Professional Documents
Culture Documents
Semester1 V4
Semester1 V4
Module 1
Introduction to Networking
Objectives
OS HDD RAM
SHELL RAM IO
User Interface
Network Interface Cards
• A network interface card (NIC) is a printed circuit
board that provides network communication
capabilities to and from a personal computer
Modem
• A modem, or modulator-
demodulator, is a device that
provides the computer with
connectivity to a telephone line.
• The modem converts (modulates)
the data from a digital signal to an
analog signal that is compatible
with a standard phone line.
NIC and Modem Installation
• Connectivity to the Internet
requires an adapter card,
which may be a modem or NIC.
• Notebook computers may have
a built-in interface or use a
PCMCIA card. Desktop
systems may use an internal
or external NIC.
• Transmission Control
Protocol/Internet Protocol (TCP/IP)
is a set of protocols or rules
developed to allow cooperating
computers to share resources
across a network.
• To enable TCP/IP on the
workstation, it must be configured
using the operating system tools.
ASCII
• The American Standard Code for Information Interchange (ASCII) is the
most commonly used code for representing alpha-numeric data in a
computer.
1000011
1001001
1010000
1010100
?
Bits and Bytes
• Bits are binary digits. They are either 0s or 1s. In a computer, they are
represented by On/Off switches or the presence or absence of electrical
charges, light pulses, or radio waves.
Base 10 Numbers
Example
Base 2 (Binary) Numbers
27 26 25 24 23 22 21 20
128 64 32 16 8 4 2 1
1 1 0 0 1 1 0 1
Hexadecimal
• The base 16, or hexadecimal (hex), number system is used
frequently when working with computers, because it can be used to
represent binary numbers in a more readable form.
SubnetMask Example
• IP address 10.34.23.134
• Subnetmask 255.0.0.0
• IP address:
00001010.00100010.00010111.10000110 = 10.34.23.134
• Network address:
00001010.00000000.00000000.00000000 = 10.0.0.0
• Broadcast address:
00001010.11111111. 11111111. 11111111=10.255.255.255
Objectives
• Networking terminology
• Some network architectures
• The importance of bandwidth
• Networking models: OSI vs TCP/IP
Networking Terminology
Network Devices
Physical Topology
Logical Topology
Broadcast
Token Passing
Network Protocols
LANs
WANs
• A MAN is a
network that spans
a metropolitan
area such as a city
or suburban area.
• A MAN usually
consists of two or
more LANs in a
common
geographic area.
Storage-Area Networks (SANs)
• A SAN is a dedicated,
high-performance
network used to move
data between servers
and storage resources.
• A VPN is a private
network that is
constructed within a
public network
infrastructure such as
the global Internet .
• VPN is the most cost-
effective method of
establishing secured
connection
VPN Types
Bandwidth
Importance of Bandwidth
Digital Bandwidth
What
What is
is flowing
flowing ??
Data
Data
What
What different
different forms
forms flow
flow ??
Text,
Text, Graphic,
Graphic, Video
Video ...
...
What
What rules
rules govern
govern flow
flow ??
Standard,
Standard, Protocol
Protocol ...
...
Where
Where does
does the
the flow
flow occur
occur ??
Cable,
Cable, Atmosphere
Atmosphere ......
Communication characteristics
• Addresses
– What are the source and the destination of a communication
process?
• Media
– Where does the communication take place?
• Protocols
– How to make the communication process effectively?
Packets
Protocols
Data Communication
• Address
– Source address, Destination address
• Media
– Cable, Fiber, Atmosphere
• Protocol
– Format
– Procedure
Evolution of networking standards
SNA
Standard
• Interconnection
Proprietary
• Development
• Simplification
TCP/IP DECNET
OSI Model
• Reduces complexity.
• Standardizes interfaces.
• Facilitates modular engineering.
• Ensures technology
compatibility.
• Accelerates evolution.
• Simplifies teaching and
learning.
Interhost communication
End-to-end connections
Address and best path
Binary transmission
Data representation
Interhost communication
End-to-end connections
Binary transmission
• Transmission of an
unstructured bit stream
over a physical link
between end systems.
– Electrical, mechanical, procedural and
functional specifications
– Physical data rate
– Distances
– Physical connector
Interhost communication
End-to-end connections
Address and best path
Binary transmission
Encapsulation
Provide services
Request services
• Layer 4:
• Layer 3:
• Layer 2:
• Layer 1:
• Networking devices
• Some of the common network types
• Intranet and extranet
• Bandwidth and throughput
• The layered communication model
• OSI reference model
• TCP/IP networking model
Module 3
Networking Media
Objectives
Electricity Basics
Basic Circuit
• Source
• Complete
path
• Load
Cable Specifications
Ethernet Specifications
• 10BASE-T
• 10BASE5
• 10Base2
Coaxial Cable
Cancellation
Unshielded Twisted-Pair Cable
Straight-through cable
• Station to hub/switch
• Router to hub/switch
Crossover cable
• Switch/hub to switch/hub
• Router/station to Router/station
Connecting devices
1 2 3
4 5 6
7 8 9
* 8 #
iMac
1: Transmit 1: Transmit
2: Transmit 2: Transmit
3: Receive 3: Receive
4: Not used 4: Not used
5: Not used 5: Not used
6: Receive 6: Receive
7: Not used 7: Not used
8: Not used 8: Not used
Rollover cable
Note: only straigh-through and cross-over cable are used in making network
while rollover cable is used in making control connection
Optical Media
Reflection and refraction of light
• The following two conditions must be met for the light rays in
a fiber to be reflected back into the fiber with out any loss due
to refraction:
– The core of the optical fiber has to have a larger index of refraction
than the material that surrounds it (the cladding).
– The angle of incidence of the light ray is greater than the critical angle
for the core and its cladding.
Optical Connector
• When the fiber has been pulled, the ends of the fiber must be
cleaved (cut) and properly polished to ensure that the ends are
smooth.
OFDM >
20Mbps "Wi-Fi Certified." 14 channels available. May replace
802.11g ≤ 54Mbps
DSSS + 802.11b. Improved security enhancements over
2.4GHz
CCK < 802.11. Compatible with 802.11b.
20Mbps
• Performance of the
network will also be
affected by signal
strength and degradation
in signal quality due to
distance or interference.
• As the signal becomes
weaker, Adaptive Rate
Selection (ARS) may be
invoked.
Authentication and Association
Wireless Security
• VPN
• EAP-MD5 Challenge
• LEAP (Cisco)
• User authentication
• Encryption
• Data authentication
Summary
• Electronic parameters
• Ethernet cable type
• Light and optical fiber
• Optical fiber installation
• WLAN communication and authentication
• Signal modulation and WLAN security
Module 4
Cabling LANs and WANs
Objectives
Ethernet Standard
• Ethernet is the most widely used LAN technology.
• Ethernet was first implemented by the Digital, Intel,
and Xerox group, referred to as DIX.
• DIX Ethernet was used as the basis for the Institute
of Electrical and Electronics Engineers (IEEE) 802.3
specification, released in 1980.
• Later, the IEEE extended 802.3 to three new
committees known as 802.3u (Fast Ethernet), 802.3z
(Gigabit Ethernet over Fiber), and 802.3ab (Gigabit
Ethernet over UTP).
Ethernet Cable and Connector
UTP Implementation
RJ-45
Jack
RJ-45 Plug
Repeater: Layer 1
5.4.3.2.1 Rule
• 5 sections of the network.
• 4 repeaters or hubs.
• 3 sections for hosts.
• 2 sections for link
purposes.
• 1 large collision domain.
• This rule states that no more than four repeaters can be used
between hosts on a LAN.
• This rule is used to limit latency added to frame travel by
each repeater. Too much latency on the LAN increases the
number of late collisions and makes the LAN less efficient.
Hubs: Layer 1
• Multiport repeater
• The physical topology
for using a hub star.
• Sometimes called
concentrator
• There are 3 types of
hub: active, passive
and intelligent
• Every device connected to the same network
segment is said to be a member of a collision
domain.
Network Segmentation
• When the number of network
node is big, reducing network
performance, it is necessary to
break up a large LAN into
smaller, more easily managed
segments.
Bridge Functions
LAN Switch
Catalyst 2950
Catalyst 6500
Catalyst 3550
Switch: Micro-segmentation
Type of network
Peer-to-peer versus Client/Server
Objectives
• Ethernet fundamentals
• Ethernet operation
Ethernet Fundamentals
Introduction to Ethernet
Ethernet Standards
Ethernet Specifications
Designation Description
10 Mbps baseband Ethernet over coaxial cable with a maximum distance of 185 meters.
10Base-2
Also referred to as Thin Ethernet or Thinnet or Thinwire.
10 Mbps baseband Ethernet over coaxial cable with a maximum distance of 500 meters.
10Base-5
Also referred to as Thick Ethernet or Thicknet or Thickwire.
10 Mbps baseband Ethernet over twisted pair cables with a maximum length of 100
10Base-T
meters.
100Base-FX 100 Mbps baseband Ethernet over two multimode optical fibers.
100Base-T 100 Mbps baseband Ethernet over twisted pair cable.
100 Mbps baseband Ethernet over four pairs of Category 3 or higher unshielded
100Base-T4
twisted pair cable.
100 Mbps baseband Ethernet over two pairs of shielded twisted pair or Category 4
100Base-TX
twisted pair cable.
1000Base-CX 1000 Mbps baseband Ethernet over two pairs of 150 shielded twisted pair cable.
1000 Mbps baseband Ethernet over two multimode or single-mode optical fibers using
1000Base-LX
longwave laser optics.
1000 Mbps baseband Ethernet over two multimode optical fibers using shortwave laser
1000Base-SX
optics.
1000 Mbps baseband Ethernet over four pairs of Category 5 unshielded twisted pair
1000Base-T
cable.
Packet Frame
MAC sublayer
Packet
Packet
802.3 802.5
Packet Packet
• Naming.
• Framing.
• Media access control rules.
MAC address
Layer 2 Framing
• At the data link layer the frame structure is nearly identical for all
speeds of Ethernet from 10 Mbps to 10,000 Mbps.
• Ethernet requires that the frame be not less than 46 octets or more
than 1518 octets.
IEEE 802.3 Ethernet
Ethernet II
Ethernet Operation
CSMA/CD Process
Host wants
to transmit
Assemble Algorithm
Wait for calculate
frame t seconds backoff
Is Is
Start a collision Keep transmission Transmission
transmitting detected? transmitting done? completed
Ethernet Transmission Mode
• Full duplex :
– send and receive simultaneously
– no collisions occur.
• Half duplex:
– only send or receive at a specific moment
– transmit 64 bits of timing synchronization information that is known as
the preamble to make sure collision do not occur.
Ethernet Timing
Interframe Spacing
Types of Collisions
Remote Collison
Summary
Objectives
Type of Ethernet
Line Encoding
100BASE-FX
Class of Repeater
Future of Ethernet
Objectives
Segmentation
Layer 2 Bridging
Layer 2 Switching
Switch benefits
• Provide micro-segmentation
• Double bandwidth between
nodes
• Collision-free transmission
• Two 10- or 100- Mbps data
path
• Allow multiple circuits
simultanously
Latency
Switching methods
• Store-and-forward:
– The entire frame is received before forward.
– Increases latency with larger frames.
– Error detection is high.
• Cut-through:
– Immediately forward a packet after checking the destination
address.
– No error checking
– Offers the lowest level of latency
• Fragment-free switching:
– Forwards a packet after receiving the first 64 bytes.
– Filters out collision packets (size < 64 bytes)
Forwarding Decision
Switch Mode
Switching Loop
!
t Storm
ad c as
Bro
Standby Link
• Segmentation
increases the
opportunity for each
host in the network to
gain access to the
media.
• This effectively
reduces the chance of
collisions and
increases available
bandwidth for every
host.
Broadcasts in Bridged Environment
Router
Data Flows
Summary
Objectives
• Introduction to TCP/IP
• Internet addresses
• Obtaining an IP address
Introduction to TCP/IP
Transport Layer
IP - Internet Protocol
Internet Addresses
Network and Host Addressing
• IP address is
hierarchical and has
two parts:
– First part identifies the
network where the system is
connected.
– Second part identifies that
particular system on the
network.
IP Address Classes
IP Address
Network address
255.255.255.255 STOP
Directed broadcast address
192.168.20.0
192.168.20.255
Example: 172.16.20.200
Private Address
• 150.100.255.255
• 175.100.255.18
• 195.234.253.0
• 100.0.0.23
• 188.258.221.176
• 127.34.25.189
• 224.156.217.73
Obtaining an IP Address
Static Assignment of IP Addresses
Dynamic addressing
IP
Reverse Address Resolution Protocol
BOOTP IP
• Successor to BOOTP.
• Automatically allows a host to obtain an IP address
from an IP pool
• Use 4-steps IP registration and requires IP leased
time
AM
R
ARP operation
ARP Table:
? MAC MAC IP IP
A.B.C.1.2.3 ? 10.0.2.110.0.2.9
Data
A B C
MAC MAC IP IP
A.B.C.1.2.3 ff.ff.ff.ff.ff.ff 10.0.2.1 10.0.2.9
What is your MAC Addr?
A B C
ARP operation: Checking
MAC MAC IP IP
A.B.C.1.2.3 ff.ff.ff.ff.ff.ff 10.0.2.110.0.2.9
What is your MAC Addr?
is
a t P
h I
T y
m
10.0.2.1 10.0.2.5 10.0.2.9
A.B.C.1.2.3 A.B.C.4.5.6 A.B.C.7.8.9
A B C
MAC MAC IP IP
A.B.C.7.8.9 A.B.C.1.2.3 10.0.2.9 10.0.2.1
This is my MAC Addr
A B C
ARP operation: Caching
ARP Table:
A.B.C.7.8.9 – 10.0.2.9
MAC MAC IP IP
A.B.C.1.2.3 A.B.C.7.8.9 10.0.2.1 10.0.2.9
Data
A B C
Default gateway
Default-Gateway
Packet forwarding
• At layer 2, when encapsulating a frame, the host needs
the destination MAC address
• The host will then compares IP address of source and
destination.
– If the destination is on another network, then it will encapsulate the
frame with the default-gateway MAC address.
– If the destination is on the same net work, then it will use the
destination MAC address
• Then it checks if the needed MAC address is in the ARP
table, if it is not proceed ARP request to find the needed
MAC address
Summary
Objectives
• Routed protocol
• IP routing protocols
• The mechanics of subnetting
Internet Protocol - Routed
Routed protocols
IP as a Routed Protocol
• IP is a connectionless,
unreliable, best-effort
delivery protocol.
• IP does not verify that
the data reached its
destination. This
function is handled by
the upper layer
protocols.
Packet Propagation
Process in Router
IP header format
20
bytes
•• 44 bits.
bits.
•• Indicates
Indicates the
the version
version of
of
IP
IP currently
currently used.
used.
–– IPv4
IPv4::0100
0100
–– IPv6
IPv6::0110
0110
IP header format: Header length
•• 44 bits.
bits.
•• IP
IP header
header length
length :: Indicates
Indicates the
the
datagram
datagram header
header length
length in
in 32
32 bit
bit
words
words (4(4 bits),
bits), and
and thus
thus points
points toto
the
the beginning
beginning of of the
the data.
data.
•• 88 bits.
bits.
•• Specifies
Specifies the
the level
level of
of importance
importance
that
that has
has been
been requested
requested for
for this
this
datagram
datagram byby an
an upper-layer
upper-layer
protocol.
protocol.
•• Precedence.
Precedence.
•• Reliability.
Reliability.
•• Speed.
Speed.
IP header format: Total length
•• 16
16 bits.
bits.
•• Specifies
Specifies the
the length
length in bytes of
inbytes of
the
the entire
entire IP
IP packet,
packet, including
including
data
data and
and header.
header.
•• 16
16 bits.
bits.
•• Contains
Contains an
an integer
integer that
that identifies
identifies
the
the current
current datagram.
datagram.
•• Assigned
Assigned by
by the
the sender
sender toto aid
aid inin
assembling
assembling the
the fragments
fragments of of aa
datagram.
datagram.
IP header format: Flags
•• 33 bits.
bits.
•• The
The second
second bitbit specifying
specifying whether
whether the the
packet
packet can
can bebe fragmented
fragmented ..
•• The
The last
last bit
bit specifying
specifying whether
whether thethe
packet
packet isis the
the last
last fragment
fragment in
in aa series
series of
of
fragmented
fragmented packets.
packets.
•• 13
13 bits.
bits.
•• Used
Usedwith
withfragmented
fragmenteddatagrams,
datagrams,to toaid
aidin
in
reassembly
reassemblyof ofthe
thefull
fulldatagram.
datagram.
•• Is
Isthe
thenumber
numberof of64-bit
64-bitpieces
pieces(header
(headerbytes
bytes
are not counted) that are contained
are not counted) that are contained in in
earlier
earlierfragments.
fragments.
•• In
Inthe
thefirst
first(or
(oronly)
only)fragment,
fragment,this
thisvalue
valueisis
always
alwayszero.
zero.
IP header format: Time to Live
•• 88bits,
bits,specifies
specifiesthethetime
timeand
anddistance
distancethis
this
datagram
datagramisisallowed
allowedto totravel.
travel.
•• Each
Eachrouter
routerrouting
routingthis
thisdatagram
datagramsubtracts
subtracts
from
fromthis
thisfield
fieldits
itsprocessing
processingtime
timefor
forthis
this
datagram,
datagram, which gradually decreasesit.
which gradually decreases it.
•• ItIthelps
helpsprevent
preventpackets
packetsfrom
fromlooping
looping
endlessly.
endlessly.
•• Indicates
Indicates which
which upper
upper protocol
protocol
receives
receives incoming
incoming packets
packets after
after IP
IP
processing
processing has
has been
been completed
completed
•• 06
06::TCP
TCP
•• 17
17::UDP
UDP
•• 01: ICMP
01: ICMP
IP header format: Header checksum
•• 16
16 bits.
bits.
•• A
A checksum
checksum on
on the
the header
header only,
only,
helps
helps ensure
ensure IP
IP header
header integrity.
integrity.
•• 32
32 bits
bits each.
each.
•• Source
Source IPIP Address
Address
•• Destination
Destination IPIP Address
Address
IP header format: Options
•• Variable
Variable length.
length.
•• Allows
Allows IPIP to
to support
support various
various
options,
options, such
such as as security,
security, route,
route,
error
error report
report ...
...
•• The
The header
header padding
padding is is used
used to
to
ensure
ensure that
that the
the internet
internet header
header ends
ends
on
on aa 32
32 bit
bit boundary.
boundary.
IP header format: Padding
•• Contains
Containsupper-protocol
upper-protocolinformation,
information,
variable length up to 64 Kb.
variable length up to 64 Kb.
IP Routing Protocol
Routing Overview
• Routing is an OSI Layer 3
function.
• Routing is the process of
finding the most efficient path
from one device to another.
• Two key functions of router:
– maintain routing tables
– use the routing table to forward
packets
Routing Protocol
c ols ed
o t
prot rou ets
ting how pack
u
Ro rmine route
te s
de tocol
pro
Path Determination
Routing Algorithms
Subnetting
• Subnetworks are smaller divisions of network.
• To create a subnet address, a network administrator borrows
bits from the original host portion and designates them as the
subnet field.
How ?
By using subnet
mask
Subnet mask
• 172.16.65.100 / 255.255.240.0.
• 10101100.00010000.01000001.01100100.
• 11111111.11111111.11110000.00000000.
• 10101100.00010000.01000001.01100100.
• Class B network:
– 16 bits for network portion.
– 4 bits for subnet portion.
– 12 bits for host portion.
• Subnet address: 172.16.64.0.
Calculating a subnet
• Choose n = 4:
– Number of possible subnets is:
24 - 2 = 14
– Number of possible hosts on each subnet is:
2(16-4) - 2 = 4094
Calculating a subnet: STEP 2 (Cont.)
.. .. .. .. ..
.. .. .. .. ..
13 172.16.208.0 172.16.208.1 – 172.16.223.254 172.16.223.255 Y
14 172.16.224.0 172.16.224.1 – 172.16.239.254 172.16.239.255 Y
15 172.16.240.0 172.16.240.1 – 172.16.255.254 172.16.255.255 N
Summary
• Router protocol
• Connection-oriented vs. connectionless
• Process in router
• IP packet structure
• Routing protocol and routing table
• Routing algorithm and metrics
• Routing categories
• Subnetting and calculate subnetworks
Module 10
TCP/IP Application and Transport
Objectives
But
Butthey
theymade
madeno noprovision
provisionfor
forassuring
assuring
our
ourdata
datareliably
reliablytravels
travelsend-to-end
end-to-endacross
across
the
thevast
vastnetwork
networkpath.
path.
Introduction to transport layer
• The transport layer data stream is a logical
connection between the endpoints of a network.
• Its primary duties are to transport and regulate the
flow of information from source to destination
reliably and accurately.
• Transport services include the following basic
services:
– Segmentation of upper-layer application data
– Establishment of end-to-end operations
– Transport of segments from one end host to another end host
– Flow control provided by sliding windows
– Reliability provided by sequence numbers and
acknowledgments
Flow Control
Port
7 00
C -1
RF
TCP
• TCP supplies a virtual circuit between end-user
applications. These are its characteristics:
– connection-oriented.
– reliable.
– divides outgoing messages into segments.
– reassembles messages at the destination station.
– re-sends anything not received.
• Protocols that use TCP include FTP, SMTP, HTTP,
Telnet
TCP Header format
6 1
7
F C-
R
•• Source
Source Port
Port 16
16 bits.
bits.
•• Destination
Destination Port
Port 16
16 bits.
bits.
TCP Header format: Sequence
•• Sequence
Sequence Number:
Number: 32
32 bits
bits
–– The
The sequence
sequence number
number of of the
the
first
first data
data octet
octet in
in this
this segment
segment
(except
(except when
when SYN
SYN is is present).
present).
•• Acknowledgment
Acknowledgment Number:
Number: 32
32 bits
bits
–– This
This field
field contains
contains the
the value
value ofof the
the
next
next sequence
sequence number
number the
the sender
sender of of
the
the segment
segment is is expecting
expecting to
to receive.
receive.
TCP Header format: Code bits
•• Control
Control Bits:
Bits: 88 bits
bits
–– ACK:
ACK: Acknowledgment
Acknowledgment fieldfield significant
significant
–– RST:
RST: Reset
Reset the
the connection
connection
–– SYN:
SYN: Synchronize
Synchronize sequence
sequence numbers
numbers
–– FIN:
FIN: No
No more
more data
data from
from sender
sender
•• Window:
Window: 16
16 bits
bits
–– The
The number
number ofof data
data octets
octets beginning
beginning
with
with the
the one
one indicated
indicated inin the
the
acknowledgment
acknowledgment field field which
which the the sender
sender
of
of this
this segment
segment isis willing
willing to to accept.
accept.
Three-way handshake
6 8
C -7
RF
Presentation: Functions
TCP/IP Application Layer
• Handles high-level
protocols, issues of
representation, encoding,
and dialog control.
• The TCP/IP combines all
application-related issues
into one layer, and assures
this data is properly
packaged for the next layer.
– FTP, HTTP, SMTP, DNS,
SNMP ...
– Format of data, data
structure, encode …
– Dialog control, session
management …
Interfaces
• Direct network application:
– The application layer provides a direct interface for the rest of
the OSI model by using network applications.
– Client server: WEB, FTP, Mail
• Indirect network application:
– The application layer provides an indirect interface for the rest
of the OSI model by using standalone applications.
– The redirector directs requests from local computer to the
proper network resources. Applications on client never have to
recognize the network.
– Redirector: network driver, network printer
Client-Server application
•• The
The client
client side
side is
is located
located on
on the
the local
local
computer
computer and
and isis the
the requestor
requestor of
of the
the
services.
services.
•• The
The server
server side
side is
is located
located on
on aa remote
remote
computer
computer and
and provides
provides services
services inin
response
response toto the
the client’s
client’s requests.
requests.
Network driver
•• The
The applications
applications on
on the
the client
client never
never have
have
to
to recognize
recognize the
the network.
network.
•• Redirectors
Redirectors expand
expand the
the capabilities
capabilities of
of
non-network
non-network software.
software.
Make and Break a connection
DNS
..
com
com edu
edu gov
gov vn
vn frfr uk
uk
vnn
vnn com
com edu
edu gov
gov
Request
Request ..
Reply
Reply
vn
vn Address
Address com
com
of
ofcom
com
server
server
Address
Addressof of
yahoo.com
yahoo.com
vnn
vnn server
server yahoo
yahoo
Address
Addressof
of
www.yahoo.com Address
Addressof
of
www.yahoo.com
www.yahoo.com
www.yahoo.com
FTP
TFTP
• Trivial File Transfer Protocol (TFTP) is a
connectionless service that uses UDP.
• TFTP is designed to be small and easy to
implement.
• TFTP is used on the router to transfer
configuration files and Cisco IOS images
and to transfer files between systems that
support TFTP.
• TFTP can read, write, or mail files to or from
a remote server but it cannot list directories
and currently has no provisions for user
authentication.
HTTP
Telnet
SNMP