Lecture 05
Lecture 05
2
DHCP, DNS, Telnet server
q The Dynamic Host Configuration Protocol (DHCP) is a network protocol used to assign
IP addresses and provide configuration information to devices such as servers,
desktops, or mobile devices, so they can communicate on a network using the
Internet Protocol (IP).
• The DHCP server chooses an address from a configured range of addresses called a pool and
assigns ("leases") it to the host for a set of period.
q The DHCP service enables devices on a network to obtain IP addresses and other
information from a DHCP server.
q This service automates the assignment of IP addresses, subnet masks, gateway and
other IP networking parameters.
• DHCP allows a host to obtain an IP address dynamically when it connects to the
network.
q The DHCP server is contacted by sending a request, and an IP address is requested.
• The DHCP server is contacted and an address requested.
Kenesa B. (Ambo University) Network and System Admin 3
DHCP, DNS, Telnet server
q DHCP is a collection of software that implements all aspects of the DHCP suite. It
includes:
§ A DHCP server, which receives clients’ requests and replies to them.
§ A DHCP client, which can be bundled with the operating system of a client
computer or other IP capable device and which sends configuration requests to
the server.
• Most devices and operating systems already have DHCP clients included.
§ A DHCP relay agent, which passes DHCP requests from one LAN to another so that
there need not be a DHCP server on every LAN.
q Both the client and the server provide functionality that, while not strictly required by
the protocol, is very useful in practice.
• The DHCP server also makes allowances for non-compliant clients that need to be supported.
• The DHCP server will answer requests from any client that complies with the protocol standards,
and the DHCP client can interact with any server that complies with those standards.
Kenesa B. (Ambo University) Network and System Admin 4
DHCP, DNS, Telnet server
q On larger local networks, or where the user population changes frequently, DHCP is
preferred.
• New users may arrive with laptops and need a connection.
• Others have new workstations that need to be connected.
q Rather than having the network administrator assign IP addresses for each
workstation, it is more efficient to have IP addresses assigned automatically using
DHCP.
q DHCP distributed addresses are not permanently assigned to hosts but are only
leased for a period of time.
• If the host is powered down or taken off the network, the address is returned to the pool for reuse.
q This is especially helpful with mobile users that come and go on a network. Users can
freely move from location to location and re-establish network connections.
q The host can obtain an IP address once the hardware connection is made, either via a
wired or wireless LAN.
Kenesa B. (Ambo University) Network and System Admin 5
DHCP, DNS, Telnet server
q IP addresses are tough for humans to remember.
• IP addresses are impossible to guess.
• ever guessed at the name of a WWW site?
q The DNS is usually used to translate a host name into an IP address .
q Domain names comprise a hierarchy so that names are unique, yet easy to remember.
• Hierarchical name system consisting of a number of levels.
q Internet is divided into a number of domains, and each domain has its own name.
• There are two basic types of top-level domains—geographic and organizational.
• Each domain contains subdomains.
q Relies on Domain Name Servers and resolvers (clients)
q Each host name is made up of a sequence of labels separated by periods.
– Each label can be up to 63 characters
– The total name can be at most 255characters.
Kenesa B. (Ambo University) Network and System Admin 6
DHCP, DNS, Telnet server
q Examples:– whitehouse.gov, barney.the.purple.dinosaur.com, monica.cs.rpi.edu
q Top level domains:
§ edu, gov, com, net, org, mil, …
q Countries each have a top level domain - country code top-level domain (ccTLD)
§ the ccTLD for the United Kingdom is .uk, for Japan it is .jp, and for the United States it is .us.
q New top level domains include:
§ .aero .biz .coop .info .name .pro
q Distributed Database
§ The organization that owns a domain name is responsible for running a DNS server that can
provide the mapping between hostnames within the domain to IP addresses.
q DNS Servers:
§ Servers handle requests for their domain directly.
§ Servers handle requests for other domains by contacting remote DNS server(s).
Kenesa B. (Ambo University) Network and System Admin 7
DHCP, DNS, Telnet server
q TELNET is an abbreviation for Terminal Network.
• It is the standard TCP/IP protocol for virtual terminal service as proposed by the
International Organization for Standards (ISO).
q TELNET enables the establishment of a connection to a remote system in such a way
that the local terminal appears to be a terminal at the remote system.
q TELNET was designed at a time when most operating systems, such as UNIX, were
operating in a timesharing environment.
• In such an environment, a large computer supports multiple users.
• The interaction between a user and the computer occurs through a terminal,
which is usually a combination of keyboard, monitor, and mouse.
• Even a microcomputer can simulate a terminal with a terminal emulator.
q TELNET is a protocol that provides “a general, bi-directional, eight-bit byte oriented
communications facility”.
Kenesa B. (Ambo University) Network and System Admin 8
DHCP, DNS, Telnet server
q telnet is a program that supports the TELNET protocol over TCP.
q When a user logs into a local timesharing system, it is called local log-in.
• As a user types at a terminal or at a workstation running a terminal emulator, the keystrokes are
accepted by the terminal driver.
• The terminal driver passes the characters to the operating system.
• The operating system, in turn, interprets the combination of characters and invokes the desired
application program or utility.
q When a user wants to access an application program or utility located on a remote
machine, she/he performs remote log-in.
• Here the TELNET client and server programs come into use.
• The user sends the keystrokes to the terminal driver, where the local operating system accepts
the characters but does not interpret them.
• The characters are sent to the TELNET client, which transforms the characters to a universal
character set called network virtual terminal (NVT) characters and delivers them to the local
TCP/IP protocol stack.
Kenesa B. (Ambo University) Network and System Admin 9
Open SSH
q SSH is a protocol for secure remote login and other secure network services over an
insecure network.
§ Secure shell is a de facto standard for remote logins and encrypted file transfers.
q It provides authentication and encryption for business critical applications to work
securely over the internet.
q Secures channel between two computers
• Provides data confidentiality and integrity
q It is a layer over TCP/IP and runs on the port 22.
q The three core security requirements for a remote access technology – confidentiality,
integrity and authentication
q Most of the earlier technologies lack confidentiality and integrity.
§ For e.g Telnet and FTP transmit username and passwords in cleartext.
§ They are vulnerable to attacks such as IP spoofing, DoS, MITM and eavesdropping.
Kenesa B. (Ambo University) Network and System Admin 10
Open SSH
q Secure shell satisfies all the three requirements by using:
• Data Encryption to provide confidentiality
• Host-based and (or) client-based authentication
• Data integrity using MACs and hashes
q OpenSSH has the following protocol layers
q Transport Layer Protocol
§ Provides server authentication, confidentiality, and integrity
q User Authentication Protocol
§ Authenticates the client-side user to the server
q Connection Protocol
§ Multiplexes the tunnel into logical channels