0% found this document useful (0 votes)
9 views

Computer Network Unit-5

asdfadfadfasf

Uploaded by

rajeshkollu81
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Computer Network Unit-5

asdfadfadfasf

Uploaded by

rajeshkollu81
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 72

Mr.

M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT-5
Application Layer
Topic
2. DNS the different perspectives from which software can be modelled.
Identify
 TELNET
 E-MAIL
 FTP
 WWW
 HTTP
 SNMP
 Bluetooth
 Firewalls
Application Layer
The Application Layer is the topmost layer in the OSI (Open Systems Interconnection)
model and the TCP/IP (Transmission Control Protocol/Internet Protocol) model. It is
2. Identify the different perspectives from which software can be modelled.
responsible for providing network services directly to end-users or applications. The
Application Layer interacts with software applications to provide communication
services and exchange data between networked devices.

Key characteristics and functions of the Application Layer include:

Interface with User Applications: The Application Layer provides an interface between
the network and the software applications running on the end-user devices. It enables
users to interact with network resources and services.
Protocols and Services: The Application Layer encompasses a wide range of protocols
and services that facilitate various tasks, such as email transmission (SMTP), file
transfer (FTP), web browsing (HTTP), domain name resolution (DNS), remote terminal
access (Telnet), and network management (SNMP).
Data Representation and Encoding: The Application Layer is responsible for ensuring
that data exchanged between applications is properly formatted, encoded, and
understood by both the sender and receiver. It handles tasks such as data compression,
encryption, and character encoding.
Key characteristics and functions of the Application Layer
Application-Layer Gateways (ALGs): ALGs are software components or devices
that reside atthethe
2. Identify Application
different Layer and
perspectives provide
from whichtranslation andbeinterpretation
software can modelled. services
for specific applications or protocols. They are commonly used in firewalls and
network address translation (NAT) devices to inspect and modify application-layer
traffic.
Client-Server Communication: The Application Layer facilitates communication
between client and server applications in a networked environment. Client
applications initiate requests for services or resources, while server applications
respond to those requests and provide the requested services.
End-to-End Communication: The Application Layer ensures end-to-end
communication between applications across different network devices and protocols.
It abstracts the underlying network complexities and provides a unified interface for
applications to communicate regardless of the network infrastructure.
Support for Distributed Computing: With the proliferation of distributed computing
environments and cloud-based services, the Application Layer plays a crucial role in
enabling seamless communication and interaction between distributed applications
and services.
.
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT-5
DNS
DNS

• Identify
2. DNS, ortheDomain
differentName
perspectives
System,from
is a which software
distributed can be modelled.
hierarchical naming system used to translate human-
readable domain names (like www.example.com) into IP addresses (like 192.168.1.1) and vice versa.
• It serves as the "phonebook" of the internet, allowing users to access websites and other internet
resources using easy-to-remember domain names rather than numerical IP addresses.
DNS works
1. Domain Names: Users type a domain name (e.g., www.example.com) into their web browser to access
a website or service.
2. DNS Query: The user's device (e.g., computer, smartphone) sends a DNS query to a DNS resolver
(also known as a DNS resolver server or DNS resolver cache) to resolve the domain name into an IP
address.
3. DNS Resolver: The DNS resolver is typically provided by the user's internet service provider (ISP) or
configured by the network administrator. If the resolver has the IP address cached from previous
queries, it returns the result immediately. Otherwise, it proceeds to resolve the domain name by
querying other DNS servers.
4. DNS Hierarchy: If the resolver doesn't have the IP address cached, it sends a recursive query to the
root DNS servers, which are authoritative for the root zone of the DNS hierarchy. The root servers
respond with the IP addresses of the top-level domain (TLD) servers responsible for the requested
domain's TLD (e.g., .com, .org, .net).
5. Top-Level Domain (TLD) Servers: The resolver sends another query to the TLD servers to obtain the
IP addresses of the authoritative name servers responsible for the second-level domain (e.g.,
example.com).
DNS works
1. Authoritative Name Servers: The resolver sends a query to one of the authoritative name servers
responsible for the domain (e.g., example.com). These servers have the authoritative information
about the domain's DNS records, including its IP address.
2. DNS Response: The authoritative name server responds with the IP address associated with the
domain name.
3. Caching: The resolver caches the IP address locally for future queries, reducing the need to perform
the entire resolution process again for subsequent requests to the same domain.
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT-5
TELNET
DNS

• Identify
2. TELNET,the different
short forperspectives
"TELetype from which software
NETwork," can beprotocol
is a network modelled.
used on the internet or local area
networks to provide a bidirectional interactive text-oriented communication facility.
• It allows a user to establish a connection to a remote host or server and interact with it as if they were
directly connected to that remote system's console.
 Logging
• The logging process can be further categorized into two parts:
1. Local Login
2. Remote Login
TELNET

• Identify
2. theLogin:
1. Local different perspectives
Whenever a userfrom
logswhich
into itssoftware can beitmodelled.
local system, is known as local login.

The Procedure of Local Login


•Keystrokes are accepted by the terminal
driver when the user types at the
terminal.
•Terminal Driver passes these characters
to OS.
•Now, OS validates the combination of
characters and opens the required
application
TELNET

• Identify
2. Remote theLogin:
different perspectives
Remote Login isfrom which in
a process software can becan
which users modelled.
log in to a remote site i.e. computer and
use services that are available on the remote computer. With the help of remote login, a user is able to
understand the result of transferring the result of processing from the remote computer to the local
computer.
The Procedure of Remote Login
• When the user types something on the local computer, the local operating system accepts the
character.
• The local computer does not interpret the characters, it will send them to the TELNET client.
• TELNET client transforms these characters to a universal character set called
Network Virtual Terminal (NVT) characters and it will pass them to the local TCP/IP protocol
Stack.
• Commands or text which are in the form of NVT, travel through the Internet and it will arrive
at the TCP/IP stack at the remote computer.
• Characters are then delivered to the operating system and later on passed to the TELNET
server.
• Then TELNET server changes those characters to characters that can be understandable by a
remote computer.
• The remote operating system receives characters from a pseudo-terminal driver, which is a
piece of software that pretends that characters are coming from a terminal.
• The operating system then passes the character to the appropriate application program.
Network Virtual Terminal(NVT)

• NVT (Network Virtual Terminal) is a virtual terminal


in TELNET that has a fundamental structure that is
shared by many different types of real terminals. NVT
(Network Virtual Terminal) was created to make
communication viable between different types of
terminals with different operating systems.

TELNET Commands
Commands of Telnet are identified by a prefix
character, Interpret As Command (IAC) with
code 255. IAC is followed by command and
option codes.
The basic format of the command is as shown in
the following figure :
Following are some of the important TELNET commands:
Following are some common options used with the telnet:
Code Option Meaning

0 Binary It interprets as 8-bit binary transmission.

1 Echo It will echo the data that is received on one side to the other side.

3 Suppress go ahead It will suppress go ahead signal after data.

5 Status It will request the status of TELNET.

6 Timing mark It defines the timing marks.

8 Line width It specifies the line width.

9 Page size It specifies the number of lines on a page.

24 Terminal type It set the terminal type.


Advantages and DisAdvs of Telnet

• Advantages of Telnet
1. It provides remote access to someone’s computer system.
2. Telnet allows the user for more access with fewer problems in data transmission.
3. Telnet saves a lot of time.
4. The oldest system can be connected to a newer system with telnet having different operating systems.
• Disadvantages of Telnet
1. As it is somehow complex, it becomes difficult to beginners in understanding.
2. Data is sent here in form of plain text, that’s why it is not so secured.
3. Some capabilities are disabled because of not proper interlinking of the remote and local devices.
• Modes of Operation
Modes of Operation
• Most telnet implementations operate in one of the following three modes:
1. Default mode
2. Character mode
3. Line mode
• 1. Default Mode: If no other modes are invoked then this mode is used. Echoing is performed in this
mode by the client. In this mode, the user types a character and the client echoes the character on the
screen but it does not send it until the whole line is completed.
• 2. Character Mode: Each character typed in this mode is sent by the client to the server. A server in
this type of mode normally echoes characters back to be displayed on the client’s screen.
• 3. Line Mode: Line editing like echoing, character erasing, etc. is done from the client side. The
client will send the whole line to the server.
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT-5
E-MAIL
E-MAIL
• Email is a fundamental service provided over computer networks, and its operation involves various
2. components
Identify the different perspectives
and protocols from which
that facilitate software canreception,
the transmission, be modelled.
and storage of email messages. Here’s a
detailed explanation of how email works within the context of computer networks:
• Components of Email in Computer Networks
1. Email Clients
1. Software applications used by users to compose, send, receive, and manage emails (e.g., Outlook,
Thunderbird, Gmail).
2. Mail Servers
1. Servers responsible for sending, receiving, and storing emails. There are two main types:
1.SMTP Server: Handles the sending of emails.
2.IMAP/POP3 Server: Handles the retrieval of emails.
3. DNS (Domain Name System)
1. Translates domain names into IP addresses, enabling the routing of emails
to the correct mail servers.
E-MAIL
• Key Protocols
2. Identify the different perspectives from which software can be modelled.
1. SMTP (Simple Mail Transfer Protocol)
1. Used for sending emails from an email client to an email server or between email servers.
2. Operates typically on port 25, with ports 587 and 465 used for secure transmission (SMTP over SSL/TLS).
2. IMAP (Internet Message Access Protocol)
1. Used for retrieving emails from a mail server to an email client while keeping emails on the server,
allowing synchronization across multiple devices.
2. Operates typically on port 143, with port 993 used for secure connections (IMAP over SSL/TLS).
3. POP3 (Post Office Protocol version 3)
1. Used for retrieving emails from a mail server to an email client, typically
downloading emails to the local device and removing them from the server.
2.Operates typically on port 110, with port 995 used for secure connections
(POP3 over SSL/TLS).
Email Transmission Process

1. Composing and Sending an Email


1. The user composes an email using an email client.
2. The email client connects to the SMTP server using SMTP.
3. The SMTP server processes the email, identifies the recipient's domain, and uses DNS to find
the recipient's mail server.
4. The email is transmitted to the recipient's SMTP server.
2. Receiving an Email
1. The recipient's mail server stores the incoming email.
2. The recipient's email client connects to the mail server using IMAP or POP3 to retrieve the
email.
3. If using IMAP, the email remains on the server and can be accessed from multiple devices.
4. If using POP3, the email is downloaded to the local device and typically removed from the
server.
Detailed Example Workflow

1. User A sends an email to User B.


1. User A's email client connects to User A's SMTP server.
2. The SMTP server processes the email and queries the DNS to find the IP address of User B's mail
server.
3. The SMTP server forwards the email to User B's SMTP server.
2. User B retrieves the email.
1. User B’s email client connects to User B's IMAP or POP3 server.
2. Using IMAP, User B’s email client synchronizes with the server, keeping the email on the server.
3. Using POP3, the email client downloads the email to the local device and typically removes it from
the server.
Security Considerations

1. Encryption
1. SSL/TLS: Secures the connection between email clients and servers, and between servers,
ensuring that email content is encrypted during transmission.
2. Authentication
1. Email servers require user authentication to prevent unauthorized access to email accounts.
3. Spam Filtering
1. Email servers often include spam filters to detect and block unwanted emails.
4. Anti-virus Scanning
1. Emails are scanned for malware before being delivered to the recipient.
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT-5
FTP
FTP
• File Transfer Protocol (FTP) is a standard network protocol used
for the transfer of files between a client and a server over a
2. computer
Identify thenetwork.
differentHere’s
perspectives from which explanation
a comprehensive software canof
be FTP,
modelled.
including its key components, protocols, operation, and security
considerations:
FTP?
• FTP (File Transfer Protocol) is a client-server protocol that allows
users to transfer files between computers over a TCP/IP network,
such as the internet. It was developed in the 1970s and remains
widely used for exchanging files.
• Key Components
1. FTP Client
1. A software application that initiates the connection to an FTP
server to upload or download files. Examples include FileZilla,
WinSCP, and command-line FTP utilities.
2. FTP Server
1. A server that responds to requests from FTP clients to transfer
files. It hosts the files and directories accessible via FTP.
FTP Protocol
• FTP operates on the application layer of the OSI model and relies on TCP for reliable data transfer. It uses
two main channels:
1. Control Channel
1. Used for sending commands and receiving responses between the client and server.
2. Operates on TCP port 21 by default.
2. Data Channel
1. Used for transferring actual files between the client and server.
2. Operates on a dynamically allocated port, depending on the mode (active or passive).
 FTP Modes
1. Active Mode
1. The client opens a random port and informs the server of this port number.
2. The server then initiates the data connection from its port 20 to the client's specified port.
3. Firewall and NAT issues can arise because the server initiates the connection to the client.
2. Passive Mode
1. The server opens a random port and informs the client of this port number.
2. The client then initiates the data connection to the server's specified port.
3. This mode is often used to circumvent firewall and NAT issues, as the client initiates both control and
data connections.
FTP Commands

• FTP commands are text-based and follow a standard syntax. Some common commands include:
• USER: Specifies the username for authentication.
• PASS: Specifies the password for authentication.
• LIST: Lists the files and directories in the current directory.
• RETR: Retrieves (downloads) a file from the server.
• STOR: Stores (uploads) a file to the server.
• CWD: Changes the working directory on the server.
• QUIT: Closes the connection.
FTP Operation
1. Connecting to the Server
1. The client initiates a connection to the server's control port (port 21).
2. The client sends the USER and PASS commands to authenticate.
2. Navigating the Server
1. The client can change directories using the CWD command and list files using the LIST command.
3. Transferring Files
1. To download a file, the client sends the RETR command followed by the file name.
2. To upload a file, the client sends the STOR command followed by the file name.
3. Depending on the mode (active or passive), the data channel is established accordingly to transfer
the file.
4. Closing the Connection
1. The client sends the QUIT command to terminate the session.
Security Considerations
• FTP was not designed with security in mind, leading to several vulnerabilities:
1. Plaintext Transmission
1. Credentials and data are sent in plaintext, making them susceptible to interception.
2. Secure Alternatives
1. FTPS (FTP Secure): Adds SSL/TLS encryption to FTP, securing the control and data channels.
2. SFTP (SSH File Transfer Protocol): Not related to FTP but uses SSH to provide a secure file
transfer mechanism.
3. Firewall and NAT Issues
1. Active mode can have issues with firewalls and NAT, making passive mode more commonly used.
Applications of FTP

• The following are the applications of FTP:


• FTP connection is used by different big business organizations for transferring files in between them,
like sharing files to other employees working at different locations or different branches of the
organization.
• FTP connection is used by IT companies to provide backup files at disaster recovery sites.
• Financial services use FTP connections to securely transfer financial documents to the respective
company, organization, or government.
• Employees use FTP connections to share any data with their co-workers.
Adv and DisAdv of FTP
 Advantages
• Multiple transfers: FTP helps to transfer multiple large files in between the systems.
• Efficiency: FTP helps to organize files in an efficient manner and transfer them efficiently over the network.
• Security: FTP provides access to any user only through user ID and password. Moreover, the server can
create multiple levels of access.
 Continuous transfer: If the transfer of the file is interrupted by any means, then the user can resume the file
transfer whenever the connection is established.
• Simple: FTP is very simple to implement and use, thus it is a widely used connection.
• Speed: It is the fastest way to transfer files from one computer to another.
 Disadvantages
• Less security: FTP does not provide an encryption facility when transferring files. Moreover, the username
and passwords are in plain text and not a combination of symbols, digits, and alphabets, which makes it
easier to be attacked by hackers.
• Old technology: FTP is one of the oldest protocols and thus it uses multiple TCP/IP connections to transfer
files. These connections are hindered by firewalls.
• Virus: The FTP connection is difficult to be scanned for viruses, which again increases the risk of
vulnerability.
• Limited: The FTP provides very limited user permission and mobile device access.
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT-5
WWW
World Wide Web
• The World Wide Web or Web is basically a collection of information that is linked together from points all
over the world.
• It is also abbreviated as WWW.
• World wide web provides flexibility, portability, and user-friendly features.
• It mainly consists of a worldwide collection of electronic documents (i.e, Web Pages).
• It is basically a way of exchanging information between computers on the Internet.
• The WWW is mainly the network of pages consists of images, text, and sounds on the Internet which can be
simply viewed on the browser by using the browser software.
• It was invented by Tim Berners-Lee.
Components of WWW
The Components of WWW mainly falls into two
categories:
1.Structural Components
2.Semantic Components
Architecture of WWW
• The WWW is mainly a distributed client/server
service where a client using the browser can access
the service using a server. The Service that is
provided is distributed over many different locations
commonly known as sites/websites.
 Each website holds one or more documents that are
generally referred to as web pages.
 Where each web page contains a link to other pages
on the same site or at other sites.
 These pages can be retrieved and viewed by using
browsers.
1.Client/Browser
• The Client/Web browser is basically a program
that is used to communicate with the webserver
on the Internet.
• Each browser mainly comprises of three
components and these are:
•Controller
•Interpreter
•Client Protocols
•The Controller mainly receives the input from the
input device, after that it uses the client programs
in order to access the documents.
•After accessing the document, the controller
makes use of an interpreter in order to display the
document on the screen.
•An interpreter can be Java, HTML, javascript
mainly depending upon the type of the document.
•The Client protocol can be FTP, HTTP, TELNET
• 2.Server
Components
• The Computer that is mainly available for the network resources and in order to provide services to the
other computer upon request is generally known as the server.
• The Web pages are mainly stored on the server.
• Whenever the request of the client arrives then the corresponding document is sent to the client.
• The connection between the client and the server is TCP.
• It can become more efficient through multithreading or multiprocessing. Because in this case, the server
can answer more than one request at a time.
3.URL
URL is an abbreviation of the Uniform resource locator.
•It is basically a standard used for specifying any kind of information on the Internet.
•In order to access any page the client generally needs an address.
•To facilitate the access of the documents throughout the world HTTP generally makes use of Locators.
URL mainly defines the four things:

• Protocol: It is a client/server program that is mainly used to retrieve the document. A commonly used
protocol is HTTP.
• Host Computer :It is the computer on which the information is located.
It is not mandatory because it is the name given to any computer that hosts the web page.

• Port
The URL can optionally contain the port number of the server.
If the port number is included then it is generally inserted in between the host and path and is generally
separated from the host by the colon.
• Path
It indicates the pathname of the file where the information is located.

https://www.google.com/ IP: 142.250.189.206


WWW Components continue..
• 4.HTML
• HTML is an abbreviation of Hypertext Markup Language.
• It is generally used for creating web pages.
• It is mainly used to define the contents, structure, and organization of the web page.
• 5.XML
• XML is an abbreviation of Extensible Markup Language. It mainly helps in order to define the
common syntax in the semantic web.
Features of WWW

• Given below are some of the features provided by the World Wide Web:
• Provides a system for Hypertext information
• Open standards and Open source
• Distributed.
• Mainly makes the use of Web Browser in order to provide a single interface for many services.
• Dynamic
• Interactive
• Cross-Platform
Advantages&DisAdv of WWW
 Advantages of WWW

• Given below are the benefits offered by WWW:


• It mainly. provides all the information for Free.
• Provides rapid Interactive way of Communication.
• It is accessible from anywhere.
• It has become the Global source of media.
• It mainly facilitates the exchange of a huge volume of data
 Disadvantages of WWW

• There are some drawbacks of the WWW and these are as follows;
• It is difficult to prioritize and filter some information.
• There is no guarantee of finding what one person is looking for.
• There occurs some danger in case of overload of Information.
• There is no quality control over the available data.
• There is no regulation.
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT-5
HTTP
• HTTP stands for Hypertext Transfer Protocol and is mainly used to access the data on the world wide web
i.e (WWW). The HTTP mainly functions as the combination of FTP(File Transfer Protocol) and
SMTP(Simple Mail Transfer Protocol).
• HTTP is one of the protocols used at the Application Layer.
• The HTTP is similar to FTP because HTTP is used to transfer the files and it mainly uses the services of
TCP.
• Also, HTTP is much simpler than FTP because there is only one TCP connection.
• In HTTP, there is no separate control connection, as only data is transferred between the client and the
server.
• The HTTP is like SMTP because the transfer of data between the client and server simply looks like
SMTP messages. But there is a difference unlike SMTP, the HTTP messages are not destined to be read
by humans as they are read and interpreted by HTPP Client(that is browser) and HTTP server.
• Also, SMTP messages are stored and then forwarded while the HTTP messages are delivered
immediately.
• The HTTP mainly uses the services of the TCP on the well-known port that is port 80.
• HTTP is a stateless protocol.
• In HTTP, the client initializes the transaction by sending a request message, and the server replies by
sending a response.
• This protocol is used to transfer the data in the form of plain text, hypertext, audio as well as video, and so
on.
Working of HTTP

•There is a connection that becomes open between the client and


the webserver through the TCP.
•After that, the HTTP sends a request to the server that mainly
collects the requested data.
•The response with the objects is sent back to the client by HTTP
•At last, HTTP closes the connection.
Request Line and Status line
• The first line in the Request
message is known as the request
line, while the first line in the
Response message is known as the
Status line.

Name of Method Actions


GET This method is used to request a document from the server.
This method mainly requests information about a document and not the document
HEAD
itself
POST This method sends some information from the client to the server.
PUT This method sends a document from the server to the client.
TRACE This method echoes the incoming request.
CONNECT This method means reserved
OPTION In order to inquire about the available options.
• URL
• URL is a Uniform Resource locator and it is mainly a standard way of specifying any kind of
information on the Internet.
• HTTP Version
• The current version of the HTTP is 1.1.
• Status Code
• The status code is the field of the response message.The status code consists of three digits.
• Status Phrase
• This field is also used in the response message and it is used to explain the status code in the form of
text.
Header
• The header is used to exchange the additional information between the client and the server. The header
mainly consists of one or more header lines. Each header line has a header name, a colon, space, and a
header value.
• The header line is further categorized into four:
• General Header
It provides general information about the message and it can be present in both request and response.
• Request Header
It is only present in the request message and is used to specify the configuration of the client and the
format of the document preferred by the client
• Response Header
This header is only present in the response header and mainly specifies the configuration of the server and
also the special information about the request.
• Entity Header
It is used to provide information about the body of the document
Features of HTTP
 Body
• It can be present in the request message or in the response message. The body part mainly contains the
document to be sent or received.
• The HTTP offers various features and these are as follows:
1. HTTP is simple
The HTTP protocol is designed to be plain and human-readable.
2. HTTP is stateless
Hypertext transfer protocol(HTTP) is a stateless protocol, which simply means that there is no connection
among two requests that are being consecutively carried out on the same connection. Also, both the client
and the server know each other only during the current requests and thus the core of the HTTP is itself a
stateless one, On the other hand, the HTTP cookies provide in making use of stateful sessions.
3. HTTP is extensible
The HTTP can be integrated easily with the new functionality by providing a simple agreement between
the client and the server.
4. HTTP is connectionless
As the HTTP request is initiated by the browser (HTTP client) and as per the request information by the
user, after that the server processes the request of the client and then responds back to the client
Advantages &DisAdv of HTTP
 Advantages of HTTP
• Given below are the benefits of using HTTP:
1. There is no runtime support required to run properly.
2. As it is connectionless so there is no overhead in order to create and maintain the state and
information of the session.
3. HTTP is usable over the firewalls and global application is possible.
4. HTTP is platform-independent.
5. HTTP reports the errors without closing the TCP connection.
6. Offers Reduced Network congestions.
 Disadvanatges of HTTP
• There are some drawbacks of using the HTTP protocol:
• HTTP is not optimized for mobile.
• HTTP is too verbose.
• It can be only used for point-to-point connections.
• This protocol does not have push capabilities.
• This protocol does not offer reliable exchange without the retry logic.
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT-5
SNMP
SNMP Protocol
•SNMP mainly stands for Simple Network Management protocol.
•It is basically a framework that is used for managing the devices on the internet by using the TCP/IP protocol
suite.
•Basically, SNMP provides a set of fundamental operations in order to monitor and maintain the Internet.
•It is an application layer protocol that was defined by the Internet engineering task force.
•This protocol is mainly used to monitor the network, detect the faults in the Network, and sometimes it is
also used to configure the remote devices.

there are three components in the architecture of the SNMP:


•SNMP Manager
•SNMP Agent
•Management Information Base
SNMP agents
 mainly collect the management information about its local environment
 The SNMP agent mainly signals an event to the manager.
 The SNMP agents also act as a proxy for some non–SNMP manageable network nodes.
• Thus the management with SNMP is mainly based on these given ideas:
1. An SNMP manager checks the agent by requesting information that mainly reflects the behavior of the
SNMP agent.
2. The SNMP manager also forces the agent to perform the task by resetting the values in the database of
the agent.
3.Management process is also contributed by the agent just by warning the SNMP manager about an
unusual situation.
Management Components
Role of SNMP
The SNMP protocol performs some specific roles in
Network Management;
•It mainly defines the format of the packet that needs
to be sent from the manager to the agent or vice-
versa.
•SNMP is also used to interpret the result and create
the statistics.
•The packets that are exchanged between the
manager and agent contains the name of the
object(variable) and their status(values).
•The SNMP is also responsible for reading and
changing these values.
Management Components continue..
 Role of SMI
• In order to use the SNMP, there is a need for some rules and these rules are for naming the objects.
Now its time to take a look at the roles of SMI:
• SMI(Structure of Management Information) is mainly used to define the general rules for naming the
objects.
• It is also used to define the type of objects that includes( range and length).
• This is also used to show how to encode the objects and values.
• The SMI does not define the number of objects that should be managed by an entity.
• It also does not define the association between the objects and their values.
 Role of MIB
• In order to manage each entity, this protocol is mainly used to define the number of objects and then
to name them according to the rules defined by the SMI and after that associate a type to each named
object.
• MIB( Management Information Base) is mainly used to create a set of objects that are defined for
each entity that is similar to the database.
• Thus MIB mainly creates a collection of named objects, their types.
Advantages&DisAdv of SNMP Protocol
 Advantages of SNMP Protocol
• Given below are some of the benefits of using SNMP :
1. It is the standard network management protocol.
2. This protocol is independent of the operating system and programming language.
3. The functional design of this protocol is Portable.
4. The SNMP is basically a core set of operations and it remains the same on all managed devices. Thus
SNMP supports extendibility.
5. SNMP is a universally accepted protocol.
6. It is a lightweight protocol.
7. This protocol allows distributed management access.
 Disadvantages
• Some of the drawbacks of SNMP are as follows:
• This protocol leads to the reduction of the bandwidth of the network.
• Access control, authentication, and privacy of data are some largest security issues using this.
• SNMP deals with information that is neither detailed nor enough well organized.
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT-5
Bluetooth
Bluetooth
• Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile
devices over short distances using UHF radio waves in the ISM bands, from 2.402 GHz to 2.48 GHz.
It is used to build personal area networks (PANs) and allows devices to communicate without the
need for cables, making it convenient for various applications such as audio streaming, file transfer,
and peripheral connectivity.
 Key Features of Bluetooth
• The transmission capacity of Bluetooth is 720 kbps.
• Bluetooth is a wireless device.
• Bluetooth is a Low-cost and short-distance radio communications standard.
• Bluetooth is robust and flexible.
• The basic architecture unit of Bluetooth is a piconet.
Architecture of Bluetooth
Piconet: Piconet is a type of Bluetooth network that contains one
primary node called the master node and seven active secondary
nodes called slave nodes. Thus, we can say that there is a total of 8
active nodes which are present at a distance of 10 meters. The
communication between the primary and secondary nodes can be
one-to-one or one-to-many. Possible communication is only
between the master and slave; Slave-slave communication is not
possible. It also has 255 parked nodes, these are secondary nodes
and cannot take participation in communication unless it gets
converted to the active state.
Scatternet: It is formed by using various piconets. A slave that is
present in one piconet can act as master or we can say primary in
another piconet. This kind of node can receive a message from a
master in one piconet and deliver the message to its slave in the
other piconet where it is acting as a master. This type of node is
referred to as a bridge node. A station cannot be mastered in two
piconets
Bluetooth Protocol Stack
Bluetooth Protocol Stack

1. Radio (RF) layer: It specifies the details of the air interface, including frequency, the use of frequency
hopping and transmit power. It performs modulation/demodulation of the data into RF signals. It defines the
physical characteristics of Bluetooth transceivers. It defines two types of physical links: connection-less and
connection-oriented.
2. Baseband Link layer: The baseband is the digital engine of a Bluetooth system and is equivalent to the MAC
sublayer in LANs. It performs the connection establishment within a piconet, addressing, packet format,
timing and power control.
3. Link Manager protocol layer: It performs the management of the already established links which includes
authentication and encryption processes. It is responsible for creating the links, monitoring their health, and
terminating them gracefully upon command or failure.
4. Logical Link Control and Adaption (L2CAP) Protocol layer: It is also known as the heart of the Bluetooth
protocol stack. It allows the communication between upper and lower layers of the Bluetooth protocol stack. It
packages the data packets received from upper layers into the form expected by lower layers. It also performs
segmentation and multiplexing.
5. Service Discovery Protocol (SDP) layer: It is short for Service Discovery Protocol. It allows discovering the
services available on another Bluetooth-enabled device.
Bluetooth Protocol Stack
6. RF comm layer: It is a cabal replacement protocol. It is short for Radio Frontend Component. It
provides a serial interface with WAP and OBEX. It also provides emulation of serial ports over the
logical link control and adaption protocol(L2CAP). The protocol is based on the ETSI standard TS
07.10.
7. OBEX: It is short for Object Exchange. It is a communication protocol to exchange objects between
2 devices.
8. WAP: It is short for Wireless Access Protocol. It is used for internet access.
9. TCS: It is short for Telephony Control Protocol. It provides telephony service. The basic function of
this layer is call control (setup & release) and group management for the gateway serving multiple
devices.
10. Application layer: It enables the user to interact with the application.
Types of Bluetooth

• Various types of Bluetooth are available in the market nowadays. Let us look at them.
• In-Car Headset: One can make calls from the car speaker system without the use of
mobile phones.
• Stereo Headset: To listen to music in car or in music players at home.
• Webcam: One can link the camera with the help of Bluetooth with their laptop or
phone.
• Bluetooth-equipped Printer: The printer can be used when connected via Bluetooth
with mobile phone or laptop.
• Bluetooth Global Positioning System (GPS): To use
Global Positioning System (GPS) in cars, one can connect their phone with car system
via Bluetooth to fetch the directions of the address.
Adv and DisADv and Its application
• Advantages of Bluetooth
• It is a low-cost and easy-to-use device.
• It can also penetrate through walls.
• It creates an Ad-hoc connection immediately without any wires.
• It is used for voice and data transfer.
• Disadvantages of Bluetooth
• It can be hacked and hence, less secure.
• It has a slow data transfer rate of 3 Mbps.
• Bluetooth communication does not support routing.
• Applications of Bluetooth
• It can be used in wireless headsets, wireless PANs, and LANs.
• It can connect a digital camera wireless to a mobile phone.
• It can transfer data in terms of videos, songs, photographs, or files from one cell phone to another cell
phone or computer.
• It is used in the sectors of Medical healthcare, sports and fitness, Military.
Mr. M Purnachandrarao
Assistant Professor

Department of
CSE(Data Science)

B V Raju Institute Of Technology


Narsapur

Course Name
Computer Network

Topic Name
UNIT-5
Firewall
• A firewall is a network security device, either hardware or software-based, which monitors all
incoming and outgoing traffic and based on a defined set of security rules accepts, rejects, or drops
that specific traffic.
•Accept: allow the traffic
•Reject: block the traffic but reply with an “unreachable error”
•Drop : block the traffic with no reply

 A firewall is a type of network security device


that filters incoming and outgoing network
traffic with security policies that have
previously been set up inside an organization.
 A firewall is essentially the wall that separates
a private internal network from the open
Internet at its very basic level.
1. Packet-Filtering Firewalls: Types of Firewalls
1. Function: Inspect packets and allow or block them based on
predefined rules, such as IP addresses, port numbers, and
protocols.
2. Example: A firewall rule that blocks all incoming traffic on port
80 (HTTP).
2. Stateful Inspection Firewalls:
1. Function: Track the state of active connections and make
decisions based on the context of the traffic. They are more
intelligent than packet-filtering firewalls.
2. Example: Allowing return traffic from a connection initiated by
an internal user while blocking unsolicited external traffic.
3. Proxy Firewalls:
1. Function: Act as intermediaries between end-users and the
internet. They can inspect higher-level protocols like HTTP and
FTP.
2. Example: A web proxy that filters content and blocks access to
malicious websites.
4. Next-Generation Firewalls (NGFW):
1. Function: Combine traditional firewall capabilities with additional security features such as deep
packet inspection (DPI), intrusion prevention systems (IPS), and application awareness.
2. Example: An NGFW that can detect and block specific application traffic, such as peer-to-peer file
sharing.
5. Unified Threat Management (UTM) Firewalls:
1. Function: Integrate multiple security features into a single device, including firewall, antivirus,
intrusion detection/prevention, and content filtering.
2. Example: A UTM device that provides comprehensive security for small to medium-sized
businesses.
6. Cloud Firewalls:
1. Function: Deployed in the cloud to protect cloud infrastructure and applications. They can be used to
secure virtual networks and resources.
2. Example: A firewall service provided by a cloud provider like AWS or Azure.
Key Functions of Firewalls
1. Traffic Filtering:
1. Firewalls filter incoming and outgoing traffic based on rules defined by the network administrator.
2. Access Control:
1. They control access to network resources by allowing or denying traffic based on IP addresses, port
numbers, and protocols.
3. Monitoring and Logging:
1. Firewalls monitor network traffic and log events for analysis and auditing. This helps in identifying
potential security incidents.
4. Intrusion Detection and Prevention:
1. Advanced firewalls can detect and prevent intrusion attempts by identifying malicious patterns and
behaviors in the traffic.
5. Application Control:
1. Next-generation firewalls can control traffic at the application level, allowing administrators to
block or limit access to specific applications.
6. Virtual Private Network (VPN) Support:
1. Firewalls often support VPNs, enabling secure remote access to the network.
Advantages of using Firewall

• Protection from unauthorized access: Firewalls can be set up to restrict incoming traffic from
particular IP addresses or networks, preventing hackers or other malicious actors from easily accessing
a network or system. Protection from unwanted access.
• Prevention of malware and other threats: Malware and other threat prevention: Firewalls can be set
up to block traffic linked to known malware or other security concerns, assisting in the defense against
these kinds of attacks.
• Control of network access: By limiting access to specified individuals or groups for particular servers
or applications, firewalls can be used to restrict access to particular network resources or services.
• Monitoring of network activity: Firewalls can be set up to record and keep track of all network
activity.
• Regulation compliance: Many industries are bound by rules that demand the usage of firewalls or
other security measures.
• Network segmentation: By using firewalls to split up a bigger network into smaller subnets, the
attack surface is reduced and the security level is raised.
Disadvantages of using Firewall
• Complexity: Setting up and keeping up a firewall can be time-consuming and difficult, especially for
bigger networks or companies with a wide variety of users and devices.
• Limited Visibility: Firewalls may not be able to identify or stop security risks that operate at other
levels, such as the application or endpoint level, because they can only observe and manage traffic at
the network level.
• False sense of security: Some businesses may place an excessive amount of reliance on their
firewall and disregard other crucial security measures like endpoint security or intrusion detection
systems.
• Limited adaptability: Because firewalls are frequently rule-based, they might not be able to respond
to fresh security threats.
• Performance impact: Network performance can be significantly impacted by firewalls, particularly
if they are set up to analyze or manage a lot of traffic.
• Limited scalability: Because firewalls are only able to secure one network, businesses that have
several networks must deploy many firewalls, which can be expensive.
• Limited VPN support: Some firewalls might not allow complex VPN features like split tunneling,
which could restrict the experience of a remote worker.
• Cost: Purchasing many devices or add-on features for a firewall system can be expensive, especially
for businesses.
Thank You

You might also like