0% found this document useful (0 votes)
21 views6 pages

CH 5 Application Layer Protocols 20m

Uploaded by

danepratik4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views6 pages

CH 5 Application Layer Protocols 20m

Uploaded by

danepratik4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CH.

5 APPLICATION LAYER PROTOCOLS 20M

Q.1 State the need of domain name system. 2M


Need of domain name system:
Since IP addresses are difficult to remember and names are easier to remember Domain Name
System is used and DNS servers are used for converting these names into IP addresses.
Large number to hosts and servers connected in the internet can be classified using Domain name
system so that hierarchical naming system is implemented.
To identify an entity, TCP/IP protocols use the IP address. An IP is uniquely identifies the
connection of a host to internet. Use for mapping can map a name to an address or an address to a
name.

Q.2 State the transmission modes of FTP. 2M


Transmission modes of FTP:
1. Stream mode
2. Block mode
3. Compressed mode

Q.3 Explain working of WWW. 4M


(Note: Description explaining the concept shall be considered).
The Web is a repository of information in which the documents called web pages, are distributed all
over the world and related documents are linked together.
The WWW today is a distributed client-server service, in which a client using a browser can access a
service using a server.
The service provided is distributed over many locations called sites.
Each site holds one or more web pages. Each web page can contain some links to other web pages in
the same or other sites.
• Simple web page has no links to other web pages.
• Composite web page has one or more links to other webpages.
Each web page is a file with a name and address.
The web page is stored at the web server. Each time a request arrives, the corresponding document is
sent to the client.

Q.4 Explain the working of TELNET. 4M


TELNET: TELNET is an abbreviation for Terminal Network. It is the standard TCP/IP protocol for virtual
terminal service.
TELNET Working:
TELNET is a client-server application that allows a user to log on to a remote machine, giving the user
access to the remote system.
The user sends the keystrokes to the terminal driver, where the local operating system accepts the
characters but does not interpret them.
A terminal driver correctly interprets the keystrokes on the local terminal or terminal emulator.
The characters are sent to the TELNET client, which transforms the characters to a universal character set
called network virtual terminal (NVT) characters and delivers them to the local TCP/IP protocol stack.
The commands or text, in NVT form, travel through the Internet and arrive at the TCP/IP stack at the
remote machine.
Here the characters are delivered to the operating system and passed to the TELNET server, which
changes the characters to the corresponding characters understandable by the remote computer.
However, the characters cannot be passed directly to the operating system because the remote operating
system is not designed to receive characters from a TELNET server: It is designed to receive characters
from a terminal driver.
A piece of software called a pseudo terminal driver is added which pretends that the characters are coming
from a terminal.
The operating system then passes the characters to the appropriate application program.

Fig. Working of TELNET

Q.5 Construct a diagram to show the application of cookies in a scenario in which the server uses
cookies for advertisement. (Note: Any other diagram shall be considered) 4M
Use of Cookies for advertisements:
A cookie is also used by advertising agencies. An advertising agency can place banner ads on some main
website that is often visited by users. The advertising agency supplies only a URL that gives the banner
address instead of the banner itself. When a user visits the main website and clicks on the icon of an
advertised corporation, a request is sent to the advertising agency.
The advertising agency sends the banner, a GIF file, for example, but it also includes a cookie with the ill of
the user.
Any future use of the banners adds to the database that profiles the Web behaviour of the user. The
advertising agency has compiled the interests of the user and can sell this information to other parties. This
use of cookies has made them very controversial. Hopefully, some new regulations will be devised to
preserve the privacy of users.

Fig. Use of Cookies in advertisement

OR

Figure below shows a scenario in which an electronic store can benefit from the use of cookies.
A shopper wants to buy a toy from an electronic store named BestToys.com.
The Server sends the Webpage, but it also includes a cookie with the ID 12343.
Using this a file is created such that the information clicked by the user is sent and stored in the file, which
are used by the server.

Q.6 Describe the HTTP response message format. 4M


(Note: Any other diagram showing the actual contents of the format shall be considered).
Status Line
Status line shows status for the response it indicates response status using a code as well as a status phrase.
The status-Line begins with a protocol version, then status code and status phrase.
E.g: HTTP/1.1 200 OK
Headers
Three types of headers are present HTTP Response message which are as follows.
General Header
The general header gives general information about the message and can be present in both a request and a
response.
e.g. Date: Mon, 27 Jul 2009 12:28:53 GMT
Response Header
The response header can be present only in a response message. It specifies the server's configuration and
special information about the request.
e.g. Server: Apache/2.2.14 (Win32)
Entity Header
The entity header gives information about the body of the document.
e.g. Content-Length: 88
e.g. Content-Type: text/html
Blank Line
An empty line (i.e., a line with nothing preceding the CRLF) indicating the end of the header fields
Body
It contains actual content. This part is optional.

Q.7 Explain about standard and non standard protocols at the application layer. 4M
(Note: Any other protocol shall be considered).
HTTP
• The Hypertext Transfer Protocol (HTTP) is a Application layer protocol used mainly to access data on the
World Wide Web.
• HTTP uses the services of TCP on well-known port 80.
FTP
• FTP (File Transfer Protocol) is standard TCP/IP protocol to transfer files.
• It uses the services of TCP. It needs two TCP connections.
• The well-known port 21 is used for the control connection and the well-known port 20 for the data
connection.
SMTP
• It stands for Simple Mail Transfer Protocol. It is a part of the TCP/IP standard protocol.
• Using a process called “store and forward,” SMTP moves your email on and across networks.
• It works closely with something called the Mail Transfer Agent (MTA) to send your communication to the
right computer and email inbox.
• Port number for SMTP is 25.
TELNET
• TELNET is an abbreviation for TErminaLNETwork. It is the standard TCP/IP protocol for virtual terminal
service
• TELNET enables the establishment of a connection to a remote system in such a way that the local
terminal appears to be a terminal at the remote system.
• There are two parties involved TELNET Client and TELNET server.
DNS
• It stands for Domain Name Service. Every time you use a domain name, therefore, a DNS service must
translate the name into the corresponding IP address.
• For example, the domain name www.abc.com might translate to 198.105.232.4.
• Port number for DNS is 53.
DHCP
• It stands for Dynamic Host Configuration Protocol (DHCP). It gives IP addresses to hosts.
• There is a lot of information a DHCP server can provide to a host when the host is registering for an IP
address with the DHCP server.
• Port number for DHCP is 67, 68.
POP3
• Post Office Protocol, version 3 (POP3) is simple and limited in functionality.
• POP works as a Message Access Agent.
• The client POP3 software is installed on the recipient computer; the server POP3 software is installed on
the mail server.
• Mail access starts with the client when the user needs to download e-mail from the mailbox on the mail
server.

Q.8 Describe E-mail security over non-secure channel. 6M


(Note: Any other explanation on email security shall be considered.)
Email security describes different techniques for keeping sensitive information in email communication
and accounts secure against unauthorized access, loss or compromise.
Email is often used to spread malware, spam and phishing attacks. Attackers use deceptive messages to
entice recipients to part with sensitive information, open attachments or click on hyperlinks that install
malware on the victim’s device.
Email encryption involves encrypting, or disguising, the content of email messages to protect potentially
sensitive information from being read by anyone other than intended recipients. Email encryption often
includes authentication.
Email allows attackers to use it as a way to cause problems in attempt to profit. Whether through spam
campaigns, malware and phishing attacks, sophisticated targeted attacks, or business email compromise
(BEC), attackers try to take advantage of the lack of security of email to carry out their actions.
Since most organizations rely on email to do business, attackers exploit email in an attempt to steal
sensitive information.
Because email is an open format, it can be viewed by anyone who can intercept it. It can be easily read and
the contents of an email by intercepting it.
Email Security Policies can be established by viewing the contents of emails flowing through their email
servers. It’s important to understand what is in the entire email in order to act appropriately. After these
baseline policies are put into effect, an organization can enact various security policies on those emails.
These email security policies can be as simple as removing all executable content from emails to more in-
depth actions, like sending suspicious content to a sandboxing tool for detailed analysis.
If security incidents are detected by these policies, the organization needs to have actionable intelligence
about the scope of the attack.
Enforce email encryption policies to prevent sensitive email information from falling into the wrong hands.
An email gateway scans and processes all incoming and outgoing email and makes sure that threats are not
allowed in.
Because attacks are increasingly sophisticated, standard security measures, such as blocking known bad file
attachments, are no longer effective
Deploy a secure email gateway that uses a multi-layered approach.
It‟s also important to deploy an automated email encryption solution as a best practice. This solution
should be able to analyze all outbound email traffic to determine whether the material is sensitive.
If the content is sensitive, it needs to be encrypted before it is emailed to the intended recipient. This will
prevent attackers from viewing emails, even if they were to intercept them.
The Pretty Good Privacy (PGP) provides e-mail with privacy,integrity, and authentication can be used
over non secure channel such as internet. It is used for signing, encrypting and decrypting texts, e-mails,
files, directories and whole disk partitions and to increase the security of e-mail communications.
Another security service designed for electronic mail is Secure/Multipurpose Internet Mail Extension
(S/MIME). The protocol is an enhancement of the Multipurpose Internet Mail Extension (MIME) protocol.
This allows user to digitally sign the email to enhance privacy and data security.

You might also like