SlideShare una empresa de Scribd logo
1 de 66
S.RANGARAJAN
COMPUTER DEPT
NETWORK PROTOCOLS AND SERVICE
INDEX
1. Dynamic Host Control Protocol
2. Introduction to Domain Name System
DHCP:Dynamic Host Control
Protocol
1) Introduction
2) DHCP origins
3) RARP
4) ARP
5) BOOTP
6) DHCP Objectives
7) IP address assignments
8) DHCP Architecture
Introduction to DHCP
 BOOTP is not a dynamic configuration protocol.
 DHCP was created by the Dynamic Host
Configuration Working Group of the Internet
Engineering Task Force(IETF)
 Runs over UDP
 Utilizing ports:
 67 – connections to server
 68 – connections to client
 DHCP is basically used for dynamic configuration
 Uses client–server model
 When a client requests its IP address, the BOOTP
server consults a table that matches the physical
address of the client with its IP address.
 The binding is predetermined.
 The Dynamic Host Configuration Protocol (DHCP)
has been devised to provide static and dynamic
address allocation that can be manual or automatic
 Static Address Allocation In this capacity DHCP acts
as BOOTP does.
 It is backward compatible with BOOTP, which means a
host running the BOOTP client can request a static
address from a DHCP server.
 A DHCP server has a database that statically binds
physical addresses to IP addresses.
 Dynamic Address Allocation DHCP has a second
database with a pool of available IP addresses. This
second database makes DHCP dynamic.
 When a DHCP client requests a temporary IP address,
the DHCP server goes to the pool of available
(unused) IP addresses and assigns an IP address for a
negotiable period of time.
 When a DHCP client sends a request to a DHCP
server, the server first checks its static database. If an
entry with the requested physical address exists in the
static database, the permanent IP address of the client
is returned.
 On the other hand, if the entry does not exist in the
static database,the server selects an IP address from
the available pool, assigns the address to the client,
and adds the entry to the dynamic database.
 The dynamic aspect of DHCP is needed when a host
moves from network to network or is connected and
disconnected from a network (as is a subscriber to a
service provider).
 The addresses assigned from the pool are temporary
addresses. The DHCP server issues a lease for a specific
time. When the lease expires, the client must either
stop using the IP address or renew the lease.
 The server has the option to agree or disagree with the
renewal. If server disagrees, the client stops using the
address.
Objectives of DHCP
 The DHCP server should be able to provide a
workstation for configuration .
 The DHCP server should prevent the duplication of
addresses on the network.
 The DHCP server should be able to configure clients
by use of relay agent.
 DHCP clients should be able to retain their TCP/IP
parameters despite a reboot of either client or server
system.
IP address Assignment
 Manual allocation:The administrator configures the
DHCP server to assign a specific IP address to a given
system, which will never change unless it is manually
modified. This is equivalent in functionality to RARP and
BOOTP.
 Automatic allocation: The DHCP server assigns
permanent IP addresses from a pool, which does not
change unless they are manually modified by the
administrator.
 Dynamic allocation:The DHCP server assigns IP
addresses from a pool using a limited–time lease, so the
addresses can be reassigned if the client system does
periodically renew it.
DHCP architecture
 Dynamic configuration protocol consists of two basic
elements:
 • A service that assigns TCP/IP configuration settings
to client system
 • A protocol used for communications between DHCP
clients and server.
 The DHCP architecture defines the message format for
the protocol and the sequence of message exchanges
that take place between the DHCP client and server.
 The DHCP architecture defines the message format for
the protocol and the sequence of message exchanges
that take place between the DHCP client and server.
 OP (Op code), 1 byte: specifies whether the message is
request or reply, using the following code.
 1. BOOTREQUEST
 2. BOOTREPLY
 htype (Hardware type), 1 byt1: Specifies the type of
hardware used in the chaddr field. For ex 1 for Ethernet (10 MB)
 hlen (Hardware address length), 1 byte: Specifies the
length of the hardware address found in the chaddr field,
according to the value of the htype field (for ex if htype=1,
indicating an Ethernet hardware address, the value of hlen will
be 6 byte)
 hops (1 byte): Specifies the number of network segments
between the client and server. The client sets the value to 0 and
each DHCP relay system increments it by 1 during the journey to
the server.
 Xid (Transaction Id), 4 bytes: Contains a transaction
identifier that systems use to associate the request and
response messages of a single DHCP transaction.
 Secs (Seconds), 2 bytes: Specifies the number of seconds elapsed
since the IP address was assigned or the lease last renewed. This enables
the systems to distinguish between messages of the same type generated
during a single DHCP transaction.
 Flags (2 byte): Contains the broadcast flag as the first bit, which,
when set to a value of 1, specifies that DHCP servers and relay agents
should use broadcasts to transmit to the client and not unicast. The
remaining bits in the field are unused and must have a value zero.
 Ciaddr (client IP address), 4 bytes: Specifies the client’s IP
address in DHCP REQUEST messages transmitted while in the
bound, renewal or rebinding state. At all other times the value must be
zero.
 Siaddr (Server IP address), 4 bytes: Specifies the IP address of
 the next server in a bootstrap sequence. Servers include this
information in DHCPOFFER message DHCPACK messages only when
DHCP is configured to supply an executable boot file to clients.
 Giaddr (gateway IP address), 4 bytes: Specifies the
IP address ofthe DHCP relay agent to which a server
should send its replies when the client and server are
located on different subnets. When the server and
client are on the same segment, the value must be
zero.
 Chaddr (Client hardware address) 16 bytes:
specifies the hardware address of the client system
in DHCPDISCOVER and DHCPREQUEST messages,
which the server uses to address its unicast responses
to the client.
 Sname (server host name) 64 bytes: Specifies the
hostname of the DHCP server. The field is more
commonly used to hold overflow data from the
options field.
 File (boot file name) 128 bytes: Specifies the name
of an executable boot file for diskless client
workstation in DHCPDISCOVER messages or
DHCPOFFER messages. The field is more commonly
used to hold overflow data from the options field.
 Options (variable size minimum 312 bytes):
Contains the magic cookie that specifies how the rest
of the field should be interpreted and the DHCP
message type option that defines the function of the
message.
DHCP Options
 The option field always begins with the so–called
magic cookie, which informs the server about what is
contained in the rest of the field.
 The option Format
 The individual options in the options field contain
various types and amount of data, but most of them
use the same basic structure, which consists of three
subfields.
Code(1 byte) Length (1 byte) Data(variable)
DHCP Message type option
 1.DHCPDISCOVER: Used by client systems to
locate DHCP servers and request an IP address.
 2. DHCPOFFER: Used by server to offer IP
addresses to clients.
 3. DHCPREQUEST: Used by clients to request
specific IP address assignment or to renew leases.
 4. DHCPDECLINE: Used by clients to reject an IP
address offered by a server.
 5. DHCPACK: Used by servers to acknowledge a
client’s acceptance of an offered IP address.
 6. DHCPNACK: Used by servers to reject a client’s
acceptance of an offered IP address
 7. DHCPRELEASE: Used by clients to terminate a
lease.
 8. DHCPINFORM: Used by clients those have
already been assigned an IP address to request
additional configuration parameters.
DHCP Communications
 When you configure a workstation to be a DHCP
client, the system initiates an exchange of messages
with a DHCP server.
 DHCP Address Pool
 DHCP address pool is a virtual container that contains
all the IP addresses that have been configured in the
DHCP range to make available to the client computers.
 As soon as any IP address from the address pool is
assigned to a client computer, the address is
temporarily removed from the pool.
DHCP Lease
 When the DHCP server assigns an IP address to a
DHCP client computer, the address is assigned for
specific time duration. The time duration for which an
IP address is assigned to a DHCP client computer by
the DHCP server is technically called the DHCP lease.
 When the DHCP lease expires, the IP address is
revoked from the DHCP client computer and is sent
back to the DHCP address pool.
DORA
 The step–by–step process through which a DHCP server
assigns an IP address to a DHCP client computer is in short
called DORA.
 D – D in the term DORA stands for the DHCP Discover
packet. The DHCP Discover packet is broadcasted by the
DHCP client computer in order to find the available DHCP
server(s) in the network.
 O – O in the term DORA stands for the DHCP Offer
packet. The DHCP Offer is a unicast packet that is sent by
the DHCP server who receives the DHCP Discover packet
from the DHCP client computer. The DHCP Offer packet
contains the available IP address that the DHCP server
 offers to the client computer.
 R – R in the term DORA stands for the DHCP
Request packet. The DHCP Request is again a
unicast packet sent by the DHCP client computer to
the DHCP server who had sent the DHCP Offer packet
to the client computer.
 A – A in the term DORA stands for the DHCP
Acknowledge packet.The DHCP Acknowledge is a
unicast packet sent by the DHCP server to the DHCP
client computer acknowledging the assignment of the
offered IP address for a specific lease time.
 Once the entire DORA process is complete, the DHCP
server marks the IP address as assigned in its database
and the DHCP client computer starts using the
assigned IP address to communicate with other
computers in the network.
Lease renewal
 The renewal process occurs when a client already has a
lease, and needs to renew that lease with the server. To
ensure that addresses are not left in an assigned state when
they are no longer needed, the DHCP server places an
administrator–defined time limit, known as lease duration,
on the address assignment.
 Halfway through the lease period, the DHCP client
requests a lease renewal, and the DHCP server extends the
lease.
 If a computer stops using its assigned IP address (for
example, if a computer is moved to another network
segment or is removed), the lease expires and the address
becomes available for reassignment.
DHCP Relay Agent
 A relay agent is a small program that relays
DHCP/BOOTP messages between clients and servers
on different subnets.
 In TCP/IP networking, routers are used to
interconnect hardware and software used on different
physical network segments called subnets and forward
IP packets between each of the subnets.
 To support and use DHCP service across multiple
subnets, routers connecting each subnet should
comply with DHCP/BOOTP relay agent capability.
 If a router cannot function as a DHCP/BOOTP relay
agent, each subnet must have either its own DHCP
server or another computer that can function as a relay
agent on that subnet. In most cases, routers support
DHCP/BOOTP relay.
ARP
 Address resolution Protocol
 Mapping Logical to Physical Address
 If a host or a router has an IP datagram to send to
another host or router, it has the logical (IP) address of
the receiver.
 The logical (IP) address is obtained from the DNS.
 DNS :Domain Name System.
 But the IP datagram must be encapsulated in a frame
to be able to pass through the physical network.
 This means that the sender needs the physical address
of the receiver.
 The host or the router sends an ARP query packet.
 The packet includes the physical and IP addresses of
the sender and the IP address of the receiver.
 Because the sender does not know the physical address
of the receiver and the query is broadcast over the
network.
 Every host or router on the network receives and
processes the ARP query packet, but only the intended
recipient recognizes its IP address and sends back an
ARP response packet.
 The response packet contains the recipient’s IP and
physical addresses.The packet is unicast directly to the
inquirer by using the physical address received in the
query packet.
RARP
 Reverse Address Resolution Protocol
 (RARP) finds the logical address for a machine that
knows only its physical address.
 A diskless machine is usually booted from ROM,
which has minimum booting information. The ROM is
installed by the manufacturer.
 It cannot include the IP address because the IP
addresses on a network are assigned by the network
administrator.
 The machine can get its physical address (by reading
its NIC, for example), which is unique locally. It can
then use the physical address to get the logical address
by using the RARP protocol.
 A RARP request is created and broadcast on the local
network.
 Broadcasting is done at Data Link Layer.
 Another machine on the local network that knows all
the IP addresses will respond with a RARP reply.
 The requesting machine must be running a RARP
client program the responding machine must be
running a RARP server program.
 This is the reason that RARP is almost obsolete. Two
protocols, BOOTP and DHCP, are replacing RARP.
BOOTP:Bootstrap Protocol
 The Bootstrap Protocol (BOOTP) is a client/server
protocol designed to provide physical address to
logical address mapping.
 BOOTP is an application layer protocol.
 BOOTP messages are encapsulated in a UDP packet,
and the UDP packet itself is encapsulated in an IP
packet.
 One of the advantages of BOOTP over RARP is that
the client and server are application–layer processes.
 The BOOTP request is broadcast because the client
does not know the IP address of the server.
 A broadcast IP datagram cannot pass through any
router.
 To solve the problem, there is a need for an
intermediary. One of the hosts (or a router that can be
configured to operate at the application layer) can be
used as a relay.
 The host in this case is called a relay agent.
 The relay agent knows the unicast address of a BOOTP
server. When it receives this type of packet, it
encapsulates the message in a unicast datagram and
sends the request to the BOOTP server.
 The packet, carrying a unicast destination address, is
routed by any router and reaches the BOOTP server.
 The BOOTP server knows the message comes from a
relay agent because one of the fields in the request
message defines the IP address of the relay agent.
 The relay agent, after receiving the reply, sends it to the
BOOTP client.
DNS :Domain Name System
 DNS stands for service that translates domain names
into IP addresses.
 Domain names are alphabetic, they’re easier to
remember. The Internet however is really based on IP
addresses.
 For example, the domain name www.example.com
might translate to198.105.232.4.
 The DNS system is, in fact, its own network. If one
DNS server doesn’t know how to translate a particular
domain name, it asks another one, and so on, until the
correct IP address is returned.
Objective of DNS
 To create a means for administrators to assign host
names to their computers without duplicating the
names of other systems.
 To store the host names in a database that would be
accessible by any system, anywhere on the network.
 To distribute the host name database among servers all
over the network.
 To avoid creating traffic bottlenecks and a single point
of failure.
 To avoid creating traffic bottlenecks and a single point
of failure.
Domain Naming
 Before the DNS was developed, administrators
assigned a simple host names to the computers on the
networks.
 To support the network as it grew larger developed a
hierarchical name space that made it possible for
individual network administrators to name their
systems, while identifying and organization that owns
the systems and preventing the duplication of names
on the Internet.
 The DNS name space is based on domains, which exist
in a hierarchical structure.
 A domain is equivalent of a directory, in that it can
contain either subdomains or hosts, forming a
structure called DNS tree.
 Each name can be up to 63 characters long, with a total
length of 255 characters for a complete DNS name,
including the host and all of its parent domains.
 Domains and host names are not case sensitive, and
can take any value except the null value.
 A DNS name is something like a postal address, in
which the top–level domain is equivalent of the state,
the second–level domain is the city, and the host name
is the street address.
 An absolute domain name (also called a fully qualified
domain name –FQDN) does specify the path all the
way to the root.
Top-Level Domains
 In every DNS name, the first word on the right
represents the domain at the highest level in the DNS
tree, called a top–level domain.
 These top–level domains function as registrars for the
domains at the second level.
 It doesn’t matter that thousands of other network
administrators have named their web server www,
because they all have their individual domain names.
 The original DNS name space called for seven top–
level domains, dedicated for specific purposes.
 • com – Commercial organizations
 • edu – Four year, degree granting educational
institutions
 • gov – United States government institutions
 • int – Organizations established by International
treaty
 • mil – Unites States military applications
 • net – Networking organizations
 • org – Noncommercial organizations.
Country–Code domains
 There are 191 country–code domains (also called
international domains), named for specific countries
in their own language, such as in for India.
 80 of these 191 countries allow free registration of top–
level domains to anyone, without restrictions.
 For the other 111 countries, an organization must
conform to some sort of local presence, tax or
trademark guidelines in order to register a second–
level domain.
Second–Level domains
 The registrars of the second–level domains are
responsible for registering second–level domain
names, in return for a subscription fee.
 As long as an organization continues to pay fees for its
domain name, it has exclusive rights to that name.
 The domain registrar maintain records that identify
the owner of each second–level domain and specify
three contacts within the registrant’s organization– an
administrative contact, a billing contact, and a
technical contact.
 In addition, the registrar must have the IP addresses of
two DNS servers that function as the source for further
information about the domain.
 To host a second–level domain organization must have
two DNS servers. A DNS server is a software program
that runs on a computer. DNS server products are
available for all of the major network operating
system.
Subdomains
 It is possible for the administrators of a second–level
domain to create subdomains that form additional
levels.
 Large organization use Subdomains to subdivide their
networks according to geographical or organizational
boundaries.
 DNS servers can break up a Domain’s name space into
administrative units called zones.
 A domain with only two levels consists of only a single
zone, which is synonymous with the domain.
DNS Functions
 Resource Records: DNS servers are basically
database servers that store information about the
hosts and subdomain for which they are responsible in
resource records (RRs).
 SOA (Start of Authority): Indicates that the server
is the best authoritative source for data concerning
the zone. Each zone must have an SOA record and
only one SOA record can be in a zone.
 NS (Name Server) : The name server resource
record indicates the servers authoritative for the
zone. They indicate primary and secondary servers for
the zone specified in the SOA resource record, and
they indicate the servers for any delegated zones.
Every zone must contain at least one NS record at the
zone root.
 A (Address): Provides a name to IP address
mapping that supplies an IP address for a specific
DNS name. This record type performs the primary
function of the DNS, converting names to addresses.
 PTR: Provides an address to name mapping. This is
the functional opposite of an A record, used for reverse
lookup only.
 CNAME (Canonical Name): Creates an alias that
points to the canonical name of a host identified by an A
record. CNAME records are used to provide alternative
names by which the systems can be identified.
 MX (Mail Exchanger): Identifies a system that will
direct e–mail traffic sent to an address in the domain to
the individual recipient, a mail gateway or another mail
server.
DNS Name Resolution
 When you type a URL containing a DNS name (Like
www.microsoft.com) into browser’s address field and
press the ENTER key, if you look quickly at the status
bar in the lower left corner, you will see a message that
says “Finding site: www.microsoft.com.” In a few
second you will see a message that says “Connecting
to, “followed by an IP address. It is during this interval
that the DNS name resolution process occurs.
Resolvers:
 The component in the client system that generates the
DNS query is called a resolver.
 A resolver can resend a query if no reply is
forthcoming after a given timeout period, and can
process error messages returned by the server, such as
when it fails to resolve a given name.
DNS requests
 A TCP/IP client usually is configured with addresses of
two DNS servers which it can send queries.
 → A client only need to access one DNS server, but two
are usually specified to provide a backup in case one
server is unavailable.
 → There are two types of DNS queries
Two types of Query
 1.Recursive Query:It is responsible to fetch a result
until that it continues.
 2.Iterative Query:If a answer is not fetched then it goes
to the other DNS server and fires the query again but it
is not responsible to give a sure shot answer.
 Any iterative query is converted into therecursive
query eventually.

Más contenido relacionado

La actualidad más candente

Durai presentation of dhcp
Durai presentation of dhcpDurai presentation of dhcp
Durai presentation of dhcp
duraimurugan89
 
DHCP in windows server 2012
DHCP in windows server 2012DHCP in windows server 2012
DHCP in windows server 2012
Abaady Sahal
 
Dhcp presentation 01
Dhcp presentation 01Dhcp presentation 01
Dhcp presentation 01
maverick4489
 

La actualidad más candente (20)

Durai presentation of dhcp
Durai presentation of dhcpDurai presentation of dhcp
Durai presentation of dhcp
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
 
Dhcp
DhcpDhcp
Dhcp
 
DHCP in windows server 2012
DHCP in windows server 2012DHCP in windows server 2012
DHCP in windows server 2012
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Dhcp server
Dhcp serverDhcp server
Dhcp server
 
080 DHCP
080 DHCP080 DHCP
080 DHCP
 
Configuring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & SuperscopesConfiguring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & Superscopes
 
Dhcp presentation 01
Dhcp presentation 01Dhcp presentation 01
Dhcp presentation 01
 
Dhcp
DhcpDhcp
Dhcp
 
dynamic host configuration protocol
dynamic host configuration protocoldynamic host configuration protocol
dynamic host configuration protocol
 
Dhcp
DhcpDhcp
Dhcp
 
Dhcp
DhcpDhcp
Dhcp
 
DYNAMIC HOST CONFIGURATION PROTOCOL
DYNAMIC HOST CONFIGURATION PROTOCOLDYNAMIC HOST CONFIGURATION PROTOCOL
DYNAMIC HOST CONFIGURATION PROTOCOL
 
Linux05 DHCP Server
Linux05 DHCP ServerLinux05 DHCP Server
Linux05 DHCP Server
 
DHCP Protocol
DHCP ProtocolDHCP Protocol
DHCP Protocol
 
DHCP
DHCPDHCP
DHCP
 
Dhcp presentation
Dhcp presentationDhcp presentation
Dhcp presentation
 
1 dhcp server and windows server 2012
1 dhcp server and windows server 20121 dhcp server and windows server 2012
1 dhcp server and windows server 2012
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
 

Destacado

Active directory ii
Active directory   iiActive directory   ii
Active directory ii
deshvikas
 
Basic ip and networking ver 3 kl
Basic ip and networking ver 3 klBasic ip and networking ver 3 kl
Basic ip and networking ver 3 kl
Azhar Ali
 

Destacado (20)

Tutorial on dhcp
Tutorial on dhcp Tutorial on dhcp
Tutorial on dhcp
 
java
javajava
java
 
Fusion - BMC Service Assurance & Automation
Fusion - BMC Service Assurance & AutomationFusion - BMC Service Assurance & Automation
Fusion - BMC Service Assurance & Automation
 
6425 c 01
6425 c 016425 c 01
6425 c 01
 
Active directory ii
Active directory   iiActive directory   ii
Active directory ii
 
PACE-IT: Intro to the DNS Service - N10 006
PACE-IT: Intro to the DNS Service - N10 006 PACE-IT: Intro to the DNS Service - N10 006
PACE-IT: Intro to the DNS Service - N10 006
 
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANsCCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANs
 
Introduction to abstract window toolkit & swing
Introduction to abstract window toolkit & swingIntroduction to abstract window toolkit & swing
Introduction to abstract window toolkit & swing
 
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCNA R&S-06-Fundamentals of TCP-IP Transport and ApplicationsCCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
CCNA R&S-06-Fundamentals of TCP-IP Transport and Applications
 
Introduzione al dns
Introduzione al dnsIntroduzione al dns
Introduzione al dns
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Basic ip and networking ver 3 kl
Basic ip and networking ver 3 klBasic ip and networking ver 3 kl
Basic ip and networking ver 3 kl
 
CCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANsCCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANs
 
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network AssociateCCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network Associate
 
Dns
DnsDns
Dns
 
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsCCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking Models
 
Configuration DHCP
Configuration DHCPConfiguration DHCP
Configuration DHCP
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 

Similar a unit 2

Similar a unit 2 (20)

zuiqui_DHC.ppt
zuiqui_DHC.pptzuiqui_DHC.ppt
zuiqui_DHC.ppt
 
DHCP.pptx
DHCP.pptxDHCP.pptx
DHCP.pptx
 
DHCP
DHCPDHCP
DHCP
 
Configurar dhcp en router cisco
Configurar dhcp en router ciscoConfigurar dhcp en router cisco
Configurar dhcp en router cisco
 
Dhcp
DhcpDhcp
Dhcp
 
Dhcp presentation
Dhcp presentationDhcp presentation
Dhcp presentation
 
Dhcp server configuration
Dhcp server configurationDhcp server configuration
Dhcp server configuration
 
Customized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration ProtocolCustomized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration Protocol
 
Dhcp with cisco
Dhcp with ciscoDhcp with cisco
Dhcp with cisco
 
DHCP
DHCPDHCP
DHCP
 
DHCP basics
DHCP basicsDHCP basics
DHCP basics
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
 
Investigation of dhcp packets using wireshark
Investigation of dhcp packets using wiresharkInvestigation of dhcp packets using wireshark
Investigation of dhcp packets using wireshark
 
dynamichost configuration protocol
dynamichost configuration protocoldynamichost configuration protocol
dynamichost configuration protocol
 
DHCP
DHCPDHCP
DHCP
 
13 - DHCP Service.ppt
13 - DHCP Service.ppt13 - DHCP Service.ppt
13 - DHCP Service.ppt
 
IP Layer.pptx
IP Layer.pptxIP Layer.pptx
IP Layer.pptx
 
DHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACERDHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACER
 
14047721
1404772114047721
14047721
 
Module (8) DHCP Server.pptx
Module (8) DHCP Server.pptxModule (8) DHCP Server.pptx
Module (8) DHCP Server.pptx
 

Más de Sangeetha Rangarajan

Más de Sangeetha Rangarajan (11)

Unit iv
Unit ivUnit iv
Unit iv
 
Unit iii
Unit iiiUnit iii
Unit iii
 
Unit ii update
Unit ii updateUnit ii update
Unit ii update
 
Unit ii
Unit ii  Unit ii
Unit ii
 
Unit i FUNDAMENTALS OF SOFTWARE ENGINEERING
Unit i FUNDAMENTALS OF SOFTWARE ENGINEERINGUnit i FUNDAMENTALS OF SOFTWARE ENGINEERING
Unit i FUNDAMENTALS OF SOFTWARE ENGINEERING
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
network administration directory access and remote access
network administration directory access and remote accessnetwork administration directory access and remote access
network administration directory access and remote access
 
Chemistry(matter and change)
Chemistry(matter and change)Chemistry(matter and change)
Chemistry(matter and change)
 
Unit 3
Unit 3Unit 3
Unit 3
 
Ado.net
Ado.netAdo.net
Ado.net
 

Último

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Último (20)

S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 

unit 2

  • 3. INDEX 1. Dynamic Host Control Protocol 2. Introduction to Domain Name System
  • 4. DHCP:Dynamic Host Control Protocol 1) Introduction 2) DHCP origins 3) RARP 4) ARP 5) BOOTP 6) DHCP Objectives 7) IP address assignments 8) DHCP Architecture
  • 5. Introduction to DHCP  BOOTP is not a dynamic configuration protocol.  DHCP was created by the Dynamic Host Configuration Working Group of the Internet Engineering Task Force(IETF)  Runs over UDP  Utilizing ports:  67 – connections to server  68 – connections to client  DHCP is basically used for dynamic configuration  Uses client–server model
  • 6.  When a client requests its IP address, the BOOTP server consults a table that matches the physical address of the client with its IP address.  The binding is predetermined.  The Dynamic Host Configuration Protocol (DHCP) has been devised to provide static and dynamic address allocation that can be manual or automatic
  • 7.  Static Address Allocation In this capacity DHCP acts as BOOTP does.  It is backward compatible with BOOTP, which means a host running the BOOTP client can request a static address from a DHCP server.  A DHCP server has a database that statically binds physical addresses to IP addresses.  Dynamic Address Allocation DHCP has a second database with a pool of available IP addresses. This second database makes DHCP dynamic.  When a DHCP client requests a temporary IP address, the DHCP server goes to the pool of available (unused) IP addresses and assigns an IP address for a negotiable period of time.
  • 8.  When a DHCP client sends a request to a DHCP server, the server first checks its static database. If an entry with the requested physical address exists in the static database, the permanent IP address of the client is returned.  On the other hand, if the entry does not exist in the static database,the server selects an IP address from the available pool, assigns the address to the client, and adds the entry to the dynamic database.  The dynamic aspect of DHCP is needed when a host moves from network to network or is connected and disconnected from a network (as is a subscriber to a service provider).
  • 9.  The addresses assigned from the pool are temporary addresses. The DHCP server issues a lease for a specific time. When the lease expires, the client must either stop using the IP address or renew the lease.  The server has the option to agree or disagree with the renewal. If server disagrees, the client stops using the address.
  • 10. Objectives of DHCP  The DHCP server should be able to provide a workstation for configuration .  The DHCP server should prevent the duplication of addresses on the network.  The DHCP server should be able to configure clients by use of relay agent.  DHCP clients should be able to retain their TCP/IP parameters despite a reboot of either client or server system.
  • 11. IP address Assignment  Manual allocation:The administrator configures the DHCP server to assign a specific IP address to a given system, which will never change unless it is manually modified. This is equivalent in functionality to RARP and BOOTP.  Automatic allocation: The DHCP server assigns permanent IP addresses from a pool, which does not change unless they are manually modified by the administrator.  Dynamic allocation:The DHCP server assigns IP addresses from a pool using a limited–time lease, so the addresses can be reassigned if the client system does periodically renew it.
  • 12. DHCP architecture  Dynamic configuration protocol consists of two basic elements:  • A service that assigns TCP/IP configuration settings to client system  • A protocol used for communications between DHCP clients and server.  The DHCP architecture defines the message format for the protocol and the sequence of message exchanges that take place between the DHCP client and server.
  • 13.  The DHCP architecture defines the message format for the protocol and the sequence of message exchanges that take place between the DHCP client and server.
  • 14.
  • 15.  OP (Op code), 1 byte: specifies whether the message is request or reply, using the following code.  1. BOOTREQUEST  2. BOOTREPLY  htype (Hardware type), 1 byt1: Specifies the type of hardware used in the chaddr field. For ex 1 for Ethernet (10 MB)  hlen (Hardware address length), 1 byte: Specifies the length of the hardware address found in the chaddr field, according to the value of the htype field (for ex if htype=1, indicating an Ethernet hardware address, the value of hlen will be 6 byte)  hops (1 byte): Specifies the number of network segments between the client and server. The client sets the value to 0 and each DHCP relay system increments it by 1 during the journey to the server.  Xid (Transaction Id), 4 bytes: Contains a transaction identifier that systems use to associate the request and response messages of a single DHCP transaction.
  • 16.  Secs (Seconds), 2 bytes: Specifies the number of seconds elapsed since the IP address was assigned or the lease last renewed. This enables the systems to distinguish between messages of the same type generated during a single DHCP transaction.  Flags (2 byte): Contains the broadcast flag as the first bit, which, when set to a value of 1, specifies that DHCP servers and relay agents should use broadcasts to transmit to the client and not unicast. The remaining bits in the field are unused and must have a value zero.  Ciaddr (client IP address), 4 bytes: Specifies the client’s IP address in DHCP REQUEST messages transmitted while in the bound, renewal or rebinding state. At all other times the value must be zero.  Siaddr (Server IP address), 4 bytes: Specifies the IP address of  the next server in a bootstrap sequence. Servers include this information in DHCPOFFER message DHCPACK messages only when DHCP is configured to supply an executable boot file to clients.
  • 17.  Giaddr (gateway IP address), 4 bytes: Specifies the IP address ofthe DHCP relay agent to which a server should send its replies when the client and server are located on different subnets. When the server and client are on the same segment, the value must be zero.  Chaddr (Client hardware address) 16 bytes: specifies the hardware address of the client system in DHCPDISCOVER and DHCPREQUEST messages, which the server uses to address its unicast responses to the client.
  • 18.  Sname (server host name) 64 bytes: Specifies the hostname of the DHCP server. The field is more commonly used to hold overflow data from the options field.  File (boot file name) 128 bytes: Specifies the name of an executable boot file for diskless client workstation in DHCPDISCOVER messages or DHCPOFFER messages. The field is more commonly used to hold overflow data from the options field.  Options (variable size minimum 312 bytes): Contains the magic cookie that specifies how the rest of the field should be interpreted and the DHCP message type option that defines the function of the message.
  • 19. DHCP Options  The option field always begins with the so–called magic cookie, which informs the server about what is contained in the rest of the field.  The option Format  The individual options in the options field contain various types and amount of data, but most of them use the same basic structure, which consists of three subfields. Code(1 byte) Length (1 byte) Data(variable)
  • 20. DHCP Message type option  1.DHCPDISCOVER: Used by client systems to locate DHCP servers and request an IP address.  2. DHCPOFFER: Used by server to offer IP addresses to clients.  3. DHCPREQUEST: Used by clients to request specific IP address assignment or to renew leases.  4. DHCPDECLINE: Used by clients to reject an IP address offered by a server.
  • 21.  5. DHCPACK: Used by servers to acknowledge a client’s acceptance of an offered IP address.  6. DHCPNACK: Used by servers to reject a client’s acceptance of an offered IP address  7. DHCPRELEASE: Used by clients to terminate a lease.  8. DHCPINFORM: Used by clients those have already been assigned an IP address to request additional configuration parameters.
  • 22. DHCP Communications  When you configure a workstation to be a DHCP client, the system initiates an exchange of messages with a DHCP server.  DHCP Address Pool  DHCP address pool is a virtual container that contains all the IP addresses that have been configured in the DHCP range to make available to the client computers.  As soon as any IP address from the address pool is assigned to a client computer, the address is temporarily removed from the pool.
  • 23. DHCP Lease  When the DHCP server assigns an IP address to a DHCP client computer, the address is assigned for specific time duration. The time duration for which an IP address is assigned to a DHCP client computer by the DHCP server is technically called the DHCP lease.  When the DHCP lease expires, the IP address is revoked from the DHCP client computer and is sent back to the DHCP address pool.
  • 24.
  • 25. DORA  The step–by–step process through which a DHCP server assigns an IP address to a DHCP client computer is in short called DORA.  D – D in the term DORA stands for the DHCP Discover packet. The DHCP Discover packet is broadcasted by the DHCP client computer in order to find the available DHCP server(s) in the network.  O – O in the term DORA stands for the DHCP Offer packet. The DHCP Offer is a unicast packet that is sent by the DHCP server who receives the DHCP Discover packet from the DHCP client computer. The DHCP Offer packet contains the available IP address that the DHCP server  offers to the client computer.
  • 26.  R – R in the term DORA stands for the DHCP Request packet. The DHCP Request is again a unicast packet sent by the DHCP client computer to the DHCP server who had sent the DHCP Offer packet to the client computer.  A – A in the term DORA stands for the DHCP Acknowledge packet.The DHCP Acknowledge is a unicast packet sent by the DHCP server to the DHCP client computer acknowledging the assignment of the offered IP address for a specific lease time.
  • 27.  Once the entire DORA process is complete, the DHCP server marks the IP address as assigned in its database and the DHCP client computer starts using the assigned IP address to communicate with other computers in the network.
  • 28.
  • 29. Lease renewal  The renewal process occurs when a client already has a lease, and needs to renew that lease with the server. To ensure that addresses are not left in an assigned state when they are no longer needed, the DHCP server places an administrator–defined time limit, known as lease duration, on the address assignment.  Halfway through the lease period, the DHCP client requests a lease renewal, and the DHCP server extends the lease.  If a computer stops using its assigned IP address (for example, if a computer is moved to another network segment or is removed), the lease expires and the address becomes available for reassignment.
  • 30.
  • 31. DHCP Relay Agent  A relay agent is a small program that relays DHCP/BOOTP messages between clients and servers on different subnets.  In TCP/IP networking, routers are used to interconnect hardware and software used on different physical network segments called subnets and forward IP packets between each of the subnets.  To support and use DHCP service across multiple subnets, routers connecting each subnet should comply with DHCP/BOOTP relay agent capability.
  • 32.  If a router cannot function as a DHCP/BOOTP relay agent, each subnet must have either its own DHCP server or another computer that can function as a relay agent on that subnet. In most cases, routers support DHCP/BOOTP relay.
  • 33.
  • 34. ARP  Address resolution Protocol  Mapping Logical to Physical Address  If a host or a router has an IP datagram to send to another host or router, it has the logical (IP) address of the receiver.  The logical (IP) address is obtained from the DNS.  DNS :Domain Name System.  But the IP datagram must be encapsulated in a frame to be able to pass through the physical network.  This means that the sender needs the physical address of the receiver.
  • 35.  The host or the router sends an ARP query packet.  The packet includes the physical and IP addresses of the sender and the IP address of the receiver.  Because the sender does not know the physical address of the receiver and the query is broadcast over the network.
  • 36.  Every host or router on the network receives and processes the ARP query packet, but only the intended recipient recognizes its IP address and sends back an ARP response packet.  The response packet contains the recipient’s IP and physical addresses.The packet is unicast directly to the inquirer by using the physical address received in the query packet.
  • 37.
  • 38. RARP  Reverse Address Resolution Protocol  (RARP) finds the logical address for a machine that knows only its physical address.  A diskless machine is usually booted from ROM, which has minimum booting information. The ROM is installed by the manufacturer.  It cannot include the IP address because the IP addresses on a network are assigned by the network administrator.
  • 39.  The machine can get its physical address (by reading its NIC, for example), which is unique locally. It can then use the physical address to get the logical address by using the RARP protocol.  A RARP request is created and broadcast on the local network.  Broadcasting is done at Data Link Layer.  Another machine on the local network that knows all the IP addresses will respond with a RARP reply.  The requesting machine must be running a RARP client program the responding machine must be running a RARP server program.  This is the reason that RARP is almost obsolete. Two protocols, BOOTP and DHCP, are replacing RARP.
  • 40. BOOTP:Bootstrap Protocol  The Bootstrap Protocol (BOOTP) is a client/server protocol designed to provide physical address to logical address mapping.  BOOTP is an application layer protocol.  BOOTP messages are encapsulated in a UDP packet, and the UDP packet itself is encapsulated in an IP packet.  One of the advantages of BOOTP over RARP is that the client and server are application–layer processes.
  • 41.  The BOOTP request is broadcast because the client does not know the IP address of the server.  A broadcast IP datagram cannot pass through any router.  To solve the problem, there is a need for an intermediary. One of the hosts (or a router that can be configured to operate at the application layer) can be used as a relay.  The host in this case is called a relay agent.
  • 42.  The relay agent knows the unicast address of a BOOTP server. When it receives this type of packet, it encapsulates the message in a unicast datagram and sends the request to the BOOTP server.  The packet, carrying a unicast destination address, is routed by any router and reaches the BOOTP server.
  • 43.
  • 44.  The BOOTP server knows the message comes from a relay agent because one of the fields in the request message defines the IP address of the relay agent.  The relay agent, after receiving the reply, sends it to the BOOTP client.
  • 45. DNS :Domain Name System  DNS stands for service that translates domain names into IP addresses.  Domain names are alphabetic, they’re easier to remember. The Internet however is really based on IP addresses.  For example, the domain name www.example.com might translate to198.105.232.4.  The DNS system is, in fact, its own network. If one DNS server doesn’t know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.
  • 46. Objective of DNS  To create a means for administrators to assign host names to their computers without duplicating the names of other systems.  To store the host names in a database that would be accessible by any system, anywhere on the network.  To distribute the host name database among servers all over the network.  To avoid creating traffic bottlenecks and a single point of failure.  To avoid creating traffic bottlenecks and a single point of failure.
  • 47. Domain Naming  Before the DNS was developed, administrators assigned a simple host names to the computers on the networks.  To support the network as it grew larger developed a hierarchical name space that made it possible for individual network administrators to name their systems, while identifying and organization that owns the systems and preventing the duplication of names on the Internet.
  • 48.  The DNS name space is based on domains, which exist in a hierarchical structure.  A domain is equivalent of a directory, in that it can contain either subdomains or hosts, forming a structure called DNS tree.
  • 49.
  • 50.  Each name can be up to 63 characters long, with a total length of 255 characters for a complete DNS name, including the host and all of its parent domains.  Domains and host names are not case sensitive, and can take any value except the null value.  A DNS name is something like a postal address, in which the top–level domain is equivalent of the state, the second–level domain is the city, and the host name is the street address.
  • 51.  An absolute domain name (also called a fully qualified domain name –FQDN) does specify the path all the way to the root.
  • 52.
  • 53. Top-Level Domains  In every DNS name, the first word on the right represents the domain at the highest level in the DNS tree, called a top–level domain.  These top–level domains function as registrars for the domains at the second level.  It doesn’t matter that thousands of other network administrators have named their web server www, because they all have their individual domain names.
  • 54.  The original DNS name space called for seven top– level domains, dedicated for specific purposes.  • com – Commercial organizations  • edu – Four year, degree granting educational institutions  • gov – United States government institutions  • int – Organizations established by International treaty  • mil – Unites States military applications  • net – Networking organizations  • org – Noncommercial organizations.
  • 55. Country–Code domains  There are 191 country–code domains (also called international domains), named for specific countries in their own language, such as in for India.  80 of these 191 countries allow free registration of top– level domains to anyone, without restrictions.  For the other 111 countries, an organization must conform to some sort of local presence, tax or trademark guidelines in order to register a second– level domain.
  • 56. Second–Level domains  The registrars of the second–level domains are responsible for registering second–level domain names, in return for a subscription fee.  As long as an organization continues to pay fees for its domain name, it has exclusive rights to that name.  The domain registrar maintain records that identify the owner of each second–level domain and specify three contacts within the registrant’s organization– an administrative contact, a billing contact, and a technical contact.
  • 57.  In addition, the registrar must have the IP addresses of two DNS servers that function as the source for further information about the domain.  To host a second–level domain organization must have two DNS servers. A DNS server is a software program that runs on a computer. DNS server products are available for all of the major network operating system.
  • 58. Subdomains  It is possible for the administrators of a second–level domain to create subdomains that form additional levels.  Large organization use Subdomains to subdivide their networks according to geographical or organizational boundaries.  DNS servers can break up a Domain’s name space into administrative units called zones.  A domain with only two levels consists of only a single zone, which is synonymous with the domain.
  • 59.
  • 60. DNS Functions  Resource Records: DNS servers are basically database servers that store information about the hosts and subdomain for which they are responsible in resource records (RRs).  SOA (Start of Authority): Indicates that the server is the best authoritative source for data concerning the zone. Each zone must have an SOA record and only one SOA record can be in a zone.
  • 61.  NS (Name Server) : The name server resource record indicates the servers authoritative for the zone. They indicate primary and secondary servers for the zone specified in the SOA resource record, and they indicate the servers for any delegated zones. Every zone must contain at least one NS record at the zone root.  A (Address): Provides a name to IP address mapping that supplies an IP address for a specific DNS name. This record type performs the primary function of the DNS, converting names to addresses.
  • 62.  PTR: Provides an address to name mapping. This is the functional opposite of an A record, used for reverse lookup only.  CNAME (Canonical Name): Creates an alias that points to the canonical name of a host identified by an A record. CNAME records are used to provide alternative names by which the systems can be identified.  MX (Mail Exchanger): Identifies a system that will direct e–mail traffic sent to an address in the domain to the individual recipient, a mail gateway or another mail server.
  • 63. DNS Name Resolution  When you type a URL containing a DNS name (Like www.microsoft.com) into browser’s address field and press the ENTER key, if you look quickly at the status bar in the lower left corner, you will see a message that says “Finding site: www.microsoft.com.” In a few second you will see a message that says “Connecting to, “followed by an IP address. It is during this interval that the DNS name resolution process occurs.
  • 64. Resolvers:  The component in the client system that generates the DNS query is called a resolver.  A resolver can resend a query if no reply is forthcoming after a given timeout period, and can process error messages returned by the server, such as when it fails to resolve a given name.
  • 65. DNS requests  A TCP/IP client usually is configured with addresses of two DNS servers which it can send queries.  → A client only need to access one DNS server, but two are usually specified to provide a backup in case one server is unavailable.  → There are two types of DNS queries
  • 66. Two types of Query  1.Recursive Query:It is responsible to fetch a result until that it continues.  2.Iterative Query:If a answer is not fetched then it goes to the other DNS server and fires the query again but it is not responsible to give a sure shot answer.  Any iterative query is converted into therecursive query eventually.