Notes-Unit-1-CS3697
Notes-Unit-1-CS3697
Data Communication - Networks – Network Types – Protocol Layering – TCP/IP Protocol suite
–OSI Model – Introduction to Sockets - Application Layer protocols: HTTP – FTP – Email
protocols(SMTP - POP3 - IMAP - MIME) – DNS – SNMP
The word data refers to information presented in whatever form is agreed upon by the
parties creating and using the data.
“Data communications are the exchange of data between two devices via some form
of transmission medium such as a wire cable”.
I. Delivery: The system must deliver data to the correct destination. Data must be received by
the intended device or user .
2. Accuracy: The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
3. Timeliness: The system must deliver data in a timely manner. Data delivered late are
useless.
4. Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay in
the delivery of audio or video packets.
1
1.1.1 Components
1.Message: The message is the information (data) to be communicated. Popular forms of information
include text, numbers, pictures, audio, and video. 2.Sender: The sender is the device that sends
the data message. It can be a computer, workstation, telephone handset, video camera, and so on.
2
3.Receiver: The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
4.Transmission medium: The transmission medium is the physical path by which a message
travels from sender to receiver. Some examples of transmission media include twisted-pair wire,
coaxial cable, fiber optic cable, and radio waves.
Information today comes in different forms such as text, numbers, images, audio, and
video. Text
In data communications, text is represented as a bit pattern, a sequence of bits (O s or 1 s).
Different sets of bit patterns have been designed to represent text symbols. Each set is called a
code, and the process of representing symbols is called coding.
Unicode, which uses 32 bits to represent a symbol or character used in any language in the world.
The American Standard Code for Information Interchange (ASCII), now constitutes the first 127
characters in Unicode and is also referred to as Basic Latin.
Numbers
Numbers are also represented by bit patterns. However, a code such as ASCII is not used to
represent numbers; the number is directly converted to a binary number to simplify
mathematical operations.
Images
Images are also represented by bit patterns. In its simplest form, an image is composed of a
matrix of pixels (picture elements), where each pixel is a small dot. The size of the pixel depends
on the resolution. The size and the value of the pattern depend on the image.
For an image made of only black-and-white dots (e.g., a chessboard), a I-bit pattern is enough to
represent a pixel. If an image is not made of pure white and pure black pixels, you can increase
the size of the bit pattern to include gray scale
There are several methods to represent color images. One method is called RGB, so called
because each color is made of a combination of three primary colors: red, green, and blue. The
intensity of each color is measured, and a bit pattern is assigned to it. Another method is called
YCM, in which a color is made of a combination of three other primary colors: yellow, cyan,
and magenta.
Audio
Audio refers to the recording or broadcasting of sound or music. Audio is by nature different
from text, numbers, or images.
3
Video
Video refers to the recording or broadcasting of a picture or movie. Video can either be
produced as a continuous entity (e.g., by a TV camera), or it can be a combination of images,
each a discrete entity, arranged to convey the idea of motion.
Simplex
In simplex mode, the communication is unidirectional, as on a one-way street. Only one
of the two devices on a link can transmit; the other can only receive (see Figure 1.2a).
Keyboards and traditional monitors are examples of simplex devices.
4
Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the same time.
When one device is sending, the other can only receive, and vice versa (see Figure 1.2b)
Walkietalkies and CB (citizens band) radios are both half-duplex systems. The half-duplex
mode is used in cases where there is no need for communication in both directions at the
same time.
Advantages of Half-duplex mode:
o In half-duplex mode, both the devices can send and receive the data and also can
utilize the entire bandwidth of the communication channel during the transmission
of data.
Full-Duplex
In full-duplex mode (also called duplex), both stations can transmit and receive simultaneously
(see Figure 1.2c).The full-duplex mode is like a two-way street with traffic flowing in both
directions at the same time. One common example of full-duplex communication is the
telephone network. When two people are communicating by a telephone line, both can talk and
listen at the same time. The full-duplex mode is used when communication in both directions is
required all the time.
Both the stations can send and receive the data at the same time.
1.2 NETWORKS
A network is a set of devices (often referred to as nodes) connected by communication links. A
node can be a computer, printer, or any other device capable of sending and/or receiving data
generated by other nodes on the network.
5
Distributed Processing
Most networks use distributed processing, in which a task is divided among multiple
computers. Instead of one single large machine being responsible for all aspects of a
process, separate computers (usually a personal computer or workstation) handle a subset.
Performance
Performance can be measured in many ways, including transit time and response time.
Transit time is the amount of time required for a message to travel from one device to another.
Response time is the elapsed time between an inquiry and a response. The performance of a
network depends on a number of factors, including the number of users, the type of
transmission medium, the capabilities of the connected hardware, and the efficiency of the
software. Performance is often evaluated by two networking metrics:
Latency/delay is time required for a message to completely arrive at the destination from source.
We often need more throughput and less delay. However, these two criteria are often contradictory.
If we try to send more data to the network, we may increase throughput but we increase the delay
because of traffic congestion in the network.
Reliability
In addition to accuracy of delivery, network reliability is measured by the frequency of
failure, the time it takes a link to recover from a failure, and the network's robustness in a
catastrophe.
Security
Network security issues include protecting data from unauthorized access, protecting data
from damage and development, and implementing policies and procedures for recovery from
breaches and data losses.
A network is two or more devices connected through links. A link is a communications pathway
that transfers data from one device to another. There are two possible types of connections: point-
to-point and multipoint.
6
Point-to-Point
A point-to-point connection provides a dedicated link between two devices. The entire capacity
of the link is reserved for transmission between those two devices. Most point-to-point
connections use an actual length of wire or cable to connect the two ends (see Figure 1.3a). When
you change television channels by infrared remote control, you are establishing a point- to-point
connection between the remote control and the television's control system.
Multipoint A multipoint (also called multidrop) connection is one in which more than two specific
devices share a single link (see Figure 1.3b). In a multipoint environment, the capacity of the
channel is shared, either spatially or temporally. If several devices can use the link simultaneously,
it is a spatially shared connection. If users must take turns, it is a timeshared connection.
7
Physical Topology
The term physical topology refers to the way in which a network is laid out physically. Two or
more devices connect to a link; two or more links form a topology. The topology of a network is
the geometric representation of the relationship of all the links and linking devices (usually called
nodes) to one another. There are four basic topologies possible: mesh, star, bus, and ring (see
Figure 1.4).
Mesh Topology
8
Star Topology
• In a star topology, each device has a dedicated point-to-point link only to
acentral controller, usually called a hub.
9
Advantages of Star Topology Disadvantages of Star Topology
Bus Topology
10
Ring Topology
11
Advantages of Ring Topology Disadvantages of Ring Topology
1. Transmitting network is not affected by 1. Troubleshooting is difficult in ring
high traffic or by adding more nodes, as topology.
only the nodes having tokens can transmit 2. Adding or deleting the computers
data. disturbs the network activity.
2. Cheap to install and expand 3. Failure of one computer disturbs the
whole network
Hybrid Topology
• Hybrid Topology is a combination of one or more basic topologies.
• For example if one department in an office uses ring topology, the other
departments uses star and bus topology, then connecting these topologies will
result in Hybrid Topology.
• Hybrid Topology inherits the advantages and disadvantages of the topologies
included.
12
1.3 NETWORK TYPES
Different types of networks: LANs MANs and WANs.
13
1.3.2 Metropolitan Area Network (MAN)
14
1.3.3 Wide Area Network (WAN) o A Wide Area Network is a
network that extends over a large geographical areasuch as states
or countries. o A Wide Area Network is quite bigger network
than the LAN.
A Wide Area Network is not limited to a single location, but it spans
over a large geographical area through a telephone line, fibre optic cable
or satellite links.
o The internet is one of the biggest WAN in the world. o A Wide Area Network is
widely used in the field of Business, government, and education.
Point-to-Point WAN
A point-to-point WAN is a network that connects two communicating devices through a
transmission medium (cable or air). Figure 1.9 shows an example of a point-to-point WAN.
15
Switched WAN
A switched WAN is a network with more than two ends. It is used in the backbone of a global
communications network today. Figure 1.10 shows an example of a switched WAN
Internetwork
Today, it is very rare to see a LAN or a WAN in isolation; they are connected to one
another. When two or more networks are connected, they make an internetwork, or internet. As
an example, assume that an organization has two offices, one on the east coast and the other on
the west coast.
Each office has a LAN that allows all employees in the office to communicate with each
other. To make the communication between employees at different offices possible, the
management leases a point-to-point dedicated WAN from a service provider, such as a
telephone company, and connects the two LANs.
Now the company has an internetwork, or a private internet (with lowercase i).
Communication between offices is now possible. Figure 1.11 shows this internet.
16
Types of Internetworks
Extranet Intranet
An extranet is used for information sharing. The
An intranet belongs to an organization which is
access to the extranet is restricted to only those
only accessible by the organization's
users who have login credentials. An extranet
employee or members. The main aim of the
is the lowest level of internetworking. It can
intranet is to share the information and
becategorized as MAN, WAN or other computer
resources among the organization employees.
networks. An extranet cannot have a single
An intranet provides the facility to work in
LAN, atleast it must haveone connection to the
groups and for teleconferences.
external network.
17
The figure shows the Internet as several backbones, provider networks, and customer networks.
At the top level, the backbones are large networks owned by some communication companies.
The backbone networks are connected through some complex switching systems, called
peering points.
At the second level, there are smaller networks, called provider networks, that use the services
of the backbones for a fee. The provider networks are connected to backbones and sometimes to
other provider networks. The customer networks are networks at the edge of the Internet that
actually use the services provided by the Internet. They pay fees to provider networks for
receiving services.
18
Backbones and provider networks are also called Internet Service Providers (ISPs). The
backbones are often referred to as international ISPs; the provider networks are often referred to
as national or regional ISPs.
Today most residences and small businesses have telephone service, which means they are
connected to a telephone network. Because most telephone networks have already connected
themselves to the Internet, one option for residences and small businesses to connect to the
Internet is to change the voice line between the residence or business and the telephone center to
a point-to-point WAN. This can be done in two ways.
❏ Dial-up service. The first solution is to add a modem that converts data to voice to the telephone
line. The software installed on the computer dials the ISP and imitates making a telephone
connection. Unfortunately, the dial-up service is very slow, and when the line is used for an
Internet connection, it cannot be used for a telephone (voice)connection. It is only useful for small
residences and businesses with occasional connection to the Internet.
❏ DSL Service. Since the advent of the Internet, some telephone companies have upgraded their
telephone lines to provide higher-speed Internet services to residences or small businesses. The
digital subscriber line (DSL) service also allows the line to be used simultaneously for voice and
data communications.
More and more residents over the last two decades have begun using cable TV services instead of
antennas to receive TV broadcasting. The cable companies have been upgrading their cable
networks and connecting to the Internet. A residence or a small business can be connected to the
Internet by using this service. It provides a higher-speed connection, but the speed varies
depending on the number of neighbors that use the same cable.
Wireless connectivity has recently become increasingly popular. A household or a small business
can use a combination of wireless and wired connections to access the Internet. With the growing
wireless WAN access, a household or a small business can be connected to the Internet through a
wireless WAN.
19
Direct Connection to the Internet
A large organization or a large corporation can itself become a local ISP and be connected to the
Internet. This can be done if the organization or the corporation leases a high-speed WAN from a
carrier provider and connects itself to a regional ISP. For example, a large university with several
campuses can create an internetwork and then connect the internetwork to the Internet.
• In networking, a protocol defines the rules that both the sender and receiver andall
intermediate devices need to follow to be able to communicate effectively.
• A protocol provides a communication service that the process use to exchange messages.
• When communication is simple, we may need only one simple protocol.
• When the communication is complex, we may need to divide the task between different
layers, in which case we need a protocol at each layer, or protocol layering.
• Protocol layering is that it allows us to separate the services from the implementation.
• A layer needs to be able to receive a set of services from the lower layer and to give the
services to the upper layer.
• Any modification in one layer will not affect the other layers.
20
Interface: It is a way through which the message is transferred from one layer to another
layer.
Features of Protocol Layering
1. Application layer
2. Transport Layer (TCP/UDP)
3. Network Layer
4. Datalink Layer
5. Physical Layer
21
1.5.1 Layered Architecture
To show how the layers in the TCP/IP protocol suite are involved in communication
between two hosts, we assume that we want to use the suite in a small internet made up of three
LANs (links), each with a link-layer switch. We also assume that the links are connected by one
router, as shown in Figure 1.18 (on next page). Let us assume that computer A
communicates with computer B.
As Figure 1.18 shows, we have five communicating devices in this communication:
source host (computer A), the link-layer switch in link 1, the router, the link-layer switch in link
2, and the destination host (computer B). Each device is involved with a set of layers depending
After understanding the concept of logical communication, we are ready to briefly discuss the
duty of each layer.
Application Layer
An application layer incorporates the function of top three OSI layers.
Anapplication layer is the topmost layer in the TCP/IP model.
It is responsible for handling high-level protocols, issues of representation.
This layer allows the user to interact with the application.
When one application layer protocol wants to communicate with another
application layer, it forwards its data to the transport layer.
Protocols such as FTP, HTTP, SMTP, POP3, etc running in the application layer
provides service to other program running on top of application layer
on the role of the device in the internet. The two hosts are involved in all five layers.
22
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction
of data which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol. o UDP – UDP provides connectionless service and
end-to-end delivery of transmission. It is an unreliable protocol as it discovers the
errors but not specify the error.
o TCP – TCP provides a full transport layer services to applications. TCP is a
reliable protocol as it detects the error and retransmits the damaged frames.
Network Layer
The network layer is the third layer of the TCP/IP model.
The main responsibility of the network layer is to send the packets from any
network, and they arrive at the destination irrespective of the route they take.
Network layer handle the transfer of information across multiple networks through
router and gateway .
IP protocol is used in this layer, and it is the most significant part of the entire
TCP/IP suite.
Data Link Layer
We have seen that an internet is made up of several links (LANs and WANs) connected
by routers. When the next link to travel is determined by the router, the data-link layer
is responsible for taking the datagram and moving it across the link.
Physical Layer
The physical layer is responsible for carrying individual bits in a frame across the
link.
The physical layer is the lowest level in the TCP/IP protocol suite.
The communication between two devices at the physical layer is still a logical
communication because there is another hidden layer, the transmission media, under
the physical layer.
An ISO standard that covers all aspects of network communications is the Open
Systems Interconnection (OSI) model. It was first introduced in the late 1970s.
An open system is a set of protocols that allows any two different systems to
communicate regardless of their underlying architecture. The purpose of the OSI model is to show
23
how to facilitate communication between different systems without requiring changes to
the logic of the underlying hardware and software.
This is the only layer that directly interacts with data from the user. Software
applications like web browsers and email clients rely on the application layer to initiate
communications. But it should be made clear that client software applications are not part of the
application layer; rather the application layer is responsible for the protocols and data
manipulation that the software relies on to present meaningful data to the user. Application layer
protocols include HTTP as well as SMTP (Simple Mail Transfer Protocol is one of the protocols
that enables email communications).
This layer is primarily responsible for preparing data so that it can be used by the
application layer; in other words, layer 6 makes the data presentable for applications to
consume. The presentation layer is responsible for translation, encryption, and compression of
The OSI model is not a protocol; it is a model for understanding and designing a network
architecture that is flexible, robust, and interoperable. The OSI model is a layered framework for
the design of network systems that allows communication between all types of computer systems.
It consists of seven separate but related layers, each of which defines a part of the process of
moving information across a network (see Figure 1.21).
24
If the devices are communicating over an encrypted connection, layer 6 is responsible for
adding the encryption on the sender’s end as well as decoding the encryption on the receiver's end
so that it can present the application layer with unencrypted, readable data.
Finally the presentation layer is also responsible for compressing data it receives from the
application layer before delivering it to layer 5. This helps improve the speed and efficiency of
communication by minimizing the amount of data that will be transferred.
This is the layer responsible for opening and closing communication between the two
devices. The time between when the communication is opened and closed is known as the
session. The session layer ensures that the session stays open long enough to transfer all the data
being exchanged, and then promptly closes the session in order to avoid wasting resources.
Layer 4 is responsible for end-to-end communication between the two devices. This
includes taking data from the session layer and breaking it up into chunks called segments
before sending it to layer 3. The transport layer on the receiving device is responsible for
reassembling the segments into data the session layer can consume.
25
The transport layer is also responsible for flow control and error control. Flow control
determines an optimal speed of transmission to ensure that a sender with a fast connection does
not overwhelm a receiver with a slow connection. The transport layer performs error control on
the receiving end by ensuring that the data received is complete, and requesting a
retransmission if it isn’t.
The network layer works for the transmission of data from one host to the other located
in different networks. It also takes care of packet routing i.e. selection of the shortest path to
transmit the packet, from the number of routes available. The sender & receiver’s IP addresses
are placed in the header by the network layer.
1. Routing: The network layer protocols determine which route is suitable from source to
destination. This function of the network layer is known as routing.
2. Logical Addressing: In order to identify each device on internetwork uniquely, the
network layer defines an addressing scheme. The sender & receiver’s IP addresses are
placed in the header by the network layer. Such an address distinguishes each device
uniquely and universally.
The data link layer is responsible for the node-to-node delivery of the message. The main
function of this layer is to make sure data transfer is error-free from one node to another, over
the physical layer. When a packet arrives in a network, it is the responsibility of DLL to
transmit it to the Host using its MAC address. Data Link Layer is divided into two sublayers:
The packet received from the Network layer is further divided into frames depending on
the frame size of NIC(Network Interface Card). DLL also encapsulates Sender and Receiver’s
MAC address in the header.
26
1.6.7 Physical Layer
This layer includes the physical equipment involved in the data transfer, such as the
cables and switches. This is also the layer where the data gets converted into a bit stream,
which is a string of 1s and 0s. The physical layer of both devices must also agree on a signal
convention so that the 1s can be distinguished from the 0s on both devices.
Summary of Layers
27
COMPARISON - OSI MODEL AND TCP/IP MODEL
A socket is one endpoint of a two way communication link between two programs running
on the network. The socket mechanism provides a means of inter-process communication
(IPC) by establishing named contact points between which the communication take place.
Like ‘Pipe’ is used to create pipes and sockets is created using ‘socket’ system call. The
socket provides bidirectional FIFO Communication facility over the network. A socket connecting
to the network is created at each end of the communication. Each socket has a
28
Socket are generally employed in client server applications. The server creates a socket,
attaches it to a network port addresses then waits for the client to contact it. The client creates a
socket and then attempts to connect to the server socket. When the connection is established,
transfer of data takes place.
Because a socket defines the end-point of the communication, we can say that a socket is
identified by a pair of socket addresses, a local and a remote.
29
1.7.2 Finding Socket Addresses
How can a client or a server find a pair of socket addresses for communication? The situation is
different for each site.
Server Site
The server needs a local (server) and a remote (client) socket address for communication.
Local Socket Address The local (server) socket address is provided by the operating system. The
operating system knows the IP address of the computer on which the server process is running.
The port number of a server process, however, needs to be assigned. If the server process is a
standard one defined by the Internet authority, a port number is already assigned to it. When a
server starts running, it knows the local socket address.
Remote Socket Address The remote socket address for a server is the socket address of the
client that makes the connection. Because the server can serve many clients, it does not know
beforehand the remote socket address for communication. The server can find this socket
address when a client tries to connect to the server. The client socket address, which is
contained in the request packet sent to the server, becomes the remote socket address that is
used for responding to the client.
Client Site
The client also needs a local (client) and a remote (server) socket address for communication.
Local Socket Address The local (client) socket address is also provided by the operating system.
The operating system knows the IP address of the computer on which the client is running. The
port number, however, is a 16- bit temporary integer that is assigned to a client process each time
the process needs to start the communication. The port number, however, needs to be assigned
from a set of integers defined by the Internet authority and called the ephemeral (temporary) port
numbers. The operating system, however, needs to guarantee that the new port number is not used
by any other running client process.
Remote Socket Address Finding the remote (server) socket address for a client, however, needs
more work. When a client process starts, it should know the socket address of the server it wants
to connect to. We will have two situations in this case.
Sometimes, the user who starts the client process knows both the server port number and
IP address of the computer on which the server is running. This usually occurs in situations when
we have written client and server applications and we want to test them
Although each standard application has a well-known port number, most of the time, we
do not know the IP address. This happens in situations such as when we need to contact a web
page, send an e-mail to a friend, or copy a file from a remote site. In these situations, the server
has a name, an identifier that uniquely defines the server process. Examples of these identifiers
30
are URLs, such as www.xxx.yyy, or e-mail addresses, such as xxxx@yyyy.com. The client process
should now change this identifier (name) to the corresponding server socket address.
Application-Layer Paradigms
31
oIn this paradigm, the service provider is an application program, called the server process; it
runs continuously, waiting for another application program, called the client process, to make
a connection through the Internet and ask for service.
oThe server process must be running all the time; the client process is started when the client
needs to receive service.
oThere are normally some server processes that can provide a specific type of service, but
there are many clients that request service from any of these server processes.
Peer-to-Peer(P2P) Paradigm
oA new paradigm, called the peer-to-peer paradigm has emerged to respond to the needs of
some new applications.
oIn this paradigm, there is no need for a server process to be running all the time and waiting
for the client processes to connect.
oThe responsibility is shared between peers.
oA computer connected to the Internet can provide service at one time and receive service at
another time.
oA computer can even provide and receive services at the same time.
Mixed Paradigm o An application may choose to use a mixture of the two paradigms by
combining the advantages of both. o For example, a light-load client-server
communication can be used to find the address of the peer that can offer a service.
o When the address of the peer is found, the actual service can be received from the peer by
using the peer-to-peer paradigm.
32
1.8.1 The HyperText Transfer Protocol (HTTP)
• The HyperText Transfer Protocol (HTTP) is used to define how the client- server
programs can be written to retrieve web pages from the Web.
• It is a protocol used to access the data on the World Wide Web (WWW).
• The HTTP protocol can be used to transfer the data in the form of plain text, hypertext,
audio, video, and so on.
• HTTP is a stateless request/response protocol that governs client/server
communication.
• An HTTP client sends a request; an HTTP server returns a response.
• The server uses the port number 80; the client uses a temporary port number.
• HTTP uses the services of TCP , a connection-oriented and reliable protocol.
• HTTP is a text-oriented protocol. It contains embedded URL known as links.
• When hypertext is clicked, browser opens a new connection, retrieves file from the
server and displays the file.
• Each HTTP message has the general form
START_LINE <CRLF>
MESSAGE_HEADER <CRLF>
<CRLF> MESSAGE_BODY <CRLF>
where <CRLF> stands for carriage-return-line-feed.
Features of HTTP
o Connectionless protocol:
HTTP is a connectionless protocol. HTTP client initiates a request and waits for a response
from the server. When the server receives the request, the server processes the request and
sends back the response to the HTTP client after which the client disconnects the connection.
The connection between client and server exist only during the current request and response
time only.
o Media independent:
HTTP protocol is a media independent as data can be sent as long as both the client and server
know how to handle the data content. It is required for both the client and server to specify the
content type in MIME-type header.
o Stateless:
HTTP is a stateless protocol as both the client and server know each other only during the
current request. Due to this nature of the protocol, both the client and server do not retain the
information between various requests of the web pages.
33
•Request Message: The request message is sent by the client that consists of a request line,
headers, and sometimes a body.
•Response Message: The response message is sent by the server to the client that consists of a
status line, headers, and sometimes a body.
Request Line
•There are three fields in this request line - Method, URL and Version.
•The Method field defines the request types.
•The URL field defines the address and name of the corresponding web page.
•The Version field gives the version of the protocol; the most current version of
HTTP is 1.1.
•Some of the Method types are:
34
Request Header
• Each request header line sends additional information from the client to the server.
• Each header line has a header name, a colon, a space, and a header value.
• The value field defines the values associated with each header name.
• Headers defined for request message include:
Body
•The body can be present in a request message. It is optional.
•Usually, it contains the comment to be sent or the file to be published on the website when
the method is PUT or POST.
Conditional Request
•A client can add a condition in its request.
•In this case, the server will send the requested web page if the condition is met or inform
the client otherwise.
•One of the most common conditions imposed by the client is the time and date the web
page is modified.
•The client can send the header line If-Modified-Since with the request to tell the server that it
needs the page only if it is modified after a certain point in time.
35
• After the request line, we can have zero or more response header lines.
• The body is an optional one. The body is present unless the response is an error message.
Status Line
• The Status line contains three fields - HTTP version , Status code, Status phrase
• The first field defines the version of HTTP protocol, currently 1.1.
• The status code field defines the status of the request. It classifies the HTTP result. It
consists of three digits.
1xx–Informational, 2xx– Success, 3xx–Redirection,
4xx–Client error, 5xx–Server error
• The Status phrase field gives brief description about status code in text form. • Some of
the Status codes are
36
Response Header
•Each header provides additional information to the client.
•Each header line has a header name, a colon, a space, and a header value.
•Some of the response headers are:
Body
•The body contains the document to be sent from the server to the client.
•The body is present unless the response is an error message.
HTTP CONNECTIONS
• HTTP Clients and Servers exchange multiple messages over the same TCP connection.
• If some of the objects are located on the same server, we have two choices: to retrieve
each object using a new TCP connection or to make a TCP connection and retrieve them all.
• The first method is referred to as a non-persistent connection, the second as a persistent
connection.
• HTTP 1.0 uses non-persistent connections and HTTP 1.1 uses persistent connections .
Non-Persistent Connections
• In a non-persistent connection, one TCP connection is made for each request/response.
• Only one object can be sent over a single TCP connection • The client opens a TCP
connection and sends a request.
• The server sends the response and closes the connection.
37
Persistent Connections
•HTTP version 1.1 specifies a persistent connection by default.
•Multiple objects can be sent over a single TCP connection.
•In a persistent connection, the server leaves the connection open for more requests after
sending a response.
•The server can close the connection at the request of a client or if a time-out has been
reached.
•Time and resources are saved using persistent connections. Only one set of buffers and
variables needs to be set for the connection at each site.
•The round trip time for connection establishment and connection termination is saved.
Http Cookies
•An HTTP cookie (also called web cookie, Internet cookie, browser cookie, or simply cookie) is
a small piece of data sent from a website and stored on the user's computer by the user's web
browser while the user is browsing.
They can also be used to remember arbitrary pieces of information that the user previously
entered into form fields such as names, addresses, passwords, and credit card numbers.
38
Components of Cookie
A cookie consists of the following components:
1. Name
2. Value
3. Zero or more attributes (name/value pairs). Attributes store information such as the
cookie's expiration, domain, and flags.
Using Cookies
• When a client sends a request to a server, the browser looks in the cookie directory to
see if it can find a cookie sent by that server.
• If found, the cookie is included in the request.
• When the server receives the request, it knows that this is an old client, not a new one.
• The contents of the cookie are never read by the browser or disclosed to the user. It is a
cookie made by the server and eaten by the server.
Types of Cookies
1.Authentication cookies
These are the most common method used by web servers to know whether the user is logged
in or not, and which account they are logged in with. Without such a mechanism, the site
39
would not know whether to send a page containing sensitive information, or require the user to
authenticate themselves by logging in.
2.Tracking cookies
These are commonly used as ways to compile individuals browsing histories.
3.Session cookie
A session cookie exists only in temporary memory while the user navigates the website. Web
browsers normally delete session cookies when the user closes the browser.
4.Persistent cookie
Instead of expiring when the web browser is closed as session cookies do, a persistent cookie
expires at a specific date or after a specific length of time. This means that, for the cookie's
entire lifespan , its information will be transmitted to the server every time the user visits the
website that it belongs to, or every time the user views a resource belonging to that website
from another website
Http Caching
HTTP Caching enables the client to retrieve document faster and reduces load on the
server.
HTTP Caching is implemented at Proxy server, ISP router and Browser.
Server sets expiration date (Expires header) for each page, beyond which it is not
cached.
HTTP Cache document is returned to client only if it is an updated copy by checking
against If-Modified-Since header.
If cache document is out-of-date, then request is forwarded to the server and response
is cached along the way.
A web page will not be cached if no-cache directive is specified.
HTTP SECURITY
HTTP does not provide security.
However HTTP can be run over the Secure Socket Layer (SSL).
In this case, HTTP is referred to as HTTPS.
HTTPS provides confidentiality, client and server authentication, and data integrity.
40
It is also used for downloading the files to computer from other servers.Although we can
transfer files using HTTP, FTP is a better choice to transfer large files or to transfer files
using different formats.
FTP OBJECTIVES
It provides the sharing of files.
It is used to encourage the use of remote computers. It transfers
the data more reliably and efficiently.
41
FTP MECHANISM
FTP CONNECTIONS
There are two types of connections in FTP - Control Connection and Data Connection.
The control connection remains connected during the entire interactive FTP session.
The data connection is opened and then closed for each file transfer activity. When a user
starts an FTP session, the control connection opens.
While the control connection is open, the data connection can be opened and closed
multiple times if several files are transferred.
42
Control Connection:
• The control connection uses very simple rules for communication.
Data Connection: o
• The Data Connection uses very complex rules as data types may vary.
• The data connection opens when a command comes for transferring the files and
closes when the file is transferred.
43
FTP COMMUNICATION
FTP Communication is achieved through commands and responses.
FTP Commands are sent from the client to the server
FTP responses are sent from the server to the client.
FTP Commands are in the form of ASCII uppercase, which may or may not be followed by
an argument.
Some of the most common commands are:
44
FTP FILE TYPE
• FTP can transfer one of the following file types across the data connection:
ASCII file, EBCDIC file, or image file
45
o retrieving a file (server to client)
o storing a file (client to server) o
directory listing (server to client).
FTP SECURITY
• FTP requires a password, the password is sent in plaintext which is unencrypted. This
means it can be intercepted and used by an attacker.
• The data transfer connection also transfers data in plaintext, which is insecure.
• To be secure, one can add a Secure Socket Layer between the FTP application layer
and the TCP layer.
• In this case FTP is called SSL-FTP.
46
2.Messsage Transfer Agent (MTA) – SMTP
3.Messsage Access Agent (MAA) - IMAP , POP
When the sender and the receiver of an e-mail are on the same system, we need only two
User Agents and no Message Transfer Agent
When the sender and the receiver of an e-mail are on different system, we need two UA,
two pairs of MTA (client and server), and two MAA (client and server).
WORKING OF EMAIL
• When Alice needs to send a message to Bob, she runs a UA program to prepare the
message and send it to her mail server.
• The mail server at her site uses a queue (spool) to store messages waiting to be sent.
The message, however, needs to be sent through the Internet from Alice’s site to Bob’s site
using an MTA.
• Here two message transfer agents are needed: one client and one server.
• The server needs to run all the time because it does not know when a client will ask for
a connection.
• The client can be triggered by the system when there is a message in the queue to be
sent. The user agent at the Bob site allows Bob to read the received message.
47
• Bob later uses an MAA client to retrieve the message from an MAA server running on
the second server.
Command driven
• Command driven user agents belong to the early days of electronic mail. o A
command-driven user agent normally accepts a one character command from the
keyboard to perform its task. o Some examples of command driven user agents are
mail, pine, and elm.
GUI-based
• Modern user agents are GUI-based. o They allow the user to interact with the
software by using both the keyboard and the mouse. They have graphical components
such as icons, menu bars, and windows that make the services easy to access. o Some
examples of GUI-based user agents are Eudora and Outlook.
48
ADDRESS FORMAT OF EMAIL
E-mail address is userid @ domain where domain is hostname of the mail server.
Email was extended in 1993 to carry many different types of data: audio, video,
images, Word documents, and so on.
This extended version is known as MIME(Multipurpose Mail Extension).
49
1.8.4.1 SIMPLE MAIL TRANSFER PROTOCOL (SMTP)
SMTP is the standard protocol for transferring mail between hosts in the TCP/IP protocol
suite.
50
SMTP clients and servers have two main components
SMTP also allows the use of Relays allowing other MTAs to relay the mail.
51
SMTP MAIL FLOW
52
SMTP Responses
Responses are sent from the server to the client.
A response is a three digit code that may be followed by additional textual information.
53
SMTP OPERATIONS
Mail Transfer
Once a connection has been established, the SMTP sender may send one or more messages to
the SMTP receiver.
There are three logical phases to the transfer of a message:
1. A MAIL command identifies the originator of the message.
2. One or more RCPT commands identify the recipients for this message.
3. A DATA command transfers the message text.
Connection Termination
The SMTP sender closes the connection in two steps.
First, the sender sends a QUIT command and waits for a reply.
The second step is to initiate a TCP close operation for the TCP connection.
The receiver initiates its TCP close after sending its reply to the QUIT command.
54
Limitations Of Smtp
SMTP cannot transmit executable files or other binary objects.
SMTP cannot transmit text data that includes national language characters, as these are
represented by 8-bit codes with values of 128 decimal or higher, and SMTP is limited to 7-
bit ASCII.
SMTP servers may reject mail message over a certain size.
SMTP gateways that translate between ASCII and the character code EBCDIC do not use a
consistent set of mappings, resulting in translation problems.
Some SMTP implementations do not adhere completely to the SMTP standards defined.
Common problems include the following:
1. Deletion, addition, or recording of carriage return and linefeed.
2. Truncating or wrapping lines longer than 76 characters.
3. Removal of trailing white space (tab and space characters).
4. Padding of lines in a message to the same length.
5. Conversion of tab characters into multiple-space characters.
SMTP provides a basic email service, while MIME adds multimedia capability to
SMTP.
MIME is an extension to SMTP and is used to overcome the problems and limitations
of SMTP.
Email system was designed to send messages only in ASCII format.
55
• Use of rich text (layouts, fonts, colors, etc)
• Binary attachments (executables, images, audio or video files, etc.), which may be divided if
needed.
MIME is a protocol that converts non-ASCII data to 7-bit NVT(Network Virtual
Terminal) ASCII and vice-versa.
MIME HEADERS
Using headers, MIME describes the type of message content and the encoding
used.
Headers defined in MIME are:
•MIME-Version- current version, i.e., 1.1
•Content-Type - message type (text/html, image/jpeg, application/pdf)
•Content-Transfer-Encoding - message encoding scheme (eg base64).
•Content-Id - unique identifier for the message.
•Content-Description - describes type of the message body.
56
MIME CONTENT TYPES
There are seven different major types of content and a total of 14 subtypes.
In general, a content type declares the general type of data, and the subtype specifies a
MIME also defines a multipart type that says how a message carrying more than one
data type is structured.
This is like a programming language that defines both base types (e.g., integers and
floats) and compound types (e.g., structures and arrays).
One possible multipart subtype is mixed, which says that the message contains a set of
independent data pieces in a specified order.
Each piece then has its own header line that describes the type of that piece. The
table below lists the MIME content types:
57
• base-64 : Base 64, for sending binary files as attachments;
• binary : binary format; not recommended.
Since MIME is very open, it can use third-party encoding formats such as:
• BinHex : A proprietary format belonging to Apple
• Uuencode : for UNIX-to-UNIX encoding
• Xencode : for binary-to-text encoding
MTA is a mail daemon (send mail) active on hosts having mailbox, used to send an
email.
Mail passes through a sequence of gateways before it reaches the recipient mail server.
Each gateway stores and forwards the mail using Simple mail transfer protocol
(SMTP).
SMTP defines communication between MTAs over TCP on port 25.
In an SMTP session, sending MTA is client and receiver is server. In each exchange:
Client posts a command (HELO, MAIL, RCPT, DATA, QUIT, VRFY, etc.)
Server responds with a code (250, 550, 354, 221, 251 etc) and an explanation. Client
is identified using HELO command and verified by the server Client forwards message to
server, if server is willing to accept.
Message is terminated by a line with only single period (.) in it. Eventually client
terminates the connection.
IMAP is an Application Layer Internet protocol that allows an e-mail client to access e-
mail on a remote mail server.
It is a method of accessing electronic mail messages that are kept on a possibly shared
mail server.
IMAP is a more capable wire protocol.
IMAP is similar to SMTP in many ways.
IMAP is a client/server protocol running over TCP on port 143.
58
IMAP allows multiple clients simultaneously connected to the same mailbox, and
through flags stored on the server, different clients accessing the same mailbox at the same or
different times can detect state changes made by other clients.
In other words, it permits a "client" email program to access remote message stores as
if they were local.
For example, email stored on an IMAP server can be manipulated from a desktop
computer at home, a workstation at the office, and a notebook computer while travelling,
without the need to transfer messages or files back and forth between these computers.
IMAP can support email serving in three modes:
Offline
Online
Users may connect to the server, look at what email is available, and access it online. This
looks to the user very much like having local spool files, but they’re on the mail server.
Disconnected operation
A mail client connects to the server, can make a “cache” copy of selected messages, and
disconnects from the server. The user can then work on the messages offline, and connect to
the server later and resynchronize the server status with the cache.
59
OPERATION OF IMAP
The mail transfer begins with the client authenticating the user and identifying the mailbox
they want to access.
Client Commands
LOGIN, AUTHENTICATE, SELECT, EXAMINE, CLOSE, and LOGOUT
Server Responses
OK, NO (no permission), BAD (incorrect command),
When user wishes to FETCH a message, server responds in MIME format.
Message attributes such as size are also exchanged.
Flags are used by client to report user actions.
SEEN, ANSWERED, DELETED, RECENT
IMAP4
The latest version is IMAP4. IMAP4 is more powerful and more complex. IMAP4
provides the following extra functions:
60
Advantages Of IMAP
With IMAP, the primary storage is on the server, not on the local machine.
Email being put away for storage can be foldered on local disk, or can be foldered on the
IMAP server.
The protocol allows full user of remote folders, including a remote folder hierarchy and
multiple inboxes.
It keeps track of explicit status of messages, and allows for user-defined status.
Supports new mail notification explicitly.
Extensible for non-email data, like netnews, document storage, etc.
Selective fetching of individual MIME body parts.
Server-based search to minimize data transfer.
Servers may have extensions that can be negotiated.
61
1.8.4.4 POST OFFICE PROTOCOL (POP3)
POP3 client is installed on the recipient computer and POP server on the mail server.
Client opens a connection to the server using TCP on port 110.
Client sends username and password to access mailbox and to retrieve messages.
62
POP3 Commands
POP commands are generally abbreviated into codes of three or four letters
The following describes some of the POP commands:
1.UID - This command opens the connection
2.STAT - It is used to display number of messages currently in the mailbox
3.LIST - It is used to get the summary of messages
4.RETR -This command helps to select a mailbox to access the messages
5.DELE - It is used to delete a message
6.RSET - It is used to reset the session to its initial state
7.QUIT - It is used to log off the session
63
Domain Name System (DNS) is a distributed database used by TCP/IP applications to map
between hostnames and IP addresses and to provide electronic mail routing information.
Each site maintains its own database of information and runs a server program that other
systems across the Internet can query.
WORKING OF DNS
The following six steps shows the working of a DNS. It maps the host name to an IP address:
1. The user passes the host name to the file transfer client.
2. The file transfer client passes the host name to the DNS client.
3. Each computer, after being booted, knows the address of one DNS server. The DNS client
sends a message to a DNS server with a query that gives the file transfer server name using
the known IP address of the DNS server.
4. The DNS server responds with the IP address of the desired file transfer server.
5. The DNS server passes the IP address to the file transfer client.
6. The file transfer client now uses the received IP address to access the file transfer server.
NAME SPACE
To be unambiguous, the names assigned to machines must be carefully selected from a
name space with complete control over the binding between the names and IP address.
The names must be unique because the addresses are unique.
A name space that maps each address to a unique name can be organized in two ways:
flat (or) hierarchical.
64
• The first part can define the organization, the second part can define the name, the third part
can define departments, and so on.
• In this case, the authority to assign and control the name spaces can be decentralized.
• A central authority can assign the part of the name that defines the nature of the organization
and the name.
• The responsibility for the rest of the name can be given to the organization itself. Suffixes
can be added to the name to define host or resources.
• The management of the organization need not worry that the prefix chosen for a host is taken
by another organization because even if part of an address is the same, the whole address is
different.
• The names are unique without the need to be assigned by a central authority.
• The central authority controls only part of the name, not the whole name.
Each node in the tree has a label, which is a string with a maximum of 63 characters.
The root label is a null string (empty string). DNS requires that children of a node (nodes that
branch from the same node) have different labels, which guarantees the uniqueness of the
domain names.
Domain Name
•Each node in the tree has a label called as domain name.
•A full domain name is a sequence of labels separated by dots (.)
•The domain names are always read from the node up to the root.
•The last label is the label of the root (null).
• This means that a full domain name always ends in a null label, which means the last
character is a dot because the null string is nothing.
65
• If a label is terminated by a null string, it is called a fully qualified domain name (FQDN).
• If a label is not terminated by a null string, it is called a partially qualified domain name
(PQDN).
Domain
•A domain is a subtree of the domain name space.
•The name of the domain is the domain name of the node at the top of the sub- tree.
•A domain may itself be divided into domains.
66
HIERARCHY OF NAME SERVERS
The way to distribute information among DNS servers is to divide the whole space into
many domains based on the first level.
Let the root stand-alone and create as many domains as there are first level nodes.
Because a domain created this way could be very large,
DNS allows domains to be divided further into smaller domains.
Thus we have a hierarchy of servers in the same way that we have a hierarchy of
names.
ZONE
What a server is responsible for, or has authority over, is called a zone.
The server makes a database called a zone file and keeps all the information for every node
under that domain.
If a server accepts responsibility for a domain and does not divide the domains into smaller
domains, the domain and zone refer to the same thing.
But if a server divides its domain into sub domains and delegates parts of its authority to
other servers, domain and zone refer to different things.
The information about the nodes in the sub domains is stored in the servers at the lower
levels, with the original server keeping some sort of references to these lower level servers.
But still, the original server does not free itself from responsibility totally.
It still has a zone, but the detailed information is kept by the lower level servers.
67
ROOT SERVER
A root sever is a server whose zone consists of the whole tree.
A root server usually does not store any information about domains but delegates its
authority to other servers, keeping references to those servers.
Currently there are more than 13 root servers, each covering the whole domain
name space.
The servers are distributed all around the world.
68
A primary server loads all information from the disk file; the secondary server
loads all information from the primary server.
Country Domains
The country domains section follows the same format as the generic domains but uses
two characters for country abbreviations
E.g.; in for India, us for United States etc) in place of the three character organizational
abbreviation at the first level.
Second level labels can be organizational, or they can be more specific, national
designation.
India for example, uses state abbreviations as a subdivision of the country domain us.
(e.g., ca.in.)
Inverse Domains
Mapping an address to a name is called Inverse domain.
The client can send an IP address to a server to be mapped to a domain name and it is called
PTR(Pointer) query.
To answer queries of this kind, DNS uses the inverse domain.
DNS RESOLUTION
Mapping a name to an address or an address to a name is called name address resolution.
DNS is designed as a client server application.
69
A host that needs to map an address to a name or a name to an address calls a DNS client
named a Resolver.
The Resolver accesses the closest DNS server with a mapping request.
If the server has the information, it satisfies the resolver; otherwise, it either refers the
resolver to other servers or asks other servers to provide the information.
After the resolver receives the mapping, it interprets the response to see if it is a real
resolution or an error and finally delivers the result to the process that requested it.
A resolution can be either recursive or iterative.
Recursive Resolution
• The application program on the source host calls the DNS resolver (client) to find the IP
address of the destination host. The resolver, which does not know this address, sends the
query to the local DNS server of the source (Event 1)
• The local server sends the query to a root DNS server (Event 2)
• The Root server sends the query to the top-level-DNS server(Event 3)
• The top-level DNS server knows only the IP address of the local DNS server at the
destination. So it forwards the query to the local server, which knows the IP address of the
destination host (Event 4)
•
• The IP address of the destination host is now sent back to the top-level DNS server(Event 5)
then back to the root server (Event 6), then back to the source DNS server, which may cache
it for the future queries (Event 7), and finally back to the source host (Event 8)
Iterative Resolution
• In iterative resolution, each server that does not know the mapping, sends the IP
address of the next server back to the one that requested it.
70
• The iterative resolution takes place between two local servers.
• The original resolver gets the final answer from the destination local server.
• The messages shown by Events 2, 4, and 6 contain the same query.
• However, the message shown by Event 3 contains the IP address of the top- level
domain server.
• The message shown by Event 5 contains the IP address of the destination local DNS
server
• The message shown by Event 7 contains the IP address of the destination.
• When the Source local DNS server receives the IP address of the destination, it sends it
to the resolver (Event 8).
DNS CACHING
Each time a server receives a query for a name that is not in its domain, it needs to
search its database for a server IP address.
DNS handles this with a mechanism called caching.
When a server asks for a mapping from another server and receives the response, it
stores this information in its cache memory before sending it to the client.
If the same or another client asks for the same mapping, it can check its cache memory
and resolve the problem.
However, to inform the client that the response is coming from the cache memory and
not from an authoritative source, the server marks the response as unauthoritative.
Caching speeds up resolution. Reduction of this search time would increase efficiency,
but it can also be problematic.
If a server caches a mapping for a long time, it may send an outdated mapping to the
client.
To counter this, two techniques are used.
First, the authoritative server always adds information to the mapping called time to
live (TTL). It defines the time in seconds that the receiving server can cache the information.
After that time, the mapping is invalid and any query must be sent again to the authoritative
server.
Second, DNS requires that each server keep a TTL counter for each mapping it caches.
The cache memory must be searched periodically and those mappings with an expired TTL
must be purged.
71
Types of Resource Records
DNS MESSAGES
DNS has two types of messages: query and response.
Both types have the same format.
The query message consists of a header and question section.
The response message consists of a header, question section, answer section,
authoritative section, and additional section .
Header
•Both query and response messages have the same header format with
some fields set to zero for the query messages.
•The header fields are as follows:
• The identification field is used by the client to match the response with the query.
• The flag field defines whether the message is a query or response. It also includes status of
error.
• The next four fields in the header define the number of each record type in the message.
Question Section
• The question section consists of one or more question records. It is present in both query and
response messages.
72
Answer Section
• The answer section consists of one or more resource records. It is present only in response
messages.
Authoritative Section
• The authoritative section gives information (domain name) about one or more authoritative
servers for the query.
Additional Information Section
• The additional information section provides additional information that may help the
resolver.
DNS CONNECTIONS
DNS REGISTRARS
In DNS, when there is a change, such as adding a new host, removing a host, or
changing an IP address, the change must be made to the DNS master file.
The DNS master file must be updated dynamically.
The Dynamic Domain Name System (DDNS) is used for this purpose.
In DDNS, when a binding between a name and an address is determined, the
information is sent to a primary DNS server.
The primary server updates the zone.
The secondary servers are notified either actively or passively.
In active notification, the primary server sends a message to the secondary servers
about the change in the zone, whereas in passive notification, the secondary servers
periodically check for any changes.
73
In either case, after being notified about the change, the secondary server requests
information about the entire zone (called the zone transfer).
To provide security and prevent unauthorized changes in the DNS records, DDNS can
use an authentication mechanism.
DNS SECURITY
DNS is one of the most important systems in the Internet infrastructure; it provides
crucial services to Internet users.
Applications such as Web access or e-mail are heavily dependent on the proper
operation of DNS.
DNS can be attacked in several ways including:
To protect DNS, IETF has devised a technology named DNS Security (DNSSEC) that
provides message origin authentication and message integrity using a security service called
digital signature.
DNSSEC, however, does not provide confidentiality for the DNS messages.
There is no specific protection against the denial-of-service attack in the specification
of DNSSEC. However, the caching system protects the upper- level servers against this attack
to some extent.
74
SNMP MANAGER
• A manager is a host that runs the SNMP client program
• The manager has access to the values in the database kept by the agent.
• A manager checks the agent by requesting the information that reflects the behavior of
the agent.
• A manager also forces the agent to perform a certain function by resetting values in the
agent database.
• For example, a router can store in appropriate variables the number of packets received
and forwarded.
• The manager can fetch and compare the values of these two variables to see if the
router is congested or not.
SNMP AGENT
• The agent is a router that runs the SNMP server program.
• The agent is used to keep the information in a database while the manager is used to access
the values in the database.
• For example, a router can store the appropriate variables such as a number of packets
received and forwarded while the manager can compare these variables to determine whether
the router is congested or not.
• Agents can also contribute to the management process.
• A server program on the agent checks the environment, if something goes wrong, the agent
sends a warning message to the manager.
75
Name
SMI requires that each managed object (such as a router, a variable in a router, a
value,etc.) have a unique name. To name objects globally.
SMI uses an object identifier, which is a hierarchical identifier based on a tree
structure. The tree structure starts with an unnamed root. Each object can be defined using a
sequence of integers separated by dots.
The tree structure can also define an object using a sequence of textual names separated
by dots.
Type of data
The second attribute of an object is the type of data stored in it.
To define the data type, SMI uses Abstract Syntax Notation One (ASN.1) definitions.
SMI has two broad categories of data types: simple and structured.
The simple data types are atomic data types. Some of them are taken directly from ASN.1;
some are added by SMI.
SMI defines two structured data types: sequence and sequence of.
Sequence - A sequence data type is a combination of simple data types,
not necessarily of the same type.
Sequence of - A sequence of data type is a combination of simple data
types all of the same type or a combination of sequence data types all of
the same type.
Encoding data
SMI uses another standard, Basic Encoding Rules (BER), to encode data to be transmitted
over the network.
BER specifies that each piece of data be encoded in triplet format (TLV): tag, length, value
The Management Information Base (MIB) is the second component used in network
management.
•Each agent has its own MIB, which is a collection of objects to be managed.
•MIB classifies objects under groups.
MIB Variables
76
• Simple variables are accessed using group-id followed by variable-id and 0
• Tables are ordered as column-row rules, i.e., column by column from top to
bottom.
Only leaf elements are accessible in a table type.
SNMP MESSAGES/PDU
SNMP is request/reply protocol that supports various operations using PDUs. SNMP
defines eight types of protocol data units (or PDUs):
GetRequest
The GetRequest PDU is sent from the manager (client) to the agent (server) to
retrieve the value of a variable or a set of variables.
GetNextRequest
The GetNextRequest PDU is sent from the manager to the agent to retrieve
the value of a variable.
GetBulkRequest
The GetBulkRequest PDU is sent from the manager to the agent to retrieve a
large amount of data. It can be used instead of multiple GetRequest and
GetNextRequest PDUs.
77
SetRequest
Trap
The Trap PDU is sent from the agent to the manager to report an event. For
example, if the agent is rebooted, it informs the manager and reports the time of
rebooting.
InformRequest Report
The InformRequest PDU is sent from one manager to another remote manager
to get the value of some variables from agents under the control of the remote
manager. The remote manager responds with a Response PDU.
78
79