four things-Method, Host Computer, Port, and Path.

The World Wide Web uses a locator called a Uniform Resource Locator to identify and intertribal
data.

A URL has three parts: Method: //Host/Path

The method defines the protocol used to retrieve the document; it can vary from plain/text through
FTP or gopher, all the way to HTTP.

The host is the computer that contains the data requested. It is most often a UNIX machine, and has
many pages stored on it in special directories.

The third part of the URL is the path to the file requested. It may be a complex path separated by
slashes" /" , or it can be very short. On most web servers, the files to be accessed are stored in specific
directories.

Browsers

Issues with HTTP


Messages transmitted over HTTP can fail to be delivered successfully for several reasons:

user error

malfunction of the Web browser

malfunction of the Web server

errors in the creation of Web pages

temporary Internet network glitches

When these failures occur, the protocol captures the cause of the failure (if possible) and reports an
error code back to the browser. Error 404 ("Page not found"), for example, became famous in the
early days of the Internet when issues with Web pages and navigation were more common.

In the 1980s the telecommunications industry expected that digital services would follow much the same pattern as
voice services did on the public switched telephone network, and conceived an end-to-end circuit switched services,
known as Broadband Integrated Services Digital Network (B-ISDN).

Before B-ISDN, the original ISDN attempted to substitute the analog telephone system with a digital system which
was appropriate for both voice and non-voice traffic. Obtaining worldwide agreement on the basic rate
interface standard was expected to lead to a large user demand for ISDN equipment, hence leading to mass
production and inexpensive ISDN chips. However, the standardization process took years while computer
network technology moved rapidly. Once the ISDN standard was finally agreed upon and products were available, it
was already obsolete.[citation needed] For home use the largest demand for new services was video and voice transfer, but
the ISDN basic rate lacks the necessary channel capacity.

This led to introduction of B-ISDN, by adding the word broadband. Although the term had a meaning in physics and
engineering (similar to wideband), the CCITT defined it as: "Qualifying a service or system requiring transmission
channels capable of supporting rates greater than the primary rate" [1] referring to the primary rate which ranged from
about 1.5 to 2 Mbit/s. Services envisioned included video telephone and video conferencing. Technical papers were
published in early 1988.[2] Standards were issued by the Comit Consultatif International Tlphonique et
Tlgraphique (CCITT, now known as ITU-T), and called "Recommendations". They included G.707 [3] to G.709,
[4]
and I.121[5] which defined the principal aspects of B-ISDN, with many others following through the 1990s. [6][7]

The designated technology for B-ISDN was Asynchronous Transfer Mode (ATM), which was intended to carry
both synchronous voice and asynchronous data services on the same transport.[8] The B-ISDN vision has been
overtaken by other disruptive technologies used in the Internet. The ATM technology survived as a low-level layer in
most digital subscriber line (DSL) technologies, and as a payload type in some wireless technologies such
as WiMAX. The term "broadband" became a marketing term for any digital Internet access service.

ISDN is an acronym, which means Integrated Services Digital Network. BISDN is an extension
of ISDN in terms of capabilities, i.e. it not only has the narrowband capability of ISDN but also the
broadband capability. It is a set of CCITT / ITU standards for digital transmission over ordinary
telephone copper wire as well as over other media. ISDN is the integration of both analogue or
voice data, together with digital data over the same network.

3. DEFINITION A service requiring transmission channels capable of supporting rates greater


than the primary rate. ITU-T. Any service inquiry with a speed greater than 1.544 Mbps is
defined as broad band,and any communications based on this speed are called broadband
communications.

4. BROWNY POINTS BISDN is an extension of ISDN only in term of the name. Everything is
different including protocol, architecture, transmission, and switching technology. Designed to
exploit the advances in technology. Provides for integration of wide range of communications
facilities and the support of universal communications with the following characteristics.
3Worldwide exchange between any two subscribers in any medium. 3Retrieval and sharing
of information from multiple sources, in multiple media. 3Distribution of a wide variety of
materials to home or office, on demand.

5. GOAL The Goal of BISDN is to achieve complete integration of services, ranging from low-bit--
rate bursty signals to high-bit-rate continuous real-time signals.

6. BROAD BAND SERVICE Interactive Services 1.Conversational Services 2.Messaging Services


3.Retrieval Services Distribution Services 1.Without user individual presentation1 2.control
(broadcast service) 3.With user individual control

7. BROAD BAND SERVICE Interactive Services Two-way exchange of information (other than
control signaling (information) between two subscribers or between a subscriber and a service
provider. Distribution Services Primarily one way transfer of information, from service provider
to B-ISDN subscriber.

8. BROAD BAND SERVICES Distribution Services Without User Presentation Control Referred
also as broadcast services Provide a continuos flow of information, which is distributed from a
central source to an unlimited number of authorized receivers connected to the network. User
can access this flow of information but has no control over it. Example: High definition
television (HDTV)

9. BROAD BAND SERVICES Distribution Services With User Presentation Control Distribute
information from a central source to a large number of users. Information is provided as a
sequence of information entities (e.g. , frames) with cyclical repetition. User has the ability of
individual access to the cyclical distributed information and can control start and order of
presentation. Example: cable text

10. ARCHITECTURE
11. TRANSMISSION STRUCTURE Three new transmission services Full-duplex 155 Mbps
Asymmetrical 155 Mbps (subscriber to the network), and 622 Mbps (network to subscriber) Full
duplex 622 Mbps - for multiple video

12. PROTOCOL REFERENCE MODEL Control Plane Physical Layer ATM Layer ATM Adaptation Layer
Higher Layers Higher Layers User Plane Management Plane

13. REFERENCE MODEL The B-ISDN reference protocol model consists of three planes:
Management Plane User Plane Control Plane

14. B-ISDN COMPARED WITH OSI MODEL CBR VBR ABR UBR Signaling ATM Adaptation Layer ATM
Layer Physical Layer Network Layer Link Layer Physical Layer

15. B-ISDN SERVICES Interactive Services Conversational Services Messaging Services


Retrieval Services Distributive Services No User Control of Presentation User Controlled
Presentation

16. APPLICATIONS Enhanced Phone Services Customer Premise Equipment High Speed Data
Transfers Telemessaging Videotex Tele-conferencing Telecontrol, Telepolling Tele-
financing Online Services Remote Video Surveillance

17. CONCLUSION ISDN is an underlying technology, which provides cost- effective networking
through the public telephone networks. ISDN is an important step forward in the adaptation of
the network to handle the increasing global demand for computer-to computer data
communications. ISDN brings us closer to the goal of a ubiquitous multi- service network,
integrating voice, data, video and image.

Вам также может понравиться