Quiz Number 1 Submitted By: Kainat Parveen Registration Number: 18-Arid-5163 BSCS-6A
Quiz Number 1 Submitted By: Kainat Parveen Registration Number: 18-Arid-5163 BSCS-6A
“CNN”
QUIZ NUMBER 1
SUBMITTED BY: KAINAT PARVEEN
REGISTRATION NUMBER: 18-ARID-5163
BSCS-6A
To simplify, network address translation makes computers outside the local area
network (LAN) see only one IP address, while computers within the network can see
each system's unique address. While this aids in network security, it also limits the
number of IP addresses needed by companies and organizations. Using NAT, even
large companies with thousands of computers can use a single IP address for
connecting to the Internet. Now that's efficient.
Being a software tester, it is important to understand the different features of each of the
application layer protocols as the testers work on this layer and need it for their day to
day work.
Each of the protocol has its own role and importance. A few of the majorly deployed
protocols which we will discuss here include DNS, FTP, HTTP, MIME, SMTP, LDP,
PC’s, laptop or tablets don’t understand the language of a web address, which means
the domain name like Google.com to make them understand for which site we are
looking for. Thus DNS came into the role and provides the host with the mapped IP
address in respect to the domain name of the website.
As shown in the above figure, when we request for a web page from our PC on the
Internet like PC1 is requesting for www.softwaretestinghelp.com, then resolving the
domain name query and providing the respective IP address in return is the part of work
of the DNS server.
DNS server stores the database of all the relevant IP addresses mapped with their
respective domain names.
The DNS query for requesting the IP address in respect to the domain name goes to the
DNS server 1 from PC1. The server checks within itself, if it has the IP address
regarding the query, and it returns a DNS response with the resolution.
Otherwise, it forwards it to another DNS server 2 requesting for information. This time it
gets the resolution from the DNS 2 and it gets mapped with the IP address i.e.
10.150.120.2 corresponding to the Domain name in response and sends it back to PC1.
The PC1 now have the destination IP address and it can communicate further with the
known IP address as per the routing.
Now the question arises, as of how the PC will come to know which DNS should be used
to get the IP address.
The answer to this is when we connect our system to the ISP, the network devices like a
router or switch which assigns the routing information and other configurations as well
send which or how many DNS server the PC should connect with to get the address
translation.
FTP (File Transfer Protocol)
It is one of the widely used application layer protocol of the TCP/IP protocol suite. FTP is
basically used to exchange data between two host devices over the Internet or Intranet
securely.
It is referred to as one of the safest modes of file sharing among systems, and thus it is
deployed by large industries, universities, and offices.
It works in the client-server model and thus the user needs an FTP client program to run
FTP on its system. The common types of FTP client program include Filezilla and
Dreamweaver etc.
The data transfer takes place only in one direction at a time. The FTP protocol carry out
many duties apart from file transfer like creation and deletion of data files, listing,
renaming, etc.
Firstly the FTP connection is established between the client and server computer and
data exchange take place after that. Two channels come into the picture of FTP
connection i.e. control channel and data channel.
The control channel establishes the connection between the client and server and
remains open for the overall session. The control channel port number is 21 in TCP/IP.
While the data channel opens when the client request for a file sharing and get closed
after the completion of the request by the server.
Two processes naming data transfer process (DTP) and protocol interpreter (PI) are
used in managing the communication between the client and the server. The DTP
establishes and manages the connection for the data channel, while PI manages the
DTP by applying commands given by the control channel.
The server host end PI is accountable for analyzing the commands received from the
client host end via the control channel, connection establishment, and in running the
DTP. The client PI is accountable for forwarding the FTP commands, receiving the
response from the server and establishment of the connection with the FTP server.
After the establishment of a connection between the FTP client and the FTP server, the
client builds up the connection and sends the FTP commands to the server. The server
analyzes them and in response completes the request.
Now the server end PI sends the port detail on which the files will be forwarded to the
client DTP. The client DTP then waits for the data to arrive at the decided port from the
server.
Thus for each command executed by the client, a user is acknowledged by the response
and the action is performed by the server host in order. The response consists of a 3
digit code plus a text (a character string is separated from digit by a space) denoting the
processing of the commands.
Types of Connection
The FTP server is connected to the FTP client on the control port 21. After this, the client
will decide which type of connection it will make with the FTP server, i.e. whether an
active or passive connection.
(i) Active Connection: If an active connection is established, then the data connection
from the server end is opened on port 20 or to a greater range towards the client’s end.
Then all the data flow will take place on this connection.
(ii) Passive Connection: If the passive connection is established, the client requests for
passive connection from the server and assigns any port greater than 10,000. The
server bounds itself to this port and gets back to the client with it.
The client then opens a new data connection for a particular session on this newly
bounded port. In a passive connection, every time a new port is assigned when a new
data connection request is raised from the client’s end. The latest trend in the networking
system operates mostly in passive mode.
The other way to do this is that the creators of data will put the reports and trackers on
the FTP server and share the path with each concern. In this case, the end-user will
behave as the client host and can access the files of their era from the server by just
logging onto the server.
The server can be made secure by putting a password. Only the concerns will have the
username and password to access it. The port used here is 21. As per rights granted to
the clients, they can also create a copy, modify and delete the files on the server and
from the server.
It is used by the e-mail server for sending and receiving messages, but the client host-
based application only uses it for sending messages to the mail server. For receiving
purposes, they use POP3 or IMAP.
It is a TCP/IP application layer protocol and the TCP port used by the mail servers is 25
while the mail clients use the port 587 or 465 for communication.
The outlook mail system of Microsoft system, Gmail and Yahoo mail, deploy SMTP for
sending and retrieving emails from the exterior world whereas for interior mail exchange
between their respective systems they use their own protocols.