OSI Layers and Protocols
OSI Layers and Protocols
OSI Layers and Protocols
Examples:
To trace the path to the host named www.google.co.in use following command
tracert www.google.co.in
Ping
Ipconfig
Displays all current TCP/IP network configuration values and refreshes Dynamic
Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. This
command is most useful on computers that are configured to obtain an IP address
automatically. This enables users to determine which TCP/IP configuration values
have been configured by DHCP, Automatic Private IP Addressing (APIPA), or an
alternate configuration.
Examples:
Displays and modifies entries in the Address Resolution Protocol (ARP) cache, which
contains one or more tables that are used to store IP addresses and their resolved
Ethernet or Token Ring physical addresses. There is a separate table for each Ethernet
or Token Ring network adapter installed on your computer.
Examples:
To display the ARP cache tables for all interfaces use following command
arp -a
Netstat
Displays active TCP connections, ports on which the computer is listening, Ethernet
statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP
protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over
IPv6 protocols).
Examples:
To display the ARP cache tables for all interfaces use following command
Netstate
Nbtstat
NetBIOS name tables for both the local computer and remote computers, and the
NetBIOS name cache. Nbtstat allows a refresh of the NetBIOS name cache and the
names registered with Windows Internet Name Service (WINS).
The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) are used to
transmit network data to and from server and client applications.
The File Transfer Protocol (FTP) is used to connect to remote computers, list
shared files, and either upload or download files between local and remote computers.
SSH File Transfer Protocol or SFTP is a network protocol that provides file transfer
and manipulation functionality over any reliable data stream.
TFTP is used when a file transfer does not require an acknowledgment packet during
file transfer. TFTP is used often in router configuration. TFTP is similar in operation
to FTP. TFTP is also a command-line-based utility.
SMTP is a standard electronic-mail protocol that handles the sending of mail from one
SMTP to another SMTP server. To accomplish the transport, the SMTP server has its
own MX (mail exchanger) record in the DNS database that corresponds to the domain
for which it is configured to receive mail.
SMTP uses TCP for communication and operates on port 25. Simple Mail Transfer
Protocol (SMTP) is the application-layer protocol used for transmitting e-mail
messages. SMTP is capable of receiving e-mail messages, but it's limited in its
capabilities. The most common implementations of SMTP are in conjunction with
either POP3 or IMAP4. For example, users download an e-mail message from a POP3
server, and then transmit messages via an SMTP server
HTTP is often called the protocol of the Internet. HTTP received this designation
because most Internet traffic is based on HTTP. When a user requests a Web resource,
it is requested using HTTP. The following is a Web request:
http://www.example.com
When a client enters this address into a Web browser, DNS is called to resolve the
Fully Qualified Domain Name (FQDN) to an IP address. When the address is
resolved, an HTTP get request is sent to the Web server. The Web server responds
with an HTTP send response. Such communication is done several times throughout a
single session to a Web site. HTTP uses TCP for communication between clients and
servers. HTTP operates on port 80.
HTTP is for Web sites using additional security features such as certificates. HTTPS
is used when Web transactions are required to be secure. HTTPS uses a certificate
based technology such as VeriSign.
Certificate-based transactions offer a mutual authentication between the client and the
server. Mutual authentication ensures the server of the client identity, and ensures the
client of the server identity. HTTPS, in addition to using certificate-based
authentication, encrypts all data packets sent during a session.
session, simply double-click the lock icon in the lower-right area of the Web browser.
HTTPS operates on port 443 and uses TCP for communication.
Post Office Protocol 3 (POP3) and Internet Message Access Protocol 4 (IMAP4) are
two application-layer protocols used for electronic messaging across the Internet.
A POP3 server receives an e-mail message and holds it for the user.
A POP3 client application periodically checks the mailbox on the server to
download mail.
POP3 does not allow a client to send mail, only to receive it. POP3 transfers e-
mail messages over TCP port 110.
Users can read their e-mail message locally in their e-mail client application, but they
can't send an e-mail message using IMAP4. When users access e-mail messages via
IMAP4, they have the option to view just the message header, including its title and
the sender's name, before downloading the body of the message.
Telnet
Many people use remote control applications to access computers at their workplace
from outside the network. In remote control, a session appears in which the user is
able to manage the files on the remote computer, although the session appears to be
functioning locally. Telnet is an early version of a remote control application.
ICMP provides network diagnostic functions and error reporting. One of the most
used IP commands is the Packet Internet Grouper (PING) command. When a host
PINGS another client, it sends an ICMP ECHO request, and the receiving host
responds with an ICMP ECHO REPLY. ICMP also provides a little network help for
routers. When a router is being overloaded with route requests, the router sends a
source quench message to all clients on the network, instructing them to slow their
data requests to the router.
The Address Resolution Protocol (ARP) is an Internet layer protocol that helps
TCP/IP network components find other devices in the same broadcast domain.
RARP is sort of the reverse of an ARP. In an ARP, the device knows the layer 3
address, but not the data link layer address. With a RARP, the device doesn’t have an
IP address and wants to acquire one. The only address that this device has is a MAC
address. Common protocols that use RARP are BOOTP and DHCP
The Network Time Protocol is used to synchronize the time of a computer client or
server to another server or reference time source, such as a radio or satellite receiver
or modem. It provides accuracy's typically within a millisecond on LANs and up to a
few tens of milliseconds on WANs.
SNMP
The SNMP Agent responds to the Management Console’s get request with a trap
message. The trap message has the requested information for the Management
Console to evaluate. Security can be provided in many ways with SNMP; however,
the most common form of security for SNMP is the use of community names,
associations that link SNMP Agents to their Management Consoles:
Agents, by default, respond only to Management Consoles that are part of the same
community name.
If an SNMP Agent receives a request from a Management Console that is not part of
the same community name, then the request for information is denied.
Because SNMP is an industry-standard protocol, heterogeneous environments are
common. Many vendors provide versions of SNMP Management Consoles. Hewlett
Packard, for example provides HP Open View (one of the most popular Management
Consoles on the market); Microsoft provides SNMP Server with the Windows NT and
2000 Resource Kits and Systems Management Server. SNMP Management Consoles
request information according to a Management Information Base (MIB) format. An
MIB is a numeric value that specifies the type of request, and to which layer of the
OSI model the request is being sent.
The SCP protocol implements file transfers only. It does so by connecting to the host
using SSH and there executes an SCP server (scp). The SCP server program is
typically the very same program as the SCP client.
The Line Printer Daemon protocol/Line Printer Remote protocol (or LPD, LPR) also
known as the Berkeley printing system, is a set of programs that provide printer
spooling and network print server functionality for Unix-like systems.
NAT translates one IP address to another. This can be a source address or a destination address.
Two basic implementations of NAT can be used: static and dynamic
Static NAT
With static NAT, a manual translation is performed by an address translation device, translating
one IP address to a different one. Typically, static NAT is used to translate destination IP
addresses in packets as they come into your network, but you can translate source addresses also.
Dynamic NAT
With static address translation, you need to build the translations manually. If you have 1000
devices, you need to create 1000 static entries in the address translation table, which is a lot of
work. Typically, static translation is done for inside resources that outside people want to access.
When inside users access outside resources, dynamic translation is typically used. In this
situation, the global address assigned to the internal user isn’t that important, since outside
devices don’t directly connect to your internal users—they just return traffic to them that the
inside user requested.
ICS provides networked computers with the capability to share a single connection to the
Internet. Multiple users can use ICS to gain access to the Internet through a single connection by
using Dial-Up Networking or local networking.
While DNS resolves host names to IP addresses, WINS resolves NetBIOS names to IP
addresses. Windows Internet Name Service provides a dynamic database of IP address to
NetBIOS name resolution mappings. WINS, determines the IP address associated with a
particular network computer. This is called name resolution. WINS supports network client and
server computers running Windows. WINS uses a distributed database that is automatically
updated with the names of computers currently available and the IP address assigned to each one.
DNS is an alternative for name resolution suitable for network computers with fixed IP
addresses.
SNMP, is a TCP/IP protocol for monitoring networks and network components. SNMP uses
small utility programs called agents to monitor behavior and traffic on the network, in order to
gather statistical data. These agents can be loaded onto managed devices such as hubs, NIC's,
servers, routers, and bridges. The gathered data is stored in a MIB (management information
base). To collect the information in a usable form, a management program console polls these
agents and downloads the information from their MIB's, which then can be displayed as graphs,
charts and sent to a database program to be analyzed.
Network File System (NFS) is a distributed file system that allows users to access files and
directories located on remote computers and treat those files and directories as if they were
local.
A file-sharing protocol designed to allow networked computers to transparently access files that
reside on remote systems over a variety of networks.
SMB uses four message types: session control, file, printer, and message. It is mainly used by
Microsoft Windows equipped computers. SMB works through a client-server approach, where a
client makes specific requests and the server responds accordingly. Client computers may have
their own hard disks, which are not publicly shared, yet also want access to the shared file
systems and printers on the server, and it is for this primary purpose that SMB is best known and
most heavily used.
LPD is the primary UNIX printing protocol used to submit jobs to the printer. The LPR
component initiates commands such as "print waiting jobs," "receive job," and "send queue
state," and the LPD component in the print server responds to them. The most common
implementations of LPD are in the official BSD UNIX operating system and the LPRng project.
The Common Unix Printing System (or CUPS), which is more common on modern Linux
distributions, borrows heavily from LPD. Unix and Mac OS X Servers use the Open
Source SAMBA to provide Windows users with Server Message Block (SMB) file sharing.