LO5 LAN PDF
Document Details
Tags
Summary
This document discusses LAN technology, learning outcomes, network protocols, and standards. It covers TCP/IP protocols, Internet protocols, and their functions, such as addressing, packet routing, and fragmentation. It also details various types of internet protocols.
Full Transcript
LOCAL AREA NETWORK TECHNOLOGY LEARNING OUTCOME 5: DESCRIBE THE FEATURES OF NETWORK PROTOCOLS AND STANDARDS TCP/IP PROTOCOLS: The TCP/IP protocol allows all applications to transfer and exchange data on diverse networks. The Internet Protocol (IP) is a fundamental communication protocol that enables...
LOCAL AREA NETWORK TECHNOLOGY LEARNING OUTCOME 5: DESCRIBE THE FEATURES OF NETWORK PROTOCOLS AND STANDARDS TCP/IP PROTOCOLS: The TCP/IP protocol allows all applications to transfer and exchange data on diverse networks. The Internet Protocol (IP) is a fundamental communication protocol that enables data packets to be routed across networks. It has two main functions: 1. Addressing: IP provides unique addresses to each device connected to a network. These addresses, called IP addresses, are used to identify the source and destination of data packets. 2. Packet Routing: IP determines the best path for data packets to travel from the source to the destination. It looks at the IP addresses in the packets and consults routing tables to forward the packets to the correct destination. For example, suppose you want to send an email from your computer to a friend's computer. The IP protocol assigns a unique IP address to your computer and your friend's computer. When you hit send, your email is divided into small packets, each containing the source and destination IP addresses. The IP protocol then ensures that these packets are routed correctly over the internet, reaching your friend's computer. Without IP, computers would not be able to communicate with each other across networks. Internet Protocol Functions Apart from connecting two different servers so that they can communicate easily, internet protocols also have other functions, including: Fragmentation: The process of dividing information into data packets characterized by a sequence of multiple PDUs (Protocol Data Units) with varying size limits. Encapsulation: Complementary information that is sent along with correction codes, addresses, and so on. Then, the data will be PDU-controlled and sent in a blog. Transmission Service: Provides services such as data communication, security, and prioritization. Connection Control: Connects the transistor to the receiver to send data and terminate communication. Reassembly: The process of returning a data packet from the receiver so that it becomes a complete package. Flow Control: Limits the amount of data sent through the stop-and-wait feature. Error Control: Monitors the data transmission process for errors. Problematic data packets will be discarded immediately. Types of Internet Protocols There are 11 types of internet protocols which are: 1. Hypertext Transfer Protocol (HTTP): The first type of internet protocol is HTTP which is an internet protocol for data transfer on the World Wide Web (WWW), especially when creating websites. This protocol is responsible for translating messages so that they can be sent and responded to, either by the server or client. 2. Hypertext Transfer Protocol Secure (HTTPS): HTTPS is a more secure IP than HTTP, where this type protects the confidentiality of user data when they access a website. 3. Domain Name System (DNS): This type looks up computer names on networks that use TCP/IP. Generally, DNS is used in applications that are connected to the internet. 4. File Transfer Protocol (FTP): FTP is a standard protocol that functions to transfer computer files between machines on the internet network. In addition, FTP also downloads and uploads computer files between clients and FTP servers. 5. Simple Mail Transfer Protocol (SMTP): SMTP is commonly used to send marketing emails from clients to mail servers, send emails to local accounts, and broadcast emails between SMTP servers. 6. Dynamic Host Configuration Protocol (DHCP): This protocol is based on client architecture and is used to allocate internet protocol addresses in a network. Since DHCP is standalone, other DHCP servers on the same network will not be replicated to other DHCP servers. 7. User Datagram Protocol (UDP): Another example of internet protocol is UDP which functions to support unreliable communication and communication that does not use connections between hosts on a network with TCP/IP. 8. Secure Shell (SSH): This type functions as a medium for remote data exchange between two or more computers more securely. The form of data exchange that generally occurs in SSH is sending or receiving files. 9. Internet Control Message Protocol (ICMP): This type serves to analyze the network on equipment connected to the internet network. If this protocol finds an error, such as the computer cannot be contacted or the unavailability of the requested service, ICMP will send an error message. 10. Secure Socket Layer (SSL): This type is known as a type of protocol with high-level encryption capabilities and a high level of security, especially for applications that require end-to-end encryption. 11. Internet Message Access Protocol (IMAP): The basic protocol in the process of retrieving and accessing email from the server. IMAP allows users to search, select, and delete email messages without exception. Internet Protocol Tasks Aside from the types and functions, you also need to know the tasks of internet protocols. Here are the tasks: Sending error messages if there is an error. Negotiating various relationship characteristics. Starting and ending sessions. Terminating a connection in an internet network. Calculating and determining the protocol delivery path. Perform the handshake process. Detect physical connections. What is Transmission Control Protocol (TCP)? TCP stands for Transmission Control Protocol. It is a transport layer protocol that facilitates the transmission of packets from source to destination. It is a connection-oriented protocol that means it establishes the connection prior to the communication that occurs between the computing devices in a network. This protocol is used with an IP protocol, so together, they are referred to as a TCP/IP. The main functionality of the TCP is to take the data from the application layer. Then it divides the data into a several packets, provides numbering to these packets, and finally transmits these packets to the destination. The TCP, on the other side, will reassemble the packets and transmits them to the application layer. As we know that TCP is a connection-oriented protocol, so the connection will remain established until the communication is not completed between the sender and the receiver. TFTP (Trivial File Transfer Protocol) TFTP stands for Trivial File Transfer Protocol. TFTP is defined as a protocol that is used to transfer a file from a client to a server and from a server to a client. TFTP is majorly used when no complex interactions are required by the client and server. The service of TFTP is provided by UDP (User Datagram Protocol) and works on port number 69. TFTP does not provide security features therefore it is not used in communications that take place over the Internet. Therefore it is used only for the systems that are set up on the local internet. TFTP requires less amount of memory. ARP stands for “Address Resolution Protocol”. It is a network protocol used to determine the MAC address (hardware address) from any IP address. In other words, ARP is used to mapping the IP Address into MAC Address. When one device wants to communicate with another device in a LAN (local area network) network, the ARP protocol is used. This protocol is used when a device wants to communicate with another device over a local area network or Ethernet. ARP is a network layer protocol. This is a very important protocol in the TCP/IP protocol suite. The Network Time Protocol (NTP) is an application layer protocol in the TCP/IP protocol suite. It is used to synchronize the clock between the client and the server to provide high-precision time correction. The NTP server receives accurate Coordinated Universal Time (UTC) from an authoritative clock source, such as an atomic clock or GPS. Then, the NTP client requests and receives time from the NTP server. NTP relies on User Datagram Protocol (UDP) port 123. Why Is Clock Synchronization Important? Accurate time is critical to the network for many reasons, for example: Network management: Analysis on logs collected from different network devices must be performed based on time. If the system time of different devices is inconsistent, accurately correlating log files between these devices is difficult, or even impossible. Billing system: Billing services must know the time accurately and require consistent time on all devices. If these requirements are not met, inaccurate billing will occur and result in doubts and complaints of users. Collaborative processing: When several systems work together to process the same complex event, they must use the same clock for reference to ensure correct sequencing of operations. System time: Some applications or services require accurate time to mark user login and transaction information to ensure event traceability. Telnet is a network protocol that allows a user to remotely access and control another computer over the Internet or local area network (LAN). It enables a user to establish a connection to a remote system and perform tasks as if they were sitting in front of that computer. It is a client-server protocol, which means that a client device initiates the connection to a server device. The client sends commands to the server, and the server responds with output, allowing the user to interact with the remote system’s command-line interface. It uses the Transmission Control Protocol as its underlying transport protocol. One of the key features of Telnet is that it is platform-independent, which means that it can be used to connect to a variety of different operating systems and computers. Therefore, it is a valuable tool for system administrators and developers who need to manage remote systems from different locations. What is POP3? Post Office Protocol Version 3 is known as POP 3. Access to the mail inbox that is kept on the email server is made possible via the POP3 protocol. Messages can be downloaded and deleted via POP3 protocol. The POP3 client may quickly retrieve all of the messages from the mail server after it has established a connection with it. Even when the user is not connected, they can still view the messages locally. The protocol does not inherently support real-time synchronization or automatic checking for new messages; users can configure their email clients to check for new messages at intervals or manually. Many email programs, including Apple Mail, Gmail, and Microsoft Outlook, support the POP3 protocol, although IMAP is often preferred for its synchronization features. What is IMAP? An application layer protocol called Internet Message Access Protocol (IMAP) functions as a contract to receive emails from the mail server. IMAP, which is currently on version IMAP4, was created by Mark Crispin in 1986 as a remote access mailbox protocol. It is the protocol that is most frequently used to retrieve emails. Interim mail access protocol, Interactive mail access protocol, and Internet mail access protocol are some other names for this phrase. IMAP contacts your email provider to obtain a copy of all of your recent messages. Once you download them to your Mac or PC, they are immediately deleted from the email service. Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is a set of network protocols that provide packet switching and sequencing for small and large networks. IPX works at layer three of the Open Systems Interconnection (OSI) model and SPX works at layer 4. IPX/SPX was designed as a Transmission Control Protocol/Internet Protocol (TCP/IP) alternative. These protocols share similarities but have slight differences. IPX/SPX is compatible with local area networks (LAN) or private networks and different communication protocol functions. For example, the Routing Information Protocol (RIP) function is used to route server information, which provides optimal data routing. SPX is connection-oriented and used for routing information and connection-related functions. Like IP, IPX is connectionless and contains end-user data, such as IP addresses. What is a Port Number? Networking protocols use port numbers that are based on the type of packet being sent and/or received. A network host typically runs many software packages/processes, so when it receives a packet it looks to the port number to identify which process should get it. How Do Port Numbers Work? All network-connected devices are affiliated with a port that’s been assigned a number. These port numbers are standardized, and each is reserved for certain protocols. Port identification numbers are used to ensure the correct information is being sent and received. For example, one port is used to send the packet, while another port is used to receive the data. All port numbers target a service or application and are reserved for certain protocols. Where Do Ports Fall Into the OSI Model? Ports are a concept of Layer 4 — the Transport Layer. Transport protocols such as TCP and UDP indicate the port that a packet should go to. What Are Well-Known/Systems Ports? Port numbers that fall into the category of well-known/system ports include numbers between 0 and 1023. IP protocols use them for TCP, UDP, Telnet, and FTP. These port numbers are only used by network admins, default applications, operating systems, and services. Users do not have access to this range of ports. What are Registered Port Numbers? The next range of port numbers after well-known ports includes ports 1024 through 49151. This range of ports is known as “Registered ports” because they are registered with the IANA (Internet Assigned Numbers Authority). Unlike well-known port numbers, registered port numbers are used by network users. What Are Dynamic/Private Port Numbers? The final range of port numbers falls between 49152 and 65535. Unlike well-known or registered port numbers, these ports can be used without any restriction. List of Common Ports and Protocols Port Service Name Description Protocol Number Ports FTP File Transfer Protocol TCP 20-21 Secure Shell; used for secure logins, file transfers, and port Port 22 SSH TCP forwarding TCP / Port 23 Telnet Telnet protocol; used for unencrypted text communications UDP Simple Mail Transfer Protocol, used for email routing Port 25 SMTP TCP between mail servers Domain Name System; translates 'host names' into IP TCP / Port 53 DNS addresses UDP Port 69 TFTP Trivial File Transfer Protocol UDP Hypertext Transfer Protocol; used for unencrypted web Port 80 HTTP TCP traffic TCP / Port 102 ISO-TSAP ISO Transport Service Access Point (TSAP) UDP Post Office Protocol; used to connect to a mail server to TCP / Port 110 POP3 retrieve emails UDP Port 123 NTP Network Time Protocol UDP DCE/RPC Endpoint Distributed Computing Environment / Remote Procedure TCP / Port 135 Mapper Call (DCE/RPC) Endpoint Mapper UDP TCP / Port 139 NetBIOS-ssn NetBIOS Session Service UDP Simple Network Management Protocol; agents TCP / Port 161 SNMP-agents communicate on this port UDP Ports 381 - HP Performance Data TCP / Collects performance data from managed nodes 383 Collector UDP TCP / Port 389 LDAP Lightweight Directory Access Protocol UDP Hypertext Transfer Protocol Secure; used for encrypted TCP / Port 443 HTTPS web traffic UDP Microsoft Directory Services; TCP used for AD and TCP / Port 445 Microsoft DS SMB Windows shares, UDP for SMB file-sharing UDP Used for changing or setting passwords in Kerberos-based TCP / Port 464 Kerberos authentication systems, such as Active Directory UDP Simple Mail Transfer Protocol; used to securely transmit Port 465 SMTP TCP mail messages from email clients to email servers. Syslog Protocol; for collecting and organizing all log files Port 514 syslog UDP sent from various devices on a network Simple Mail Transfer Protocol; used for email message Port 587 SMTP UDP submission Enables secure remote connections and function execution TCP / Port 593 RPC Mapper Service over HTTP. UDP Lightweight Directory Access Protocol (over SSL); used to TCP / Port 636 LDAP / LDAPS store data in the LDAP directory and authenticate users to UDP access the directory Microsoft Exchange Used by Microsoft Exchange servers to update routing Port 691 Routing Engine TCP tables for efficient message delivery. (RESvc) Used to manage your ESXi hosts and the virtual machines TCP / Port 902 VMware vSphere (VMs) that run on them UDP Internet Message Access Protocol; used to deliver and Port 993 IMAP manage messages on email servers on behalf of email TCP clients Post Office Protocol version 3 (over SSL); lets email users TCP / Port 995 POP3 download messages from an email server using an email UDP client Allows encrypted access to and management of databases Port 1433 Microsoft SQL Server TCP and servers Oracle client apps communicate with Oracle database Port 1521 Oracle Database TCP servers Port 3306 MySQL Used to connect with MySQL clients and utilities TCP Remote Desktop Allows client device to remotely access and control a Port 3389 TCP Protocol Windows desktop computer over this port Session Initiation Protocol; used to signal and control TCP / Port 5060 SIP communication sessions UDP VNC (Virtual Network Used for remote desktop sharing, allows a client to Port 5900 TCP Computing) remotely view and control another computer's desktop Ports TCP / BitTorrent Peer-to-peer file sharing 6881-6999 UDP Port 10000 Webmin Used for remote server communication and configuration TCP Used for remote administration; can be exploited for TCP / Port 12345 NetBus unauthorized access. UDP Used for remote control of servers by hacking tools and TCP / Port 31337 Back Orifice / ncat remote administration utilities UDP Network services refer to the applications or services that are hosted on a network to provide functionality for users or other applications. Dynamic Host Configuration Protocol What is DHCP? Dynamic Host Configuration Protocol (DHCP) is a network protocol used to automate the process of configuring devices on IP networks, thus allowing them to use network services such as DNS, NTP, and any communication protocol based on UDP or TCP. A DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks. DHCP is an enhancement of an older protocol called BOOTP. DHCP can be implemented on local networks as well as large enterprise networks. DHCP is the default protocol used by the most routers and networking equipment. DHCP is also called RFC (Request for comments) 2131. DHCP does the following: o DHCP manages the provision of all the nodes or devices added or dropped from the network. o DHCP maintains the unique IP address of the host using a DHCP server. o It sends a request to the DHCP server whenever a client/node/device, which is configured to work with DHCP, connects to a network. The server acknowledges by providing an IP address to the client/node/device. DHCP is also used to configure the proper subnet mask, default gateway and DNS server information on the node or device. There are many versions of DCHP are available for use in IPV4 (Internet Protocol Version 4) and IPV6 (Internet Protocol Version 6). How DHCP works DHCP runs at the application layer of the TCP/IP protocol stack to dynamically assign IP addresses to DHCP clients/nodes and to allocate TCP/IP configuration information to the DHCP clients. Information includes subnet mask information, default gateway, IP addresses and domain name system addresses. DHCP is based on client-server protocol in which servers manage a pool of unique IP addresses, as well as information about client configuration parameters, and assign addresses out of those address pools. The DHCP lease process works as follows: First of all, a client (network device) must be connected to the internet. DHCP clients request an IP address. Typically, client broadcasts a query for this information. DHCP server responds to the client request by providing IP server address and other configuration information. This configuration information also includes time period, called a lease, for which the allocation is valid. When refreshing an assignment, a DHCP clients request the same parameters, but the DHCP server may assign a new IP address. This is based on the policies set by the administrator. Components of DHCP When working with DHCP, it is important to understand all of the components. Following are the list of components: DHCP Server: DHCP server is a networked device running the DCHP service that holds IP addresses and related configuration information. This is typically a server or a router but could be anything that acts as a host, such as an SD-WAN appliance. DHCP client: DHCP client is the endpoint that receives configuration information from a DHCP server. This can be any device like computer, laptop, IoT endpoint or anything else that requires connectivity to the network. Most of the devices are configured to receive DHCP information by default. IP address pool: IP address pool is the range of addresses that are available to DHCP clients. IP addresses are typically handed out sequentially from lowest to the highest. Subnet: Subnet is the partitioned segments of the IP networks. Subnet is used to keep networks manageable. Lease: Lease is the length of time for which a DHCP client holds the IP address information. When a lease expires, the client has to renew it. DHCP relay: A host or router that listens for client messages being broadcast on that network and then forwards them to a configured server. The server then sends responses back to the relay agent that passes them along to the client. DHCP relay can be used to centralize DHCP servers instead of having a server on each subnet. Benefits of DHCP There are following benefits of DHCP: Centralized administration of IP configuration: DHCP IP configuration information can be stored in a single location and enables that administrator to centrally manage all IP address configuration information. Dynamic host configuration: DHCP automates the host configuration process and eliminates the need to manually configure individual host. When TCP/IP (Transmission control protocol/Internet protocol) is first deployed or when IP infrastructure changes are required. Seamless IP host configuration: The use of DHCP ensures that DHCP clients get accurate and timely IP configuration IP configuration parameter such as IP address, subnet mask, default gateway, IP address of DND server and so on without user intervention. Flexibility and scalability: Using DHCP gives the administrator increased flexibility, allowing the administrator to move easily change IP configuration when the infrastructure changes. Domain Name Services DNS is widely used and one of the essential services on which internet works. This system maps IP addresses to domain names, which are easier to remember and recall than IP addresses. Because network operates with the help of IP addresses and humans tend to remember website names, the DNS provides website’s IP address which is mapped to its name from the back-end on the request of a website name from the user. What is a DNS Server? A DNS server is a computer with a database containing the public IP addresses associated with the names of the websites an IP address brings a user to. DNS acts like a phonebook for the internet. Whenever people type domain names, like Fortinet.com or Yahoo.com, into the address bar of web browsers, the DNS finds the right IP address. The site’s IP address is what directs the device to go to the correct place to access the site’s data. Once the DNS server finds the correct IP address, browsers take the address and use it to send data to content delivery network (CDN) edge servers or origin servers. Once this is done, the information on the website can be accessed by the user. The DNS server starts the process by finding the corresponding IP address for a website’s uniform resource locator (URL). How Does DNS Work? In a usual DNS query, the URL typed in by the user has to go through four servers for the IP address to be provided. The four servers work with each other to get the correct IP address to the client. What is a domain name system (DNS) resolver? A DNS resolver is a crucial component of the internet that helps you to find the internet protocol (IP) address associated with a specific domain name. How does a DNS resolver work? When you type a domain name into your web browser, the DNS resolver takes that domain name and translates it into the corresponding internet protocol (IP) address. It does this by querying a series of DNS servers until it finds the IP address associated with the domain name. Why is a DNS resolver important? A DNS resolver is important because it allows you to access websites and other online services by using user-friendly domain names instead of having to remember the numerical internet protocol (IP) addresses associated with each website. What is the difference between a DNS resolver and a DNS server? A DNS server is a broader term that encompasses various types of servers involved in the DNS system. A DNS resolver is a specific type of DNS server responsible for translating domain names into internet protocol (IP) addresses. How do I set up a DNS resolver? You don't need to set up a DNS resolver yourself. Your internet service provider (ISP) usually provides a default DNS resolver that your device uses automatically. However, you can choose to configure a different DNS resolver if you prefer. Can I use a public DNS resolver instead of my internet service provider (ISP) resolver? Yes, you can use a public DNS resolver instead of your ISP's resolver. Public DNS resolvers, such as Google Public DNS or Cloudflare DNS, offer alternative options that some people find more reliable or faster than their ISP's resolver. How do I change the DNS resolver on my device? To change the DNS resolver on your device, you usually need to access the network settings. Look for the DNS settings section and enter the internet protocol (IP) address of the desired DNS resolver. This varies depending on the operating system you are using. What Is NAT? What is Network Address TranslationNAT stands for network address translation. It’s a way to map multiple private addresses inside a local network to a public IP address before transferring the information onto the internet. Organizations that want multiple devices to employ a single IP address use NAT, as do most home routers. If you’re connecting from your home right now, chances are your cable modem or DSL router is already providing NAT to your home. How Does NAT Work? Let’s say that there is a laptop connected to a home network using NAT. That network eventually connects to a router that addresses the internet. Suppose that someone uses that laptop to search for directions to their favorite restaurant. The laptop is using NAT. So, it sends this request in an IP packet to the router, which passes that request along to the internet and the search service you’re using. But before your request leaves your home network, the router first changes the internal IP address from a private local IP address to a public IP address. Your router effectively translates the private address you’re using to one that can be used on the internet, and then back again. Now you know that your humble little cable modem or DSL router has a little, automated translator working inside of it. If the packet keeps a private address, the receiving server won’t know where to send the information back to. This is because a private IP address cannot be routed onto the internet. If your router were to try doing this, all internet routers are programmed to automatically drop private IP addresses. The nice thing is, though, that all routers sold today for home offices and small offices can readily translate back and forth between private IP address and publicly-routed IP addresses. What are Private IP Addresses? As the internet became more popular years ago, the organization that manages IP addresses, known as the Internet Assigned Numbers Authority (IANA) realized that they needed to do something. So, they created a network address translation scheme. This scheme is described in a document called Request for Comments (RFC) 1918. This is just one document of thousands that define how the internet works. If you want to learn about NAT, this is the document that all router manufactures must implement. No matter what type of NAT you use, you will be using RFC 1918 addresses. If you were to try to send an RFC 1918 private IP address onto the internet, it would be much like sending a physical piece of mail with the return address of “anonymous,” yet requesting return service notification. If you were to try doing that with a snail mail service, you would never get that return service notification, because the service wouldn’t be able to tell where “anonymous” even is. Industrial control system (ICS) security focuses on ensuring the security and safe function of industrial control systems. This includes the hardware and software the system and its operators use. ICS usually refers to systems that manage and operate infrastructure-supporting functions like water, power, transportation, manufacturing, and other critical services. With the increased digitization of nearly all aspects of commercial and public business, these systems often depend on software, computers, endpoints, and networks—all of which have to be secured for the safety of the system, the people operating it, and those it serves. How ICS Security Works ICS security prioritizes the operation of machinery by ensuring the processes that support it are well-protected from cyber threats. The focus is on preventing incidents, but in some situations, when the safety of workers or the public is at risk after an event, employees may be able to call an ICS security number to get immediate assistance. ICS security also makes sure ICS management is efficient. This may involve ensuring full visibility into the operation of machinery on the production floor from within a control room or center with a series of dashboards that report critical information. Simple Network Management Protocol (SNMP) is a widely used protocol for network management that provides a standardized framework for monitoring and managing network devices such as routers, switches, servers, and printers. It operates within the application layer of the Internet protocol suite and allows network administrators to manage network performance, find and solve network problems, and plan for network growth. What is Simple Network Management Protocol (SNMP)? Simple Network Management Protocol (SNMP) is an Internet Standard protocol used for managing and monitoring network-connected devices in IP networks. SNMP is an application layer protocol that uses UDP port number 161/162.SNMP is used to monitor the network, detect network faults, and sometimes even to configure remote devices. VoIP VoIP phone systems offer competitive pricing, portability, and advanced features that streamline business communications and improve the customer experience. This introduction to VoIP covers what VoIP is and how it works, how it’s different from landline service, its pros and cons, key features to look for, the average cost of VoIP service, and how to choose the right VoIP phone system for your business. What is VoIP? VoIP (Voice over Internet Protocol) is a voice communications technology that makes and receives telephone calls over the Internet instead of the traditional wired analog network. Because VoIP phone systems are cloud-based, they don’t require extensive on-site installation, copper wiring, or bulky hardware like landlines do. VoIP phone systems are accessible on any device and in any location with a working broadband Internet connection. Therefore, VoIP users can make and receive softphone voice calls on desktop and laptop computers, smartphones, tablets, IP phones, or even on traditional landlines that connect to the VoIP network via analog telephone adapters (ATAs). VoIP is also known as Voice over IP, virtual telephony, a cloud phone, or an online phone system. What is WINS? Windows Internet Name Service (WINS) is a Microsoft Windows Service that effectively registers NetBIOS names of the computer on the local area network (LAN). NetBIOS ( Network Basic Input/Output System) is a communication service that allows different computers to interact with each other across a LAN. WINS works after a name registration process is followed to register the NetBIOS name to IP address mapping on the WINS server. The WINS system consists of two parts: the WINS server and TCP/IP client software. The WINS server looks after the central Jet Database, replication, and client registration. The TCP/IP client software manages the querying of the name server. You may face certain Wifi connection issues on your Windows due to a problem arising in NetBIOS name resolution in your router connection. WINS is the most viable solution to such problems in Routed networks that use NetBIOS. What's The Difference Between WINS Server And DNS Server? The difference between the WINS server and DNS server can be very minimal which may puzzle some users. But, they perform very different tasks. Thus, it is very important to know the difference between the two. WINS Server DNS server 1. WINS stands for Windows Internet Name Server. It is a 1. DNS stands for Domain Name System. It maps the Microsoft Windows Service that registers the NetBIOS domain names on the internet with IP addresses. name on the LAN. 2. NetBIOS in the old versions before Windows NT 4.0 2. Microsoft made changes in NetBIOS to use TCP/IP stack only worked in NetBEUI protocol. WINS is a very vital instead of NetBEUI transport protocol. Thus, DNS servers part to resolve name resolution issues arising in the can handle NetBIOS name requests now. Therefore, DNS NetBEUI protocol. has replaced WINS in the current Windows server. 3. For example, if you type the command "Net use * \tree 3. For example, if you type the command "Ping mainshare", it uses WINS to register the NetBIOS name Tree.space.net'', it uses DNA to register Tree.space.net to an "tree" to a LAN. Thus, WINS registers NetBIOS names to IP address. Thus, DNA registers TCP/IP host names to IP IP addresses. addresses.