Вы находитесь на странице: 1из 49

NETWORK

PROTOCOLS
by: SHELANIEJEAN L. LIM
DWCB BSIT Professor

Network Protocols
A protocol is a set of rules and conventions for
sending information over a network.

Protocols may be in ASCII (characters) or in binary.


Protocols are established by international agreement and

ensure that computers everywhere can talk to one another


Different programs can use different protocols.

A Network Protocol are guidelines that

regulate the following characteristics of a


network: access method, allowed physical
topologies, types of cabling, and speed of data
transfer.

Who invented the Internet


Protocol?
In a research paper published in 1974,Vinton
CerfandRobert Kahnproposed a protocol
they called "TCP".
Cerf and Kahn didn't realize it at the time, but
the protocol they invented would later
become IP, the official network-layer protocol
of the Internet.

TCP/IP
The term "TCP/IP" is normally used to refer to a whole suite
of protocols, each with different functions.
TCP/IP is also used on many local area networks.

TCP is the means for creating the packets, putting them back

together in the correct order at the end, and checking to make sure
that no packets got lost in transmission. .A port number is
always between 1 and 65536, inclusive
Internet Protocol (IP) is the method used to route information to
the proper address.
The logical addresses in the TCP/IP protocol suite are called IP
addresses.
Note that IP does not make physical connections between computers
but relies on TCP for this function. IP is also used in conjunction with
other protocols that create connections.

TCP Header Layout


Each TCP header has ten

required fields totaling 20


bytes(160bits) in size.
TCP headers and UDP
headers each contain a set of
parameters
calledfieldsdefined by the
protocol technical
specifications.
TCP inserts header fields into
the message stream in the
order listed above:

Border Gateway Protocol


(BGP)
BGP (Border Gateway Protocol) is aprotocolfor
exchanging routing information
betweengatewayhosts (each with its
ownrouter) in a network ofautonomous
systems.
BGP is often the protocol used between
gateway hosts on the Internet. The routing
table contains a list of known routers, the
addresses they can reach, and a costmetric
associated with the path to each router so that
the best available route is chosen.

UDP
User Datagram Protocol (UDP) is used

together with IP when small amounts of


information are involved.
Alternative to TCP.
It is simpler than TCP and lacks the flow-control
and error-recovery functions of TCP. Thus, it uses
fewer system resources.

A datagram is almost the same as a packet except


that sometimes a packet will contain more than one
datagram.

ICMP
Internet Control Message Protocol (ICMP)
defines a small number of messages used for
diagnostic and management purposes.
It is also used byPing and Traceroute.

Mail Protocols POP3


Post Office Protocol(POP) is the most common

protocol used by PCs for receiving mail.


It is now in version 3 so it is called POP3.
Email clients require an address for a POP3 server
before they can read mail.
is the mailbox protocol of the Internet and allows users
to download mail from a mail server. The server will
hold onto your mail until you access it. Once you try to
access it, your client software will download all of your
incoming mail and wipe it from the server. POP3
operates onTCP 110.

SMTP
Simple Mail Transfer Protocol (SMTP) is the
most common protocol for sending mail.

is thepostman of the Internet.


The SMTP and POP3 servers may or may not be the
same address.
A more powerful protocol for reading mail is
Interactive Mail Access Protocol (IMAP). This
protocol allows for the reading of individual
mailboxes at a single account and is more common
in business environments.

IMAP also uses TCP to manage the actual


transmission of mail.

HyperText Transfer
Protocol
HyperText
Transfer Protocol - An Internet-based protocol for

sending and receiving webpages. It usesTCP 443, to securely


transfer HTTP data via SSL (Secure Socket Layer). Sites that require
increased security, such as an online merchant, use HTTPS to protect
user information. (Note: TLS (Transport Layer Security) is the newer
SSL).
Hypertext Markup Language (HTML) is a standard method of
constructing Web pages.

An HTML page is transmitted over the Web in a standard way and format
known as Hypertext Transfer Protocol (HTTP). This protocol uses TCP/IP to
manage the Web transmission.
HTTP is called astatelessprotocol because each command is executed
independently, without any knowledge of the commands that came before it.
This is the main reason that it is difficult to implementWeb sitesthat react
intelligently to user input. This shortcoming of HTTP is being addressed in a

HTTP Status Codes

404 error- "404 File Not Found" is a common HTTP

status code. It means the Web server cannot find the


file you requested. The file -- the webpage or other
document you try to load in your Web browser -- has
either been moved or deleted, or you entered the
wrong URL or document name.
502 Bad Gateway error is anHTTP status codethat
means that one server received an invalid response
from another server.
The Bad Gateway error can be customized by each
website. While this isn't very common, different web
serversdo describe this error differently.

File Transfer Protocol


File Transfer Protocol (FTP) is a standard network

protocol used to transfer computer files between a


client and server on a computer network. Operates
onTCP ports 20(data) /21(transmission control).
It is an old protocol and is used less than it was before
the World Wide Web came along.
It can also be used for downloading from the Web but,
more often than not, downloading is done via HTTP.
Sites that have a lot of downloading (software sites, for
example) will often have an FTP server to handle the
traffic. If FTP is involved, the URL will haveftp:at the
front.

SFTP
SFTP(Secure FTP) is a version of FTP that

uses SSH (Secure Shell) to transfer data


securely, thus using whichever port SSH uses.
Port 22for those who can't figure it out.

TFTP
TFTP(Trivial FTP) is a UDP version of FTP that

utilizesUDP port 69.


It is calledtrivial because it is relatively
unreliableand inefficient and so is more often
used for inter-network communication (along
routers) than in real node-to-node file transfers.

Telnet
Telnet(Telecommunications Network) is used

to remotely connect to a node.


All communications with telnet are in clear
text (even the password for authentication)
and should not be used in sensitive situations.
It is called terminal emulation software
because the remote terminal is available upon
connection. Telnet operates onTCP 23.

SSH
SSH (Secure Shell) is a secure replacement of

Telnet.
Telnet transfers information in plain or clear text, but
SSH allows terminal emulation in cipher text, which
equates to enhanced and increased security.
SSH operates onTCP 22.
NOTE: Ciphertextis encryptedtext. Plaintext is what
you have before encryption, andciphertextis the
encrypted result.

NNTP
NNTP(Network News Transfer Protocol) is a

protocol used by client and server software to


carry USENET (newsgroup) postings back and
forth over a TCP/IP network.
NNTP operates onTCP port 119.

LDAP
LDAP(Lightweight Directory Access Protocol) is

aDirectory Services protocolthat basically


allows a server to act as a central directory for client
nodes.
A famous implementation of LDAP isMicrosofts
Active Directory(Domain).
LDAP operates onTCP and UDP 389

NTP
NTP(Network Time Protocol) allows for

synchronizing network time with a server.


NTP operates onUDP 123.

SNMP
SNMP(Simple Network Management

Protocol) .
A protocol for managing devices on IP
networks, such as modems, switches, routers,
or printers.
It works onUDP 161.

IMAP4

IMAP4(The Internet Message Access Protocol) is a

slightly better version of the mailbox protocol.


IMAP4 allows for server-based repositories of sent
mail and other specialized folders. Basically, when
using IMAP4 instead of POP3 as yourincoming mail
protocol, you download very minimal information to
your local machine and when you want to access
actual incoming mail, you are pulling this directly
from the mail server.
This allows you to access your mail from virtually
anywhere (like yahoo mail). IMAP4 operates onTCP
143.

DHCP

The Dynamic Host Configuration Protocol (DHCP) is a

network protocol used to assign IP addresses and provide


configuration information to devices such as servers, desktops,
or mobile devices, so they can communicate on a network using
the Internet Protocol (IP).
A DHCP server, which receives clients requests and replies to
them.
A DHCP client,which can be bundled with the operating
system of aclient computer or other IP capable device and
which sends configurationrequests to the server. Most devices
and operating systems already haveDHCP clients included.
A DHCP relay agent, which passes DHCP requests from one
LAN to another so that there need not be a DHCP server on
every LAN.

DNS
DomainNameSystem(orServiceorServer)

is an Internetservice that translatesdomain


namesinto IP addresses, into terms understood
by humans (such as Domain Names) and viceversa.
Domain names are alphabetically arrange (for
easier to remember). The Internet however, is
really based onIP addresses. Every time you
use a domain name, therefore, a DNS service
must translate the name into the corresponding
IP address. For example, the domain
namewww.example.commight translate to

DNS

DNS implements a distributed database to store

this name and address information for all public


hosts on the Internet. DNS assumes IP
addresses do not change (are statically
assigned rather than dynamically assigned).
The DNS database resides on a hierarchy of
special database servers. When clients like Web
browsers issue requests involving Internet host
names, a piece of software called the DNS
resolver(usually built into the network
operating system) first contacts aDNS server to

DNS
Some people call DNS the "phone book of the

Internet.
The Internet utilizes DNS as a worldwide name
resolution service for public Web sites.
DNS serversare installed and maintained by
private businesses and Internet governing
bodies around the world.

SUMMARY
In order for computers to communicate with

one another, standard methods of information


transfer and processing have been devised.
These are referred to as "protocols" and some
of the more common ones such as TCP, IP,
UDP, ICMP, POP, SMTP, HTTP, and FTP, DHCP,
DNS.

Assignment
Research on other well-known ports/number

aside from what we have discussed in the class.


(20 ports minimum).
Network monitoring and security
Port monitoring and management

Definition and utilities

Registered ports: (30 ports minimum).


Define specific use.
-

Short bond paper


Single space with title page/cover
Due on Feb. 22, 2016

Quiz

1. TCP stands for


a)Transmission Control Protocol
b)Trivial Connection Protocol
c)Telephony Connection Protocol
d)Traffic Control Protocol

2. UDP stands for


a) Universal Data Protocol
b) Unreliable Datagram Protocol
c) User Datagram Protocol
d) Ultimate Data Protocol

3. Which of the following higher-level


protocols operate on top of TCP?

a) FTP
b) HTTP
c) SMTP
d) all of the above

4. Which of the following higher-level


protocols typically operate on top of
UDP?

a) ARP
b) DNS
c) Telnet
d) all of the above

5. UDP offers which of the


following benefits relative to TCP?

a) UDP consumes fewer computer resources

by not maintaining connection state


b) UDP supports a self-regulating "throttle"
feature that prevents network saturation
c) UDP guarantees that individual packets of a
transmission will arrive "in order
d) none of the above

6. TCP offers which of the following


benefits relative to UDP?

a) TCP allows much larger packets to be sent


over the network, improving application
performance
b) TCP includes a "retry" mechanism to
prevent missing (dropped) packets
c) TCP uses a smaller header than does UDP
d)none of the above

7. The logical addresses in the TCP/IP


protocol suite are called _______
addresses.

a) port
b) IP
c) Email
d)TCP

8. What is the function of


HTTP?
a) It enables files to be retrieved from web
servers.
b) it provides a mechanism for time
synchronization information to be
communicated between host.
c) it enables virtual terminal sessions to be
opened on a remote host.
d)It resolves NetBIOS names to IP addresses.

9. What is the function of


NTP?
a) It provides a mechanism for the sharing of

authentication information.
b) It accesses shared folders on a linux system
c) it enables virtual terminal sessions to be
opened on a remote host.
d)It resolves NetBIOS names to IP addresses.

Answer

1. TCP stands for


a)Transmission Control Protocol
b)Trivial Connection Protocol
c)Telephony Connection Protocol
d)Traffic Control Protocol

2. UDP stands for


a) Universal Data Protocol
b) Unreliable Datagram Protocol
c) User Datagram Protocol
d) Ultimate Data Protocol

3. Which of the following higher-level


protocols operate on top of TCP?

a) FTP
b) HTTP
c) SMTP
d) all of the above

4. Which of the following higher-level


protocols typically operate on top of
UDP?

a) ARP
b) DNS
c) Telnet
d) all of the above

5. UDP offers which of the


following benefits relative to TCP?

a) UDP consumes fewer computer resources

by not maintaining connection state


b) UDP supports a self-regulating "throttle"
feature that prevents network saturation
c) UDP guarantees that individual packets of a
transmission will arrive "in order
d) none of the above

6. TCP offers which of the following


benefits relative to UDP?

a) TCP allows much larger packets to be sent


over the network, improving application
performance
b) TCP includes a "retry" mechanism to
prevent missing (dropped) packets
c) TCP uses a smaller header than does UDP
d)none of the above

7. The logical addresses in the TCP/IP


protocol suite are called _______
addresses.

a) port
b) IP
c) Email
d)TCP

8. What is the function of


HTTP?
a) It enables files to be retrieved from web
servers.
b) it provides a mechanism for time
synchronization information to be
communicated between host.
c) it enables virtual terminal sessions to be
opened on a remote host.
d)It resolves NetBIOS names to IP addresses.

9. What is the function of


NTP?
a) It provides a mechanism for the sharing of

authentication information.
b) It accesses shared folders on a linux system
c) it enables virtual terminal sessions to be
opened on a remote host.
d)It resolves NetBIOS names to IP addresses.

10. Which of the following


are considered transport
protocols? (Choose the two
best answers.)

a.TCP
b.IP
c. UDP
d.NCP

Вам также может понравиться