Академический Документы
Профессиональный Документы
Культура Документы
Objectives
What is a protocol?
Protocol in general
- an acceptable way of behaving. - driving on the left hand side of the road - how to participate in a tutorial discussion. Protocols are critical and there must be agreement on them.
A network protocol
Is the set of very detailed rules, sequences, message formats, and procedures that computer systems use and understand when exchanging data with each other
Examples of Protocols
File Transfer Protocol (FTP) Telnet Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP) Gopher WWW (World Wide Web)
TCP/IP
More on TCP/IP
So TCP/IP allows two computers to exchange data. This is achieved as follows: When two or more networks are involved they are physically connected by devices called IP routers. A router is a computer that transfers packets of data from one network to another. TCP/IP software makes everything seem like one big network. That is, TCP/IP has the affect of allowing two separate networks to communicate as though they were part of the same physical network.
Some of the common TCP/IP application protocols include : File Transfer Protocol (FTP), Telnet, Domain Name System (DNS), Simple Mail Transfer Protocol (SMTP), Multipurpose Internet Mail Extensions (MIME), X Window System, Dynamic Host Configuration Protocol (DHCP).
Allows for data to be sent over the Internet occurs in packets contains from 1 - 1500 bytes of data each packet is given a destination IP address:
An IP address is an unique identifier for a particular computer on the Internet The addresses include four eight-bit octets, which are often written in decimal format for simplicity. To illustrate this, it is easy to see that the following address 10000111.10100101.00100011.11110000 is more easily written and understood as 135.165.35.240
More on IP
It is a connectionless protocol meaning that all packets are sent on a "best effort" basis. There is no guarantee that the packets will get to the destination in the order they that were sent, or even at all.
Answer .
Another protocol .
ensures a sent message is sent without any loss of data or any mix up of the order of the data will request re-transmission of lost or damaged packets. How does it do this? a long message is broken up into many IP packets each packet have a number allocated to it there is error checking damaged or missed packets may be asked for again
Every computer on the internet has a unique address (like a unique phone number) called an IP address
137.66.125.5 - such numbers are difficult to remember Domain Naming Service (DNS), an Internet protocol and distributed database, provides more English like names for IP addresses. DNS names are easy to understand, for example: www.microsoft.com equates to 198.105.232.6
Translating the name into the IP address is called resolving the domain name.
ICANN is the global non-profit, private sector body responsible for ensuring the operability of DNS. It overseas the distribution of unique IP addresses.
So how does DNS work when you enter a domain name into your browser?
DNS - divides each IP address into top-level domains, sub-domains, sub-sub-domains etc a bit like a hierarchical type diagram.
At the heart of DNS are 13 special computers distributed around the world containing the same information these are called root servers maintained by ICANN.
These root servers contain the IP addresses of all the Top Level Domains (TLD) registries. A TLD registry contains all the information about every top level domain names; for example, .edu.au, .org, .com.uk etc are examples of TLD.
There are also thousands of other computers scattered around the world typically located with ISPs or other network suppliers called Domain Name Resolvers. They are used to resolve the remaining parts of the domain name.
So you enter a URL (e.g. www.csu.edu.au) This request is sent to a local resolver (e.g. at tgp.com.au)
This local resolver splits the request and knows where to find the edu.au register and therefore sends the whole URL to one of the 13 root servers. The register responds with the IP address for csu.edu.au
Then the local resolver queries the csu.edu.au register to find the final IP address for www.csu.edu.au
Root server
EDU
COM
ORG
GOV
CSU
ANU
MONASH
CSUSAP
Example : http://lorenz.mur.csu.edu.au The process is to read backwards: au = Australia edu - educational institution csu - name of the institution mur - a physical location indication Murray lorenz - actual machine name
As you are aware DNS is made up of a sequence of labels separated by periods (.). Also note:
Each label has a maximum of 63 characters Total name can only be 255 characters. The organisation that owns a domain name is responsible for its local DNS server it provides the mapping between the hostname and the IP
Allocation of DNS
In Australia this is administered by APNIC Asia Pacific Network Information Center It is one of four Regional Internet Registries in the world Is charged with ensuring the fair distribution and responsible management of IP addresses Executive of seven members to oversea its operations with 62 countries across the region. http://www.apnic.net
Examples of these include: edu, com, gov, net, org, mil Latest top level domain names (introduced in 2000): Biz business Info for all users Coop cooperatives Aero air-transport industry Museum museums Name for individuals launched January 2004 Pro - professionals
Domain names ending in .aero, .biz, .com, .coop, .info, .museum, .name, .org or .pro are registered through registrars refer to http://www.internic.net/regist.html once registered your details are sent to other computers with your specific details
protocol that allows for the transfer of files across the Internet.
both computers need to run FTP - one acts as a server (remote), the other as a client (local).
mainly shareware type of files. usually stored in ZIP format or self-extracting EXE
disadvantage must know the name of the file you are after
Steps to FTP:
1. log on to machine e.g. to csusap 2. Connect to a another remote machine by either: a. anonymous FTP - very common - but can only access files in the pub directory.
login name anonymous password <your email address> e.g. jatkinson@csu.edu.au
Anonymous FTP allows users to enter public data archives and download file
b. log in as yourself - this requires you to have an account on that machine i.e. username and password. This is what you do on CSUSAP Typically these machines are UNIX boxes
Computer A file1.txt
put file2.txt
Computer B has established an FTP session with Computer A and issues the get and put statement
FTP
ftp>cd . Changes to a new directory on the remote machine ftp>quit (or perhaps exit) - terminates an FTP session
A number are available: WINQVT - traditionally used on Windows 3.1 Unix ftp - activated through Start, Run, ftp CuteFTP - excellent, windows based, easy to use WS-FTP - an FAQ exists for it on the ITC125 site Tucows - excellent repository for FTP programs: (www.tucows.com) Web browser - e.g. Netscape/Explorer to retrieve files
FTP - summary
The FTP protocol is responsible for allowing the transfer of files from one computer to another (and vice versa). To do this: The FTP program must be running on both connecting machines. You need to login to the remote machine to establish the formal link to allow transfer to occur. There are two types of FTP connection : anonymous (where you connect to a public transfer area) and personal (where you login to your FTP space). You can upload and/or download files to the connection machine
Telnet is a protocol that allows for one machine to connect to another computer on the Internet. Basically one computer utilising the resources on another computer local machine a dumb terminal is still based on TCP/IP some 40 Request for Comments (RFCs) specify the nature of the Telnet protocol
Computer A
program S program Y
Computer B
Computer B has established a telnet session with Computer A and can now access the programs and resources on Computer A
WWW
'HyperText Transfer Protocol' is the primary protocol of the World Wide Web (WWW) When a Web browser connects to a Web server, it uses HTTP to request Web pages A Web browser is an Internet client application, and the Web server is an Internet server application HTTP has the ability to transfer Web pages, graphics, and any other type of media that is used on the Web.
Please note ..