Network
Network
Each application or network service uses protocols which define the standards and data formats to
be used.
Without protocols, the data network would not have a common way to format and direct data.
Protocol Functions
Protocols:
-Establish consistent rules for exchanging data between applications and services
loaded on the
participating devices.
-Specify how data inside the messages is structured and the types of messages that are
sent between
source and destination. These messages can be requests for services,
acknowledgments, data
messages, status messages, or error messages.
-Protocols also define message dialogues, ensuring that a message being sent is met by
the expected
response and the correct services are invoked when data transfer occurs.
3.2. Servers
-Any device that responds to requests from client applications is functioning as a server.
-In a client/server network, the server runs a service or process, sometimes called a server daemon.
-Like most services, daemons typically run in the background and are not under an end user’s direct
control.
-When a daemon receives a request from a client, it exchanges appropriate messages with the
client, as required by its protocol, and proceeds to send the requested data to the client in the
proper format.
Examples: -httpd
-telnetd
-ftpd
-The DNS client, sometimes called DNS resolver, supports name resolution for our other network
applications and other services that need it. (TRY: nslookup)
-A DNS server provides the name resolution using the name daemon, which is called named (name-
dee).
-When a client makes a query, the server’s “named” process first looks at its own records to see if it
can resolve the name. If it is unable to resolve the name using its stored records, it contacts other
servers in order to resolve the name. Once a match is found and returned to the original requesting
server, the server temporarily stores the numbered address that matches the name in the cache.
Use c:\> ipconfig /displaydns command to display all of the cached DNS entries on a Windows
system.
-The DNS uses a hierarchical system to create a name database to provide name resolution.
The hierarchy looks like an inverted tree with the root at the top and branches below.
-At the top of the hierarchy, the root servers maintain records about how to reach the top-level
domain servers, which in turn have records that point to the secondary level domain servers and so
on.
-When a client, typically a web browser, sends a request to a server, the HTTP protocol defines the
message types the client uses to request the web page and also the message types the server uses
to respond.
-The three common message types are:
- GET: a client’s request for data. A web browser sends the GET message to request pages from
a web server.
-POST and PUT: are used to send messages that upload data to the web server
-Response: HTTP/1.1 200 OK ;Or any other error message.
-The DHCP server maintains a pool of IP addresses and leases an address to any DHCP-enabled
client when the client is powered on.
-The client sends a DHCP DISCOVER packet to identify any available DHCP servers on the network.
- A DHCP server replies with a DHCP OFFER.
-The client may receive multiple DHCP OFFER packets if there is more than 1 DHCP server on the local
network, so it must choose between them. It then broadcasts a DHCP REQUEST packet that
identifies the explicit server and the lease offer that the client is accepting.
-Assuming that the IP address requested by the client, or offered by the server, is still valid, the
server would return a DHCP ACK message that acknowledges to the client the lease is finalized.
-If the offer is no longer valid –perhaps due to a time-out or another client allocating the lease –then
the selected server will respond with a DHCP NAK (Negative Acknowledge) message.
-If the client receives a DHCP NAK message, then he starts all over with a DHCP DISCOVER message.
- Unlike the file sharing supported by FTP, clients establish a long term connection to servers. Once
the connection is established, the user of the client can access the resources on the server as if the
resource is local to the client host.
- SMB file-sharing and print services have become the mainstay of Microsoft networking.
-The LINUX and UNIX OS also provide a method for sharing resources with Microsoft networks using
a version of SMB called SAMBA.
4.18. Telnet 30
-Telnet provides a standard method of emulating text-based terminal devices over the data
network.
- A connecting using Telnet is called a Virtual Terminal (VTY) session or connection.
-Rather then using a physical device to connect to the server, Telnet uses software to create a virtual
device that provides the same features of a terminal session with access to the server command
line interface (CLI).
-To support Telnet client connections, the server runs a service called the Telnet daemon. A virtual
terminal connection is established from an end device using a Telnet client application.
-If security is a concern, the Secure Shell (SSH) protocol offers an for server access
The Transport layer provides the segmentation of data and the control necessary to reassemble
these pieces into the various communication streams.
-Its primary responsibilities to accomplish this are:
-Tracking the individual communications between applications on the source and
destination hosts - to
maintain the multiple communication streams between these applications.
- Segmenting data and managing each piece – conversation multiplexing is possible
The transport layer has to break the data into smaller pieces, better suited for
transmission.
-Provides the means to both send and receive data when running multiple applications.