Some of application layer
protocols and their functions
32 Compiled by Asado Sh 12/14/2024
Application layer protocol- Simple Mail
Transfer Protocol (SMTP)
Governs the transmission of mail messages and attachments
SMTP is used in the case of outgoing messages
More powerful protocols such as POP3 and IMAP4 are needed and
available to manage incoming messages
POP3(Post Office Protocol version 3) is the older protocol
IMAP4(Internet Mail Access Protocol version 4) is the more
advanced protocol
33 Compiled by Asado Sh 12/14/2024
Application layer protocol- Telnet
Telnet is a protocol used to log on to remote hosts using the
TCP/IP protocol suite.
Using Telnet, a TCP connection is established and keystrokes on
the user’s machine act like keystrokes on the remotely connected
machine.
Often, Telnet is used to connect two dissimilar systems (such as
PCs and UNIX machines).
Through Telnet, you can control a remote host over LANs and
WANs such as the Internet.
For example, network managers can use Telnet to log on to a
router from a computer elsewhere on their LAN and modify the
router’s configuration.
34 Compiled by Asado Sh 12/14/2024
Application layer protocol- File Transfer
Protocol (FTP)
File Transfer Protocol (FTP) lets us transfer files, and it can
accomplish this between any two machines using it.
But accessing a host through FTP is only the first step.
Users must then be subjected to an authentication login that’s
usually secured with passwords and usernames
implemented by system administrators to restrict access.
FTP’s functions are limited to listing and manipulating
directories, typing file contents, and copying files
between hosts.
35 Compiled by Asado Sh 12/14/2024
36 Compiled by Asado Sh 12/14/2024
37 Compiled by Asado Sh 12/14/2024
Trivial File Transfer Protocol (TFTP)
Trivial File Transfer Protocol (TFTP) is stock version of FTP, but
it’s the protocol of choice if you know exactly what you want and
where to find it because it’s fast and so easy to use!
But TFTP doesn’t offer the abundance of functions that FTP does
because it has no directory-browsing abilities, meaning that
it can only send and receive files
There’s no authentication as with FTP, so it’s even more
insecure, and few sites support it because of the inherent security
risks.
A significant difference between FTP and TFTP is that TFTP relies
on UDP at the Transport layer, but FTP uses TCP protocol.
38 Compiled by Asado Sh 12/14/2024
Simple Network Management Protocol
(SNMP)
Simple Network Management Protocol (SNMP) collects and
manipulates valuable network information.
It gathers data from a network management station (NMS) at fixed
or random intervals, requiring them to disclose certain
information, or even asking for certain information from the
device.
In addition, network devices can inform the NMS about
problems as they occur so the network administrator is
alerted.
39 Compiled by Asado Sh 12/14/2024
SNMP
40 Compiled by Asado Sh 12/14/2024
Hypertext Transfer Protocol (HTTP)
It’s used to manage communications between web browsers
and web servers and opens the right resource when you
click a link, wherever that resource may actually reside.
In order for a browser to display a web page, it must find the
exact server that has the right web page, plus the exact details
that identify the information requested.
The browser can understand what you need when you enter a
Uniform Resource Locator (URL), which we usually refer to as a
web address, e.g. http://www.lammle.com/forum and
http://www.lammle.com/blog.
Each URL defines the protocol used to transfer data, the name of
the server, and the particular web page on that server.
41 Compiled by Asado Sh 12/14/2024
42 Compiled by Asado Sh 12/14/2024
Hypertext Transfer Protocol Secure
(HTTPS)
Hypertext Transfer Protocol Secure (HTTPS) is also known as
Secure Hypertext Transfer Protocol.
It uses Secure Sockets Layer (SSL).
Sometimes you’ll see it referred to as SHTTP or S-HTTP, which
were slightly different protocols, but since Microsoft supported
HTTPS, it became the de facto standard for securing web
communication.
But no matter-as indicated, it’s a secure version of HTTP that arms
you with a whole bunch of security tools for keeping
transactions between a web browser and a server secure.
43 Compiled by Asado Sh 12/14/2024
Domain Name Service (DNS)
The Domain Name System (DNS) is a directory lookup service
that provides a mapping between the name of a host on the
Internet and its numerical address.
Domain Name Service (DNS)-resolves hostnames- to IP addresses
specifically, Internet names, such as www.hu.edu.et
But you don’t have to actually use DNS. You just type in the IP
address of any device you want to communicate with and find the
IP address of a URL by using the Ping program.
For example, >ping www.cisco.com will return the IP address
resolved by DNS.
44 Compiled by Asado Sh 12/14/2024
Domain Name System (DNS)
Resolves domain names to IP addresses and vice versa
•An IP address identifies hosts on a network and the Internet as
well, but DNS was designed to make our lives easier.
•The IP address would change and no one would know
what the new one was.
•DNS allows you to use a domain name to specify an IP
address.
www.hu.edu.et DNS Server 10.1.0.15
45 Compiled by Asado Sh 12/14/2024
Domain Name
A domain name is represented by a series of character
strings, called labels, separated by dots.
Each label represents a level in the domain naming
hierarchy.
E.g In the domain name www.google.com, com is the
top-level domain (TLD), google is the second-level
domain, and www is the third-level domain.
Each second-level domain can contain multiple third level
domains.
E.g In addition to www.google.com, Google also owns
the following domains: news.google.com,
46 maps.google.com,
Compiled by Asado Sh and mail.google.com. 12/14/2024
DNS cont’d…
The very last section of the domain is called its top-level
domain (TLD) name
15-47 Compiled by Asado Sh 12/14/2024
Top-level domains, including some relatively new ones
48 Compiled by Asado Sh 12/14/2024
Dynamic Host Configuration Protocol
(DHCP)
Dynamic Host Configuration Protocol (DHCP) assigns IP
addresses to hosts dynamically.
It allows for easier administration and works well in small to very
large network environments.
Many types of hardware can be used as a DHCP server, including a
Cisco router.
A DHCP address conflict occurs when two hosts use the
same IP address.This sounds bad, and it is!
49 Compiled by Asado Sh 12/14/2024
A lot of information a DHCP server can provide to a host when
the host is requesting an IP address from the DHCP server.
Here’s a list of the most common types of information a DHCP
server can provide:
IP address
Subnet mask
Domain name
Default gateway (routers)
DNS server address
50 Compiled by Asado Sh 12/14/2024
This is the four-step process a client takes to receive an IP address
from a DHCP server:
1. The DHCP client broadcasts a DHCP Discover
message looking for a DHCP server (Port 67).
2. The DHCP server that received the DHCP Discover message
sends a layer 2 unicast DHCP Offer message back to the host.
3. The client then broadcasts to the server a DHCP Request
message asking for the offered IP address and possibly other
information.
4. The server finalizes the exchange with a unicast DHCP
Acknowledgment message.
Etc….
51 Compiled by Asado Sh 12/14/2024
Some of Transport layer
protocols and their functions
52 Compiled by Asado Sh 12/14/2024
TCP(Transmission Control Protocol)
TCP: takes large blocks of information from an application and
breaks them into segments.
It numbers and sequences each segment to keep the order
the application intended.
After these segments are sent on the transmitting host, TCP
waits for an acknowledgment of the receiving end’s.
Retransmitting any segments that aren’t acknowledged.
It is Connection oriented means that a virtual connection is
established before any user data is transferred.
53 Compiled by Asado Sh 12/14/2024
TCP cont’d..
TCP can also recognize duplicate messages and will
discard them appropriately.
If the sending computer is transmitting too fast for the
receiving computer, TCP can employ flow control
mechanisms to slow data transfer.
TCP can also communicates delivery information to the upper-
layer protocols and applications it supports.
All these characteristics makes TCP an end-to-end reliable
transport protocol.
54 Compiled by Asado Sh 12/14/2024
TCP SEGMENT FORMAT
15-55 Compiled by Asado Sh 12/14/2024
Some of fields in TCP segment
Source port : This is the port number of the application on the
host sending the data.
Destination port: This is the port number of the application
requested on the destination host.
Sequence number: A number used by TCP that puts the data
back in the correct order or retransmits missing or
damaged data during a process called sequencing.
Acknowledgment number: The value is the TCP octet that is
expected next.
56 Compiled by Asado Sh 12/14/2024
Cont’d…
Header length: The number of 32-bit words in the TCP header,
which indicates where the data begins.
Reserved: for future use, Always set to zero.
Code bits/flags: Controls functions used to set up and terminate a
session.
-it used to determine segment purpose, e.g. SYN, ACK
Window: is window size the sender willing to accept, in octets.
Checksum: The cyclic redundancy check (CRC), used because TCP
doesn’t trust the lower layers and checks everything.
The CRC checks the header and data fields
-TCP keeps check that if bytes are damaged, through checksum.
Etc….
57 Compiled by Asado Sh 12/14/2024
User Datagram Protocol (UDP)
User Datagram Protocol (UDP) is basically the scaled-down
economy model of TCP, which is why UDP is sometimes referred to
as a thin protocol.
Like a thin person , a thin protocol doesn’t take up a lot of room—
or in this case, require much bandwidth on a network.
UDP does not sequence the segments and does not care
about the order in which the segments arrive at the destination.
UDP just sends the segments off and forgets about them.
58 Compiled by Asado Sh 12/14/2024
UDP cont’d…
It doesn’t follow segments, check up on them, or even allow
for an acknowledgment of safe arrival. Because of this, it’s referred
to as an unreliable protocol.
This does not mean that UDP is ineffective, only that it
doesn’t deal with reliability issues at all.
Furthermore, UDP doesn’t create a virtual circuit or
doesn’t contact the destination before delivering information to
it.
- Because of this, it’s also considered a connectionless protocol.
59 Compiled by Asado Sh 12/14/2024
UDP cont’d…
NOTE:
Since UDP assumes that the application will use its own
reliability method, it doesn’t use any itself.
This presents an application developer with a choice when
running the Internet Protocol stack: TCP for reliability or
UDP for faster transfers.
TCP sequences the segments so they get put back together in
exactly the right order, which is something UDP just can’t
do.
60 Compiled by Asado Sh 12/14/2024
UDP in short
Minimum overhead.
Used to send short messages.
Not reliable as TCP (out of order, missing datagram, duplicate
datagram).
Lack of flow control and error control
Faster and efficient
Communication takes place using ports.
Header contains following information:
Source port number (16 bits)
Destination port number (16 bits)
Total length(16 bits)
checksum(16 bits)
61 Compiled by Asado Sh 12/14/2024
62 Compiled by Asado Sh 12/14/2024
63 Compiled by Asado Sh 12/14/2024
Some of Internet or Network layer
protocols and their functions
64 Compiled by Asado Sh 12/14/2024
Internet Protocol (IP) (Layer 3 protocol)
Used for data communication in packet switched network
Unreliable and connectionless (no specific path)
Unreliable
Data corruption
Packet lost
Out of order
Packet called Datagram
Internetworking computers
Internet Protocol versions: IPv4, IPv6
65 Compiled by Asado Sh 12/14/2024
IP
66 Compiled by Asado Sh 12/14/2024
Cont’d…
Source & destination IP address (32 bits each): contain IP
address of sender and intended recipient.
Options (variable length): Mainly used to record a route, or
timestamps, or specify routing.
Identification: copied into fragment, allows destination to
know which fragments belong to which datagram
Fragment Offset (12 bits): specifies the offset in the original
datagram of the data being carried in the fragment
Measured in units of 8 bytes starting at 0
Flags (3 bits): control fragmentation
67 Compiled by Asado Sh 12/14/2024
ICMP (Internet Control Message Protocol)(Layer 3)
Used to report errors with delivery of IP data.
E.g. if particular service or host not reachable or to check
routers are correctly routing .
Ping tool uses ICMP to check host is reachable and how long it
takes to reach.
ICMP message is delivered in IP packet.
Error reporting not error correction.
Two types of messages
Error reporting message
Problems with router or host e.g. destination unreachable, time exceeded,
parameters problem
Query message
68 Compiled by Asado Sh 12/14/2024
Help in getting specific information. e.g. neighbors
ICMP Errors
Network Errors:
Host or network unreachable
Network congestion message:
When router buffers too many packets, and don’t process
with same speed as received, generates source quench
message.Too many messages results congestion.
Time exceed
ICMP timeout message is generated when host is
unreachable.
69 Compiled by Asado Sh 12/14/2024
IGMP Layer 3
Internet Group Management Protocol
IGMP-is used to facilitate the simultaneous
transmission of a message to a group of recipients.
Protocol that manages group membership.
Provides information to multicast routers about the
membership status of hosts.
Routers use IGMP to determine which hosts belong to a
multicast group
Hosts use IGMP to join or leave a multicast group.
70 Compiled by Asado Sh 12/14/2024