You are on page 1of 48
I Al) SHEA] TABLE OF CONTENTS Chapter-1ApplicationLayer—=—~=~*~*~*~*~*«d' 2‘*YC (BY. 4-2 é E Ee j 4-3 14 peer 4.7 a8 ie al 2.2.1 Distributed Co-ordination Function (OCF) ee Beta es = a Ghapler-3 _ ADHOC and WEN 3G — 2233 alison dmg tnhlng aes 43.1 Infrastructure - Less Wireless Networks... 224 fre Format LLL ais 3.1.1 Adhoc Network 2.25 Addressing Mechar 217 3.2 Design Issues in Adhoc Wireless Network. ae) 226 Physical Layer... eres ceseeeeen 2219 3.2.1 Medium Access Scheme = 22.7 CSMAICA o-oo pistes RenrPonnnstt sseveradecrrnes 2221 22.7. den Node Problem : ae 2272 Exposed Node Problem 2-24 3.24 Transport Layer Protocols ‘as biference between 802.112 and 802.110 ........-sssseseeneeeesseeeee 22h an 2.36luetooth 32.6500 2.3.1 Bluetooth Are 2-25 3.27 Sealab 2.3.2 Radio Layer .. 2-26 3.2.8 Energy Management 2.3.3 Baseband Layer 1207 3.29 Quality of Service Provisioning 254 Frome Format cccscsssesconsuapecejeseasaces as 3.2.10 Addressing and Service Discovery... So 235120AP... 231 3.2.11 Deployment Considerations a 2.3.6 Hidden Staton Problem. 2-33 3.3 Ad hoc Network MAC Layer... 2.3.7 Comparison between IEEE 802.11x and Bluetooth... 2-36 33.1 Design lssues for Ad hoc Network MAC layer 3-8 2.4 lee 602.16 sa 3.3.2 Design Goals .. eames 235 3.33 Classification of MAC Protocol for Ad hoc Networks. 24.2 The 602.16 Physical Layer Aa Sa MACAnT eRe 2.4.3 The 802.16 MAC Subayer Protocol a as AdhocNetwork Routing ayer cba? 35.1 lsues in Designing a Routing Protocol for Ad hoc 2.4.4 The 802.16 Frame Structure 24 compan betwen Vian in 238 25:2 Gsfestons of outing rte 2.4.6 Wired Vs Wireless Networking ........ peter eeee tenses 2238 3.5.3 Comparison between Proactive and Reactive 2.5 Short Answered Questions -39 3.5.4 DSDV .... 26 Mull Chie Questions with Answers... 2-40 assao0. 355.1 Characteristics of AODV. om o Application Layer sund is called Application Layer. 1e applications are fo faces ond support for services such as electroni¢ mail, eee ro aystem resources, surfing the World Wide Web, and + needs support protocols, to allow the applications to function, Fil look at an important one of these before starting with the applications them: + The application layer provides services to the user. Ci tring ¢ logical connection, which means that the two application layers assume wreet connection through which they can send and ws the idea behind this logical connection. between two applicatio yunication is provided Logical connection 1e application layer TE Et tepetcemeston aia er TECHNICAL PUBLICATIONS® - an upust for ko Computer Network nd Securty As soot ing in a research company, Land Research, needs to order a book ‘+ Logical connection takes place between of a computer at earch and the application laye; jooks. Ram and second host Sham, The communication at the cal, not physical. Ram and Sham assume that there is a channel between them through which they can send and receive however, takes plac several devices process. ting for another application program, called yn through the Internet and ask for service. wust be running all the time, t needs to receive service. igm, eg, WWW, HTTP, FIP, when the it - Server Programming t/server model, the device requesting the information is called a client wvice responding to the request is called a server. #* Client and server processes are considered to be in the application layer. Data transfer from a client to a server is referred to as an upload and data from a server to a client as a download. In a client/server network, the server runs a service or process, sometimes called a server daemon. Like most services, daemons typically run in the background and are not under an end user's direct control + When a daemon “hears” a request from a client, it exchanges appropriate messages with the client, as required by its protocol and proceeds to send the requested data to the client in the proper format. ee TECHNICAL PUBLICATIONS® - an uptnust for krowiedne Application Layer | Computer Network and Socurty EAI Application Programming Int ‘Application programming is set of instructions fa connection, send and receive data, 10 (API) to talk with the lowest four layers (in 05). ‘+ Application programming instructs to open close the connection. , «Application programming is set of instructions of this kind is API. Interface between a process and network Several APIs have been designed for communication. + Three most common APIs : - 1. Socket interface 2. Transport Layer Interface (TLI) 3. STREAM [A process sends messages into and receives mess software interface called a socket. Fig. 121 shows application process, sockets and underlying transport protocol. iges from, the network through a Hostor = Ce wu ES set, [ee i Be Fig. 1.2.4 Socket interface * Socket interface started in the early 1980s at UC Berkeley as part of a UNIX environment. * The kt nrc tof instructions that provide comm the application layer and the OS, , a * Th eof kt lows a oe owe he et ofall instars aad design ‘Cetiming language for other sources and sinks ae eto Pye ety ie le, keyboard ban bsracion TECHNICAL PUBLICATIONS® «an uptt fr kn } Te Computer Netvork and Securty 15 Applicaton Layer + For example, ~ in C, C++ or Java, we have several instructions that can read and write data to other sources and sinks; - a keyboard (a source), a monitor (a sink) ource and sink) Fig 12.2 shows sockets used the same way as other sources and sinks. es a= E : Keyboard Fie Socket en tears | | omy ‘Communication between a client process and a server process is nothing but communication between two sockets. Fig. 1.23 shows use of sockets in process - to - process communication. =a process, Applicaton layer sso] rose Soca T___77 Togical connection Fig. 1.2.3, ‘+ The process - to - process communication need a pair of socket addresses for communication : - A local socket address and a remote socket address. TECHNICAL PUBLICATIONS® - an up-trst for kowedge Appleton Layer x is running. A computer ine the specific client or server involved program can be defined by 2 port sd specific port numbers. Few 25. So, socket address = ica ycerver = 60, Mail Server = port nunbe UP address, port number] Fig. 1.24 KEE] Using services of the Transport Layer +The choie of the transport layer proticol seriously affects the capability of the pplication processes. + Broadly classify the possible transport ayer services aloig four dimensions : 1. Reliable data transfer 2. Throughput 3. Timing 4. Security + Use UDP: 4) fit is sending small messages ) If the simplicity and speed is more important for the aj lication. wea P pplication than ©). For lightweight transport protocol, providing minimal services ds to send long messages and require reliability ) For providing security it use SL. (Secure Socket Layer) TECHNICAL PUBLICATIONS? - an upd for nowedge ES Computer Network and Securty ter Applicaton Leyer KEI Domain Name System (DNS) + Goal : Assign mesningfl higivlevel names to a large set of machines and handle + The centrally. the mapping of those names to a machine's IP address tributed database that resides on multiple machines on the Domain names are case insensitive so com and COM mean the same thing. ‘The DNS protocol runs over UDP and uses port 53. ‘The DNS is specified in RFC 1034 and RFC 1035. The DNS protocol is the application layer protocol. ‘A full domain name is a sequence of labels separated by dots (.. ‘The DNS name space is hierarchical and it is similar to the unix file system. Originally, the internet was small and mapping between names and addresses was accomplished using a centrally-maintained file called hosts.xt. To add a name or central administrator, updating the first because changes. This solution worke le didn’t require frequ ned table suffered from several drawbacks : ce Was flat, and no two machines could use the same machine 1. The name 2. As the intemet grew, changes to the database took days to weeks to take effect. 3. The central site became congested with the increase in the number of sites retrieving copies of the current table. 4. The intemet grew at an astonishing rate. The Domain Name System (DNS) is a hierarchical, distributed naming system designed to cope with the problem of explosive growth : hierarchical because the name space is partitioned into subfomains. buted. because management of the name space is delegated to local al sites have complete control (and responsibility) for their part of the name space. DNS queries are handled by servers called name servers. joes more than just map machine names to internet addresses. For example, lows a site to associate multiple machines with a single, mailbox name. TECHNICAL PUBLICATIONS® - an up-hmst for knowledge , Application Layer wth tur as # ee, Sets and a fully srirom the domain name to the root 1+ In the DNS, the name rrodes in the tree. TH identified by the confor yme can have one of mote aliag the canonical hostname Load distribution + DNS is also used to perform load replicated servers. KEXI components of DNS «DNS includes following components 1. Domain 2 Domainname 3, Name server Name resolver 5.Name cache 6, Zone 1) For example, vtubooks.com is the site for technical publications. Here com is the domain. 2) Domain name is defined by the DNS as being the sequence of names and domain. For example, vtubooks.com could be domain name. 3) In name server, software by mapping domain namé 4) Name resolver is a software that functions as a client 9s names to addresses. It does this racting with a name 5) Name cache is the storage used by the name resolver frequently used, 8) Zone is a contiguous part of a domain. HEE] DNs in the internet store information * DNS is divided into three different sections in the intemet i.e, Generic domain, Country domain and Inverse domain. + Fig. 13:1 shows the DNS in the intemet, Generic Domains + Each node in the tree defines a domai in, which is an index to the domain name space database, TECHNICAL PUBLCATIONS®- 0 wpinnat v nowage Computor Nodak and Sacurty 10 —— deduction! opsztin fo Goverment tone ~memons xpi | + Fig, 132 shows the generic domains Rootlevel ‘inngas Lt snr 0 Fig. 1.32 Generic domains. TECHNICAL PUBLICATIONS® - an up-ust for knowledge eeerninl fag 8 hows cnt Ivers Dot Tasiemipanaties anime J pepe When alent sda equ f the Bump Ne tore ct Te let conan oly T ares ofthe br «Soca guy the Inverse DNS server and ik fora mapping of ede Sune bran hI +The pointer query is handled by the fe alto one single node named in addres, Fig. 134 shows inverse domain. 4 a. Fla. 1.34 inverse domain TROAMCAL PUBLCATONS® «an pat br ioage Cenputer Hone and Secu nn Aopicaton ayer EEE] Nome spacos fon the Internet used flat namespaces sequence of characters with no further structure, ral name authority was overloaded. 43, Frequent name-address binding changes were costly and cumbersome. 1 Hierarchical names + The partitioning of a namespace must be defined in such a way that it: = Supports efficient name mapping, ~ Guarantees autonomous control of name assignment. “+ Hierarchical namespaces provides a simple yet lexble naming structure. + The namespace is partitioned atthe top level + Authority for names in each partition are passed to each designated agent. Root ‘County domains ‘Genetic domains Fig. 13.5 Hierarchy of ONS. TECHNICAL PUBLICATIONS® - an up-rust fr hnowedgs eae] 482 Azpleaton Leyer Wwerted-tree structure with the root at the oP. 2. The 3 character domains are called the generic domains. 3. The 2 character domains are based om the counter codes f These are called the country domains. + Fig. 135 shows the hierarchy of DNS, wund in ISO 3166. Fig. 1.36 Domain names and label © Each node in the tree has 2 label, which is a string with a maximum of 63 characters. The root label is a mull string ie. empty string, + Each node in the tree has « domain name, a full domain name is a sequence of labels separated by dots(). Fig. 136 shows the domain names and labels. In folly qualified domain name, label is temminated by a null string. Fully (Qualified Domain Name (FQDN) contains the full name of host. All labels are part of FQDN. ‘+ Partially Qulified Domain Name (PQDN) : In this label is not terminated by a nul string. It always star from node. A domain name does not include all the levels. between the host and the root node. For example, vtubook com. Hierarchy of Name Servers : = Puaucanans® an peru fy Fla: 12.7 Hiararchy of name serve er _ fe Applcaton Layer ‘among many computers, DNS servers are used. re are first level nodes. Fig. 137 shows hierarchy of + Fig. 138 shows domain with © Domain and zone are same if | + Domain and zone are different, if a server divides its domain into subdomains and delegates part of its authority server : If zone consists of the full tee then that zone server is called root server. Root server do not maintain any information about domains. DNS uses two types of servers 1. Primary server 2. Secondary server « Primary server : This server keeps a file about the zone for which it is id have authority. It performs operation on zone file like create, fe and maintaining. loads all information from the primary server. Secondary ‘an not perform any operation on zone file. KEE Recursive and Interative Resolution © DNS is designed as a client server application. A host that needs to map an address to a name or a name to an address calls a DNS client named a resolver. Working : ‘+ Name resolving must also include the type of answer desired (specifying the protocol family is optional). . + The DNS partitions the entire set of names by class (for mapping to multiple ___ Protocol suites) TECHNICAL PUBLICATIONS® - an up-vust fr knowledge er AP Wotton + Naming items ied sis is required since one cannot dist ames of subdomai from the names of individual objects or ther ype sen q Mapping Domain Names to Addresses : a) “The DNS also includes an efficent, reliable, general purpos for mapping names to addresses using an independent co-P buted system, system called b) Names Servers - (maps DN ~> IP addresses) and usually executes on a ©) Name Resolvers - client software that uses one or more name servers in getting a -mapped name. 4) Domain name servers are arranged in a conceptual tree structure that corresponds to the naming hierarchy. are server programs that Recursive Resolution ‘* A dient request complete translation ‘+ If the server is authority for the domain name, it checks its database and responds, it sends the request to another server and waits for # If the server is not authority, the response. © When the query is finally resolved, the response travel back until it finally reaches the requesting client. This is called recursive resolution. ‘+ Fig. 139 shows the recursive resolution. ue, no g a WT cursive resolution TECHCAL PUBLICATIONS® an upto Knowedye ‘Appcaten Layer resolution is made and retumed (not recursive) t nie servers if further resolution is tly contact diff in authority for the name, it sends the answer. If it is not, it ss of the server that it thinks can resolve the query. The client repeating the query to this second server. This process is called because the client repeats the same query to multiple servers. ‘+ Fig. 13.10 shows iterative resolution. Stes ecu Tala) Fig. 1.3.10 Iterative resolution Conceptually, name resolution proceeds in a top - down fashion. Name resolution can occur in one of two different ways : Recursive resolution and Iterative resolution Name servers use name caching to optimize search costs. Time To Live (TTL) is used to determine a guaranteed name binding during it's time interval. When time expires, the cache name binding is no longer valid, so the client must make a direct name resolution request once again. jon is important task of DNS on the intemet or the translation of IP addresses back to domain names. For example, servers can TECHNICAL PUBLICATIONS® - an upstwst fr hnowiedge “een Lever computer Network ard SOU 4h vcord the full domain name of machine connecting t0 them over determine and record the the network It is not efficent t0 0 Instead, a separate 1 DNS records for reverse name resolution, DR.ARPA” has been set aside to provide into names. xdu” would reveal it has the IP address 1§.00. Reverse name resolution fields use the correct postion in the normal DNS Gan be delegated of course j «+ To obtain the IP address ver, each host has a client protocol known as the name resolver. On receipt of the name, the client application protocol posses it to the name resolver using the standard interprocess communication primitive supported by the local operating system. ‘The resolver then creates a resolution request message in the standard message se. The hierarchy under “IN-ADDR.ARPA” er domain. format of the domain name server protocol +A resolver can have multiple request outstanding at any time. Hence the identification field is used to relate a subsequent response message to an earlier request message, ‘The name resolver passes the request message to its local domain name server using TCP/IP. If the request is for a server on this network, the local domain name server obtains the corresponding IP address from its DIB and returns it in a reply message EEG Message Format + Messages are sent between domain clients and domain servers with a specific format. + All messages ofthis format are used for name resolution and naming queries ‘© Question sent by the dient and answers provid , ee eee led by the server are included + DNS has two types of mess anc ee ag65 : Query and Response. Both types have the same a wo ecthe IP address and wishes cee apf 1DLIB 180 na’ wD PTR resource record, which points to the. | Conpter Network and Sweety tar ovcton ter + Fig, 13:11. shows the query and response messages. Teader 7 iiormaton formation L Question ‘Question part sf cs oe E ‘ewer 7 emi + ‘Auhortatve part Additional information t art T (@) Query (b) Response Fig. 1.3.11 Query and response message Fig. 13.12 shows the header format of the DNS. itso 1516 3 raentfcaton Frags Numbers of answers Number ofadetonal |+- r20y0s | Answers aL ‘Auoety 4 ‘Adan informaton i Fig, 1.3.12 General format of DNS Identification : It is 16 bits fields and unique value used by the client to match responses to queries. . is the collection of subfields that define the type of messages and type of Flags the answers requested and so on. ‘Number of question record contains the number of queries in the question section of the message. Number of section of the response message. wer record contains the number of answer records in the answer TECHNICAL PUBLICATIONS® - an upitnist for -cwedoe APpiication | The flags field is divided into 8 parts. QR = 0 Formessage is a query 1 Reis response Opcode = 0 Standard query = 1 Inverse query = 2 Server status request AA = Authoritative answer TC = Truncated RD = Recursive query RA = Recursion available roode = Return code RD field is 1-bit and can -n retumed in the response. called a recursive query. 1 the response ifthe server support recursion, id. The common value are 0 for no error and 3 for name erro! ‘A name error is i error is retumed only from an authoritative name server and means the domain name specified in the query does not exist. * The next four 16-bit fields specify the ni flash compen ane PeGHY the numberof entries in the four variable length i TECHWGAL PUBLICATIONS on wpa oma Computor Network and Secunty 110 Applicaton Layer KEE] Rosource Rocords used in DNS. An IP address has a type of resource records available. Some PR are ‘A=It defines an IP address, It is stored as a 32 bit binary value. 2) CNAME = “Canonical name’ ted as a domain name. 3) HINFO = ation, two arbitrary character strings specifying the CPU and operating system (05). 4) MX = Mail exchange records. It provide domain willing to accept e-mail 5) PTR = Pointer record used for pointer queries, The IP address is represented as __ adomain name in the in-addrarpa domain 6) NS = Name Server record. These specify the authoritative name server for a domain, They are represented as domain names. EEEI Namo Servers When a resolver has a query abo jomain name, it passes the query to one of Fig: 1.3.14 shows the eight steps for resolving the remote name. (See Fig. 13.14 on next page) ‘A resolver on flitses.vunl wants to know the IP address of the host lindas yale-edu. Stops It sends a query to the local name server cs.vu.nl, This query contains the domain name, sought, the type (A) and the class (IN). and 3. Suppose the local name server has never had a query for this domain ‘and knows nothing about it. It may ask a few other nearby name servers, ‘none of them know, it sends a UDP packet to the server for edu given in its bu database, edu-servernet. This server knows all its children, so it forwards the yale.edu. to esyaleedu, which must have the authoritative st is from a client to a server, the resource record requested works its way back in these steps. TECHNICAL PUBLICATIONS® - an up-ust for knowledge Computer Network and Secunty KEIM Dynamic Domain Namo System (DONS) 4 DDNS is a service that maps internet domain names to IP addresses. DDNS serves | I ; oO pn anos agen honang # Web or FIP server © Ste ent tcos pec ee ce een cae sa wah om addres, DONS wos wh namie oa a ee ty an SP er aber DHCP server DDNS is popular with home networkers, who typically receive dynamicr frequently-changing IP addresses from their service provider. « To use DDNS, one simply signs up with a provider and installs network sofsware ‘on their host to monitor its IP address, DNS, the disadvantage of DDNS is that additional host ‘must be maintained. fu name server Compared to or software, a new potential failure point on the network, Advantages of DNS 41. DNS has hierarchical structure and database. 2. DNS has small and manageable zones. 3, Itis scalable. 4. DNS helps in eliminating host tables. 5, It is consistant on all hosts. 6. The Intemet couldnt exist without it. 7. Easy to implement with minimal configuration changes in DNS server, EG on Fig. 13.14 Remote name resolve KEE] war + LDAP is Lightweight Dizectory Access Protocol It provides X-500 features. LDAP is an applicationlevel protocol that is implemented directly on top of TCP. EE Fite Transfer Protocol (FTP) «FIP is designed for distributing files to a number of users. FTP uses a client-server system, in which files are stored at a central computer and transferred between that computer and other, widely distributed computers. . ‘The central computer runs FTP server software and widely distributed computer runs FIP client software. FTP is interactive. «The FIP program accepts a sequence of commands. To interact with a remote computer, a user must identify the computer and allow FTP to establish contact, FIP uses TCP/IP software to contact the computer. FIP provides 58 separate ‘commands, an average user only needs to understand the three basic commands x, retrieve a copy of a file and exit the FIP are the list of commands. It stores entries, which is similar to objets. Each entry must have a disting must have a distinguished ram which ur-euallyidenifs the ety. Entries ean also have attributes. + LDAP provides ban, sting and tine types. 1 allows the defination of object ses with attribute name of types. Entries are organized into a director {information be, according to their distinguished names come + LDAP defines a network prot Pa protocol for carrying out data defination and . wo has been widely adopted, particularly for intemet secured access to directory data through authentica 3 TeonucaL pusueaTions®. TONS® an ups fo koowindge rectory services. It to connect program. Fol TECHNICAL PUBLICATIONS® « an upitrust fr owiehe Connect t9 a remote compute Retrive a file frm the coo Pate | Terminate te exonon emt | leave the FTP pega Table 1.41 transfer and terminates the When user transfer a file by connection after down loading or up the file is transferred In binary mode, transferring of files consis of anything but unformai this mode, the FTP software does not make any changes fo the contents during transfer + Use binary mode when transferring graphic files, audio files, video files, program or any other kind and server programs co-operate to send copy of Fig, LAI shows the FIP connection. ‘+ The FIP server locates the file that the copy of the ene contents ofthe file ac. rogram receives dat, it writes the data ‘+ Afier the fle transfer completes the client and server programs ‘ennection used for the transfer. FTP data transfer Interet than any other application, oes moss Detail steps of FTP en FIP client contacts FIP server at port 21 specifying TCP as transport protocol «© Client obtain authorization over control connection. directory by sending commands over the server open a TCP data control connection. Fig. 4.4.2 Data connection Meaning cd___Changes the working directory on the remote host c ‘Command clove Closes the FIP connection. Quits FTP 4 Displays the current working directory on the remote host TEOMA PLATO? wn pene be “" TECHNICAL PUBLICATIONS® - an up-thust for knowledpe Computer Network and Security quently used to allow diskless ted by the tp client program and by the ttp server program. As TETP has no 1 possible for unwanted file transfer to occur. It ray be used to steal password files. + TFIP is a simple User Datagram Pi easy to implement + TFTP can only read directories, and curren + In TFTP, any transfer always bepins wit serves to request a connection. When th Js opened and the file is sent inf Each data packet contains one Bk. acknowledgement packet before sen +A data packet of less than packet is lost in the net retransmit his lst packet (which may be data or causing the-sender ofthe lst packet fo retransmit The sender has to keep just on on hand for retransmission, because the lock step acknowledgement guarantees that all older packets have been received Notice that both machines involved in a transfer are considered senders and citer One sends date and receives acknowledgements, the other send acknowledgements and receives data, aaa + ‘Three modes of transfer cut ci) octet (raw 8 {implemented on top of the Intemet of a TETP is small and supported by TETP are netasci ‘mail, netascii characters sent to a us Computer Network na Sacunty ts Apleaton Layer KEE Dittoronce between FTP and TFTP Sr Ne P a fw wo cums er? we ar wate 2 Pov many commands Provide el ve emus EL tm? tim woe | “ Noagn prostue | os Si ah we ao 5 ania aaa ee EES Hypertext Transfer Protocol (HTTP) + The standard web transfer protocol is Hyper Text Transfer Protocol (HTTP). ‘+ The HTTP protocol consists of two fairly distinc items: The set of requests from browsers to servers and the set of responses going back the other way. +All the newer versions of HTTP support two kinds of requests: Simple requests and full requests. A simple request is just a single GET line naming the page out the protocl version. e raw page with no headers, no MIME, and no encoding. “+The response is To see how this works, try making a Telnet connection to port 80 of www.w3.org and then type. GET /hypertext/www/TheProjecthhtml request line, Requests may consist of multiple lines, followed by a blank line to indicate the end of the request. The first line of a full request contains the command (of which GET is but one of the possibilities), the page desired, and the protocol/version. Subsequent lines contain RFC 822 headers. ‘Although HTTP was designed for use in the Web, it has been intentionally made ‘more general than necessary with an eye to future object-oriented applications. For this reason, the first word on the full request line is simply the name of the method (command) to be executed on the web page (or general object). TOCA PUBLATONS®-n ptrutriowsage TECHNICAL PUBLICATIONS® «an upttrst for knowin Application Loyer computor Network and Securty 4-28 patos may aso be ener objets, daonl ebjecspeic abe + When acesing BS cae sense, 2, GET i ge mated bot 6° TOL TTP Transaction : TP FATT nae the services of TCP. HTTP sales Ps 7 ruest message. The server 1 The client iniizes the transaction by sending request MSHS replies by sending a response + Fig. 15:1 shows HTTP transaction Request Header Boo, server Fig, 1.54 HTTP transaction EERE HTTP Messages v _+ HTTP messages are two types 1. Request 2. Response + Both message type used same format + Request message consists of a request line, headers and a body. Fig, 152 shows request message. Fig. 1.52 Request mossage Request tine 2 Resource 3. TTP version 1+ Request ype categorizes the request | GET! temenin! 4 HTT } T un | rTP version soace Fig. 4.5.3 Request line TECHNICAL PUBLICATIONS® «an upitmut for krowiedgo Computr Network and Sacuty tear Applicaton Layer Semper Nemworkend Securty t-27__Aalcaton yer 3.Port 4, Path Fig. 154 shows the URL. + The method is the prototocol Method stostPonPath Fig. 1.54 (a) URL. used to retrieve the document. Several different protocols can retrieve a ao: tmntecnncaooieaton og meh document, among them ate t t \ FIP and HTTP, Pract sitdoman domanname | pasha, + The host is the computer fad where the information is located, although the name Fig. 154 (b) URL example of the computer can be alias. Web pages are usually stored in computers and computers are given alias names that usually begin with the character wow. ‘+ The URL can optionally contain the port number of the server. Path is the th name of the file where the information is located. # The request Id in a request message defines several kinds of messages referred to as methods: Sr.No. Method Purposes 1 Gat Used when the dient wants to retrieve a document from the seever. Server responds with the contents of the document. 2 HEAD Used when client want Dut not the document 3. ost Used by the dent to fe. input tothe server 4 pur Used by the client to provide a new of replacement document to be stored on the server. 5. PATCH Similar to PUT except that the request contains alist of differences that should be Implemented in the existing fle. 6 DELETE Removes a document on the server. ‘TECHNICAL PUBLICATIONS® - an up-tiust for knowledge sewed es to another loeston. URL. gives the location of Srrsare ie be source wea fle to another location wove Mo Creates a link or links from a document to another location, UNUNK method deletes links created by the LINK method. This method is used by the client to ask the server about avaiable options. conditionally ask for it from the server, giving ith the sends back a status line announcing of transferring the page again, 4+ Ifthe cache page is that fact, thas eliminat ‘+ The HEAD method just asks ‘method can be used to get a pa; for indexing. purposes, or request do not exist. * The FUT method is the reverse of GET : Instead of reading the page, it writes the Page, This method makes it possible to buld a collection of web pages on a remote server. + The body of the request contains the The body “auest contains the page. It may be encoded using MIME, in sense, * Posting a message to a news grouy ample of appending in this cont Web takeover the functionality of * DELETE does what you might expect ‘uthnttion and person play hee ht ase. AS with PUT "e. There is no guarantee that Computr Notwor and Security 1-29 Aopleation Layer =aeRl_wsy Acar Layer DELETE succeeds, since even if the remote HTTP server is willing to delete the age, the un le may have a mode that forbids the HTTP server from ing oF removing it. snd UNLINK methods allow connections to be established between the response message, It a header and body. a. HTTP version Status code EEA HTTP Headers ‘+ Heider can be one or more header lines. Each header line is made of a header name, a colon, a space and a header value The header exchange additional information between the client and the server. A header line belongs to one of four categories : general header, request header, response header and entity header. + Fig. 156 shows the header format, [ieeeecrene] [] eseerrabe ‘+ General header includes general information about the message. Request and a response both contains general header. + Response header can be present only in a response message. It specifies the servers configuration and special information about the request. + Request header can be present only in a request message, It specifies the clients configuration and the cient preferred document format. + Entity header gives information about the body of the document. It is mostly 4. Space ¢. Status phrase Fig. 1.5.5 Response message Fig. 4.5.8 Header format TECHNICAL PUBLICATIONS® - an upshaust for kowiedye Appleton Lay, Fig. 157 shows the headers. perp 300 OK Date : Wet, 6 Oct 2014 13:0013 GMT ‘Connection: close ie Server: Ap epee Ee Cnet Type: thin ene Length: 200 LawtNoised 20x 201413009 GMT | ‘Mesiage Body chtmb> head title» Weleome tothe Inia ehead> sbeay> sires Fig, 18:7 Response message header EE] Persistent and Non-persistent Connection ‘+ HTTP connections are of two types, 1 Persistent HTTP 2 Non-persistent HTTP Non » persistent Connections Jn this type of connection, one TCP connection is made for each request / response * Suppose the pag 1 ofthese objects + Suppose the URL ‘Wve. vtabookscom / ITDept/ home.ndex The sequence of events areas fllows file and ten JPEG images and that all ICP connection to the server ww server wurw.vtubook.com on _ re port number for HTTP. dlient sends an HTTP : quest message to the server via Request mesige includes the path namne/ITDept/hemeindo "SOE TECHUCAL PLBLICATIONS® an ptt or knowlege —_— OE Computer Notwork and Securty ] ‘Aopleaton Layer S| message via the socket. ‘TCP connection. se. The TCP connection terminates RIT includes packet propagation delays, packet queuing delays in intermediate routers and swit ope iy and packet processing delays. Fig. 158 shows operation when user clicks on a hyperlink. Tenet anemia Fig. 1.5.8 Calculation for requesting file ‘© Browser to initiate TCP connection between the browser and the web server. It requires three way handshake. The cles © The ends a small TCP segment to the server. fet acknowledges and responds with a small TCP segment. ‘© Finally, the client acknowledges back to the server. TECHNICAL PUBLICATIONS® - an up-nust for krowiodgo the same client to the same server involves the in additional TCP connection. «Bach subsequent request from f ceting up and tearing dow? pisadvantages of non - persistent 1. TEP processing and memory resource wasted in the 2 trmquires delay of 2 RTT associated with the tr and the client. ch object: |b Exch TCP connection setup involves the exchange of three segments between client and server machines. TEEEY Fenistent Connection ‘+ HTTP 1.1. made persistent connections the default mode. + The server now keeps the TCP connection open for a certain period of time after sending 2 response. + This enables the client to make multiple requests over the same TCP connection and hence avoid the inefficiency and delay of the nonpersistent mode. Types of persistent connections + There are two versions of persistent connections: 1. Without pipelining 2. With pipelining Without pipelining + The client issues a new request only when the previous response has been received. ‘The client experiences one RIT in order to request and receive each of the referenced objects ‘+ Disadvantage : TCP connection is idle ie. does nothing while it waits for another request to arrive. This idling wastes server resoruces, ult mode of HTTP 11. uses persistent connections with pipeling + Client issues 2 request as soon r HTTP as it encounters a references. The lent can make back to back requests forthe referenced objects, clent + Itcan make a new request before receivin, * When the server receives the back- back-to-back, a * It uses only one RTT. i 8 response to a previous request. loback requests, it sends the objects [Computer Netwark end Secuyy 1-39 Applcaton Layer sempuermememenisety te) Acton Layer © Pipelined TCP connection remains idle for a ler fraction of time. ‘+ Persistent HTTP connections have a number of advantages. 1. By opening and closing fewer TCP connections, CPU time is saved in routers and hosts 2. Requests and responses can be pipelined on a connection 3. Network congestion is reduced by reducing the number of packets caused by TCP opens, 4. Latency on subsequent requests is reduced Proxy server + HTTP supports the proxy servers. A proxy server is a computer that keeps copies of responds to recent requests + The HTTP client sends a request to the proxy server. The proxy server checks its cache, If the response is not corresponding server. in the cache, the proxy server sends the request to the ‘© Incoming responses are from other clients. to the proxy server and stored for future requests + The proxy server reduces the load on the original server, decreases traffic and improves latency. ‘+ To use proxy server, the client must be configured to access the proxy instead of the target server. \ce between Persistent and Non-persistent Ne Non-persistent HTTP Sr. No. Persistent HTTP 1. Persistent version is 13. Non-persistent HTTP version is 10. 2 _Iewses one RIT. 18 uses two RTT. 3. TCP connection is not closed. TCP connection is closed after every request-response, v4 Client make multiple request over Client make multiple request over the same TCP connection. the multiple TCP connection. 5. Its default mode It's not default mode. 6 Request methods are GET, HEAD, Request methods used are GET, POST, PUT, DELETE, TRACE and POST and HEAD. OPTIONS. Toiwica. rusucatOns? an won win Le a TECHNICAL PUBLICATIONS® an up-trust for !now'edg@ “rrneton Layer Computer Network wd Sect I EG simple Mail Transfer Protocol (SMTP) srer protocol of TCP/IP model. '« mail servers to the recipients mail servers, + SMIP trans ge from sent + SMTP interacts with the loca SMTP uses a TCP socket on port 25 to transfe 1 and eventually transfered directly to rstem and not the user. 1+ e-mail reliably from client to server + Email is temporarily stored on the local receiving server. Client / Server interaction follows and commond/reponse paradigm. 4a] Commands are plain ASCII text. | Responses are a status code and an optional phase. ] Command and response lines terminated with CRLF. “Mail dient application interacts with a local SMTP server to initiate the delivery of an e-mail message. ‘+ There is an input queue and an output queue at the interface between the I rail system and the client and the server parts of the SMTP. + The client is concemed with initiating the transfer of mail to another system while server is concemed with receiving mail. Before the e-mail message can be transferred, the application process must be set up a TCP connection to the local SMIP server. The local mail system retains a mailbox for each user into which the 3 retrieve mail, Mail handling system must use a unique addressing system. Adderssing system used by SMTP consists of two parts : A local part and a global art. The local part is the user name and is unique only within that local mail system. Global part of the address is the domain name. Domain name is identity of the host, must be unique within the total Internet. ‘+ SMTP uses different types of component. They are MIME and POP. lee sends message to Bob ¥+ Alice ses User Agent (UA) to compose message and to bob@sinhgad edu. F a : e ‘ends message to her mail server, message placed in message queue. foam Side Of SMTP opens TCP connection with Bob's mailserver. ‘ oor oe Alice's message over the TCP connection. 6h a Pts the mesg in Bos mao ‘er agent to read message. TECHCAL PUBLICATIONS? «an ups! fr knowedpe computer Network and Security 1-35 pars GomputerNerworkend Secury 38 act Layer SMTP woes Commands and responses to transfer mestages between an MTA lent 7 ver [2] met Toe Tmt | os [uae ent . oe Ll oo ace Fig. 1.8.1 Message scenario Commands MTA MTA cient Responses: server Fig, 1.8.2 Command | Response ‘+ Each command or reply is terminated by a two character end of line token. + Commands are sent from the client to the server. SMTP defines 14 commands. SMTP commands of human readable ASCII strings. «SMTP commands are as follows i) HELO : Initiate a mail transaction, identifying the sender to the recipient. Tells the remote SMTP that a new mail transaction is ii) MAIL FROM + beginning. RCPT TO : The sending SMTP sends a RCPT command for each intended receiver. DATA : If accepted, the sender transfers the actual message. End of message is by sending a “+ ona line by itsel. v) QUIT : Terminate the connection. Sample SMTP Interaction Following are messages exchanged between an SMTP client (C) and an SMTP server (S). TECHNICAL PUBLICATIONS® - an upetrus! for knowledge fresh, pleased to meet you (C: MAIL FROM : crupaligiresh fro ‘5: 280 rupalisiresh fr .. sender ok CROFT TO: < rakshitatsinhgad edu> 'S: 250 rakshitagsinhgad.edu .... Recipient ok c:DaTa ‘$354 Enter Mail, end with “on a line by itself C: Do you like Apple? C: What about school ? c: 5 : 250 message accepted for delivery ¢:Qur 5: 221 sinkgad.ediu closing connection EEA Muttipurpose internet Mail Exten: ‘+ MIME is 2 supplementary protocol SMTP. + MIME defined by TETF to allow transmission of non-ASCII data + Wallows arbitary data to be encoded in ASCI for nonmal transmission arene 2 PS that are sent or recsved over the world wide web (www) are ‘encoded using diferent MIME types * Masog sot sig MIME enn ld inomaton tut decreas of dat andthe encoding that was we ne + RFCE22 specifies the exact Interpretations * Fg. 171 hows the working of MIME. ea a. format for mail header lines as well as their semantic Nonasci code MIME ane 7bitascn Fig. 74 MME 4. Content - Ia + Content - Transfer - Encoding ; bases » data for the image .... MIME Types and SubTy; * Each MIME content - type must contain two identifiers : = Content type = Content subtype * There are seven standardized contenttypes that can appear in a MIME content - type declaration. TECHNICAL PUBLICATIONS® «an upatvst or inowiodge ETT TETAS: Application Lovey ‘Computer Network and Securty LE = — “computor Network and Securty 239 Application Layer fia sane lon fierce Pain “. ont a 950 sends a user name and 4 password to J Manpat Mined ins Alternative | vio rec autio Basie edn oS el rec mage nme et | a | Mesege Puta and eternal Aner eal message of enema reo 1 mao" Sactaoe ‘ re Ba ] cet seam Cowal i Content - Transfer Encoding 1es the method to encode the messages into 0 and 1 for transport, | etter | yor fey overnammeremeanae SBE | Base 64 bit blocks of data are encoded into 8-it ASCII characters. Quoted printable Naw ASCH characters are encoded an equal sign followed by an ASCII code. ne KEI Post office Protocol (POP) + Post Office Protocol 3 (POP3) is used to transfer e-mail sag from a mail server to mail client software. Reaeeome moe . ae ine when the ser agent opens a TCP connection to the mall server on Tech = MMEAL PUBLICATIONS® an ups for knowledge ition phase, the user agent retrieves messages. In this phase, user agent can also mark messages for deletion, remove deletion marks. ‘+ In update phase, it occurs after the client has issued the quit command, ending the POP3 session. ‘+ POP3 has two modes : Delete mode and the keep mode. ‘+ In the delete mode, mail is deleted from the mailbox after each retrieval. + In the keep mode, the mail remains in the mailbox after retrieval + Fig, 18.1 shows downloading using POP3, User computer Mat sener POPs POPS cient saver Fig. 1.8.1 POPS Limitations of POP3 1, POPS does not allow the user to organize mail on the server, the user cannot have different folders on the server. “a tetore 2. POPS does not allow the user to partially check the contents of the e-mail befor downloading. TECHNICAL PUBLICATIONS® - an up-ust fr knowedge Computer Network and Secunty 1-40 Application. to ae ‘Satusine | HTTP/1.1 3000 |General headers Entity headers Blarkine Message booy EE] imap ‘+ IMAP is the Internet Mail Access Protocol. IMAPA is more powerful and more complex. IMAP is similar to SMTP. ‘was designed to help the user who uses multiple computers + IMAP doesnot copy eal othe user's personal mucin because the we have several. , he wer ‘+ An IMAP client connects to a server ‘+ IMAP supports the following modes §) Offline mode ii) Online mode ing TCP. ing e-mail messages connected mode Offiine mode: A client periodically connects to the © the server to download e-mail ‘messages. After downloading, messages are delete se ess 1g, message leted from the server. POPS support this Online mode : Client py stored on the server itsel s e-mail messages on the server, The e-mail messages are tate processed by an application on the dlints eet Disconnected mode: In this mode, both offine and online mos are supported ate suppor IMAP4 provides the following extra functions : 1. User can check the e-mail header prior to downloading. 2. User can partially download e-mail. 3. A user can create, delete or rename mailboxes on the mail serve, 4. A user can create a hierarchy ‘5. User can search the contents of the e1 _ computer Network and Security ta Aepleaton Layer ——— error Fig. 1.9.1 shows IMAP IMAP state diagram Not authenticated : Client provides authentication information to the server. ver verify the information and client is now allowed to perform jons on a mailbox. Selected : Client is allowed to access of manipulate individual messages within the mailbox. Logout : Client send logout command for closing IMAP session. ERO bxce «The Bootstrap Protocol (BOOTP) is a static configuration protocol. Each client has a permanent network connection. le that matches + When a client requests its IP address, BOOTP server checks a tab the physical address ofthe client with its IP addres, The binding is predefined, z e 2 If the client moves from one network to another then its creates a problem. BOOTP cannot handle these situations because the binding between the physical and IP addresses ‘and fixed in a table until changed by the system administrator. If there is a change in a physical or IP addresses, the administrator needs to manually enter the changes. ___needs to manually enter the changes; TECHNICAL PUBLICATIONS® « an wp-as for snowiedoe Computer Network and Secunty 1a Aaplaton Levey Gemoutr Netwrk ond Soeur A ‘+ So, to remove the limitations of BOOTP, Dynamic Host Configuration Protocg, (DHCP) protocol is used. manection to the to join tervention. The DHCP wor (CLIENT HAROWARE ADDRESS (16 OGTETS) addresses. When {goes to the pool ‘SERVER HOST NAME (@ OCTETS) 7 BOOT FILE NAME (128 OCTETS) + Diep pny sa ie i 1 he ke ad fan a ay i ee ad address or renew the lease. The ever has the opt renewal I the server disagrees, the cent stope ing EERE Dic Message Format +The format ofthe DHCP meses bated on onder oho asad compat wih BOOT cht BOOT? mesg in «SE Sr ataaps emalle toa y 1ant F disagree with the message. Se Hardware Type : This fad specifies the type of hardware used forthe Teal network, LEN 1, Hardware Address Len Mlreses ae in his mes fetworks using EEE 802 MAC addresses the value 6 | Hops : Specifies how many servers forwarded the HOF 1 request ne ‘TRANSACTION 4 Transaction identifier A 32-bit dentition eld IDENTIFIER generated by the cleny to allow it to math up the Fequest with replies recoived from DHCP sever TEOHUCAL PUBLEATIONS® say tt kenge Application Layay Computer Network and Secunty 14 ay SECONDS 2 Seconds :It s defined as the numberof seconds el Since cient began an attempt to ecquee OF Fenew a FLAGS, 2 (CUENT IP ADDRESS 4 YOUR IP ADDRESS ‘ our fe IP adress that the server is Your TF Ae i cent doesnot know its address, SERVER IP ADDRESS ress of the Server that step inthe bootstrap be the server sending ROUTER IP ADDRESS ¢-—_—Router IP Address: This field containing the IP address bi ‘of a router. 1s filed by the Server in a reply message. | cumntHaRpware 16 Client Hardware Address: The hardware address of the “ADDRESS ‘Sent which is sed for identification and communist, SERVER HOSTNAME 64 Server Name : The server sending a! DHCPOFFER or BHCPACK message may optionally pa is rame in thi fel BOOT FILENAME 128—_=Boot Filename Optionally use bya client to request a paral ype of Boot EDHCPDISCOVER mestage. Used by a server in S DHCPOFFER 0 4 oct file diectory path ee a sie oe e ormions ‘Vaable Options: This Geld species to encode additional information. To distinguish among various messages that lent st cove series fru an adress o | 3 sever uses to acknowledge The field fs used on ina reply messoge ey KEEDES Transition States for DHCP * To prorde dynamic address allocation, the DHCP client ats as a state machine Performs transitions from one state to another depending on th Sat pen 1e messages it + The Fig 1.10.2 shows the transition diagram with main states TECHICAL PUBLICATIONS® an uptnuat fr knwiacgo computor Network and Secunty rea soplewen Layer DHGPOFFER Lease time 50 espe RuCRIOK, Lease canceted/ “5 [sears When the DHCP client frst boot, it enters in the INIT state (initializing state). It ‘has no IP and doesnot even know where a DHCP server may be on the network «+ S0, DHCP client broadcasts DHCPDISCOVER message on the physical subnet to fied DHCP servers This mestage isin the form of a UDP packet and usually at Teast contains the clients MAC adress inthe OPTIONS section 2, SELECTING Sta . sending the DHCPDISCOVER message, the client goes to the selecting state. collects DHCPOFFER responses from DHCP servers. The lease duration (The default is 1 hour) ete. Jhoose one of the offers and negotiate with the server for a lease. fends a DHCPREQUEST message to the selected server. + It then goes to the requesting state. G State: remains in the requesting state until it receives a DHCPACK message erver that creates the binding between the client physical address and TECHNICAL PUBLICATIONS® ~ an unr for hnowedse Timers [REBINDING Stato: ; cathe lent remains in the rebinding state until one of i client receives a DHCPNACK or the lease expires, it goes ba state and tres to get another IP address. If the client receives a DHCPACK, it goes to the bound state and resets the timer, Early Release If the client is no longer needed an IP address, then it sends a DHCPRELEASE message to the server. ‘The server accepts the request and assigns this IP address to another client waiting for the address. A DHCP client that has been assigned an address for a period of time may release the address before the expiration time. The client may send a DHCPRELEASE message to tell the server that the address is no longer needed. This helps the server to assign the address to another client waiting for it. ‘+ The three timers generally the client use. When the serve to the client and does not specify the time out values. TECHUCAL PUBLICATIONS® «an upstastfor nowedge EBM Tetner + Its primary goal is to allow a stand: © TELNET (Terming Network) is a general-purpose client/server application program. Client - server model can create a mechanism t session on the remote machine and then run its w known as remote login. Telnet is The purpose of the TELNET py ted communications facility. tocol is to provide a general, bi-directional, byte lard method of interfacing terminal devices and terminal-oriented processes to each other TELNET was the first TCP/IP application and stil is widely used as a terminal emulator, Many application protocols are built upon the TELNET protoccl. © Interacting with the user terminal on the local host © Exchanging messages with the TELNET server. For the connections, TELNET uses the TCP ps offered in the host machine's TCP port 23, The user the local telnet client. The TELNET |. The TELNET service is the terminal interacts with, client acts as a terminal accepting any keystrokes from the keyboard, interpreting them and displaying the output on the screen. The client on the computer makes the TCP connection to the host machine's with appl vt 23 where the TELNET server answers, The TELNET server interacts. tions in the host machine and assists in the terminal emulation. Telnet is designed to work on heterogeneous system ie. two hosts on different Platforms, the protocol assume that the two hosts run a Network Virtual Terminal (NVT). The TCP connection is set using two NVT terminals. The NVT is very simple character device with a keyboard and a printer, data typed by the user on == User teminat [—P] Fig. 1.11.1 TELNET protocol model TECHNICAL PUBLICATIONS® « an upinnust for knowiedge + The TELNET has a set of options and these options can simple protocol inside the TELNET. The following tbl options. SuNo Code 3 3 Suppress go ahead Suppress go-thead signals, ‘ 5 states Regunst the tat of TELNET. pes 6 + Timing mak Detine the ining mate | . Teil ype Set he trial ipe 7 7 2 mileage ee . ‘Option Negotiation : * To use any of the options mentioned in above ‘egotiation between the client and the server. The ‘egotation options, StNo. Sender Receiver Sender mans recive active # opin and eevee ope a Wont ey Sender wants rcever wo active «option, and eeever ‘+ Line Mode # In this mode, Line editing, Line erasing, character erasing is done by client EREEE TELNET Commands ‘commands containing two keystrokes and do not map to the 7-bit ASCIL in the NVI. This requires thatthe client has to translate the terminal’ les to the TELNET commands and transmit the commands to the Server host's operating system. ‘+ Some of the TELNET commands are presented in the following table ey Computer Network and Secuiy Table Comparison between FTP and FIP 1 FIP isa moway sytem ‘ed to copy or ove KEI short Answered Questions az HTTP headers are What are the four main properties of The four main properties of HTTP are iform resource identifier. 1, Open, Del ‘groups of HTTP headers ? Technica PusuicaTions® 49 0b nenigg = =e End of record [No operation Interpret as Command, 4413 TELNET TELNET TELNET is two-way system authorization it can be sed ‘moves files fom other computer Conan: Oper, Close, Dis ‘Status and Quit e General headers, Entity headers, Request arte 2 2. Request - response exchange 4 Resource metadata Default mode and data is delered from FIP to TCP as a 1, Stream mode rode : Data is delivered from FTP to TCP in terms of blocks. Each data block follows the three byte header. 3, Compressed mode : File is compressed before transmitting if size is big. Run length encoding method is used for compression jontion the application of FTP, login and data transfer. ss good security. 3, It-is often used to upload web pages and other documents from a private development machine to a public web - hosting server. What are the basic functions of e - mail 7 as fans. + Basic functions of - mail are : Composition, Transfer, Reporting, Displaying, Disposition. Why email security is necessary 7 1 process of using email encryption to send messages that a7 hout secure email ‘Ans. : Email security can only be opened by the intended recipient. Sending a me encryption is similar to dropping a anyone handling the postcard during both online data they aro prefixed by MIME headers. Why ? srowser what type of file is contained on the Web application or plug - in needs to be used to display ee TECHWIPAL PUBLICATIONS® - an uous fe" «0 vedo# Potato a Computer Network ana Secury a State the diference between SMTP and MIME: Denier heaton sereny hn Ans. _ = ERED Muttiplo Choice Questions [1 ATIP sunds tor “| St. No. ‘SMTP MIN ai HTTP stands for expands the mestagi a) Hyper Text Transfer 1. Safi protocol wed to xchange MIME pends he MOB a] Hyper Text Transfer Packet Host Text Transfer Protocol manages benceen mall seen: | Hyper Text Trans ees ic Parent Protocol d_ Hyper Text Transfer Protocol 2 sae the mos whey wed AE Seal fat be i a2 The DNS protocol runs over UDP and ene erat Jandied relay throughout the i ses port message transport process, [al 25 b 53 _ 80 10 What is ONS 7 ed gj 110 ‘Ans. : DNS is a clientserver application that identifies each host on the internet with 4 az Th {s the untversal language of the web unique user friendly name. (a) XML. Bl fava 11 What Is the Domain Name System responsible for 7 : Q.i1 What Is the Domain Name System respo (e) HTML fal ra 1 Domain Name System converts domain names (of the form IP numbers. 4 SMTP uses a TCP socket on port to transfer e-mail reliably | from ellet to server Domain Name System 7 - fans : IP numbers uniquely identify hosts on reever they are dificult to Bs bs We therefore need 2 more mi ay_of identifying hosts <) 80 d) uo Furthermore since multiple domains may be hosted by a single computer we need a way of mapping multiple domains to a single host. Finally, since domains may be 5 Basic functions of e-mail . hosted on a number of diferent machines over a period of tine we need a method for [a] composition ) transfer changing the IP number representing a host without having to change the information ry lal people use to access that host (that is the domain name remains constant but the IP [c) reporting ales se ears) umber may change). ee cee eee asm converts domain names into IP numbers. Ans. : DNS messages are : Queny and Response. The query message consists of the [a] world wide web ‘b HTTP header and the question records. The response message consists of a header, questior [¢} domain Name system a] email record, answer record, authoritative record and additional record, Ot : 34 What do you mean by TELNET 7 7 TELNET is a clant - server protocol, based on TCP and clients generally connect to port ‘on the host providing the service. Ana. : TELNET is a client/server application tht allows a user t lo machine giving the user access to the remote system. to log on to a remote [al 23 b 25 TELNET is used to connect remote computers and is fs 4 60 eri computes | | fr is responsible for continulng the resolution by Issuing ‘mechanlam {a called an uary. [a] recursive [8] teraive [| distributed {d! none J TECHNICAL PUBLICATIONS® - an up-Owu for knowedze TECHIICKL PUBLICATIONS? . 0 W000 be Sood Lin * Fig 211 shows difernce between wited LAN and wieless LAN, + Wired LAN : Networks wired network has no the nodes on a wired + Wireless LAN: Wire One wizeless netwo re invisible tothe wired netwo effect on the eae ‘works. The presence of one Tetwotk can hee all thee ess networks are cften 9 rk can atet the pero of another wired network. Al nodes. of tworks. Many ‘teless nodes on the tween stations can * flandwidth supported by wi pi (IEEE 802.11), wired LAN is 100 Mbps and wir FERED Vian vesign Goats Me LAN 84 wpe EAI Wireless LANs ‘computer Notwork and Sacunty oh “1 in nearby buildings, they can be wired or wireless LANS. A less link is used between two buildings. an antenna, eworking : ‘An Ad hoc network is peer-to-peer network set up: temporarily to meet some immediate need cost of moves, network 5. Network managers in dynamic environments minimize the cost extensions, and other changes by eliminating the cost of cabling and installation. ly with customers or suppliers in meeting e room to check if important emails have 2) Throughput 3) Connection to backbone LAN 4) Service area 5) Battery power consumption TECHNICAL PUBLICATIONS® - an uprus for krowledge Computer Network and Security — 6) Transmission robustness and security 7) License free operation 8) Hand off roaring 9) Dynamic configuration, ERE] WLAN Network Architecture © 8 WLANs of two pes 1 Indrastracture network 2 Ad-hoc LAN Architecture of an infrastructure network * Fig 21.2 shows architecture of an infrastructure network FIG 24.2 Architecture ofan intastuctar a ¥ Staton 0 Terminal with access mechanisms 4, ra radio cont access point, * witless medi iedium and ‘4 Portal is used to bridge to other wired networks, 4 — between wired LANs and 60211. It also can SEV 8 the gn Bian access tegration Point to ty © the Ds, TORI PLEA tat ga computer Network and Sacurty ‘must pass through a portal lone logical network based includes : Association, re-association, Primary invoked by every data me ESS, by IEEE 802.11 STAs. It is conceptually to or from an IEEE 802.11 STA operating in an + The implementation of the DS is not specified by 802.11. Therefore, a distribution system may be created from existing or new technologies oA Mo-point bridge connecting LANs in two separate buildings could become ice set : A set of one or more interconnected BSSs and integrated ) appear as a single BSS to the LLC layer at any station associated ese BSS RES Ice 802.11 Services + There are five services provided by IEEE 802.11 1. Association 2. Reassociation 3. Disassociation 4, Distribution 5, Integration, . service allows the station to switch its association from one access point to another. * Both association and reassociation are initiated by the station. TECHNICAL PUBLICATIONS® «an up-trust for knowedge computer Neto nt SOO) S piasositon + Dass gn be iniiatd by the recipient is associated wi ith 4 E she sender and receiver are in the same BSS, 4+ Integration is when the output AP is a portal. Thus, 802x LANs are integrated feto the S211 DS EXE] Acvartages and Disadvantages of Wireless LANS Aevamages 1. Very Sexile within the reception area networks without previous planning possible sdificulties (eg. historic buildings, firewalls) Disadvantages 1. Typically very low bandwidth compared to wired netw: 2 Many proprietary solutions, especially for higher tine (eg IEEE 61211) 3. Products have to follow many ‘ary long te to establish global solutions like, eg, IMT.-2006 Tetras raucanona® input and out AP's are the whether the data is going y Rational restrictions if working wireless, it takes a eerie 2 (EEA Comparison of IEEE 802.3 and IEEE 802,11 Computer Network and Secunty ae? Weoss Standards TEE 60211 (WLAN) EEE standard 902.1. fein mon eon ne ee ata Speer sont pa geen un | i= omens Wa rtp st aera 2s eaattoes Destination Address (DA), Transmitter ‘Address (TA) Receiver Address (RA). | | | CANS suffer less interference as electric WLANs suifer from interference of various signals travel using cables, 'ypes during travel from source to the destination. ‘The eficency is low. Addressing is complicated. | | Tehas a short range. | WLAN uses half duplex mechanism for | Data payload 1500 bytes ata payload 2-304 bytes EBA cee 202.11 EELS antenna, The atmosphere and outer space are the examples of unguided media that provide a means of transmitting electromagnetic signals but do not guide them, This form of transmission is usually referred to as wireless transmission For transmission, the antenna radiates electromagnetic energy into the media and for reception, the antenna picks up electromagnetic waves from the surrounding medium. TECHNICAL PUBLICATIONS® - an up-rust for knowledgo al is to install with a wired network (ethernet), a base Trecessary. Also, when all the terminals are a part of ation is not required. «IEEE 802-11 protocol supports both the types of configuration. EERE ieee 802.11x to a family of specifications developed by the IEEE for wireless LAN There are three specifications in the family : 802.11, 802.11a and *AI three of the specifications use Carrier Sense Multiple Access with tection (CSMA/CD) as the path sharing protocol. Specifications of ys is wireless LAN and provides 1 Mbps or 2 Mbps transmission in the It uses Frequency Hopping Spread Spectrum (FHSS) or Direct Sequence 4. 802. 2.4GHz Spread Spectrum (DSSS). = It provides upto 54 Mbps in the 5 GHz band. It uses orthogonal frequency lexing encoding scheme. It provides 11 Mbps transmission in the 2.4GHz also refers to Wi-Fi ‘uses only direct sequence spread spectrum. provides 20 Mbps and more in the 24 GHz band. {i based on a cellular architecture. The system is subdivided into cell. Each call is controlled by a base station. Cel is called as Bas tnd base station is Access Point (AP). Wireless LAN may be formed by a single fall, with a single access point. Fig. 221 shows the typical Fig. 221 on next page) : Set of BSS can be interconnected by a distribution system #0 . Service Set (ESS). BSS are like cells in a cellular we icon mn oe point. An ESS can also provide gateway access petwork such a8 the intemet. The standan emet. The standard also defines the concept of'a portal: TECHOUCAL PUBLICATIONS? - an up-trust for Fig. 22.4 802.11 LAN Portal is a-device that interconnects between an 802.11 and another S02LAN. IEEE {802.11 architecture consists of , 1. Distribution System (DS) 3, Basic Service Set (BSS) EBBI cee 802.11 Architecture 72. Access Point (AP) 4, Extended Service Set (ESS). distributed system. TECHNICAL PUBLICATIONS - an upenns for moece Computer Network and Securty 2110 Wires Standan, and mat ed an AP ia snd neon a out AP Ha Sn etre A Ad Re net rou a each other, Ad hoc network an BSS. A sin cof a group of stations within range of (0) BSS with AP Fig. 222 BSS Extended Service Set (ESS) Refer Fig. 22.3 on next page. +A set of BSS can be interconnected by a distribution system to form an extended service set. An ESS can also provide gateway access for wireless users into a wired network such as the Internet + ESS uses two types of stations : Mobile and normal stations inside a BSS. The stationary st of a wired LAN. Fig. 223 shows an ESS. The distribution system provides the distribution service, which is, The transfer of MAC Service Data Unit (SDU) between APs of BSS within the ESS. The transfer of MSDU between portals and BSS within the ESS, j The transport of MSDU between stations has a multicast or broadcast address distribution service, tary. The mobile stations are nS are AP stations that are part in the same BSS when either the MSDU or the sending station chooses to use the TECHNICAL PUBLICATIONS® «an ups or knowledge es | somputer Network ard Secunty & ann Wiens Standards comomernenrKerdSecwny atkins Stare server Fig, 223 E88 ‘The role of the distribution service is to make the ESS appear as a single BSS to the LLC that operate above the medium access control in any ofthe stations in the ESS, TEE 802.11 defines the distribution service but not the distribution system. The distribution system can be implemented by using wired or wireless networks. of stations TEE 802.11 defines three types of stations based on their mabilty in a wireless LAN. L.Notransition 2. BSStransition 3, ESS-transition. AA station with po-transition mobility is either stationary or moving only inside & BSS, “TECHNICAL PUBLICATIONS® - an uputmst fer trowiedse 2p Computer Network and Securty 2-12 Wiaioss Stony 4s A station with BSS-transition mobility can move from one BSS to another, but the ‘movement is confined inside one ESS. ‘A station with ESS-transition mobility can move from one ESS to another. The IEEE 802.11 does not guarantee the communication is continuous during the move EEE] mac sublayer + MAC sublayer is responsible for the channel (PDU) addressing, frame formatting, 0 reassembly of MSDUs. + MAC layer also provides options to spport security service through authentication mechanisms, MAC management service are also defined t0 support ‘an ESS and to assist stations in power management. fines two MAC sublayers ‘o-ordination Function (OCF) 1s procedures, Protocol Data Unit ynecking and fragmentation and 2 Point Co-ordination Function (PCF). «The DCF provides support for asynchronous data tranfer of MSDU on best effort asis. Under this function, the transmission medium operates in the contention trode exclusively, requiring all stations to contend for the channel for each packet transmitted, PCF may be implemented by an AP, to support connection-ori transfer of MSDU. jented time-bounded Fig. 224 shows th€ MAC layers in TEEE 602.11 standard. TEBE ODA (Lc wslayer) J conan ee ps “ Contention ayer ea. sss. jawork and Secunty computer zene Wires Standarss Co-ordination Function (OCF) ethos 'd used to support asynchronous data transfer # stad onthe Carer See Mal ite ole Aces wih olson Ax (CSMA/CA) proce. Carer senting lve memionsg he ane ‘determine whether the medium is idle or busy. % ne + Wireless LAN cannot implement CSMA/CD for three reasons 1. For collision detection a station must be able to send signals at the same time, dass and eeceie colision 2, Collision may not be detected because of the hidden station problem. 43, The distance between station can be great signal fading could prevent a station at one end from hearing a collision atthe other end. ‘The DCF interframe space is used by the DCF to transmit data and management MDPUs, Fig. 2.25 shows the exchange of data and control frames in time Tine te Fig. 22.5 CSMA/CA and NAV TECHNICAL PUBLICATIONS® - an uptust for krowlodzo TECHIGAL PUBLICATIONS® ~ an wort or noes Wireless computer Nework ard Sou",