Lecture - 08 - Chapter 2 - Chapter 3 - 12 Sep 2024
Lecture - 08 - Chapter 2 - Chapter 3 - 12 Sep 2024
Lecture 08
Chapter 2
Chapter 3
type=A type=CNAME
▪ name is hostname ▪ name is alias name for some “canonical”
▪ value is IP address (the real) name
▪ www.ibm.com is really
type=NS servereast.backup2.ibm.com
▪ value is canonical name
▪ name is domain (e.g., foo.com)
▪ value is hostname of
type=MX
authoritative name server for ▪ value is name of SMTP mail
this domain server associated with name
Application Layer: 2-3
DNS records
DNS: distributed db storing resource records (RR) (RFC 1035)
RR format: (name, value, type, ttl)
if type=A (Address Mapping Record, RFC 1035) if type=CNAME (Canonical Name Record, RFC 1035)
▪ name is hostname ▪ name is alias (mnemonic) name for some
▪ value is IP address “canonical” (the real) name
▪ Used to map (point) a domain name to an IP address ▪ value is canonical name (real/actual name)
▪ E.g. (relay1.bar.foo.com, 145.37.93.126, A) ▪ www.ibm.com is really
servereast.backup2.ibm.com
▪ Used to map (point) a domain name to another
domain name (for example your website is
example.com, but you have also registered
examples.com, thus examples.com can be redirected
towards example.com via this record
if type=NS (Name Server Record, RFC 1035) ▪ E.g. (foo.com, relay1.bar.foo.com, CNAME)
• name is domain if type=MX (Mail Exchange Record, RFC 1035)
• value is hostname of authoritative name ▪ name is alias name for some “canonical” (the real)
server for this domain name
• NS records specifies which DNS server is
authoritative for this domain ▪ value is canonical name of mail server associated
• E.g. (foo.com, dns.foo.com, NS) with alias name
▪ Same as CNAME but for mail server
▪ Used by SMTP to locate mail server name for that domain
(thus mail server name must also have a Type A record.)
▪ E.g. (foo.com, mail.bar.foo.com, MX)
DNS RR Summary
DNS protocol messages
DNS query and reply messages, both have same format:
2 bytes 2 bytes
• recursion desired
answers (variable # of RRs)
• recursion available
• reply is authoritative authority (variable # of RRs)
identification flags
- The first field is a 16-bit number that identifies the query. This identifier is copied into
the reply message to a query, allowing the client to match received replies with sent queries.
- Flags: There are a number of flags in the flag field. A one-bit query/reply flag indicates whether
the message is a query (0) or a reply (1). A one-bit authoritative flag is set in a reply message when
a DNS server is an authoritative server for a queried name. A one-bit recursion-desired flag is set
when a client (host or DNS server) desires that the DNS server perform recursion when it doesn’t
have the record. A one-bit recursion available flag is set in a reply if the DNS server supports
recursion.
- # Fields (Four number-of fields): These fields indicate the number of occurrences of the four types of
data sections that follow the header.
- Question Section: contains information about the query that is being made. This section includes
(i) a name field that contains the name that is being queried, and (ii) a type field that indicates the
type of question being asked about the name
- Answer Section: In a reply from a DNS server, the answer section contains the resource records
for the name that was originally queried.
2-23
Chapter 3
Transport Layer
A note on the use of these PowerPoint slides:
We’re making these slides freely available to all (faculty, students,
readers). They’re in PowerPoint form so you see the animations; and
can add, modify, and delete slides (including this one) and slide
content to suit your needs. They obviously represent a lot of work on
our part. In return for use, we only ask the following:
▪ If you use these slides (e.g., in a class) that you mention their
source (after all, we’d like people to use our book!)
▪ If you post any slides on a www site, that you note that they are
adapted from (or perhaps identical to) our slides, and note our
copyright of this material.
Computer Networking: A
For a revision history, see the slide note for this page.
Top-Down Approach
Thanks and enjoy! JFK/KWR 8th edition
All material copyright 1996-2023
Jim Kurose, Keith Ross
J.F Kurose and K.W. Ross, All Rights Reserved Pearson, 2020
Sender:
application ▪ is passed an application- application
app. msg
layer message
transport ▪ determines segment TThhtransport
app. msg
header fields values
network (IP) ▪ creates segment network (IP)
physical physical
Receiver:
application ▪ receives segment from IP application
▪ checks header values
transport
app. msg ▪ extracts application-layer transport
message
network (IP) network (IP)
▪ demultiplexes message up
link to application via socket link
physical physical
Th app. msg
• congestion control
• flow control
• connection setup
local or
▪ UDP: User Datagram Protocol regional
ISP
• unreliable, unordered delivery home network content
• no-frills extension of “best-effort” IP provider
network datacenter
applicatio
- Quiz # 2 for Chapter 2 to be taken in the class on Thursday, 19th September, 2024 during the
lecture time.
No Retake
Be on time