The document discusses several common computer network protocols: SNMP, FTP, SMTP, Telnet, DNS, POP, and HTTP. For each protocol, it provides 2-4 sentences describing the protocol's function, how it works, commonly used ports, and other key details. The document aims to educate the reader about the purpose and basic operation of these fundamental networking standards.
The document discusses several common computer network protocols: SNMP, FTP, SMTP, Telnet, DNS, POP, and HTTP. For each protocol, it provides 2-4 sentences describing the protocol's function, how it works, commonly used ports, and other key details. The document aims to educate the reader about the purpose and basic operation of these fundamental networking standards.
The document discusses several common computer network protocols: SNMP, FTP, SMTP, Telnet, DNS, POP, and HTTP. For each protocol, it provides 2-4 sentences describing the protocol's function, how it works, commonly used ports, and other key details. The document aims to educate the reader about the purpose and basic operation of these fundamental networking standards.
The document discusses several common computer network protocols: SNMP, FTP, SMTP, Telnet, DNS, POP, and HTTP. For each protocol, it provides 2-4 sentences describing the protocol's function, how it works, commonly used ports, and other key details. The document aims to educate the reader about the purpose and basic operation of these fundamental networking standards.
SNMP FTP SMTP Telnet DNS POP HTTP 1/ SNMP Simple network management protocol
SNMP is widely used in network management for network
monitoring. SNMP exposes management data in the form of variables on the managed systems organized in a management information base (MIB) which describe the system status and configuration. These variables can then be remotely queried (and, in some circumstances, manipulated) by managing applications. Three significant versions of SNMP have been developed and deployed. SNMPv1 is the original version of the protocol. More recent versions, SNMPv2c and SNMPv3, feature improvements in performance, flexibility and security. SNMP is a component of the Internet Protocol Suite as defined by the Internet Engineering Task Force (IETF). It consists of a set of standards for network management, including an application layer protocol, a database schema, and a set of data objects. 2/ FTP File Transfer Protocol FTP The File Transfer Protocol is the most widely used protocol for file transfer over the network. FTP uses TCP/IP for communication and it works on TCP port 21. FTP works on Client/Server Model where a client requests file from Server and server sends requested resource back to the client. FTP uses out-of-band controlling i.e. FTP uses TCP port 20 for exchanging controlling information and the actual data is sent over TCP port 21.The client requests the server for a file. When the server receives a request for a file, it opens a TCP connection for the client and transfers the file. After the transfer is complete, the server closes the connection. For a second file, client requests again and the server reopens a new TCP connection. 3/ SMTP Simple Mail Transfer Protocol SMTP The Simple Mail Transfer Protocol is used to transfer electronic mail from one user to another. This task is done by means of email client software (User Agents) the user is using. User Agents help the user to type and format the email and store it until internet is available. When an email is submitted to send, the sending process is handled by Message Transfer Agent which is normally comes inbuilt in email client software. Message Transfer Agent uses SMTP to forward the email to another Message Transfer Agent (Server side). While SMTP is used by end user to only send the emails, the Servers normally use SMTP to send as well as receive emails. SMTP uses TCP port number 25 and 587.Client software uses Internet Message Access Protocol (IMAP) or POP protocols to receive emails. 4/ Telnet Terminal Network Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines. Telnet follows a user command Transmission Control Protocol/Internet Protocol (TCP/IP) networking protocol for creating remote sessions. On the web, Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP) simply enable users to request specific files from remote computers, while, through Telnet, users can log on as a regular user with the privileges they are granted to the specific applications and data on that computer. 4/ Telnet Terminal Network How Telnet works Telnet is a type of client-server protocol that can be used to open a command line on a remote computer, typically a server. Users can utilize this tool to ping a port and find out whether it is open. Telnet works with what is called a virtual terminal connection emulator, or an abstract instance of a connection to a computer, using standard protocols to act like a physical terminal connected to a machine. FTP may also be used along with Telnet for users working to send data files. Users connect remotely to a machine using Telnet, sometimes referred to as Telnet ting into the system. They are prompted to enter their username and password combination to access the remote computer, which enables the running of command lines as if logged in to the computer in person. Despite the physical location of users, their IP address will match the computer logged in to rather than the one physically used to connect. 4/ Telnet Terminal Network Uses of Telnet that can be used for a variety of activities on a server, including editing files, running various programs and checking email. Some servers enable remote connections using Telnet to access public data to play simple games or look up weather reports. Many of these features exist for nostalgic fun or because they still have compatibility with older systems that need access to specific data. Users are also able to connect to any software that utilizes text-based, unencrypted protocols via Telnet, from web servers to ports. Users can open a command prompt on the remote machine, type the word Telnet and the remote machine's name or IP address, and the Telnet connection will ping the port to see if it is open or not. An open port will show a blank screen, while an error message that says the port is connecting means that it is closed. 4/ Telnet Terminal Network Security Telnet is not a secure protocol and is unencrypted. By monitoring a user's connection, anyone can access a person's username, password and other private information that is typed over the Telnet session in plaintext. With this information, access can be gained to the user's device. 5/ DNS Domain Name System DNS Domain Name System works on Client Server model. It uses UDP protocol for transport layer communication. DNS uses hierarchical domain based naming scheme. DNS server is configured with Fully Qualified Domain Names (FQDN) and email addresses mapped with their respective Internet Protocol addresses. DNS server is requested with FQDN and it responds back with the IP address mapped with it. DNS uses UDP port 53. 6/ POP Post Office Protocol POP Post Office Protocol version 3 (POP 3) is a simple mail retrieval protocol used by User Agents (client email software) to retrieve mails from mail server. When a client needs to retrieve mails from server, it opens a connection with the server on TCP port 110. User can then access his mails and download them to the local computer. POP3 works in two modes. The most common mode the delete mode, is to delete the emails from remote server after they are downloaded to local machines. The second mode, the keep mode, does not delete the email from mail server and gives the user an option to access mails later on mail server. 7/ HTTP Hypertext Transfer Protocol
HTTP Hyper Text Transfer Protocol is the foundation of
World Wide Web. HTTP is the means of communication between devices and Web Servers Through it, the user opens websites on the Internet HTTP is well organized documentation system which uses hyperlinks to link the the pages in the text documents. HTTP works on client server model. When a user wants to access any HTTP page on the internet, the client machine at user end initiates a TCP connection to server on port 80. When the server accepts the client request, the client is authorized to access web pages. 7/ HTTP Hypertext Transfer Protocol
To access the web pages, a client normally uses web
browsers, who are responsible for initiating, maintaining, and closing TCP connections. HTTP is a stateless protocol, which means the Server maintains no information about earlier requests by clients. HTTP versions HTTP 1.0 uses non persistent HTTP. At most one object can be sent over a single TCP connection. HTTP 1.1 uses persistent HTTP. In this version, multiple objects can be sent over a single TCP connection. Activity
Write the function of each of the following
protocols:- SNMP FTP SMTP Telnet DNS POP HTTP Thank you