0% found this document useful (0 votes)
58 views6 pages

Quiz Number 1 Submitted By: Kainat Parveen Registration Number: 18-Arid-5163 BSCS-6A

The document contains answers to two quiz questions from a student named Kainat Parveen with registration number 18-ARID-5163 studying BSCS-6A. The first question defines NAT (Network Address Translation) as translating IP addresses of devices in a local network to a single IP address, usually of the connecting router. This adds security while also conserving IP addresses. The second question explains DNS as translating domain names to IP addresses, FTP as transferring files between systems over the internet, and SMTP as the standard for transmitting emails, giving examples of each.

Uploaded by

kainat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views6 pages

Quiz Number 1 Submitted By: Kainat Parveen Registration Number: 18-Arid-5163 BSCS-6A

The document contains answers to two quiz questions from a student named Kainat Parveen with registration number 18-ARID-5163 studying BSCS-6A. The first question defines NAT (Network Address Translation) as translating IP addresses of devices in a local network to a single IP address, usually of the connecting router. This adds security while also conserving IP addresses. The second question explains DNS as translating domain names to IP addresses, FTP as transferring files between systems over the internet, and SMTP as the standard for transmitting emails, giving examples of each.

Uploaded by

kainat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

BIMS

BARANI INSTITUTE OF MANAGEMENT


SCIENCES

“CNN”

 QUIZ NUMBER 1
 SUBMITTED BY: KAINAT PARVEEN
 REGISTRATION NUMBER: 18-ARID-5163
 BSCS-6A

Q1.what is NAT? Explain with an example.


ANSWER
NAT
Stands for "Network Address Translation." NAT translates the IP addresses of
computers in a local network to a single IP address. This address is often used by
the router that connects the computers to the Internet. The router can be connected
to a DSL modem, cable modem, T1 line, or even a dial-up modem. When other
computers on the Internet attempt to access computers within the local network, they
only see the IP address of the router. This adds an extra level of security, since the
router can be configured as a firewall, only allowing authorized systems to access
the computers within the network.
Once a system from outside the network has been allowed to access a computer
within the network, the IP address is then translated from the router's address to the
computer's unique address. The address is found in a "NAT table" that defines the
internal IP addresses of computers on the network. The NAT table also defines the
global address seen by computers outside the network. Even though each computer
within the local network has a specific IP address, external systems can only see
one IP address when connecting to any of the computers within the network.

To simplify, network address translation makes computers outside the local area
network (LAN) see only one IP address, while computers within the network can see
each system's unique address. While this aids in network security, it also limits the
number of IP addresses needed by companies and organizations. Using NAT, even
large companies with thousands of computers can use a single IP address for
connecting to the Internet. Now that's efficient.

Q2. Explain DNS, FTP, and Telnet with examples


ANSWER
Important Application Layer Protocols: DNS, FTP,
SMTP, And MIME Protocols
An In-Depth Look at the DNS, FTP, SMTP, and MIME Application Layer Protocols
of TCP/IP Protocol Suite:
In this In-Depth Networking Training Series, we explored the Differences between
IPv4 and IPv6 Addressing in our previous tutorial. The application layer is the
uppermost layer of the TCP/IP protocol suite.
In this tutorial, we will explore the various protocols that work on this layer in detail.

Being a software tester, it is important to understand the different features of each of the
application layer protocols as the testers work on this layer and need it for their day to
day work.

Each of the protocol has its own role and importance. A few of the majorly deployed
protocols which we will discuss here include DNS, FTP, HTTP, MIME, SMTP, LDP,

DNS (Domain Name Server)


If any user from the personal computer, laptop or tablet uses the Internet and tries to
login into some website then the user is using DNS for sure. Thus it is very important to
understand the working on a domain name server.

PC’s, laptop or tablets don’t understand the language of a web address, which means
the domain name like Google.com to make them understand for which site we are
looking for. Thus DNS came into the role and provides the host with the mapped IP
address in respect to the domain name of the website.
As shown in the above figure, when we request for a web page from our PC on the
Internet like PC1 is requesting for www.softwaretestinghelp.com, then resolving the
domain name query and providing the respective IP address in return is the part of work
of the DNS server.

DNS server stores the database of all the relevant IP addresses mapped with their
respective domain names.

The DNS query for requesting the IP address in respect to the domain name goes to the
DNS server 1 from PC1. The server checks within itself, if it has the IP address
regarding the query, and it returns a DNS response with the resolution.

Otherwise, it forwards it to another DNS server 2 requesting for information. This time it
gets the resolution from the DNS 2 and it gets mapped with the IP address i.e.
10.150.120.2 corresponding to the Domain name in response and sends it back to PC1.

The PC1 now have the destination IP address and it can communicate further with the
known IP address as per the routing.

Now the question arises, as of how the PC will come to know which DNS should be used
to get the IP address.

The answer to this is when we connect our system to the ISP, the network devices like a
router or switch which assigns the routing information and other configurations as well
send which or how many DNS server the PC should connect with to get the address
translation.
FTP (File Transfer Protocol)
It is one of the widely used application layer protocol of the TCP/IP protocol suite. FTP is
basically used to exchange data between two host devices over the Internet or Intranet
securely.

It is referred to as one of the safest modes of file sharing among systems, and thus it is
deployed by large industries, universities, and offices.

It works in the client-server model and thus the user needs an FTP client program to run
FTP on its system. The common types of FTP client program include Filezilla and
Dreamweaver etc.

The data transfer takes place only in one direction at a time. The FTP protocol carry out
many duties apart from file transfer like creation and deletion of data files, listing,
renaming, etc.

The FTP Model


In this model, one host behaves as the client and another host as a server. The one who
requests for file-sharing or data is the client host and one which in response completes
the request is the server host.

Firstly the FTP connection is established between the client and server computer and
data exchange take place after that. Two channels come into the picture of FTP
connection i.e. control channel and data channel.

The control channel establishes the connection between the client and server and
remains open for the overall session. The control channel port number is 21 in TCP/IP.
While the data channel opens when the client request for a file sharing and get closed
after the completion of the request by the server.
Two processes naming data transfer process (DTP) and protocol interpreter (PI) are
used in managing the communication between the client and the server. The DTP
establishes and manages the connection for the data channel, while PI manages the
DTP by applying commands given by the control channel.

The server host end PI is accountable for analyzing the commands received from the
client host end via the control channel, connection establishment, and in running the
DTP. The client PI is accountable for forwarding the FTP commands, receiving the
response from the server and establishment of the connection with the FTP server.

After the establishment of a connection between the FTP client and the FTP server, the
client builds up the connection and sends the FTP commands to the server. The server
analyzes them and in response completes the request.

Now the server end PI sends the port detail on which the files will be forwarded to the
client DTP. The client DTP then waits for the data to arrive at the decided port from the
server.

The FTP Response


To make out a secure and reliable file transfer between the client and server, it is
important that the server and client should remain in synchronization with each other.

Thus for each command executed by the client, a user is acknowledged by the response
and the action is performed by the server host in order. The response consists of a 3
digit code plus a text (a character string is separated from digit by a space) denoting the
processing of the commands.

Types of Connection
The FTP server is connected to the FTP client on the control port 21. After this, the client
will decide which type of connection it will make with the FTP server, i.e. whether an
active or passive connection.

(i) Active Connection: If an active connection is established, then the data connection
from the server end is opened on port 20 or to a greater range towards the client’s end.
Then all the data flow will take place on this connection.
(ii) Passive Connection: If the passive connection is established, the client requests for
passive connection from the server and assigns any port greater than 10,000. The
server bounds itself to this port and gets back to the client with it.
The client then opens a new data connection for a particular session on this newly
bounded port. In a passive connection, every time a new port is assigned when a new
data connection request is raised from the client’s end. The latest trend in the networking
system operates mostly in passive mode.

Example: Let’s take the example of a software organization, where hundreds of


performance and daily activity reports are generated by the employees and those need
to be shared with their vertical head, CEO or seniors at the remote end.
One way of sharing the daily reports and tracker is to send an e-mail to all of them.
However, it takes a lot of time and if the size of the attachment is big in an e-mail, then it
will take much time for downloading and the mailbox will get full frequently due to
oversized mails.

The other way to do this is that the creators of data will put the reports and trackers on
the FTP server and share the path with each concern. In this case, the end-user will
behave as the client host and can access the files of their era from the server by just
logging onto the server.

The server can be made secure by putting a password. Only the concerns will have the
username and password to access it. The port used here is 21. As per rights granted to
the clients, they can also create a copy, modify and delete the files on the server and
from the server.

SMTP (Simple Mail Transfer Protocol)


SMTP is the standardization for transmission of electronic mails on the Internet.

It is used by the e-mail server for sending and receiving messages, but the client host-
based application only uses it for sending messages to the mail server. For receiving
purposes, they use POP3 or IMAP.

It is a TCP/IP application layer protocol and the TCP port used by the mail servers is 25
while the mail clients use the port 587 or 465 for communication.

The outlook mail system of Microsoft system, Gmail and Yahoo mail, deploy SMTP for
sending and retrieving emails from the exterior world whereas for interior mail exchange
between their respective systems they use their own protocols.

You might also like