0 ratings0% found this document useful (0 votes) 57 views35 pagesACN - 5. Application Layer Protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
ACN (22520)
— CHBPTER + 05.
_APPEICATION
RE
_ PROTOCOLS\Worip Wrpe Wee C WWW) —
— World Wide Web, Which is also Known
as a Web-
“xt ts a collection of websites or Web
stored fn web servers and
pages
computers through
connected ‘to ‘local
+ne Internet:
— “Thee Websites contain text pages, digita)
Images, audfo, video, ete.
“Invented by Tim Beiners-Lee in 198g.
song af vast (a Architecture)
Web rage Bi ation
_ -The cifent wants to see Some inform
that pelongs to Site t-
sy sends a requeit through its browser
4o the server at stte 2-
“the server at site t Finds the document
and sends it to, the cifent
A Cilent (Browser) §-
—Web Browser is q program, which
ts used to communicate With
Web sernrer on the Jotenet
x Server $=
=A computes Which Is avaliable
oy the herwork rejources amd
provides cervice to the other
compurer of request Ts KNOWN
As q Server.
stored Web Pages are stored
ar the server.
x Uniform Resource Locator CURL) =
— DH fs q standard for speditying omy
Kind of tnformatHonm on the Inteme
— URL consists of Four parts g~ O Protocos
® host computer @® Port @ Path.* Web Documents 2—_
A Web pécument fs am electronic document
that Ps pact of the blond Wide Web (www)
and fs accessed. Via q URL Cunieorm
resource: locator).
°
— Grouped Into three categories 3
@ Static Documents
® pynamic pocments
@ Pdivye Pocuments
°
—Web Pdge tnat displays the
Same ‘inkdrmation to al) users
— Contents ‘do Not change
— For eg's— Blog websites
N ews|etter contents.
Q) Dunamic Documents $~
Websites geneyate content
Automatically based on the uses,
comtents dre updated.
— For eg 2— Facebook
Instagram
Netetix,ye oS
x Common Gateway inten face, Cat
= Widely used Fecknology For
bufidiag dynamic web documents
Is Known as the common
Gareway Interface
developed by Nationa] center
for Supercomputer Applications
CNCSAD.
G)_ Active Docuiments =
—Wleb,, Document fs co computer
; program . that runs on a browses
and fnteract pith the use.
~ Hor, tqtr —~Geogle pecs
Google Workspace.« Hypertext Transfer Pratacal (HTTPD
— tt 4s a protocol used to access the datq on the
Wald Wide Web (WWW).
~ The HTTP Protoco} can be used to transfer the
data in the form of plain text, hypertext,
audio, Video amd so om,
™ The). HTTP. Isr.a Application layed protoco) used
Mainly to acres data on the World Wide Web.
x HTTP Response Message format 2—
Status Une
Headers
A_blank line
Body
Cpretent oly 19
some messages)
1 ee
(1) Status line 3-
— Status Une shows status for +e response
it Indicates. relponse status
~ For @gi- HITP/I-1 200 OK(2) Headers o-
7 “three type of h
ty HTTP Response merrcge
#fo\lowws.
eaders are prevent
Which are as
@ Genera) Header s—
“the General
' Gnformation about
lend cam be present ™m both 4
requet and a response.
Header gives general
e message
For &gi- pate: mMon,27 Tul 2009 1636s GIT
@, Response Header g— :
~ The Response Header com be pretent
only in a response message.
— specities server spedification and
configuration.
for egt Server: frpache /2.214
@® Entity Header a
— The @ntity Header gwes
thformation about the body of
the docairment-
for e.g 3- Coment-Length : 8g
Coment ~Type : text] html.C3) Blank line 2-
—fn empty line ‘indicating the end
of tne heade Fields
«) Body 3-
- contains actual content
@ Data connection.
(1) Contro| Connection g-
~—uses very Simple Aules For communtcatfon.
We can transfer a line of command
Or \Ine of reponse ata Hme.
- The control connection
the contro) procetses.
ts made benrween
‘The contro] connection remains connected
clung the entire fnteractive prp
session.
— ‘for sending user identiticaton, peusword
commands +o store Files, ete
FTP maker Lue of contro) connectionco) Datta connecHon 3-
- The paty connection uses Vey complex
rules as data types may Vary.
— ‘The pata connection fs made berveen
data transfey Processes.
-— The ‘datq connection opens when a
command: come for transferring the
files amd close: when tne File ts
Atansterred .
— inttated on part number 20.
k Transmission Modes of PIP &-
© Stream Mode.
@ Block mode
@ Compressed Mode.
(4) Stream Mode s-
—This 4s called a default mode.
~ In +his mode, data transforms from
Fre to top fin the form of stream byles
Here TeP fc relponsibie -for Aragmenttng
datq fnto small
Segments(2) Block Mode ¢= —
— Transforms datq from one host to
anotnes In the! form oF blocks
each block preceded by 4 B-byte heade,
= Fine byte conrains all im form ation.
- otha two conta\ns sine.
(2) Compressed Mode %-
=F As) used fn case! of btg File size.
-~ ZF fle size fs big, it camno4 Send
eves the internet connecHon because
oF size’ Wroie
— IN compresses) Mode, alarge fle 1s
Compressed IMro Smal] size ome then
sends ONG the tNtennet“Trivial Fle Transfer ProtacolCtFTP)
— TFTP stands for Trivfali file Transfer
Protocol.
~ “TRTP fs used to transfor a File efthe
from cifent to server or Rom sever
to c\fent without the need of Frp
Feature.
— Software of TETP fs Amalie, than FTP
— TRTP works on 69 fart numbe).
TEP Meseqgeg fe
@ Read request (Type L)
® wotte request (Tupe 2
® pata (Type 3)
@ PeKnonledgement (Type YD
Read request(Typet) 3-
~— de Is wed by the clifent to get 9
copy of q File from the Server
(22 Waite. request Ctype 29 t-
~ thts commend is used by the
client to walte aq tile being
copied#e data.
contatns blecKk °
data of Fixe?
| stze. of (2 octers.
(4) Acknowledgement Ctype 4
— Received data.
x Difference i- FTP and
ma
stands for file Transfer’
Protocol
software fs larger
CETP:
Stands for Trivial Pie |
transfer Protocol. |
software fs smMalle.
Works on to ports: 20
and 3}
FTP services are provided
by TOP
cornplexity is High
many commands or
messages: in FTP
3 |
Works on 69 Poot
Numbe). |
TFTP Services are provided
by -UpP. :
Complexity ts lese
only & macage in
“TFTP-
Need Authenticaton
Doe not need Authenticate,° °
& Electronic Mai}
~ Electronic mat) allows message to include
text, audio, and video.
— DH allows one Message to be sent to one
Or More rectpfents.
* Architecture of F-maf] 2=
~ four scenaxios.
— begins. with sfmplat struation and
add complextry as we: proceed.
G) First Scenario 8=
=n thé €iret sceniaxio, the sender and the
receive) of the e-mail are users on the
Same systems) they are dfrechy connected
tog. shared system
— “The administrator has) created’ one mailbox
Hor each User Where ane received Meisages
are stored.
— fF mailbox fs paxt of a loca) hard’ drive,
a. special, Ale. With permifsston vertrictions
- omy he owne of the Mailbox has arceis
to it(2). Second Scenatia -—
4 scenaxto, 1
emai} are users
gender amd
“In the Secon ‘
4ne veceiver ©
om -Hwo Afferent systems
e sent Over
# the
| — ~The message needs to’
the “tnternet-
— Here, We need user agents CUA) and
Message transfer agents CMTAS).
(32 “Third Scenario o-
— Directly connected, to ‘System
— Either connected to the System via 9
‘point-to-point WAN; such asq dial-up
Modem, or cable Modem er ts connected
| dog LAN in am organization that uses
one mail server For handing emafls
C4): Fourth Scenario 3—
~ connected’ to coaf\ server by WAN ora LAN
~ need cmotner set of client}senver agents,
whfch We cal) MEsage acces agents (MAAS)
- use am MAA clfent to retrieve bis
MOsages.USER AGP NTE
A user Agent ts q software package Cprogram)
that composes, reads, replies to, amd
forwards mersages.
— TH also handles mat) box,
« Services provided by a User Agent 8-
()_Compasing Messages 3~
—A User agent helps the user to compose
an e-mafl mesage to be sent out
(2) Reading Mersages o—
— The second duty of the user agenk Is
to read the! tocomtng messages
(2)_Repiying to Mlerager
~ Réeter reading a Menage, a user Can
use me user agent to reply fo a message
(Y Forwarding Mersager §
—Porwarding is de#ined as sending the
Message to q third party.« User Agent Types —
® command + Priven
@ Gui-Based Modem.
@_ Command -priyen_a-
— Belongs to eatly days of electronic
maf}
= "FF command-driven user agent
hormally accepts a one character
command from the beyboard to
perform tts. task
(2)_ GUI. Based Madem 3-
8
— GUE -Based
~ Mey contain graphical -User
Interface CGUT) components that
Allow the User to interact
with che. Software,
Es gaphical. components. atch as icons,
meny vax end windows +nat
make tne services easy to accessPrine SeChg wre
CPescrfhe Ematl secutty over non-secured channel)
— Emath secuetty qescrfoer aiPrerent teebniques
for Keeping sensitive information ‘in ema}
communtcation and aqreceounts secure agains
unauthorfred access, loss
— Email allows attackens to use Wasa way
to cause problems fn attempt to profit
— most erganiration rely on emaitis to do
business, attackers exploft email In am
Attempr to steal sensttive fntormasion.
— Email is an open ermat, it can be vPewed
by anyone who Can frercept Tt
— Emall securthy Pporpcies Can be: ettabitshed
by viewtag -the contents of ematis ALowing
‘through -tneir emat) serves.
-— Enterce emat| NSYPHoON poltcies to prevent
sensitive email tMhtommahon Rom Failing
into -the wreng hamds_ epapp ts a mechanism for exchanging email
messages between servers.
smtp is a protoco) for tr
ansmttting ornd
receiving email
messages.
SMTP Process Initiates a connection
Ahrough port 25 :
_— me actual mall aramser Is done trough
message transfer agents CMTASD.
- To send mai), gq system must have the
clfent
MTA, and to rece?ve mail, a system
must have a server MTA-MAIL TRANSFER
© Connection setup
© Mati Transfer
HASES
@® connection Termination.
@ Connection Setup $-
— AN SMTP sender wl) amempPr 4o ser up
atep connecHon With actarget host
when t& has one or more mati) measage
4o deliver to +nat best:
(2) Mag) “Transfer 3—
— once tne connection hai been estabitshed,
the smTP sencdey May send one or more
Message) tO the SMTP receive.
—-There are three logica) phase: to the
AramPer of AMesage s—
CDS MPLL’ command Identifia originator
of the meisage-
(2) one ov More ©RCPT) commands Idennty
reciptents of this Mesage.
@ “DATA? command tromsfers the message
text3) Connectfon Ter minatfon s—
—-The sender sends 9 QutT command
to Temtaaie , the connechonPb
| Post Orerce Protacon roe
— Post office Protoco} (PoP) fs an Pppifcattoo
layer Protocol,
— “H ts useq by clifents For renfeving
emafis
—- Por AVlouws downloadfng message trom
Your Inbox to your toca) Computers.
MOsHYy Used Version Ts POPS.
— The need for PoP. matniy arfses When the
use, on dfent doe; nor haye'q Continuous
Internet connection
— “THE POP cifent Mahe use of Pop to pull
emai) Message Fram tne PoP server
* POPZ has HWo: Modes s— (the delete mode
@ the keep mode
WZ the delete mode s—~ the mal ts deleted
From the mailbox atten
each retreival.
(2) the Heep mode 3— the Mall remains m the
Mailbox atte, retrievalTreaner Mae Access FROTOC
CIMAP)
re
— =amapy fs stenttove 4° pops, bud Te hay mo
more
feorurel ; LMAPY ts more pow) erful and
complex.
EMAPY provides) the Following) extra Functions &
QA user can’ check’ she erat) header prot
+o downloading,
@ p ver cam search the contents ef the ennai]
Aor apecific ping ef ‘characters pitas to
downloading.
@. A we can. create, delete or rename mailboxe
ox the mail seve).
@ A we can: create q’ hearchy OF mailboxes
in gq Folde) For e-Mail Atoroge-MULTTPURPOSE “TNTERNET—
MATL EXTENSIONS (MIME)
_- MIME stands For (multipurpose pkeinet
Mall extensions)
used tnternet standad tor
— This Widely
y Files to send therm & e-mat)
coding binax
attachments ove the Tntenet -
message to contain
— MIME allows an Ernat |
ora sound ond
fe Such as a video fmage
iy provider oo mechanism to xranster’ & NON-
texr characters tO text cha racress.
A OTIME speci#fcattons 6
O message Headey Fields &-
@ content Formats
® transfer encodtng.Compie NeTWoRK MANALERIEN
“re | protocol CSNDPY
— IF am organfeation has 1000 oF devices
then to check al) device, one by me
Ney day, are working propety or not is
a hectic task,
— To ease thee up, SNMP Is wed.
— Wed to monitor the network, derect
newwork Faultr, and semetime even wed
to covfiquie remote devices.
— SNMP har HOO Components, Manager and
agen:
-me manage Wa host that controls
and moniters a set of agents such a
toutersDOMAIN Name Space (Dna)
-— DNS stay
Nds For Domain Name Space.
— Af Doma
. ™ Name Space ts q hierarchf ca}
Ss .
Mure thot ,ergantia and tdentide
OM the Tnterner
PNS is q System that allows Wers to
domatn name
access
Website by wing Names that are easfes
to remembe) than SP addresses.
—The Domafn name Space fs divided tnto
three different Sections 8—
© Generic pomato
@ country pomatn
@ averse poratn.
@) Generic: Pomatn 3—
—dertines registered hosts according
to thelr genecic bebaviour.
— or eg b- -comlcommercta]
eedu C educational)
emit Cmiitay)
(2) Country Domain 3—
=~ sr use two-character country
_ abbreviations
~ sinCindia
2Us
suk.st 7
: q 4
‘
exse aomatn 3
_ ze we want +o tno
domam name on
th the Mapping
od the ip ad drese
“IN
@) w what Is the
he website.
~ ‘prs can provide bo
for example “to Fi
of google-com |
#& Need of Domain Name system s~
@ since TP addvese are difPiaut +o remembe)
and name are ‘easle to remember pomain
Neime system fs wed. casd, pits Serres
@® pns servers are wed For “converting thee
Names {nto IP addresses.
@ large number to hosts and servers conn ected
fh the FOteMet can be classified wing
Pomai
Main Name system so 4rat hf erarchtca)
naming system is Implemented,
@® wed for mapping can map & name to an
addressDYNAMIC HOST CONFIGUR:
ATION. PROTOCOL (DHCP)
DHCP fs q nerwoik Management proteco}
that Is Wed 4o dynamically cusign the
P address.
— “In addition to the tP, address, the DHCP
A\co assigns tne subnet masks, default
goreway amd domain name server CONS)
address.
— PHcP port numbe Aor server fs 67 ond #or
ane clhent is, 685
#® DHCP Operations: 3
@® DHCP discov ay
DHCP offer
DHCP Requeit
DHCP Acknowledgement:
DHCPNAK
DH CPPECLINE
DHCPIN FORM.
®B®HQSOUOo_,
ee) ¢ .
~The pHCP cfent broadcasr MESAge
to dfscoves the DHCP Ser ers.
@Q) DHCP Offer s-
~ when the DHCP server receive! the
DHCP Discover message then it suggets
or offers an LP address +o the clfent
by sending a DHCP offer Measage to
the client:
@ DHCP Requert 3-
~IN Most cases, tne cifent can receive
multiple DHCP ote, because fn gq
network there are Mony DHcp servers
— The. cfeat: ‘wry
accept emiy one
PHCP offer.
(A DHCP Acknowledgement 3-
—The server then sends Acknowledgem
40. the client come@rming tne pcp
lease +o the clfent-
GO_DHCPNAK s-
—this Presage tectre-excact—oppasite
+0
- This message Is sent by the DHcP
server When it is not able to Sansty
Ane DHCPREQUEST Message from the
client -©) DHcPDECLINE
DECLINE
—Tthis Meisage fs sent fom the PHCP
afent to the server’ iy core the client
Finds that the IP addres assigned
by HCE server ts already tn use.
CDH CPINFORM 3
~Thfs message fs sent by the pHer
afent fn case: wants to teminateREMOTE LOGIN — :
(4) “PE PNER ee
7, more
_ -Telnet provides 9 connecHom to the re
compurer In such o Way that gq local
terminal appears tojbe at’ tne remote Side.
— DB is an Application Protoce) that provide
accelsi to virtua) +ermfnals of remote
sycrems OY local areq neroores or Intemet-
Logging in TELNET 2-
O loca} togin
@ Remote login.
(D local login 3—
- Whenever a user logs into It local
system, 1 Is known as local login
©) Remote login 3—
~ Remote login is a process in which
Users cam log in to a remote cite.A MdotKing of pine
TEWET ts q cMfent-server applf cation that
AMouss og User! 48" 10d! Sa Oe Bee pe,
Machine, giving -+he user access to the
Fernote Sgstem),\ +) | oy tt te
— “The user sends the keystrorer to the
teminal driver, where the local operating
System accepts tne characters ‘but doey not
interpret them.
— A temfoa arrive correchy ‘IMterprets the
Keystrokes oO the local termfnay or terminal
emulator | roe
— The chardetes dre sent +o the TELNET client,
which nansforms -the characte td qd wivenal
character set Called Network Virtual terminal
CNVT) characters
— “Tne commands or text, iM NVT -foxm; travel
through. the Fotexner amd avive at the
Tepe 1ep AtacK «at the remote machine.
— Here the characters are delivered to tne
opercatng system “amd pused +o the TEINET
server, which change the characters +0 the
Correiponding characters understandable by the
remote compute),NetWork VIRTUAL TERMINAL
— NVT ts am fnterface thar defines how dato
omd commands are sent across the Neroor
SECURE SHELL (SSH) 3-
— SSH fs detgned to replace +he TELNET
a@btch provides unsecure Means of remote
login facfifty.
X SSH Services 3-
Q@ Seewe Command Shel) (Remote logon)
@ Seewe File Transfer
“Oi Pout for Waxrding CTuoneling).
(4) Secure Command Shell (Remate Lagan) 2-
— YF allows the Wer to edit Files, yiew the
Contents of directories, and access applications
on connected devices.
(2) Secure Pile Transfer $=
~ Ut Ts deifgned as am extenston For ScH-2
For secwe File Transfer.
- D+ fs separate profeco| +o handie Fie.
“Trams fer
(2. Port formaxding Crunneling) s-
— Router trePefe From q program and sends it
Across He encrypked Tunnel.SSH Benepis s- __
® Server ts aranenttcated.
@ Appitcarion layeks are hidden.
K Pxplatn_in short abou: standard and
—Non_ standard protocals._at the appitcattan _laye.
=> O HTTP 8- -— Me Hypertext Transfer Protoco) (HTTP?
fs q_ Application tayer Protoco} used
mainly to access datq on the
ward wide web.
anit PF Weg port 80.
@ FIP & - ErPC ete Tremsser protocol? 1s wed
to transfer fe
— TA Needs two Tee connections
~ Port 2) Ts wed #or combo) connection
Port 20 fs used tor Oaty connection,
@ SlaTP s- —TH stands zy Sfrople mat) Transfer
Protocol
— Port numbey Fer SMTP fs ar |
- Weg proceis Called “Store ang
orward"
@ Tewert s-
~T fs Terminal Network.
— Wed For Vir Temina) Service,Sy
© DNS ge —T stands tor vornet yy name —
~ Hleachical Structure that orgamhe,
and identifies domain Ws ay
tne znreinet:
~ por mumbe Is 53-
© PHP &— ~sr thomds for pynamfc, Hast
aa cONFiguration Protoco] -
— Assigns ausornertcay TP addras
to hosts:
— Fost numbers for DHCP Ts 67, 62
@ Pops’ s—
° — Post office Protoco) versions ts
Simpie amd limited Functionally
Wore as Message Acces Agent
Koa ena