INFORMATION TECHNOLOGY
ASSIGNMENT
NAME – Suraj Ramjanak Barai
COURSE – SYBMS
DIV – D
ROLL NO. – 232401254
DNS and TCP/IP Models
DNS (Domain Name System)
Purpose:
DNS translates human-friendly domain names (like www.example.com) into IP
addresses (like 192.0.2.1) that computers use to identify each other on the network.
How it Works:
1. DNS Query Process:
o When you type a domain name into your browser, the browser first checks if it
has the IP address cached. If not, it sends a DNS query to a DNS resolver
(usually provided by your ISP).
o The DNS resolver checks its cache. If it doesn't have the IP address, it sends a
query to one of the root DNS servers.
2. Root DNS Servers:
o Root DNS servers provide the IP addresses of top-level domain (TLD) servers
(e.g., .com, .org).
3. TLD DNS Servers:
o TLD servers provide the IP addresses of authoritative DNS servers for the
specific domain.
4. Authoritative DNS Servers:
o These servers hold the DNS records for the domain. They return the IP address
of the domain to the DNS resolver.
5. Returning the IP Address:
o The DNS resolver caches the IP address and returns it to your browser, which
then connects to the web server using this IP address.
Types of DNS Records:
A Record: Maps a domain name to an IPv4 address.
AAAA Record: Maps a domain name to an IPv6 address.
CNAME Record: Alias of one domain name to another.
MX Record: Specifies mail servers for a domain.
TXT Record: Holds arbitrary text, often used for verification purposes.
TCP/IP Model
Overview:
The TCP/IP model is the foundation of internet communication. It’s designed to
ensure reliable, end-to-end communication across diverse networks.
Layers of the TCP/IP Model:
1. Application Layer:
o Protocols: HTTP (web), FTP (file transfer), SMTP (email), DNS (domain
resolution), and more.
o Function: Provides network services to applications and users. It interacts
with the user and provides services like browsing the web or sending emails.
2. Transport Layer:
o Protocols:
TCP (Transmission Control Protocol): Ensures reliable, ordered,
and error-checked delivery of data between applications. It establishes
a connection using a three-way handshake (SYN, SYN-ACK, ACK)
and manages data flow.
UDP (User Datagram Protocol): Provides a connectionless
communication method that’s faster but without guarantees for
delivery, order, or error checking.
o Function: Manages end-to-end communication and error recovery. It’s
responsible for data segmentation and reassembly.
3. Internet Layer:
o Protocol: IP (Internet Protocol)
IPv4: Uses 32-bit addresses, providing around 4.3 billion unique
addresses.
IPv6: Uses 128-bit addresses, providing a vastly larger address space
to accommodate the growing number of devices.
o Function: Handles packet routing and addressing. Each packet is encapsulated
with a source and destination IP address for proper delivery.
4. Link Layer:
o Protocols: Ethernet (wired networks), Wi-Fi (wireless networks), and more.
o Function: Deals with the physical transmission of data over network
interfaces and the interaction with network hardware. It includes framing
packets for transmission and managing hardware addresses (MAC addresses).
Internet, Intranet, and Extranet
Internet
Definition:
The Internet is a vast, global network that connects millions of private, public,
academic, business, and government networks. It uses the TCP/IP protocol suite to
link devices worldwide.
Access:
Publicly accessible to anyone with an internet connection. It allows for browsing,
email, file sharing, and various other services.
Components:
Web Servers: Host websites and web applications.
ISPs (Internet Service Providers): Provide access to the Internet.
DNS Servers: Resolve domain names to IP addresses.
Intranet
Definition:
An intranet is a private network used within an organization. It uses similar
technologies to the Internet but is restricted to authorized users.
Access:
Restricted to the organization’s employees or members. Access is controlled through
internal security measures, such as firewalls and authentication systems.
Components:
Internal Web Servers: Host company-specific applications and information.
Internal Email Systems: Handle communication within the organization.
File Servers: Store and share files within the organization.
Extranet
Definition:
An extranet is an extension of an intranet that allows external partners, vendors, or
customers to access certain parts of an organization’s internal network.
Access:
Controlled and secured access for external parties. Typically requires authentication
and sometimes VPN (Virtual Private Network) connections.
Components:
Secure Access Points: Provide controlled entry points for external users.
Shared Resources: Specific applications or data that are shared with external parties.
Security Measures: Include authentication mechanisms, encryption, and access
controls.
Configuring a Simple Network
Components:
Router: Connects different networks (e.g., LAN to WAN). Manages IP addressing
and routing.
Switch: Connects devices within a local network. Operates at Layer 2 (Data Link) of
the OSI model and uses MAC addresses to forward data.
Devices: Computers, servers, printers, etc., connected to the network.
Steps:
1. Physical Setup:
o Connect the Router to the Internet: Plug the router’s WAN (Wide Area
Network) port into your Internet service provider’s modem.
o Connect the Switch to the Router: Use an Ethernet cable to connect the
router’s LAN (Local Area Network) port to the switch.
o Connect Devices to the Switch: Use Ethernet cables to connect devices to the
switch.
2. IP Address Configuration:
o Router: Configure the router’s DHCP server to assign IP addresses to devices
automatically or set static IP addresses.
o Devices: Ensure devices are set to obtain IP addresses automatically (via
DHCP) or configure them with static IP addresses within the router’s subnet.
3. Service Configuration:
o HTTP (Web Service):
Install a web server (e.g., Apache, Nginx) on a server.
Configure the server to listen on port 80 for HTTP or port 443 for
HTTPS.
o FTP (File Transfer):
Install an FTP server (e.g., vsftpd, FileZilla Server) on a server.
Configure the server to listen on port 21.
o SMTP (Email):
Install an SMTP server (e.g., Postfix, Exim) for handling outgoing
emails.
Configure the server to listen on port 25.
4. Security Configuration:
o Firewall: Configure firewall rules on the router to allow or block traffic to
specific ports or IP addresses.
o Access Controls: Set up user permissions and access controls on the web
server, FTP server, and email server.
o Encryption: Implement SSL/TLS for secure HTTP connections (HTTPS) and
consider using encryption for FTP and email communications.
5. Testing and Troubleshooting:
o Ping Test: Use ping to verify connectivity between devices.
o Traceroute: Use tracert (Windows) or traceroute (Linux/Mac) to trace the
path packets take to their destination.
o Port Scanning: Use tools like nmap to check open ports on servers.
By understanding and configuring these components and protocols, you’ll have a well-
rounded grasp of basic network setup and operation.