ACN Chapter 5
ACN Chapter 5
a.URL:
a specific reference point within a file, such as a named anchor in an HTML file;
and
Static web pages are also known as flat or stationary web page. They are loaded
on the client’s browser as exactly they are stored on the web server. Such web
pages contain only static information. User can only read the information but can’t
do any modification or interact with the information.
Static web pages are created using only HTML. Static web pages are only used
when the information is no more required to be modified.
c.Dynamic Document:
It is processed using client side scripting such as JavaScript. And then passed in
to Document Object Model (DOM).
d.WWW:
The world wide web is known as WWW or W3 or Web. The world wide web is an
architectural frame work for accessing linked documents and repository of
information spread all over the Internet. The WWW has a unique combination of
flexibility, portability and user-friendly features that distinguish it from other services
provided by the Internet. The main reason for its popularity is the use of a concept
called hypertext. Hypertext is a new way of information storage and retrieval, which
enables authors to structure information in novel ways. An effectively designed
hypertext document can help users rapidly locate the desired type of information
from the vast amount of information on the Internet. Hypertext documents enable this
by using a series of links. A link is a special type of item in a hypertext document,
which connects the document to another document that provides more information
about the linked item.Hypertext documents on the Internet are known as Web pages.
Web pages are created by using a special language called hypertext markup
language (HTML). Any kind of information can be defined on the Internet using the
standard URL. URL defines three things – method, host computer and
pathname.Method – It is the protocol used to retrieve the document. For example,
Gopher, FTP, HTTP, news, TELNET, etc.Host- It is the computer at which the
information is available.Path – It is the path name of the file where the information is
located.
File Transfer Protocol (FTP) is a client/server protocol used for transferring files to or
from a host computer. FTP may be authenticated with user names and passwords.
FTP is the Internet standard for moving or transferring files from one computer to
another using TCP or IP networks. File Transfer Protocol is also known as RFC 959.
There are various types of FTP and different use cases:
1. An FTP site is a web site where users can easily upload or download specific
files.
2. FTP by mail allows users without access to the Internet to access and copy
files using anonymous FTP by sending an email message
to [email protected] and putting the word help in the body of the text.
3. FTP Explorer is an FTP client based on Windows 95 file manager (Windows
95 Explorer).
4. An FTP server is a dedicated computer which provides an FTP service. This
invites hackers and necessitates security hardware or software such as
utilizing usernames, passwords and file access control.
5. An FTP client is a computer application which accesses an FTP server. While
doing so, users should block incoming FTP connection attempts using
passive mode and should check for viruses on all downloaded files.
Following image shows the SSH packet format as explained by RFC 4253. Please refer
page number 7 and 8 of RFC 4253 to get more clear picture about SSH packet
format.
Descriptions given below are copied from RFC 4253
Packet Length : Packet Length is length of the packet in bytes, not including HMAC
value or the Packet Length field itself.
Payload : Payload is the useful contents of the packet. If compression has been
negotiated, this field is compressed.
Random Padding : Random Padding is the arbitrary-length padding, such that the
total length of (packet_length || padding_length || payload || random padding) is a
multiple of the cipher block size or 8, whichever is larger. There MUST be at least four
bytes of padding. The padding SHOULD consist of random bytes. The maximum
amount of padding is 255 bytes.
BASIS FOR
HTTP HTTPS
COMPARISON
Prefix Used Url begins with "http://" Url begins with "https://"
Port Used Port number 80 is used for Port number 443 is used for communication.
communication.
Example Websites like internet forums, Websites like Banking Websites, Payment
Transfer refers to moving messages from the originator to the recipient. In large part, this requires
establishing a connection to the destination or some intermediate machine, outputting the message,
and releasing the connection. The e-mail system should do this automatically, without bothering the
user.
Reporting has to do with telling the originator what happened to the message. Was it delivered?
Was it rejected? Was it lost? Numerous applications exist in which confirmation of delivery is
important and may even have legal significance (''Well, Your Honor, my e-mail system is not very
reliable, so I guess the electronic subpoena just got lost somewhere'').
Displaying incoming messages is needed so people can read their e-mail. Sometimes conversion is
required or a special viewer must be invoked, for example, if the message is a PostScript file or
digitized voice. Simple conversions and formatting are sometimes attempted as well.
Disposition is the final step and concerns what the recipient does with the message after receiving
it. Possibilities include throwing it away before reading, throwing it away after reading, saving it, and
so on. It should also be possible to retrieve and reread saved messages, forward them, or process them
in other ways.
a.Proxy server:
In Computer network, a proxy server is a server (a computer system or an
application program) that acts as an intermediary for requests from clients seeking
resources from other servers. A client connects to the proxy server, requesting
some service, such as a file, connection, web page, or other resource, available
from a different server.The proxy server evaluates the request according to its
filtering rules. For example, it may filter traffic by IP address or protocol. If the
request is validated by the filter, the proxy provides the resource by connecting to
the relevant server and requesting the service on behalf of the client.A proxy server
may optionally alter the client’s request or the server’s response, and sometimes it
may serve the request without contacting the specified server. In this case, it
‘caches’ responses from the remote server, and returns subsequent requests for the
same content directly. A proxy server has many potential purposes, including:To
keep rnachines behind it anonymous (mainly for security).To speed up access to
resources (using caching). Web proxies are commonly used to cache web pages
from a web server.
b.TFTP:
File transfer is one of the most essential technologies for client/server and computer
networkinfrastructures.
Trivial File Transfer Protocol is very simple in design and has limited features as
compared to File Transfer Protocol (FTP). TFTP provides no authentication and
security while transferring files. As a result, it is usually used for transferring boot
files or configuration files between machines in a local setup. Because of its simple
design, it is rarely used interactively by users in a computer network. Its lack of
security also makes it dangerous for use over the Internet.
TFTP is very useful for boot computers and devices that do not have hard disk
drives or storage devices because it can easily be implemented using a small
amount of memory. This characteristic of TFTP makes it one of the core elements
of network boot protocol, or preboot execution environment (PXE).
Data transfer through TFTP is usually initiated through port 69. However, the data
transfer ports are selected by the sender and receiver when the connection is
initialized.
The web servers insert the MIME header at the beginning of any Web
transmission. Clients use this content type or media type header to
select an appropriate “player” application for the type of data the
header indicates.
MIME headers
Now, let’s see the MIME headers. There are many sub parts come
under MIME headers. Let’s see each in detail.
1) MIME-Version
2) Content-Type
3) Content-Disposition
4) Content-Transfer-Encoding
MIME-Version
When the MIME was developed, the developers had a plan to further
issue the newer versions, but the problems caused by changes in a
standard discouraged further release of the same.
It is a cryptographic network
2.Secure Shell (SSH) 22 TCP and UDP protocol used to secure data
communication.
It is a communication protocol
4.Simple Mail Transfer which is used to transmit email
25 TCP
Protocol (SMTP) messages over the internet to the
destination server.
It is used in the performance of one
5.Domian Name System simple task of converting IP address
53 TCP and UDP
(DNS)
To domain names that everyone
can easily understand.
TFTP is typically used by devices to
6.Trivial File Transfer
69 UDP upgrade software and firmware and
Protocol (TFTP)
that include cisco.
8.Dynamic Host
It is a kind of service used in the
Configuration Protocol 67 and 68 UDP
client and server model.
(DHCP)
16.Real-Time Transport 1023 TO 65535 UDP It is used for delivering audio and
Protocol. (RTP) video data over an IP network.
12.what is imap?
As its name implies, IMAP allows you to access your email messages wherever you
are; much of the time, it is accessed via the Internet. Basically, email messages are
stored on servers. Whenever you check your inbox, your email client contacts the server
to connect you with your messages. When you read an email message using IMAP, you
aren't actually downloading or storing it on your computer; instead, you are reading it off
of the server. As a result, it's possible to check your email from several different devices
without missing a thing
Using IMAP
Unlike POP, IMAP allows you to access, organize, read and sort your email messages
without having to download them first. As a result, IMAP is very fast and efficient. The
server also keeps a record of all of the messages that you send, allowing you to access
your sent messages from anywhere. IMAP does not move messages from the server to
your computer; instead, it synchronizes the email that's on your computer with the email
that's on the server.
There are several advantages to using IMAP. First, it allows you to access your email
messages from anywhere, via as many different devices as you want. Second, it only
downloads a message when you click on it. As a result, you do not have to wait for all of
your new messages to download from the server before you can read them. Third,
attachments are not automatically downloaded with IMAP. As a result, you're able to
check your messages a lot more quickly and have greater control over which
attachments are opened. Finally, IMAP can be used offline just like POP - you can
basically enjoy the benefits of both protocols in one.
As the world becomes more mobile than ever, IMAP is becoming more and more
popular. The proliferation of smartphones, laptops, tablets and other devices is making
the demand for IMAP stronger than ever. While POP will remain popular with people
who only access their email via one or two devices - and those who have slow
connections to the Internet - IMAP is sure to remain the protocol of choice for most of
today's busy people.
I) SNMP Manager:
1. A manager or management system is a separate entity that is responsible to
communicate with the SNMP agent implemented network devices.
2. This is typically a computer that is used to run one or more network
management systems.
3. SNMP Manager’s key functions:
a. Queries agents.
b. Gets responses from agents.
c. Sets variables in agents.
d. Acknowledges asynchronous events from agents.
II) Managed Devices:
1. A managed device or the network element is a part of the network that
requires some form of monitoring and management
2. Example: Routers, Switches, Servers, Workstations, Printers, UPSs, etc.
III) SNMP Agent:
1. The agent is a program that is packaged within the network element.
2. It makes information available to the SNMP manager, when it is queried for.
3. These agents could be standard (e.g. Net-SNMP) or specific to a vendor (e.g.
HP insight agent)
4. SNMP agent’s key functions:
a. Collects management information about its local environment.
b. Stores and retrieves management information as defined in the MIB.
c. Signals an event to the manager.
d. Acts as a proxy for some non–SNMP manageable network node.
IV) Management Information Base (MIB):
1. Every SNMP agent maintains an information database describing the
managed device parameters.
2. The SNMP manager uses this database to request the agent for specific
information and further translates the information as needed for the Network
Management System (NMS).
3. This commonly shared database between the Agent and the Manager is
called Management Information Base (MIB).
4. MIB contains standard set of statistical and control values defined for
hardware nodes on a network.
5. MIB files are the set of questions that a SNMP Manager can ask the agent.
6. Agent collects these data locally and stores it, as defined in the MIB.
The IP6 addresses are 128 bit in length represented by 8 sets of four-digit
(16 bits long)hexadecimal numbers, ranging from 0 to FFFF (2 16), and
separated by a colon (:).
Some IP6 example addresses:
fff0:bb12:1020:1002:3333:2000:200f:326f
fff0:bb12:1020:1002:3333:2000:200f:326f
DNS is a TCP/IP protocol used on different platforms. The domain name space is divided
into three different sections: generic domains, country domains, and inverse domain.
Generic Domains
o It defines the registered hosts according to their generic behavior.
o Each node in a tree defines the domain name, which is an index to the DNS
database.
o It uses three-character labels, and these labels describe the organization type.
Country Domain
The format of country domain is same as a generic domain, but it uses two-character
country abbreviations (e.g., us for the United States) in place of three character
organizational abbreviations.
Inverse Domain
The inverse domain is used for mapping an address to a name. When the server has
received a request from the client, and the server contains the files of only authorized
clients. To determine whether the client is on the authorized list or not, it sends a query
to the DNS server and ask for mapping an address to the name.
Working of DNS
o DNS is a client/server network communication protocol. DNS clients send
requests to the. server while DNS servers send responses to the client.
o Client requests contain a name which is converted into an IP address known as a
forward DNS lookups while requests containing an IP address which is converted
into a name known as reverse DNS lookups.
o DNS implements a distributed database to store the name of all the hosts
available on the internet.
o If a client like a web browser sends a request containing a hostname, then a
piece of software such as DNS resolver sends a request to the DNS server to
obtain the IP address of a hostname. If DNS server does not contain the IP
address associated with a hostname, then it forwards the request to another DNS
server. If IP address has arrived at the resolver, which in turn completes the
request over the internet protocol.
DHCP runs at the application layer of the TCP/IP protocol stack to dynamically assign IP
addresses to DHCP clients/nodes and to allocate TCP/IP configuration information to the
DHCP clients. Information includes subnet mask information, default gateway, IP
addresses and domain name system addresses.
Components of DHCP
When working with DHCP, it is important to understand all of the components. Following
are the list of components:
o DHCP Server: DHCP server is a networked device running the DCHP service that
holds IP addresses and related configuration information. This is typically a server
or a router but could be anything that acts as a host, such as an SD-WAN
appliance.
o DHCP client: DHCP client is the endpoint that receives configuration information
from a DHCP server. This can be any device like computer, laptop, IoT endpoint
or anything else that requires connectivity to the network. Most of the devices are
configured to receive DHCP information by default.
o IP address pool: IP address pool is the range of addresses that are available to
DHCP clients. IP addresses are typically handed out sequentially from lowest to
the highest.
o Subnet: Subnet is the partitioned segments of the IP networks. Subnet is used to
keep networks manageable.
o Lease: Lease is the length of time for which a DHCP client holds the IP address
information. When a lease expires, the client has to renew it.
o DHCP relay: A host or router that listens for client messages being broadcast on
that network and then forwards them to a configured server. The server then
sends responses back to the relay agent that passes them along to the client.
DHCP relay can be used to centralize DHCP servers instead of having a server on
each subnet.
c