SlideShare a Scribd company logo
5
Most read
7
Most read
10
Most read
DOMAIN NAME SYSTEM (DNS)
 The domain name system (DNS) is the way that internet domain
names are located and translated into internet protocol (IP)
addresses.
 The domain name system maps the name people use to locate a
website to the IP address that a computer uses to locate a website.
 For example, if someone types facebook.com into a web browser, a
server behind the scenes will map that name to the IP address
31.13.72.36.
 Web browsing and most other internet activity depend on DNS to
quickly provide the information necessary to connect users to
remote hosts.
 DNS mapping is distributed throughout the internet in a hierarchy of
authority.
 Access providers and enterprises, as well as governments,
universities and other organizations, typically have their own
assigned ranges of IP addresses and an assigned domain name; they
also typically run DNS servers to manage the mapping of those
names to those addresses.
How does DNS work?
 DNS servers answer questions from both inside and outside their
own domains. When a server receives a request from outside the
domain for information about a name or address inside the domain,
it provides the authoritative answer. When a server receives a
request from inside its own domain for information about a name
or address outside that domain, it passes the request out to
another server -- usually one managed by its internet service
provider. If that server does not know the answer or the
authoritative source for the answer, it will reach out to the DNS
servers for the top-level domain -- e.g., for all of .com or .edu. Then,
it will pass the request down to the authoritative server for the
specific domain -- e.g., techtarget.com or stkate.edu; the answer
flows back along the same path.
How does DNS increase web
performance?
 To promote efficiency, servers can cache the answers they
receive for a set amount of time. This allows them to
respond more quickly the next time a request for the same
lookup comes in.
 For example, if everyone in an office needs to access the
same training video on a particular website on the same
day, the local DNS server will ordinarily only have to resolve
the name once, and then it can serve all the other requests
out of its cache.
 The length of time the record is held -- the time to live -- is
configurable; longer values decrease the load on servers,
shorter values ensure the most accurate responses.
Domain name system (dns) , TELNET ,FTP, TFTP
What is Telnet?
 Telnet is a user command and an
underlying TCP/IP protocol for accessing remote
computers. Through Telnet, an administrator or
another user can access someone else's computer
remotely.
 On the Web, HTTP and FTP protocols allow you to
request specific files from remote computers, but not
to actually be logged on as a user of that computer.
 With Telnet, you log on as a regular user with whatever
privileges you may have been granted to the
specific application and data on that computer.
A Telnet command request looks like this (the
computer name is made-up):
telnet the.libraryat.whatis.edu
The result of this request would be an invitation
to log on with a userid and a prompt for a
password. If accepted, you would be logged on
like any user who used this computer every day.
Telnet is most likely to be used by program
developers and anyone who has a need to use
specific applications or data located at a
particular host computer.
File Transfer Protocol (FTP)
 File Transfer Protocol (FTP) is a standard
Internet protocol for transmitting files between computers
on the Internet over TCP/IP connections.
 FTP is a client-server protocol that relies on two
communications channels between client and server: a
command channel for controlling the conversation and a
data channel for transmitting file content.
 Clients initiate conversations with servers by requesting to
download a file. Using FTP, a client can upload, download,
delete, rename, move and copy files on a server.
 A user typically needs to log on to the FTP server, although
some servers make some or all of their content available
without login, also known as anonymous FTP.
FTP sessions work in passive or active modes.
In active mode, after a client initiates a session
via a command channel request, the server
initiates a data connection back to the client and
begins transferring data.
 In passive mode, the server instead uses the
command channel to send the client the
information it needs to open a data channel.
Because passive mode has the client initiating all
connections, it works well across firewalls and
Network Address Translation (NAT) gateways.
Domain name system (dns) , TELNET ,FTP, TFTP
TRIVIAL FILE TRANSFER PROTOCOL
(TFTP)
Trivial File Transfer Protocol (TFTP) is an Internet
software utility for transferring files that is
simpler to use than the File Transfer Protocol
(FTP) but less capable.
 It is used where user authentication and
directory visibility are not required.
 TFTP uses the User Datagram Protocol (UDP)
rather than the Transmission Control Protocol
(TCP).
TFTP is described formally in Request for
Comments (RFC) 1350.

More Related Content

What's hot (20)

PPT
Data Link Layer| Error Detection
Taimoor Muzaffar Gondal
 
PPT
Application layer protocols
JUW Jinnah University for Women
 
PPT
Dns ppt
Mauood Hamidi
 
PPTX
Multiple access protocol
Merlin Florrence
 
PPTX
CCNA PPT
AIRTEL
 
PPTX
Simple Mail Transfer Protocol
Ujjayanta Bhaumik
 
PPTX
Csma cd and csma-ca
kazim Hussain
 
PPSX
Flow Control
selvakumar_b1985
 
PPTX
Media Access Control (MAC Layer)
Meenakshi Paul
 
PPTX
Routing algorithm
Bushra M
 
PPTX
TCP and UDP
Ramesh Giri
 
PPTX
Simple Mail Transfer Protocol
Rajan Pandey
 
PPTX
Domain name system (dns)
Atikur Rahman
 
PPT
Dns
Sanoj Kumar
 
PPTX
Telnet & Secure Shell
WILLA REYES
 
PPTX
Transport layer
reshmadayma
 
PPSX
TCP-IP Reference Model
Mukesh Tekwani
 
PPT
Smtp
Eri Alam
 
PPTX
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
PPT
Application Layer
ushabarad142
 
Data Link Layer| Error Detection
Taimoor Muzaffar Gondal
 
Application layer protocols
JUW Jinnah University for Women
 
Dns ppt
Mauood Hamidi
 
Multiple access protocol
Merlin Florrence
 
CCNA PPT
AIRTEL
 
Simple Mail Transfer Protocol
Ujjayanta Bhaumik
 
Csma cd and csma-ca
kazim Hussain
 
Flow Control
selvakumar_b1985
 
Media Access Control (MAC Layer)
Meenakshi Paul
 
Routing algorithm
Bushra M
 
TCP and UDP
Ramesh Giri
 
Simple Mail Transfer Protocol
Rajan Pandey
 
Domain name system (dns)
Atikur Rahman
 
Telnet & Secure Shell
WILLA REYES
 
Transport layer
reshmadayma
 
TCP-IP Reference Model
Mukesh Tekwani
 
Smtp
Eri Alam
 
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
Application Layer
ushabarad142
 

Similar to Domain name system (dns) , TELNET ,FTP, TFTP (20)

PDF
Unit 5 Applicationaaaaaaaaaaaa Layer.pdf
AdityaGupta221734
 
PPTX
System and network administration network services
Uc Man
 
PPTX
untitled_document.pptx
RuuSpy
 
PPTX
Unit 6 : Application Layer
Chandan Gupta Bhagat
 
PPTX
Unit 5 Applifffffffffffcation Layer.pptx
adityagupta285846
 
PPTX
Application layer
Sagar jethi
 
PPT
Lecture 4 -_internet_infrastructure_2_updated_2011
Serious_SamSoul
 
PPTX
OSI Application layer. tcp/ip application layer
artisticcc11
 
DOCX
Network Testing ques
Pragya Rastogi
 
PPTX
15 Application layer.pptx
MochamadSyaifulAnwar2
 
PPT
domain network services (dns)
Vikas Jagtap
 
PPTX
Data Communication Protocols all about software protocols
michaeljohndignos4
 
PPTX
Application layer
reshmadayma
 
PPTX
CSS Unit V Internet Infrastructure Security (1).pptx
AmitPandey69923
 
PPTX
Application layer
reshmadayma
 
PPTX
CN UNIT V.pptx
VISWANATHAN R V
 
PPTX
Web Programming HTML.pptx
MarwaAnany1
 
PDF
Application layer
Sisir Ghosh
 
PPTX
Computer Networking Application Layer - 02.pptx
sanawarali920
 
PDF
Understand DNS Propagation.pdf
SapnaParashar3
 
Unit 5 Applicationaaaaaaaaaaaa Layer.pdf
AdityaGupta221734
 
System and network administration network services
Uc Man
 
untitled_document.pptx
RuuSpy
 
Unit 6 : Application Layer
Chandan Gupta Bhagat
 
Unit 5 Applifffffffffffcation Layer.pptx
adityagupta285846
 
Application layer
Sagar jethi
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Serious_SamSoul
 
OSI Application layer. tcp/ip application layer
artisticcc11
 
Network Testing ques
Pragya Rastogi
 
15 Application layer.pptx
MochamadSyaifulAnwar2
 
domain network services (dns)
Vikas Jagtap
 
Data Communication Protocols all about software protocols
michaeljohndignos4
 
Application layer
reshmadayma
 
CSS Unit V Internet Infrastructure Security (1).pptx
AmitPandey69923
 
Application layer
reshmadayma
 
CN UNIT V.pptx
VISWANATHAN R V
 
Web Programming HTML.pptx
MarwaAnany1
 
Application layer
Sisir Ghosh
 
Computer Networking Application Layer - 02.pptx
sanawarali920
 
Understand DNS Propagation.pdf
SapnaParashar3
 
Ad

Recently uploaded (20)

PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PPTX
ETP Presentation(1000m3 Small ETP For Power Plant and industry
MD Azharul Islam
 
PPTX
Introduction to Fluid and Thermal Engineering
Avesahemad Husainy
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPTX
cybersecurityandthe importance of the that
JayachanduHNJc
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PPTX
quantum computing transition from classical mechanics.pptx
gvlbcy
 
PPTX
filteration _ pre.pptx 11111110001.pptx
awasthivaibhav825
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PDF
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
PDF
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
PDF
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
ETP Presentation(1000m3 Small ETP For Power Plant and industry
MD Azharul Islam
 
Introduction to Fluid and Thermal Engineering
Avesahemad Husainy
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
cybersecurityandthe importance of the that
JayachanduHNJc
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
quantum computing transition from classical mechanics.pptx
gvlbcy
 
filteration _ pre.pptx 11111110001.pptx
awasthivaibhav825
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
Ad

Domain name system (dns) , TELNET ,FTP, TFTP

  • 1. DOMAIN NAME SYSTEM (DNS)  The domain name system (DNS) is the way that internet domain names are located and translated into internet protocol (IP) addresses.  The domain name system maps the name people use to locate a website to the IP address that a computer uses to locate a website.  For example, if someone types facebook.com into a web browser, a server behind the scenes will map that name to the IP address 31.13.72.36.  Web browsing and most other internet activity depend on DNS to quickly provide the information necessary to connect users to remote hosts.  DNS mapping is distributed throughout the internet in a hierarchy of authority.  Access providers and enterprises, as well as governments, universities and other organizations, typically have their own assigned ranges of IP addresses and an assigned domain name; they also typically run DNS servers to manage the mapping of those names to those addresses.
  • 2. How does DNS work?  DNS servers answer questions from both inside and outside their own domains. When a server receives a request from outside the domain for information about a name or address inside the domain, it provides the authoritative answer. When a server receives a request from inside its own domain for information about a name or address outside that domain, it passes the request out to another server -- usually one managed by its internet service provider. If that server does not know the answer or the authoritative source for the answer, it will reach out to the DNS servers for the top-level domain -- e.g., for all of .com or .edu. Then, it will pass the request down to the authoritative server for the specific domain -- e.g., techtarget.com or stkate.edu; the answer flows back along the same path.
  • 3. How does DNS increase web performance?  To promote efficiency, servers can cache the answers they receive for a set amount of time. This allows them to respond more quickly the next time a request for the same lookup comes in.  For example, if everyone in an office needs to access the same training video on a particular website on the same day, the local DNS server will ordinarily only have to resolve the name once, and then it can serve all the other requests out of its cache.  The length of time the record is held -- the time to live -- is configurable; longer values decrease the load on servers, shorter values ensure the most accurate responses.
  • 5. What is Telnet?  Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else's computer remotely.  On the Web, HTTP and FTP protocols allow you to request specific files from remote computers, but not to actually be logged on as a user of that computer.  With Telnet, you log on as a regular user with whatever privileges you may have been granted to the specific application and data on that computer.
  • 6. A Telnet command request looks like this (the computer name is made-up): telnet the.libraryat.whatis.edu The result of this request would be an invitation to log on with a userid and a prompt for a password. If accepted, you would be logged on like any user who used this computer every day. Telnet is most likely to be used by program developers and anyone who has a need to use specific applications or data located at a particular host computer.
  • 7. File Transfer Protocol (FTP)  File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet over TCP/IP connections.  FTP is a client-server protocol that relies on two communications channels between client and server: a command channel for controlling the conversation and a data channel for transmitting file content.  Clients initiate conversations with servers by requesting to download a file. Using FTP, a client can upload, download, delete, rename, move and copy files on a server.  A user typically needs to log on to the FTP server, although some servers make some or all of their content available without login, also known as anonymous FTP.
  • 8. FTP sessions work in passive or active modes. In active mode, after a client initiates a session via a command channel request, the server initiates a data connection back to the client and begins transferring data.  In passive mode, the server instead uses the command channel to send the client the information it needs to open a data channel. Because passive mode has the client initiating all connections, it works well across firewalls and Network Address Translation (NAT) gateways.
  • 10. TRIVIAL FILE TRANSFER PROTOCOL (TFTP) Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.  It is used where user authentication and directory visibility are not required.  TFTP uses the User Datagram Protocol (UDP) rather than the Transmission Control Protocol (TCP). TFTP is described formally in Request for Comments (RFC) 1350.