Unit 5 CN
Unit 5 CN
Application Layer
Unit: 5
Computer Networks
Manisha
ACSE0602
Assistant Professor
B Tech 5th Sem CS Department
II Framing, Error Detection and Correction, Flow control (Elementary Data Link Protocols, Sliding
Window protocols).Medium Access Control and Local Area Networks: Channel allocation,
Multiple access protocols, LAN standards,Link layer switches & bridges.
III Point-to-point networks, Logical addressing, Basic internetworking (IP, CIDR, ARP, RARP, DHCP,
ICMP), IPv4,Routing, forwarding and delivery, Static and dynamic routing, Routing algorithms
and protocols, Congestion controlalgorithms, IPv6.
IV Process-to-process delivery, Transport layer protocols (UDP and TCP), Connection management,
Flow control and retransmission, Window management, TCP Congestion control, Quality of
service.
V Domain Name System, World Wide Web and Hyper Text Transfer Protocol, Electronic mail, File
Transfer Protocol,Remote login, Network management, Data compression, VPN, Cryptography –
basic concepts, Firewalls.
• Resource Sharing
• Server-Client model:
• Communication Medium:
• Access to remote information
• Person-to-person communication
• Electronic commerce
• Cloud-based Applications
• AI and Expert System
• Neural Networks and parallel programming
• Decision support and office automation systems etc.
To develop an understanding of
• To understand computer networking basics.
• To understand different components of computer networks.
• To study and understand various protocols.
• The standard models for the layered approach to communication
between autonomous machines in a network.
• To study and understand the main characteristics of data
transmission across various physical link types.
Design, calculate, and apply subnet masks and addresses to K3, K4, K6
fulfil networking requirements and calculate distance among
C602.3
routers in subnet.
PSO1: The ability to identify, analyze real world problems and design their
ethical solutions using artificial intelligence, robotics, virtual/augmented
reality, data analytics, block chain technology, and cloud computing.
PSO2:The ability to design and develop the hardware sensor devices and
related interfacing software systems for solving complex engineering
problems.
PSO3: The ability to understand inter-disciplinary computing techniques and
to apply them in the design of advanced computing.
PSO4: The ability to conduct investigation of complex problems with the help
of technical, managerial, leadership qualities, and modern engineering tools
provided by industry-sponsored laboratories.
05/16/2024 12
manisha ACSE0602 CN Unit Number: 5
CO-PSO Mapping
• PEO4: To have life-long learning for up-skilling and re-skilling for a successful
professional career as an engineer, scientist, entrepreneur or bureaucrat for
the betterment of the society.
05/16/2024 14
manisha ACSE0602 CN Unit Number: 5
Result Analysis
SECTION B
2. Attempt any three of the following: 3 x 10 = 30
Q.No. Question Mark CO
s
1 10
2 10
. .
5 SECTION C 10
3. Attempt any one part of the following: 1 x 10 = 10
Q.No. Question Marks CO
1 10
2 10
16
manisha ACSE060205/16/2024
CN Unit Number: 5
End Semester Question Paper Templates
4. Attempt any one part of the following: 1 x 10 = 10
Q.No. Question Marks CO
1 10
2 10
5. Attempt any one part of the following: 1 x 10 = 10
Q.No. Question Marks CO
1 10
2 10
1 10
2 10
17
05/16/2024 manisha ACSE0602 CN Unit Number: 5
End Semester Question Paper Templates
1 10
2 10
18
manisha ACSE060205/16/2024
CN Unit Number: 5
Prerequisite
20
05/16/2024 manisha ACSE0602 CN Unit Number: 5
Course Objective / Unit Objective
• To develop an understanding of
• Computer networking basics,
• To understand different components of computer networks,
• Various protocols,
• The standard models for the layered approach to communication
between autonomous machines in a network,
• And the main characteristics of data transmission across various
physical link types.
Client
A client is a program that runs on the local machine requesting service from the
server. A client program is a finite program means that the service started by the
user and terminates when the service is completed.
Server
A server is a program that runs on the remote machine providing services to the
clients. When the client requests for a service, then the server opens the door for
the incoming requests, but it never initiates the service.
A server program is an infinite program means that when it starts, it runs infinitely
unless the problem arises. The server waits for the incoming requests from the
clients. When the request arrives at the server, then it responds to the request.
Virtual Terminal
They are also called Virtual Console, are emulated text terminals, using the
keyboard and monitor of a personal computer or workstation. The word "text" is
key since virtual consoles are not GUI terminals and they do not run inside a
graphical interface. Virtual consoles are found on all GNU/Linux systems, even
05/16/2024 manisha ACSE0602 CN Unit Number: 5 36
APPLICATION LAYER - OSI MODEL
ITU-T defines a virtual terminal protocol based on the OSI application layer
protocols. However, the virtual terminal protocol is not widely used on the
Internet.
• The network virtual terminal is an interface that defines how data and
commands are sent across the network.
05/16/2024 manisha ACSE0602 CN Unit Number: 5 38
APPLICATION LAYER - OSI MODEL
MAIL SERVICES
Email clients send messages to the email server configured in the application
settings. When the server receives the message, it checks to see if the recipient
domain is located on its local database. If it is not, it sends a DNS request to
determine the IP address of the mail server for the destination domain. The
email is then forwarded to the appropriate server.
Email supports three separate protocols for operation: Simple Mail Transfer
Protocol (SMTP), Post Office Protocol (POP), and Internet Message Access
Protocol (IMAP). The application layer process that sends mail, uses SMTP.
This is the case if sending from a client to a server, as well as when sending from
one server to another.
A client retrieves email, however, using one of two application layer protocols:
POP or IMAP.
ISP A ISP B
Mail Server Mail Server
internet
Send to [email protected]
—--
Sender Recipient
Simple Mail Transfer Protocol (SMTP) transfers mail reliably and efficiently. For
SMTP applications to work properly, the mail message must be formatted
properly and SMTP processes must be running on both the client and server.
SMTP message formats require a message header and a message body. While
the message body can contain any amount of text, the message header must
have a properly formatted recipient email address and a sender address. Any
other header information is optional.
When a client sends email, the client SMTP process connects with a server
SMTP process on well-known port 25. After the connection is made, the client
attempts to send the email to the server across the connection. When the server
receives the message, it either places the message in a local account, if the
recipient is local, or forwards the message using the same SMTP connection
process to another mail server for delivery.
The destination email server may not be online or may be busy when email
messages are sent. Therefore, SMTP spools messages to be sent at a later time.
Periodically, the server checks the queue for messages and attempts to send
them again. If the message is still not delivered after a predetermined expiration
time, it is returned to the sender as undeliverable.
Post Office Protocol (POP) enables a workstation to retrieve mail from a mail
server. With POP, mail is downloaded from the server to the client and then
deleted on the server.
The server starts the POP service by passively listening on TCP port 110 for
client connection requests. When a client wants to make use of the service, it
sends a request to establish a TCP connection with the server. When the
connection is established, the POP server sends a greeting. The client and POP
server then exchange commands and responses until the connection is closed or
aborted.
05/16/2024 manisha ACSE0602 CN Unit Number: 5 46
APPLICATION LAYER - OSI MODEL
Because email messages are downloaded to the client and removed from the
server, there is not a centralized location where email messages are kept.
Because POP does not store messages, it is undesirable for a small business that
needs a centralized backup solution.
POP3 is desirable for an ISP, because it alleviates their responsibility for
managing large amounts of storage for their email servers.
Internet Message Access Protocol
decides to delete a message, the server synchronizes that action and deletes the
message from the server.
For small- to medium-sized businesses, there are many advantages to using
IMAP. IMAP can provide long-term storage of email messages on mail servers
and allows for centralized backup. It also enables employees to access email
messages from multiple locations, using different devices or client software. The
mailbox folder structure that a user expects to see is available for viewing
regardless of how the user accesses the mailbox.
For an ISP, IMAP may not be the protocol of choice. It can be expensive to
purchase and maintain the disk space to support the large number of stored
emails. Additionally, if customers expect their mailboxes to be backed up
routinely, that can further increase the costs to the ISP.
ADDRESSING
Physical Addresses
The physical address, also known as the link address, is the address of a node
as defined by its LAN or WAN. It is included in the frame used by the data link
layer. It is the lowest-level address. The size and format of these addresses vary
depending on the network. For example, Ethernet uses a 6-byte (48-bit) physical
address that is imprinted on the network interface card (NIC).
Most local area networks use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as
shown below.
Example (1)
In Figure below a node with physical address 10 sends a frame to a node with
physical address 87. The two nodes are connected by a link (a LAN). At the
05/16/2024 manisha ACSE0602 CN Unit Number: 5 51
APPLICATION LAYER - OSI MODEL
data link layer, this frame contains physical (link) addresses in the header. These
are the only addresses needed. The rest of the header contains other information
needed at this level. The trailer usually contains extra bits needed for error
detection. The data link layer at the sender receives data from an upper layer. It
encapsulates the data in a frame, adding a header and a trailer. The header, among
other pieces of information, carries the receiver and the sender physical (link)
addresses.
Note that in most data link protocols, the destination address 87 in this case,
comes before the source address (10 in this case). The frame is propagated
through the LAN. Each station with a physical address other than 87 drops the
frame because the destination address in the frame does not match its own
physical address. The intended destination computer, however, finds a match
between the destination address in the frame and its own physical address. The
frame is checked, the header and trailer are dropped, and the data part is
decapsulated and delivered to the upper layer.
Logical Addresses
Logical addresses are necessary for universal communications that are
independent of underlying physical networks. Physical addresses are not adequate
in an internetwork environment where different networks can have different
address formats. A universal addressing system is needed in which each host can
be identified uniquely, regardless of the underlying physical network. The logical
addresses are designed for this purpose. A logical address in the Internet is
currently a 32bit address that can uniquely define a host connected to the
Internet. No two publicly addressed and visible hosts on the Internet can have the
same IP address.
Example (2)
The Figure below shows a part of an internet with two routers connecting
three LANs. Each device (computer or router) has a pair of addresses (logical and
physical) for each connection. In this case, each computer is connected to only one
link and therefore has only one pair of addresses. Each router, however, is
connected to three networks (only two are shown in the figure). So each router
has three pairs of addresses, one for each connection. Although it may be obvious
that each router must have a separate physical address for each connection, it
may. The computer with logical address A and physical address 10 needs to send a
packet to the computer with logical address P and physical address 95. The sender
encapsulates its data in a packet at the network layer and adds two logical
addresses (A and P). Note that in most protocols, the logical source address comes
before the logical destination address (contrary to the order of physical
addresses). The network layer, however, needs to find the physical address of the
next hop before the packet can be delivered. The network layer consults its routing
table and finds the logical address of the next hop (router 1) to be F.
Sanaa LAN 1
To another
k A/10 ■ a A
F/20
iTrvsu:a
aangtd
33 99 A TT ^3t3l
Router 2
Phryx cal Z BE N: ] 3
■khn
LAN 3
t nid
MB ivor network
encapsulates the packet with physical destination address 20 and physical source
address 10. The router decapsulates the packet from the frame to read the logical
destination address P. Since the logical destination address does not match the
router's logical address, the router knows that the packet needs to be forwarded.
The router consults its routing table and ARP to find the physical destination
address of the next hop (router 2), creates a new frame, encapsulates the packet,
and sends it to router 2.
Note the physical addresses in the frame. The source physical address changes
from 10 to 99. The destination physical address changes from 20 (router 1 physical
address) to 33 (router 2 physical address). The logical source and destination
addresses must remain the same; otherwise the packet will be lost. At router 2 we
have a similar scenario. The physical addresses are changed, and a new frame is
sent to the destination computer. When the frame reaches the destination, the
packet is decapsulated. The destination logical address P matches the logical
address of the computer. The data are decapsulated from the packet and delivered
to the upper layer. Note that although physical
addresses will change from hop to hop, logical addresses remain the same from
the source to destination.
with another process. For example, computer A can communicate with computer
C by using TELNET. At the same time, computer A communicates with computer B
by using the File Transfer Protocol (FTP). For these processes to receive data
simultaneously, we need a method to label the different processes.
In other words, they need addresses. In the TCP/IP architecture, the label assigned
to a process is called a port address. A port address in TCP/IP is 16 bits in length.
A port address is a 16-bit address represented by one decimal number as shown.
Example (3)
The following Figure shows two computers communicating via the Internet.
The sending computer is running three processes at this time with port addresses
a, b, and c. The receiving computer is running two processes at this time with port
addresses j and k. Process a in the sending computer needs to communicate with
process j in the receiving computer. Note that although both computers are using
the same application, FTP, for example, the port addresses are different because
one is a client program and the other is a server program.
• In the TCP/IP protocol suite, the port numbers are integers between 0 and
65,535.
• The client program defines itself with a port number, called the ephemeral
port number (chosen randomly). The word ephemeral means short lived.
• The server process must also define itself with a port number (called well-
known port numbers). This port number, however, cannot be chosen
randomly.
• Well-known ports: The ports ranging from 0 to 1,023 are assigned and
controlled by ICANN..
• Registered ports: The ports ranging from 1,024 to 49,151 are not assigned or
controlled by ICANN. They can only be registered with ICANN to prevent
duplication.
•Dynamic ports: The ports ranging from 49,152 to 65,535 are neither
controlled nor registered. They can be used as temporary or private port
numbers. The original recommendation was that the ephemeral port numbers
for clients be chosen from this range. However, most systems do not follow
this recommendation.
Application-Specific Addresses
Some applications have user-friendly addresses that are designed for that
specific application. Examples include the e-mail address (for example,
[email protected]) and the Universal Resource Locator (URL) (for example,
www.mhhe.com). The first defines the recipient of an e-mail; the second is used to
find a document on the World Wide Web. These addresses, however, get changed
to the corresponding port and logical addresses by the sending computer.
DIRECTORY SERVICES
varies greatly with the customer. This data store has come to be known as a
Directory Service.
Directory services not only allow you to locate and access these resources, but
also let you manage the relationships among them.
For our own use, we all maintain personal address directory where we store
addresses, telephone nos. and other information in a format that is most suitable
for us. But when we talk about maintaining a global directory service on Internet
or in any organization, The Directory Service must be:
• Flexible enough to store a range of information types
X.500 Directory
- APPLICATION PROTOCOLS
Topic Objective
• We will understand the Various protocols in Application layer
• How various services are provided
DNS
Country Domain
The format of country domain is same as a generic domain, but it uses two-
character country abbreviations (e.g., us for the United States) in place of three
character organizational abbreviations.
Inverse Domain
The inverse domain is used for mapping an address to a name. When the
server has received a request from the client, and the server contains the files of
only authorized clients. To determine whether the client is on the authorized list
or not, it sends a query to the DNS server and ask for mapping an address to the
name.
Working of DNS
• DNS is a client/server network communication protocol. DNS clients send
requests to the. server while DNS servers send responses to the client.
• Client requests contain a name which is converted into an IP address
known as a forward DNS lookups while requests containing an IP address
which is converted into a name known as reverse DNS lookups.
• DNS implements a distributed database to store the name of all the hosts
available on the internet.
• If a client like a web browser sends a request containing a hostname, then
a piece of software such as DNS resolver sends a request to the DNS server
to obtain the IP address of a hostname. If DNS server does not contain the
IP address associated with a hostname, then it forwards the request to
another DNS server. If IP address has arrived at the resolver, which in turn
completes the request over the internet protocol.
FTP
• FTP stands for File transfer protocol.
• FTP is a standard internet protocol provided by TCP/IP used for transmitting
the files from one host to another.
• It is mainly used for transferring the web page files from their creator to the
computer that acts as a server for other computers on the internet.
• It is also used for downloading the files to computer from other servers.
Objectives of FTP
• It provides the sharing of files.
• It is used to encourage the use of remote computers.
• It transfers the data more reliably and efficiently.
Why FTP?
Although transferring files from one system to another is very simple and
straightforward, but sometimes it can cause problems. For example, two systems
may have different file conventions. Two systems may have different ways to
represent text and data. Two systems may have different directory structures. FTP
protocol overcomes these problems by establishing two connections between
hosts. One connection is used for data transfer, and another connection is used for
the control connection.
Mechanism of FTP
User
User
interface
Client Server
The above figure shows the basic model of the FTP. The FTP client has three
components: the user interface, control process, and data transfer process. The
05/16/2024 manisha ACSE0602 CN Unit Number: 5 82
APPLICATION PROTOCOLS
server has two components: the server control process and the server data
transfer process.
There are two types of connections in FTP:
• Control Connection: The control connection uses very simple rules for
communication. Through control connection, we can transfer a line of
command or line of response at a time. The control connection is made
between the control processes. The control connection remains connected
during the entire interactive FTP session.
• Data Connection: The Data Connection uses very complex rules as data
types may vary. The data connection is made between data transfer
Advantages of FTP:
• Speed: One of the biggest advantages of FTP is speed. The FTP is one of
the fastest way to transfer the files from one computer to another
computer.
• Efficient: It is more efficient as we do not need to complete all the
operations to get the entire file.
• Security: To access the FTP server, we need to login with the username and
password. Therefore, we can say that FTP is more secure.
• Back & forth movement: FTP allows us to transfer the files back and forth.
Suppose you are a manager of the company, you send some information to
all the employees, and they all send information back on the same server.
Disadvantages of FTP:
• The standard requirement of the industry is that all the FTP transmissions
should be encrypted. However, not all the FTP providers are equal and not
all the providers offer encryption. So, we will have to look out for the FTP
providers that provides encryption.
• FTP serves two operations, i.e., to send and receive large files on a
network. However, the size limit of the file is 2GB that can be sent. It also
doesn't allow you to run simultaneous transfers to multiple receivers.
• Passwords and file contents are sent in clear text that allows unwanted
eavesdropping. So, it is quite possible that attackers can carry out the brute
force attack by trying to guess the FTP password.
• It is not compatible with every system.
TELNET
• The main task of the internet is to provide services to users. For example,
users want to run different application programs at the remote site and
transfers a result to the local site. This requires a client-server program such
as FTP, SMTP. But this would not allow us to create a specific program for
each demand.
• The better solution is to provide a general client-server program that lets
the user access any application program on a remote computer. Therefore, a
program that allows a user to log on to a remote computer. A popular client-
server program Telnet is used to meet such demands. Telnet is an
abbreviation for Terminal Network.
• Telnet provides a connection to the remote computer in such a way that a
local terminal appears to be at the remote side.
• When a user logs into a local computer, then it is known as local login,
2.Remote login
TELNET
TELNET
Client Application programs
Server
Operating Operating
system system
TCP
TCP
Pseudoterminal
Terminal T ermmal Data link Driver
Data link
driver
Physical Physical
Interne
The commands in NVT forms are transmitted to the TCP/IP at the remote
machine. Here, the characters are delivered to the operating system and then
pass to the TELNET server. The TELNET server transforms the characters which
can be understandable by a remote computer. However, the characters cannot
be directly passed to the operating system as a remote operating system does
not receive the characters from the TELNET server. Therefore it requires some
piece of software that can accept
the characters from the TELNET server. The operating system then passes
these characters to the appropriate application program.
SMTP
recipient address is wrong, then receiving server reply with an error message
of some kind.
Components of SMTP
• First, we will break the SMTP client and SMTP server into two components
such as user agent (UA) and mail transfer agent (MTA). The user agent (UA)
prepares the message, creates the envelope and then puts the message in
the envelope. The mail transfer agent (MTA) transfers this mail across the
internet.
05/16/2024 manisha ACSE0602 CN Unit Number: 5 94
APPLICATION PROTOCOLS
. The relaying system without TCP/IP protocol can also be used to send the
emails to users, and this is achieved by the use of the mail gateway. The mail
gateway is a relay MTA that can be used to receive an email.
User A
User B
Mail
MIA ,
cu nt
syste
m
Private
MTA network
Internet
Mail gateway
Working of SMTP
1.Composition of Mail: A user sends an e-mail by composing an electronic mail
message using a Mail User Agent (MUA). Mail User Agent is a program which
is used to send and receive mail. The message contains two parts: body and
header. The body is the main part of the message while the header includes
information such as the sender and recipient address. The
05/16/2024 manisha ACSE0602 CN Unit Number: 5 97
APPLICATION PROTOCOLS
4. Receipt and Processing of Mail: Once the incoming message is received, the
exchange server delivers it to the incoming server (Mail Delivery Agent) which
stores the e-mail where it waits for the user to retrieve it.
5. Access and Retrieval of Mail: The stored email in MTA can be retrieved by
using MUA (Mail User Agent). MUA can be accessed by using login and
password.
SNMP
Management Components
. Management is not achieved only through the SNMP protocol but also the use
of other protocols that can cooperate with the SNMP protocol. Management
is achieved through the use of the other two protocols: SMI (Structure of
management information) and MIB(management information base).
. Management is a combination of SMI, MIB, and SNMP. All these three
protocols such as abstract syntax notation 1 (ASN.1) and basic encoding rules
(BER).
SMI
MIB
. The MIB (Management information base) is a second component for the
network management.
. Each agent has its own MIB, which is a collection of all the objects that the
manager can manage. MIB is categorized into eight groups: system, interface,
address translation, ip, icmp, tcp, udp, and egp. These groups are under the
mib object.
SNMP Messages
GetRequest: The GetRequest message is sent from a manager (client) to the agent
(server) to retrieve the value of a variable.
GetNextRequest: The GetNextRequest message is sent from the manager to agent
to retrieve the value of a variable. This type of message is used to retrieve the
values of the entries in a table. If the manager does not know the indexes of the
entries, then it will not be able to retrieve the values. In such situations,
GetNextRequest message is used to define an object.
GetResponse: The GetResponse message is sent from an agent to the manager in
response to the GetRequest and GetNextRequest message. This message contains
the value of a variable requested by the manager.
SetRequest: The SetRequest message is sent from a manager to the agent to set a
value in a variable.
Trap: The Trap message is sent from an agent to the manager to report an event.
For example, if the agent is rebooted, then it informs the manager as well as sends
the time of rebooting.
HTTP
Features of HTTP:
. Connectionless protocol: HTTP is a connectionless protocol. HTTP client
initiates a request and waits for a response from the server. When the server
receives the request, the server processes the request and sends back the
response to the HTTP client after which the client disconnects the connection.
The connection between client and server exist only during the current
request and response time only.
. Media independent: HTTP protocol is a media independent as data can be sent
as long as both the client and server know how to handle the data content. It
is required for both the client and server to specify the content type in MIME-
type header.
. Stateless: HTTP is a stateless protocol as both the client and server know each
other only during the current request. Due to this nature of the protocol, both
the client and server do not retain the information between various requests
of the web pages.
HTTP Transactions
The above figure shows the HTTP transaction between client and server. The
client initiates a transaction by sending a request message to the server. The
server replies to the request message by sending a response message.
Messages
HTTP messages are of two types: request and response. Both the message
types follow the same message format.
Request Message: The request message is sent by the client that consists of a
request line, headers, and sometimes a body.
Response Message: The response message is sent by the server to the client
that consists of a status line, headers, and sometimes a body.
URL
Uniform Resource Locator
Method: The method is the protocol used to retrieve the document from a
server. For example, HTTP.
05/16/2024 manisha ACSE0602 CN Unit Number: 5 114
APPLICATION PROTOCOLS
. Host: The host is the computer where the information is stored, and the
computer is given an alias name. Web pages are mainly stored in the
computers and the computers are given an alias name that begins with the
characters "www". This field is not mandatory.
. Port: The URL can also contain the port number of the server, but it's an
optional field. If the port number is included, then it must come between the
host and path and it should be separated from the host by a colon.
. Path: Path is the pathname of the file where the information is stored. The
path itself contain slashes that separate the directories from the
subdirectories and files.
A user wants to transfer files from Host A to the router R1. R1 is a Cisco device and
it has a TFTP server installed. The user will start an TFTP client program and
initiate the data transfer.
TFTP uses a well-known UDP port 69.
Command
tftp [ options... ] [host [port]] [-c command]
NFS:
It stands for network file system.It allows remote hosts to mount file systems over
a network and interact with those file systems as though they are mounted locally.
This enables system administrators to consolidate resources onto centralized
servers on the network.
Command
service nfs start
LPD:
It stands for Line Printer Daemon.It is designed for printer sharing.It is the part
that receives and processes the request. A "daemon" is a server or agent.
Command
Ipd [ -d ] [ -l ] [ -D DebugOutputFile]
X window:
It defines a protocol for the writing of graphical user interface-based client/server
applications. The idea is to allow a program, called a client, to run on one
computer. It is primarily used in networks of interconnected mainframes.
Command
Run xdm in runlevel 5
DHCP:
It stands for Dynamic Host Configuration Protocol (DHCP).It gives IP addresses
to hosts.There is a lot of information a DHCP server can provide to a host when
the host is registering for an IP address with the DHCP server. Port number for
DHCP is 67, 68.
Command
clear ip dhcp binding {address | * }
• Cryptography :
It is the art of secret writing.
Plain Text :
Normal text that can be read by user and is in readable format.
Cipher Text :
It is in unreadable format and user have to convert cipher text to plain
text.
2 Ways of Encryption
Stream ciphers :
In stream ciphers the encryption is done bit by bit.
• Block ciphers :
In block ciphers the encryption is done block by block, where a block is
group of bits.
There are 2 mechanisms for encryption.
1. Asymmetric key encryption or public key encryption.
A pair of public key and private key is used for encryption and
decryption.
• Firewall
Firewalls
Application level
Gateway
Security Perimeter
Private
Internet
Network
Packet
filtering
router
Source: cyber security, G Padmavathi, swayam
• Inspects the packets of data that are passed through the network and accepts or
rejects the packets on the basis of the default or user-defined rules.
• 1. Stateful-
• State contains properties, such as source and destination IP addresses, UDP or TCP
ports, and the current stage of the connection’s lifetime.
• 2. Stateless-
• They require less time to filter the packets as they do not maintain the state
information of sessions.
05/16/2024 manisha ACSE0602 CN Unit Number: 5 130
Application level Gateway
Inside host
Outside host
Source: cyber security, G Padmavathi, swayam
Source: Swayam
Computers and their systems square measure difficult in their approach, and it
gets doubly robust once you need to comprehend 2 terms associated with this
subject that act already utilized in the regular language, those mentioned
adequately during this article square measure Network and net, they will appear
totally different from one another, and so they will seem like one another.
The most distinction between them comes in their definition; a Network could be
a association of 1 or additional computers placed in associate surroundings, and
also the Internet is that the relationship of computers connecting them from
everywhere the planet.
The basic distinction between network and net is that the Network consists of pcs
that area unit physically connected and may be used as a private computer yet on
share data with one another. Conversely, the Internet could be a technology that
links these little and huge networks with one another and builds a additional in
depth network.
Terminal emulator
POSIX
The Portable Operating System Interface (POSIX) is a family of standards
specified by the IEEE Computer Society for maintaining compatibility between
operating systems. POSIX defines the application programming interface (API),
along with command line shells and utility interfaces, for software compatibility
with variants of Unix and other operating systems.
In some operating systems, including Unix, a pseudoterminal, pseudotty, or
PTY is a pair of pseudo-devices, one of which, the slave, emulates a hardware text
terminal device, the other of which, the master, provides the means by which a
terminal emulator process controls the slave.
The PTY feature is part of POSIX and the Single Unix Specification in the form
of a posix_openpt() function since 1998.
User space
script has h
forkO
stdin
ready) stdm()
Kernel space
write ()
stdout
stdout
stderr
stderr
Pseudo ter-
Pseudo ter¬
Terminal minal slave
min a] master
C/dev/pts/. - -)
keyboard input
terminal output
The PTY feature is part of POSIX and the Single Unix Specification in the form of a
posix_openpt() function since 1998.[1]
PuTTY
PuTTY supports many variations on the secure remote terminal, and provides
user control over the SSH encryption key and protocol version, alternate ciphers
such as AES, 3DES, RC4, Blowfish, DES, and Public-key authentication. PuTTY
supports SSO through GSSAPI, including user provided GSSAPI DLLs. It also can
emulate control sequences from xterm, VT220, VT102 or ECMA-48 terminal
emulation, and allows local, remote, or dynamic port forwarding with SSH
(including X11 forwarding). The network communication layer supports IPv6, and
the SSH protocol supports the [email protected] delayed compression scheme. It
can also be used with local serial port connections.
PuTTY comes bundled with command-line SCP and SFTP clients, called "pscp"
and "psftp" respectively, and plink, a command-line connection tool, used for non-
interactive sessions.
5. TELNET is a
A. Customized program
B. Client/server program
C. Application program
D. All of the above
18-19
https://drive.google.com/open?id=17OUMNnX0kFDc9
UB8tx8qd8zyEj7lCD5P
17-18
https://drive.google.com/open?id=1oFmw__qC7wdUP
85gUkKbkohZvd9Vopm_
16-17
https://drive.google.com/open?id=1eDrOkj2wVsxdTZP
b7-A78YuYn16HC1ob
15-16
https://drive.google.com/open?id=1ljNxmZP1_pl10rbx
JvK6xB1ybG7AMuqU
05/16/2024 151
14-15
manisha ACSE0602 CN Unit Number: 5
Expected Questions for University Exam
Thank You