Unit 5 DCCN
Unit 5 DCCN
NETWORK APPLICATIONS:
A network is a collection or set of computing devices connected to one another to establish
communication and also share available resources. A network will comprise of software and hardware
devices. You can have a network even if you are not connected to the internet. Computer networks make
it possible for people to transfer files from one place to another and to communicate taking the shortest
time possible.
Computer network applications are network software applications that utilize the Internet or other
network hardware infrastructure to perform useful functions for example file transfers within a network.
They help us to transfer data from one point to another within the network.
CLIENT-SERVER MODEL
The client–server model is a distributed application structure that partitions tasks or workloads between
the providers of a resource or service, called servers, and service requesters, called clients. Often clients
and servers communicate over a computer network on separate hardware, but both client and server may
reside in the same system. A server host runs one or more server programs which share their resources
with clients. A client does not share any of its resources, but requests a server's content or service
function. Clients therefore initiate communication sessions with servers which await incoming requests.
Examples of computer applications that use the client–server model are Email, network printing, and
the World Wide Web.
The client-server characteristic describes the relationship of cooperating programs in an application. The
server component provides a function or service to one or many clients, which initiate requests for such
services. Servers are classified by the services they provide. For example, a web server serves web
pages and a file server serves computer files. A shared resource may be any of the server computer's
software and electronic components, from programs and data to processors and storage devices. The
sharing of resources of a server constitutes a service.
The client-server model is a core network computing concept also building functionality for email
exchange and Web/database access. Web technologies and protocols built around the client-server
model are:
Hypertext Transfer Protocol (HTTP)
Domain Name System (DNS)
Simple Mail Transfer Protocol (SMTP)
Telnet
Clients include Web browsers, chat applications, and email software, among others. Servers include
Web, database, application, chat and email, etc.,
TELNET
1. TELNET is abbreviation for TErminaL NETwork.
2. IT would be impossible to write a specific client server program for each demand other than
TELNET.
3. For better solution is a general purpose client server program.
4. That lets a user access any application program on a remote computer possible in TELNET.
4. After logging user can use the services available on the remote computer.
5. Transfer the results back to the local computer.
6. TELNET enables establishment of a connection to a remote system.
7. When user logs into local time sharing system is called local login.
8. Mechanism is simple because operating system may assign special meaning to special character.
9. Character cannot be passed directly to operating system because the remote system is not designed to
receive characters from a terminal driver.
9. For this solution to add software called a pseudo terminal driver.
FILE TRANSFER AND REMOTE FILE ACCESS
1. Remote access is the ability to get access to a computer or a network from a remote distance.
2. In corporations, people at branch offices, telecommuters, and people who are travelling may
need access to the corporation's network.
3. Steps required to transfer a file for one application another.
4. They are similar to the steps required to transfer a file for another.
5. Programmer duplicating code for this process.
6. Making only minor modifications in the file names.
7. Problem occurs when arbitrary data from a file on one computer to file on another computer.
8. For that file transfer software is used.
9. File transfer software is general and flexible.
10. It allows transfer of arbitrary files.
11. File name is valid in one computer but invalid in another computer.
12. For that file transfer software is used create file representation, type information and file protection
mechanism.
13. FTP is derived as File Transfer Protocol deployed internet file transfer services.
14. FTP permits transfer of an arbitrary file.
15. And FTP includes a mechanism that allows files to have ownership and access restriction.
16. FTP hides the details of individual computer system.
17. The client and the server use the FTP protocol when they communicate directly to the server.
18. Internet protocols include a second file transfer server known as Trivial File Transfer
Protocol (TFTP)
19. TFTP client and server use User Datagram Protocol (UDP).
ELECTRONIC MAIL
1. E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication.
2. E-mail messages are usually encoded in ASCII text.
3. However, send non-text files, such as graphic images and sound files, as attachments sent
in binary streams.
4. E-mail can also be exchanged between online service provider users and in networks other than the
Internet, both public and private.
5. E-Mail address contains two parts. First specifies mailbox on the computer. Second specifies a
computer.
6. E-MAIL software on sender’s computer uses the second part to determine which computer to contact.
III-MAIL TRANSFER
1. The sender composes a message using the email client on their computer.
2. When the user sends the message, the email text and attachments are uploaded to the SMTP
(Simple Mail Transfer Protocol) server as outgoing mail.
3. All outgoing messages wait in the outgoing mail queue while the SMTP server communicates
with the DNS (Domain Name Server–like a phone book for domain names and server IP
addresses) to find out where the recipient’s email server is located. If the SMTP server finds the
recipient’s email server, it will transfer the message and attachments. If the recipient’s server
can’t be found, the sender will get a “Mail Failure” notification in their inbox.
4. The next time the recipient clicks “Send & Receive,” their email client will download all new
messages from their own email server. We got mail. That it works.
1.E-mail Protocols are set of rules that help the client to properly transmit the information to or from the
mail server.
2.Various protocols such as SMTP, POP, and IMAP.
SMPTP
SMTP stands for Simple Mail Transfer Protocol. It was first proposed in 1982. It is a standard
protocol used for sending e-mail efficiently and reliably over the internet.
Key Points:
SMTP is application level protocol.
SMTP is connection oriented protocol.
SMTP is text based protocol.
It handles exchange of messages between e-mail servers over TCP/IP network.
Apart from transferring e-mail, SMPT also provides notification regarding incoming mail.
When you send e-mail, your e-mail client sends it to your e-mail server which further contacts
the recipient mail server using SMTP client.
These SMTP commands specify the sender’s and receiver’s e-mail address, along with the
message to be send.
The exchange of commands between servers is carried out without intervention of any user.
In case, message cannot be delivered, an error report is sent to the sender which makes SMTP a
reliable protocol.
IMAP
IMAP stands for Internet Mail Access Protocol. It was first proposed in 1986. There exist five
versions of IMAP as follows:
1. Original IMAP
2. IMAP2
3. IMAP3
4. IMAP2bis
5. IMAP4
Key Points:
IMAP allows the client program to manipulate the e-mail message on the server without
downloading them on the local computer.
The e-mail is hold and maintained by the remote server.
It enables us to take any action such as downloading, delete the mail without reading the mail.It
enables us to create, manipulate and delete remote message folders called mail boxes.
IMAP enables the users to search the e-mails.
It allows concurrent access to multiple mailboxes on multiple mail servers.
POP
POP stands for Post Office Protocol. It is generally used to support a single client. There are several
versions of POP but the POP 3 is the current standard.
Key Points
POP is an application layer internet standard protocol.
Since POP supports offline access to the messages, thus requires less internet usage time.
POP does not allow search facility.
In order to access the messaged, it is necessary to download them.
It allows only one mailbox to be created on server.
It is not suitable for accessing non mail data.
POP commands are generally abbreviated into codes of three or four letters. Eg. STAT.
ADVANTAGES OF INTERNET
Costs are very important advantage of emails. Sending an email is much cheaper then phoning, or
sending normal letters. Beside a lot of advantages, Internet has some disadvantages too. First of
disadvantages is that people who spend too much time sitting in the front of computer can easily gets ill.
There are dozens of online services that allow you to work with other people and, with the ability to
have instant communication, it can even make producing new products and services faster.
An Internet connection provides many people with the ability to work from home or have a virtual
office.
Do use the internet and find a solution to every problem. The Internet has also made access to
information and communication far easier. Rather than searching the library, users can access vast
amounts of information from home computers. Politics and government are another area in which
the Internet is important.
DISADVANTAGES OF INTERNET
Hypertext is text displayed on a computer display or other electronic devices with references
(hyperlinks) to other text that the reader can immediately access, or where text can be revealed
progressively at multiple levels of detail (also called Stretch Text).
Hypertext documents are interconnected by hyperlinks, which are typically activated by a mouse click,
keypress set or by touching the screen. Apart from text, the term "hypertext" is also sometimes used to
describe tables, images, and other presentational content formats with integrated hyperlinks.
Hypertext is one of the key underlying concepts of the World Wide Web, where Web pages are often
written in the Hypertext Markup Language (HTML). As implemented on the Web, hypertext enables the
easy-to-use publication of information over the Internet.
Hypermedia, an extension of the term hypertext, is a nonlinear medium of information that includes
graphics, audio, video, plain text and hyperlinks. This designation contrasts with the broader
term multimedia, which may include non-interactive linear presentations as well as hypermedia. It is
also related to the field of electronic literature.
The WWW (World Wide Web) is a classic example of hypermedia, whereas a non-
interactive cinema presentation is an example of standard multimedia due to the absence of hyperlinks.
Most modern hypermedia is delivered via electronic pages from a variety of systems including media
players, web browsers, and stand-alone applications (i.e., software that does not require network access).
Audio hypermedia is emerging with voice command devices and voice browsing.
The HTTP service is the component of the Application Server that provides facilities for deploying web
applications and for making deployed web applications accessible by HTTP clients.
HTTP or Hypertext Transfer Protocol is the main protocol of the World Wide Web. When you request a
web page by typing its address into your web browser, that request is sent using HTTP. The browser is
an HTTP client, and the web page server is an HTTP server.
Uniform Resource Locator (URL), colloquially termed a web address, is a reference to a web
resource that specifies its location on a computer network and a mechanism for retrieving it.
A URL is a specific type of Uniform Resource Identifier (URI), although many people use the two terms
interchangeably.
URLs occur most commonly to reference web pages (http), but are also used for file transfer (ftp), email
(mailto), database access, and many other applications.
Most web browsers display the URL of a web page above the page in an address bar. A typical URL
could have the form http://www.example.com/index.html , which indicates a protocol ( http ),
a hostname ( www.example.com ), and a file name ( index.html )
The World Wide Web is based on several different technologies that make it possible for users to locate
and share information through the Internet. These include Web browsers, Hypertext Markup Language
(HTML) and Hypertext Transfer Protocol (HTTP).
Many hostnames used for the World Wide Web begin with www because of the long-standing practice
of naming Internet hosts according to the services they provide. The hostname of a web server is often
www, in the same way that it may be ftp for an FTP server, and news or nntp for a USENET news
server.
World-Wide Web (also called WWW or W3) is a hypertext-based information system. World-Wide
Web uses hypertext over the Internet: the linked documents may be located at different Internet sites.
WWW can handle different text formats and different methods of organizing information.
NETWORK MANAGEMENT
Network management is the process of administering and managing computer networks. Services
provided by this discipline include fault analysis, performance management, provisioning of networks
and maintaining the quality of service. Software that enables network administrators to perform their
functions is called network management software.
PERFORMANCE MANAGEMENT
The goal of performance management is to measure and make available various aspects of network
performance so that internetwork performance can be maintained at an acceptable level. Examples of
performance variables that might be provided include network throughput, user response times, and line
utilization.
Performance management involves three main steps. First, performance data is gathered on variables of
interest to network administrators. Second, the data is analyzed to determine normal (baseline) levels.
Finally, appropriate performance thresholds are determined for each important variable so that
exceeding these thresholds indicates a network problem worthy of attention.
CONFIGURATION MANAGEMENT
The goal of configuration management is to monitor network and system configuration information so
that the effects on network operation of various versions of hardware and software elements can be
tracked and managed.
ACCOUNTING MANAGEMENT
The goal of accounting management is to measure network utilization parameters so that individual or
group uses on the network can be regulated appropriately. Such regulation minimizes network problems
(because network resources can be apportioned based on resource capacities) and maximizes the fairness
of network access across all users.
As with performance management, the first step toward appropriate accounting management is to
measure utilization of all important network resources. Analysis of the results provides insight into
current usage patterns, and usage quotas can be set at this point. Some correction, of course, will be
required to reach optimal access practices. From this point, ongoing measurement of resource use can
yield billing information as well as information used to assess continued fair and optimal resource
utilization.
FAULT MANAGEMENT
The goal of fault management is to detect, log, notify users of, and (to the extent possible) automatically
fix network problems to keep the network running effectively. Because faults can cause downtime or
unacceptable network degradation, fault management is perhaps the most widely implemented of the
ISO network management elements.
Fault management involves first determining symptoms and isolating the problem. Then the problem is
fixed and the solution is tested on all-important subsystems. Finally, the detection and resolution of the
problem is recorded.
SECURITY MANAGEMENT
The goal of security management is to control access to network resources according to local guidelines
so that the network cannot be sabotaged (intentionally or unintentionally) and sensitive information
cannot be accessed by those without appropriate authorization. A security management subsystem, for
example, can monitor users logging on to a network resource and can refuse access to those who enter
inappropriate access codes.
Security management subsystems work by partitioning network resources into authorized and
unauthorized areas. For some users, access to any network resource is inappropriate, mostly because
such users are usually company outsiders. For other (internal) network users, access to information
originating from a particular department is inappropriate. Access to Human Resource files, for example,
is inappropriate for most users outside the Human Resources department.
1. Managing entity
2. Managing devices
3. Network Management Protocol
1. Staffing
2. Organizing
3. Planning
4. Directing
5. Controlling
1. Modems
2. Communication links
3. Routers
4. Multiplexers.
5. Communication software
1. Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and
monitor network devices and their functions.
2. SNMP provides a common language for network devices to relay management information.
3. Within single- and multivendor environments in a LAN or wide area network WAN.
4. The most recent iteration of SNMP, version 3, includes security enhancements that authenticate.
5. Encrypt SNMP messages as well as protect packets during transit.
6. SNMP is supported on an extensive range of hardware.
7. Conventional network equipment like routers, switches and wireless access points to endpoints like
printers, scanners and internet of things devices.
8. SNMP can be used to monitor services such as Dynamic Host Configuration Protocol (DHCP).
9. Software agents on these devices and services communicate with a network management system
(NMS), also referred to as an SNMP manager.
10. SNMP can be used in a network of any size, its greatest value is evident in large networks.
11. Manually and individually logging into hundreds or thousands of nodes.
12. Would be extremely time-consuming and resource-intensive.
I-COMPONENTS OF SNMP
1. SNMP agent: This program runs on the hardware or service being monitored, collecting data
about various metrics like bandwidth use or disk space. When queried by the SNMP manager, the agent
sends this information back to the management system. An agent may also proactively notify the NMS
if an error occurs. Most devices come with an SNMP agent preinstalled; it typically just needs to be
turned on and configured.
2. SNMP-managed devices and resources: These are the nodes on which an agent runs.
3. SNMP manager (aka NMS): This software platform functions as a centralized console to which
agents feed information. It will actively request agents send updates via SNMP at regular intervals.
What a network manager can do with that information depends heavily on how feature-rich the NMS is.
There are several free SNMP managers available, but they are typically limited in their capabilities or
the number of nodes they can support. At the other end of the spectrum, enterprise-grade platforms offer
advanced features for more complex networks, with some products supporting up to tens of thousands of
nodes.
4. Management information base (MIB): This database is a text file (.mib) that itemizes and
describes all objects used by a particular device that can be queried or controlled using SNMP. This
database must be loaded into the NMS so that it can identify and monitor the status of these properties.
Each MIB item is assigned an object identifier (OID).
SNMP performs a multitude of functions, relying on a blend of push and pull communications between
network devices and the management system. It can issue read or write commands, such as resetting a
password or changing a configuration setting. It can report back how much bandwidth, CPU and
memory are in use, with some SNMP managers automatically sending the administrator an email or text
message alert if a predefined threshold is exceeded.
In most cases, SNMP functions in a synchronous model, with communication initiated by the SNMP
manager and the agent sending a response. These commands and messages, typically transported over
User Datagram Protocol (UDP) or Transmission Control Protocol/Internet Protocol (TCP/IP), are known
as protocol data units (PDUs):