Professional Documents
Culture Documents
The application layer in the OSI model is the closest layer to the end user which means that the application
layer and end user can interact directly with the software application. The application layer programs are based
on client and servers.
15. Seconds-the client enters into this field the number of seconds “elapsed since [the] client started trying to
boot”. This is supposed to provide information to BOOTP servers to help them decide which requests to
respond to first.
------------------------------------------------------------------------------------------------------------------------------
DHCP
Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to
dynamically assign an IP address to nay device, or node, on a network so they can
communicate using IP.
It provides information that includes subnet mask information, default gateway, IP addresses
and domain name system addresses.
DHCP port number for server is 67 and for the client is 68.
----------------------------------------------------------------------------------------------------------------------
Address allocation
Automatic allocation
The DHCP server assigns a permanent IP address to a client from its IP Pools. On the
firewall, a Lease specified as Unlimited means the allocation is permanent
Dynamic allocation
The DHCP server assigns a reusable IP address from IP Pools of addresses to a client for a maximum
period of time, known as a lease. This method of address allocation is useful when the customer has a
limited number of IP addresses; they can be assigned to clients who need only temporary access to the
network. See the DHCP Leases section.
Static allocation
The network administrator chooses the IP address to assign to the client and the DHCP server sends
it to the client. A static DHCP allocation is permanent
----------------------------------------------------------------------------------------------------------------
In DHCP, the client and the server exchange mainly 4 DHCP messages in order to make a
connection, also called DORA process
DHCP discover message –
This message is generated by Client host in order to discover if there is any DHCP server/servers are
present in a network or not. This message is broadcasted to all devices present in a network to find the
DHCP server.
DHCP offer message-The server will respond to host in this message specifying the unleased IP address
and other TCP configuration information. This message is broadcasted by server.
DHCP request message – When a client receives a offer message, it responds by broadcasting a DHCP
request message. The client will produce a gratuitous ARP in order to find if there is any other host present
in the network with same IP address.
DHCP acknowledgement message –In response to the request message received, the server will make an
entry with specified client ID and bind the IP address offered with lease time. Now, the client will have the
IP address provided by server.
-------------------------------------------------------------------------------------------------------------
-
------------------------------------------------------------------------------------------------------------------------------------
DNS
o DNS stands for Domain Name System.
o DNS is a directory service that provides a mapping between the name of a host on the
network and its numerical address.
o DNS is required for the functioning of the internet.
o Each node in a tree has a domain name, and a full domain name is a sequence of symbols
specified by dots.
o DNS is a service that translates the domain name into IP addresses. This allows the users
of networks to utilize user-friendly names when looking for other hosts instead of
remembering the IP addresses.
o For example, suppose the FTP site at EduSoft had an IP address of 132.147.165.50,
most people would reach this site by specifying ftp.EduSoft.com. Therefore, the domain
name is more reliable than IP address.
Working of DNS
o DNS is a client/server network communication protocol. DNS clients send requests to
the. server while DNS servers send responses to the client.
o Client requests contain a name which is converted into an IP address known as a forward
DNS lookups while requests containing an IP address which is converted into a name
known as reverse DNS lookups.
o DNS implements a distributed database to store the name of all the hosts available on
the internet.
o If a client like a web browser sends a request containing a hostname, then a piece of
software such as DNS resolver sends a request to the DNS server to obtain the IP
address of a hostname. If DNS server does not contain the IP address associated with a
hostname, then it forwards the request to another DNS server. If IP address has arrived
at the resolver, which in turn completes the request over the internet protocol.
-----------------------------------------------------------------------------------
Country Domain-The format of country domain is same as a generic domain, but it uses
two-character country abbreviations (e.g., us for the United States) in place of three character
organizational abbreviations.
Inverse Domain-The inverse domain is used for mapping an address to a name. When the server
has received a request from the client, and the server contains the files of only authorized clients. To determine
whether the client is on the authorized list or not, it sends a query to the DNS server and ask for mapping an
address to the name.
FTTP
o FTP stands for File transfer protocol.
o FTP is a standard internet protocol provided by TCP/IP used for transmitting the files
from one host to another
o It is also used for downloading the files to computer from other servers.
o It transfers the data more reliably and efficiently.
Although transferring files from one system to another is very simple and straightforward, but sometimes it
can cause problems. For example, two systems may have different file conventions. Two systems may have
different ways to represent text and data. Two systems may have different directory structures. FTP protocol
overcomes these problems by establishing two connections between hosts. One connection is used for data
transfer, and another connection is used for the control connection.
FTP works on two ports: 20 and 21 One for data and another is for connection control.
o Control Connection: The control connection uses very simple rules for communication. Through
control connection, we can transfer a line of command or line of response at a time. The control
connection is made between the control processes. The control connection remains connected during
the entire interactive FTP session.
o Data Connection: The Data Connection uses very complex rules as data types may vary. The data
connection is made between data transfer processes. The data connection opens when a command
comes for transferring the files and closes when the file is transferred.
FTP COMMANDS
TFTP
TFTP stands for Trivial File Transfer Protocol.
Smtp
SMTP is an application layer protocol. The client who wants to send the mail opens a TCP
connection to the SMTP server and then sends the mail across the connection. The SMTP server is
an always-on listening mode. As soon as it listens for a TCP connection from any client, the SMTP
process initiates a connection through port 25. After successfully establishing a TCP connection the
client process sends the mail instantly.
End to end
The end-to-end model is used to communicate between different organizations whereas the store
and forward method is used within an organization.
Advantages of SMTP:
• If necessary, the users can have a dedicated server.
• It allows for bulk mailing.
• Low cost and wide coverage area.
• Offer choices for email tracking.
• reliable and prompt email delivery.
Disadvantages of SMTP:
• SMTP’s common port can be blocked by several firewalls.
• SMTP security is a bigger problem.
• Its simplicity restricts how useful it can be.
• Just 7 bit ASCII characters can be used.
• If a message is longer than a certain length, SMTP servers may reject the entire
message.
• Delivering your message will typically involve additional back-and-forth processing
between servers, which will delay sending and raise the likelihood that it won’t be sent.
SNMP
o SNMP stands for Simple Network Management Protocol.
o SNMP is a framework used for managing devices on the internet.
o It provides a set of operations for monitoring and managing the internet.
SNMP Concept
SNMP defines five types of messages: GetRequest, GetNextRequest, SetRequest, GetResponse, and Trap.
GetRequest: The GetRequest message is sent from a manager (client) to the agent (server) to retrieve the
value of a variable.
GetNextRequest: The GetNextRequest message is sent from the manager to agent to retrieve the value of a
variable. This type of message is used to retrieve the values of the entries in a table. If the manager does not
know the indexes of the entries, then it will not be able to retrieve the values. In such situations,
GetNextRequest message is used to define an object.
GetResponse: The GetResponse message is sent from an agent to the manager in response to the GetRequest
and GetNextRequest message. This message contains the value of a variable requested by the manager.
SetRequest: The SetRequest message is sent from a manager to the agent to set a value in a variable.
Trap: The Trap message is sent from an agent to the manager to report an event. For example, if the agent is
rebooted, then it informs the manager as well as sends the time of rebooting.
Pop
o It allows the users to read the email offline. It requires an internet connection only at the time of
downloading emails from the server. Once the mails are downloaded from the server, then all the
downloaded mails reside on our PC or hard disk of our computer, which can be accessed without the
internet. Therefore, we can say that the POP3 protocol does not require permanent internet
connectivity.
o It provides easy and fast access to the emails as they are already stored on our PC.
o There is no limit on the size of the email which we receive or send.
o It requires less server storage space as all the mails are stored on the local machine.
o There is maximum size on the mailbox, but it is limited by the size of the hard disk.
o It is a simple protocol so it is one of the most popular protocols used today.
o It is easy to configure and use.
o If the emails are downloaded from the server, then all the mails are deleted from the server by default.
So, mails cannot be accessed from other machines unless they are configured to leave a copy of the
mail on the server.
o Transferring the mail folder from the local machine to another machine can be difficult.
o Since all the attachments are stored on your local machine, there is a high risk of a virus attack if the
virus scanner does not scan them. The virus attack can harm the computer.
o The email folder which is downloaded from the mail server can also become corrupted.
o The mails are stored on the local machine, so anyone who sits on your machine can access the email
folder.
IMAP
There are some features of IMAP, which are as follows: