- Computers
- Services
- Resources that
are connected to some private network or internet and so on.
Saturday, July 21, 2012
What is meant by DNS? What does it contain?
Posted by
Sunflower
at
7/21/2012 10:56:00 AM
0
comments
Labels: Address, Communication, Distributed system, Domain, Domain Name, Domain Name System, End users, Functionality, Hosts, Information, Internet, IP address, Network, Protocol, Queries, Register, Resources, Servers, URL
![]() | Subscribe by Email |
|
Monday, April 5, 2010
Overview of Network Time Protocol (NTP)
Networked computers share resources such as files. These shared resources often have time-stamps associated with them so it is important that computers communicating over networks, including the Internet, are synchronized. The Network Time Protocol (NTP) is an Internet Standard Recommended Protocol for communicating the Coordinated Universal Time (UTC) from special servers called time servers and synchronising computer clocks on an IP network.
The NTP daemon can not only adjust its own computer's system time. Additionally, each daemon can be a client, server, or peer for other NTP daemons:
- As client it queries the reference time from one or more servers.
- As server it makes its own time available as reference time for other clients.
As peer it compares its system time to other peers until all the peers finally agree about the "true" time to synchchronize to.
Clock Strategy
NTP uses a hierarchical, semi-layered system of levels of clock sources, each level of this hierarchy is termed a stratum and assigned a layer number starting with 0 (zero) at the top. The stratum level defines its distance from the reference clock and exists to prevent cyclical dependencies in the hierarchy.
Importance of NTP
In a commercial environment, accurate time stamps are essential to everything from maintaining and troubleshooting equipment and forensic analysis of distributed attacks, to resolving disputes among parties contesting a commercially valuable time-sensitive transaction.
In a programming environment, time stamps are usually used to determine what bits of code need to be rebuilt as part of a dependency checking process as they relate to other bits of code and the time stamps on them, and without good time stamps your entire development process can be brought to a complete standstill.
So, time is inherently important to the function of routers and networks. It provides the only frame of reference between all devices on the network. This makes synchronized time extremely important and this is where Network Time Protocol comes into picture.
Supported Platforms
NTP's native operating system is UNIX. Today, however, NTP runs under many UNIX-like systems. NTP v4 has also been ported to Windows and can be used under Windows NT, Windows 2000, and newer Windows versions up to Windows Vista and Windows 7.
The standard NTP distribution can not be run under Windows 9x/ME because there are some kernel features missing which are required for precision time keeping.
Posted by
Sunflower
at
4/05/2010 07:08:00 PM
0
comments
Labels: files, Importance, IP address, Network Time Protocol, Networks, NTP, Platforms, Protocols
![]() | Subscribe by Email |
|
Sunday, March 21, 2010
FTP - File Transfer Protocol
- File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet.
- FTP is an application protocol that uses the Internets TCP/IP protocols.
- FTP is commonly used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet.
- FTP is also commonly used to download programs and other files to your computer from other servers.
- Web browser can also make FTP requests to download programs you select from a Web page.
- FTP can also be used to update (delete, rename, move, and copy) files at a server.
- FTP can be run in active mode or passive mode, which control how the second connection is opened.
- In active mode the client sends the server, the IP address port number, that the client will use for the data connection, and the server opens the connection.
- Passive mode was devised for use where the client is behind a firewall and unable to accept incoming TCP connections.
The objectives of FTP are :
- to promote sharing of files (computer programs and/or data),
- to encourage indirect or implicit (via programs) use of remote computers,
- to shield a user from variations in file storage systems among hosts, and
- to transfer data reliably and efficiently.
Anonymous FTP
Thousands of hosts on the Internet run ftp servers that permit guests to login. Such servers usually contain data and software of interest to the general public. They are often called anonymous ftp servers because the guest login name is anonymous. To login to an anonymous ftp server, enter the name anonymous when prompted for a username or userid. When prompted for a password, enter your full e-mail address, unless the on-screen instructions specify an alternative guest password.
Posted by
Sunflower
at
3/21/2010 11:28:00 PM
0
comments
Labels: Client, File transfer protocol, files, FTP, Internet Protocol, IP address, Objectives, Protocols, Server, TCP, Transfer of data
![]() | Subscribe by Email |
|
Friday, March 19, 2010
RARP : Reverse Address Resolution Protocol
- RARP (Reverse Address Resolution Protocol) is a protocol by which a physical machine in a local area network can request to learn its IP address from a gateway server's Address Resolution Protocol (ARP) table or cache.
- A reverse address resolution protocol (RARP) is used for disk less computers to determine their IP address using the network. The RARP message format is very similar to the ARP format.
- When a new machine is set up, its RARP client program requests from the RARP server on the router to be sent its IP address.
- The RARP server will return the IP address to the machine which can store it for future use assuming that the entry has been put in the router table.
- RARP is available for Ethernet, Fiber Distributed-Data Interface, and Token Ring LANs.
- The 'operation' field in the RARP packet is used to differentiate between a RARP request and a RARP reply packet.
- Since a RARP request packet is a broadcast packet, it is received by all the hosts in the network. But only a RARP server processes a RARP request packet, all the other hosts discard the packet.
- The RARP reply packet is not broadcast, it is sent directly to the host, which sent the RARP request.
When a RARP server receives a RARP request packet, it performs the following steps:
- The MAC address in the request packet is looked up in the configuration file and
mapped to the corresponding IP address.
- If the mapping is not found, the packet is discarded.
- If the mapping is found, a RARP reply packet is generated with the MAC and IP
address. This packet is sent to the host, which originated the RARP request.
When a host receives a RARP reply packet, it gets its IP address from the packet and completes the booting process.
Posted by
Sunflower
at
3/19/2010 06:50:00 PM
0
comments
Labels: ARP, Internet protocol, IP address, Networks, Packets, Protocols, RARP, Reply, Request, Reverse Address Resolution Protocol, Server, TCP/IP
![]() | Subscribe by Email |
|
Thursday, March 18, 2010
Serial Line Internet Protocol - SLIP protocol
The need for a data link layer protocol to let IP operate over serial links was identified very early on in the development of TCP/IP. To solve the problem they created a very simple protocol that would frame IP data grams for transmission across the serial line. This protocol is called the Serial Line Internet Protocol, or SLIP for short.
SLIP modifies a standard TCP/IP data gram by appending a special "SLIP END" character to it, which distinguishes data gram boundaries in the byte stream. SLIP requires a serial port configuration of 8 data bits, no parity, and either EIA hardware flow control, or CLOCAL mode (3-wire null-modem) UART operation settings.
- Serial Line Interface Protocol (SLIP) is a TCP/IP protocol used for
communication between two machines that are previously configured for communication with each other.
- The dial-up connection to the server is typically on a slower serial line rather than on the parallel or multiplex lines.
- SLIP does not provide error detection, being reliant on other high-layer protocols for this.
- A SLIP connection needs to have its IP address configuration set each time before it is established.
- The Serial Line Internet Protocol (SLIP) is a mostly obsolete encapsulation of the Internet Protocol designed to work over serial ports and modem connections.
- A version of SLIP with header compression is called CSLIP (Compressed SLIP).
- The Parallel Line Internet Protocol (PLIP) is very similar to SLIP, but works at higher speeds via a parallel port.
- SLIP is a STREAMS-based computer networking facility that provides for the transmission and reception of IP packets over serial lines.
- SLIP can be used to connect one host to another via a single, physical serial line connection between serial ports or over longer distances using a modem at each end of a telephone line.
Posted by
Sunflower
at
3/18/2010 06:18:00 PM
0
comments
Labels: Data Link layer, Internet Protocol, IP address, Networks, Operating Systems, Protocols, Serial, Serial Line Internet Protocol, SLIP, TCP/IP, Transfer of data
![]() | Subscribe by Email |
|
Tuesday, July 7, 2009
Quick Tip: URLs - Uniform Resource Locator
URLs, or Uniform Resource Locators, are the method by which documents or data are addressed in the World Wide Web. The URL contains the following information:
- the protocol.
- the DNS name of the machine on which the page is located.
- the local name uniquely indicating the specific page.
- the location of the resource in the directory structure of the server.
To make a piece of text clickable, the page writer must provide two items of information : the clickable text to be displayed and the URL of the page to go to if the text is selected. Once the text is selected, the browser looks up the host name using DNS. Now armed with the host's IP address, the browser establish TCP connection to host. Over that connection, it sends the file name using the specified protocol.
The URL scheme is open to have protocols other than HTTP also. In short, URL's have been designed to not only allow users to navigate the Web, but to deal with FTP, news, Gopher, email, and telnet as well, making all the specialized user interface programs for those other services unnecessary, and thus integrating nearly all Internet access into a single program, the Web Browser.
The growing use of the Web has turned up an weakness in URL scheme. A URL points to one specific host. For pages that are heavily referenced, it is desirable to have multiple copies far apart, to reduce network traffic. The advent of systems such as Akami are meant to meet that need, distributing content over multiple servers on a global level.
Posted by
Sunflower
at
7/07/2009 02:52:00 PM
0
comments
Labels: DNS, IP address, Protocol, Uniform Resource Locator, URL, Web Applications, Web page, World wide web, WWW
![]() | Subscribe by Email |
|
Wednesday, July 1, 2009
WWW - The Server Side
For all the incoming connectionts from different clients, every website is associated with a server process listening to TCP port 80. The client sends a request after the connection is made and the server sends the reply and then the connection is released. The protocol that is responsible for requests and replies is called HTTP.
The steps that occur between the user clicking and a page being displayed are:
- The browser determines the URL.
- The browser asks DNS for IP address.
- DNS replies.
- Browser makes a TCP connection to the port.
- It then sendsthe GET command.
- The server sends the file.
- The TCP connection is released.
- The browser displays the text of the file.
- The browser fetchesand displays all images of the file.
Not all servers speak HTTP, Old servers use FTP, Gopher or other protocols. Given the number of different protocols, it was thought impractical to make browser understand different protocols. However, since there is a need to make information available (where the server talks in protocols other than HTTP), a solution was required. This solution is something called a proxy server. A proxy server takes a HTTP request from the browser and translates these requests into the FTP/Gopher/other protocols. The proxy server is a separate logical server.
A proxy server also serves to provide an important function called caching. Through caching, a proxy server keeps a local copy of the pages that pass through it. If a user requests for a page, if the page is present on the cache of the proxy server, it serves the page to the user. this way it serves to reduce load on final server.
Posted by
Sunflower
at
7/01/2009 05:32:00 PM
0
comments
Labels: Browsers, Connection, FTP, Gopher, HTTP, IP address, Protocol, Server, TCP, World wide web, WWW
![]() | Subscribe by Email |
|