Announcements! DNS: Domain Name System! Goals of Todayʼs Lecture! Transmission Control Protocol (TCP)! Reliable Delivery! Reliable Delivery, conʼt!

Size: px
Start display at page:

Download "Announcements! DNS: Domain Name System! Goals of Todayʼs Lecture! Transmission Control Protocol (TCP)! Reliable Delivery! Reliable Delivery, conʼt!"

Transcription

1 Announcements! HW #2 Problem 7 has been corrected DNS: Domain Name System! EE 122: Intro to Communication Networks Fall 2010 (MW 4-5:30 in 101 Barker) Scott Shenker TAs: Sameer Agarwal, Sara Alspaugh, Igor Ganichev, Prayag Narula Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC Berkeley 1 2 Goals of Todayʼs Lecture! Finish Transport We left off talking about UDP Ready to move on to TCP Concepts & principles underlying the Domain Name System (DNS) Inner workings of DNS Security problems with DNS 3 Transmission Control Protocol (TCP)! Connection oriented Explicit set-up and tear-down of TCP session Stream-of-bytes service Sends and receives a stream of bytes, not messages Congestion control Dynamic adaptation to network path s capacity Reliable, in-order delivery TCP tries very hard to ensure byte stream (eventually) arrives intact o In the presence of corruption and loss Flow control Ensure that sender doesn t overwhelm receiver 4 Reliable Delivery! How do we design for reliable delivery? How do you converse on a noisy cell phone connection? Positive acknowledgment ( Ack ) Explicit confirmation by receiver o On cell phone, OK o But how do you know you heard correctly? TCP acknowledgments are cumulative ( I ve received everything up through sequence #N ) o With an option for acknowledging individual segments ( SACK ) Negative acknowledgment ( Nack ) I m missing the following: How might the receiver tell something s missing? Can they always do this? Reliable Delivery, conʼt! Timeout If haven t heard anything from receiver, send again Problem: for how long do you wait? o TCP uses function of estimated RTT Problem: what if no Ack for retransmission? o TCP (and other schemes) employs exponential backoff o Double timer up to maximum - tapers off load during congestion A very different approach to reliability: send redundant data Cell phone analogy: Meet me at 3PM - repeat 3PM Forward error correction Recovers from lost data nearly immediately! But: only can cope with a limited degree of loss And: adds load to the network (interesting tradeoff) (Only used by TCP in implicit fashion - fast retransmit ) 5 6

2 TCP Support for Reliable Delivery! Sequence numbers Used to detect missing data... and for putting the data back in order Checksum Used to detect corrupted data at the receiver leading the receiver to drop the packet No error signal sent - recovery via normal retransmission Retransmission Sender retransmits lost or corrupted data Timeout based on estimates of round-trip time (RTT) Fast retransmit algorithm for rapid retransmission 7 Efficient Transport Reliability! 8 Automatic Repeat request (ARQ)! Automatic Repeat Request Receiver sends acknowledgment (ACK) when it receives packet Sender waits for ACK and times out if does not arrive within some time period Simplest ARQ protocol Stop and Wait Send a packet, stop and wait until ACK arrives Time Sender Timeout Packet ACK Receiver How Fast Can Stop-and-Wait Go?! Suppose we re sending from UCB to New York: Bandwidth = 1 Mbps (megabits/sec) RTT = 100 msec Maximum Transmission Unit (MTU) = 1500 B = 12,000 b No other load on the path and no packet loss What (approximately) is the fastest we can transmit using Stop-and-Wait? How about if Bandwidth = 1 Gbps? 9 10 Computation! Latency: 100msec =.1sec Transmission time of data packet: 12000bits/( bits/sec) =.012sec Throughput = 12000bits/.112sec! 110kbits/sec With linespeed of 1Gbits/sec Transmission time negligible Throughput! 120kbits/sec Allowing Multiple Packets in Flight! In Flight = Unacknowledged Sender-side issue: how many packets (bytes)? Receiver-side issue: how much buffer for data that s above a sequence hole? I.e., data that can t be delivered since previous data is missing Assumes service model is in-order delivery (like TCP) 11 12

3 Sliding Window! Allow a larger amount of data in flight Allow sender to get ahead of the receiver though not too far ahead Sending process! Last byte written! Last byte ACKed! Last byte can send! Receiving process! Next byte needed! Sender Window! Last byte read! Sliding Window, conʼt! Both sender & receiver maintain a window that governs amount of data in flight (sender) or notyet-delivered (receiver) Left edge of window: Sender: beginning of unacknowledged data Receiver: beginning of undelivered data For the sender: Window size = maximum amount of data in flight o Determines rate o Sender must have at least this much buffer (maybe more) For the receiver: Window size = maximum amount of undelivered data Receiver Window! Last byte received! o Receiver has this much buffer Sliding Window! For the sender, when receives an acknowledgment for new data, window advances (slides forward) Sliding Window! For the sender, when receives an acknowledgment for new data, window advances (slides forward) Sending process! Sending process! Last byte written! Last byte written! Last byte ACKed! Sender Window! Last byte ACKed! Sender Window! Last byte can send! 15 Last byte can send! 16 Sliding Window! Sliding Window! For the receiver, as the receiving process consumes data, the window slides forward For the receiver, as the receiving process consumes data, the window slides forward Receiving process! Receiving process! Last byte read! Last byte read! Next byte needed! Next byte needed! Receiver Window! Last byte received! 17 Receiver Window! Last byte received! 18

4 Sliding Window, conʼt! Sender: window advances when new data ack d Receiver: window advances as receiving process consumes data What happens if sender s window size exceeds the receiver s window size? Performance with Sliding Window! Given previous UCB! New York 1 Mbps path with 100 msec RTT and Sender (and Receiver) window = 100 Kb = 12.5 KB How fast can we transmit? Receiver advertises to the sender where the receiver window currently ends ( righthand edge ) Sender agrees not to exceed this amount It makes sure by setting its own window size to a value that can t send beyond the receiver s righthand edge Computation! Ignoring per-packet transmission time: Throughput = bits/.1sec! 1Mbps Links is fully utilized! Pipe is filled With linespeed of 1Gbits/sec, still 1Mbps What size window would reach 1Gbps? Bandwidth-delay product 1 Gbps * 100 msec = 100 Mb Note: large window = many packets in flight Summary! IP packet forwarding Based on longest-prefix match End systems use subnet mask to determine if traffic destined for their LAN o In which case they send directly, using ARP to find MAC address or for some other network o In which case they send to their local gateway (router) This info either statically config d or learned via DHCP Transport protocols Multiplexing and demultiplexing via port numbers UDP gives simple datagram service TCP gives reliable byte-stream service Reliability immediately raises performance issues o Stop-and-Wait vs. Sliding Window DNS! 23 Host Names vs. IP addresses! Host names Mnemonic name appreciated by humans Variable length, full alphabet of characters Provide little (if any) information about location Examples: and bbc.co.uk IP addresses Numerical address appreciated by routers Fixed length, binary number Hierarchical, related to host location Examples: and

5 Separating Naming and Addressing! Names are easier to remember vs (but not tiny urls) Addresses can change underneath Move to E.g., renumbering when changing providers Name could map to multiple IP addresses to multiple (8) replicas of the Web site Enables o Load-balancing o Reducing latency by picking nearby servers o Tailoring content based on requester s location/identity Multiple names for the same address Scalable (Name! Address) Mappings! Originally: per-host file Flat namespace /etc/hosts SRI (Menlo Park) kept master copy Downloaded regularly Single server doesn t scale Traffic implosion (lookups & updates) Single point of failure Amazing politics Needed a distributed, hierarchical collection of servers! E.g., aliases like and cnn.com Domain Name System (DNS)! Properties of DNS Hierarchical name space divided into zones Zones distributed over collection of DNS servers Hierarchy of DNS servers Root (hardwired into other servers) Top-level domain (TLD) servers Authoritative DNS servers Performing the translations Local DNS servers Distributed Hierarchical Database! unnamed root com edu org ac uk zw arpa west foo bar generic domains east my my.east.bar.edu country domains Top-Level Domains (TLDs) ac cam usr usr.cam.ac.uk inaddr Resolver software DNS Root! Located in Virginia, USA How do we make the root scale? Verisign, Dulles, VA DNS Root Servers! 13 root servers (see Labeled A through M Does this scale? E NASA Mt View, CA F Internet Software Consortium Palo Alto, CA A Verisign, Dulles, VA C Cogent, Herndon, VA D U Maryland College Park, MD G US DoD Vienna, VA H ARL Aberdeen, MD J Verisign K RIPE London I Autonomica, Stockholm M WIDE Tokyo B USC-ISI Marina del Rey, CA L ICANN Los Angeles, CA 29 30

6 DNS Root Servers! 13 root servers (see Labeled A through M Replication via any-casting (localized routing for addresses) E NASA Mt View, CA F Internet Software Consortium, Palo Alto, CA (and 37 other locations) B USC-ISI Marina del Rey, CA L ICANN Los Angeles, CA A Verisign, Dulles, VA C Cogent, Herndon, VA (also Los Angeles, NY, Chicago) D U Maryland College Park, MD G US DoD Vienna, VA H ARL Aberdeen, MD J Verisign (21 locations) K RIPE London (plus 16 other locations) I Autonomica, Stockholm (plus 29 other locations) M WIDE Tokyo plus Seoul, Paris, San Francisco TLD and Authoritative DNS Servers! Top-level domain (TLD) servers Generic domains (e.g., com, org, edu) Country domains (e.g., uk, fr, cn, jp) Special domains (e.g., arpa) Typically managed professionally o Network Solutions maintains servers for com o Educause maintains servers for edu Authoritative DNS servers Provide public records for hosts at an organization For the organization s servers (e.g., Web and mail) Can be maintained locally or by a service provider Question! Could we replace DNS with a Google-like infrastructure? Using DNS! Local DNS server ( default name server ) Usually near the endhosts that use it Local hosts configured with local server (e.g., / etc/resolv.conf) or learn server via DHCP Client application Extract server name (e.g., from the URL) Do gethostbyname() to trigger resolver code Server application Extract client IP address from socket Optional gethostbyaddr() to translate into name Example! Host at cis.poly.edu wants IP address for gaia.cs.umass.edu local DNS server dns.poly.edu requesting host cis.poly.edu root DNS server 3 TLD DNS server authoritative DNS server dns.cs.umass.edu gaia.cs.umass.edu 35 Recursive vs. Iterative Queries! Recursive query Ask server to get answer for you E.g., request 1 and response 8 Iterative query Ask server who to ask next E.g., all other request-response pairs local DNS server dns.poly.edu requesting host cis.poly.edu root DNS server 3 TLD DNS server authoritative DNS server dns.cs.umass.edu 36

7 Reverse Mapping (Address " Host)! How do we go the other direction, from an IP address to the corresponding hostname? Addresses already have natural quad hierarchy: But: quad notation has most-sig. hierarchy element on left, while has it on the right Idea: reverse the quads = and look that up in the DNS Under what TLD? Convention: in-addr.arpa So lookup is for in-addr.arpa 37 Distributed Hierarchical Database! unnamed root com edu org ac uk zw arpa west foo bar generic domains east my my.east.bar.edu country domains ac cam usr usr.cam.ac.uk inaddr /24 DNS Caching! Performing all these queries takes time And all this before actual communication takes place E.g., 1-second latency before starting Web download Caching can greatly reduce overhead The top-level servers very rarely change Popular sites (e.g., visited often Local DNS server often has the information cached How DNS caching works DNS servers cache responses to queries Responses include a time to live (TTL) field Server deletes cached entry after TTL expires 39 Negative Caching! Remember things that don t work Misspellings like and These can take a long time to fail the first time Good to remember that they don t work so the failure takes less time the next time around But: negative caching is optional And not widely implemented 40 DNS Resource Records! DNS Protocol! DNS: distributed DB storing resource records (RR) RR format: (name, value, type, ttl) Type=A name is hostname value is IP address Type=NS name is domain (e.g. foo.com) value is hostname of authoritative name server for this domain Type=PTR name is reversed IP quads o E.g in-addr.arpa value is corresponding hostname Type=CNAME name is alias name for some canonical name E.g., is really eecsweb.mit.edu value is canonical name Type=MX value is name of mailserver associated with name Also includes a weight/preference 41 DNS protocol: query and reply messages, both with same message format Message header: Identification: 16 bit # for query, reply to query uses same # Flags: Query or reply Recursion desired Recursion available Reply is authoritative Plus fields indicating size (0 or more) of optional header elements 16 bits 16 bits Identification Flags # Questions # Answer RRs # Authority RRs # Additional RRs Questions Answers Authority Additional information 42

8 Reliability! DNS servers are replicated Name service available if at least one replica is up Queries can be load-balanced between replicas Usually, UDP used for queries Need reliability: must implement this on top of UDP Spec supports TCP too, but not always implemented Try alternate servers on timeout Exponential backoff when retrying same server Same identifier for all queries Don t care which server responds 43 Inserting Resource Records into DNS! Example: just created startup FooBar Get a block of address space from ISP Say /25 Register foobar.com at Network Solutions (say) Provide registrar with names and IP addresses of your authoritative name server (primary and secondary) Registrar inserts RR pairs into the com TLD server: o (foobar.com, dns1.foobar.com, NS) o (dns1.foobar.com, , A) Put in your (authoritative) server dns1.foobar.com: Type A record for Type MX record for foobar.com 44 Setting up foobar.com, conʼt! In addition, need to provide reverse PTR bindings E.g., " dns1.foobar.com Normally, these would go in in-addr.arpa Problem: you can t run the name server for that domain. Why not? Because your block is /25, not /24 And whoever has /25 won t be happy with you owning their PTR records Solution: ISP runs it for you Now it s more of a headache to keep it up-to-date :-( 45 DNS Measurements (MIT data from 2000)" What is being looked up? ~60% requests for A records ~25% for PTR records ~5% for MX records ~6% for ANY records How long does it take? Median ~100msec (but 90 th percentile ~500msec) 80% have no referrals; 99.9% have fewer than four Query packets per lookup: ~ DNS Measurements (MIT data from 2000)" Top 10% of names accounted for ~70% of lookups Caching should really help! 9% of lookups are unique Cache hit rate can never exceed 91% Cache hit rates ~ 75% But caching for more than 10 hosts doesn t add much DNS Measurements (MIT data from 2000)! Does DNS give answers? ~23% of lookups fail to elicit an answer! ~13% of lookups result in NXDOMAIN (or similar) o Mostly reverse lookups Only ~64% of queries are successful! o How come the web seems to work so well? ~ 63% of DNS packets in unanswered queries! Failing queries are frequently retransmitted 99.9% successful queries have "2 retransmissions 47 48

9 Moral of the Story! If you design a highly resilient system, many things can be going wrong without you noticing it! Security Analysis of DNS! What security issues does the design & operation of the Domain Name System raise? Degrees of freedom: 16 bits 16 bits Identification Flags # Questions # Answer RRs # Authority RRs # Additional RRs Questions Answers Authority Additional information Security Problem #1: Starbucks! As you sip your latte and surf the Web, how does your laptop find google.com? Answer: it asks the local name server per Dynamic Host Configuration Protocol (DHCP) which is run by Starbucks or their contractor and can return to you any answer they please including a man in the middle site that forwards your query to Google, gets the reply to forward back to you, yet can change anything they wish in either direction How can you know you re getting correct data? Today, you can t. (Though if site is HTTPS, that helps) Security Problem #2: Cache Poisoning! Suppose you are a Bad Guy and you control the name server for foobar.com. You receive a request to resolve and reply: ;; QUESTION SECTION: ; IN A ;; ANSWER SECTION: IN A ;; AUTHORITY SECTION: foobar.com. 600 IN NS dns1.foobar.com. foobar.com. 600 IN NS google.com. ;; ADDITIONAL SECTION: google.com. 5 IN A One day, hopefully: DNSSEC extensions to DNS A foobar.com machine, not google.com Evidence of the attack disappears 5 seconds later! Cache Poisoning, conʼt! Okay, but how do you get the victim to look up in the first place? Perhaps you connect to their mail server and send HELO Which their mail server then looks up to see if it corresponds to your source address (anti-spam measure) Note, with compromised name server we can also lie about PTR records (address " name mapping) E.g., for = in-addr.arpa return google.com (or whitehouse.gov, or whatever) o If our ISP lets us manage those records as we see fit, or we happen to directly manage them 53 Cache Poisoning, conʼt! Suppose Bad Guy is at Starbuck s and they can sniff (or even guess) the identification field the local server will use in 16 bits 16 bits its next request: Identification Flags They: Ask local server for a (recursive) lookup of google.com Locally spoof subsequent reply from correct name server using the identification field Bogus reply arrives sooner than legit one Local server duly caches the bogus reply! Now: every future Starbuck customer is served the bogus answer out of the local server s cache o In this case, the reply uses a large TTL 54

10 Summary! Domain Name System (DNS) Distributed, hierarchical database Distributed collection of servers Caching to improve performance DNS lacks authentication Can t tell if reply comes from the correct source Can t tell if correct source tells the truth Malicious source can insert extra (mis)information Malicious bystander can spoof (mis)information Playing with caching lifetimes adds extra power to attacks 55

DNS. Spring 2016 CS 438 Staff 1

DNS. Spring 2016 CS 438 Staff 1 DNS Spring 2016 CS 438 Staff 1 Host Names vs. IP addresses Host names Mnemonic name appreciated by humans Variable length, full alphabet of characters Provide little (if any) information about physical

More information

Domain Name System DNS

Domain Name System DNS CE443 Computer Networks Domain Name System DNS Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by

More information

Goals of Today s Lecture. Separating Naming and Addressing. Host Names vs. IP addresses. Domain Name System (DNS) EE 122: Domain Name System

Goals of Today s Lecture. Separating Naming and Addressing. Host Names vs. IP addresses. Domain Name System (DNS) EE 122: Domain Name System Goals of Today s Lecture EE : Domain Name System Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

Domain Name System (DNS) Reading: Section in Chapter 9

Domain Name System (DNS) Reading: Section in Chapter 9 Domain Name System (DNS) Reading: Section in Chapter 9 RFC 1034, STD 13 Name Syntax and rules for delegating authority over names Specify implementation of a distributed system that maps names to addresses

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System Names vs. Addresses Computer Networks Lecture 5: Domain Name System Names are easier for human to remember www.umich.edu vs. 141.213.4.4 Addresses can be changed without changing names move www.umich.edu

More information

Domain Name System (or Service) (DNS) Computer Networks Term B10

Domain Name System (or Service) (DNS) Computer Networks Term B10 Domain Name System (or Service) (DNS) Computer Networks Term B10 DNS Outline DNS Hierarchial Structure Root Name Servers Top-Level Domain Servers Authoritative Name Servers Local Name Server Caching and

More information

Domain Name System Richard T. B. Ma

Domain Name System Richard T. B. Ma Domain Name System Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Names Vs. Addresses Names are easier for human to remember www.comp.nus.edu.sg

More information

Naming and the DNS. Focus. How do we name hosts etc.? Application Presentation Topics. Session Domain Name System (DNS) Email/URLs

Naming and the DNS. Focus. How do we name hosts etc.? Application Presentation Topics. Session Domain Name System (DNS) Email/URLs Naming and the DNS Focus How do we name hosts etc.? Application Presentation Topics Session Domain Name System (DNS) Email/URLs Transport Network Data Link Physical Ldns.1 Names and Addresses 43 name address

More information

DNS: Domain Name System

DNS: Domain Name System DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers: IP address (32 bit) - used for addressing datagrams name, e.g., ww.yahoo.com - used by humans Q: map between

More information

CMPE 80N: Introduction to Networking and the Internet

CMPE 80N: Introduction to Networking and the Internet CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 11 CMPE 80N Spring'10 1 Announcements Guest lecture on intellectual property and

More information

The Domain Name System

The Domain Name System The Domain Name System Mark Handley) UCL Computer Science CS 3035/GZ01 Today 1. The Domain Name System (DNS) 2. A Brief Word on DNS Security A name indicates what we seek. An address indicates where it

More information

C 1. Last Time. CSE 486/586 Distributed Systems Domain Name System. Review: Causal Ordering. Review: Causally Ordered Multicast.

C 1. Last Time. CSE 486/586 Distributed Systems Domain Name System. Review: Causal Ordering. Review: Causally Ordered Multicast. Last Time CSE 46/6 Distributed Systems Domain Name System Two multicast algorithms for total ordering Sequencer ISIS Multicast for causal ordering Uses vector timestamps Steve Ko Computer Sciences and

More information

CMPE 80N: Introduction to Networking and the Internet

CMPE 80N: Introduction to Networking and the Internet CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 80N Fall'10 1 Announcements Forum assignment #2 posted. Due Nov. 5 th.

More information

The Application Layer: DNS

The Application Layer: DNS Recap SMTP and email The Application Layer: DNS Smith College, CSC 9 Sept 9, 0 q SMTP process (with handshaking) and message format q Role of user agent access protocols q Port Numbers (can google this)

More information

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng. CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail: SMTP, POP3, IMAP

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Network programming, DNS, and NAT. Copyright University of Illinois CS 241 Staff 1

Network programming, DNS, and NAT. Copyright University of Illinois CS 241 Staff 1 Network programming, DNS, and NAT Copyright University of Illinois CS 241 Staff 1 Today Network programming tips Domain name system Network Address Translation Bonus slides (for your reference) Timers

More information

How To Map Between Ip Address And Name On A Domain Name System (Dns)

How To Map Between Ip Address And Name On A Domain Name System (Dns) Computer Networks: Domain Name Service (DNS) CS 3516 D- term 2013 Instructor: Krishna Venkatasubramanian Quiz 2 DNS: domain name system people: many identifiers: SSN, name, passport # Internet hosts, routers:

More information

CS 43: Computer Networks Naming and DNS. Kevin Webb Swarthmore College September 17, 2015

CS 43: Computer Networks Naming and DNS. Kevin Webb Swarthmore College September 17, 2015 CS 43: Computer Networks Naming and DNS Kevin Webb Swarthmore College September 17, 2015 Agenda Identifiers and addressing Domain Name System History Query sequences Record types Load balancing Recall:

More information

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson) Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet

More information

DNS and P2P File Sharing

DNS and P2P File Sharing Computer Networks DNS and P2P File Sharing Based on Computer Networking, 4 th Edition by Kurose and Ross DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers:

More information

Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org

Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP

More information

Domain Name System (DNS)

Domain Name System (DNS) Domain Name System (DNS) Instructor: Anirban Mahanti Office: ICT 745 Email: mahanti@cpsc.ucalgary.ca Class Location: ICT 121 Lectures: MWF 12:00 12:50 Notes derived from Computer Networking: A Top Down

More information

Domain Name System (DNS)

Domain Name System (DNS) Chapter 18 CSC465 Computer Networks Spring 2004 Dr. J. Harrison These slides are based on the text TCP/IP Protocol Suite (2 nd Edition) Domain Name System (DNS) CONTENTS NAME SPACE DOMAIN NAME SPACE DISTRIBUTION

More information

DNS: Distributed Name System

DNS: Distributed Name System Distributed Name System Slides adapted from: Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2002. All material copyright 1996-2002

More information

Distributed Systems. Naming

Distributed Systems. Naming Distributed Systems Naming Some slides here are adapted from DNS slide material by Kurose and Ross for their textbook: Computer Networking: A Top Down Approach Featuring the Internet Any problem in computer

More information

Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting

Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting Magda El Zarki Prof. of CS Univ. of CA, Irvine Email: elzarki@uci.edu http: www.ics.uci.edu/~magda Overivew of NAT NAT: Network Address Translation

More information

NET0183 Networks and Communications

NET0183 Networks and Communications NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer the email service The

More information

Cours du 22 novembre

Cours du 22 novembre Cours du 22 novembre Couche application DNS Application Layer 2-2 DNS: domain name system people: many identifiers: SSN, name, passport # Internet hosts, routers: IP address (32 bit) - used for addressing

More information

DNS: Domain Name System

DNS: Domain Name System DNS: Domain Name System CMPSCI 491G: Computer Networking Lab V. Arun Slides adapted from Liebeherr & Zarki, Kurose & Ross, Kermani DNS: domain name system people: many identifiers: SSN, name, passport

More information

Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting, NTP

Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting, NTP Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting, NTP Magda El Zarki Prof. of CS Univ. of CA, Irvine Email: elzarki@uci.edu http: www.ics.uci.edu/~magda Network Address Translation - NAT Private

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet

More information

FTP: the file transfer protocol

FTP: the file transfer protocol File Transfer: FTP FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that

More information

CS640: Computer Networks. Naming /ETC/HOSTS

CS640: Computer Networks. Naming /ETC/HOSTS CS640: Computer Networks Aditya Akella Lecture 17 Naming and the DNS Naming Need naming to identify resources Once identified, resource must be located How to name resource? Naming hierarchy How do we

More information

Internet-Praktikum I Lab 3: DNS

Internet-Praktikum I Lab 3: DNS Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans

More information

Network(Security(Protocols(

Network(Security(Protocols( Network(Security(Protocols( Mike(Freedman( COS(461:(Computer(Networks( Lectures:((MW(10A10:50am(in(Architecture(N101( hep://www.cs.princeton.edu/courses/archive/spr13/cos461/( Network(Security( ApplicaJon(layer(

More information

DNS Basics. DNS Basics

DNS Basics. DNS Basics DNS Basics 1 A quick introduction to the Domain Name System (DNS). Shows the basic purpose of DNS, hierarchy of domain names, and an example of how the DNS protocol is used. There are many details of DNS

More information

Introduction to Network Operating Systems

Introduction to Network Operating Systems As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the

More information

2.5 DNS The Internet s Directory Service

2.5 DNS The Internet s Directory Service 130 CHAPTER 2 APPLICATION LAYER e-mail is also provided by Google, Yahoo!, as well as just about every major university and corporation. With this service, the user agent is an ordinary Web browser, and

More information

Application layer Protocols application transport

Application layer Protocols application transport Application layer Protocols application transport data link physical Network Applications and Application Layer Protocols Network applications: running in end systems (hosts) distributed, communicating

More information

!"#$%&'µ#%($)"*!"#+",%-./ Overview of Internet Protocols !"#+",%/#,1 $%.02# 3&'%.,455'6 OSI,#"!"#+0,%/. !"#$"%&'#%( )*+&,%-..

!#$%&'µ#%($)*!#+,%-./ Overview of Internet Protocols !#+,%/#,1 $%.02# 3&'%.,455'6 OSI,#!#+0,%/. !#$%&'#%( )*+&,%-.. !"#$%&'µ#%($)"*!"#+",%-./!" µ"#$%&" '#'(")*+ $,# 7 -.'/$),µ'$0/1,# $"2 OSI 3)4/.µ"5".16$'. 72)6,+ 8.' -.-'/7'&6' 7'. '#'(")* 95'#6,+ 2&"5".16$'. Overview of Internet Protocols!"#$"%&'#%( )*+&,%-..# 9$4#

More information

416 Distributed Systems. Feb 24, 2016 DNS and CDNs

416 Distributed Systems. Feb 24, 2016 DNS and CDNs 416 Distributed Systems Feb 24, 2016 DNS and CDNs Outline DNS Design Content Distribution Networks 2 Naming How do we efficiently locate resources? DNS: name à IP address Challenge How do we scale this

More information

Distributed Systems. 22. Naming. 2013 Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 22. Naming. 2013 Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 22. Naming Paul Krzyzanowski Rutgers University Fall 2013 November 21, 2013 2013 Paul Krzyzanowski 1 My 15 MacBook Pro The rightmost computer on my desk Paul s aluminum laptop, but

More information

Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating

More information

3. The Domain Name Service

3. The Domain Name Service 3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records

More information

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.

More information

DNS Domain Name System

DNS Domain Name System Domain Name System DNS Domain Name System The domain name system is usually used to translate a host name into an IP address Domain names comprise a hierarchy so that names are unique, yet easy to remember.

More information

Chapter 23 The Domain Name System (DNS)

Chapter 23 The Domain Name System (DNS) CSC521 Communication Protocols 網 路 通 訊 協 定 Chapter 23 The Domain Name System (DNS) 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1. Introduction 2. Names For Machines 3. Flat Namespace 4. Hierarchical Names 5.

More information

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all

More information

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

Domain Name System (DNS) Fundamentals

Domain Name System (DNS) Fundamentals Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center mike.jager@synack.co.nz These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 34 DNS & Directory

Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 34 DNS & Directory Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 34 DNS & Directory Good day. Today we will take up two topics, DNS and

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

CS 348: Computer Networks. - DNS; 22 nd Oct 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - DNS; 22 nd Oct 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - DNS; 22 nd Oct 2012 Instructor: Sridhar Iyer IIT Bombay Domain Name System Map between host names and IP addresses People: many identifiers: name, Passport #, Internet hosts:

More information

DNS and electronic mail. DNS purposes

DNS and electronic mail. DNS purposes DNS and electronic mail Section 9.1.3 in the textbook DNS purposes Originally purpose was to translate hostnames into IP addresses www.csd. is easier to remember than 129.100.23.247 Lets us do load balancing

More information

Computer Networks. Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se

Computer Networks. Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides are adapted

More information

FTP: the file transfer protocol

FTP: the file transfer protocol FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that initiates transfer

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Application Layer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Application Layer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross Application Layer Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Web caches (proxy server) goal: satisfy client request without involving origin server v user

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS FALL 2011 Lecture 19: DNS Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Human Involvement

More information

Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley abulley@ghana.com

Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley abulley@ghana.com Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley abulley@ghana.com Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between

More information

HOST AUTO CONFIGURATION (BOOTP, DHCP)

HOST AUTO CONFIGURATION (BOOTP, DHCP) Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration

More information

DNS : Domain Name System

DNS : Domain Name System 1/30 DNS : Domain Name System Surasak Sanguanpong nguan@.ac.th http://www...ac.th/~nguan Last updated: May 24, 1999 Outline 2/30 DNS basic name space name resolution process protocol configurations Why

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

CS3250 Distributed Systems

CS3250 Distributed Systems CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted

More information

CS244A Review Session Routing and DNS

CS244A Review Session Routing and DNS CS244A Review Session Routing and DNS January 18, 2008 Peter Pawlowski Slides derived from: Justin Pettit (2007) Matt Falkenhagen (2006) Yashar Ganjali (2005) Guido Appenzeller (2002) Announcements PA

More information

Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology

Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2

More information

2 TCP-like Design. Answer

2 TCP-like Design. Answer Homework 3 1 DNS Suppose you have a Host C, a local name server L, and authoritative name servers A root, A com, and A google.com, where the naming convention A x means that the name server knows about

More information

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1 SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. . Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Domain Name System. DNS is an example of a large scale client-server application. Copyright 2014 Jim Martin

Domain Name System. DNS is an example of a large scale client-server application. Copyright 2014 Jim Martin Domain Name System: DNS Objective: map names to IP addresses (i.e., high level names to low level names) Original namespace was flat, didn t scale.. Hierarchical naming permits decentralization by delegating

More information

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14 1 Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit

More information

Applications and Services. DNS (Domain Name System)

Applications and Services. DNS (Domain Name System) Applications and Services DNS (Domain Name Service) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Malathi Veeraraghavan Distributed database used to: DNS (Domain Name System) map between

More information

Hostnames. HOSTS.TXT was a bottleneck. Once there was HOSTS.TXT. CSCE515 Computer Network Programming. Hierarchical Organization of DNS

Hostnames. HOSTS.TXT was a bottleneck. Once there was HOSTS.TXT. CSCE515 Computer Network Programming. Hierarchical Organization of DNS Hostnames CSCE 515: Computer Network Programming ------ Address Conversion Function and DNS RFC 1034, RFC 1035 Wenyuan Xu http://www.cse..edu/~wyxu/ce515f07.html Department of Computer Science and Engineering

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions) COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools

More information

The Domain Name System

The Domain Name System DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),

More information

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013 CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.

This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same. This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the

More information

Network Layer 4- density - A Top Down Approach

Network Layer 4- density - A Top Down Approach Internet-Technologien (CS262) 2. IP und DNS 11.3.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 4-1 Wiederholung/Einstiegsfragen Was ist ein Socket? Weshalb braucht es

More information

Computer Networks: Domain Name System

Computer Networks: Domain Name System Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com

More information

The Domain Name System (DNS)

The Domain Name System (DNS) The Domain Name System (DNS) Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 24-1 Overview Naming hierarchy hierarchy Name resolution Other information in name servers 24-2

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

Lecture 5: Network Attacks I. Course Admin

Lecture 5: Network Attacks I. Course Admin Lecture 5: Network Attacks I CS 336/536: Computer Network Security Fall 2013 Nitesh Saxena Adopted from previous lectures by Keith Ross Course Admin HW/Lab 1 Due Coming Monday 11am Lab sessions are active

More information

Digital Communication in the Modern World Application Layer cont. DNS, SMTP

Digital Communication in the Modern World Application Layer cont. DNS, SMTP Digital Communication in the Modern World Application Layer cont. DNS, http://www.cs.huji.ac.il/~com com@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top Down Approach

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Atomicity Strong need consistency 6

Atomicity Strong need consistency 6 CS640: Naming Computer AdityaAkella Lecture and the 17DNS Networks DNS Today Design The Road Ahead 2 Need Once How identified, naming to identify Naming Challenge: area? Naming DNS: to do name we hierarchy

More information

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006 CSE33: Introduction to Networks and Security Lecture 9 Fall 2006 Announcements Project Due TODAY HW Due on Friday Midterm I will be held next Friday, Oct. 6th. Will cover all course material up to next

More information

2015-10-30. Computer Names. based on chapter 10 of CompTIA Network+ Exam Guide, 4th edition, by Mike Meyers OVERVIEW

2015-10-30. Computer Names. based on chapter 10 of CompTIA Network+ Exam Guide, 4th edition, by Mike Meyers OVERVIEW Computer Names based on chapter 10 of CompTIA Network+ Exam Guide, 4th edition, by Mike Meyers OVERVIEW 1 Computer Names and Addresses Computers are given names to make it easy for people to refer to them

More information

Network Fundamentals. 2010 Carnegie Mellon University

Network Fundamentals. 2010 Carnegie Mellon University Network Fundamentals What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working Together

More information