DNS: Domain Name System

Size: px
Start display at page:

Download "DNS: Domain Name System"

Transcription

1 DNS: Domain Name System People: many identifies: m SSN, name, Passpot # Intenet hosts, outes: m IP addess (32 bit) - used fo addessing datagams (in IPv4) m name, e.g., gaia.cs.umass.edu - used by humans Q: map between IP addesses and name? Adding additional delays Domain Name System: distibuted database implemented in hieachy of many name seves application-laye potocol host, outes, name seves to communicate to esolve names (addess/name tanslation) m uns ove UDP, pot 53 m used by othe app pots. m note: coe Intenet function implemented as application-laye potocol m complexity at netwok s edge 2: Application Laye 2b-1

2 Othe DNS sevices Host aliasing: any canonical hostname may have one o moe aliases: e.g. cassius.ee.usyd.edu.au has aliases and ee.usyd.edu.au Mail seve aliasing: use of simple hostnames fo hotmail.com might be elay1.west.hotmail.com DNS pemits to have same mail seve and web seve aliased hostnames; easie fo uses Load distibution: eplicated seves fo busy seves; e.g. fo cnn.com we may have many seves DNS database otates the IP addesses of all eplicated seves wheneve eply to an inquiy; client uses the fist IP addess in the list load distibution 2: Application Laye 2b-2

3 DNS name seves Why not centalize DNS? single point of failue taffic volume distant centalized database maintenance doesn t scale! no seve has all nameto-ip addess mappings local name seves: m each ISP, company has local (default) name seve m host DNS quey fist goes to local name seve authoitative name seve: m fo a host: stoes that host s IP addess, name m can pefom name/addess tanslation fo that host s name 2: Application Laye 2b-3

4 DNS: Root name seves contacted by local name seve that can not esolve name oot name seve: m contacts authoitative name seve if name mapping not known m gets mapping m etuns mapping to local name seve ~ dozen oot name seves woldwide 2: Application Laye 2b-4

5 Simple DNS example oot name seve host suf.euecom.f wants IP addess of gaia.cs.umass.edu 1. Contacts its local DNS seve, dns.euecom.f 2. dns.euecom.f contacts oot name seve, if necessay 3. oot name seve contacts authoitative name seve, dns.umass.edu, if necessay local name seve dns.euecom.f equesting host suf.euecom.f authoititive name seve dns.umass.edu gaia.cs.umass.edu 2: Application Laye 2b-5

6 DNS example oot name seve Root name seve: may not know authoatiative name seve may know intemediate name seve: who to contact to find authoitative name seve local name seve dns.euecom.f equesting host suf.euecom.f intemediate name seve dns.umass.edu 4 5 authoitative name seve dns.cs.umass.edu gaia.cs.umass.edu 2: Application Laye 2b-6

7 DNS: iteated queies oot name seve ecusive quey: puts buden of name esolution on contacted name seve heavy load? iteated quey: contacted seve eplies with name of seve to contact I don t know this name, but ask this seve local name seve dns.euecom.f equesting host suf.euecom.f iteated quey intemediate name seve dns.umass.edu 5 6 authoitative name seve dns.cs.umass.edu gaia.cs.umass.edu 2: Application Laye 2b-7

8 DNS: caching and updating ecods once (any) name seve leans mapping, it caches mapping m cache enties timeout (disappea) afte some time [specified in TTL(time to live) field of the DNS Resouce Recod (RR)] update/notify mechanisms unde design by IETF m RFC 2136 m 2: Application Laye 2b-8

9 DNS ecods DNS: distibuted db stoing esouce ecods (RR) RR fomat: (name, value, type,ttl) Type=A Type=CNAME m name is hostname m value is IP addess Type=NS m name is domain (e.g. foo.com) m value is IP addess of authoitative name seve fo this domain m name is an alias name fo some canonical (the eal) name m value is canonical name Type=MX m value is hostname of mail seve associated with name 2: Application Laye 2b-9

10 DNS potocol, messages DNS potocol : quey and eply messages, both with same message fomat message heade identification: 16 bit # fo quey, eply to quey uses same # flags: m quey o eply m ecusion desied m ecusion available m eply is authoitative 2: Application Laye 2b-10

11 DNS potocol, messages Name, type fields fo a quey RRs in esponse to quey ecods fo authoitative seves additional helpful info that may be used 2: Application Laye 2b-11

12 Socket pogamming Goal: lean how to build a client/seve application that communicates using sockets Socket API intoduced in BSD4.1 UNIX, 1981 explicitly ceated, used, eleased by apps client/seve paadigm two types of tanspot sevice via socket API: m uneliable datagam m eliable, byte steamoiented develope decision socket a host-local, applicationceated/owned, OS-contolled inteface (a doo ) into which application pocess can both send and eceive messages to/fom anothe (emote o local) application pocess 2: Application Laye 2b-12

13 Two types of client/seve apps Implementation of a potocol standad in an RFC m Client/seve pogams obey ules of the RFC e.g., if it is FTP pocess, see RFC 959 and confom it m Client and seve pogams ae able to inteopeate m Client and seve pogams can be ceated independently m They must use the pot numbe associated with potocol A popietay client/seve application m No necessity in confoming any RFC m Client and seve pogams developed by same develope m Not to use aleady used pot numbes m This method is the one we use hee Use C, C ++, o Java pogamming 2: Application Laye 2b-13

14 Socket pogamming using TCP Socket: a doo between application pocess and endend-tanspot potocol (UDP o TCP) TCP sevice: eliable tansfe of bytes fom one pocess to anothe socket pogamming: client/seve application development contolled by application develope contolled by opeating system pocess socket TCP with buffes, vaiables Intenet pocess socket TCP with buffes, vaiables contolled by application develope contolled by opeating system client o seve client o seve 2: Application Laye 2b-14

15 Socket pogamming with TCP Client must contact seve seve pocess must fist be unning seve must have ceated socket (doo) that welcomes client s contact Client contacts seve by: ceating client-local TCP socket object specifying IP addess, pot numbe of seve pocess TCP thee way handshaking When client ceates socket: client TCP establishes connection to seve TCP When contacted by client, seve TCP ceates new socket fo seve pocess to communicate with client m allows seve to talk with multiple clients application viewpoint TCP povides eliable, in-ode tansfe of bytes ( pipe ) between client and seve 2: Application Laye 2b-15

16 Socket pogamming with TCP Example client-seve app: client eads line fom standad input (infomuse steam), sends to seve via socket (outtoseve steam) seve eads line fom socket seve convets line to uppecase, sends back to client client eads, pints modified line fom socket and pints the line on standad output (infomseve steam) Input steam: sequence of bytes into pocess Output steam: sequence of bytes out of pocess infomuse outtoseve client socket iinfomseve a typical TCPclient: 3 steams and 1 socket 2: Application Laye 2b-16

17 Client/seve socket inteaction: TCP Seve (unning on hostid) ceate socket, pot=x, fo incoming equest: welcomesocket = SeveSocket() wait fo incoming connection equest connectionsocket = welcomesocket.accept() ead equest fom connectionsocket wite eply to connectionsocket close connectionsocket TCP connection setup Client ceate socket, connect to hostid, pot=x clientsocket = Socket() send equest using clientsocket ead eply fom clientsocket close clientsocket 2: Application Laye 2b-17

18 Example: Java client (TCP) impot java.io.*; impot java.net.*; class TCPClient { Ceate input steam Ceate client socket, connect to seve Ceate output steam attached to socket public static void main(sting agv[]) thows Exception { Sting sentence; Sting modifiedsentence; BuffeedReade infomuse = new BuffeedReade(new InputSteamReade(System.in)); Socket clientsocket = new Socket("hostname", 6789); DataOutputSteam outtoseve = new DataOutputSteam(clientSocket.getOutputSteam()); 2: Application Laye 2b-18

19 Example: Java client (TCP), cont. Ceate input steam attached to socket Send line to seve Read line fom seve BuffeedReade infomseve = new BuffeedReade(new InputSteamReade(clientSocket.getInputSteam())); sentence = infomuse.eadline(); outtoseve.witebytes(sentence + '\n'); modifiedsentence = infomseve.eadline(); System.out.pintln("FROM SERVER: " + modifiedsentence); clientsocket.close(); } } 2: Application Laye 2b-19

20 Example: Java seve (TCP) impot java.io.*; impot java.net.*; class TCPSeve { Ceate welcoming socket at pot 6789 Wait, on welcoming socket fo contact by client Ceate input steam, attached to socket public static void main(sting agv[]) thows Exception { Sting clientsentence; Sting capitalizedsentence; SeveSocket welcomesocket = new SeveSocket(6789); while(tue) { Socket connectionsocket = welcomesocket.accept(); BuffeedReade infomclient = new BuffeedReade(new InputSteamReade(connectionSocket.getInputSteam())); 2: Application Laye 2b-20

21 Example: Java seve (TCP), cont Ceate output steam, attached to socket Read in line fom socket Wite out line to socket } } } DataOutputSteam outtoclient = new DataOutputSteam(connectionSocket.getOutputSteam()); clientsentence = infomclient.eadline(); capitalizedsentence = clientsentence.touppecase() + '\n'; outtoclient.witebytes(capitalizedsentence); End of while loop, loop back and wait fo anothe client connection 2: Application Laye 2b-21

22 Socket pogamming with UDP UDP: no connection between client and seve no handshaking sende explicitly attaches IP addess and pot of destination seve must extact IP addess, pot of sende fom eceived datagam UDP: tansmitted data may be eceived out of ode, o lost application viewpoint UDP povides uneliable tansfe of goups of bytes ( datagams ) between client and seve a typical UDP client: 1 steam and 1 socket 2: Application Laye 2b-22

23 Diffeences in SP with UDP no initial handshaking between two pocesses and thus no welcoming socket no steams attached to the sockets attaching IP destination addess and pot numbe to each packet by the sende etieving addess by eceive fo each packet Example: m client eads a line fom standad input and sends it out though its socket to the seve m seve eads a line fom its socket m convets it to uppecase m sends the modified line out to client m client eads the modified line though its socket and pints it on it standad output 2: Application Laye 2b-23

24 Client/seve socket inteaction: UDP Seve (unning on hostid) Client ceate socket, pot=x, fo incoming equest: sevesocket = DatagamSocket() ead equest fom sevesocket ceate socket, clientsocket = DatagamSocket() Ceate, addess (hostid, pot=x, send datagam equest using clientsocket wite eply to sevesocket specifying client host addess, pot umbe ead eply fom clientsocket close clientsocket 2: Application Laye 2b-24

25 Example: Java client (UDP) impot java.io.*; impot java.net.*; Ceate input steam Ceate client socket Tanslate hostname to IP addess using DNS class UDPClient { public static void main(sting ags[]) thows Exception { BuffeedReade infomuse = new BuffeedReade(new InputSteamReade(System.in)); DatagamSocket clientsocket = new DatagamSocket(); InetAddess IPAddess = InetAddess.getByName("hostname"); byte[] senddata = new byte[1024]; byte[] eceivedata = new byte[1024]; Sting sentence = infomuse.eadline(); senddata = sentence.getbytes(); 2: Application Laye 2b-25

26 Example: Java client (UDP), cont. Ceate datagam with data-to-send, length, IP add, pot Send datagam to seve Read datagam fom seve } DatagamPacket sendpacket = new DatagamPacket(sendData, senddata.length, IPAddess, 9876); clientsocket.send(sendpacket); DatagamPacket eceivepacket = new DatagamPacket(eceiveData, eceivedata.length); clientsocket.eceive(eceivepacket); Sting modifiedsentence = new Sting(eceivePacket.getData()); System.out.pintln("FROM SERVER:" + modifiedsentence); clientsocket.close(); } 2: Application Laye 2b-26

27 Example: Java seve (UDP) impot java.io.*; impot java.net.*; Ceate datagam socket at pot 9876 Ceate space fo eceived datagam Receive datagam class UDPSeve { public static void main(sting ags[]) thows Exception { DatagamSocket sevesocket = new DatagamSocket(9876); byte[] eceivedata = new byte[1024]; byte[] senddata = new byte[1024]; while(tue) { DatagamPacket eceivepacket = new DatagamPacket(eceiveData, eceivedata.length); sevesocket.eceive(eceivepacket); 2: Application Laye 2b-27

28 Example: Java seve (UDP), cont Get IP add pot #, of sende Sting sentence = new Sting(eceivePacket.getData()); InetAddess IPAddess = eceivepacket.getaddess(); int pot = eceivepacket.getpot(); Ceate datagam to send to client Wite out datagam to socket } } Sting capitalizedsentence = sentence.touppecase(); senddata = capitalizedsentence.getbytes(); DatagamPacket sendpacket = new DatagamPacket(sendData, senddata.length, IPAddess, pot); sevesocket.send(sendpacket); } End of while loop, loop back and wait fo anothe datagam 2: Application Laye 2b-28

29 Chapte 2: Summay Ou study of netwok apps now complete! application sevice equiements: m eliability, bandwidth, delay client-seve paadigm Intenet tanspot sevice model m connection-oiented, eliable: TCP m uneliable, datagams: UDP specific potocols: m http m ftp m smtp, pop3 m dns socket pogamming m client/seve implementation m using tcp, udp sockets 2: Application Laye 2b-29

30 Chapte 2: Summay Most impotantly: leaned about potocols typical equest/eply message exchange: m client equests info o sevice m seve esponds with data, status code message fomats: m heades: fields giving info about data m data: info being communicated contol vs. data msgs m in-based, out-of-band centalized vs. decentalized stateless vs. stateful eliable vs. uneliable msg tansfe complexity at netwok edge secuity: authentication 2: Application Laye 2b-30

DNS: Domain Names. DNS: Domain Name System. DNS: Root name servers. DNS name servers

DNS: Domain Names. DNS: Domain Name System. DNS: Root name servers. DNS name servers DNS: Domain Name System DNS: Domain Names People: many identifiers: SSN, name, Passport # Internet hosts, routers: Always: IP address (32 bit) - used for addressing datagrams Often: name, e.g., nifc14.wsu.edu

More information

Network Programming using sockets

Network Programming using sockets Network Programming using sockets TCP/IP layers Layers Message Application Transport Internet Network interface Messages (UDP) or Streams (TCP) UDP or TCP packets IP datagrams Network-specific frames Underlying

More information

Data Communication & Networks G22.2262-001

Data Communication & Networks G22.2262-001 Data Communication & Networks G22.2262-001 Session 10 - Main Theme Java Sockets Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences 1 Agenda

More information

Domain Name System (DNS)

Domain Name System (DNS) Domain Name System (DNS) Instructor: Anirban Mahanti Office: ICT 745 Email: mahanti@cpsc.ucalgary.ca Class Location: ICT 121 Lectures: MWF 12:00 12:50 Notes derived from Computer Networking: A Top Down

More information

Computer Networks. Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se

Computer Networks. Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides are adapted

More information

DNS: Distributed Name System

DNS: Distributed Name System Distributed Name System Slides adapted from: Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2002. All material copyright 1996-2002

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Socket programming. Socket Programming. Languages and Platforms. Sockets. Rohan Murty Hitesh Ballani. Last Modified: 2/8/2004 8:30:45 AM

Socket programming. Socket Programming. Languages and Platforms. Sockets. Rohan Murty Hitesh Ballani. Last Modified: 2/8/2004 8:30:45 AM Socket Programming Rohan Murty Hitesh Ballani Last Modified: 2/8/2004 8:30:45 AM Slides adapted from Prof. Matthews slides from 2003SP Socket programming Goal: learn how to build client/server application

More information

Domain Name System (or Service) (DNS) Computer Networks Term B10

Domain Name System (or Service) (DNS) Computer Networks Term B10 Domain Name System (or Service) (DNS) Computer Networks Term B10 DNS Outline DNS Hierarchial Structure Root Name Servers Top-Level Domain Servers Authoritative Name Servers Local Name Server Caching and

More information

DNS: Domain Name System

DNS: Domain Name System DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers: IP address (32 bit) - used for addressing datagrams name, e.g., ww.yahoo.com - used by humans Q: map between

More information

Domain Name System Richard T. B. Ma

Domain Name System Richard T. B. Ma Domain Name System Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Names Vs. Addresses Names are easier for human to remember www.comp.nus.edu.sg

More information

Application-layer protocols

Application-layer protocols Application layer Goals: Conceptual aspects of network application protocols Client server paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS Application-layer

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2: Application Layer 1 Some network apps e-mail

More information

Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org

Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

Goal: learn how to build client/server application that communicate using sockets. An interface between application and network

Goal: learn how to build client/server application that communicate using sockets. An interface between application and network Socket programming Goal: learn how to build client/server application that communicate using sockets Socket API introduced in BSD4.1 UNIX, 1981 explicitly created, used, released by apps client/server

More information

Domain Name System (DNS)

Domain Name System (DNS) Chapter 18 CSC465 Computer Networks Spring 2004 Dr. J. Harrison These slides are based on the text TCP/IP Protocol Suite (2 nd Edition) Domain Name System (DNS) CONTENTS NAME SPACE DOMAIN NAME SPACE DISTRIBUTION

More information

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer the email service The

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents

More information

Cours du 22 novembre

Cours du 22 novembre Cours du 22 novembre Couche application DNS Application Layer 2-2 DNS: domain name system people: many identifiers: SSN, name, passport # Internet hosts, routers: IP address (32 bit) - used for addressing

More information

Digital Communication in the Modern World Application Layer cont. DNS, SMTP

Digital Communication in the Modern World Application Layer cont. DNS, SMTP Digital Communication in the Modern World Application Layer cont. DNS, http://www.cs.huji.ac.il/~com com@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top Down Approach

More information

The Application Layer: DNS

The Application Layer: DNS Recap SMTP and email The Application Layer: DNS Smith College, CSC 9 Sept 9, 0 q SMTP process (with handshaking) and message format q Role of user agent access protocols q Port Numbers (can google this)

More information

DNS and P2P File Sharing

DNS and P2P File Sharing Computer Networks DNS and P2P File Sharing Based on Computer Networking, 4 th Edition by Kurose and Ross DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers:

More information

Domain Name System (DNS) Omer F. Rana. Networks and Data Communications 1

Domain Name System (DNS) Omer F. Rana. Networks and Data Communications 1 Domain Name System (DNS) Omer F. Rana Networks and Data Communications 1 What is a DNS Each institution on the internet has a host that runs a process called a Domain Name Server (also DNS!) It is not

More information

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng. CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail: SMTP, POP3, IMAP

More information

CMPE 80N: Introduction to Networking and the Internet

CMPE 80N: Introduction to Networking and the Internet CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 11 CMPE 80N Spring'10 1 Announcements Guest lecture on intellectual property and

More information

How To Map Between Ip Address And Name On A Domain Name System (Dns)

How To Map Between Ip Address And Name On A Domain Name System (Dns) Computer Networks: Domain Name Service (DNS) CS 3516 D- term 2013 Instructor: Krishna Venkatasubramanian Quiz 2 DNS: domain name system people: many identifiers: SSN, name, passport # Internet hosts, routers:

More information

Java Network. Slides prepared by : Farzana Rahman

Java Network. Slides prepared by : Farzana Rahman Java Network Programming 1 Important Java Packages java.net java.io java.rmi java.security java.lang TCP/IP networking I/O streams & utilities Remote Method Invocation Security policies Threading classes

More information

Data Communications & Networks. Session 2 Main Theme Application Layer. Dr. Jean-Claude Franchitti

Data Communications & Networks. Session 2 Main Theme Application Layer. Dr. Jean-Claude Franchitti Data Communications & Networks Session 2 Main Theme Application Layer Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted from

More information

FTP: the file transfer protocol

FTP: the file transfer protocol FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that initiates transfer

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

CIS-162. Security Baselines. Security Baselines. Best Practice aka Beer and Pizza. Remove all unneeded processes

CIS-162. Security Baselines. Security Baselines. Best Practice aka Beer and Pizza. Remove all unneeded processes CIS-162 Intoduction to Netok Secuity Comptia Secuity+ Eam Domain 3 Secuity Baselines Secuity Baselines Standad that oganization systems must comply Establish the nom of consistency Detect the anomaly Pefom

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting

Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting Magda El Zarki Prof. of CS Univ. of CA, Irvine Email: elzarki@uci.edu http: www.ics.uci.edu/~magda Overivew of NAT NAT: Network Address Translation

More information

CMPE 80N: Introduction to Networking and the Internet

CMPE 80N: Introduction to Networking and the Internet CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 80N Fall'10 1 Announcements Forum assignment #2 posted. Due Nov. 5 th.

More information

NET0183 Networks and Communications

NET0183 Networks and Communications NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many

More information

CS 43: Computer Networks Naming and DNS. Kevin Webb Swarthmore College September 17, 2015

CS 43: Computer Networks Naming and DNS. Kevin Webb Swarthmore College September 17, 2015 CS 43: Computer Networks Naming and DNS Kevin Webb Swarthmore College September 17, 2015 Agenda Identifiers and addressing Domain Name System History Query sequences Record types Load balancing Recall:

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

Application Layer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Application Layer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross Application Layer Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Web caches (proxy server) goal: satisfy client request without involving origin server v user

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

DNS: Domain Name System

DNS: Domain Name System DNS: Domain Name System CMPSCI 491G: Computer Networking Lab V. Arun Slides adapted from Liebeherr & Zarki, Kurose & Ross, Kermani DNS: domain name system people: many identifiers: SSN, name, passport

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

Hitachi Virtual Storage Platform

Hitachi Virtual Storage Platform Hitachi Vitual Stoage Platfom FASTFIND LINKS Contents Poduct Vesion Getting Help MK-90RD7028-15 2010-2014 Hitachi, Ltd. All ights eseved. No pat of this publication may be epoduced o tansmitted in any

More information

CS 348: Computer Networks. - DNS; 22 nd Oct 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - DNS; 22 nd Oct 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - DNS; 22 nd Oct 2012 Instructor: Sridhar Iyer IIT Bombay Domain Name System Map between host names and IP addresses People: many identifiers: name, Passport #, Internet hosts:

More information

DNS. Spring 2016 CS 438 Staff 1

DNS. Spring 2016 CS 438 Staff 1 DNS Spring 2016 CS 438 Staff 1 Host Names vs. IP addresses Host names Mnemonic name appreciated by humans Variable length, full alphabet of characters Provide little (if any) information about physical

More information

Integrating Net2 with an intruder alarm system

Integrating Net2 with an intruder alarm system Net AN035 Integating Net with an intude alam system Oveview Net can monito whethe the intude alam is set o uet If the alam is set, Net will limit access to valid uses who ae also authoised to uet the alam

More information

Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting, NTP

Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting, NTP Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting, NTP Magda El Zarki Prof. of CS Univ. of CA, Irvine Email: elzarki@uci.edu http: www.ics.uci.edu/~magda Network Address Translation - NAT Private

More information

LTI, SAML, and Federated ID - Oh My!

LTI, SAML, and Federated ID - Oh My! LTI, SAML, and Fedeated ID - Oh My! Chales Seveance, Ph.D. Stephen P Vickes IMS Global Leaning Consotium http://www.imsglobal.og/ Poblem Statement We need a way to align IMS Leaning Tools Inteopeability

More information

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer CPSC 360 Network Programming Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer Systems Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

2.5 DNS The Internet s Directory Service

2.5 DNS The Internet s Directory Service 130 CHAPTER 2 APPLICATION LAYER e-mail is also provided by Google, Yahoo!, as well as just about every major university and corporation. With this service, the user agent is an ordinary Web browser, and

More information

Automated Hydraulic Drilling Rigs. HHSeries

Automated Hydraulic Drilling Rigs. HHSeries Automated Hydaulic Dilling Rigs HHSeies The Shape of Things to Come CUSTOMSOLUTIONS HH600 Rig The HH Hydaulic Hoist Seies Eveything about the HH Seies is designed fo speed, safety and efficiency. You can

More information

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT

More information

Faithful Comptroller s Handbook

Faithful Comptroller s Handbook Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices

More information

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees Financial Deivatives fo Compute Netwok Capacity Makets with Quality-of-Sevice Guaantees Pette Pettesson pp@kth.se Febuay 2003 SICS Technical Repot T2003:03 Keywods Netwoking and Intenet Achitectue. Abstact

More information

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors anual ystem Depatment of ealth & uman evices (D) entes fo edicae & Pub 100-20 One-Time Notification edicaid evices () Tansmittal 198 Date: DEEBE 9, 2005 hange equest 4231 UBJET: Temination of the Existing

More information

How to create a default user profile in Windows 7

How to create a default user profile in Windows 7 AnswesThatWok TM How to ceate a default use pofile in Windows 7 (Win 7) How to ceate a default use pofile in Windows 7 When to use this document Use this document wheneve you want to ceate a default use

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System Names vs. Addresses Computer Networks Lecture 5: Domain Name System Names are easier for human to remember www.umich.edu vs. 141.213.4.4 Addresses can be changed without changing names move www.umich.edu

More information

Domain Name System DNS

Domain Name System DNS CE443 Computer Networks Domain Name System DNS Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by

More information

Review of Previous Lecture

Review of Previous Lecture Review of Previous Lecture Principles of app layer protocols clients and servers app requirements Web and HTTP FTP Some slides are in courtesy of J. Kurose and K. Ross Announcement All got partners and

More information

CS640: Computer Networks. Naming /ETC/HOSTS

CS640: Computer Networks. Naming /ETC/HOSTS CS640: Computer Networks Aditya Akella Lecture 17 Naming and the DNS Naming Need naming to identify resources Once identified, resource must be located How to name resource? Naming hierarchy How do we

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,

More information

Chapter 1: Introduction... 7 1-1. BELSORP analysis program... 7 1-2. Required computer environment... 8

Chapter 1: Introduction... 7 1-1. BELSORP analysis program... 7 1-2. Required computer environment... 8 1 [Table of contents] Chapte 1: Intoduction... 7 1-1. BELSORP analysis pogam... 7 1-. Requied compute envionment... 8 Chapte : Installation of the analysis pogam... 9-1. Installation of the WIBU-KEY pogam...

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

College of Engineering Bachelor of Computer Science

College of Engineering Bachelor of Computer Science 2 0 0 7 w w w. c n u a s. e d u College of Engineeing Bachelo of Compute Science This bochue Details the BACHELOR OF COMPUTER SCIENCE PROGRAM available though CNU s College of Engineeing. Fo ou most up-to-date

More information

Lecture 5: Network Attacks I. Course Admin

Lecture 5: Network Attacks I. Course Admin Lecture 5: Network Attacks I CS 336/536: Computer Network Security Fall 2013 Nitesh Saxena Adopted from previous lectures by Keith Ross Course Admin HW/Lab 1 Due Coming Monday 11am Lab sessions are active

More information

Determine implementation strategy, including a communications plan with trading partners and business associates (1 month)

Determine implementation strategy, including a communications plan with trading partners and business associates (1 month) Official CMS Industy Resouces fo the Tansition www.cms.gov/icd10 Payes Compliance Timeline The following is a timeline of essential activities needed to successfully tansition to Vesion 5010 and. While

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

3. The Domain Name Service

3. The Domain Name Service 3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records

More information

Firstmark Credit Union Commercial Loan Department

Firstmark Credit Union Commercial Loan Department Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and

More information

String sentence = new String(receivePacket.getData()); InetAddress IPAddress = receivepacket.getaddress(); int port = receivepacket.

String sentence = new String(receivePacket.getData()); InetAddress IPAddress = receivepacket.getaddress(); int port = receivepacket. 164 CHAPTER 2 APPLICATION LAYER connection requests, as done in TCPServer.java. If multiple clients access this application, they will all send their packets into this single door, serversocket. String

More information

Transmittal 47 Date: FEBRUARY 24, 2006

Transmittal 47 Date: FEBRUARY 24, 2006 anual ystem Pub 100-03 edicae National oveage Deteminations Depatment of Health & Human evices (DHH) ente fo edicae & edicaid evices () Tansmittal 47 Date: EBUAY 24, 2006 hange equest 4257 UBJET: hanges

More information

DNS and electronic mail. DNS purposes

DNS and electronic mail. DNS purposes DNS and electronic mail Section 9.1.3 in the textbook DNS purposes Originally purpose was to translate hostnames into IP addresses www.csd. is easier to remember than 129.100.23.247 Lets us do load balancing

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

Network Layer 4- density - A Top Down Approach

Network Layer 4- density - A Top Down Approach Internet-Technologien (CS262) 2. IP und DNS 11.3.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 4-1 Wiederholung/Einstiegsfragen Was ist ein Socket? Weshalb braucht es

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

Confirmation of Booking

Confirmation of Booking The Pesentes Rebecca Mogan Rebecca is a Taxation Consultant with the NTAA and has ove 15 yeas tax expeience. Rebecca holds a Bachelo of Ats and Law and a Mastes of Taxation. Rebecca has pesented a numbe

More information

Socket Programming. Announcement. Lectures moved to

Socket Programming. Announcement. Lectures moved to Announcement Lectures moved to 150 GSPP, public policy building, right opposite Cory Hall on Hearst. Effective Jan 31 i.e. next Tuesday Socket Programming Nikhil Shetty GSI, EECS122 Spring 2006 1 Outline

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

Distributed Systems. Naming

Distributed Systems. Naming Distributed Systems Naming Some slides here are adapted from DNS slide material by Kurose and Ross for their textbook: Computer Networking: A Top Down Approach Featuring the Internet Any problem in computer

More information

Towards Automatic Update of Access Control Policy

Towards Automatic Update of Access Control Policy Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia

More information

Engineered Systems. Configuration Guide. October, 1998 TD9007 rev. 2.0

Engineered Systems. Configuration Guide. October, 1998 TD9007 rev. 2.0 Engineeed Systems Configuation Guide Octobe, 1998 TD9007 ev. 2.0 2 ENGINEERED SYSTES CONFIGURATION GUIDE A division of Nothen Computes, Inc. Contents Po-Watch NT Single-Use System... 3 Po-Watch NT ulti-use

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

DOCTORAL DEGREE PROGRAM

DOCTORAL DEGREE PROGRAM DOCTORAL DEGREE PROGRAM Application Fo Admission National Mose Cente fo Adult Leaning Cental Illinois: Benedictine Univesity at Spingfield 1500 Noth 5th Steet, Spingfield, IL 62702 Phone: (217) 718-5002

More information

AFFILIATE MEMBERSHIP APPLICATION

AFFILIATE MEMBERSHIP APPLICATION Califonia Constuction Tucking Association AFFILIATE MEMBERSHIP APPLICATION Reach and Netwok with the Lagest Concentation of Constuction Tucking Fims in the U.S. Affiliate Dues - $500 Annual CCTA 334 N.

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods fo the specification and veification of business pocesses MPB (6 cfu, 295AA) Robeto Buni http://wwwdiunipiit/~buni 22 - Business pocess execution language 1 Object We oveview the key featues of

More information