Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.

Slides:



Advertisements
Similar presentations
DNS – Domain Name system Converting domain names to IP addresses since 1983.
Advertisements

Domain Name System (or Service) (DNS) Computer Networks Computer Networks Term B10.
1 EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
1 Outline r Principles of network applications m App architectures m App requirements r Web and HTTP m Objects vs. root files m Persistent, pipelining,
EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Domain Name System (or Service) (DNS) Computer Networks Computer Networks Spring 2012 Spring 2012.
EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
2: Application Layer1 FTP, SMTP and DNS. 2: Application Layer2 FTP: separate control, data connections r FTP client contacts FTP server at port 21, specifying.
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts, routers: –IP address (32 bit) - used for addressing datagrams –“name”, e.g., gaia.cs.umass.edu.
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
Application Layer session 1 TELE3118: Network Technologies Week 12: DNS Some slides have been taken from: r Computer Networking: A Top Down Approach.
1 Application layer r Electronic Mail m SMTP, POP3, IMAP r DNS r P2P file sharing.
CPSC 441: DNS1 Instructor: Anirban Mahanti Office: ICT Class Location: ICT 121 Lectures: MWF 12:00 – 12:50 Notes derived.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Name Resolution and DNS. Domain names and IP addresses r People prefer to use easy-to-remember names instead of IP addresses r Domain names are alphanumeric.
Chapter 2 Application Layer
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
CS 4396 Computer Networks Lab
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
DNS & P2P A PPLICATIONS د. عـــادل يوسف أبو القاسم.
Domain Name System (DNS)
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 10 Omar Meqdadi Department of Computer Science and Software Engineering University.
DNS. 2 DNS: Domain Name System DNS services Hostname to IP address translation Host aliasing – Canonical and alias names Mail server aliasing Load distribution.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
2: Application Layer1 Some network apps r r Web r Instant messaging r Remote login r P2P file sharing r Multi-user network games r Streaming stored.
21-1 Last time □ Finish HTTP □ FTP This time □ SMTP ( ) □ DNS.
CS 471/571 Domain Name Server Slides from Kurose and Ross.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
DNS: Domain Name System
Review: –Which protocol is used to move messages around in the Internet? –Describe how a message is moved from the sender’s UA to the receiver’s.
1 DNS: Domain Name System People: many identifiers: m SSN, name, Passport # Internet hosts, routers: m IP address (32 bit) - used for addressing datagrams.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
DNS: Domain Name System People: many identifiers: – SSN, name, Passport # Internet hosts, routers: – IP address (32 bit) - used for addressing datagrams.
Lecture 6: Video Streaming 2-1. Outline  Network basics:  HTTP protocols  Studies on HTTP performance from different views:  Browser types [NSDI 2014]
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
DNS. 2 DNS: Domain Name System DNS services Hostname to IP address translation Host aliasing – Canonical and alias names Mail server aliasing Load distribution.
2: Application Layer1 DNS: Domain Name System People have many identifiers: SSN, name, passport number Internet hosts, routers have identifiers, too: IP.
CPSC 441: DNS 1. DNS: Domain Name System Internet hosts: m IP address (32 bit) - used for addressing datagrams m “name”, e.g., - used by.
CS 3830 Day 10 Introduction 1-1. Announcements r Quiz #2 this Friday r Program 2 posted yesterday 2: Application Layer 2.
Lecture 5: Web Continued 2-1. Outline  Network basics:  HTTP protocols  Studies on HTTP performance from different views:  Browser types [NSDI 2014]
1 EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer Networking book.
1 Kyung Hee University Chapter 19 DNS (Domain Name System)
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1. Internet hosts:  IP address (32 bit) - used for addressing datagrams  “name”, e.g., ww.yahoo.com - used by humans DNS: provides translation between.
Application Layer, 2.5 DNS 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
Important r On Friday, could you ask students to please me their groups (one per group) for Project 2 so we can assign IP addresses. I’ll send.
CSEN 404 Application Layer II Amr El Mougy Lamia Al Badrawy.
Spring 2006 CPE : Application Layer_DNS 1 Special Topics in Computer Engineering Application layer: Domain Name System Some of these Slides are.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
2: Application Layer 1 Some network apps r r Web r Instant messaging r Remote login r P2P file sharing r Multi-user network games r Streaming stored.
Chapter 17 DNS (Domain Name System)
Introduction to Networks
Chapter 19 DNS (Domain Name System)
Session 6 INST 346 Technologies, Infrastructure and Architecture
Chapter 9: Domain Name Servers
Introduction to Communication Networks
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Chapter 2 Application Layer
Chapter 7: Application layer
Cookies, Web Cache & DNS Dr. Adil Yousif.
Chapter 2: Application layer
Chapter 19 DNS (Domain Name System)
CSE 4213: Computer Networks II
DNS: Domain Name System
FTP, SMTP and DNS 2: Application Layer.
Presentation transcript:

Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.

Last Lecture  HTTP  Request/Response  Conditional GET message  Simple Mail Transfer Protocol (SMTP)  Comparison with HTTP

Today’s Lecture  Domain Name System(DNS)

HTTP overview Uses TCP: r Client initiates TCP connection (creates socket) to server, port 80 r Server accepts TCP connection from client r HTTP messages (application-layer protocol messages) exchanged between browser (HTTP client) and Web server (HTTP server) r Advantage of Layered architecture  HTTP does not worry about lost data or how TCP recovers from loss HTTP is “stateless”  Server maintains no information about past client requests

Conditional GET r Problem: The copy of the object residing in the cache may be stale  The object may have been modified since the copy was cached r HTTP has a mechanism that allows a cache to verify that its objects are up to date Conditional GET message r (1) The request message uses the GET method r (2) The request message includes an If-Modified- Since header line.

Conditional GET r Goal: Don’t send object if cache has up-to-date cached version r Cache: specify date of cached copy in HTTP request If-modified-since: r Server: Response contains no object if cached copy is up- to-date:  HTTP/ Not Modified  Waste bandwidth  Increases response time Cache Server HTTP request msg If-modified-since: HTTP response HTTP/ Not Modified Object not Modified HTTP request msg If-modified-since: HTTP response HTTP/ OK Object Modified

Electronic Mail Asynchronous Medium Three major components: User Agents Mail Servers Simple Mail Transfer Protocol: SMTP User Agent a.k.a. “mail reader” composing, editing, reading mail messages e.g., Eudora, Outlook, Mozilla Thunderbird Sends message to the mail server user mailbox outgoing message queue mail server user agent user agent user agent mail server user agent user agent mail server user agent SMTP

Electronic Mail Mail Servers r Each recipient has a mailbox located in one of the mail servers r Mailbox manages and maintains the messages that have been sent to him. r Message queue of outgoing (to be sent) mail messages r Simple Mail Transfer Protocol (SMTP) between mail servers to send messages  Client and Server  Both client and sever sides of SMTP run on every mail server.  Runs on TCP at port 25.  RFC 2821 mail server user agent user agent user agent mail server user agent user agent mail server user agent SMTP

r SMTP uses persistent connections  Can send all of the messages over the same TCP connection Comparison with HTTP: r HTTP transfer files from web server to web client r SMTP from one mail server to another r Both use Persistent Connections r HTTP: pull  Someone loads information on a web server and users use HTTP to pull this info  TCP connection is initiated by the machine that wants to receive the file r SMTP: push  Sending mail sever pushes the file to the receiving mail server  TCP connection is initiated by the machine that wants to send the file

DNS: Domain Name System People: many identifiers:  SSN, name, passport # Internet hosts:  IP address (32 bit)  “name”, e.g., ww.yahoo.com - used by humans Q: map between IP addresses and name ? Domain Name System: r Distributed Database implemented in hierarchy of many DNS servers r An application-layer protocol that allows hosts to query the distributed database  DNS uses UDP over port number 53.  RFC 1034 and RFC 1035

DNS Simple design would have one DNS server that contains all the mappings Why not centralize DNS? r Single point of failure r Traffic volume r Distant centralized database r Maintenance A centralized database in a single DNS server doesn’t scale!

Root DNS Servers com DNS servers org DNS serversedu DNS servers poly.edu DNS servers umass.edu DNS servers yahoo.com DNS servers amazon.com DNS servers pbs.org DNS servers Distributed, Hierarchical Database Client wants IP for r Client first queries a root server r The root server returns the IP addresses for TLD servers for the top level domain com r The client then contacts one of the TLD servers which returns the IP address of an authoritative server for amazon.com r The authoritative server then returns the IP address for the host name

DNS: Root Name Servers r 13 root DNS servers world wide r Each server is a cluster of replicated servers  security and reliability purposes. r For more information see b USC-ISI Marina del Rey, CA l ICANN Los Angeles, CA e NASA Mt View, CA f Internet Software C. Palo Alto, CA (and 36 other locations) i Autonomica, Stockholm (plus 28 other locations) k RIPE London (also 16 other locations) m WIDE Tokyo (also Seoul, Paris, SF) a Verisign, Dulles, VA c Cogent, Herndon, VA (also LA) d U Maryland College Park, MD g US DoD Vienna, VA h ARL Aberdeen, MD j Verisign, ( 21 locations)

TLD and Authoritative Servers r Top-level Domain (TLD) Servers:  Responsible for com, org, net, edu, etc, and all top-level country domains uk, fr, jp.  Network Solutions maintains servers for com TLD  Educause for edu TLD r Authoritative DNS Servers:  Every organization with publicly accessible hosts provide accessible DNS records.  That maps the names of those hosts to IP addresses r Authoritative DNS servers houses these DNS records

Local Name Server r Does not strictly belong to hierarchy r Each company, university has one.  Also called “default name server” r When host makes DNS query, query is sent to its local DNS server  acts as proxy, forwards query into hierarchy

requesting host cis.poly.edu gaia.cs.umass.edu root DNS server local DNS server dns.poly.edu authoritative DNS server dns.cs.umass.edu 7 8 TLD DNS server DNS name resolution example r Host at cis.poly.edu wants IP address for gaia.cs.umass.edu Iterated query: r Contacted server replies with name of server to contact r “I don’t know this name, but ask this server”

requesting host cis.poly.edu gaia.cs.umass.edu root DNS server local DNS server dns.poly.edu authoritative DNS server dns.cs.umass.edu 7 8 TLD DNS server 3 Recursive Query: rPuts burden of name resolution on other server DNS Caching  Extensively used  Cache entries timeout (disappear) after some time  TLD servers typically cached in local name servers  Thus root name servers not often visited DNS name resolution example

Home Assignment Root name servers use Anycast technique? Why? Advantages? How to enter record into DNS? What is a whois database?

Thank You