Friday, March 26, 2010


MODEM


A Modem Working
In order to achieve its purpose---to communicate with other computers over a standard, connected telephone line---a modem must be able to interface both with a computer processor's digital data and the audible signals to be sent over the telephone line. To fill this role, modems use a built-in processor, sometimes assisted by the computer's main processor, to "modulate" the digital data into sound that can be sent across a standard telephone line. By modulating the data, the modem converts digital information, stored as a series of ones and zeroes known as binary code, into audible tones; one specific tone represents a "1" and another specific tone represents a "0" data value.

A Wired Modem Is Connected to the Telephone Network
To communicate with another computer or host, wired modems make use of a connected telephone line to access the remote machine over the public switched telephone network (PSTN). Modems use a standard command set---initiated in the 1980s by the Hayes corporation, and thusly known as the "Hayes command set"---to take telephone lines off hook, send the appropriate dual-tone multifrequency (DTMF) sounds needed to dial a telephone number, and connect with a remote machine that may answer the phone.


A Modem Demodulates
When the remote modem answers the incoming call, it sends an audible signal known as a line acceptance tone, or LAT to indicate to the caller that it has reached a computer. The two modems then exchange basic information (in a process known as a "handshake") such as the compression method in use, error-checking abilities, and data transfer speed, then begin transferring information from machine to machine. Once this process is complete, the two modems exchange modulated data. To be useful, however, the modem must demodulate the incoming sounds into binary data which the computer can read. Like the modulation process, this conversion is performed by the modem's on-board processor or, on some machines, is assisted by the computer's main processor.

Monday, March 22, 2010

DNS (Domain Name System)
Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address.
For example, the domain name www.example.com might translate to 198.105.232.4.
The DNS system is, in fact, its own
network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.
Digital nervous system, a term coined by Bill Gates to describe a network of personal computers that make it easier to obtain and understand information.




HISTORY OF DNS

The practice of using a name as a humanly more meaningful abstraction of a host's numerical address on the network dates back to the ARPANET era. Before the DNS was invented in 1983, each computer on the network retrieved a file called HOSTS.TXT from a computer at SRI (now SRI International). The HOSTS.TXT file mapped names to numerical addresses. A hosts file still exists on most modern operating systems, either by default or through explicit configuration. Many operating systems use name resolution logic that allows the administrator to configure selection priorities for available DNS resolution methods.
The rapid growth of the network required a scalable system that recorded a change in a host's address in one place only. Other hosts would learn about the change dynamically through a notification system, thus completing a globally accessible network of all hosts' names and their associated IP addresses.
At the request of
Jon Postel, Paul Mockapetris invented the Domain Name System in 1983 and wrote the first implementation. The original specifications appeared in RFC 882 and RFC 883 which were superseded in November 1987 by RFC 1034 and RFC 1035. Several additional Request for Comments have proposed various extensions to the core DNS protocols.
In 1984, four
Berkeley students—Douglas Terry, Mark Painter, David Riggle and Songnian Zhou—wrote the first UNIX implementation, which was maintained by Ralph Campbell thereafter. In 1985, Kevin Dunlap of DEC significantly re-wrote the DNS implementation and renamed it BIND—Berkeley Internet Name Domain. Mike Karels, Phil Almquist and Paul Vixie have maintained BIND since then. BIND was ported to the Windows NT platform in the early 1990s.
BIND was widely distributed, especially on Unix systems, and is the dominant DNS software in use on the Internet. With the heavy use and resulting scrutiny of its open-source code, as well as increasingly more sophisticated attack methods, many security flaws were discovered in BIND. This contributed to the development of a number of
alternative nameserver and resolver programs. BIND itself was re-written from scratch in version 9, which has a security record comparable to other modern Internet software.
The DNS protocol was developed and defined in the early 1980s and published by the
Internet Engineering Task Force.


How Domain Name Servers Work????


You spend any time on the Internet sending e-mail or browsing the Web, then you use domain name servers without even realizing it. Domain name servers, or DNS, are an incredibly important but completely hidden part of the Internet, and they are fascinating. The DNS system forms one of the largest and most active distributed databases on the planet. Without DNS, the Internet would shut down very quickly.
When you use the Web or send an e-mail message, you use a domain name to do it. For example, the URL "http://www.howstuffworks.com" contains the domain name howstuffworks.com. So does the e-mail address "iknow@howstuffworks.com."
­Human-readable names like "howstuffworks.com" are easy for people to remember, but they don't do machines any good. All of the machines use names called IP addresses to refer to one another.

For example, the machine that humans refer to as "www.howstuffworks.com" has the IP address 70.42.251.42. Every time you use a domain name, you use the Internet's domain name servers (DNS) to translate the human-readable domain name into the machine-readable IP address. During a day of browsing and e-mailing, you might access the domain name servers hundreds of times!
In this article, we'll take a look at the DNS system so you can understand how it works and appreciate its amazing capabilities.



STRUCTURE OF DNS


The domain name space
The hierarchical domain name system, organized into zones, each served by a name server.
The domain name space consists of a tree of domain names. Each node or leaf in the tree has zero or more resource records, which hold information associated with the domain name. The tree sub-divides into zones beginning at the root zone. A DNS zone consists of a collection of connected nodes authoritatively served by an authoritative nameserver. (Note that a single nameserver can host several zones.)
Administrative responsibility over any zone may be divided, thereby creating additional zones. Authority is said to be delegated for a portion of the old space, usually in form of sub-domains, to another nameserver and administrative entity. The old zone ceases to be authoritative for the new zone.

Domain name formulation
The definitive descriptions of the rules for forming domain names appear in RFC 1035, RFC 1123, and RFC 2181. A domain name consists of one or more parts, technically called labels, that are conventionally concatenated, and delimited by dots, such as example.com.
1. The right-most label conveys the top-level domain; for example, the domain name www.example.com belongs to the top-level domain com.
2. The hierarchy of domains descends from right to left; each label to the left specifies a subdivision, or subdomain of the domain to the right. For example: the label example specifies a subdomain of the com domain, and www is a subdomain of example.com. This tree of subdivisions may consist of 127 levels.
3. Each label may contain up to 63 characters. The full domain name may not exceed a total length of 253 characters. In practice, some domain registries may have shorter limits.
4. DNS names may technically consist of any character representable in an octet (RFC 3696). However, the allowed formulation of domain names in the DNS root zone, and most other subdomains, uses a preferred format and character set. The characters allowed in a label are a subset of the ASCII character set, and includes the characters a through z, A through Z, digits 0 through 9, and the hyphen. This rule is known as the LDH rule (letters, digits, hyphen). Domain names are interpreted in case-independent manner. Labels may not start or end with a hyphen, nor may two hyphens occur in sequence.
5. A hostname is a domain name that has at least one IP address associated. For example, the domain names www.example.com and example.com are also hostnames, whereas the com domain is not.

Internationalized domain names

The permitted character set of the DNS prevented the representation of names and words of many languages in their native alphabets or scripts. ICANN has approved the Punycode-based Internationalized domain name (IDNA) system, which maps Unicode strings into the valid DNS character set. In 2009 ICANN approved the installation of IDN county code top-level domains. In addition, many registries of the existing TLDs have adopted IDNA.

Name servers
The Domain Name System is maintained by a distributed database system, which uses the client-server model. The nodes of this database are the name servers. Each domain has at least one authoritative DNS server that publishes information about that domain and the name servers of any domains subordinate to it. The top of the hierarchy is served by the root nameservers, the servers to query when looking up (resolving) a top-level domain name (TLD).

Authoritative name server
An authoritative name server is a name server that gives answers that have been configured by an original source, for example, the domain administrator or by dynamic DNS methods, in contrast to answers that were obtained via a regular DNS query to another name server. An authoritative-only name server only returns answers to queries about domain names that have been specifically configured by the administrator.
An authoritative name server can either be a master server or a slave server. A master server is a server that stores the original (master) copies of all zone records. A slave server uses an automatic updating mechanism of the DNS protocol in communication with its master to maintain an identical copy of the master records.
Every DNS zone must be assigned a set of authoritative name servers that are installed in NS records in the parent zone.
When domain names are registered with a domain name registrar their installation at the domain registry of a top level domain requires the assignment of a primary name server and at least one secondary name server. The requirement of multiple name servers aims to make the domain still functional even if one name server becomes inaccessible or inoperable. The designation of a primary name server is solely determined by the priority given to the domain name registrar. For this purpose generally only the fully qualified domain name of the name server is required, unless the servers are contained in the registered domain, in which case the corresponding IP address is needed as well.
Primary name servers are often master name servers, while secondary name server may be implemented as slave servers.
An authoritative server indicates its status of supplying definitive answers, deemed authoritative, by setting a software flag (a protocol structure bit), called the Authoritative Answer (AA) bit in its responses.This flag is usually reproduced prominently in the output of DNS administration query tools (such as dig) to indicate that the responding name server is an authority for the domain name in question.

Recursive and caching name server
In principle, authoritative name servers are sufficient for the operation of the Internet. However, with only authoritative name servers operating, every DNS query must start with recursive queries at the root zone of the Domain Name System and each user system must implement resolver software capable of recursive operation.
To improve efficiency, reduce DNS traffic across the Internet, and increase performance in end-user applications, the Domain Name System supports DNS cache servers which store DNS query results for a period of time determined in the configuration (time-to-live) of the domain name record in question. Typically, such caching DNS servers, also called DNS caches, also implement the recursive algorithm necessary to resolve a given name starting with the DNS root through to the authoritative name servers of the queried domain. With this function implemented in the name server, user applications gain efficiency in design and operation.
The combination of DNS caching and recursive functions in a name server is not mandatory, the functions can be implemented independently in servers for special purposes.
Internet service providers typically provide recursive and caching name servers for their customers. In addition, many home networking routers implement DNS caches and recursors to improve efficiency in the local network.














Sunday, February 14, 2010

History Of OSI Model

History And Development Of The OSI Model
steven parks
osi history and development
5/22/07

The history of the development of the OSI model is a little-known story. Much of the work on the design of OSI was done by a group at Honeywell Information Systems, headed by Mike Canepa, with Charlie Bachman as the principal technical member. This group was organized within Honeywell, with advanced product planning and with the design and development of prototype systems.In the early and mid '70s, the interest of Canepa's group was mainly on database design and then distributed database design. By the mid-70s, it become clear that to support database machines, distributed access, and the like, a structured distributed communications architecture would be needed. The group studied some of the existing solutions, including IBM's system network architecture (SNA), the work on protocols being done for ARPANET, and some of the concepts of presentation services being developed for standardized database systems. The result of this effort was the development by 1977 of a seven-layer architecture known as the distributed systems architecture (DSA).Bachman and Canepa participated in ANSI meetings and presented their seven-layer model. This model was chosen as the only proposal to be submitted to the ISO subcommittee. When the ISO group met in Washington DC in March of '78, the Honeywell team presented their solution. An agreement was reached at that meeting that this layered architecture would satisfy most requirements of OSI, and had the ability to be expanded later to meet new requirements. A provisional version of the model was published in March of '78. The next version, with some minor adjustments, was published in June of '79 and eventually standardized. The resulting OSI model is essentially the same as the DSA model developed in 1977.

Why a layered model?
>reduces complexity
>standardizes interfaces
>gaurantees interoperablity
>accelerates evolution
>simplfies teaching and learning
PRESENTATION LAYER PROTOCOLS
AFP (Apple Filing Protocol)
ASCII (American Standard Code for Information Interchange)
EBCDIC (Extended Binary Coded Decimal Interchange Code )
ICA (Independent Computing Architecture, the Citrix system core protocol)
LPP (Lightweight Presentation Protocol)
NCP (NetWare Core Protocol)
NDR (Network Data Representation)
XDR (eXternal Data Representation)
X.25 PAD (Packet Assembler/Disassembler Protocol)

APPLICATION LAYER PROTOCOLS

9P, (Plan 9 from Bell Labs distributed file system protocol)
AFP, (Qaisar Javeed)
APPC, (Advanced Program-to-Program Communication)
AMQP, (Advanced Message Queuing Protocol)
BitTorrent
Atom Publishing Protocol
BOOTP, (Bootstrap Protocol)
CFDP, (Coherent File Distribution Protocol)
DDS, (Data Distribution Service)
DHCP, (Dynamic Host Configuration Protocol)
DeviceNet
DNS, (Domain Name System (Service) Protocol)
eDonkey
ENRP, (Endpoint Handlespace Redundancy Protocol)
FastTrack (KaZaa, Grokster, iMesh)
Finger, (User Information Protocol)
Freenet
FTAM, (File Transfer Access and Management)
FTP, (File Transfer Protocol)
Gopher, (Gopher protocol)
HL7, (Health Level Seven)
HTTP, (HyperText Transfer Protocol)
H.323, (Packet-Based Multimedia Communications System)
IMAP, ( IMAP4, Internet Message Access Protocol (version 4) )
IRCP, (Internet Relay Chat Protocol)
Kademlia
LDAP, (Lightweight Directory Access Protocol)
LPD, (Line Printer Daemon Protocol)
MIME (S-MIME), (Multipurpose Internet Mail Extensions and Secure MIME )
Modbus
Netconf
NFS, (Network File System)
NIS, (Network Information Service)
NNTP, (Network News Transfer Protocol)
NTCIP, (National Transportation Communications for Intelligent Transportation System Protocol)
NTP, (Network Time Protocol)
OSCAR, (AOL Instant Messenger Protocol)
PNRP, (Peer Name Resolution Protocol)
POP, POP3, (Post Office Protocol (version 3) )
RDP, (Remote Desktop Protocol)
Rlogin, (Remote Login in UNIX Systems)
RPC, (Remote Procedure Call)
RTP, (Real-time Transport Protocol)
RTPS, (Real Time Publish Subscribe)
RTSP, (Real Time Streaming Protocol)
SAP, (Session Announcement Protocol)
SDP, (Session Description Protocol)
SIP, (Session Initiation Protocol)
SLP, (Service Location Protocol)
SMB, (Server Message Block)
SMTP, (Simple Mail Transfer Protocol)
SNMP, (Simple Network Management Protocol)
SNTP, (Simple Network Time Protocol)
SPTP, (Secure Parallel Transfer Protocol)
SSH, (Secure Shell)
SSMS, (Secure SMS Messaging Protocol)
TCAP, (Transaction Capabilities Application Part)
TDS, (Tabular Data Stream)
TELNET, (Terminal Emulation Protocol of TCP/IP)
TFTP, (Trivial File Transfer Protocol)
TSP, (Time Stamp Protocol)
VTP, (Virtual Terminal Protocol)
Waka, (an HTTP replacement protocol)
Whois (and RWhois), (Remote Directory Access Protocol)
WebDAV
X.400, (Message Handling Service Protocol)
X.500, ( Directory Access Protocol (DAP) )
XMPP, (Extensible Messaging and Presence Protocol)

Thursday, February 4, 2010

About The Apple Talk

APPLE TALK
AppleTalk, a protocol suite developed by Apple Computer in the early 1980s, was developed in conjunction with the Macintosh computer. AppleTalk's purpose was to allow multiple users to share resources, such as files and printers. The devices that supply these resources are called servers, while the devices that make use of these resources (such as a user's Macintosh computer) are referred to as clients. Hence, AppleTalk is one of the early implementations of a distributed client-server networking system. This chapter provides a summary of AppleTalk's network architecture.
AppleTalk was designed with a transparent network interface. That is, the interaction between client computers and network servers requires little interaction from the user. In addition, the actual operations of the AppleTalk protocols are invisible to end users, who see only the result of these operations. Two versions of AppleTalk exist: AppleTalk Phase 1 and AppleTalk Phase 2.


AppleTalk Phase 1, which is the first AppleTalk specification, was developed in the early 1980s strictly for use in local workgroups. Phase 1 therefore has two key limitations: its network segments can contain no more than 127 hosts and 127 servers, and it can support only nonextended networks.

AppleTalk Phase 2, which is the second enhanced AppleTalk implementation, was designed for use in larger internetworks. Phase 2 addresses the key limitations of AppleTalk Phase 1 and features a number of improvements over Phase 1. In particular, Phase 2 allows any combination of 253 hosts or servers on a single AppleTalk network segment and supports both nonextended and extended networks.
AppleTalk Network Components
AppleTalk networks are arranged hierarchically. Four basic components form the basis of an AppleTalk network: sockets, nodes, networks, and zones. Below figure illustrates the hierarchical organization of these components in
an AppleTalk internetwork. Each of these concepts is summarized in the sections that follow.

Figure: The AppleTalk internetwork consists of a hierarchy of components.

Sockets
An AppleTalk socket is a unique, addressable location in an AppleTalk node. It is the logical point at which upper-layer AppleTalk software processes and the network-layer Datagram-Delivery Protocol (DDP) interact. These upper-layer processes are known as socket clients. Socket clients own one or more sockets, which they use to send and receive datagrams. Sockets can be assigned statically or dynamically. Statically assigned sockets are reserved for use by certain protocols or other processes. Dynamically assigned sockets are assigned by DDP to socket clients upon request. An AppleTalk node can contain up to 254 different socket numbers. Figure illustrates the relationship between the sockets in an AppleTalk node and DDP at the network layer.
Figure :
Socket clients use sockets to send and receive datagrams.



Nodes
An AppleTalk node is a device that is connected to an AppleTalk network. This device might be a Macintosh computer, a printer, an IBM PC, a router, or some other similar device. Within each AppleTalk node exist numerous software processes called sockets. As discussed earlier, the function of these sockets is to identify the software processes running in the device. Each node in an AppleTalk network belongs to a single network and a specific zone.

Networks
An AppleTalk network consists of a single logical cable and multiple attached nodes. The logical cable is composed of either a single physical cable or multiple physical cables interconnected by using bridges or routers. AppleTalk networks can be nonextended or extended.

Sunday, January 17, 2010



MoDeS Of CoMmUnIcAtIoN


Prof. Albert Mehrabian (UCLA, 1967)identified three major parts that convey meaning in human face to face communication: body language, voice tonality, and words. He conducted research to determine how people make meaning when a speaker says one thing but means another. If the speaker is sending a mixed message the listener will rely on the following cues to determine true meaning
55% of impact is determined by body language—postures, gestures, and eye contact,
38% by the tone of voice, and
7% by the content or the words spoken
.


*Nonverbal communication
Nonverbal communication is the process of communicating through sending and receiving wordless messages. Such messages can be communicated through gesture, body language or posture; facial expression and eye contact, object communication such as clothing,hairstyles or even architecture, or symbols and infographics, as well as through an aggregate of the above, such as behavioral communication.
Nonverbal communication plays a key role in every person's day to day life, from employment to romantic engagements.

FIG: NON-VERBAL COMMUNICATION


*Visual communication

Visual communication as the name suggests is communication through visual aid. It is the conveyance of ideas and information in forms that can be read or looked upon. Primarily associated with two dimensional images, it includes: signs, typography, drawing, graphic design,illustration, colour and electronic resources. It solely relies on vision. It is form of communication with visual effect. It explores the idea that a visual message with text has a greater power to inform, educate or persuade a person. It is communication by presenting information through visual form.
FIG: VISUAL COMMUNICATION



















Basic Components Of Communication

BASIC COMPONENTS OF COMMUNICATION

Every communication system has 5 basic requirements
•Data Source (where the data originates)
•Transmitter (device used to transmit data)
•Transmission Medium (cables or non cable)
•Receiver (device used to receive data)
•Destination (where the data will be placed)