Software Engineering
Software Engineering
In the above
diagram each
subtree
represents a
domain. Each domain can be partitioned into sub domains and these
can be further partitioned and so on.
FQDN- Fully Qualified domain name
• If label is terminated by a null string (dot)
PQDN-partially qualified domain name
• It does not reach the root.
• Resolver supplies the missing part called suffix to create FQDN
Resolution
• Mapping a name to an address is called name-address resolution.
• DNS is designed as a client-server application.
• A host that needs to map an address to a name or a name
• to an address calls a DNS client called a resolver.
• The resolver accesses the closest DNS server with a mapping request.
• If the server has the information, it satisfies the resolver; otherwise, it
either refers the resolver to other servers or asks other servers to
provide the information.
• A resolution can be either recursive or iterative
Recursive resolution - application program on the source host
calls DNS resolver (client) to find IP address of destination
host. The resolver does not know, sends the query to local
DNS server
Encapsulation
• DNS can use either UDP or TCP.
• In both cases the well-known port used by the server is port 53.
• UDP is used when the size of the response message is less than 512
bytes because most UDP packages have a 512-byte packet size limit.
• If the size of the response message is more than 512
• bytes, a TCP connection is used.
DDNS-Dynamic Domain Name System
• When the DNS was designed, no one predicted that there would be
so many address changes.
• In DNS, when there is a change, such as adding a new host, removing
a host, or changing an IP address, the change must be made to the
DNS master file.
• These types of changes involve a lot of manuals updating. The size of
today’s Internet does not allow for this kind of manual operation.
Security of DNS
o DNS messages
o need to be confidential
o prevented using
o message origin authentication
o Provision against denial-of-service attack
o To protect DNS, DNS Security (DNSSEC) is devised that provides
message origin authentication and message integrity using digital
service
o However, DNSSEC does not provide confidentiality and specific
protection against denial-of-service attack.
Email
Electronic mail (or e-mail) allows users to exchange messages.
In the case of electronic mail, the implementation of client
server paradigm is different.
First, e-mail is considered a one-way transaction. When Alice sends an
e-mail to Bob, she may expect a response, but this is not a mandate.
If he responds, it is another one-way transaction
Users run only client programs when they want and the intermediate
servers apply client-server paradigm
E-mail address- User mailbox (or local part-mail received is stored for
retrieval by MAA)
-Mail Servers or Exchangers (domain name)
SMTP responses 2
EXAMPLE
Message Access Agent: POP3(Post Office Protocol) and IMAP4
(Internet Mail Access Protocol)
The first and second stages of mail delivery use SMTP.
However, SMTP is not involved in the third stage because SMTP is a
push protocol; it pushes the message from the
client to the server.
On the other hand, the third stage needs a pull protocol;
the client must pull messages from the server.
The third stage uses a message access agent.
POP3 (version 3)-client POP3 software installed at recipient
computer; server POP3 installed at mail server
Mail access starts with client when the user needs to download its
email from the mailbox on the mail server
Client opens a connection to the server on TCP port 110
IMAP4 (Internet Mail Access Protocol, version 4) – TCP PORT
NUMBER 143
It has more features than POP3
It is more powerful and more complex
Extra functions
➢ User can check email header prior to downloading
➢ User can search contents of email for a specific string of characters
prior to downloading
➢ User can partially download email
➢ User can create, delete, rename mailboxes on mail
➢ server
➢ User can create a hierarchy of mailboxes in a folder for email storage
E-Mail Security
The protocol does not provide any security provisions perse.
However, e-mail exchanges can be secured using two application-layer
securities designed in particular for e-mail systems.
Two of these protocols, Pretty Good Privacy (PGP) and
Secure/Multipurpose Internet Mail Extensions (S/MIME)
TELNET – TErminal NETwork (remote logging application)
(RFC’s 854, 855, 856, 1041, 1091, 1372, 1572)
A server program can provide a specific service to its corresponding
client program.
Although TELNET requires a logging name and password, it is
vulnerable to hacking because it sends all data including the password
in plaintext (not encrypted).
TELNET is replaced by SSH (Secure shell) but network administrators
often use TELNET for diagnostic and debugging purposes
Local versus remote logging
Since TCP is not secured, SSH creates a secured channel on the top of
TCP
After secure channel is established, both server and client are
authenticated for each other
After authentication, SSH-CONN lets the client create multiple logical
channels over it
Applications
Although SSH is often thought of as a replacement for TELNET, SSH is,
in fact, a general-purpose protocol that provides a secure connection
between a client and server.
• SSH for Remote Logging
• SSH for File Transfer-Two applications
➢ SFTP (secure file transfer protocol)
➢ SCP (secure copy)
Port Forwarding- for securing FTP application
One of the interesting services provided by the SSH protocol is port
forwarding.
The SSH port forwarding mechanism creates a tunnel through which
the messages belonging to other protocols can travel. For this reason,
this mechanism is sometimes referred to as SSH tunnelling.