Networking Notes
1. Key Networking Concepts:
1.1 Mobile IP:
Mobile IP enables users to move between different networks while maintaining
a permanent IP address. It uses a Home Agent (HA) and a Foreign Agent (FA) to
forward packets from the home network to the mobile device.
1.2 NAT (Network Address Translation):
NAT translates private IP addresses within a local network to a public IP
address for internet access. It conserves IP addresses and enhances security
by hiding internal IP addresses.
1.3 MIME (Multipurpose Internet Mail Extensions):
MIME extends email format to support text in character sets other than ASCII,
and attachments like audio, video, images, and application programs.
1.4 POP (Post Office Protocol):
POP3 is used to retrieve emails from a server. It downloads and usually deletes
emails from the server.
1.5 IMAP (Internet Message Access Protocol):
IMAP allows users to access and manage emails directly on the server,
supporting multiple devices synchronously.
1.6 SMTP (Simple Mail Transfer Protocol):
SMTP is used to send emails from a client to a server or between servers.
2. Structure of Email Message:
An email message consists of two main parts:
- Header: Contains metadata such as sender, recipient, subject, date, etc.
- Body: Contains the actual content. It can include plain text or HTML and may
have MIME-encoded attachments.
3. Email Security:
Email security involves measures like:
- Encryption: Protects content using protocols like S/MIME or PGP.
- Authentication: Ensures the identity of the sender.
- Digital Signatures: Confirms message integrity and sender authenticity.
- Spam Filters & Firewalls: Protect against malicious emails.
4. ICMP & IGMP:
- ICMP (Internet Control Message Protocol): Used for error messages and
network diagnostics (e.g., ping).
- IGMP (Internet Group Management Protocol): Manages group memberships
for multicast communications.
5. FTP Server and Types:
FTP (File Transfer Protocol) is used to transfer files:
- Anonymous FTP: Allows access without a username/password.
- Password-Protected FTP: Requires login credentials.
- SFTP (Secure FTP): Uses SSH for secure transmission.
6. TFTP (Trivial File Transfer Protocol):
A simple, lock-step FTP with minimal features. Used for booting devices and
transferring configuration files.
- Features: Lightweight, no authentication, UDP-based.
- Operations: Read/write files using simple commands (RRQ, WRQ).
7. Routing Protocols:
- RIP (Routing Information Protocol): Distance-vector protocol using hop count.
- BGP (Border Gateway Protocol): Path-vector protocol for routing between
autonomous systems.
- OSPF (Open Shortest Path First): Link-state protocol that uses Dijkstra's
algorithm.
8. IPsec:
A protocol suite for securing IP communications by authenticating and
encrypting each IP packet.
- Goals: Confidentiality, integrity, authentication.
- Architecture: Uses AH (Authentication Header) and ESP (Encapsulating
Security Payload), operates in transport and tunnel modes.
9. Virtual Private Network (VPN):
VPN creates a secure tunnel over the internet between a user and a private
network.
Diagram:
[User] ---[Internet + Encryption Tunnel]--- [VPN Server] --- [Private Network]
10. Purpose of SSL (Secure Sockets Layer):
SSL secures data transmission over the internet. It ensures encryption, data
integrity, and authentication.
11. Forwarding and Partial Information in Routing:
- Forwarding: Moving packets from input to output interface in routers.
- Partial Information Routing: Routing decisions based on incomplete network
information.
12. RTP and RTCP:
- RTP (Real-Time Transport Protocol): Used for delivering audio and video over
IP networks.
- RTCP (RTP Control Protocol): Works alongside RTP to monitor transmission
statistics and quality of service.