0% found this document useful (0 votes)
14 views15 pages

Unit 5 DCCN

Uploaded by

pratheepku32
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views15 pages

Unit 5 DCCN

Uploaded by

pratheepku32
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

UNIT-V

NETWORK APPLICATIONS:
A network is a collection or set of computing devices connected to one another to establish
communication and also share available resources. A network will comprise of software and hardware
devices. You can have a network even if you are not connected to the internet. Computer networks make
it possible for people to transfer files from one place to another and to communicate taking the shortest
time possible.

Computer network applications are network software applications that utilize the Internet or other
network hardware infrastructure to perform useful functions for example file transfers within a network.
They help us to transfer data from one point to another within the network.

CLIENT-SERVER MODEL

The client–server model is a distributed application structure that partitions tasks or workloads between
the providers of a resource or service, called servers, and service requesters, called clients. Often clients
and servers communicate over a computer network on separate hardware, but both client and server may
reside in the same system. A server host runs one or more server programs which share their resources
with clients. A client does not share any of its resources, but requests a server's content or service
function. Clients therefore initiate communication sessions with servers which await incoming requests.
Examples of computer applications that use the client–server model are Email, network printing, and
the World Wide Web.

CLIENT AND SERVER ROLE

The client-server characteristic describes the relationship of cooperating programs in an application. The
server component provides a function or service to one or many clients, which initiate requests for such
services. Servers are classified by the services they provide. For example, a web server serves web
pages and a file server serves computer files. A shared resource may be any of the server computer's
software and electronic components, from programs and data to processors and storage devices. The
sharing of resources of a server constitutes a service.

 The client-server model is a distributed communication framework of network processes among


service requestors, clients and service providers. The client-server connection is established through a
network or the Internet.

The client-server model is a core network computing concept also building functionality for email
exchange and Web/database access. Web technologies and protocols built around the client-server
model are:
 Hypertext Transfer Protocol (HTTP)
 Domain Name System (DNS)
 Simple Mail Transfer Protocol (SMTP)
 Telnet
Clients include Web browsers, chat applications, and email software, among others. Servers include
Web, database, application, chat and email, etc.,

DOMAIN NAME SYSTEM (DNS)


1. DNS is defined as Domain Name System.
2. In Computer domain name Mary Matha College specified as www.marymathacmi.com
3. The segment marymatha gives the name of the college
4. The top level domains are proposed.

Domain Name Assigned to


.com Commercial Organization
.edu Educational Institution
.gov Government Organization
.mil Military Group
.net Major Network Support Centre
.org Organization other than those above
.int International Organization

5. Most corporations choose to register under the .com domain.


6. Different domain used for same organization. Example: vsnl.edu or vsnl.org
7. Country Domain uses two character country abbreviations for example we use .in for India.
8. Country Domain uses for United Kingdom and United States as .uk and .us.

TELNET
1. TELNET is abbreviation for TErminaL NETwork.
2. IT would be impossible to write a specific client server program for each demand other than
TELNET.
3. For better solution is a general purpose client server program.
4. That lets a user access any application program on a remote computer possible in TELNET.
4. After logging user can use the services available on the remote computer.
5. Transfer the results back to the local computer.
6. TELNET enables establishment of a connection to a remote system.
7. When user logs into local time sharing system is called local login.
8. Mechanism is simple because operating system may assign special meaning to special character.
9. Character cannot be passed directly to operating system because the remote system is not designed to
receive characters from a terminal driver.
9. For this solution to add software called a pseudo terminal driver.
FILE TRANSFER AND REMOTE FILE ACCESS
1. Remote access is the ability to get access to a computer or a network from a remote distance.
2. In corporations, people at branch offices, telecommuters, and people who are travelling may
need access to the corporation's network.
3. Steps required to transfer a file for one application another.
4. They are similar to the steps required to transfer a file for another.
5. Programmer duplicating code for this process.
6. Making only minor modifications in the file names.
7. Problem occurs when arbitrary data from a file on one computer to file on another computer.
8. For that file transfer software is used.
9. File transfer software is general and flexible.
10. It allows transfer of arbitrary files.
11. File name is valid in one computer but invalid in another computer.
12. For that file transfer software is used create file representation, type information and file protection
mechanism.
13. FTP is derived as File Transfer Protocol deployed internet file transfer services.
14. FTP permits transfer of an arbitrary file.
15. And FTP includes a mechanism that allows files to have ownership and access restriction.
16. FTP hides the details of individual computer system.
17. The client and the server use the FTP protocol when they communicate directly to the server.
18. Internet protocols include a second file transfer server known as Trivial File Transfer
Protocol (TFTP)
19. TFTP client and server use User Datagram Protocol (UDP).

ELECTRONIC MAIL
1. E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication.
2. E-mail messages are usually encoded in ASCII text.
3. However, send non-text files, such as graphic images and sound files, as attachments sent
in binary streams.
4. E-mail can also be exchanged between online service provider users and in networks other than the
Internet, both public and private.

II-ELECTRONIC MAILBOXES AND ADDRESS

1. Mailbox consists of a passive storage area.


2. E-mail is private. The permissions are set to allow the mail software to add an incoming message to
the mailbox.
3. Deny anyone except the owner the right to examine or remove message.
4. Electronic mailbox is assigned a unique electronic mail address.

5. E-Mail address contains two parts. First specifies mailbox on the computer. Second specifies a
computer.
6. E-MAIL software on sender’s computer uses the second part to determine which computer to contact.

III-MAIL TRANSFER

1. After composes E-mail message and specifies recipients.


2. E-mail software transfers a copy of the message to each recipient.
3. Two separate pieces of software are required.
4. User interacts with an e-mail interface program when composing or reading messages.
5. This underlying e-mail system contains a mail transfer.

IV-HOW DOES E-MAIL WORK?

1. The sender composes a message using the email client on their computer.
2. When the user sends the message, the email text and attachments are uploaded to the SMTP
(Simple Mail Transfer Protocol) server as outgoing mail.
3. All outgoing messages wait in the outgoing mail queue while the SMTP server communicates
with the DNS (Domain Name Server–like a phone book for domain names and server IP
addresses) to find out where the recipient’s email server is located. If the SMTP server finds the
recipient’s email server, it will transfer the message and attachments. If the recipient’s server
can’t be found, the sender will get a “Mail Failure” notification in their inbox.
4. The next time the recipient clicks “Send & Receive,” their email client will download all new
messages from their own email server. We got mail. That it works.

V-INTERNET MAIL PROTOCOL

1.E-mail Protocols are set of rules that help the client to properly transmit the information to or from the
mail server.
2.Various protocols such as SMTP, POP, and IMAP.
SMPTP

SMTP stands for Simple Mail Transfer Protocol. It was first proposed in 1982. It is a standard
protocol used for sending e-mail efficiently and reliably over the internet.
Key Points:
 SMTP is application level protocol.
 SMTP is connection oriented protocol.
 SMTP is text based protocol.
 It handles exchange of messages between e-mail servers over TCP/IP network.
 Apart from transferring e-mail, SMPT also provides notification regarding incoming mail.
 When you send e-mail, your e-mail client sends it to your e-mail server which further contacts
the recipient mail server using SMTP client.
 These SMTP commands specify the sender’s and receiver’s e-mail address, along with the
message to be send.
 The exchange of commands between servers is carried out without intervention of any user.
 In case, message cannot be delivered, an error report is sent to the sender which makes SMTP a
reliable protocol.

IMAP

IMAP stands for Internet Mail Access Protocol. It was first proposed in 1986. There exist five
versions of IMAP as follows:
1. Original IMAP
2. IMAP2
3. IMAP3
4. IMAP2bis
5. IMAP4
Key Points:
 IMAP allows the client program to manipulate the e-mail message on the server without
downloading them on the local computer.
 The e-mail is hold and maintained by the remote server.
 It enables us to take any action such as downloading, delete the mail without reading the mail.It
enables us to create, manipulate and delete remote message folders called mail boxes.
 IMAP enables the users to search the e-mails.
 It allows concurrent access to multiple mailboxes on multiple mail servers.

POP

POP stands for Post Office Protocol. It is generally used to support a single client. There are several
versions of POP but the POP 3 is the current standard.
Key Points
 POP is an application layer internet standard protocol.
 Since POP supports offline access to the messages, thus requires less internet usage time.
 POP does not allow search facility.
 In order to access the messaged, it is necessary to download them.
 It allows only one mailbox to be created on server.
 It is not suitable for accessing non mail data.
 POP commands are generally abbreviated into codes of three or four letters. Eg. STAT.

1. After composes E-mail message and specifies recipients.


2. E-mail software transfers a copy of the message to each recipient.
3. Two separate pieces of software are required.
4. User interacts with an e-mail interface program when composing or reading messages.
5. This underlying e-mail system contains a mail transfer.

WORLD WIDE WEB (WWW)


1. World Wide Web (WWW), also called the Web, is an information space where documents.
2. Other web resources are identified by Uniform Resource Locators(URLs).
3. Interlinked by hypertext links, and accessible via the Internet.
4. English scientist Tim Berners-Lee and Belgian informatics engineer Robert Cailliau invented the
World Wide Web in 1989.
5. They wrote the first web browser in 1990 while employed at CERN in Switzerland.
6. The World Wide Web is what most people think of as the Internet.
7. It is all the Web pages, pictures, videos and other online content that can be accessed via a Web
browser.
8. The Internet, in contrast, is the underlying network connection that allows us to send email and
access the World Wide Web.
9. The World Wide Web (WWW) is a network of online content that is formatted in HTML and
accessed via HTTP.
10. The term refers to all the interlinked HTML pages that can be accessed over the Internet.

ADVANTAGES OF INTERNET

Costs are very important advantage of emails. Sending an email is much cheaper then phoning, or
sending normal letters. Beside a lot of advantages, Internet has some disadvantages too. First of
disadvantages is that people who spend too much time sitting in the front of computer can easily gets ill.
There are dozens of online services that allow you to work with other people and, with the ability to
have instant communication, it can even make producing new products and services faster.
An Internet connection provides many people with the ability to work from home or have a virtual
office.

Do use the internet and find a solution to every problem. The Internet has also made access to
information and communication far easier. Rather than searching the library, users can access vast
amounts of information from home computers. Politics and government are another area in which
the Internet is important.

DISADVANTAGES OF INTERNET

1. Bullying, trolls, stalkers, and crime.


2. Exploitation and pornography and violent images.
3. Addiction, time waster, and causes distractions.
4. Never being able to disconnect.
5. Identity theft, hacking, viruses, and cheating.
6. Spam and advertising.
7. Affects focus and patience.
8. Depression, loneliness, and social isolation.

HYPERTEXT AND HYPERMEDIA

Hypertext is text displayed on a computer display or other electronic devices with references
(hyperlinks) to other text that the reader can immediately access, or where text can be revealed
progressively at multiple levels of detail (also called Stretch Text).

Hypertext documents are interconnected by hyperlinks, which are typically activated by a mouse click,
keypress set or by touching the screen. Apart from text, the term "hypertext" is also sometimes used to
describe tables, images, and other presentational content formats with integrated hyperlinks.

Hypertext is one of the key underlying concepts of the World Wide Web, where Web pages are often
written in the Hypertext Markup Language (HTML). As implemented on the Web, hypertext enables the
easy-to-use publication of information over the Internet.

Hypermedia, an extension of the term hypertext, is a nonlinear medium of information that includes
graphics, audio, video, plain text and hyperlinks. This designation contrasts with the broader
term multimedia, which may include non-interactive linear presentations as well as hypermedia. It is
also related to the field of electronic literature.

The WWW (World Wide Web) is a classic example of hypermedia, whereas a non-
interactive cinema presentation is an example of standard multimedia due to the absence of hyperlinks.
Most modern hypermedia is delivered via electronic pages from a variety of systems including media
players, web browsers, and stand-alone applications (i.e., software that does not require network access).
Audio hypermedia is emerging with voice command devices and voice browsing.

HYPER TEXT TRANSFER PROTOCOL (HTTP)


HTTP means Hyper Text Transfer Protocol. HTTP is the underlying protocol used by the World Wide
Web and this protocol defines how messages are formatted and transmitted, and what actions Web
servers and browsers should take in response to various commands.

The HTTP service is the component of the Application Server that provides facilities for deploying web
applications and for making deployed web applications accessible by HTTP clients.

HTTP or Hypertext Transfer Protocol is the main protocol of the World Wide Web. When you request a
web page by typing its address into your web browser, that request is sent using HTTP. The browser is
an HTTP client, and the web page server is an HTTP server.

UNIVERSAL RESOURCE LOCATOR

Uniform Resource Locator (URL), colloquially termed a web address, is a reference to a web
resource that specifies its location on a computer network and a mechanism for retrieving it.
A URL is a specific type of Uniform Resource Identifier (URI), although many people use the two terms
interchangeably.
URLs occur most commonly to reference web pages (http), but are also used for file transfer (ftp), email
(mailto), database access, and many other applications.
Most web browsers display the URL of a web page above the page in an address bar. A typical URL
could have the form http://www.example.com/index.html , which indicates a protocol ( http ),
a hostname ( www.example.com ), and a file name ( index.html )

HOW DOES WWW WORK :

The World Wide Web is based on several different technologies that make it possible for users to locate
and share information through the Internet. These include Web browsers, Hypertext Markup Language
(HTML) and Hypertext Transfer Protocol (HTTP).
Many hostnames used for the World Wide Web begin with www because of the long-standing practice
of naming Internet hosts according to the services they provide. The hostname of a web server is often
www, in the same way that it may be ftp for an FTP server, and news or nntp for a USENET news
server.

World-Wide Web (also called WWW or W3) is a hypertext-based information system. World-Wide
Web uses hypertext over the Internet: the linked documents may be located at different Internet sites.
WWW can handle different text formats and different methods of organizing information.

NETWORK MANAGEMENT
Network management is the process of administering and managing computer networks. Services
provided by this discipline include fault analysis, performance management, provisioning of networks
and maintaining the quality of service. Software that enables network administrators to perform their
functions is called network management software.

GOAL OF NETWORK MANAGEMENT


The goal of performance management is to measure and make available various aspects of network
performance so that internetwork performance can be maintained at an acceptable level. Examples of
performance variables that might be provided include network throughput, user response times, and line
utilization

PERFORMANCE MANAGEMENT

The goal of performance management is to measure and make available various aspects of network
performance so that internetwork performance can be maintained at an acceptable level. Examples of
performance variables that might be provided include network throughput, user response times, and line
utilization.

Performance management involves three main steps. First, performance data is gathered on variables of
interest to network administrators. Second, the data is analyzed to determine normal (baseline) levels.
Finally, appropriate performance thresholds are determined for each important variable so that
exceeding these thresholds indicates a network problem worthy of attention.

Management entities continually monitor performance variables. When a performance threshold is


exceeded, an alert is generated and sent to the network management system.

CONFIGURATION MANAGEMENT

The goal of configuration management is to monitor network and system configuration information so
that the effects on network operation of various versions of hardware and software elements can be
tracked and managed.
ACCOUNTING MANAGEMENT

The goal of accounting management is to measure network utilization parameters so that individual or
group uses on the network can be regulated appropriately. Such regulation minimizes network problems
(because network resources can be apportioned based on resource capacities) and maximizes the fairness
of network access across all users.

As with performance management, the first step toward appropriate accounting management is to
measure utilization of all important network resources. Analysis of the results provides insight into
current usage patterns, and usage quotas can be set at this point. Some correction, of course, will be
required to reach optimal access practices. From this point, ongoing measurement of resource use can
yield billing information as well as information used to assess continued fair and optimal resource
utilization.

FAULT MANAGEMENT
The goal of fault management is to detect, log, notify users of, and (to the extent possible) automatically
fix network problems to keep the network running effectively. Because faults can cause downtime or
unacceptable network degradation, fault management is perhaps the most widely implemented of the
ISO network management elements.

Fault management involves first determining symptoms and isolating the problem. Then the problem is
fixed and the solution is tested on all-important subsystems. Finally, the detection and resolution of the
problem is recorded.

SECURITY MANAGEMENT
The goal of security management is to control access to network resources according to local guidelines
so that the network cannot be sabotaged (intentionally or unintentionally) and sensitive information
cannot be accessed by those without appropriate authorization. A security management subsystem, for
example, can monitor users logging on to a network resource and can refuse access to those who enter
inappropriate access codes.

Security management subsystems work by partitioning network resources into authorized and
unauthorized areas. For some users, access to any network resource is inappropriate, mostly because
such users are usually company outsiders. For other (internal) network users, access to information
originating from a particular department is inappropriate. Access to Human Resource files, for example,
is inappropriate for most users outside the Human Resources department.

NETWORK MANAGEMENT STANDARDS


List of five standards and their salient points.

STANDARD SALIENT POINTS

OSI/CMIP International standard (ISO/OSI).


Management of data communication networks LAN and WAN.
Deals with all server layers.
Most complete.
Object-oriented.
Well structured and layered.
Consumes large resource in implementation.

SNMP/Internet Industry standard.


Originally intended for management of Internet components, currently.
Adopted for WAN and telecommunication systems.
Easy to implement.
Most widely implemented.

TMN International standard.


Management of telecommunication network.
Based on OSI network management framework.
Addresses both network and administrative aspects of management

IEEE IEEE standards, adopted internationally.


Addresses management of LAN and MAN.
Adopts OSI standards significantly.
Deals with first two layers of the OSI reference model.

Web based Web Based Enterprise Management (WBEM).


Management Java Management Extension(JMX).

(CMIP-COMMON MANAGEMENT INFORMATION PROTOCOL)


(ISO- INTERNATIONAL ORGANIZATION FOR STANDARDIZATION)
(OSI- OPEN SYSTEM INTERCONNECTION)
(SNMP-SIMPLE NETWORK MANAGEMENT PROTOCOL)
(TMN-TELECOMMUNICATIONS MANAGEMENT NETWORK)
(IEEE-INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS)

NETWORK MANAGEMENT MODEL

1. There are four models in network management.


2. They are : 1. Organization model
2. Information model
3. Communication model
4. Function model
3. The organization model is defined in OSI system management overview.
4. In this organization model has network objects consist of host, bridges, routers etc.,
5. There is a database in the model as manager.
6. The manager receives management data and processes it and stores it database.
7. Management Information is structured while Management Information Base(MIB) deals with the
relationship and storage of management information.
8. Communication model has three layer:
1. Application layer
2. Layer management between layer
3. Layer operations within the layer.
9. Function model deals with user oriented requirement of network management.
10. Function model has application areas namely:
1. Configuration
2. Fault
3. Performance
4. Security
5. Accounting

INFRASTRUCTURE FOR NETWORK MANAGEMENT


Infrastructure for Network management includes the deployment, integration and coordination of the
hardware, software and human elements to monitor test, configure, analyze, evaluate and control.

Principal components of network architecture are:

1. Managing entity
2. Managing devices
3. Network Management Protocol

The functions of network management are:

1. Staffing
2. Organizing
3. Planning
4. Directing
5. Controlling

Principal components of network architecture also include the following are:

1. Modems
2. Communication links
3. Routers
4. Multiplexers.
5. Communication software

Infrastructures of Network Management are:

1. Routine operation procedure.


2. Problem escalation procedure.
3. Contact person at each location of the network.
4. Vendor manuals for all hardware and software.
5. Vendor contact names.
6. Listing of all software’s.
7. Disaster recovery plan.
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

1. Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and
monitor network devices and their functions.
2. SNMP provides a common language for network devices to relay management information.
3. Within single- and multivendor environments in a LAN or wide area network WAN.
4. The most recent iteration of SNMP, version 3, includes security enhancements that authenticate.
5. Encrypt SNMP messages as well as protect packets during transit.
6. SNMP is supported on an extensive range of hardware.
7. Conventional network equipment like routers, switches and wireless access points to endpoints like
printers, scanners and internet of things devices.
8. SNMP can be used to monitor services such as Dynamic Host Configuration Protocol (DHCP).
9. Software agents on these devices and services communicate with a network management system
(NMS), also referred to as an SNMP manager.
10. SNMP can be used in a network of any size, its greatest value is evident in large networks.
11. Manually and individually logging into hundreds or thousands of nodes.
12. Would be extremely time-consuming and resource-intensive.

I-COMPONENTS OF SNMP

There are four main components in an SNMP-managed network:

1. SNMP agent: This program runs on the hardware or service being monitored, collecting data
about various metrics like bandwidth use or disk space. When queried by the SNMP manager, the agent
sends this information back to the management system. An agent may also proactively notify the NMS
if an error occurs. Most devices come with an SNMP agent preinstalled; it typically just needs to be
turned on and configured.

2. SNMP-managed devices and resources: These are the nodes on which an agent runs.

3. SNMP manager (aka NMS): This software platform functions as a centralized console to which
agents feed information. It will actively request agents send updates via SNMP at regular intervals.
What a network manager can do with that information depends heavily on how feature-rich the NMS is.
There are several free SNMP managers available, but they are typically limited in their capabilities or
the number of nodes they can support. At the other end of the spectrum, enterprise-grade platforms offer
advanced features for more complex networks, with some products supporting up to tens of thousands of
nodes.

4. Management information base (MIB): This database is a text file (.mib) that itemizes and
describes all objects used by a particular device that can be queried or controlled using SNMP. This
database must be loaded into the NMS so that it can identify and monitor the status of these properties.
Each MIB item is assigned an object identifier (OID).

II-HOW SNMP WORKS

SNMP performs a multitude of functions, relying on a blend of push and pull communications between
network devices and the management system. It can issue read or write commands, such as resetting a
password or changing a configuration setting. It can report back how much bandwidth, CPU and
memory are in use, with some SNMP managers automatically sending the administrator an email or text
message alert if a predefined threshold is exceeded.

In most cases, SNMP functions in a synchronous model, with communication initiated by the SNMP
manager and the agent sending a response. These commands and messages, typically transported over
User Datagram Protocol (UDP) or Transmission Control Protocol/Internet Protocol (TCP/IP), are known
as protocol data units (PDUs):

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy