Introduction To Name Resolution: Netbios
Introduction To Name Resolution: Netbios
Introduction To Name Resolution: Netbios
In computer systems, name resolution refers to the retrieval of the underlying numeric values
corresponding to computer hostnames, account user names, group names, and other named
entities.
Computer operating systems commonly employ multiple key/value lists that associate easily
remembered names with the integer numbers used to identify users, groups, other computers,
hardware devices, and other entities. In that context, name resolution refers to the retrieval of
numeric values given the associated names, while Reverse name resolution refers to the
opposite process of finding the name(s) associated with specified numeric values:
With the advent of larger networks the text based hosts and lmhosts files became large,
unwieldy and required too much maintenance. With the advent of dynamically assigned
IP addresses, IP to name mappings took on a transient nature with the possibility of IP
addresses changing on a weekly basis. The days of the host/lmhost file’s were
numbered as the primary tool of name resolution.
NetBIOS
Microsoft developed a system for name resolution for small networks called NetBIOS
where a broadcast with the required computer name was sent to all computers on the
network segment. All the computers received the request but only the named machine
responded. This system was easy to use because it was self-configuring and required
no maintenance. However with larger, routed networks NetBIOS fell down as the
broadcast would not be passed by a router. Using NetBIOS broadcasts restricted a
machine to resources on it’s own network segment.
Microsoft developed the Windows Internet Naming Service (WINS) to overcome this
problem of broadcasts not being passed by routers. Every machine is given the IP
address of a WINS server in its network properties. When the machine boots up it sends
the WINS server its IP address along with its NetBIOS name.
WINS
The WINS server stores these entries in the wins.mdb database file. Name resolution
queries are sent to the WINS server which then searches the wins.mdb, resolves the
query and then sends the details back to the client. This removes the need of a NetBIOS
broadcast
Because the client can send the NetBIOS query directly to the WINS server and the
WINS server sends the result direct to the client by IP address. The packets will also
pass over a router.
NetBIOS
NetBIOS is still used to provide name resolution for certain applications and for
workgroups that do not utilize the Domain Naming Service (DNS) covered next.
NetBIOS allows network browsing via my network places, computers near me or
Microsoft Windows Network. Any name to IP address mappings resolved by NetBIOS
are stored on the local machine in a cache file to speed up access to that resource in the
future. NetBIOS is enabled by default but can be disabled. This improves network
security by removing the ability to view the contents of the network by browsing. The
disadvantage of this is the inability to view the contents of the network by browsing and
the fact that the network loses a backup name resolution service.
Resource contention
In computer science, resource contention is a conflict over access to a shared
resource such as random access memory, disk storage, cache memory,
internal buses or external network devices. A resource experiencing ongoing
contention can be described as oversubscribed.
Resolving resource contention problems is one of the basic functions of operating
systems. Various low-level mechanisms can be used to aid this,
including locks, semaphores, mutexes and queues. The other techniques that can be
applied by the operating systems include intelligent scheduling, application mapping
decision, and page coloring.[1][2]
Access to resources is also sometimes regulated by queuing; in the case of
computing time on a CPU the controlling algorithm of the task queue is called
a scheduler.
Failure to properly resolve resource contention problems may result in a number of
problems, including deadlock, livelock, and thrashing.
Resource contention results when multiple processes attempt to use the same
shared resource. Access to memory areas is often controlled by semaphores, which
allows a pathological situation called a deadlock, when
different threads or processes try to allocate resources already allocated by each
other. A deadlock usually leads to a program becoming partially or completely
unresponsive.
In recent years, research on the contention is more focused on the resources in
the memory hierarchy, e.g., last-level caches, front-side bus, memory socket
connection.
As shown in the above diagram, the TCP/IP model has 4 layers, while the OSI model
consists of 7 layers. Diagrammatically, it looks that the 4 layers of the TCP/IP model
exactly fit the 7 layers of the OSI model, but this is not reality. The application layer of
the TCP/IP model maps to the first three layers, i.e., application, session, and
presentation layer of the OSI model. The transport layer of the TCP maps directly to the
transport layer of the OSI model. The internet layer of the TCP/IP model maps directly to
the network layer of the OSI model. The last two layers of the OSI model map to the
network layer of the TCP/IP model. TCP/IP is the most widely used model as compared
to the OSI model for providing communication between computers over the internet.
Both the models are the logical models and having similar architectures as both the
models are constructed with the layers.
o Define standards
Both the layers have defined standards, and they also provide the framework used for
implementing the standards and devices.
Both models have simplified the troubleshooting process by breaking the complex
function into simpler components.
o Pre-defined standards
The standards and protocols which are already pre-defined; these models do not
redefine them; they just reference or use them. For example, the Ethernet standards
were already defined by the IEEE before the development of these models; instead of
recreating them, models have used these pre-defined standards.
The function which is performed between the 'presentation' and the 'network' layer is
similar to the function performed at the transport layer.
1. OSI is a generic, protocol independent standard, acting as a 1. TCP/IP model is based on standard protocols around which the Internet has
communication gateway between the network and end user. developed. It is a communication protocol, which allows connection of hosts
over a network.
2. In OSI model the transport layer guarantees the delivery of 2. In TCP/IP model the transport layer does not guarantees delivery of packets
packets. Still the TCP/IP model is more reliable.
4. OSI model has a separate Presentation layer and Session 4. TCP/IP does not have a separate Presentation layer or Session layer.
layer.
5. Transport Layer is Connection Oriented. 5. Transport Layer is both Connection Oriented and Connection less.
6. Network Layer is both Connection Oriented and Connection 6. Network Layer is Connection less.
less.
7. OSI is a reference model around which the networks are built. 7. TCP/IP model is, in a way implementation of the OSI model.
Generally it is used as a guidance tool.
8. Network layer of OSI model provides both connection oriented 8. The Network layer in TCP/IP model provides connectionless service.
and connectionless service.
9. OSI model has a problem of fitting the protocols into the 9. TCP/IP model does not fit any protocol
model.
10. Protocols are hidden in OSI model and are easily replaced 10. In TCP/IP replacing protocol is not easy.
as the technology changes.
11. OSI model defines services, interfaces and protocols very 11. In TCP/IP, services, interfaces and protocols are not clearly separated. It is
clearly and makes clear distinction between them. It is protocol also protocol dependent.
independent.