0% found this document useful (0 votes)
20 views29 pages

Chapter 3-1

Chapter Three discusses network management and various protocols within the TCP/IP suite, including FTP, SMTP, DNS, HTTP, DHCP, and Telnet. It highlights the differences between the OSI and TCP/IP models, the functionality of each protocol, and their respective roles in network communication. The chapter also covers the importance of DNS in mapping domain names to IP addresses and the process of dynamic IP address allocation via DHCP.

Uploaded by

Shafi Esa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views29 pages

Chapter 3-1

Chapter Three discusses network management and various protocols within the TCP/IP suite, including FTP, SMTP, DNS, HTTP, DHCP, and Telnet. It highlights the differences between the OSI and TCP/IP models, the functionality of each protocol, and their respective roles in network communication. The chapter also covers the importance of DNS in mapping domain names to IP addresses and the process of dynamic IP address allocation via DHCP.

Uploaded by

Shafi Esa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

CHAPTER THREE

Network Management and its Applications


Details of TCP/IP
HTTP
FTP
SMTP
DNS
Telnet
TCP/IP

TCP/IP protocol suite is made of four layers:


Application, transport, Internet and Network
OSI and TCP/IP
OSI and TCP/IP

In summary, the OSI model is more theoretical and used


for understanding and designing network protocols,
while TCP/IP is the practical model that governs how the
Internet and most modern networks function today.
FTP
is a reliable, connection-oriented service that uses TCP
to transfer files between systems that support FTP.
Uses port number 21.
 Transfer files from one computer to another by copying
and moving files from servers to clients, and from clients
to servers.
When files are copied from a server, FTP first establishes
a control connection between the client and the server.
Then a second connection is established, which is a link
between the computers through which the data is
transferred.
● Data transfer can occur in ASCII mode or in binary
mode.
● These modes determine the encoding used for data file,
which in the OSI model is a presentation layer task.
● After the file transfer has ended, the data connection
terminates automatically.
● FTP server can be managed in two ways:
● Anonymous- remote clients can access the FTP server by
using the default user account called 'anonymous" or
"ftp" and sending an email address as the password.
Authenticated - In the Authenticated mode a user must
have an account and a password
SMTP
SMTP (Simple Mail Transfer Protocol) is a protocol used for
sending and relaying email messages between servers.  It is one of
the most commonly used protocols for email transmission across
the internet.
Port 25: Traditionally used for SMTP communication. However, it's
often blocked by ISPs for security reasons and is no longer
commonly used for sending email.
Port 587: Recommended for sending email securely (SMTP with
authentication).
While electronic mail servers and other mail transfer agents use
SMTP to send and receive mail messages,
user-level client mail applications typically only use SMTP for
sending messages to a mail server for relaying.
For receiving emails, protocols like IMAP (Internet Message
DNS (Domain Name System)
DNS is the invention of a hierarchical, domain-based
naming scheme and using a distributed database system.
It is primarily used for mapping host names and e-mail
destinations to IP addresses
For eg, www.example.com translates to 208.77.188.166.
The Root DNS Servers is highest level in the DNS
hierarchy direct queries to the appropriate Top-Level
Domain (TLD) servers (like .com, .org, .net).
DNS (Domain Name System)

Importance of DNS:
Human-Friendly: It allows users to use easy-to-remember
domain names rather than numeric IP addresses.
Reliability and Performance: DNS helps ensure that
requests to websites and other services are directed to
the correct servers.
Security: DNS can be configured with security measures
such as DNSSEC (DNS Security Extensions) to protect
against attacks like cache poisoning.
DNS (Domain Name System)
The top-level domains come in two flavors: generic
and countries.
● In general, getting a second-level domain is easy.
● such as name-of-company.com
● every common (English) word has been taken in the
com domain.
● Domain names are case insensitive
● Edu, EDU and edu mean the same thing
● Each domain controls how it allocates the domains
under it.
● eg .et controls .gov.et , .com.et
● www.obu.edu.et
● if a resolver on flits.cs.vu.nl wants to know the IP
address of the host linda.cs.yale.edu. The steps are :
– it sends a query to the local name server, cs.vu.nl.
– If the sever does not know this domain the request
is sent to the top-level domain (edu-server.net),
even if this server doesn’t know the subdomain it
must know the yale.edu
– Then from that the subdomains names will be
resolved
HTTP

HTTP stands for HyperText Transfer Protocol  It's a


protocol used for transferring data over the web.
Essentially, it’s a set of rules that govern how
messages are formatted and transmitted between
clients (like your web browser) and servers (where
websites are hosted).
When you visit a website, your browser sends an
HTTP request to the web server hosting the site.
The server then responds with an HTTP response,
which includes the requested content (like text,
images, or videos).
HTTP

● is a language between Web servers and browsers

● HTTP has the following duties:


To establish a connection between the browser
(the client) and the server
To negotiate settings and establish parameters for
the session
To provide for the orderly transfer of HTML
content
To close the connection with the server
When you enter a URL into the browser window, The
Figure display a simple HTML resource that resides on
a distant server.
The steps are:

(a)The browser extracts the server's hostname from the URL.


(b)The browser converts the server's hostname into the server's
IP address. (The client computer sends the DNS lookup request
to a name server and receives the server's IP address. )
(c)The browser extracts the port number (if any) from the URL.
With the IP address and port number, a client can easily
communicate via TCP/IP.
(d)The browser establishes a TCP connection with the web
server.
(e)The browser sends an HTTP request message (HTTP GET
command) to the server.
(f)The server sends an HTTP response back to the browser, along
with the document is a header containing several settings.
(g)The connection is closed, and the browser displays the
document
HTTP Transactions

● HTTP transaction consists of


● A request command (sent from client to server), and
● a response result (sent from the server back to the
client).
● This communication happens with formatted blocks of
data called HTTP messages
Messages
● HTTP messages are simple, line-oriented sequences of
characters.
● HTTP messages sent from web clients to web servers
are called request messages.
● Messages from servers to clients are called response
messages.
The format for a request message: The format for a
response message
DHCP

● DHCP allows devices to acquire their addressing


information dynamically.
● It is built on a client/server model and defines two
components:
● Server - Delivering host configuration information
● Client - Requesting and acquiring host configuration
information
● DHCP provides the following advantages:
● It reduces the amount of configuration on devices.
● It reduces the likelihood of configuration errors on
devices acquiring address information.
● It gives you more administrative control by
centralizing IP addressing information and
management.
DHCP

Description of the communication steps
1.The client broadcasts a DHCPDISCOVER.
2.Each server may respond with a DHCPOFFER message.
3. The client receives one or more DHCPOFFER messages
from one or more servers and chooses one server from which
to request configuration parameters.
4.The server selected in the DHCPREQUEST message
commits the responds with a DHCPACK message containing
the configuration parameters for the requesting client.
5.The client receives the DHCPACK message with
configuration parameters. At this point, the client is
configured.
6.The client sending a DHCPRELEASE message to the server
(e.g. on shutdown).
7. The server receives the DHCPRELEASE message and
Telnet
● Telnet is a network protocol used to provide a
command-line interface for communication with
remote devices or servers over a network.
● It allows a user to connect to another computer or
server and issue commands as if they were physically
present at that machine.
Application layer - Port numbers
Tools to use

● Ping
● Arp
● Ipconfig
End of Chapter Three

QUESTION ?

You might also like