0% found this document useful (0 votes)
131 views38 pages

Domain Name System: IT010 601computer Networks Dept. of Information Technology

The document discusses the Domain Name System (DNS), which maps domain names to IP addresses on the internet. DNS uses a hierarchical name space to organize domain names and distribute the mapping information across multiple DNS servers. At the top is the root server, which delegates authority for top-level domains to other servers. These servers can further delegate subdomains, creating a hierarchy that distributes the mapping information while ensuring unique domain names.

Uploaded by

Nicky Santhosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views38 pages

Domain Name System: IT010 601computer Networks Dept. of Information Technology

The document discusses the Domain Name System (DNS), which maps domain names to IP addresses on the internet. DNS uses a hierarchical name space to organize domain names and distribute the mapping information across multiple DNS servers. At the top is the root server, which delegates authority for top-level domains to other servers. These servers can further delegate subdomains, creating a hierarchy that distributes the mapping information while ensuring unique domain names.

Uploaded by

Nicky Santhosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

IT010 601COMPUTER NETWORKS Dept.

of Information Technology

MODULE 5
Domain Name System

There are several applications in the application layer of the Internet model that
follow the client/server paradigm. The client/server programs can be divided into
two categories: those that can be directly used by the user, such as e-mail, and
those that support other application programs. The Domain Name System (DNS) is
a supporting program that is used by other programs such as e-mail.DNS is a
system that can map a name to an address or an address to a name. When the
Internet was small, mapping was done by using a host file. The host file had only
two columns: name and address. Every host could store the host file on its disk and
update it periodically from a master host file. When a program or a user wanted to
map a name to an address, the host consulted the host file and found the mapping.
Today, however, it is impossible to have one single host file to relate every address
with a name and vice versa. The host file would be too large to store in every host.
In addition, it would be impossible to update all the host files every time there was a
change. One solution would be to store the entire host file in a single computer and
allow access to this centralized information to every computer that needs mapping.
But we know that this would create a huge amount of traffic on the Internet.
Another solution, the one used today, is to divide this huge amount of information
into smaller parts and store each part on a different computer. In this method, the
host that needs mapping can contact the closest computer holding the needed
information. This method is used by the Domain Name System (DNS).

NAME SPACE

To be unambiguous, the names assigned to machines must be carefully selected


from a name space with complete control over the binding between the names and
IP addresses. In other words, the names must be unique because the addresses are
unique. A name space that maps each address to a unique name can be organized
in two ways: fiat or hierarchical.

Flat Name Space

In a flat name space, a name is assigned to an address. A name in this space


is a sequence of characters without structure. The names may or may not have a
common section; if they do, it has no meaning. The main disadvantage of a fiat
name space is that it cannot be used in a large system such as the Internet because
it must be centrally controlled to avoid ambiguity and duplication.

Hierarchical Name Space

KMEA Engineering College, Cochin - 683 561 Page 1


IT010 601COMPUTER NETWORKS Dept. of Information Technology

In a hierarchical name space, each name is made of several parts. The first
part can define the nature of the organization, the second part can define the name
of an organization, and the third part can define departments in the organization,
and so on. In this case, the authority to assign and control the name spaces can be
decentralized. A central authority can assign the part of the name that defines the
nature of the organization and the name of the organization. The responsibility of
the rest of the name can be given to the organization itself. The organization can
add suffixes (or prefixes) to the name to define its host or resources. The
management of the organization need not worry that the prefix chosen for a host is
taken by another organization because, even if part of an address is the same, the
whole address is different. For example, assume two colleges and a company call
one of their computers challenger. The first college is given a name by the central
authority such as jhda.edu, the second college is given the name berkeley.edu, and
the company is given the name smart. com. When these organizations add the
name challenger to the name they have already been given, the end result is three
distinguishable names: challenger.jhda.edu, challenger.berkeley.edu, and
challenger.smart.com. The names are unique without the need for assignment by a
central authority. The central authority controls only part of the name, not the
whole.

DOMAIN NAME SPACE

Label

Each node in the tree has a label, which is a string with a maximum of 63
characters. The root label is a null string (empty string). DNS requires that children
of a node (nodes that branch from the same node) have different labels, which
guarantees the uniqueness of the domain names.

KMEA Engineering College, Cochin - 683 561 Page 2


IT010 601COMPUTER NETWORKS Dept. of Information Technology

Domain Name

Each node in the tree has a domain name. A full domain name is a sequence
of labels separated by dots (.). The domain names are always read from the node
up to the root. The last label is the label of the root (null). This means that a full
domain name always ends in a null label, which means the last character is a dot
because the null string is nothing. Figure shows some domain names.

Fully Qualified Domain Name

If a label is terminated by a null string, it is called a fully qualified domain


name (FQDN). An FQDN is a domain name that contains the full name of a host. It
contains all labels, from the most specific to the most general, that uniquely define
the name of the host. For example, the domain name

challenger.ate.tbda.edu. is the FQDN of a computer named challenger installed at


the Advanced Technology Center (ATC) at De Anza College. A DNS server can only
match an FQDN to an address. Note that the name must end with a null label, but
because null means nothing, the label ends with a dot (.).

Partially Qualified Domain Name

If a label is not terminated by a null string, it is called a partially qualified


domain name (PQDN). A PQDN starts from a node, but it does not reach the root. It
is used when the name to be resolved belongs to the same site as the client. Here
the resolver can supply the missing part, called the suffix, to create an FQDN. For
example, if a user at the jhda.edu. site wants to get the IP address of the challenger

KMEA Engineering College, Cochin - 683 561 Page 3


IT010 601COMPUTER NETWORKS Dept. of Information Technology

computer, he or she can define the partial name challenger. The DNS client adds
the suffix atc.jhda.edu. before passing the address to the DNS server. The DNS
client normally holds a list of suffixes. The following can be the list of suffixes at De
Anza College. The null suffix defines nothing. This suffix is added when the user
defines an FQDN.

atc.fhda.edu

fhda.edu

null

Domain

A domain is a subtree of the domain name space. The name of the domain is
the domain name of the node at the top of the subtree. Figure shows some
domains. Note that a domain may itselfbe divided into domains (or subdomains as
they are sometimes called).

KMEA Engineering College, Cochin - 683 561 Page 4


IT010 601COMPUTER NETWORKS Dept. of Information Technology

DISTRIBUTION OF NAME SPACE

The information contained in the domain name space must be stored.


However, it is very inefficient and also unreliable to have just one computer store
such a huge amount of information. It is inefficient because responding to requests
from all over the world places a heavy load on the system. It is not unreliable
because any failure makes the data inaccessible.

Hierarchy of Name Servers

The solution to these problems is to distribute the information among many


computers called DNS servers. One way to do this is to divide the whole space into
many domains based on the first level. In other words, we let the root stand alone
and create as many domains (subtrees) as there are first-level nodes. Because a
domain created in this way could be very large, DNS allows domains to be divided
further into smaller domains (subdomains). Each server can be responsible
(authoritative) for either a large or a small domain. In other words, we have a
hierarchy of servers in the same way that we have a hierarchy of names.

Zone

Since the complete domain name hierarchy cannot be stored on a single


server, it is divided among many servers. What a server is responsible for or has
authority over is called a zone. We can define a zone as a contiguous part of the
entire tree. If a server accepts responsibility for a domain and does not divide the
domain into smaller domains, the domain and the zone refer to the same thing. The
server makes a database called a zone file and keeps all the information for every
node under that domain. However, if a server divides its domain into subdomains
and delegates part of its authority to

KMEA Engineering College, Cochin - 683 561 Page 5


IT010 601COMPUTER NETWORKS Dept. of Information Technology

other servers, domain and zone refer to different things. The information about the
nodes in the subdomains is stored in the servers at the lower levels, with the
original server keeping some sort of reference to these lower-level servers. Of
course the original server does not free itself from responsibility totally: It still has a
zone, but the detailed information is kept by the lower-level servers.

A server can also divide part of its domain and delegate responsibility but still
keep part of the domain for itself. In this case, its zone is made of detailed
information for the part of the domain that is not delegated and references to those
parts that are delegated.

Root Server

A root server is a server whose zone consists of the whole tree. A root server
usually does not store any information about domains but delegates its authority to
other servers, keeping references to those servers. There are several root servers,
each covering the whole domain name space. The servers are distributed all around
the world.

Primary and Secondary Servers

DNS defines two types of servers: primary and secondary. A primary server is
a server that stores a file about the zone for which it is an authority. It is responsible
for creating, maintaining, and updating the zone file. It stores the zone file on a
local disk.

A secondary server is a server that transfers the complete information about


a zone from another server (primary or secondary) and stores the file on its local
disk. The secondary server neither creates nor updates the zone files. If updating is
required, it must be done by the primary server, which sends the updated version to
the secondary. The primary and secondary servers are both authoritative for the
zones they serve. The idea is not to put the secondary server at a lower level of
authority but to create redundancy for the data so that if one server fails, the other
can continue serving clients. Note also that a server can be a primary server for a
specific zone and a secondary server for another zone.

DNS IN THE INTERNET

KMEA Engineering College, Cochin - 683 561 Page 6


IT010 601COMPUTER NETWORKS Dept. of Information Technology

DNS is a protocol that can be used in different platforms. In the Internet, the
domain name space (tree) is divided into three different sections: generic domains,
country domains, and the inverse domain.

Generic Domains

The generic domains define registered hosts according to their generic


behaviour. Each node in the tree defines a domain, which is an index to the domain
name space database.

KMEA Engineering College, Cochin - 683 561 Page 7


IT010 601COMPUTER NETWORKS Dept. of Information Technology

Country Domains

The country domains section uses two-character country abbreviations (e.g.,


us for United States). Second labels can be organizational, or they can be more
specific, national designations. The United States, for example, uses state
abbreviations as a subdivision of us (e.g., ca.us.).

KMEA Engineering College, Cochin - 683 561 Page 8


IT010 601COMPUTER NETWORKS Dept. of Information Technology

Inverse Domain

The inverse domain is used to map an address to a name. This may happen,
for example, when a server has received a request from a client to do a task.
Although the server has a file that contains a list of authorized clients, only the IP
address of the client (extracted from the received IP packet) is listed. The server
asks its resolver to send a query to the DNS server to map an address to a name to
determine if the client is on the authorized list. This type of query is called an
inverse or pointer (PTR) query. To handle a pointer query, the inverse domain is
added to the domain name space with the first-level node called arpa (for historical
reasons). The second level is also one single node named in-addr (for inverse
address). The rest of the domain defines IP addresses. The servers that handle the
inverse domain are also hierarchical. This means the netid part of the address
should be at a higher level than the subnetid part, and the subnetid part higher
than the hostid part. In this way, a server serving the whole site is at a higher level
than the servers serving each subnet. This configuration makes the domain look
inverted when compared to a generic or country domain. To follow the convention
of reading the domain labels from the bottom to the top, an IP address such as
132.34.45.121 (a class B address with netid 132.34) is read as 121.45.34.132.in-
addr. arpa.

KMEA Engineering College, Cochin - 683 561 Page 9


IT010 601COMPUTER NETWORKS Dept. of Information Technology

RESOLUTION

Mapping a name to an address or an address to a name is called name-


address resolution.

Resolver

DNS is designed as a client/server application. A host that needs to map an


address to a name or a name to an address calls a DNS client called a resolver. The
resolver accesses the closest DNS server with a mapping request. If the server has
the information, it satisfies the resolver; otherwise, it either refers the resolver to
other servers or asks other servers to provide the information. After the resolver
receives the mapping, it interprets the response to see if it is a real resolution or an
error, and finally delivers the result to the process that requested it.

Mapping Names to Addresses

Most of the time, the resolver gives a domain name to the server and asks for
the corresponding address. In this case, the server checks the generic domains or
the country domains to find the mapping. If the domain name is from the generic
domains section, the resolver receives a domain name such as "chal.atc.jhda.edu.".
The query is sent by the resolver to the local DNS server for resolution. If the local
server cannot resolve the query, it either refers the resolver to other servers or asks
other servers directly. If the domain name is from the country domains section, the
resolver receives a domain name such as "ch.jhda.cu.ca.us.". The procedure is the
same.

Mapping Addresses to Names

KMEA Engineering College, Cochin - 683 561 Page 10


IT010 601COMPUTER NETWORKS Dept. of Information Technology

A client can send an IP address to a server to be mapped to a domain name.


As mentioned before, this is called a PTR query. To answer queries of this kind, DNS
uses the inverse domain. However, in the request, the IP address is reversed and
the two labels in-addr and arpa are appended to create a domain acceptable by the
inverse domain section. For example, if the resolver receives the IF address
132.34.45.121, the resolver first inverts the address and then adds the two labels
before sending. The domain name sent is "121.45.34.132.in-addr.arpa." which is
received by the local DNS and resolved.

Recursive Resolution

The client (resolver) can ask for a recursive answer from a name server. This
means that the resolver expects the server to supply the final answer. If the server
is the authority for the domain name, it checks its database and responds. If the
server is not the authority, it sends the request to another server (the parent
usually) and waits for the response. If the parent is the authority, it responds;
otherwise, it sends the query to yet another server. When the query is finally
resolved, the response travels back until it finally reaches the requesting client. This
is called recursive resolution

Iterative Resolution

If the client does not ask for a recursive answer, the mapping can be done
iteratively. If the server is an authority for the name, it sends the answer. If it is not,
it returns (to the client) the IP address of the server that it thinks can resolve the
query. The client is responsible for repeating the query to this second server. If the
newly addressed server can resolve the problem, it answers the query with the IP

KMEA Engineering College, Cochin - 683 561 Page 11


IT010 601COMPUTER NETWORKS Dept. of Information Technology

address; otherwise, it returns the IP address of a new server to the client. Now the
client must repeat the query to the third server. This process is called iterative
resolution because the client repeats the same query to multiple servers.

Caching

Each time a server receives a query for a name that is not in its domain, it
needs to search its database for a server IP address. Reduction of this search time
would increase efficiency. DNS handles this with a mechanism called caching. When
a server asks for a mapping from another server and receives the response, it
stores this information in its cache memory before sending it to the client. If the
same or another client asks for the same mapping, it can check its cache memory
and solve the problem. However, to inform the client that the response is coming
from the cache memory and not from an authoritative source, the server marks the
response as unauthoritative. Caching speeds up resolution, but it can also be
problematic. If a server caches a mapping for a long time, it may send an outdated
mapping to the client.

To counter this, two techniques are used. First, the authoritative server
always adds information to the mapping called time-to-live (TTL). It defines the time
in seconds that the receiving server can cache the information. After that time, the
mapping is invalid and any query must be sent again to the authoritative server.
Second, DNS requires that each server keep a TTL counter for each mapping it
caches. The cache memory must be searched periodically, and those mappings with
an expired TTL must be purged.

ELECTRONIC MAIL

One of the most popular Internet services is electronic mail (e-mail). The
designers of the Internet probably never imagined the popularity of this application

KMEA Engineering College, Cochin - 683 561 Page 12


IT010 601COMPUTER NETWORKS Dept. of Information Technology

program. Its architecture consists of several components that we discuss in this


chapter. At the beginning of the Internet era, the messages sent by electronic mail
were short and consisted of text only; they let people exchange quick memos.
Today, electronic mail is much more complex. It allows a message to include text,
audio, and video. It also allows one message to be sent to one or more recipients.
The general architecture of an e-mail system including the three main components:
user agent, message transfer agent, and message access agent.

To explain the architecture of e-mail, we give four scenarios. We begin with


the simplest situation and add complexity as we proceed. The fourth scenario is the
most common in the exchange of email.

First Scenario

In the first scenario, the sender and the receiver of the e-mail are users (or
application programs) on the same system; they are directly connected to a shared
system. The administrator has created one mailbox for each user where the
received messages are stored. A mailbox is part of a local hard drive, a special file
with permission restrictions. Only the owner of the mailbox has access to it. When
Alice, a user, needs to send a message to Bob, another user, Alice runs a user agent
(UA) program to prepare the message and store it in Bob's mailbox. The message
has the sender and recipient mailbox addresses (names of files). Bob can retrieve
and read the contents of his mailbox at his convenience, using a user agent. Figure
shows the concept.

This is similar to the traditional memo exchange between employees in an


office. There is a mailroom where each employee has a mailbox with his or her
name on it. When Alice needs to send a memo to Bob, she writes the memo and
inserts it into Bob's mailbox. When Bob checks his mailbox, he finds Alice's memo
and reads it.

Second Scenario

In the second scenario, the sender and the receiver of the e-mail are users
(or application programs) on two different systems.The message needs to be sent

KMEA Engineering College, Cochin - 683 561 Page 13


IT010 601COMPUTER NETWORKS Dept. of Information Technology

over the Internet. Here we need user agents (UAs) and message transfer agents
(MTAs), Alice needs to use a user agent program to send her message to the
system at her own site. The system (sometimes called the mail server) at her site
uses a queue to store messages waiting to be sent. Bob also needs a user agent
program to retrieve messages stored in the mailbox of the system at his site. The
message, however, needs to be sent through the Internet from Alice's site to Bob's
site. Here two message transfer agents are needed: one 'client and one server. Like
most client/server programs on the Internet, the server needs to run all the time
because it does not know when a client will ask for a connection. The client, on the
other hand, can be alerted by the system when there is a message in the queue to
be sent.

Third Scenario

In the third scenario, Bob, as in the second scenario, is directly connected to


his system. Alice, however, is separated from her system. Either Alice is connected
to the system via a point-to-point WAN, such as a dial-up modem, a DSL, or a cable
modem; or she is connected to a LAN in an organization that uses one mail server
for handling e-mails-all users need to send their messages to this mail server.

KMEA Engineering College, Cochin - 683 561 Page 14


IT010 601COMPUTER NETWORKS Dept. of Information Technology

Alice still needs a user agent to prepare her message. She then needs to send the
message through the LAN or WAN. This can be done through a pair of message
transfer agents (client and server). Whenever Alice has a message to send, she calls
the user agent which, in tum, calls the MTA client. The MTA client establishes a
connection with the MTA server on the system, which is running all the time. The
system at Alice's site queues all messages received. It then uses an MTA client to
send the messages to the system at Bob's site; the system receives the message
and stores it in Bob's mailbox.

At his convenience, Bob uses his user agent to retrieve the message and reads it.
Note that we need two pairs of MTA client/server programs.

Fourth Scenario

In the fourth and most common scenario, Bob is also connected to his mail
server by a WAN or a LAN. After the message has arrived at Bob's mail server, Bob
needs to retrieve it. Here, we need another set of client/server agents, which we call
message access agents (MAAs). Bob uses an MAA client to retrieve his messages.
The client sends a request to the MAA server, which is running all the time, and
requests the transfer of the messages.

There are two important points here. First, Bob cannot bypass the mail server and
use the MTA server directly. To use MTA server directly, Bob would need to run the
MTA server all the time because he does not know when a message will arrive. This
implies that Bob must keep his computer on all the time if he is connected to his
system through a LAN. If he is connected through a-WAN, he must keep the
connection up all the time. Neither of these situations is feasible today. Second,
note that Bob needs another pair of client/server programs: message access

KMEA Engineering College, Cochin - 683 561 Page 15


IT010 601COMPUTER NETWORKS Dept. of Information Technology

programs. This is so because an MTA client/server program is a push program: the


client pushes the message to the server. Bob needs a pull program. The client
needs to pull the message from the server.

User Agent

The first component of an electronic mail system is the user agent (UA). It
provides service to the user to make the process of sending and receiving a
message easier.

Services Provided by a User Agent

A user agent is a software package (program) that composes, reads, replies


to, and forwards messages. It also handles mailboxes.

Composing Messages -A user agent helps the user compose the e-mail message to
be sent out. Most user agents provide a template on the screen to be filled in by the

KMEA Engineering College, Cochin - 683 561 Page 16


IT010 601COMPUTER NETWORKS Dept. of Information Technology

user. Some even have a built-in editor that can do spell checking, grammar
checking, and other tasks expected from a sophisticated word processor. A user, of
course, could alternatively use his or her favourite text editor or word processor to
create the message and import it, or cut and paste it, into the user agent template.

Reading Messages- The second duty of the user agent is to read the incoming
messages. When a user invokes a user agent, it first checks the mail in the
incoming mailbox. Most user agents show a one-line summary of each received
mail. Each e-mail contains the following fields.

1. A number field.
2. A flag field that shows the status of the mail such as new, already read but
not replied to, or read and replied to.
3. The size of the message.
4. The sender.
5. The optional subject field.

Replying to Messages -After reading a message, a user can use the user agent to
reply to a message. A user agent usually allows the user to reply to the original
sender or to reply to all recipients of the message. The reply message may contain
the original message (for quick reference) and the new message.

Forwarding Messages -Replying is defined as sending a message to the sender or


recipients of the copy. Forwarding is defined as sending the message to a third
party. A user agent allows the receiver to forward the message, with or without
extra comments, to a third party.

Handling Mailboxes- A user agent normally creates two mailboxes: an inbox and an
outbox. Each box is a file with a special format that can be handled by the user
agent. The inbox keeps all the received e-mails until they are deleted by the user.
The outbox keeps all the sent e-mails until the user deletes them. Most user agents
today are capable of creating customized mailboxes.

User Agent Types

There are two types of user agents: command-driven and GUI-based.


Command-Driven Command-driven user agents belong to the early days of
electronic mail. They are still present as the underlying user agents in servers. A
command-driven user agent normally accepts a one-character command from the
keyboard to perform its task. For example, a user can type the character r, at the
command prompt, to reply to the sender of the message, or type the character R to
reply to the sender and all recipients. Some examples of command-driven user
agents are mail, pine, and elm. GUI-Based Modem user agents are GUI-based. They
contain graphical-user interface (GUI) components that allow the user to interact
with the software by using both the keyboard and the mouse. They have graphical
components such as icons, menu bars, and windows that make the services easy to

KMEA Engineering College, Cochin - 683 561 Page 17


IT010 601COMPUTER NETWORKS Dept. of Information Technology

access. Some examples of GUI-based user agents are Eudora, Microsoft's Outlook,
and Netscape.

Sending Mail

To send mail, the user, through the UA, creates mail that looks very similar to
postal mail. It has an envelope and a message.

Envelope -The envelope usually contains the sender and the receiver addresses.
Message The message contains the header and the body. The header of the
message defines the sender, the receiver, the subject of the message, and some
other information (such as encoding type). The body of the message contains the
actual information to be read by the recipient.

Receiving Mail

The user agent is triggered by the user (or a timer). If a user has mail, the UA
informs the user with a notice. If the user is ready to read the mail,a list is displayed
in which each line contains a summary of the information about a particular
message in the mailbox. The summary usually includes the sender mail address,
the subject, and the time the mail was sent or received. The user can select any of
the messages and display its contents on the screen.

Addresses

KMEA Engineering College, Cochin - 683 561 Page 18


IT010 601COMPUTER NETWORKS Dept. of Information Technology

To deliver mail, a mail handling system must use an addressing system with
unique addresses. In the Internet, the address consists of two parts: a local part and
a domain name, separated by an @ sign

Local Part- The local part defines the name of a special file, called the user
mailbox, where all the mail received for a user is stored for retrieval by the message
access agent.

Domain Name- The second part of the address is the domain name. An
organization usually selects one or more hosts to receive and send e-mail; the hosts
are sometimes called mail servers or exchangers. The domain name assigned to
each mail exchanger either comes from the DNS database or is a logical name (for
example, the name of the organization).

Mailing List

Electronic mail allows one name, an alias, to represent several different e-


mail addresses; this is called a mailing list. Every time a message is to be sent, the
system checks the recipient's name against the alias database; if there is a mailing
list for the defined alias, separate messages, one for each entry in the list, must be
prepared and handed to the MTA. If there is no mailing list for the alias, the name
itself is the receiving address and a single message is delivered to the mail transfer
entity.

MIME

Electronic mail has a simple structure. Its simplicity, however, comes at a


price. It can send messages only in NVT 7-bit ASCII format. In other words, it has
some limitations. For example, it cannot be used for languages that are not
supported by 7-bit ASCII characters (such as French, German, Hebrew, Russian,
Chinese, and Japanese). Also, it cannot be used to send binary files or video or
audio data. Multipurpose Internet Mail Extensions (MIME) is a supplementary
protocol that

allows non-ASCII data to be sent through e-mail. MIME transforms non-ASCII data at
the sender site to NVT ASCII data and delivers them to the client MTA to be sent

KMEA Engineering College, Cochin - 683 561 Page 19


IT010 601COMPUTER NETWORKS Dept. of Information Technology

through the Internet. The message at the receiving side is transformed back to the
original data. MIME can be a set of software functions that transforms non-ASCII
data (stream of bits) to ASCII data and vice versa.

MIME defines five headers that can be added to the original e-mail header section to
define the transformation parameters:

1. MIME-Version

2. Content-Type

3. Content-Transfer-Encoding

4. Content-Id

5. Content-Description

KMEA Engineering College, Cochin - 683 561 Page 20


IT010 601COMPUTER NETWORKS Dept. of Information Technology

• MIME-Version -This header defines the version of MIME used. The current
version is 1.1.

• Content-Type - This header defines the type of data used in the body of the
message. The content type and the content subtype are separated by a
slash. Depending on the subtype, the header may contain other parameters.

• Content-Transfer-Encoding - This header defines the method used to encode


the messages into Os and 1s for transport.

• Content-Id - This header uniquely identifies the whole message in a multiple-


message environment.

• Content-Description -This header defines whether the body is image, audio,


or video.
Message Transfer Agent: SMTP

The actual mail transfer is done through message transfer agents. To send
mail, a system must have the client MTA, and to receive mail, a system must have a
server MTA. The formal protocol that defines the MTA client and server in the
Internet is called the Simple Mail Transfer Protocol (SMTP). As we said before, two
pairs of MTA client/server programs are used in the most common situation (fourth
scenario).

SMTP is used two times, between the sender and the sender's mail server and
between the two mail servers. Another protocol is needed between the mail server

KMEA Engineering College, Cochin - 683 561 Page 21


IT010 601COMPUTER NETWORKS Dept. of Information Technology

and the receiver. SMTP simply defines how commands and responses must be sent
back and forth. Each network is free to choose a software package for
implementation.

Commands and Responses

SMTP uses commands and responses to transfer messages between an MTA


client and an MTA server.

Each command or reply is terminated by a two-character (carriage return and line


feed) end-of-line token.

Commands -Commands are sent from the client to the server. The format of a
command is shown in Figure. It consists of a keyword followed by zero or more
arguments. SMTP defines 14 commands. The first five are mandatory; every
implementation must support these five commands. The next three are often used
and highly recommended. The last six are seldom used.

Responses -Responses are sent from the server to the client. A response is a three
digit code that may be followed by additional textual information. Table lists some
of the responses.

KMEA Engineering College, Cochin - 683 561 Page 22


IT010 601COMPUTER NETWORKS Dept. of Information Technology

Mail Transfer Phases

The process of transferring a mail message occurs in three phases:


connection establishment, mail transfer, and connection termination.

Message Access Agent: POP and IMAP

The first and the second stages of mail delivery use SMTP. However, SMTP is
not involved in the third stage because SMTP is a push protocol; it pushes the

KMEA Engineering College, Cochin - 683 561 Page 23


IT010 601COMPUTER NETWORKS Dept. of Information Technology

message from the client to the erver. In other words, the direction of the bulk: data
(messages) is from the client to the server. On the other hand, the third stage
needs a pull protocol; the client must pull messages from the server. The direction
of the bulk data is from the server to the client. The third stage uses a message
access agent.

Currently two message access protocols are available: Post Office Protocol, version
3 (POP3) and Internet Mail Access Protocol, version 4 (IMAP4).

POP3

Post Office Protocol, version 3 (POP3) is simple and limited in functionality.


The client POP3 software is installed on the recipient computer; the server POP3
software is installed on the mail server. Mail access starts with the client when the
user needs to download e-mail from the mailbox on the mail server. The client
opens a connection to the server on TCP port 110. It then sends its user name and
password to access the mailbox. The user can then list and retrieve the mail
messages, one by one. Figure shows an example of downloading using POP3. POP3
has two modes: the delete mode and the keep mode. In the delete mode, the mail
is deleted from the mailbox after each retrieval. In the keep mode, the mail remains
in the mailbox after retrieval. The delete mode is normally used when the user is
working at her permanent computer and can save and organize the received mail
after reading or replying. The keep mode is normally used when the user accesses
her mail away from her primary computer (e.g., a laptop). The mail is read but kept
in the system for later retrieval and organizing.

IMAP4

Another mail access protocol is Internet Mail Access Protocol, version 4


(IMAP4). IMAP4 is similar to POP3, but it has more features; IMAP4 is more powerful
and more complex. POP3 is deficient in several ways. It does not allow the user to

KMEA Engineering College, Cochin - 683 561 Page 24


IT010 601COMPUTER NETWORKS Dept. of Information Technology

organize her mail on the server; the user cannot have different folders on the
server. (Of course, the user can create folders on her own computer.) In addition,
POP3 does not allow the user to partially check the contents of the mail before
downloading.

IMAP4 provides the following extra functions:

• A user can check the e-mail header prior to downloading.


• A user can search the contents of the e-mail for a specific string of characters
prior to downloading.
• A user can partially download e-mail. This is especially useful if bandwidth is
limited and the e-mail contains multimedia with high bandwidth
requirements.
• A user can create, delete, or rename mailboxes on the mail server.
• A user can create a hierarchy of mailboxes in a folder for e-mail storage.

Web-Based Mail

E-mail is such a common application that some websites today provide this
service to anyone who accesses the site. Two common sites are Hotmail and Yahoo.
The idea is very simple. Mail transfer from Alice's browser to her mail server is done
through HTTP. The transfer of the message from the sending mail server to the
receiving mail server is still through SMTP. Finally, the message from the receiving
server (the Web server) to Bob's browser is done through HTTP. The last phase is
very interesting. Instead of POP3 or IMAP4, HTTP is normally used. When Bob needs
to retrieve his e-mails, he sends a message to the website (Hotmail, for example).
The website sends a form to be filled in by Bob, which includes the log-in name and
the password. If the log-in name and password match, the e-mail is transferred from
the Web server to Bob's browser in HTML format.

MOBILE TELEPHONE SYSTEMS

Evolution of mobile telephone systems


Cellular is one of the fastest growing and most demanding
telecommunications applications. Today, it represents a continuously increasing
percentage of all new telephone subscriptions around the world. Currently there are
more than 45 million cellular subscribers worldwide, and nearly 50 percent of those
subscribers are located in the United States. It is forecasted that cellular systems
using a digital technology will become the universal method of telecommunications.

The concept of cellular service is the use of low-power transmitters where


frequencies can be reused within a geographic area. The idea of cell-based mobile

KMEA Engineering College, Cochin - 683 561 Page 25


IT010 601COMPUTER NETWORKS Dept. of Information Technology

radio service was formulated in the United States at Bell Labs in the early 1970s.
However, the Nordic countries were the first to introduce cellular services for
commercial use with the introduction of the Nordic Mobile Telephone (NMT) in 1981.

Cellular systems began in the United States with the release of the advanced mobile
phone service (AMPS) system in 1983. The AMPS standard was adopted by Asia,
Latin America, and Oceanic countries, creating the largest potential market in the
world for cellular.

In the early 1980s, most mobile telephone systems were analog rather than digital,
like today's newer systems. One challenge facing analog systems was the inability
to handle the growing capacity needs in a cost-efficient manner. As a result, digital
technology was welcomed. The advantages of digital systems over analog systems
include ease of signaling, lower levels of interference, integration of transmission
and switching, and increased ability to meet capacity demands.

Global System for Mobile Communication (GSM)

Throughout the evolution of cellular telecommunications, various systems have


been developed without the benefit of standardized specifications. This presented
many problems directly related to compatibility, especially with the development of
digital radio technology. The GSM standard is intended to address these problems.

From 1982 to 1985 discussions were held to decide between building an analog or
digital system. After multiple field tests, a digital system was adopted for GSM. The
next task was to decide between a narrow or broadband solution. In May 1987, the
narrowband time division multiple access (TDMA) solution was chosen.

The GSM Network

GSM provides recommendations, not requirements. The GSM specifications define


the functions and interface requirements in detail but do not address the hardware.
The reason for this is to limit the designers as little as possible but still to make it
possible for the operators to buy equipment from different suppliers. The GSM
network is divided into three major systems: the switching system (SS), the base
station system (BSS), and the operation and support system (OSS).

KMEA Engineering College, Cochin - 683 561 Page 26


IT010 601COMPUTER NETWORKS Dept. of Information Technology

The basic GSM network is given below.

The Switching System


The switching system (SS) is responsible for performing call processing and
subscriber-related functions. The switching system includes the following functional
units.

Home Location Register (HLR)—The HLR is a database used for storage and
management of subscriptions. The HLR is considered the most important database,
as it stores permanent data about subscribers, including a subscriber's service
profile, location information, and activity status. When an individual buys a
subscription from one of the PCS operators, he or she is registered in the HLR of
that operator.

Mobile Services Switching Center (MSC)—The MSC performs the telephony


switching functions of the system. It controls calls to and from other telephone and
data systems. It also performs such functions as toll ticketing, network interfacing,
common channel signaling, and others.

Visitor Location Register (VLR)—The VLR is a database that contains temporary


information about subscribers that is needed by the MSC in order to service visiting
subscribers. The VLR is always integrated with the MSC. When a mobile station

KMEA Engineering College, Cochin - 683 561 Page 27


IT010 601COMPUTER NETWORKS Dept. of Information Technology

roams into a new MSC area, the VLR connected to that MSC will request data about
the mobile station from the HLR. Later, if the mobile station makes a call, the VLR
will have the information needed for call setup without having to interrogate the
HLR each time.

Authentication Center (AUC)—A unit called the AUC provides authentication and
encryption parameters that verify the user's identity and ensure the confidentiality
of each call. The AUC protects network operators from different types of fraud found
in today's cellular world.

Equipment Identity Register (EIR)—The EIR is a database that contains information


about the identity of mobile equipment that prevents calls from stolen,
unauthorized, or defective mobile stations. The AUC and EIR are implemented as
stand-alone nodes or as a combined AUC/EIR node.

The Base Station System (BSS)

All radio-related functions are performed in the BSS, which consists of base station
controllers (BSCs) and the base transceiver stations (BTSs).

BSC—The BSC provides all the control functions and physical links between the
MSC and BTS. It is a high-capacity switch that provides functions such as handover,
cell configuration data, and control of radio frequency (RF) power levels in base
transceiver stations. A number of BSCs are served by an MSC.

BTS—The BTS handles the radio interface to the mobile station. The BTS is the
radio equipment (transceivers and antennas) needed to service each cell in the
network. A group of BTSs are controlled by a BSC.

The Operation and Support System


The operations and maintenance center (OMC) is connected to all equipment in the
switching system and to the BSC. The implementation of OMC is called the
operation and support system (OSS). The OSS is the functional entity from which
the network operator monitors and controls the system. The purpose of OSS is to
offer the customer cost-effective support for centralized, regional and local
operational and maintenance activities that are required for a GSM network. An

KMEA Engineering College, Cochin - 683 561 Page 28


IT010 601COMPUTER NETWORKS Dept. of Information Technology

important function of OSS is to provide a network overview and support the


maintenance activities of different operation and maintenance organizations.

• Message Center (MXE)—The MXE is a node that provides integrated voice,


fax, and data messaging. Specifically, the MXE handles short message
service, cell broadcast, voice mail, fax mail, e-mail, and notification.
• Mobile Service Node (MSN)—The MSN is the node that handles the mobile
intelligent network (IN) services.
• Gateway Mobile Services Switching Center (GMSC)—A gateway is a
node used to interconnect two networks. The gateway is often implemented
in an MSC. The MSC is then referred to as the GMSC.
• GSM Interworking Unit (GIWU)—The GIWU consists of both hardware and
software that provides an interface to various networks for data
communications. Through the GIWU, users can alternate between speech and
data during the same call. The GIWU hardware equipment is physically
located at the MSC/VLR.

Bluetooth(IEEE 802.15)

• Bluetooth is a global standard for wireless connectivity.

• Bluetooth technology facilitates the replacement of the cables used to


connect one device to another,

• It uses short-range radio link operating in the unlicensed 2.45 GHz ISM
band.

Objectives of Bluetooth technology

– Cable replacement

– Small size

– Low cost

– Low power

Bluetooth Architecture

KMEA Engineering College, Cochin - 683 561 Page 29


IT010 601COMPUTER NETWORKS Dept. of Information Technology

• The basic unit of a Bluetooth system is a piconet, which consists of a


master node and up to seven active slave nodes within a distance of
10 meters.

• Multiple piconets can exist in the same (large) room and can even be
connected via a bridge node.

• An interconnected collection of piconets is called a scatternet.

• In addition to the seven active slave nodes in a piconet, there can be


up to 255 parked nodes in the net.

• These are devices that the master has switched to a low-power state to
reduce the drain on their batteries.

• In parked state, a device cannot do anything except respond to an


activation or beacon signal from the master.

• There are also two intermediate power states, hold and sniff.

KMEA Engineering College, Cochin - 683 561 Page 30


IT010 601COMPUTER NETWORKS Dept. of Information Technology

• The consequence of this decision is that the slaves are fairly dumb,
basically just doing whatever the master tells them to do.

• A piconet is a centralized TDM system, with the master controlling the


clock and determining which device gets to communicate in which
time slot.

• All communication is between the master and a slave; direct slave-


slave communication is not possible.

Bluetooth Applications

The Bluetooth Protocol Stack

KMEA Engineering College, Cochin - 683 561 Page 31


IT010 601COMPUTER NETWORKS Dept. of Information Technology

• The bottom layer is the physical radio layer, It deals with radio
transmission and modulation.

• The baseband layer is somewhat analogous to the MAC sub layer but
also includes elements of the physical layer.

• It deals with how the master controls time slots and how these slots
are grouped into frames.

• The link manager handles the establishment of logical channels


between devices, including power management, authentication, and
quality of service.

• The logical link control adaptation protocol (often called L2CAP)


shields the upper layers from the details of transmission.

• The audio and control protocols deal with audio and control,
respectively.

• The middleware layer, which contains a mix of different protocols.

• RFcomm (Radio Frequency communication) is the protocol that


emulates the standard serial port found on PCs for connecting the
keyboard, mouse, and modem, among other devices. It has been
designed to allow legacy devices to use it easily.

• The telephony protocol is a real-time protocol used for the three


speech-oriented profiles. It also manages call setup and termination.

• The service discovery protocol is used to locate services within the


network.

KMEA Engineering College, Cochin - 683 561 Page 32


IT010 601COMPUTER NETWORKS Dept. of Information Technology

• The top layer is where the applications and profiles are located.
They make use of the protocols in lower layers to get their work done.
Each application has its own dedicated subset of the protocols.

Bluetooth Radio:

• The radio layer moves the bits from master to slave, or vice versa.

• It is a low-power system with a range of 10 meters operating in the


2.4-GHz ISM band.

• The band is divided into 79 channels of 1 MHz each.

• To allocate the channels fairly, frequency hopping spread spectrum is


used.

• All the nodes in a piconet hop simultaneously, with the master


dictating the hop sequence.

The baseband layer :

• It turns the raw bit stream into frames and defines some key formats.

• The master in each piconet defines a series of 625 μsec time slots,
with the master's transmissions starting in the even slots and the
slaves' transmissions starting in the odd ones.

• This is traditional time division multiplexing, with the master getting


half the slots and the slaves sharing the other half.

• Frames can be 1, 3, or 5 slots long.

• Each frame is transmitted over a logical channel, called a link,


between the master and a slave.

• Two kinds of links exist.

• ACL (Asynchronous Connection-Less) link, which is used for


packet-switched data available at irregular intervals.

• These data come from the L2CAP layer on the sending side and
are delivered to the L2CAP layer on the receiving side.

• ACL traffic is delivered on a best-efforts basis.

• No guarantees are given.

KMEA Engineering College, Cochin - 683 561 Page 33


IT010 601COMPUTER NETWORKS Dept. of Information Technology

• Frames can be lost and may have to be retransmitted.

• A slave may have only one ACL link to its master.

• SCO (Synchronous Connection Oriented) link, for real-time


data, such as telephone connections.

• This type of channel is allocated a fixed slot in each direction.

• Due to the time-critical nature of SCO links, frames sent over


them are never retransmitted.

• Instead,forward error correction can be used to provide high


reliability.

• A slave may have up to three SCO links with its master.

• Each SCO link can transmit one 64,000 bps PCM audio channel.

Bluetooth L2CAP Layer

• The L2CAP layer has three major functions.

• First, it accepts packets of up to 64 KB from the upper layers and


breaks them into frames for transmission.

• At the far end, the frames are reassembled into packets again.

• Second, it handles the multiplexing and demultiplexing of multiple


packet sources.

• When a packet has been reassembled, the L2CAP layer determines


which upper-layer protocol to hand it to, for example, RFcomm or
telephony.

• Third, L2CAP handles the quality of service requirements, both when


links are established and during normal operation.

• Also negotiated at setup time is the maximum payload size allowed, to


prevent a large-packet device from drowning a small-packet device.

• This feature is needed because not all devices can handle the 64-KB
maximum packet.

KMEA Engineering College, Cochin - 683 561 Page 34


IT010 601COMPUTER NETWORKS Dept. of Information Technology

The Bluetooth Frame Structure

• access code - identifies the master so that slaves within radio range of
two masters can tell which traffic is for them.

• 54-bit header- containing typical MAC sublayer fields.

• data field- of up to 2744 bits (for a five-slot transmission).

• For a single time slot, the format is the same except that the data field
is 240 bits

• The Address field, identifies which of the eight active devices the
frame is intended for.

• The Type field ,identifies the frame type (ACL, SCO, poll, or null), the
type of error correction used in the data field, and how many slots long
the frame is.

• The Flow bit, is asserted by a slave when its buffer is full and cannot
receive any more data. This is a primitive form of flow control.

• The Acknowledgement bit, is used to piggyback an ACK onto a


frame.

• The Sequence bit, is used to number the frames to detect


retransmissions. The protocol is stop-and-wait, so 1 bit is enough.

• Then comes the 8-bit header Checksum.

KMEA Engineering College, Cochin - 683 561 Page 35


IT010 601COMPUTER NETWORKS Dept. of Information Technology

• The entire 18-bit header is repeated three times to form the 54-bit
header.

• On the receiving side, a simple circuit examines all three copies of


each bit.

• If all three are the same, the bit is accepted.

• Then comes the 8-bit header Checksum.

• The entire 18-bit header is repeated three times to form the 54-bit
header.

• On the receiving side, a simple circuit examines all three copies of


each bit.

• If all three are the same, the bit is accepted.

BLUETOOTH COMMUNICATION

Bluetooth is a specification for a small form-factor, low-cost, short-range radio solution


for providing links between mobile computers, mobile phones, and other portable and hand-
held devices, and for providing connectivity to the internet. It is based on a radio link that
provides fast and reliable transmission of both voice and data. It can carry up to three high-
quality voice channels simultaneously at speeds to 1 Mbit/sec, even in noisy environments.
Like USB, the specification incorporates both rules for implementing the interface and rules
for designing compatible peripherals for the network

Bluetooth allows users to connect to a wide range of devices at one time without cables,
and potentially without actively initiating the connection. For example, your PDA could
automatically update a copy of your schedule stored on a desktop PC the minute you walked
into your office. This connectivity is enabled by a tiny microchip incorporating a radio
transceiver that is built into Bluetooth devices. This radio transceiver provides the advantage
of being effective through obstacles. Thus, you could ostensibly use a Bluetooth connection
to send data from a computer in one room to a printer in the next--right through the wall.

KMEA Engineering College, Cochin - 683 561 Page 36


IT010 601COMPUTER NETWORKS Dept. of Information Technology

One concern when using such a system is privacy. As Bluetooth operates in the globally
available 2.4 GHz frequency, it is conceivable that an unintended recipient could intercept a
signal. To combat this, all Bluetooth devices are keyed for their own networks. The
transmissions use a sophisticated encoding specification that not only guards against
interference, it also ensures that only devices specifically programmed to receive a broadcast
will be able to decode it.

Bluetooth uses a flexible, multiple piconet structure for communication. It supports both
point-to-point and multipoint connections for full-duplex networks. Currently up to seven
slave devices can be configured to use a master radio in one device. Several of the piconets
can be established and linked in scatternets to allow flexibility among configurations.
Devices in the same piconet have priority synchronizations, but other devices can enter the
network at any time. In a full-duplex network, a multiple piconet structure with 10 fully
loaded, independent piconets, can maintain aggregate data transfer speeds of up to 6 Mbps.

Class 1 and Class 2 Bluetooth

The major difference between the 2 classes of Bluetooth adapter is communication range and
power requirements. As a rule, you will typically trade power consumption for distance
(though all Bluetooth devices typically have low power requirements relative to other types
of computer add-in devices.) Class 2 Bluetooth devices have a communication range of 10
meters (30 feet), and Class 1 adapters provide a communication range of 100 meters (300
feet).

High and Low Power

The Bluetooth specification implements two power levels: a low power level designed for
short distance communication such as within an office (Class 2), and a high power level that
can accommodate a medium range, such as an entire building (Class 1). Additionally,
Bluetooth limits power output to exactly what the device requires at any given time. For
instance, when two devices connect and determine that they are close together, the
transmitter immediately modifies its signal to the strength needed to accommodate that
range. When traffic volume across a connection slows down, or stops completely, a receiving

KMEA Engineering College, Cochin - 683 561 Page 37


IT010 601COMPUTER NETWORKS Dept. of Information Technology

device will shift to a low power sleep mode that is intermittently interrupted for very short
periods in order to maintain the network connection. With these power saving features,
Bluetooth devices consume very small amounts of power, making them ideal for portable
applications.

Bluetooth for Data Communication

Bluetooth technology makes data communication fast, easy, and convenient. As speeds and
distances are currently limited, it should be viewed as a short-range solution for low to
medium speed applications. It does provide remarkable flexibility, by communicating
through walls and other obstacles that make it an ideal choice for home or office networks--
for example sharing a printer among multiple PCs located in different rooms on the same
floor. It also expands the functionality of a mobile phone, allowing it to serve as a modem for
Internet connections, or allowing it to communicate with other devices--such as the prospect
of using mobile phones to purchase drinks from vending machines

KMEA Engineering College, Cochin - 683 561 Page 38

You might also like