You are on page 1of 6

1.

Assignment on 15 Well-known Protocols, Their port number


and Functions.
Q.What are protocols?

A.Protocol, in computer science, a set of rules or procedures for transmitting data between
electronic devices, such as computers. In order for computers to exchange information, there
must be a pre-existing agreement as to how the information will be structured and how each
side will send and receive it.

1.File Transfer Protocol (FTP)-It is a protocol that carries data guarantees that data will be
delivered properly. Port-20 and 21,Transmission Protocol-TCP

2.Secure Shell (SSH)-It is a cryptographic network protocol used to secure data


communication.Port-22,Transmission Protocol-TCP and UDP.

3.Telnet-It is the used for remote management protocol for managing network devices.Port-
23,Transmission Protocol-TCP.

4.Simple Mail Transfer Protocol (SMTP)-It is a communication protocol which is used to


transmit email messages over the internet to the destination server. Port-25,Transmission
Protocol-TCP .

5.Domian Name System (DNS)-It is used in the performance of one simple task of converting IP
addressTo domain names that everyone can easily understand.Port-55,Transmission Protocol-
TCP and UDP.

6.Trivial File Transfer Protocol (TFTP)-TFTP is typically used by devices to upgrade software and
firmware and that include cisco.Port-69,Transmission Protocol-UDP.

7.Hyper Text Transfer Protocol (HTTP)-It is a kind of protocol used to define how data is
transmitted and formatted and also used by www as a channel for communication.Port-
80,Transmission Protocol-TCP.

8.Dynamic Host Configuration Protocol (DHCP)- It is a kind of service used in the client and
server model.Port-67 and 68,Transmission Protocol-UDP.

9.Post Office Protocol 3 (POP3)-It is a protocol used by e-mail client to retrieve e-mail from the
servers.Port-110,Transmission Protocol-TCP.
10.Network News Transport Protocol (NNTP)- nntp is an application protocol used for
transporting USENET news articles between news servers and the end user client.Port-
119,Transmission Protocol-TCP.

11.Network Time Protocol (NTP)-It is the synchronization of time between network devices in
the network.Port-123,Transmission Protocol-UDP.

12.NetBIOS-NetBIOS itself is not a protocol but is typically used in combination with IP with the
NetBIOS over TCP/IP protocol.Port-135 and 139,Transmission Protocol-TCP and UDP.

13.Simple Network Management Protocol-It has the ability to monitor, configure and control
network devices.Port-161 and 162,Transmission Protocol-TCP and UDP.

14.Lightweight Directory Access Protocol- LDAP provides a mechanism of accessing and


maintaining distributed directory information.Port-389,Transmission Protocol-TCP and UDP.

15.Transport Layer Security (TLS)- It is a protocol of a secured socket layer that uses
asymmetric keys to transfer data over a network.Port-443,Transmission Protocol-TCP .

2.Assignment on How mail is being sent from user to user in


gmail using OSI reference Model.
A. Case 1 (Sender to Receiver):
1) Application Layer: A Separate Email is created by the Application Layer using the

SMTP protocol. The Application layer places a header (encapsulation) field that contains

information such as screen size and fonts, and passes the data to the Presentation layer.

2) Presentation Layer: This layer places header information. The text in the message is

converted to ASCII. The Presentation layer will then pass the new data to the Session layer.

3) Session Layer: This Layer will start a new and separate session for communication

between the devices and manages the flow of data in the same session only and data received

from previous layer is sent to the Transportation Layer.

4) Transportation Layer: Here the Data received is broken into segments of Data and

pushes them forward to Network Layer.


5) Network Layer: This Layer stores the Source and Destination addresses so a network

is formed, it converts the segments received into packets.

6) Data Layer: The data of the packets is converted into Frames. Then the data is send to

Physical Layer.

7) Physical Layer: The data of the Frames is converted into bit stream (the information is

in binary 0’s and 1’s) and eventually the data is reached to the Receiver’s end (teacher).

Case 2 (Receiver to Sender):


(Steps 1 through 7 will occur in reverse order on the receiver’s device)

1) Physical Layer: The received data from the sender which is in bit stream is converted

to frames and passed to Data Layer.

2) Data Layer: The Data Layer merges all the frames information and makes those into

packets.

3) Network Layer: The packets are converted to segments and pushed forward to

Transportation Layer.

4) Transportation Layer: Those received segments are combined into a single data

element.

5) Session Layer: The single Data element obtained from the Transportation Layer is

maintained and flowed as per the communication built in the session.

6) Presentation Layer: This Layer removes the necessary compression that were made

with the Data and passes the new Data obtained to Application Layer.

7) Application Layer: The Layer will showcase the readable data at the receiver’s end

(teacher) and eventually the email is sent and received successfully.

3.Assignment on find the similarity and dissimilarity in OSI


and TCP/IP model.
Similarities:-
1.Model- Both TCP/IP are logical models.

2.Structure -Both are arranged as layered wise which is also called an


architectural model. These models have a stack of protocols it means the protocol
is arranged in every layer.

3.Networking-Both TCP/IP define standards for networking.

4.Framework-Both TCP/IP provide a framework for creating and implementing


networking standards and devices.

5.Communication process-Both TCP/IP divide the network communication


process into making their layers.

6.Similar components-In Both TCP/IP models manufacturer allows making sets


devices and network components that can co-exist and work with the devices and
components that are made by the other manufacturers.

7.Functionality-In both TCP/IP models, a single layer defines a particular


functionality and set standards for that functionality only.

Disimilarities:-
1. OSI model is a generic model that is based upon functionalities of each
layer. TCP/IP model is a protocol-oriented standard.

2. OSI model distinguishes the three concepts, namely, services, interfaces,


and protocols. TCP/IP does not have a clear distinction between these
three.

3. OSI model gives guidelines on how communication needs to be done, while


TCP/IP protocols layout standards on which the Internet was developed. So,
TCP/IP is a more practical model.
4. In OSI, the model was developed first and then the protocols in each layer
were developed. In the TCP/IP suite, the protocols were developed first and
then the model was developed.

5. The OSI has seven layers while the TCP/IP has four layers.

4.Assignment on Explain how ARP works in Network Layer


A. Address Resolution Protocol is one of the most important protocols of
the network layer in the OSI model which helps in finding the MAC(Media Access
Control) address given the IP address of the system i.e. the main duty of the ARP
is to convert the 32-bit IP address(for IPv4) to 48-bit address i.e. the MAC address.

How ARP works in Network Layer-


-When a new computer joins a local area network (LAN), it will receive a unique IP
address to use for identification and communication.

-Packets of data arrive at a gateway, destined for a particular host machine. The
gateway, or the piece of hardware on a network that allows data to flow from one
network to another, asks the ARP program to find a MAC address that matches
the IP address. The ARP cache keeps a list of each IP address and its matching
MAC address. The ARP cache is dynamic, but users on a network can also
configure a static ARP table containing IP addresses and MAC addresses.

-ARP caches are kept on all operating systems in an IPv4 Ethernet network. Every
time a device requests a MAC address to send data to another device connected
to the LAN, the device verifies its ARP cache to see if the IP-to-MAC-address
connection has already been completed. If it exists, then a new request is
unnecessary. However, if the translation has not yet been carried out, then the
request for network addresses is sent, and ARP is performed.

-An ARP cache size is limited by design, and addresses tend to stay in the cache
for only a few minutes. It is purged regularly to free up space. This design is also
intended for privacy and security to prevent IP addresses from being stolen or
spoofed by cyberattackers. While MAC addresses are fixed, IP addresses are
constantly updated.

-In the purging process, unutilized addresses are deleted; so is any data related to
unsuccessful attempts to communicate with computers not connected to the
network or that are not even powered on.

You might also like