The document outlines various application layer protocols, including SMTP for email transmission, Telnet for remote logins, FTP and TFTP for file transfers, SNMP for network management, and HTTP/HTTPS for web communication. It also discusses DNS for hostname resolution and DHCP for dynamic IP address assignment. Additionally, it covers transport layer protocols like TCP and UDP, and network layer protocols such as IP and ICMP, detailing their functions and characteristics.
The document outlines various application layer protocols, including SMTP for email transmission, Telnet for remote logins, FTP and TFTP for file transfers, SNMP for network management, and HTTP/HTTPS for web communication. It also discusses DNS for hostname resolution and DHCP for dynamic IP address assignment. Additionally, it covers transport layer protocols like TCP and UDP, and network layer protocols such as IP and ICMP, detailing their functions and characteristics.
Application layer protocol- Simple Mail Transfer Protocol (SMTP) Governs the transmission of mail messages and attachments SMTP is used in the case of outgoing messages More powerful protocols such as POP3 and IMAP4 are needed and available to manage incoming messages POP3(Post Office Protocol version 3) is the older protocol IMAP4(Internet Mail Access Protocol version 4) is the more advanced protocol
33 Compiled by Asado Sh 12/14/2024
Application layer protocol- Telnet Telnet is a protocol used to log on to remote hosts using the TCP/IP protocol suite. Using Telnet, a TCP connection is established and keystrokes on the user’s machine act like keystrokes on the remotely connected machine. Often, Telnet is used to connect two dissimilar systems (such as PCs and UNIX machines). Through Telnet, you can control a remote host over LANs and WANs such as the Internet. For example, network managers can use Telnet to log on to a router from a computer elsewhere on their LAN and modify the router’s configuration. 34 Compiled by Asado Sh 12/14/2024 Application layer protocol- File Transfer Protocol (FTP) File Transfer Protocol (FTP) lets us transfer files, and it can accomplish this between any two machines using it. But accessing a host through FTP is only the first step. Users must then be subjected to an authentication login that’s usually secured with passwords and usernames implemented by system administrators to restrict access. FTP’s functions are limited to listing and manipulating directories, typing file contents, and copying files between hosts.
35 Compiled by Asado Sh 12/14/2024
36 Compiled by Asado Sh 12/14/2024 37 Compiled by Asado Sh 12/14/2024 Trivial File Transfer Protocol (TFTP) Trivial File Transfer Protocol (TFTP) is stock version of FTP, but it’s the protocol of choice if you know exactly what you want and where to find it because it’s fast and so easy to use! But TFTP doesn’t offer the abundance of functions that FTP does because it has no directory-browsing abilities, meaning that it can only send and receive files
There’s no authentication as with FTP, so it’s even more
insecure, and few sites support it because of the inherent security risks. A significant difference between FTP and TFTP is that TFTP relies on UDP at the Transport layer, but FTP uses TCP protocol. 38 Compiled by Asado Sh 12/14/2024 Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) collects and manipulates valuable network information. It gathers data from a network management station (NMS) at fixed or random intervals, requiring them to disclose certain information, or even asking for certain information from the device. In addition, network devices can inform the NMS about problems as they occur so the network administrator is alerted.
39 Compiled by Asado Sh 12/14/2024
SNMP
40 Compiled by Asado Sh 12/14/2024
Hypertext Transfer Protocol (HTTP) It’s used to manage communications between web browsers and web servers and opens the right resource when you click a link, wherever that resource may actually reside. In order for a browser to display a web page, it must find the exact server that has the right web page, plus the exact details that identify the information requested. The browser can understand what you need when you enter a Uniform Resource Locator (URL), which we usually refer to as a web address, e.g. http://www.lammle.com/forum and http://www.lammle.com/blog. Each URL defines the protocol used to transfer data, the name of the server, and the particular web page on that server.
41 Compiled by Asado Sh 12/14/2024
42 Compiled by Asado Sh 12/14/2024 Hypertext Transfer Protocol Secure (HTTPS) Hypertext Transfer Protocol Secure (HTTPS) is also known as Secure Hypertext Transfer Protocol. It uses Secure Sockets Layer (SSL). Sometimes you’ll see it referred to as SHTTP or S-HTTP, which were slightly different protocols, but since Microsoft supported HTTPS, it became the de facto standard for securing web communication. But no matter-as indicated, it’s a secure version of HTTP that arms you with a whole bunch of security tools for keeping transactions between a web browser and a server secure. 43 Compiled by Asado Sh 12/14/2024 Domain Name Service (DNS) The Domain Name System (DNS) is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address. Domain Name Service (DNS)-resolves hostnames- to IP addresses specifically, Internet names, such as www.hu.edu.et But you don’t have to actually use DNS. You just type in the IP address of any device you want to communicate with and find the IP address of a URL by using the Ping program.
For example, >ping www.cisco.com will return the IP address
resolved by DNS.
44 Compiled by Asado Sh 12/14/2024
Domain Name System (DNS) Resolves domain names to IP addresses and vice versa •An IP address identifies hosts on a network and the Internet as well, but DNS was designed to make our lives easier. •The IP address would change and no one would know what the new one was. •DNS allows you to use a domain name to specify an IP address.
www.hu.edu.et DNS Server 10.1.0.15
45 Compiled by Asado Sh 12/14/2024
Domain Name A domain name is represented by a series of character strings, called labels, separated by dots. Each label represents a level in the domain naming hierarchy. E.g In the domain name www.google.com, com is the top-level domain (TLD), google is the second-level domain, and www is the third-level domain. Each second-level domain can contain multiple third level domains. E.g In addition to www.google.com, Google also owns the following domains: news.google.com, 46 maps.google.com, Compiled by Asado Sh and mail.google.com. 12/14/2024 DNS cont’d… The very last section of the domain is called its top-level domain (TLD) name
15-47 Compiled by Asado Sh 12/14/2024
Top-level domains, including some relatively new ones 48 Compiled by Asado Sh 12/14/2024 Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts dynamically. It allows for easier administration and works well in small to very large network environments. Many types of hardware can be used as a DHCP server, including a Cisco router. A DHCP address conflict occurs when two hosts use the same IP address.This sounds bad, and it is!
49 Compiled by Asado Sh 12/14/2024
A lot of information a DHCP server can provide to a host when the host is requesting an IP address from the DHCP server. Here’s a list of the most common types of information a DHCP server can provide: IP address Subnet mask Domain name Default gateway (routers) DNS server address
50 Compiled by Asado Sh 12/14/2024
This is the four-step process a client takes to receive an IP address from a DHCP server: 1. The DHCP client broadcasts a DHCP Discover message looking for a DHCP server (Port 67). 2. The DHCP server that received the DHCP Discover message sends a layer 2 unicast DHCP Offer message back to the host. 3. The client then broadcasts to the server a DHCP Request message asking for the offered IP address and possibly other information. 4. The server finalizes the exchange with a unicast DHCP Acknowledgment message. Etc….
51 Compiled by Asado Sh 12/14/2024
Some of Transport layer protocols and their functions
52 Compiled by Asado Sh 12/14/2024
TCP(Transmission Control Protocol) TCP: takes large blocks of information from an application and breaks them into segments. It numbers and sequences each segment to keep the order the application intended. After these segments are sent on the transmitting host, TCP waits for an acknowledgment of the receiving end’s. Retransmitting any segments that aren’t acknowledged. It is Connection oriented means that a virtual connection is established before any user data is transferred.
53 Compiled by Asado Sh 12/14/2024
TCP cont’d.. TCP can also recognize duplicate messages and will discard them appropriately. If the sending computer is transmitting too fast for the receiving computer, TCP can employ flow control mechanisms to slow data transfer. TCP can also communicates delivery information to the upper- layer protocols and applications it supports. All these characteristics makes TCP an end-to-end reliable transport protocol.
54 Compiled by Asado Sh 12/14/2024
TCP SEGMENT FORMAT
15-55 Compiled by Asado Sh 12/14/2024
Some of fields in TCP segment Source port : This is the port number of the application on the host sending the data. Destination port: This is the port number of the application requested on the destination host. Sequence number: A number used by TCP that puts the data back in the correct order or retransmits missing or damaged data during a process called sequencing. Acknowledgment number: The value is the TCP octet that is expected next.
56 Compiled by Asado Sh 12/14/2024
Cont’d… Header length: The number of 32-bit words in the TCP header, which indicates where the data begins. Reserved: for future use, Always set to zero. Code bits/flags: Controls functions used to set up and terminate a session. -it used to determine segment purpose, e.g. SYN, ACK Window: is window size the sender willing to accept, in octets. Checksum: The cyclic redundancy check (CRC), used because TCP doesn’t trust the lower layers and checks everything. The CRC checks the header and data fields
-TCP keeps check that if bytes are damaged, through checksum.
Etc….
57 Compiled by Asado Sh 12/14/2024
User Datagram Protocol (UDP) User Datagram Protocol (UDP) is basically the scaled-down economy model of TCP, which is why UDP is sometimes referred to as a thin protocol. Like a thin person , a thin protocol doesn’t take up a lot of room— or in this case, require much bandwidth on a network. UDP does not sequence the segments and does not care about the order in which the segments arrive at the destination. UDP just sends the segments off and forgets about them.
58 Compiled by Asado Sh 12/14/2024
UDP cont’d… It doesn’t follow segments, check up on them, or even allow for an acknowledgment of safe arrival. Because of this, it’s referred to as an unreliable protocol. This does not mean that UDP is ineffective, only that it doesn’t deal with reliability issues at all. Furthermore, UDP doesn’t create a virtual circuit or doesn’t contact the destination before delivering information to it. - Because of this, it’s also considered a connectionless protocol.
59 Compiled by Asado Sh 12/14/2024
UDP cont’d… NOTE: Since UDP assumes that the application will use its own reliability method, it doesn’t use any itself. This presents an application developer with a choice when running the Internet Protocol stack: TCP for reliability or UDP for faster transfers. TCP sequences the segments so they get put back together in exactly the right order, which is something UDP just can’t do.
60 Compiled by Asado Sh 12/14/2024
UDP in short Minimum overhead. Used to send short messages. Not reliable as TCP (out of order, missing datagram, duplicate datagram). Lack of flow control and error control Faster and efficient Communication takes place using ports. Header contains following information: Source port number (16 bits) Destination port number (16 bits) Total length(16 bits) checksum(16 bits)
61 Compiled by Asado Sh 12/14/2024
62 Compiled by Asado Sh 12/14/2024 63 Compiled by Asado Sh 12/14/2024 Some of Internet or Network layer protocols and their functions
64 Compiled by Asado Sh 12/14/2024
Internet Protocol (IP) (Layer 3 protocol) Used for data communication in packet switched network Unreliable and connectionless (no specific path) Unreliable Data corruption Packet lost Out of order Packet called Datagram Internetworking computers Internet Protocol versions: IPv4, IPv6
65 Compiled by Asado Sh 12/14/2024
IP
66 Compiled by Asado Sh 12/14/2024
Cont’d… Source & destination IP address (32 bits each): contain IP address of sender and intended recipient. Options (variable length): Mainly used to record a route, or timestamps, or specify routing. Identification: copied into fragment, allows destination to know which fragments belong to which datagram Fragment Offset (12 bits): specifies the offset in the original datagram of the data being carried in the fragment Measured in units of 8 bytes starting at 0 Flags (3 bits): control fragmentation
67 Compiled by Asado Sh 12/14/2024
ICMP (Internet Control Message Protocol)(Layer 3) Used to report errors with delivery of IP data. E.g. if particular service or host not reachable or to check routers are correctly routing . Ping tool uses ICMP to check host is reachable and how long it takes to reach. ICMP message is delivered in IP packet. Error reporting not error correction. Two types of messages Error reporting message Problems with router or host e.g. destination unreachable, time exceeded, parameters problem Query message 68 Compiled by Asado Sh 12/14/2024 Help in getting specific information. e.g. neighbors ICMP Errors Network Errors: Host or network unreachable Network congestion message: When router buffers too many packets, and don’t process with same speed as received, generates source quench message.Too many messages results congestion. Time exceed ICMP timeout message is generated when host is unreachable.
69 Compiled by Asado Sh 12/14/2024
IGMP Layer 3 Internet Group Management Protocol IGMP-is used to facilitate the simultaneous transmission of a message to a group of recipients. Protocol that manages group membership. Provides information to multicast routers about the membership status of hosts. Routers use IGMP to determine which hosts belong to a multicast group Hosts use IGMP to join or leave a multicast group.
NIC Teaming in Windows Server 2012 Brings Simple, Affordable Traffic Reliability and Load Balancing To Your Cloud Workloads - Building Clouds Blog - Site Home - TechNet Blogs
NIC Teaming in Windows Server 2012 Brings Simple, Affordable Traffic Reliability and Load Balancing To Your Cloud Workloads - Building Clouds Blog - Site Home - TechNet Blogs