Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CHAPTER7 Computer Network Protocols

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Themes of the lecture

computer network protocols

TCP\IP

 By studying some network


protocols
 Study some network protocols

 SNMP
 FTP
 SMTP
 Telnet
 DNS
 POP
 HTTP
1/ SNMP
Simple network management protocol

 SNMP is widely used in network management for network


monitoring.
 SNMP exposes management data in the form of variables on the
managed systems organized in a management information base
(MIB) which describe the system status and configuration. These
variables can then be remotely queried (and, in some
circumstances, manipulated) by managing applications.
 Three significant versions of SNMP have been developed and
deployed.
 SNMPv1 is the original version of the protocol. More recent
versions, SNMPv2c and SNMPv3, feature improvements in
performance, flexibility and security.
 SNMP is a component of the Internet Protocol Suite as defined by
the Internet Engineering Task Force (IETF). It consists of a set of
standards for network management, including an application
layer protocol, a database schema, and a set of data objects.
2/ FTP
File Transfer Protocol
 FTP The File Transfer Protocol is the most widely used protocol
for file transfer over the network.
 FTP uses TCP/IP for communication and it works on TCP port 21.
 FTP works on Client/Server Model where a client requests file
from Server and server sends requested resource back to the
client.
 FTP uses out-of-band controlling i.e.
 FTP uses TCP port 20 for exchanging controlling information and
the actual data is sent over TCP port 21.The client requests the
server for a file.
 When the server receives a request for a file, it opens a TCP
connection for the client and transfers the file. After the transfer
is complete, the server closes the connection. For a second file,
client requests again and the server reopens a new TCP
connection.
3/ SMTP
Simple Mail Transfer Protocol
 SMTP The Simple Mail Transfer Protocol is used to transfer
electronic mail from one user to another. This task is done by
means of email client software (User Agents) the user is using.
 User Agents help the user to type and format the email and store
it until internet is available.
 When an email is submitted to send, the sending process is
handled by Message Transfer Agent which is normally comes
inbuilt in email client software.
 Message Transfer Agent uses SMTP to forward the email to
another Message Transfer Agent (Server side).
 While SMTP is used by end user to only send the emails, the
Servers normally use SMTP to send as well as receive emails.
SMTP uses TCP port number 25 and 587.Client software uses
Internet Message Access Protocol (IMAP) or POP protocols to
receive emails.
4/ Telnet
Terminal Network
 Telnet is a network protocol used to virtually access a
computer and to provide a two-way, collaborative and
text-based communication channel between two
machines.
 Telnet follows a user command Transmission Control
Protocol/Internet Protocol (TCP/IP) networking
protocol for creating remote sessions. On the web,
Hypertext Transfer Protocol (HTTP) and File Transfer
Protocol (FTP) simply enable users to request specific
files from remote computers, while, through Telnet,
users can log on as a regular user with the privileges
they are granted to the specific applications and data
on that computer.
4/ Telnet
Terminal Network
 How Telnet works
 Telnet is a type of client-server protocol that can be used to open
a command line on a remote computer, typically a server. Users
can utilize this tool to ping a port and find out whether it is open.
 Telnet works with what is called a virtual terminal connection
emulator, or an abstract instance of a connection to a computer,
using standard protocols to act like a physical terminal connected
to a machine. FTP may also be used along with Telnet for users
working to send data files.
 Users connect remotely to a machine using Telnet, sometimes
referred to as Telnet ting into the system. They are prompted to
enter their username and password combination to access the
remote computer, which enables the running of command lines
as if logged in to the computer in person. Despite the physical
location of users, their IP address will match the computer logged
in to rather than the one physically used to connect.
4/ Telnet
Terminal Network
 Uses of Telnet that can be used for a variety of activities on
a server, including editing files, running various programs
and checking email.
 Some servers enable remote connections using Telnet to
access public data to play simple games or look up weather
reports. Many of these features exist for nostalgic fun or
because they still have compatibility with older systems
that need access to specific data.
 Users are also able to connect to any software that utilizes
text-based, unencrypted protocols via Telnet, from web
servers to ports. Users can open a command prompt on
the remote machine, type the word Telnet and the remote
machine's name or IP address, and the Telnet connection
will ping the port to see if it is open or not. An open port
will show a blank screen, while an error message that says
the port is connecting means that it is closed.
4/ Telnet
Terminal Network
 Security
 Telnet is not a secure protocol and is
unencrypted.
 By monitoring a user's connection,
anyone can access a person's username,
password and other private information
that is typed over the Telnet session in
plaintext. With this information, access
can be gained to the user's device.
5/ DNS
Domain Name System
 DNS Domain Name System works on Client
Server model. It uses UDP protocol for transport
layer communication. DNS uses hierarchical
domain based naming scheme.
 DNS server is configured with Fully Qualified
Domain Names (FQDN) and email addresses
mapped with their respective Internet Protocol
addresses.
 DNS server is requested with FQDN and it
responds back with the IP address mapped with
it.
 DNS uses UDP port 53.
6/ POP
Post Office Protocol
 POP Post Office Protocol version 3 (POP 3) is a
simple mail retrieval protocol used by User Agents
(client email software) to retrieve mails from mail
server.
 When a client needs to retrieve mails from server, it
opens a connection with the server on TCP port 110.
User can then access his mails and download them
to the local computer.
 POP3 works in two modes. The most common
mode the delete mode, is to delete the emails from
remote server after they are downloaded to local
machines. The second mode, the keep mode, does
not delete the email from mail server and gives the
user an option to access mails later on mail server.
7/ HTTP
Hypertext Transfer Protocol

 HTTP Hyper Text Transfer Protocol is the foundation of


World Wide Web.
 HTTP is the means of communication between devices and
Web Servers
Through it, the user opens websites on the Internet
 HTTP is well organized documentation system which uses
hyperlinks to link the
the pages in the text documents.
 HTTP works on client server model. When a user wants to
access any HTTP page on the internet, the client machine
at user end initiates a TCP connection to server on port 80.
When the server accepts the client request, the client is
authorized to access web pages.
7/ HTTP
Hypertext Transfer Protocol

 To access the web pages, a client normally uses web


browsers, who are responsible for initiating,
maintaining, and closing TCP connections.
 HTTP is a stateless protocol, which means the Server
maintains no information about earlier requests by
clients.
 HTTP versions HTTP 1.0 uses non persistent HTTP. At
most one object can be sent over a single TCP
connection.
 HTTP 1.1 uses persistent HTTP. In this version,
multiple objects can be sent over a single TCP
connection.
Activity

Write the function of each of the following


protocols:-
 SNMP
 FTP
 SMTP
 Telnet
 DNS
 POP
 HTTP
Thank you

You might also like