You are on page 1of 6

COURSE CODE:- CSE 883 COURSE INSTRUCTOR:- Mr. Rajiv sobti D.O.

A:- 6/11/10 ROLL NO: - ROE126A29 DECLARATION: - I declare that this assignment is my individual work. I have not copied from any other students work or from any other source, except when due acknowledgement is made explicitly in the text, not has any part being written for me by another person. D.O.S:- 23/11/10

EVALUATORS COMMENT: MARKS: OUT OF

PART-A
Ans.1 Five different websites on generic domains are: 1. www.indialrail.gov.in 2. www.uzairways.com 3. www.sibm.edu 4. www.dubai.com 5. www.kfc.com 1. 2. 3. 4. 5. Five different websites on country domains are: www.qantas.com.au www.brad.ac.uk www.visitabudhabi.ae www.unsw.edu.au www.apple.com.in

Ans.2 Header format of DNS: Identification Number of question records Number of authoritative records Flags Number of answer records Number of additional records

Detailed working of each field could be listed as: 1. Identification: A 16 bit field. Client purpose field used to match the response with the query. 2. Flags: This 16 bit field is further sub divided into: QR Opcode AA (Authoritative answer) TC (Truncated) RD RA Three (Recursion (Recursion 0s Desired) available) rCode

3. Number of question records: A 16 bit field which contains number of queries asked in the message. 4. Number of answer records: A 16 bit field which records number of answers in the response part of the message. 5. Number of authoritative records: A 16 bit field which contains the number of authoritative records in the authoritative part of the response message. Query message doesnt contain it, so a zero value is being putted instead of it. 6. Number of additional records: A 16 bit field which is used to contain the additional records in the additional part of response message. It has a null value in the query message.

Response format of DNS: Header Question section Answer section Authoritative section Additional section Description of fields is as follows: 1. Question section: Integrate part of both query and response messages and contains one or more question records. 2. Answer section: Part of response messages only and contains one or more answer records been resolved by server. 3. Authoritative section: Also part of response messages only and is used to find out the authoritative servers for the query. 4. Additional Information section: It is also a part of response message only. This field contains some relevant information which might be helpful for the resolver.

PART-B
Ans.4 Enabling/Disabling of options comes under the category of option negotiation i.e. to access any of the options on Telnet, there must be synchronization between client and server which results in the dire need of enabling/disabling of options. Various ways of it are: Enabling an option: An option is enabled either through an offer or rather through a request to client or the server as depends upon the requirement. It can be done as: (i) Offer to enable: An interested user can enable an option if it has the right to do so. Though it doesnt guarantee that the remote device will accept the offer surely, it might get rejected. Offering user sends the WILL command i.e. Will I enable the option?, if the requested user seems to be interested then it accepts the request by sending a DO command i.e. please do the connection or rejects it by sending a DONT command i.e. please terminate the connection. (ii) Request to enable: A user can request the other Telnet user regarding the enabling of option which may be accepted or requested. Requesting user sends the DO command which means a plea to enable the option while the requested user either accepts it by sending a WILL command or rejects it by sending a WONT command. Disabling an option: An option which has been enabled can be disabled by using following ways: (i) Offer to disable: This way guarantees the disabling as it cant be refused by the user to whom it has been offered. The user who is offering, sends the WONT command i.e. I wont use this option any

(ii)

more while the reply is being expected as DONT command i.e. Dont use it anymore. Request to disable: It too cant be rejected. A user can request from the other user regarding the disabling of option. Requesting user sends the DONT command i.e. rather an order to disable the option, while the user on the other hand accepts the request cum order by sending a WONT command i.e. its not at all going to use it anymore. Example: Let us suppose an example where the client wants the server to enable the option of timing mark and issues the same which indicates all previously received data which has been processed. So, the client request from the server by sending three NVT characters i.e. IAC, DO, Timing Mark and the server accepts the same by sending the approval as: IAC, WILL, Timing Mark. Client Timing Mark IAC WILL DO IAC Timing Mark Server

Figure: Enabling/Disabling Ans.5 Most of the systems today provides a mechanism or shortcuts which allows us to terminate a running program like if an application program is running on the screen of a local computer, it can be terminated using Ctrl-C but it doesnt help in aborting the program running at a remote device. So, this problem has created the need of certain special characters which could be termed as control characters, these should be sending to the remote system to apply them. Important thing to note here is that the user still types the same key combination i.e. Ctrl-C, but this is changed to special characters as per the situation and is sent to the server. Some of the control characters are listed in the table below: Character IP AO AYT EC EL SYNCH BRK Decimal 244 245 246 247 248 243 Binary 11110100 11110101 11110110 11110111 11111000 11110011 Meaning Interrupt process Abort output Are you there? Erase the last character Erase the last line Synchronise Break

Character details will depict the exhibition of their control over the server: I. IP(Interrupt Process)- If the program has gone into an infinite loop, then user can interrupt it using Ctrl-C, but while on a remote login if this problem appears then the appropriate function should be called by the OS of the

remote machine. In this situation Telnet defines the control character IP, which is read and interpreted for interrupting the process on remote system. II. AO (Abort Output)- When this control character is called by the operating system, then it aborts the output and allows the process to run as it was running before. Its helpful in case the user wants the program to run in any case. So, its somehow useful if output is not the prime importance. III. AYT (Are You There?)- When this control character is called by the OS, it determines the status of remote machine that whether its still running or not, its called in case of long silence from the server. IV. EC (Erase Character) - To erase the last character typed, this control character is being called by the OS on the remote machine. V. EL (Erase Line)- To erase the last line typed, this control character is being called by the OS on the remote machine. Ans. 6 Various TELNET modes of operation are: 1. Default mode: This is the mode which has been set as default as the name suggests. Here, client echoes the characters to the server i.e. as user types a character, the client echoes it to the screen until and unless the whole line is completed, as soon as the line gets complete, it sends the whole line to the server, then the client waits till it gets a GO AHEAD command from the server, in the mean time it doesnt accept any new character from the user. This operation is surely half-duplex as proved by the waiting time of client or rather the dependence of client on server. 2. Character mode: Here, in this mode, the client doesnt wait till a whole line is typed by the user, instead it sends/echoes each and every character to the server as soon as it gets, and then the server echoes the character back to the clients screen. If delaying of characters is required, it can be done. This mode creates an overhead, reason being: It requires three TCP segments for each character sent, these are: (i) The echoed character itself. (ii) Acknowledgement from server by echoing the character. (iii) Acknowledgement from client regarding the receipt of echoed character. 3. Line mode: To overcome the deficiencies of above two nodes, this mode is being proposed. Here, in this mode line editing takes place which includes echoing, character erasing, line erasing etc. and is done by the client, after all of the process, the line is forwarded to the server. Its a full-duplex mode as it sends line-after-line to the server and doesnt wait for the green signal i.e. Go Ahead character from the server. Example: The following example shows the character mode of operation of TELNET. Here, client requests the server to display its status. Client Server Go ahead

Status IAC Echo

DO WILL DO

IAC Status IAC

IAC

WILL LOGIN

Echo

a a s s h h i i s s h h

You might also like