Unit 5 CN
Unit 5 CN
UNIT 5
Application Layer
APPLICATION LAYER DESIGN ISSUES
APPLICATION LAYER DESIGN ISSUES
DNS
• To identify an entity, the Internet uses the IP
address, which uniquely identifies the
connection of a host to the Internet. However,
people prefer to use names instead of
addresses. Therefore, we need a system that
can map a name to an address or an address
to a name.
1. What is the IP
address of
PSIT.ac.in ?
It is 128.175.13.92
1. What is the
host name of
128.175.13.74
It is aktu.ac.in
Design Principles of DNS
The naming system on which DNS is based is a hierarchical and logical tree
structure called the domain namespace.
An organization obtains authority for parts of the name space, and can add
additional layers of the hierarchy
IP address (128.143.71.21)
host
(neon.tcpip-lab.edu)
3. Name server checks if it is
Hostname
authorized to answer the query.
a) If yes, it responds.
b) Otherwise, it will query
Name
other name servers, starting server
at the root tree
4. When the name server has the
answer it sends it to the resolver.
Electronic Mail
• E-mail (electronic mail) is the exchange of computer-
stored messages by telecommunication.
• E-mail messages are usually encoded in ASCII text.
• At beginning email were short and text only, today
email much more complex.
• It allows a message to include text, audio, and video.
• It also allows one message to be sent to one or more
recipients
First scenario
When the sender is connected to the mail server via a LAN or a WAN,
we need two UAs and two pairs of MTAs (client and server).
Fourth scenario
When both sender and receiver are connected to the mail server via a LAN or a
WAN, we need two UAs, two pairs of MTAs (client and server), and a pair of MAAs
(client and server). This is the most common situation today.
User agent
Format of an email
Message Formats
Header Description
BCC: E-mail address(es) which should receive blind carbon copies. This line is
deleted from all the copies sent to the primary and secondary recipients.
From: The mailbox from which the message is sent.
Return- This field is added by the final MTA and is intended to inform you how to get
Path: back to the sender. In theory, this information can be gathered from all
the Received headers (except for the name of the sender’s mailbox).
Typically it just contains the sender’s address.
Multipurpose Internet Mail Extensions(MIME)
• MIME (Multi-Purpose Internet Mail Extensions) is an extension of the
original Internet e-mail protocol that lets people use the protocol to
exchange different kinds of data files on the Internet: audio, video,
images, application programs, and other kinds, as well as the ASCII text
handled in the original protocol, the Simple Mail Transport Protocol
(SMTP)
• In the early days, e-mail consisted exclusively of text messages written in
English and expressed in ASCII.
• For this environment, RFC 822 was sufficient; it defined the headers but
left the content entirely up to the users.
• Nowadays, on the Internet, this approach is no longer adequate. The
problems include sending and receiving:
– Messages written in languages containing accents and other special
characters (e.g. French, Spanish and German).
– Messages written in languages based on non-Latin alphabets (e.g.
Hebrew, Russian, Japanese).
– Messages containing audio, images or other non-ASCII information.
Multipurpose Internet Mail Extensions(MIME)
• Separator line gives information about specific encoding. MIME is extensible -
sender and receiver agree on encoding scheme
• MIME is compatible with existing mail systems. Everything encoded as ASCII
• Headers and separators ignored by non-MIME mail systems. MIME
encapsulates binary data in ASCII mail envelope
33
HTTP Response messages
• It has three sections:
• an initial status line,
• header lines, and
then
• the entity body.
• The entity body
contains the
requested object
itself.
• The status line has
three fields: the
protocol version field,
• a status code,
• and a corresponding
status message.
34
Some common status codes and associated phrases
• Some common status codes and
associated phrases include:
– 200 OK: Request succeeded and the
information is returned in the
response.
– 301 Moved Permanently:
Requested object has been
permanently moved; the new URL is
specified in Location: header of the
response message. The client
software will automatically retrieve
the new URL.
– 400 Bad Request: This is a generic
error code indicating that the
request could not be understood by
the server.
– 404 Not Found: The requested
document does not exist on this
server.
– 505 HTTP Version Not Supported:
The requested HTTP protocol
version is not supported by the
server.
FTP: the file transfer protocol
❑FTP is a TCP based service exclusively. There is no
UDP component to FTP.
April 6, 2012
Active mode FTP
Here's a simplified explanation on how an active mode connection is
carried out, summarized in two steps.
1) A client connects from a random port on a file transfer client to
port 21 on the server. It sends the PORT command, specifying
which client-side port the server should connect to. This port will
be used later on for the data channel and is different from the port
used in this step for the command channel.
2) The server connects from port 20 to the client port designated for
the data channel. Once connection is established, file transfers are
then made through these client and server ports.
Passive mode FTP
In passive mode, the client still initiates a command channel connection to
the server. However, instead of sending the PORT command, it sends the
PASV command, which is basically a request for a server port to connect to
for data transmission. When the FTP server replies, it indicates what port
number it has opened for the ensuing data transfer.
Here's how passive mode works in a nutshell:
1) The client connects from a random port to port 21 on the server and
issues the PASV command. The server replies, indicating which (random)
port it has opened for data transfer.
2) The client connects from another random port to the random port
specified in the server's response. Once connection is established, data
transfers are made through these client and server ports.
Opening the control connection
April 6, 2012
Creating the data connection
April 6, 2012
Trivial File Transfer Protocol (TFTP)
How TFTP works?
• Trivial File Transfer Protocol (TFTP) is a simple light weight file transfer protocol, used for
transferring files over the network. This protocol is similar to FTP but supports much lesser
features and hence comes with a smaller foot print.
TFTP provides faster file transfer, as it uses UDP as the transport layer protocol
– Lesser Code size or foot print
– Ascii and binary modes of file transfer
– What TFTP does not provide
– does not provide authentication
– does not support a rich set of user interface commands
Use of TFTP
• TFTP is mainly used during device bootstrap process for downloading device OS/firmware and
configuration files. It is typically used for copying bootstrap and configuration files between nodes
belonging to the same LAN.
• TFTP is used in situations where all the features of a full file transfer protocol like FTP are not
needed.
• It is used along with boot protocols like BOOTP and DHCP to initialize devices. Whenever an IP
enabled node boots up, it gets its IP address and other device and network related parameters
through BOOTP or DHCP. As part of these parameters, the client also receives the TFTP server
address, bootstrap file and configuration file details (file name and directory location). The client
then uses the TFTP protocol to download the bootstrap image and configuration files from the
TFTP server.
April 6, 2012 17 / 37
The Bootstrap Protocol (BOOTP) is a computer networking
protocol used in Internet Protocol networks to
automatically assign an IP address to network devices
from a configuration server.
April 6, 2012 17 / 37
Remote Login: Telnet
❑ TELNET is a general-purpose client-server application
program
❑ TELNET enables the establishment of a connection to a
remote system in such a way that the local terminal appears
to be a terminal at the remote system.
How Telnet Works
Telnet uses software, installed on your computer, to create a connection
with the remote host. The Telnet client (software), at your command, will
send a request to the Telnet server (remote host). The server will reply
asking for a user name and password. If accepted, the Telnet client will
establish a connection to the host, thus making your computer a virtual
terminal and allowing you complete access to the host's computer.
Telnet requires the use of a user name and password, which means you
need to have previously set up an account on the remote computer. In some
cases, however, computers with Telnet will allow guests to log on with
restricted access.
April 6, 2012 18 / 37
Remote login
April 6, 2012
Simple Network Management Protocol
(SNMP)
❑ SNMP is a framework for managing
devices in an internet using the
TCP/IP protocol suit
❑ The manager is a host that runs the
SNMP client program.
❑ The agent is a router or host that
runs the SNMP server program
April 6, 2012 30 / 37
Simple Network Management Protocol
(SNMP)
❑ Simple Network Management Protocol (SNMP) is an
application–layer protocol defined by the Internet
Architecture Board (IAB) in RFC1157 for exchanging
management information between network devices. It is a
part of TCP⁄IP protocol suite.
❑ SNMP is one of the widely accepted protocols to manage
and monitor network elements. Most of the professional–
grade network elements come with bundled SNMP agent.
These agents have to be enabled and configured to
communicate with the network management system (NMS).
April 6, 2012 30 / 37
April 6, 2012 30 / 37
Components of SNMP
❑ SNMP Manager
❑ Managed devices
❑ SNMP agent
❑ Management Information Base (MIB)
SNMP Manager:
A manager or management system is a separate entity that is
responsible to communicate with the SNMP agent implemented
network devices. This is typically a computer that is used to run one
or more network management systems.
SNMP Manager’s key functions
•Queries agents
•Gets responses from agents
•Sets variables in agents
•Acknowledges asynchronous events from agents
Managed Devices:
A managed device or the network element is a part of the network that requires
some form of monitoring and management e.g. routers, switches, servers,
workstations, printers, UPSs, etc...
April 6, 2012 32 / 37
Components of SNMP
❑ SNMP Manager
❑ Managed devices
❑ SNMP agent
❑ Management Information Base (MIB)
SNMP Agent:
The agent is a program that is packaged within the network element.
Enabling the agent allows it to collect the management information
database from the device locally and makes it available to the SNMP
manager, when it is queried for. These agents could be standard (e.g. Net-
SNMP) or specific to a vendor (e.g. HP insight agent).
April 6, 2012 32 / 37
April 6, 2012 32 / 37
Management Information Base (MIB)
❑ Management Information database or Management Information
Base (MIB)
❑ Every SNMP agent maintains an information database describing the
managed device parameters. The SNMP manager uses this database
to request the agent for specific information and further translates the
information as needed for the Network Management System (NMS).
This commonly shared database between the Agent and the
Manager is called Management Information Base (MIB).
❑ Typically these MIB contains standard set of statistical and control
values defined for hardware nodes on a network. SNMP also allows
the extension of these standard values with values specific to a
particular agent through the use of private MIBs.
❑ In short, MIB files are the set of questions that a SNMP Manager can
ask the agent. Agent collects these data locally and stores it, as defined
in the MIB. So, the SNMP Manager should be aware of these standard
and private questions for every type of agent.
April 6, 2012 33 / 37
Management Information Base version 2 (MIB2)
April 6, 2012
X.25
X.25 was a standard suite of protocols used for packet-switched
communications over a wide area network—a WAN. A protocol is an
agreed-upon set of procedures and rules. Two devices that follow the same
protocols can understand each other and exchange data.
X.25 was developed in the 1970s to carry voice over analog telephone
lines—dial-up networks—and is one of the oldest packet-switched services.
Additionally, instead of using variable-length packets like Ethernet and Internet Protocol
does, ATM utilizes fixed-sized cells to encode data. These ATM cells are 53 bytes in
length, that include 48 bytes of data and five bytes of header information.
Each cell is processed at their own time. When one is finished, the procedure then calls
for the next cell to process. This is why it's called asynchronous; none of them go off at
the same time relative to the other cells. The connection can be preconfigured by the
service provider to make a dedicated/permanent circuit or be switched/set up on
demand and then terminated at the end of its use. Four data bit rates are usually
available for ATM services: Available Bit Rate, Constant Bit Rate, Unspecified Bit Rate and
Variable Bit Rate (VBR).
Without routing and with fixed-size cells, networks can much more easily manage
bandwidth under ATM than other technologies like Ethernet. The high cost of ATM
relative to Ethernet is one factor that has limited its adoption to the backbone and other
high-performance, specialized networks.
ATM Protocol Architecture
Example Networks
National Science Foundation Network (NSFNet)
The National Science Foundation Network (NSFNet) is a wide area network that was
developed by the National Science Foundation to replace ARPANET as the main
network linking government and research facilities.
NSFNet was a major force in the development of computing infrastructure and
enhanced network services. By making high-speed networking available to national
computer centers and inter-linked regional networks, NSFNet created a network of
networks, which laid the foundation for today's Internet.
NSFNet was dismantled in 1995 and replaced with a commercial Internet backbone.
Example Networks
USENET
Usenet is a worldwide system for Internet discussion that consists of a set of
newsgroups that are organized by subject. Users post articles or messages to these
newsgroups. The articles are then broadcast to other computer systems, most of
which now connect via the Internet. Usenet was conceived in 1979, making it one of
the oldest network communications systems still in use today. It is also the
predecessor of many of the forums online today.
Usenet got its name from Unix-to-Unix Copy (UUCP), a protocol suite for sending
data, usually over a dial-up network. Initially, this was the dominant mode of
transmission for Usenet, but it has since come to rely on the Internet.
Some newsgroups are moderated, which means that posts are sent to a moderator
for approval before being distributed to the group. Usenet users exchange articles by
tagging them with universally recognized labels. Many Internet service providers and
Internet sites provide news servers, which allow their users to handle Usenet
articles. Although Usenet is still used, it has become less important in the face of
online forums, blogs and mailing lists.
Example Networks
NICNET
NICNET(National Informatics Centre NETwork – NIC network)
❑ Conceived in 1973 & commissioned in 1977
❑ NIC (National Informatics Centre) is an organization set up by the Govt. of
India in 1977
❑ NIC has set up a satellite-based nation-wide computer-communication
network, called NICNET
❑ The world's largest Satellite based Computer communication network.
❑ Providing information exchange services – b/w Government and
Corporate sector organizations,
❑ NICNET services include File Transfer, Electronic Mail, Remote Database
Access, Data broadcast and EDI
❑ NICNET has served as the basic message communication facility in the
calamity-affected areas
Example Networks
ERNET
ERNET (Education and Research NETwork)
Initiated in 1986 by the Department of Electronics (DoE)
With funding support from the Government of India and United
Nations Development Program (UNDP)
Involving eight premier institutions as participating agencies
-- NCST (National Centre for Software Technology) Bombay,
-- IISc (Indian Institute of Science) Bangalore,
-- IITs (Indian Institutes of Technology)
-- and the DoE, New Delhi
Objective: The objective was to create expertise R&D and education in the
country in the area of networking and Internet in the country”
ERNET India in partnership with University Grants Commission is setting up
UGC-Info net.
MOU with AICTE to provide connectivity to AICTE Recognized Colleges
and Regional Centers..
Indian Council for Agriculture Research-Net
A VPN (Virtual Private Network) is a service that creates a private, secure
network over a public one – like the one you’re using right now, for instance.
Once you connect through a VPN, all your traffic becomes encrypted and your
IP (Internet Protocol) address gets replaced with the address of the VPN server.
Basically, nobody will manage to track your online traffic.
As a result, your personal information and online activities remain private and
secure. Plus, using a VPN also means that:
•You can overcome geo-restrictions
•You can enjoy true online anonymity
•You can freely speak your mind online