0% found this document useful (0 votes)
44 views

Lecture 05

The document discusses DHCP, DNS, Telnet server, and Open SSH. It provides details on: - How DHCP dynamically assigns IP addresses to devices on a network and allows hosts to obtain addresses when connecting. - How DNS translates hostnames to IP addresses in a hierarchical system and relies on domain name servers. - How Telnet enables remote terminal connections by simulating a terminal at a remote system using a terminal emulator. - How SSH securely transfers files and allows remote logins over an insecure network by providing authentication and encryption.

Uploaded by

wanofi israel
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views

Lecture 05

The document discusses DHCP, DNS, Telnet server, and Open SSH. It provides details on: - How DHCP dynamically assigns IP addresses to devices on a network and allows hosts to obtain addresses when connecting. - How DNS translates hostnames to IP addresses in a hierarchical system and relies on domain name servers. - How Telnet enables remote terminal connections by simulating a terminal at a remote system using a terminal emulator. - How SSH securely transfers files and allows remote logins over an insecure network by providing authentication and encryption.

Uploaded by

wanofi israel
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Hello!

Computer System Application


Kenesa B. ([email protected])
Ambo University, Hachalu Hundessa Campus
Computer Science Dept
April, 2023
CHAPTER FIVE
Installation of Application Server and Management

2
DHCP, DNS, Telnet server
q The Dynamic Host Configuration Protocol (DHCP) is a network protocol used to assign
IP addresses and provide configuration information to devices such as servers,
desktops, or mobile devices, so they can communicate on a network using the
Internet Protocol (IP).
• The DHCP server chooses an address from a configured range of addresses called a pool and
assigns ("leases") it to the host for a set of period.
q The DHCP service enables devices on a network to obtain IP addresses and other
information from a DHCP server.
q This service automates the assignment of IP addresses, subnet masks, gateway and
other IP networking parameters.
• DHCP allows a host to obtain an IP address dynamically when it connects to the
network.
q The DHCP server is contacted by sending a request, and an IP address is requested.
• The DHCP server is contacted and an address requested.
Kenesa B. (Ambo University) Network and System Admin 3
DHCP, DNS, Telnet server
q DHCP is a collection of software that implements all aspects of the DHCP suite. It
includes:
§ A DHCP server, which receives clients’ requests and replies to them.
§ A DHCP client, which can be bundled with the operating system of a client
computer or other IP capable device and which sends configuration requests to
the server.
• Most devices and operating systems already have DHCP clients included.
§ A DHCP relay agent, which passes DHCP requests from one LAN to another so that
there need not be a DHCP server on every LAN.
q Both the client and the server provide functionality that, while not strictly required by
the protocol, is very useful in practice.
• The DHCP server also makes allowances for non-compliant clients that need to be supported.
• The DHCP server will answer requests from any client that complies with the protocol standards,
and the DHCP client can interact with any server that complies with those standards.
Kenesa B. (Ambo University) Network and System Admin 4
DHCP, DNS, Telnet server
q On larger local networks, or where the user population changes frequently, DHCP is
preferred.
• New users may arrive with laptops and need a connection.
• Others have new workstations that need to be connected.
q Rather than having the network administrator assign IP addresses for each
workstation, it is more efficient to have IP addresses assigned automatically using
DHCP.
q DHCP distributed addresses are not permanently assigned to hosts but are only
leased for a period of time.
• If the host is powered down or taken off the network, the address is returned to the pool for reuse.
q This is especially helpful with mobile users that come and go on a network. Users can
freely move from location to location and re-establish network connections.
q The host can obtain an IP address once the hardware connection is made, either via a
wired or wireless LAN.
Kenesa B. (Ambo University) Network and System Admin 5
DHCP, DNS, Telnet server
q IP addresses are tough for humans to remember.
• IP addresses are impossible to guess.
• ever guessed at the name of a WWW site?
q The DNS is usually used to translate a host name into an IP address .
q Domain names comprise a hierarchy so that names are unique, yet easy to remember.
• Hierarchical name system consisting of a number of levels.
q Internet is divided into a number of domains, and each domain has its own name.
• There are two basic types of top-level domains—geographic and organizational.
• Each domain contains subdomains.
q Relies on Domain Name Servers and resolvers (clients)
q Each host name is made up of a sequence of labels separated by periods.
– Each label can be up to 63 characters
– The total name can be at most 255characters.
Kenesa B. (Ambo University) Network and System Admin 6
DHCP, DNS, Telnet server
q Examples:– whitehouse.gov, barney.the.purple.dinosaur.com, monica.cs.rpi.edu
q Top level domains:
§ edu, gov, com, net, org, mil, …
q Countries each have a top level domain - country code top-level domain (ccTLD)
§ the ccTLD for the United Kingdom is .uk, for Japan it is .jp, and for the United States it is .us.
q New top level domains include:
§ .aero .biz .coop .info .name .pro
q Distributed Database
§ The organization that owns a domain name is responsible for running a DNS server that can
provide the mapping between hostnames within the domain to IP addresses.
q DNS Servers:
§ Servers handle requests for their domain directly.
§ Servers handle requests for other domains by contacting remote DNS server(s).
Kenesa B. (Ambo University) Network and System Admin 7
DHCP, DNS, Telnet server
q TELNET is an abbreviation for Terminal Network.
• It is the standard TCP/IP protocol for virtual terminal service as proposed by the
International Organization for Standards (ISO).
q TELNET enables the establishment of a connection to a remote system in such a way
that the local terminal appears to be a terminal at the remote system.
q TELNET was designed at a time when most operating systems, such as UNIX, were
operating in a timesharing environment.
• In such an environment, a large computer supports multiple users.
• The interaction between a user and the computer occurs through a terminal,
which is usually a combination of keyboard, monitor, and mouse.
• Even a microcomputer can simulate a terminal with a terminal emulator.
q TELNET is a protocol that provides “a general, bi-directional, eight-bit byte oriented
communications facility”.
Kenesa B. (Ambo University) Network and System Admin 8
DHCP, DNS, Telnet server
q telnet is a program that supports the TELNET protocol over TCP.
q When a user logs into a local timesharing system, it is called local log-in.
• As a user types at a terminal or at a workstation running a terminal emulator, the keystrokes are
accepted by the terminal driver.
• The terminal driver passes the characters to the operating system.
• The operating system, in turn, interprets the combination of characters and invokes the desired
application program or utility.
q When a user wants to access an application program or utility located on a remote
machine, she/he performs remote log-in.
• Here the TELNET client and server programs come into use.
• The user sends the keystrokes to the terminal driver, where the local operating system accepts
the characters but does not interpret them.
• The characters are sent to the TELNET client, which transforms the characters to a universal
character set called network virtual terminal (NVT) characters and delivers them to the local
TCP/IP protocol stack.
Kenesa B. (Ambo University) Network and System Admin 9
Open SSH
q SSH is a protocol for secure remote login and other secure network services over an
insecure network.
§ Secure shell is a de facto standard for remote logins and encrypted file transfers.
q It provides authentication and encryption for business critical applications to work
securely over the internet.
q Secures channel between two computers
• Provides data confidentiality and integrity
q It is a layer over TCP/IP and runs on the port 22.
q The three core security requirements for a remote access technology – confidentiality,
integrity and authentication
q Most of the earlier technologies lack confidentiality and integrity.
§ For e.g Telnet and FTP transmit username and passwords in cleartext.
§ They are vulnerable to attacks such as IP spoofing, DoS, MITM and eavesdropping.
Kenesa B. (Ambo University) Network and System Admin 10
Open SSH
q Secure shell satisfies all the three requirements by using:
• Data Encryption to provide confidentiality
• Host-based and (or) client-based authentication
• Data integrity using MACs and hashes
q OpenSSH has the following protocol layers
q Transport Layer Protocol
§ Provides server authentication, confidentiality, and integrity
q User Authentication Protocol
§ Authenticates the client-side user to the server
q Connection Protocol
§ Multiplexes the tunnel into logical channels

Kenesa B. (Ambo University) Network and System Admin 11


FTP
q File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying
a file from one host to another.
q Although transferring files from one system to another seems simple and
straightforward, some problems must be dealt with first.
• For example, two systems may use different file name conventions.
• Two systems may have different ways to represent text and data.
• Two systems may have different directory structures.
q All these problems have been solved by FTP in a very simple and elegant approach.
q FTP differs from other client/server applications in that it establishes two
connections between the hosts,
• one connection is used for data transfer, the other for control information
(commands and responses).
q Separation of commands and data transfer makes FTP more efficient.
Kenesa B. (Ambo University) Network and System Admin 12
FTP
q The control connection uses very simple rules of communication. We need to transfer
only a line of command or a line of response at a time.
q The data connection, on the other hand, needs more complex rules due to the variety
of data types transferred.
§ However, the difference in complexity is at the FTP level, not TCP.
§ For TCP, both connections are treated the same.
q FTP uses two well-known TCP ports: Port 21 is used or the control connection, and
port 20 is used for the data connection.
q Objectives of FTP were:
1. to promote sharing of files (computer programs and/or data),
2. to encourage indirect or implicit (via programs) use of remote computers,
3. to shield a user from variations in file storage systems among hosts, and
4. to transfer data reliably and efficiently.
Kenesa B. (Ambo University) Network and System Admin 13
FTP
q FTP protocol falls within a client-server model, i.e. one machine sends orders (the
client) and the other awaits requests to carry out actions (the server).
q During an FTP connection, two transmission channels are open:
• A channel for commands (control channel)
• A channel for data
q So, both the client and server have two processes allowing these two types of
information to be managed:
§ DTP (Data Transfer Process) is the process in charge of establishing the
connection and managing the data channel.
• The server side DTP is called SERVER-DTP, the client side DTP is called USER-
DTP
§ PI (Protocol Interpreter) interprets the protocol allowing the DTP to be controlled
using commands received over the control channel.
• It is different on the client and the server:
Kenesa B. (Ambo University) Network and System Admin 14
FTP
q The SERVER-PI is responsible for:
• listening to the commands coming from a USER-PI over the control channel
on a data port,
• establishing the connection for the control channel,
• receiving FTP commands from the USER-PI,
• responding to them and running the SERVER-DTP.
q When an FTP client is connected to a FTP server, the USER-PI initiates the connection
to the server according to the Telnet protocol.
q The client sends FTP commands to the server, the server interprets them, runs its
DTP, then sends a standard response.
q Once the connection is established, the server-PI gives the port on which data will be
sent to the Client DTP.
q The client DTP then listens on the specified port for data coming from the server.
Kenesa B. (Ambo University) Network and System Admin 15
FTP

FTP Client-Server Model FTP imposes control channel

Kenesa B. (Ambo University) Network and System Admin 16

You might also like