2.Network Protocols - Copy
2.Network Protocols - Copy
2.Network Protocols - Copy
TCP UDP
• FTP – 20-21 • DHCP – 67 & 68
• Telnet – 23 • POP – 110
• SMTP – 25
• DNS – 53 (Both TCP & UDP)
• HTTP – 80
• The (HTTP) is a protocol used mainly to access data on the World Wide Web.
• HTTP use TCP connection and port 80.
• HTTP messages are not destined to be read by humans; (read and interpreted by the HTTP
server and HTTP client (browser).
• is a stateless protocol, which means that the server does not keep information about the client.
The client initializes the transaction by sending a request. The server replies by sending a
response.
• A client that wants to access a Web page needs the file name and the address.
• The uniform resource locator (URL) is a standard locator for specifying any kind of
information on the Internet, The URL defines four things:
Steps:
1) URL is typed in the address bar.
2)Browser checks with DNS server to convert it to an IP address
3)Connects to the server requested
4)Using HTTP or HTTPS protocol requirements, the browser sends a GET request to the server to ask
for the desired html document (usually index.html)
5)The server sends the HTML code for the web page to the browser.
6)The browser interprets the HTML code and formats the page to fit the browser window.
HTTPS(HTTP + SSL)
• HTTPS = HTTPS stands for Hypertext Transfer Protocol over Secure Socket Layer (SSL), or
HTTP over SSL.
• HTTPS by default uses port 443.
• URL's beginning with HTTPS indicate that the connection is encrypted using SSL.
• Disadvantage of HTTPS:
• HTTPS is slightly slower than HTTP because of the encryption of data.
• One DNS server can’t response to all of the demands that coming from all over the world.
• The problem is how we can distribute the traffic among more DNS servers, This problem
solved by Domain Name Space.
2. A name in this space is an sequence of 2. The first part can define the nature of the
characters without structure. organization, the second part can define
the name of an organization, the third
part can define departments in the
organization.
• DNS organizes the name space in a hierarchical structure to decentralize the responsibilities
involved in naming. Distributed the traffic between more than one DNS server.
• hierarchical tree structure with one root
• The tree can have only 128 levels: level 0 (root) to level 127
• Generic domains :There are fourteen generic domains, each specifying an organization type.
• Country domains (uses two character country abbreviations, Second labels can be
organizational and so on)
E-mail services and SMTP/POP protocols
3)For two e-mail servers to talk – MUST run SMTP and MTA in order to transfer mail between the 2
servers!
• SMTP uses commands and responses to transfer messages between an MTA client and an
MTA server.
• Connection Termination
The first and the second stages of mail delivery use SMTP. However, SMTP is not involved in the
third stage because SMTP is a push protocol; it pushes the message from the client to the server.
E-mail Server Processes - MTA and MDA and the SMTP protocol
• The e-mail server operates two separate processes:
1- Mail Transfer Agent (MTA)
2- Mail Delivery Agent (MDA)
• The Mail Transfer Agent (MTA) process is used to forward e-mail.
• The MTA receives messages from the MUA or from another MTA on another e-mail server.
• Based on the message header, it determines how a message has to be forwarded to reach its
destination.
• If the mail is addressed to a user whose mailbox is on the local server, the mail is passed to the
MDA. If the mail is for a user not on the local server, the MTA routes the e-mail to the MTA
on the appropriate server.
FTP
• Commonly used application layer protocol
• Allows for the transfer of files between clients/servers.
• Requires 2 connections to the server:
Commands – uses TCP port 21
Actual data – uses TCP port 20
Telnet
• Allows users to emulate text-based terminal devices over the network using software.
• A connection is known as a ‘virtual terminal ’ session.
• Can be run from the command prompt on a PC.
• You can use the device as if you were sitting there with all the rights and priorities that you
username will offer you.
• Disadvantages: Doesn’t support encryption like SSH. All data is transferred as plain text. It
can be easily intercepted and understood.
• If security is a concern, you should use Secure Shell (SSH) protocol. Provides for remote
logins with stronger authentication than telnet.
• SMB has become a mainstay of Microsoft networking, even more so since the introduction of
Windows 2000 software.
• Allows servers to share their resources with clients
• Linux and Unix also share with Microsoft networks using a version of SMB called SAMBA.
• Apple also supports sharing resources using an SMB protocol
• What can SMB do?
SSL SSH
is TCP-based and always used in WEB is TCP-based and always used with Telnet and
applications, with HTTP. FTP
SSH-2 components
After a secure channel is established between the client and the server and the server is authenticated
for the client, SSH can call another software that can authenticate the client for the server.
SSH Applications
• Remote login
• file transfer
Port Forwarding
• Length: This 4-byte field defines the length of the packet including the type, the data, and the
CRC field, but not the padding and the length field.
• Padding: One to eight bytes of padding is added to the packet to make the attack on the
security provision more difficult.
• Type: This one-byte field defines the type of the packet used by SSH protocols.
• CRC: The cyclic redundancy check filed is used for error detection.