Вы находитесь на странице: 1из 13

Local Area Network

A local area network (LAN) is a computer network that interconnects computers within a limited area
such as a residence, school, laboratory, university campus or office building.[1] By contrast, a wide area
network (WAN) not only covers a larger geographic distance, but also generally involves leased
telecommunication circuits.

Characteristics

LANs are distinguished by several characteristics that help identify one LAN from another. The geometric
placement of machines connected to a LAN, known as the network's topology, refers to the how the
devices are connected to the network. A LAN's media characteristic refers to the physical connections of
the devices to the network. Typically, devices connect to a LAN through coaxial cables, twisted-pair wire
or fiber optic cables. A network's protocols govern the specifications for sending data on the LAN. These
protocols determine whether the network is a client/server or peer-to-peer LAN.

Client/Server and Peer-to-Peer LANs

A client/server LAN, sometimes called a two-tier LAN, is made up of powerful computers, known as
servers, given the task of managing disk drives, printers and network traffic. The clients in this type of
LAN are the personal computers, or workstations, that run applications. Peer-to-peer LANs, on the other
hand, are networks in which each computer, or node, shares equally in the running of the LAN. While
peer-to-peer LANs are simpler to set up, they do not perform as well under heavy workloads, which is
what client/server LANs are specifically designed to handle.

Types of area networks – LAN, MAN and WAN. The Network allows computers to connect and
communicate with different computers via any medium. LAN, MAN and WAN are the three major types
of the network designed to operate over the area they cover. There are some similarities and
dissimilarities between them.

local-area network (LAN) connects the computer hardware in a localized area such as an office or home.
Typically, LANs use wired connections to link the computers to each other and to a variety of peripheral
devices such as printers.

Early LAN (Local Area Network) networks were formed using coaxial cable, coax is an electric cable and it
is used to carry radio signals. LAN (Local Area Network) setup is developed by connecting two or more
than two computers with each other using a physical connection in order to share files and data
overtime.

Local area network examples are Phone, Computer and TV connected to a single network (Home
Network) via Cables/Wifi/Bluetooth, Hotspot Etc. When the devices are interconnected or connected to
a LAN, it becomes accessible between each other. Home Router is a simplest example of a LAN Device

WLANs use radio waves to transmit data instead of cables and wires. A common standard used in
WLANs is Wi-Fi technology, which is based on the Institute of Electrical and Electronics Engineers'
802.11 standards for wireless data transferring. As of the date of publication, the 802.11a, 802.11b,
802.11g and 802.11n standards are widely used in WLANs. The Wi-Fi standards support the same types
of interfaces used in LANs, including printing and accessing the Internet, as long as the devices support
WLAN technology.
A LAN (local area network) is a group of computers and network devices connected together,
usually within the same building. By definition, the connections must be high speed and
relatively inexpensive (e.g., token ring or Ethernet). Most Indiana University Bloomington
departments are on LANs.
A LAN connection is a high-speed connection to a LAN. On the IUB campus, most connections
are either Ethernet (10 Mbps) or Fast Ethernet (100 Mbps), and a few locations have Gigabit
Ethernet (1000 Mbps) connections.
A MAN (metropolitan area network) is a larger network that usually spans several buildings in
the same city or town. The IUB network is an example of a MAN.
A metropolitan area network (MAN) is a network that interconnects users with computer resources in a
geographic area or region larger than that covered by even a large local area network (LAN) but smaller
than the area covered by a wide area network (WAN). The term is applied to the interconnection of
networks in a city into a single larger network (which may then also offer efficient connection to a wide
area network). It is also used to mean the interconnection of several local area networks by bridging
them with backbone lines. The latter usage is also sometimes referred to as a campus network.

Examples of metropolitan area networks of various sizes can be found in the metropolitan areas of
London, England; Lodz, Poland; and Geneva, Switzerland. Large universities also sometimes use the term
to describe their networks. A recent trend is the installation of wireless MANs.

A WAN (wide area network), in comparison to a MAN, is not restricted to a geographical


location, although it might be confined within the bounds of a state or country. A WAN
connects several LANs, and may be limited to an enterprise (a corporation or an organization)
or accessible to the public. The technology is high speed and relatively expensive. The Internet
is an example of a worldwide public WAN.
A wide area network (WAN) is a telecommunications network that extends over a large geographical
area for the primary purpose of computer networking. Wide area networks are often established with
leased telecommunication circuits.[1]

Business, as well as education and government entities use wide area networks to relay data to staff,
students, clients, buyers and suppliers from various locations across the world. In essence, this mode of
telecommunication allows a business to effectively carry out its daily function regardless of location. The
Internet may be considered a WAN.[2]

Similar types of networks are personal area networks (PANs), local area networks (LANs), campus area
networks (CANs), or metropolitan area networks (MANs) which are usually limited to a room, building,
campus or specific metropolitan area, respectively.

A wide area network (WAN) is a data network, usually used for connecting computers, that spans a wide
geographical area. WANs can be used to connect cities, states, or even countries. WANs are often used
by larger corporations or organizations to facilitate the exchange of data, and in a wide variety of
industries corporations with facilities at multiple locations have embraced WANs. Increasingly, however,
even small businesses are utilizing WANs as a way of increasing their communications capabilities.
Although WANs serve a purpose similar to that of local area networks (LANs), WANs are structured and
operated quite differently. The user of a WAN usually does not own the communications lines that
connect the remote computer systems; instead, the user subscribes to a service through a
telecommunications provider. Unlike LANs, WANs typically do not link individual computers, but rather
are used to link LANs. WANs also transmit data at slower speeds than LANs. WANs are also structurally
similar to metropolitan area networks (MANs), but provide communications links for distances greater
than 50 kilometers.

WANs have existed for decades, but new technologies, services, and applications have developed over
the years to dramatically increase their efficacy for business. WANs were originally developed for digital
leased-line services carrying only voice, rather than data. As such, they connected the private branch
exchanges (PBXs) of remote offices of the same company. WANs are still used for voice services, but
today they are used more frequently for data and image transmission (such as video conferencing).
These added applications have spurred significant growth in WAN usage, primarily because of the surge
in LAN connections to the wider networks.

HOW WANS WORK

WANs are either point-to-point, involving a direct connection between two sites, or operate across
packet-switched networks, in which data are transmitted in packets over shared circuits. Point-to-point
WAN service may involve either analog dial-up lines, in which a modem is used to connect the computer
to the telephone line, or dedicated leased digital telephone lines, also known as "private lines." Analog
lines, which may be either part of a public-switched telephone network or leased lines, are suitable for
batch data transmissions, such as nonurgent order entry and point-of-sale transactions. Dedicated
digital phone lines permit uninterrupted, secure data transmission at fixed costs.

Point-to-point WAN service providers include both local telephone companies and long-distance
carriers. Packet-switched network services are typically chosen by organizations which have low
volumes of data or numerous sites, for which multiple dedicated lines would be too expensive.

Depending on the service, WANs can be used for almost any data-sharing purpose for which LANs can
be used. Slower transmission speeds, however, may make some applications less practical for WANs.
The most basic uses of WANs are for electronic mail and file transfer, but WANs can also permit users at
remote sites to access and enter data on a central site's database, such as instantaneously updating
accounting records. New types of network-based software that facilitate productivity and production
tracking, such as groupware and work-flow automation software, can also be used over WANs. Using
groupware, workers at dispersed locations can more easily collaborate on projects. WANs also give
remote offices access to a central office's other data communications services, including the Internet.

Routing protocols
A routing protocol specifies how routers communicate with each other, distributing information that
enables them to select routes between any two nodes on a computer network. Routers perform the
"traffic directing" functions on the Internet; data packets are forwarded through the networks of the
internet from router to router until they reach their destination computer. Routing algorithms
determine the specific choice of route. Each router has a prior knowledge only of networks attached to
it directly. A routing protocol shares this information first among immediate neighbors, and then
throughout the network. This way, routers gain knowledge of the topology of the network. The ability of
routing protocols to dynamically adjust to changing conditions such as disabled data lines and
computers and route data around obstructions is what gives the Internet its survivability and reliability.

The specific characteristics of routing protocols include the manner in which they avoid routing loops,
the manner in which they select preferred routes, using information about hop costs, the time they
require to reach routing convergence, their scalability, and other factors.

Many routing protocols are defined in documents called RFCs.

There are three major types of routing protocols.

Routing Information Protocols(RIP)

Interior Gateway Protocol (IGRP)

Open Shortest Path First (OSPF)

Exterior Gateway Protocol (EGP)

Enhanced interior gateway routing protocol (EIGRP)

Border Gateway Protocol (BGP)

Intermediate System-to-Intermediate System (IS-IS)

Lets discuss each of above protocols as below.


Routing information protocols (RIP)
RIP (Routing Information Protocol) is a forceful protocol type used in local area network and wide
area network. RIP (Routing Information Protocol) type is categorized interior gateway protocol
within the use of distance vector algorithm. Routing information protocols defined in 1988. It
also has version 2 and nowadays both versions are in use. Technically it is outdated by more
sophisticated techniques such as (OSPF) and the OSI protocol IS-IS.
Interior gateway routing protocol (IGRP)
It is distance vector IGRP (Interior gateway Protocol) make-believe by Cisco. Router used it to
exchange routing data within an independent system. Interior gateway routing protocol created
in part to defeat the confines of RIP (Routing Information Protocol) in large networks. It maintains
multiple metrics for each route as well as reliability, MTU, delay load, and bandwidth. The
maximum hop of EIGRP is 255 and routing updates are transmitting 90 seconds. It measured in
classful routing protocol, but it is less popular because of wasteful of IP address space.
Open shortest path first (OSPF)
Open Shortest Path First (OSPF) is an active routing protocol used in internet protocol.
Particularly it is a link state routing protocol and includes into the group of interior gateway
protocol. Open Shortest Path First (OSPF) operating inside a distinct autonomous system. The
version 2 of Open Shortest Path First (OSPF) defined in 1998 for IPv4 then the OSPF version 3 in
RFC 5340 in 2008. The Open Shortest Path First (OSPF) most widely used in the network of big
business companies.
Exterior Gateway Protocol (EGP)
The absolute routing protocol for internet is exterior gateway protocol which is specified in 1982
by Eric C. EGP (Exterior Gateway Protocol) initially expressed in RFC827 and properly specified in
RFC 904 in 1984.The Exterior Gateway Protocol (EGP) is unlike distance vector and path vector
protocol. It is a topology just like tree.
Enhanced interior gateway routing protocol (EIGRP)
Enhanced Interior Gateway Routing Protocol (EIGRP) based on their original IGRP while it is a
Cisco proprietary routing protocol. It is a distance-vector routing protocol in advance within the
optimization to lessen both the routing unsteadiness incurred after topology alteration, plus the
use of bandwidth and processing power in the router which support enhanced interior gateway
routing protocol will automatically reallocate route information to IGRP (Enhanced Interior
Gateway Routing Protocol) neighbors by exchanging the 32 bit EIGRP (Enhanced Interior Gateway
Routing Protocol) metric to the 24 bit IGRP metric. Generally optimization based on DUAL work
from SRI which assured loop free operation and offer a means for speedy junction.
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP) are the core routing protocol of the internet and responsible to
maintain a table of Internet protocol networks which authorize network reaching capability
between AS. The Border Gateway Protocol (BGP) expressed as path vector protocol. It doesn’t
employ conventional IGP metrics but making routing judgment based on path, network policies.
It is created to replace the Exterior Gateway Protocol (EGP) routing protocol to permit completely
decentralized routing in order to permit the removal of the NSF Net which consent to internet to
turn into a truly decentralized system. The fourth version of Border Gateway Protocol (BGP)has
been in use since 1994 and 4th version from 2006 .The 4 version RFC 4271 has many features
such as it correct a lots of previous errors, illuminating vagueness and brought t the RFC much
nearer to industry practice.
Intermediate System-to-Intermediate System (IS-IS)
Intermediate System-to-Intermediate System (IS-IS)is a great protocol used by network devices
to determine the best way to promoted datagram from side to side a packet switched network
and this process is called routing. It was defined in ISO/IEC 10589 2002 within the OSI reference
design. Intermediate system-to-intermediate system (IS-IS) differentiate among levels such as
level 1and level 2. The routing protocol can be changed without contacting the intra area routing
protocol.
CLASSES OF ROUTING PROTOCOLS

1. Distance Vector Routing Protocol – These protocols selects best path in the basis of hop counts to
reach a destination network in the particular direction. Dynamic protocol like RIP is an example of
distance vector routing protocol. Hop count is each router which occurs in between the source and the
destination network. The path with the least hop count will be chosen as the best path.

Features

Updates of network are exchanged periodically.

Updates (routing information) is always broadcast.

Full routing tables are sent in updates.

Routers always trust on routing information received from neighbor routers. This is also known as
routing on rumors.

Disadvantages –

As the routing information are exchanged periodically, unnecessary traffic is generated which consumes
available bandwidth.

As full routing tables are exchanged, therefore it has security issues. If an authorized person enters the
network, then the whole topology will be very easy to understand.

Also broadcasting of network periodically creates unnecessary traffic.

2. Link State Routing Protocol – These protocols know more about the Internetwork than any other
distance vector routing protocol. These re also known as SPF (Shortest Path First) protocol. OSPF is an
example of link state routing protocol.

Features –

Hello messages, also known as keep-alive messages are used for neighbor discovery and recovery.

Concept of triggered updates are used i.e updates are triggered only when there is a topology change .

Only that much updates are exchanged which is requested by the neighbor router.

Link state routing protocol maintains three tables namely:

Neighbor table- the table which contains information about the neighbors of the router only, i.e, to
which adjacency has been formed.
Topology table- This table contains information about the whole topology i.e contains both best and
backup routes to particular advertised network.

Routing table- This table contains all the best routes to the advertised network.

Advantages –

As it maintains separate tables for both best route and the backup routes ( whole topology) therefore it
has more knowledge of the inter network than any other distance vector routing protocol.

Concept of triggered updates are used therefore no more unnecessary bandwidth consumption is seen
like in distance vector routing protocol.

Partial updates are triggered when there is a topology change, not a full update like distance vector
routing protocol where whole routing table is exchanged.

3. Advanced Distance vector routing protocol – It is also known as hybrid routing protocol which uses
the concept of both distance vector and link state routing protocol. Enhanced Interior Gateway Routing
Protocol (EIGRP) is an example of this class if routing protocol. EIGRP acts as a link state routing protocol
as it uses the concept of Hello protocol for neighbor discovery and forming adjacency. Also, partial
updates are triggered when a change occurs. EIGRP acts as distance vector routing protocol as it learned
routes from directly connected neighbors.

APPLICATION LAYER PROTOCOLS

An application layer is an abstraction layer that specifies the shared communications protocols and
interface methods used by hosts in a communications network.[1]The application layer abstraction is
used in both of the standard models of computer networking: the Internet Protocol Suite (TCP/IP) and
the OSI model.[2] Although both models use the same term for their respective highest level layer, the
detailed definitions and purposes are different.

In TCP/IP, the application layer contains the communications protocols and interface methods used in
process-to-process communications across an Internet Protocol (IP) computer network.[4]The
application layer only standardizes communication and depends upon the underlying transport layer
protocols to establish host-to-host data transfer channels and manage the data exchange in a client-
server or peer-to-peer networking model.[5] Though the TCP/IP application layer does not describe
specific rules or data formats that applications must consider when communicating, the original
specification (in RFC 1123) does rely on and recommend the robustness principle for application design.

In the OSI model, the definition of the application layer is narrower in scope.[8] The OSI model defines
the application layer as the user interface responsible for displaying received information to the user.[9]
In contrast, the Internet Protocol Suite does not concern itself with such detail. OSI also explicitly
distinguishes additional functionality below the application layer, but above the transport layer at two
additional levels: the session layer, and the presentation layer. OSI specifies a strict modular separation
of functionality at these layers and provides protocol implementations for each layer.

Application Protocol

Application protocols govern various processes, such as the process for downloading a web page, or for
sending e-mail. The application protocol directs how these processes are done.
Layering

An application protocol is layered on top of a transport protocol. The application protocol provides the
bytes that carry the messages and the responses for various processes, and the transport protocol helps
reliably transport the bytes and makes sure they arrive in order.

Other Layers

In addition to the application and transport protocols, there are also other layers involved in enabling
network communication, such as network protocol. All of them come together to facilitate the process
whereby various applications communicate with each other.

Network Layer Protocols

The network layer protocols provide a connectionless packet delivery service. A packet is the unit of
transfer for a physical network. “Connectionless” describes the packet treatment: all packets are treated
as separate entities. Network layer protocols provide efficient packet delivery by managing the
addressing and routing of packets. The Internet Protocol (IP) provides the network layer protocol for
TCP/IP.

Internet Protocol

The Internet Protocol (IP) is the foundation of TCP/IP. It sends and receives packets of information over
the physical network. IP calls the packet a datagram. Each datagram includes its source and destination
addresses, control information, and any actual data passed from or to the host layer. The IP datagram is
the unit of transfer of an internet.

IP provides the mechanism by which hosts and gateways are able to route internet datagrams. IP
routing is based on the destination address of each datagram. When IP receives a datagram, it checks
the destination network number and a routing table. This routing table contains the addresses of known
destination networks, gateways, and hosts. IP delivers datagrams with local internet addresses directly.
It forwards datagrams with nonlocal addresses to their next destination based on the routing table
information.

IP also monitors the size of the datagrams it receives from the host layer. If the datagram exceeds the
length of the packet the physical network is capable of sending, IP fragments the single datagram into
datagrams of lengths that are manageable by the underlying network hardware. The IP layer on the
destination host reassembles the fragmented datagrams into the original single datagram before
passing it to the higher level protocols.

IP requires that the higher level (transport or application layer) protocols reliably handle the data.

Internet Control Message Protocol

Although considered an independent protocol, the Internet Control Message Protocol (ICMP) performs
an integral function of IP. ICMP allows hosts and gateways to exchange information about the
communications environment of the internet. For example, ICMP can allow a gateway to inform a host
of a more efficient route. ICMP information is encoded in the IP datagram.

Address Resolution Protocol

The Address Resolution Protocol (ARP) provides an address conversion function. A host can have a
hardware address that is unrelated to its internet address. ARP provides a method of mapping internet
addresses to hardware addresses. You use ARP most often in hosts connected to Ethernet networks.

Reverse Address Resolution Protocol

Diskless machines use the Reverse Address Resolution Protocol (RARP) to find their IP addresses from a
server before they can communicate using TCP/IP.

Transport Layer Protocols

The transport layer protocols provide the data transport services to the application layers. The
Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) form the bridge between
the user or application programs (such as an electronic mail facility) and the lower level protocols (such
as IP).

A primary function of the transport layer protocols is multiplexing. This term refers to directing message
traffic to abstract delivery points called ports. When a host is running several application programs at
once, the transport layer protocols direct incoming datagrams to the appropriate port so that they can
reach the correct application program. Multiplexing allows many applications to access an internet at
the same time.

User Datagram Protocol

The User Datagram Protocol (UDP) is a transaction-oriented protocol that transports data to or from the
application layer. UDP requires very little overhead because it provides no protection against datagram
loss or duplication. Applications that require orderly and reliable data transport should use the
Transmission Control Protocol (TCP).

Transmission Control Protocol

The Transmission Control Protocol (TCP) provides reliable, process-to-process data transport by
supplying the error checking facilities that IP or UDP do not provide.

TCP is a stream-oriented protocol. TCP guarantees that large amounts of data are transferred in order,
so that the destination host receives all data in the same order as the source host sends it. TCP also
guarantees that data is neither duplicated nor lost between the source and destination hosts.
Application Layer Protocols

The application layer protocols represent the highest level in the protocol layering model. These
protocols convey the user request to the transport layer. They provide the internet services, such as file
sharing, mail transfer, and remote terminal login.

The application protocols are often described in terms of the client-server model. This model views the
local host as a client that initiates a networking request. The remote host, or server, then provides the
service to the client. When referring to software that implements the TCP/IP application layer protocols,
a client utility initiates a request, and a server process provides the service to the client utility.

The user on the local host typically invokes a client utility, such as TELNET or FTP, that initiates the
networking request. The client utility contacts the server process on the remote host. The server process
usually performs the network service without user intervention.

For example, a user on host Homer invokes the client-FTP utility and requests that it open a connection
with host Plato. The server-FTP process on Plato answers the request, thereby establishing a connection,
and is now ready to service file transfer requests. The user on Homer enters commands "directly" to
Plato to, for example, list directories or to rename, delete, or transfer files.

File Transfer Protocol

The File Transfer Protocol (FTP) allows a user to log in to a remote host and perform file operations. FTP
file operations include listing remote directories, copying files to or from the remote host, and renaming
or deleting remote files.

When a user invokes FTP on a local host, a client-FTP utility establishes a connection with the remote
host's server-FTP process. The server and client use this first connection to pass information. When the
client requests a file transfer, the server and client open a second connection over which to pass the
data.

When client-FTP establishes a connection with a server, FTP requests a username and password before
allowing the user access to the server host. This protects files by denying access to unauthorized users.
FTP supports all popular file formats, including ASCII and binary.

The FTP protocol uses TCP for reliable data transport.

Network File System Protocol

The Network File System (NFS) protocol allows users to access remotely a server host's filesystem as if it
were part of the user's local filesystem. A client user can issue requests to create or remove files and
directories, look up files, transfer files, set attributes on files, read and write files, and more. The server
host performs the file operation and returns the requested information or status.
The NFS protocol uses UDP for data transport. Users can optionally request FTP as the transport
protocol.

Simple Mail Transfer Protocol

The Simple Mail Transfer Protocol (SMTP) is an electronic mail facility that transfers mail messages
between a client and server hosts.

SMTP is a store-and-forward mail system. When the client-SMTP utility tries to deliver mail but finds the
server host unavailable, SMTP stores the mail at the client host. SMTP periodically attempts mail
delivery until the server host can accept the mail. Furthermore, SMTP provides end-to-end reliability.

The client host keeps a copy of the mail message until the server host successfully receives the message.

The SMTP protocol uses TCP for reliable data transport.

TELNET or Virtual Terminal Protocol

TELNET (also known as the Remote Login Protocol) allows a user at a client host to interactively log in to
a server host.

TELNET defines a device called a network virtual terminal (NVT). The NVT provides a standard network-
wide representation of a terminal. This implies that the client and server have an agreed upon
convention for how a terminal appears over the network.

TELNET also allows the client and server to negotiate options that can enhance their communications.
By agreeing on certain options, TELNET clients and servers can, for example, change the format of the
data they exchange from ASCII to binary.

The TELNET protocol uses TCP for reliable data transport.

Application Layer:-

The application layer is present at the top of the OSI model. It is the layer through which users interact.
It provides services to the user.

Application Layer protocol:-

1. TELNET:

Telnet stands for the TELecomunications NETwork. It helps in terminal emulation. It allows Telnet client
to access the resources of the Telnet server. It is used for managing the files on the internet. It is used
for initial set up of devices like switches. The telnet command is a command that uses the Telnet
protocol to communicate with a remote device or system. Port number of telnet is 23.

2. FTP:

FTP stands for file transfer protocol. It is the protocol that actually lets us transfer files.It can facilitate
this between any two machines using it. But FTP is not just a protocol but it is also a program.FTP
promotes sharing of files via remote computers with reliable and efficient data transfer. Port number for
FTP is 20 for data and 21 for control.

3. TFTP:

The Trivial File Transfer Protocol (TFTP) is the stripped-down, stock version of FTP, but it’s the protocol
of choice if you know exactly what you want and where to find it. It’s a technology for transferring files
between network devices and is a simplified version of FTP

4. NFS:

It stands for network file system.It allows remote hosts to mount file systems over a network and
interact with those file systems as though they are mounted locally. This enables system administrators
to consolidate resources onto centralized servers on the network.

5. SMTP:

It stands for Simple Mail Transfer Protocol. It is a part of the TCP/IP protocol. Using a process called
“store and forward,” SMTP moves your email on and across networks. It works closely with something
called the Mail Transfer Agent (MTA) to send your communication to the right computer and email
inbox. Port number for SMTP is 25.

6. LPD:

It stands for Line Printer Daemon.It is designed for printer sharing.It is the part that receives and
processes the request. A “daemon” is a server or agent.

7. X window:

It defines a protocol for the writing of graphical user interface–based client/server applications. The idea
is to allow a program, called a client, to run on one computer. It is primarily used in networks of
interconnected mainframes.

8. SNMP:

It stands for Simple Network Management Protocol. It gathers data by polling the devices on
the network from a management station at fixed or random intervals, requiring
them to disclose certain information. It is a way that servers can share information about their current
state, and also a channel through which an administrate can modify pre-defined values. Port number of
SNMP is 61(TCP) and 62(UDP).

9. DNS:

It stands for Domain Name Service. Every time you use a domain name, therefore, a DNS service must
translate the name into the corresponding IP address. For example, the domain name www.abc.com
might translate to 198.105.232.4.
Port number for DNS is 53.

10. DHCP:
It stands for Dynamic Host Configuration Protocol (DHCP).It gives IP addresses to hosts.There is a lot of
information a DHCP server can provide to a host when the host is registering for an IP address with the
DHCP server. Port number for DHCP is 67, 68.

Вам также может понравиться