State the need of domain name system.

1 Answer

Answer :

Need of domain name system: * Since IP addresses are difficult to remember and names are easier to remember Domain Name System is used and DNS servers are used for converting these names into IP addresses. * Large number to hosts and servers connected in the internet can be classified using Domain name system so that hierarchical naming system is implemented. * To identify an entity, TCP/IP protocols use the IP address. An IP is uniquely identifies the connection of a host to internet. Use for mapping can map a name to an address or an address to a name. 

Related questions

Description : Explain TCP connection management with the help of TCP connection management finite state machine.

Last Answer : To keep track of all the different events happening during connection establishment, connection termination, and data transfer, TCP is specified as the Finite State Machine -FSM TCP ... , a server transitions through a solid line or a client transitions through a dotted line.

Description : Explain difference between distance vector and link state routing. 

Last Answer : Distance Vector Routing Link State Routing Routing tables are updated by exchanging information with the neighbours.  Complete topology is distributed to every router to update a routing table. ... Harder to configure Count to infinity problem No count to infinity problem

Description : State the concept of fragmentation in IPv4. 

Last Answer : Fragmentation: When the maximum size of datagram is greater than maximum size of data that can be held a frame then the network layer divides the datagram received from x-port layer into ... copied into the fragment header. The three fields Flags, Fragmentation offset and Total length are altered.

Description : State the transmission modes of FTP.

Last Answer : Transmission modes of FTP: 1. Stream mode 2. Block mode 3. Compressed mode

Description : State the use of 6 flags in TCP header.

Last Answer : There are 6, 1-bit control bits that control connection establishment, termination, abortion, flow control etc.. 1) URG: Urgent pointer If this bit field is set the receiving TCP should ... 6) FIN: No more data from sender. If this bit is set then it terminates the connection.

Description : State the four advantages of IPv6.

Last Answer : Advantages of IPv6: * Larger address space. * Better header format. * New options for additional functionalities. * Allowance for extension. * Support for more security. * ... Simplified Network configuration * Support for new services * Support for Security * Auto configuration

Description : Explain how TCP connections are established using the 3 way handshake. What happens when 2 hosts simultaneously try to establish a connection?

Last Answer : If 2 host Simultaneously try to establish connection: Simultaneous Open: * It's possible for two applications to send a SYN to each other to start a TCP connection, although the possibility is small, ... . * The CLOSING state takes the place of FIN-WAIT-2 or CLOSEWAIT in a common scenario.

Description : Explain about standard and non standard protocols at the application layer.

Last Answer : HTTP The Hypertext Transfer Protocol (HTTP) is a Application layer protocol used mainly to access data on the World Wide Web. HTTP uses the services of TCP on well-known port 80. FTP ... starts with the client when the user needs to download e-mail from the mailbox on the mail server.

Description : Explain the TCP connection establishment using a three way handshake mechanism.

Last Answer : Connection Establishment TCP uses a Three way handshaking mechanism to establish a connection between client and server machines. The three steps in three way handshaking mechanism are as follows.  SYN: ... This is just an ACK segment. It guarantees the completion of three way handshaking.

Description : Describe the HTTP response message format.

Last Answer : Status Line  Status line shows status for the response it indicates response status using a code as well as a status phrase. The status-Line begins with a protocol version, then status code and status phrase. ... fields Body It contains actual content. This part is optional. OR

Description : Describe the RIP message format.

Last Answer : RIP(Routing Information Protocol) message format * RIP is routing protocol based on Distance Vector Routing algorithm which is an intradomain (interior) routing protocol used inside an autonomous ... 32-bit field defines the hop count from the advertising router to the destination network

Description : Construct a diagram to show the application of cookies in a scenario in which the server uses cookies for advertisement.

Last Answer : Use of Cookies for advertisements:  A cookie is also used by advertising agencies. An advertising agency can place banner ads on some main website that is often visited by users. The advertising agency supplies only ... the user is sent and stored in the file, which are used by the server. 

Description : Explain the working of TELNET.

Last Answer : TELNET: TELNET is an abbreviation for TErminaLNETwork. It is the standard TCP/IP protocol for virtual terminal service. TELNET Working: * TELNET is a client-server application that allows a user ... the characters to the appropriate application program.  Fig. Working of TELNET 

Description : Explain different transition method of IPv4 to IPv6.

Last Answer : Three Transition from IPv4 to IPv6 strategies are 1. Dual Stack 2. Tunnelling 3. Header Translation  1. DUAL STACK  In this kind of strategy a station has a dual stack of protocols run IPv4 and ... of the IPv6 packet is converted to an IPv4 header see figure. Fig. Header Translation

Description : Explain working of WWW.

Last Answer : The Web is a repository of information in which the documents, called web pages, are distributed all over the world and related documents are linked together. The WWW today is a distributed client- ... the web server. Each time a request arrives, the corresponding document is sent to the client. 

Description : Explain ICMP protocol. Describe the header format of ICMP.

Last Answer : The Internet Control Message Protocol (ICMP) supports the unreliable and connectionless Internet Protocol (IP). * ICMP messages are encapsulated in IP datagrams. There are two categories of ICMP messages ... query messages, the data section carries extra information based on the type of the query.

Description : Compare TCP and UDP

Last Answer : Characteristics TCP UDP Connection TCP is connection oriented Protocol UDP is connection less Protocol  Reliability It provides reliable delivery of messages It provides unreliable delivery of ... FTP, Telnet, SMTP, DNS, HTTP, POP DNS, BOOTP, DHCP, TFTP, RIP

Description : List two advantages of using UDP over TCP.

Last Answer : Advantages of using UDP over TCP : 1) UDP is connection less and unreliable transport layer protocol. i.e. It does not require to maintain a connection. 2) UDP is transaction oriented and ... UDP is faster since it does not require acknowledgment. 4) Useful when time sensitivity is more important

Description : Differentiate between IPv4 and IPv6.

Last Answer : IPv4 IPv6 1. Source and destination addresses are 32 bits (4 bytes) in length. 1. Source and destination addresses are 128 bits(16 bytes) in length. 2. Uses broadcast ... Uses host address (AAAA) resource records in the domain name system to map host names to IPv6 addresses