1 Today’s Topics* r ICMP r DHCP r Domain Naming  DNS r Byte ordering * Based in part on slides by Paul D. Paulson.

Slides:



Advertisements
Similar presentations
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Advertisements

DNS – Domain Name system Converting domain names to IP addresses since 1983.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Domain Name System (or Service) (DNS) Computer Networks Computer Networks Term B10.
1 EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Internet Control Message Protocol (ICMP)
Domain Name System (or Service) (DNS) Computer Networks Computer Networks Spring 2012 Spring 2012.
EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
2: Application Layer1 FTP, SMTP and DNS. 2: Application Layer2 FTP: separate control, data connections r FTP client contacts FTP server at port 21, specifying.
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts, routers: –IP address (32 bit) - used for addressing datagrams –“name”, e.g., gaia.cs.umass.edu.
Network Layer4-1 IP: Internet Protocol r Datagram format r IPv4 addressing r DHCP: Dynamic Host Configuration Protocol r NAT: Network Address Translation.
ICMP: Internet Control Message Protocol used by hosts, routers, gateways to communication network-level information –error reporting: unreachable host,
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
Application Layer session 1 TELE3118: Network Technologies Week 12: DNS Some slides have been taken from: r Computer Networking: A Top Down Approach.
CPSC 441: DNS1 Instructor: Anirban Mahanti Office: ICT Class Location: ICT 121 Lectures: MWF 12:00 – 12:50 Notes derived.
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Name Resolution and DNS. Domain names and IP addresses r People prefer to use easy-to-remember names instead of IP addresses r Domain names are alphanumeric.
Chapter 2 Application Layer
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
CS 4396 Computer Networks Lab
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
DNS & P2P A PPLICATIONS د. عـــادل يوسف أبو القاسم.
DHCP: Dynamic Host Configuration Protocol
Domain Name System (DNS)
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 10 Omar Meqdadi Department of Computer Science and Software Engineering University.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
CS 471/571 Domain Name Server Slides from Kurose and Ross.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
DNS: Domain Name System
Review: –Which protocol is used to move messages around in the Internet? –Describe how a message is moved from the sender’s UA to the receiver’s.
1 DNS: Domain Name System People: many identifiers: m SSN, name, Passport # Internet hosts, routers: m IP address (32 bit) - used for addressing datagrams.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
DNS: Domain Name System People: many identifiers: – SSN, name, Passport # Internet hosts, routers: – IP address (32 bit) - used for addressing datagrams.
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
Network Layer4-1 Subnets How many?
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
2: Application Layer1 DNS: Domain Name System People have many identifiers: SSN, name, passport number Internet hosts, routers have identifiers, too: IP.
CPSC 441: DNS 1. DNS: Domain Name System Internet hosts: m IP address (32 bit) - used for addressing datagrams m “name”, e.g., - used by.
CS 3830 Day 10 Introduction 1-1. Announcements r Quiz #2 this Friday r Program 2 posted yesterday 2: Application Layer 2.
Lecture 5: Web Continued 2-1. Outline  Network basics:  HTTP protocols  Studies on HTTP performance from different views:  Browser types [NSDI 2014]
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
1 Kyung Hee University Chapter 19 DNS (Domain Name System)
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
1. Internet hosts:  IP address (32 bit) - used for addressing datagrams  “name”, e.g., ww.yahoo.com - used by humans DNS: provides translation between.
Network Layer4-1 Chapter 4 Network Layer All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down.
Application Layer, 2.5 DNS 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
Important r On Friday, could you ask students to please me their groups (one per group) for Project 2 so we can assign IP addresses. I’ll send.
CSEN 404 Application Layer II Amr El Mougy Lamia Al Badrawy.
Spring 2006 CPE : Application Layer_DNS 1 Special Topics in Computer Engineering Application layer: Domain Name System Some of these Slides are.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
2: Application Layer 1 Some network apps r r Web r Instant messaging r Remote login r P2P file sharing r Multi-user network games r Streaming stored.
Chapter 17 DNS (Domain Name System)
Introduction to Networks
Chapter 19 DNS (Domain Name System)
Session 6 INST 346 Technologies, Infrastructure and Architecture
Chapter 9: Domain Name Servers
Introduction to Communication Networks
Cookies, Web Cache & DNS Dr. Adil Yousif.
Wide Area Networks and Internet CT1403
Chapter 19 DNS (Domain Name System)
FTP, SMTP and DNS 2: Application Layer.
Presentation transcript:

1 Today’s Topics* r ICMP r DHCP r Domain Naming  DNS r Byte ordering * Based in part on slides by Paul D. Paulson.

2 Error detection r IP provides best-effort delivery r Internet layer can detect a variety of errors:  Checksum  TTL expires  No route to destination network  Can't deliver to destination host (e.g., no ARP reply) r Internet layer discards datagrams with certain types of problems

3 ICMP r Some types of errors can be detected and reported r Internet Control Message Protocol (ICMP) provides error-reporting mechanisms r Router sends control message back to source  Encapsulated in IP datagram  Contains coded information about the type of problem

4 ICMP Header Example r Type 3 r Code 0 = net unreachable 1 = host unreachable 2 = protocol unreachable 3 = port unreachable 4 = fragmentation needed and DF set 5 = source route failed r Checksum  the 16-bit one's complement of the one's complement sum of the ICMP message starting with the ICMP Type. r Original IP Header + 64 bits of Data Datagram  IP header is at least 20 bytes.  Remainder is used by host to match message to appropriate process.

5 ICMP message types

6 Types of messages r Internet Control Message Protocol (ICMP) defines 2 classes of messages  error messages  informational messages

7 Error message examples r Destination unreachable  router sends when it determines that a datagram cannot be delivered to its final destination r Fragmentation required  Router sends when it determines datagram is too large for outbound network r Time exceeded  message is sent in two cases 1.router sends when the TTL is reduced to zero 2.destination host sends when the reassembly timer expires before all fragments arrive.

8 Informational messages r Echo request/reply  Sent to ICMP software on any computer  In response to a request, the ICMP software is required to send an ICMP echo reply message. r Address mask request/reply  Broadcast when a host boots  Router replies with the mask used in that subnet r Router path MTU discovery  Distributed path discovery

9 ICMP Applications r ping r echo r traceroute r Discovery  path, MTU, etc. r etc.

10 Reachability r An internet host, A, is reachable from another host, B, if datagrams can be delivered from A to B r ping program tests reachability - sends datagram from B to A and A echoes it back to B  Uses ICMP “echo request” and “echo reply” messages  Internet layer includes code to reply to incoming ICMP “echo request” messages Does not have to go to application layer / port

11 traceroute r Uses UDP with TTL field set and sends to a non-existent port r Finds route via expanding ring search  Sends ICMP “echo” messages with increasing TTL r Router that decrements TTL to 0 sends ICMP “time exceeded” ICMP message, with router's address as source address

12 Expanding ring search r First datagram  TTL = 1  gets to first router  is discarded and ICMP “time exceeded” message is returned r Next datagram  TTL = 2  gets through first router to second router  is discarded and ICMP “time exceeded” message is returned r Continue until message from destination received

13 ”Path MTU” discovery r Fragmentation should be avoided if possible r Source can determine path MTU - smallest MTU on path from source to destination  Probes path using IP datagrams with don't fragment flag set  Router responds with ICMP “fragmentation required” message  Source sends smaller probes until destination reached

14 Today’s Topics r ICMP r DHCP r Domain Naming  DNS r Byte ordering

15 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file  Windows: control-panel->network->configuration- >tcp/ip->properties  UNIX: /etc/rc.config r DHCP: Dynamic Host Configuration Protocol: dynamically get address from as server  “plug-and-play”

16 DHCP: Dynamic Host Configuration Protocol Goal: allow host to dynamically obtain its IP address from network server when it joins network Can renew its lease on address in use Allows reuse of addresses (only hold address while connected an “on”) Support for mobile users who want to join network (more shortly) DHCP overview:  host broadcasts “DHCP discover” msg  DHCP server responds with “DHCP offer” msg  host requests IP address: “DHCP request” msg  DHCP server sends address: “DHCP ack” msg

17 DHCP client-server scenario A B E DHCP server arriving DHCP client needs address in this network

18 DHCP client-server scenario DHCP server: arriving client time DHCP discover src : , 68 dest.: ,67 yiaddr: transaction ID: 654 DHCP offer src: , 67 dest: , 68 yiaddrr: transaction ID: 654 Lifetime: 3600 secs DHCP request src: , 68 dest:: , 67 yiaddrr: transaction ID: 655 Lifetime: 3600 secs DHCP ACK src: , 67 dest: , 68 yiaddrr: transaction ID: 655 Lifetime: 3600 secs yiaddr is “your internet address”

19 Today’s Topics r ICMP r DHCP r Domain Naming  DNS r Byte ordering

20 The need for naming r IP assigns 32-bit addresses to host interfaces r All applications use IP addresses through the TCP/IP protocol software r Binary addresses easy for computers to manage r … but difficult for humans to remember:  E.G.: telnet

21 The Domain Name System r The computer needs 32-bit binary addresses r Humans "need" mnemonics r DNS provides translation between symbolic names and IP addresses

22 Structure of DNS names r Each name consists of a sequence of alphanumeric components separated by periods r Examples:  comcast.com    classes.engr.oregonstate.edu r Note: There is not a correspondence between the DNS name components and the fields of an IP address (dotted decimal notation)

23 Structure of DNS names r Names are hierarchical, with most significant component on the right  Top-Level Domain (TLD) r Second from right is the domain name within the TLD  Approved by a global authority

24 Structure of DNS names r Other names may be added by the organization that owns the name  hierarchical structure r Left-most component is computer name r NOTE: www does not necessarily imply web services.  It’s just a computer name in a domain.

25 Structure of DNS names r Organizations apply for names in a TLD. E.G.:  oregonstate.edu  mozilla.com r Organizations determine own internal structure. E.G.:  eecs.oregonstate.edu  classes.eecs.oregonstate.edu   en-US.

26 Top-level domains (TLD)

27 Geographic structure r TLDs are USA-centric r Geographic TLDs (ccTLD) are used for organizations in other countries. Examples: TLDCountry.ukUnited Kingdom.cnChina.inIndia.jpJapan.pgPapua New Guinea.clChile.keKenya

28 Geographic structure r Countries define their own internal hierarchy: r.ac.jp and.edu.au are used for academic organizations in Japan and Australia, respectively

29 Internal names r Authority for creating new subdomains is delegated to each domain r Administrator of oregonstate.edu has authority to create classes.engr.oregonstate.edu  does not have to contact any central naming authority

30 Physical location r DNS domains are logical concepts and need not correspond to physical location of organizations  E.G., chinatoday.com is hosted partly in Beijing, partly in San Francisco r Note: some countries sell domain names in their ccTLDs  e.g.

31 DNS: Domain Name System Internet routers: r Use IP addresses to forward/route datagrams (e.g., ) People: r Use names (e.g., Question: r How to map between IP addresses and name ? Answer: r DNS Domain Name System: r distributed database: implemented in hierarchy of many name servers r application-layer protocol: running at host, routers, & name servers to resolve names (address/name translation)

32 DNS Why not centralize DNS? r single point of failure r traffic volume r distant centralized database r maintenance doesn’t scale! DNS services r hostname to IP address translation r Web server aliasing  Canonical, alias names r mail server aliasing r load distribution  replicated Web servers: set of IP addresses for one canonical name

33 Root DNS Servers com DNS servers org DNS serversedu DNS servers poly.edu DNS servers umass.edu DNS servers yahoo.com DNS servers amazon.com DNS servers pbs.org DNS servers Distributed, Hierarchical Database Client wants IP for 1 st approx: r client queries a root server to find com DNS server r client queries com DNS server to get amazon.com DNS server r client queries amazon.com DNS server to get IP address for

34 DNS: Root name servers r contacted by local name server that can not resolve name 13 root name servers worldwide b USC-ISI Marina del Rey, CA l ICANN Los Angeles, CA e NASA Mt View, CA f Internet Software C. Palo Alto, CA (and 36 other locations) i Autonomica, Stockholm (plus 28 other locations) k RIPE London (also 16 other locations) m WIDE Tokyo (also Seoul, Paris, SF) a Verisign, Dulles, VA c Cogent, Herndon, VA (also LA) d U Maryland College Park, MD g US DoD Vienna, VA h ARL Aberdeen, MD j Verisign, ( 21 locations)

35 TLD and Authoritative Servers r Top-level domain (TLD) servers:  responsible for com, org, net, edu, etc, and all top-level country domains uk, fr, ca, jp.  Network Solutions maintains servers for 'com' TLD r Authoritative DNS servers:  organization’s DNS servers, providing authoritative hostname to IP mappings for organization’s servers (e.g., Web, mail).  can be maintained by organization or service provider

36 Local Name Server r does not strictly belong to hierarchy r each ISP (residential ISP, company, university) has one.  also called “default name server” r when host makes DNS query, query is sent to its local DNS server  acts as proxy, forwards query into hierarchy

37 requesting host eecs.oregonstate.edu gaia.cs.umass.edu root DNS server local DNS server dns1.oregonstate.edu authoritative DNS server dns.cs.umass.edu 7 8 TLD DNS server DNS name resolution example iterated query: r Host at eecs.oregonstate.edu wants IP address for gaia.cs.umass.edu r Each server replies with name of server to contact

38 requesting host eecs.oregonstate.edu gaia.cs.umass.edu root DNS server local DNS server dns1.oregonstate.edu authoritative DNS server dns.cs.umass.edu 7 8 TLD DNS server 3 r puts burden of name resolution on contacted name server  heavy load? DNS name resolution example recursive query:

39 DNS: caching and updating records name servers cache mappings as they learn them  cache entries timeout (disappear) after some time  TLD servers typically cached in local name servers Thus root name servers not often visited

40 Today’s Topics r ICMP r DHCP r Domain Naming  DNS r Byte ordering

41 Byte-ordering r In all modern computer architectures, strings are stored in contiguous memory addresses in byte (character) order r However … storage of numeric values is architecture dependent  16-bit integer (2 bytes)  32-bit integer (4 bytes)  etc. r Different architectures store numeric values in different byte order

42 Big-endian, Little-endian r Big-endian  Numeric (multi-byte) values are stored in "normal" byte order most significant byte first  Example: Decimal 1523 = 05F3 (hex) Big-endian byte order is 05 F3 r Little-endian  Numeric (multi-byte) values are stored in "reverse" byte order least significant byte first  Example: Decimal 1523 = 05F3 (hex) Little-endian byte order is F3 05 r NOTE: this refers to byte-order, NOT to the order of bits within the bytes.

43 Big-endian, Little-endian r Example: 32-bit dotted-decimal = 80C123CB (hex) Big-endian byte order is 80 C1 23 CB Little-endian byte order is CB 23 C1 80

44 Big-endian, Little-endian r Intel architectures use little-endian r Sparc, Solaris (and other) architectures use big-endian r Problem with communication among various architectures. r Data sent over a network is a sequence of bytes (characters, integers, etc.) r Network order is always Big-endian