Application Layer Protocols - PowerPoint PPT Presentation

1 / 24
About This Presentation
Title:

Application Layer Protocols

Description:

In passive FTP mode, it uses 21 for the control channel, and an ephemeral port ... DHCP stands for Dynamic Host Configuration Protocol, and is used to centrally ... – PowerPoint PPT presentation

Number of Views:365
Avg rating:3.0/5.0
Slides: 25
Provided by: drtza
Category:

less

Transcript and Presenter's Notes

Title: Application Layer Protocols


1
Application Layer Protocols
2
Application Layer Protocols
  • Those protocols run on top of/over TCP/IP
  • Telnet
  • File Transfer Protocol (FTP)
  • Hyper Text Transfer Protocol (HTTP)
  • Simple Mail Transfer Protocol (SMTP), POP3, IMAP
  • Network News Transfer Protocol (NNTP)
  • Domain Name System (DNS)
  • Dynamic Host Configuration Protocol (DHCP)
  • Simple Network Management Protocol (SNMP)

Covered in previous lectures
3
Telnet
  • Provides terminal emulation
  • Comes with nearly all vendor implementations of
    TCP/IP
  • Open standard
  • Supported by wide range of workstations
  • Not a secure protocol

4
Telnet Communications Options
  • 7- or 8-bit compatibility
  • Use of different terminal nodes
  • Character echoing at sending and receiving ends
  • Synchronized communications
  • Transmission of character streams or single
    characters
  • Flow control

5
FTP
  • FTP File transfer protocol. Commonly used over
    the Internet.
  • Numerous FTP servers over the world allow people
    anywhere on the Internet to log in and download
    whatever files they have placed on the FTP
    server, or upload other files.
  • Uses two TCP ports (20 data channel and 21
    control channel) this is in active mode. In
    passive FTP mode, it uses 21 for the control
    channel, and an ephemeral port for the data
    channel.
  • Commonly used on the Internet
  • Not a secure protocol

6
Sample FTP Commands
Table drawn on board
7
SMTP
  • Designed for exchange of email between networked
    systems
  • Within the Internet, email is delivered by having
    the source machine establish a TCP connection to
    port 25 of the destination machine / server.
    Listening on this port would be an SMTP (Simple
    Mail Transfer Protocol) daemon / service that
    speaks SMTP.
  • This daemon accepts incoming connections and
    copies messages from them into the appropriate
    mailboxes. If a message cannot be delivered, an
    error report of the undeliverable message is
    returned to the sender, which contains the first
    part of the message.

8
SMTP
  • SMTP is a simple ASCII protocol.
  • After establishing the TCP connection to port 25,
    the sending machine, operating as the client,
    waits for the receiving machine, operating as the
    server, to talk first.
  • The server starts by sending a line of text
    giving its identity and telling whether or not
    it is prepared to receive mail.
  • If it is not, the client releases the connection
    and tries again later.

9
SMTP
  • If the server is willing to accept email, the
    client announces whom the email is coming from
    and whom it is going to.
  • If such recipient exists at the destination, the
    server gives the client the go-ahead to send the
    message. Then the client sends the message, and
    the server acknowledges it.
  • No checksums needed because TCP provides a
    reliable byte stream.
  • If there is more e-mail it is now sent. When all
    e-mail has been exchanged in both directions, the
    connection is released.

10
SMTP
11
POP3
  • Until now, we assumed that all users work on
    machines that are capable of sending and
    receiving email. Sometimes this is not the case.
  • For example, at many companies, users work at
    desktop PCs that are not on the Internet and are
    not capable of sending or receiving email from
    outside the company. Instead, the company has one
    or more email servers that can send and receive
    email.
  • To send or receive messages, a PC must talk to an
    email server using some kind of delivery
    protocol.

12
POP3
  • A simple protocol used for fetching email from a
    remote mailbox is POP3 (Post Office Protocol).
  • It has commands for the user to log in, log out,
    fetch messages, and delete messages.
  • The protocol itself consists of ASCII text and
    has something of the flavor of SMTP. The point of
    POP3 is to fetch email from the remote mailbox
    and store it on the users local machine to read
    later.

13
IMAP
  • A more sophisticated delivery protocol is IMAP
    (Interactive Mail Access Protocol).
  • It was designed to help the user who uses
    multiple computers, perhaps a workstation in the
    office, a PC at home, and a laptop on the road.
  • The basic idea behind IMAP is for the email
    server to maintain a central repository that can
    be accessed from any machine.
  • Thus unlike POP3, IMAP does not copy email to the
    users personal machine because the user may have
    several.

14
EMail
  • Independent of whether email is delivered
    directly to the users workstation or to a remote
    server, many systems provide hooks for additional
    processing of incoming email.
  • An especially valuable tool for many email users
    is the ability to set up filters. These are rules
    that are checked when email comes in or when the
    user agent is started.
  • Each rule specifies a condition and an action.
    For example, a rule could say that any message
    from Angelina Tzacheva should be displayed in a
    24-point flashing red boldface font (or
    alternatively, be discarded automatically without
    comment).

15
NNTP
  • NNTP (Network News Transfer Protocol) is similar
    to SMTP in a sense that a client issues commands
    in ASCII and a server issues responses as decimal
    numbers coded in ASCII.
  • NNTP was designed for two purposes
  • To allow news articles to propagate from one
    machine to another over reliable connection (e.g.
    TCP)
  • To allow users whose desktop computers cannot
    receive news to read news remotely.

16
NNTP
  • To acquire recent articles, a client must first
    establish a TCP connection with port 119 on the
    newsfeed server.
  • Behind this port is the NNTP daemon/service,
    which is either there all the time waiting for
    clients or is created on the fly as needed.
  • After the connection has been established, the
    client and server communicate using a sequence of
    commands and responses.

17
DHCP
  • With the growth of the Internet, TCP/ IP has now
    become a must-have protocol for most computer
    networks. It provides a single network protocol
    that is supported by almost every type of
    computer system, a plethora of applications that
    use it, and it is well suited to both large and
    small networks. Its also essential if one wishes
    to set up an intranet.
  • However, TCP/ IP needs addresses and
    configuration settings to be defined on each
    computer or peripheral on the network. This can
    entail an immense amount of system administration
    work.

18
DHCP
  • DHCP stands for Dynamic Host Configuration
    Protocol, and is used to centrally allocate and
    manage TCP/ IP configurations of client nodes. If
    one has more than a handful of computers to
    manage, then DHCP can help to save a great deal
    of time in setting up and administering a TCP/ IP
    network. DHCP offers the following features
  • It allows to define pools of TCP/ IP addresses,
    which are then allocated to client PCs by the
    DHCP server. These pools are called scopes in
    DHCP terminology.
  • Not only are the TCP/ IP addresses handed out, so
    are all the related configuration settings like
    the subnet mask, default gateway, DNS server,
    that are needed for TCP/ IP to work properly.

19
DHCP
  • DHCP works across most TCP/ IP routers and
    allocates IPs according to the subnet the request
    came from. This means one wont need to
    reconfigure a PC that is moved from one subnet to
    another.
  • Addresses can be leased for periods of time - so
    an IP address that is not used for the duration
    of the lease is put back into the unallocated
    pool. This helps recover TCP/ IP addresses that
    are no longer used.
  • Internet Service Providers are often using DHCP
    to provide clients with IP address as well.

20
SNMP
  • In the early days of the ARPANET, if the delay to
    some host became unexpectedly large, the person
    detecting the problem would just run the Ping
    program to bounce a packet off the destination.
    By looking at the timestamps in the header of the
    packet returned, the location of the problem
    could usually be pinpointed and some appropriate
    action taken. In addition, the number of routers
    was so small, that it was feasible to ping each
    one to see if it was sick.
  • When the ARPANET turned into the worldwide
    Internet, with multiple backbones and multiple
    operators, this solution ceased to be adequate,
    so better tools for networks management were
    needed.

21
SNMP
  • In 1990, version 1 of SNMP (Simple Network
    Management Protocol) was defined.
  • SNMP provides a systematic way of monitoring and
    managing a computer network. It can be used for
    gathering performance data and troubleshooting.
  • This model and protocol were widely implemented
    in commercial products and became de facto
    standards for network management.

22
SNMP
  • An enhanced version of SNMP (SNMPv2) was defined
    as experience was gained and shortcomings were
    observed. SNMPv2 started along the road to become
    an Internet standard.
  • The SNMP model of a managed network consist of
    four components
  • Managed nodes
  • Management stations
  • Management information
  • A management protocol

23
SNMP
  • The managed nodes can be hosts, routers, bridges,
    printers, or any other devices capable of
    communicating status information to the outside
    world. To be managed directly by SNMP, a node
    must be capable of running an SNMP management
    process, called an SNMP agent. Each agent
    maintains a local database of variables that
    describe its state and history and affect its
    operations.
  • Network management is done from management
    stations, which are general purpose computers
    running special management software. The
    management stations contain one or more processes
    that communicate with the agents over the
    network, issuing commands and getting responses.

24
SNMP
  • Management Information Base (MIB)
  • Database of network performance information
    stored on a network agent for access by a network
    management station
  • The management station interacts with the agents
    using the SNMP protocol. This protocol allows the
    management station to query the state of an
    agents local objects, and change them if
    necessary. (each device maintains one or more
    variables that describe its state in the
    information base, which are called objects). Most
    of SNMP consists of this query-response type
    communication.
Write a Comment
User Comments (0)
About PowerShow.com