Internet Applications. Review BUPT/QMUL
|
|
- Wesley Sullivan
- 5 years ago
- Views:
Transcription
1 Internet Applications Review BUPT/QMUL
2 Network Basics (1) What is the Internet? Internet vs. internet Internet vs. www How do machines communicate with one another on the Internet? What are the major components of Internet? Internet applications Internet protocols Internet addresses Physical infrastructure What is protocol? Protocol = A set of rules for communicating HTTP/FTP/SMTP, TCP/UDP, IP 2
3 Q2: How does the Internet work? communication on the Internet The source computer One application produces the data to send The software packetize the data Local Area Network Ruby A The cables connecting the computers to the network The network device receives the data and pushes them out The software chooses the path for data delivery The destination computer The software depacketize the data The counterpart to the sender application reads the data B 3
4 Q2: How does the Internet work? communication on the Internet Application (e.g., IE) Application (e.g., Web Server) Data Network Software (i.e. TCP/IP) Data Network Software (i.e. TCP/IP) Packet Packet Packet Packet Packet Packet Physical (Hosts, Routers, Wiring) 4
5 Network Basics (2) What are the two important design concepts of Internet? Layered networking model Client-server paradigm Terms for network devices and examples node, host node, link, network component Terms for network performance parameters: bandwidth, delay, jitter, error rate Network types according to the switching function in the network Circuit switching network Message switching network Packet switching network Hybrid switching network 5
6 Network Basics (3) Different channel access technologies multi-access and point-to-point Network types according to the range of the network LAN, MAN, WAN, PAN Network types according to the user of the network public network and private network Layered architecture ISO/OSI model, TCP/IP model Revisory Model Devices at different layers Hub, Bridge/Switch, Router, Gateway 6
7 Network Programming Basics (1) Basic concepts Process: what is a process? Is process equals to program? PID, PPID Special processes: init(pid=1) fork(), exec() System call: what is a file descriptor? Special file descriptors: 0,1,2 Related system calls and their functions: open(), read(), write(), lseek() Signal: what is a signal? Which conditions will generate signals?: 5 conditions What can a process do with a signal? : 3 choices Signal() system call and its functions 7
8 Network Programming Basics (2) IP Addresses IP address structure Big-endian and little-endian, HBO and NBO byte order conversion functions: htonl(), ntohl(), htons(), ntohs() DNS Host entry structure System calls for retrieving host entries gethostbyname( ), gethostbyaddr( ) Connection What is a connection? How to identify an endpoint of a connection? How to identify a connection? Client-IP, client-port, server-ip, server-port Well-known port numbers for typical applications DHCP, DNS, TELNET, TFTP, FTP, SMTP, POP3, HTTP, SNMP 8
9 Network Programming Basics (3) Functions of netstat, ifconfig and ping Sockets interface What is a socket? What is the sockets descriptor? Internet-specific socket address and Generic socket address struct sockaddr vs. struct sockaddr_in how do we use them in the system calls such as connect(), bind(), and accept()? Different sockets interface types SOCK_STREAM, SOCK_DGAM, SOCK_RAW System calls used in sockets programming Socket operation: socket(), bind(), send(),recv(), close() Byte order operation: htonl(), Address formats conversion: inet_aton(), inet_ntoa(), Name and address operation: gethostbyname(), Basic flows of TCP/UDP based sockets API 9
10 Overview of TCP-based sockets API TCP Client socket() TCP Server socket() bind() listen() connect() send() recv() close() Connection request data data EOF accept() recv() send() read() Await connection request from next client close() 10
11 Overview of UDP-based sockets API UDP Client socket() UDP Server socket() bind() sendto() data recvfrom() recvfrom() data sendto() close() 11
12 DHCP DHCP overview Basic function: automatic configuration of remote hosts relationship between BOOTP and DHCP DHCP client(port 68), DHCP server(port 67) DHCP Relay: forward DHCP messages between subnets. DHCP lease: amount of time that the DHCP server grants to the DHCP client Phases of IP assignment with DHCP DHCP message format STD and Message Sequence Chart of DHCP Address acquisition Procedure of Early lease termination in DHCP Procedure of Lease renewal in DHCP Basic address acquisition procedure through DHCP relay 12
13 Phases of IP Assignment with DHCP the client makes a request for an IP address the DHCP servers offer an IP address the client selects an offer and requests an IP lease the selected DHCP server assigns an IP to the client 13
14 DHCP Message Format OP (1) HTYPE (1) HLEN (1) HOPS (1) TRANSACTION ID (4) SECONDS (2) FLAGS (2) CLIENT IP ADDRESS (4) YOUR IP ADDRESS (4) SERVER IP ADDRESS (4) ROUTER IP ADDRESS (4) CLIENT HARDWARE ADDRESS (16) SERVER HOST NAME (64) BOOT FILE NAME (128) OPTIONS (variable)
15 Address Acquisition: MSC Server (not selected) Client Server (selected) Begin initialization DHCPDISCOVER Determines configuration DHCPOFFER DHCPDISCOVER DHCPOFFER Determines configuration DHCPREQUEST Collects replies & selects configuration DHCPREQUEST DHCPACK 15
16 Address Acquisition: STD of the client Select Offer/ DHCPREQUEST Host Boots /DHCPDISCOVER SELECT DHCPOFFER INIT State Transition of DHCP Client REQUEST DHCPACK BOUND 16
17 Early Lease Termination: Procedure Client Server (selected) Graceful shutdown DHCPRELEASE Discards lease 17
18 Lease Renewal: Procedure (1) T1 expires Client Server (selected) Client Server (selected) T1 expires T1 expires DHCPREQUEST DHCPREQUEST DHCPACK DHCPNAK Reset T1 and T2 T1: the time at which the client enters the RENEW state and attempts to contact the server that originally issued the client's network address 0.5 * duration_of_lease T2: the time at which the client enters the REBIND state and attempts to contact any server * duration_of_lease
19 Lease Renewal: Procedure (2) Both T1 and T2 expire, address rebound Server (others) Client T1 expires Server (selected) DHCPREQUEST T2 expires DHCPREQUEST DHCPREQUEST DHCPACK Reset T1 and T2 19
20 DNS(1) Basic functions of DNS: converting between hostname and IP address Current status: hierarchical structure, distributed database, general-purpose Hierarchical structure of domain namespace Important terms Domain / domain name / FQDN Domain namespace, zone Resource Record Name server / primary server / secondary server / caching server Resolver Query / response Standard query / inverse query / pointer query recursive resolution / iterative resolution 20
21 Hierarchical structure Unnamed root Top level domains arpa com edu gov int mil net org ae cn zw 2nd level domains in-addr mit edu 59 cs bupt 64 xx xx.cs.mit.edu cs.bupt.edu.cn cs Generic domains in-addr.arpa Country domains 21
22 DNS(2) How does DNS work together with the user programs (e.g. TELNET, FTP, HTTP, SMTP)? Procedure of the recursive resolution and iterative resolution What are the mechanisms in DNS that are possible to improve the querying efficiency? The ideas of inverse query and pointer query. The comparison between them. DNS Message Format Types of Resource Record (only the one highlighted using red color in the lecture notes) A, NS, MX, CNAME, PTR 22
23 Communication model between user program, resolver and name server Local Host Foreign User Program User queries User responses Resolver Queries Responses DNS name server Cache additions references cache Resolvers are normally implemented in system calls. E.g. gethostbyname(), gethostbyaddr() 23
24 Recursive resolution 1 6 Local Name Server
25 Iterative resolution 25
26 DNS Message Format(from RFC 1035) Query and Response messages, both with same message format Parameter(Flags) ID QR OPCODE AA TC RD RA Z Rcode 31 Question count Authority count HeaderAnswer count Additional count Question Section (variable number of questions) Answer Section (variable number of RRs) Authority Section (variable number of RRs) Additional Section (variable number of RRs) 26
27 Telnet(1) What is TELNET and telnet? TELNET: a protocol used to establish a dumb terminal session to another computer on the Internet telnet: a program that supports the TELNET protocol over TCP What are the advantages of the idea of option negotiation in TELNET? NVT What is NVT? What are its functions? Network Virtual Terminal, providing a standard interface to remote systems NVT operations Understand data path from the user s keyboard to the remote system 27
28 NVT Operation User s keyboard & display Accommodating heterogeneity Converting client system format into NVT format TELNET Client TCP connection across Internet TELNET Server Converting NVT format into server system format Server s system Converting NVT format into client system format Client System format Server System format NVT format Converting server system format into NVT format TELNET client and server convert between native format and NVT format 28
29 Transmission Of Data Data path from the user s keyboard to the remote system Client reads from terminal TELNET client Client sends to server (NVT) TELNET server User s keyboard & display Operating system Server receives from client (NVT) Operating system Server sends to pseudo terminal TCP/IP internet 29
30 Telnet commands TELNET control functions: IAC, DO, DONT, WILL, WONT TELNET options example Echo modes Binary transmission Line mode vs. character mode Character set Terminal type Understand the TELNET session through examples 30
31 Telenet Control Functions DO, DONT, WILL, WONT Used for options negotiation Examples Sender Receiver Meaning WILL DO WILL DON T DO WILL DO WONT Sender wants to active a option, and receiver agrees Sender wants to active a option, and receiver refuses Sender wants receiver to active a option, and receiver agrees Sender wants receiver to active a option, and receiver refuses 31
32 Example: Negotiation of Echo Option Client Server Do enable the echo option ECHO DO IAC IAC WILL ECHO I will enable the echo option 32
33 Other Remote Access Technologies Remote login in text-based system telnet SSH Rlogin 33
34 TFTP/FTP(1) TFTP features Read and write files from / to remote computers Minimal overhead TFTP packet format (you can ignore the errcode definition) Read request, Write request, Data, Acknowledgment, Error Transfer mode of TFTP: Netascii, Octect Typical communication procedure of TFTP Retransmission defined in original TFTP protocol The sorcerer s apprentice syndrome problem and how to fix it 34
35 TFTP Protocols Packet Format Ethernet Frame Header IP Header UDP Header TFTP Header Read request (RRQ) 01 filename 0 mode 0 2 byte opcode in network byte order null terminated ASCII string containing name of file null terminated ASCII string containing transfer mode Variable length fields 35
36 TFTP Example Beginning with RRQ/WRQ Every good block is Acknowledged Both sides use timers Simple automatic repeat request mechanism provides flow control A block of less than 512 bytes signals the end of the file timeout resend ascii ACK 1 Lost ACK 2 ACK file1 DATA DATA DATA DATA RRQ Block1 512 bytes Block2 512 bytes Block2 512 bytes Block3 512 bytes 3 Lost ACK 3 Damaged ACK 4 client DATA DATA 4 server Block4 464 bytes 4 Block4 464 bytes 36 timeout resend timeout resend
37 TFTP Operations Retransmission Symmetric Both machines involved in a transfer are considered senders and receivers. One sends data and receives acknowledgments The other sends acknowledgments and receives data Each side implement the timeout and retransmission If a data packet gets lost in the network, the data sender times out and retransmits the last data packet If an acknowledgment is lost, the acknowledgment sender retransmits the last acknowledgment The sender has to keep just one packet on hand for retransmission, since the lock step acknowledgment guarantees that all older packets have been received Duplicate data packets must be recognized (ignored) and acknowledgment retransmitted This original protocol suffers from the sorcerer s apprentice syndrome (SAS) 37
38 TFTP Operations Sorcerer s Apprentice Syndrome Send DATA[n] timeout Retransmit DATA[n] Sender Receive ACK[n] Send DATA[n+1] Receive ACK[n] (dup) Send DATA[n+1] (dup) and so on Receiver Receive DATA[n] Send ACK[n] Receive DATA[n] (dup) Send ACK[n] (dup) Receive DATA[n+1] Send ACK[n+1] Receive DATA[n+1] (dup) Send ACK[n+1] (dup) Arising when an acknowledgment for a data packet is delayed, but not lost Leading to excessive retransmissions Once started, the cycle continues indefinitely with each data packet being transmitted exactly twice 38
39 TFTP/FTP(2) FTP features Used to transfer files between hosts Used to manipulate files, FTP model FTP basic control commands and replies USER, PASS, CWD, CDUP, QUIT, PORT, PASV LIST, RETR, LIST, FTP Control Connection & Data Connection FTP Active and Passive Mode Anonymous FTP log in with anonymous as the account name Give your address as password Only for downloading 39
40 FTP Model User Interface User Server PI Control Connection Client PI File System Server DTP Data Connection Client DTP File System FTP server FTP client 40
41 Active and Passive mode Typical data connection handling sequence (in active mode) Client sets up to listen on a unique port Client uses local socket information to send PORT command to server Server responds with 200 reply to acknowledge the port number Client sends RETR, STOR, or other transfer command Server sends preliminary reply Server does active open ( connect ) File data sent over connection Server sends 226 or other reply Server/client closes data connection Another mode: passive mode Client sends command PASV server listens to a specific port and client should access that port 41
42 FTP Control Connection & Data Connection (1) Server 20 data 21 control Client 2189 control 5001 data Active Mode: Server port for data connection =20 Control connection is initiated by client and established PORT (5001) 200 Control command (RETR) Request to establish the data connection Acknowledgment to the request Reply (150) data Reply (226) Receive user command Acquire port
43 FTP Control Connection & Data Connection (3) Server 6077 data 21 control Client 2189 control 5001 data Passive Mode: Server port for data connection >1024 Control connection is initiated by client and established PASV 227 (6077) Control command (RETR) Request to establish the data connection Acknowledgment to the request Reply (150) data Reply (226) Receive user command Acquire port
44 (1) Overview Components of system Basic functions of system Composition, Transfer, Reporting, Displaying, Disposition Terms: UA, Mail Server, MTA address: Message Format Header, blank line, body SMTP Basic model Basic commands and replies HELO, MAIL FROM, RCPT TO, DATA, QUIT SMTP Transfer Mechanism 44
45 Components Of System (1) User Agent SMTP Mail SMTP Mail POP3 Server Server IMAP User Agent SMTP SMTP POP3,IMAP Sender Internet Spooling Mail Server of Sender Side User mailbox Mail Server of Receiver Side Receiver 45
46 SMTP Basic Model File System File System User MTA SMTP commands/replies and mail MTA SMTP client SMTP server 46
47 SMTP Commands and Status codes example Connection establish sends a mail to jones@beta.gov, green@beta.gov SMTP client TCP connection establish 220 beta.gov Simple Mail Transfer Service ready HELO alpha.edu 250 beta.gov SMTP server Mail transfer Connection release MAIL FROM: <smith@alpha.edu> 250 OK RCPT TO: <jones@beta.gov> 250 OK RCPT TO: <green@beta.gov> DATA 550 No such user here 354 End with <CR><LF>.<CR><LF> Message 221 Bye <CR><LF>.<CR><LF> 250 OK QUIT 47
48 (2) POP Basic model Basic commands and replies IMAP USER, PASS, LIST, RETR, DELE, QUIT, Features of IMAP Comparison of POP and IMAP Message formats RFC 5322: main headers MIME: New headers and main content types What are the limitations of SMTP? How is MIME used to offset the limitations of SMTP? Web-based mail 48
49 POP Basic Model Used to transfer mail from a mail server to a UA Internet File System SMTP Server: is always on and listening via TCP port 25 holds outgoing mail for user SMTP/POP Mail Server POP Mail Access Server: runs the POP3 service by listening on TCP port 110 POP SMTP User Agent Clients: connect to server to manipulate mail using message access protocols (POP or IMAP) 49
50 IMAP: Internet Message Access Protocol Features Folders and messages can be stored either on the server or on the local computer Since folders can remain on server, it is possible to access your same mail store even using a dumb terminal character based client like Pine. Much better for mobile users than POP (since mail remains on the server) Can selectively copy messages from the server to the local client based on many criteria 50
51 POP vs. IMAP(2) 51
52 WWW(1) Terminologies: WWW, the Web, W3, URL, HTML, HTTP WWW components URL Client/browser Web server The web access model Structure Used for different services HTML Static vs. dynamic CGI 52
53 Structure Of URLs A URL consists of three parts: The protocol for example http or ftp The DNS name of the host The directory and file name Protocol Hostname Directory and file name Protocol: http by default Port: 80 by default Index.html, index.htm, default.htm, default.asp etc. are assumed if no file-name given 53
54 HTTP Features Application layer protocol for client/server communication Request/response based Stateless, Transaction Main Methods Get, Put, Post, Performance enhancement of HTTP 1.1 Persistent connections Pipelining Enhanced caching options Support for compression 54
55 HTTP HTTP Transaction Establish connection Client request TCP connection set up uses a port number as application reference usually port 80 HTTP message sent with a request line request-line = method URL HTTP version Server response Connection terminated server sends HTTP message and optionally requested data resp-message = HTTP version status code reason-phrase [optional stuff] usually the server sometimes the client stops it anything else, whoever notices terminates 55
56 Example of Non-persistent connections Client TCP Connection established Server Retrieving index.htm TCP Connection released TCP Connection established Retrieving image.gif TCP Connection released 56
57 Example of Persistent Connections Client TCP Connection established Server Retrieving index.htm Retrieving image.gif TCP Connection released 57
58 Example of Pipelining Non-pipelining Pipelining 58
59 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP response message 2) cookie header line in HTTP request message 3) cookie file kept on user s host, managed by user s browser 4) back-end database at Web site Example: Susan always access Internet always from PC She visits specific e- commerce site for first time when initial HTTP requests arrives at site, site creates: unique ID entry in backend database for ID 59
60 Web Caches (Proxy Server) Motivation: satisfy client request without involving origin server User sets browser: Web accesses via a proxy server client Proxy server origin server Browser sends all HTTP requests to proxy server If requested file in cache: proxy server returns file else proxy requests file from origin server, then forwards to client client origin server 60
61 Conditional get cache Server does not send required files if cache has upto-date cached version cache: specify date of cached copy in HTTP request If-modified-since: <date> server: response contains no object if cached copy is upto-date: HTTP/ Not Modified HTTP request msg If-modified-since: <date> HTTP response HTTP/ Not Modified HTTP request msg If-modified-since: <date> HTTP response HTTP/ OK <data> server file not modified file modified 61
62 SNMP(1) Terminologies: SNMP, MIB, SMI, RMON Definition, goals and functional areas of network management Functional areas: FCAPS Different network management architectures and their pros and cons Centralized Hierarchical Distributed SNMP history, features SNMPv1,v2,v3, RMON1,RMON2 SNMP realizes the F-C-P functions of network management SNMP model and components 62
63 SNMP Model management station managing entity network management protocol agent data agent data managed node agent data managed node agent data managed node The SNMP model of a managed network consists of four components: Managed Nodes (Agent) Management Stations (NMS) Management Information (MIB) A Management Protocol (SNMP) managed node 63
64 SNMP(2) SNMP framework SMI and ASN.1 SMI defines the rules for describing management information using ASN.1 for an unambiguous description without inconsistencies MIB hierarchy naming SNMP protocol: traps/polling, SNMP commands 64
65 MIB ISO Object Identifier Tree Check out: This subtree is the Internet SMI
66 SNMP Traps / Polling Two ways to deliver MIB information, commands NMS NMS request response trap msg agent data agent data Managed device Polling mode Managed device trap mode 66
67 SNMP Commands Command Description Version GetRequest NMS-to-Agent: get data (instance) SNMPv1 GetNextRequest NMS-to-Agent: get data (next in list) SNMPv1 GetBulkRequest NMS-to-Agent: get data (block) SNMPv2 InformRequest NMS-to-NMS: MIB information exchange SNMPv2 SetRequest NMS-to-Agent: set MIB value SNMPv1 GetResponse Agent-to-NMS: value, response to request SNMPv1 Trap Agent-to-NMS: report exceptional event to NMS SNMPv1 67
68 GetRequest GetNextRequest SetRequest GetResponse Trap GetRequest GetNextRequest SetRequest GetResponse Trap SNMPv1 Commands Management Application SNMP Object Manipulation Managed resources SNMP Managed Objects Network Management Station SNMP manager UDP SNMP Messages (PDUs) SNMP Agent UDP Managed Nodes IP Link layer IP Link layer SNMP Device 68
69 Example of SNMP Commands (GetNextRequest) Manager Process GetNextRequest (SysDescr.0) GetResponse (sysobjectid.0) GetNextRequest (sysobjectid.0) GetResponse (syscontact..0) GetNextRequest (syscontact..0) Agent Process GetResponse (SysName.0) GetNextRequest (sysoruptime.9) GetResponse (sysoruptime.10) GetNextRequest (sysoruptime.10) GetResponse (nosuchname) 69
70 RMON RMON= Remote MONitoring Extensions to SNMP provide comprehensive network monitoring capabilities RMON uses remote network monitoring devices known as probes. The RMON specification defines a set of statistics and functions that can be exchanged between RMON-compliant console managers and probes RMON is standardized to only operate on Ethernet segments (LAN). RMON specifically defines the information that any network monitoring system will be able to provide as part of the MIB. RMON1 provides monitoring capability at data link layer in OSI model. RMON2 provides monitoring capability above data link layer in OSI model. 70
71 Real-time Services(1) Real-time services Isochronous services and QoS requirements isochronous pertains to processes that require timing coordination to be successful, such as voice and digital video transmission Jitter compensation via playback buffer RTP/RTCP Functions of RTP/RTCP, relationship between RTP and RTCP Definitions: end system, translator, mixer, monitor RTP features, SSRC vs, CSRC RTCP features, packet types, relationship of RTCP port number with RTP port number 71
72 RTP and RTCP For data RTP Important fields in header sequence number timestamp synchronization ID RTCP For QoS monitoring and control Provides feedback on the quality of the data distribution 72
73 Mixer and Translator End System (SSRC 18) 18, DVI4 18, DVI4 CSRC Mixer (SSRC=12) 12, GSM, (18,39) End System (SSRC 39) 39, L16 Translator 39, GSM SSRC:Synchronization SouRCe Identifier CSRC:Contributing SouRCe Identifier 73
74 Real-time Services(2) Multimedia signaling protocols H.323 SIP Function: Describes terminals and other entities that provide multimedia communications services over Packet Based Networks (PBN) which may not provide a guaranteed Quality of Service. H.323 protocol stack components Function: An application layer signaling protocol that defines initiation, modification and termination of interactive, multimedia communication sessions between users Architecture and components SIP messages, SIP header, SIP URL SIP Messages: INVITE, ACK, BYE, SIP Header: MIME SIP URL: user@host 74
75 H.323 Components Gatekeeper Multipoint Control Unit Terminal Packet Based Networks Gateway Circuit Switched Networks 75
76 SIP Architecture SIP Components Location Server Redirect Server Registrar Server PSTN User Agent Proxy Server Proxy Server Gateway 76
Key Points for the Review
Key Points for the Review Network Basics What is internet and Internet? Does WWW equal to Internet? How do machines communicate with one another on the Internet? What are the major components of Internet?
More informationTFTP and FTP Basics BUPT/QMUL
TFTP and FTP Basics BUPT/QMUL 2017-04-24 Agenda File transfer and access TFTP (Trivial File Transfer Protocol) FTP (File Transfer Protocol) NFS (Network File System) 2 File Transfer And Access 3 File Transfer
More information13. Internet Applications 최양희서울대학교컴퓨터공학부
13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network
More informationDHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL
DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL 2017-04-01 Topics In This Course Background Introduction of Internet TCP/IP and OSI/RM Socket programmingtypical Internet Applications DHCP (Dynamic
More informationMore Internet Support Protocols
More Internet Support Protocols Domain Name System (DNS) Ch 2.5 Problem statement: Average brain can easily remember 7 digits On average, IP addresses have 10.28 digits We need an easier way to remember
More informationCCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers
CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers 2007, Jae-sul Lee. All rights reserved. 1 Agenda 11.1 TCP/IP Transport Layer 11.2 The Application Layer What does the TCP/IP transport layer
More informationApplications FTP. FTP offers many facilities :
Applications FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol
More informationHigher layer protocols
ETSF05/ETSF10 Internet Protocols Higher layer protocols DHCP DNS Real time applications RTP The hen or the egg? DHCP IP addr. IP DNS TCP UDP ETSF05/ETSF10 - Internet Protocols 2 What to configure IP address
More informationSNMP Basics BUPT/QMUL
SNMP Basics BUPT/QMUL 2017-05-22 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction
More informationManual Configuration Stateful Address Configuration (i.e. from servers) Stateless Autoconfiguration : IPv6
Manual Configuration Stateful Address Configuration (i.e. from servers) BOOTP DHCPv4, DHCPv6 Stateless Auto : IPv6 최양희서울대학교컴퓨터공학부 2005 Yanghee Choi 2 RARP Hardware address ---> IP address requires direct
More informationIntroduction to Network. Topics
Introduction to Network Security Chapter 7 Transport Layer Protocols 1 TCP Layer Topics Responsible for reliable end-to-end transfer of application data. TCP vulnerabilities UDP UDP vulnerabilities DNS
More informationDNS Basics BUPT/QMUL
DNS Basics BUPT/QMUL 2018-04-16 Related Information Basic function of DNS Host entry structure in Unix Two system calls for DNS database retrieving gethostbyname () gethostbyaddr () 2 Agenda Brief introduction
More informationProtocol Classification
DNS and DHCP TCP/IP Suite Suite of protocols (not just TCP and IP) Main protocols TCP and UDP at the Transport Layer, and IP at the Network Layer Other protocols ICMP, ARP, Telnet, Ftp, HTTP, SMTP, SNMP
More informationApplication Level Protocols
Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application
More informationHigher layer protocols
ETSF05/ETSF10 Internet Protocols Higher layer protocols DHCP DNS Real time applications RTP SIP DHCP Configuring hostsso they can communicate 2015-11-30 ETSF05/ETSF10 - Internet Protocols 2 What to configure
More informationChapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0
Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application
More information12. Name & Address 최양희서울대학교컴퓨터공학부
12. Name & Address 최양희서울대학교컴퓨터공학부 How do you get IP address? Manual Configuration Stateful Address Configuration (i.e. from servers) BOOTP DHCPv4, DHCPv6 Stateless Autoconfiguration : IPv6 2009 Yanghee
More informationCSC 4900 Computer Networks:
CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols
More informationSNMP Basics BUPT/QMUL
SNMP Basics BUPT/QMUL 2014-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationAddress Resolution: BOOTP & DHCP
Content Address Resolution: BOOTP & DHCP Linda Wu Alternatives to RARP BOOTP Protocol DHCP Protocol (CMPT 471 2003-3) Reference: chapter 23 Notes-11 CMPT 471 2003-3 2 Alternatives to RARP During the startup
More informationApplication-layer Protocols and Internet Services
Application-layer Protocols and Internet Services Computer Networks Lecture 8 http://goo.gl/pze5o8 Terminal Emulation 2 Purpose of Telnet Service Supports remote terminal connected via network connection
More informationNetwork Model. Why a Layered Model? All People Seem To Need Data Processing
Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation
More informationMultimedia in the Internet
Protocols for multimedia in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ > 4 4 3 < 2 Applications and protocol stack DNS Telnet
More informationCMPE 151: Network Administration. Servers
CMPE 151: Network Administration Servers Announcements Unix shell+emacs tutorial. Basic Servers Telnet/Finger FTP Web SSH NNTP Let s look at the underlying protocols. Client-Server Model Request Response
More informationAPPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.
APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.
More informationTransport Layer (TCP/UDP)
Transport Layer (TCP/UDP) Where we are in the Course Moving on up to the Transport Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Recall Transport layer provides
More informationNetworking. Layered Model. DoD Model. Application Layer. ISO/OSI Model
Networking Networking is concerned with the physical topology of two or more communicating entities and the logical topology of data transmission. Layered Model Systems communicate over a shared communication
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationComputer Networking: Applications George Blankenship. Applications George Blankenship 1
CSCI 232 Computer Networking: Applications i George Blankenship Applications George Blankenship 1 TCP/IP Applications The user of TCP/IP transport (TCP/UDP) is an application, the top level lof the TCP/IP
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationSCS3004 Networking Technologies Application Layer Protocols
SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationTRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016
TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.
More informationUDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data
ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission
More informationObjectives. Upon completion you will be able to:
Domain Name System: DNS Objectives Upon completion you will be able to: Understand how the DNS is organized Know the domains in the DNS Know how a name or address is resolved Be familiar with the query
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationA Client-Server Exchange
Socket programming A Client-Server Exchange A server process and one or more client processes Server manages some resource. Server provides service by manipulating resource for clients. 1. Client sends
More informationElectronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol
SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail
More informationLayered Model. DoD Model. ISO/OSI Model
Data Communications vs Networking (later) Communication is concerned with the transmission of data over a communication medium/channel between two entities. Here we are more concerned about EE issues such
More informationIP/MAC Address Translation
IP/MAC Address Translation -Go over quiz answers -ARP -DHCP -NAT Today Transition from Network to Datalink How do we get datagrams to the right physical host? Tricky part comes when a router is forwarding
More informationReal-time Services BUPT/QMUL
Real-time Services BUPT/QMUL 2017-05-27 Agenda Real-time services over Internet Real-time transport protocols RTP (Real-time Transport Protocol) RTCP (RTP Control Protocol) Multimedia signaling protocols
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationOSI Transport Layer. objectives
LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating
More informationInternet Applications. Dr Steve Gordon ICT, SIIT
Internet Applications Dr Steve Gordon ICT, SIIT Contents Network Application Models Transport Layer Interface Selected Applications and Services Naming Resources Web Access Email Network Management Other
More informationChapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP
Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming
More informationLecture-4. TCP/IP-Overview:
Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone
More informationCCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols
CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services
More informationIBM. Networking Dynamic Host Configuration Protocol. IBM i 7.1
IBM IBM i Networking Dynamic Host Configuration Protocol 7.1 IBM IBM i Networking Dynamic Host Configuration Protocol 7.1 Note Before using this information and the product it supports, read the information
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer III Dmitri Loguinov Texas A&M University February 8, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationThe Application Layer: SMTP, FTP
The Application Layer: SMTP, FTP CS 352, Lecture 5 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 Recap: Application-layer protocols DNS: lookup a (machine-readable) address using a (humanreadable)
More informationComputer Networking. Chapter #1. Dr. Abdulrhaman Alameer
Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationObjective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro
CCNA Exploration 4.0 Network Fundamentals Chapter 03 Application Layer Functionality and Protocols Universitas Dian Nuswantoro 1 Objective In this chapter, you will learn to: Describe how the functions
More informationFTP. Mail. File Transfer Protocol (FTP) FTP commands, responses. Electronic Mail. TDTS06: Computer Networks
TDTS0: Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se FTP Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Application Layer: Cookies, Web Caching, SMTP Sec 2.2.4-2.4 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network
More informationCSMC 412. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 2. September 15 CMSC417 Set 2 1
CSMC 412 Computer Networks Prof. Ashok K Agrawala 2015 Ashok Agrawala Set 2 September 15 CMSC417 Set 2 1 Contents Client-server paradigm End systems Clients and servers Sockets Socket abstraction Socket
More informationApplication Layer: OSI and TCP/IP Models
Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service
More informationUNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections
UNIT V Introduction to Application Layer: Introduction, Client Server Programming, WWW and HTTP,FTP, e-mail, TELNET, Secure Shell, Domain Name System, SNMP. HTTP The Hyper Text Transfer Protocol (HTTP)
More informationInternet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!
Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams
More informationComputer Networks Prof. Ashok K. Agrawala
CMSC417 Computer Networks Prof. Ashok K. Agrawala 2018Ashok Agrawala September 6, 2018 Fall 2018 Sept 6, 2018 1 Overview Client-server paradigm End systems Clients and servers Sockets Socket abstraction
More informationFTP. FTP offers many facilities :
FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol complex. FTP
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationTransporting Voice by Using IP
Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone
More informationHands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the
More informationDifferent Layers Lecture 21
Different Layers Lecture 21 10/17/2003 Jian Ren 1 The Transport Layer 10/17/2003 Jian Ren 2 Transport Services and Protocols Provide logical communication between app processes running on different hosts
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationChapter 2: Application layer
Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with TCP 2.8 Socket
More informationTSIN02 - Internetworking
Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand
More informationNWEN 243. Networked Applications. Layer 4 TCP and UDP
NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationNetwork: infrastructure (hard/software) that enables endpoints (hosts) to communicate
221 7 (Inter)Networking Network: infrastructure (hard/software) that enables endpoints (hosts) to communicate Internetwork: system of two or more networks (segments), connected via gateways, which enables
More informationLecture 13: Transportation layer
Lecture 13: Transportation layer Contents Goals of transportation layer UDP TCP Port vs. Socket QoS AE4B33OSS Lecture 12 / Page 2 Goals of transportation layer End-to-end communication Distinguish different
More informationLecture 13: Application layer
Lecture 13: Application layer Contents Goals of transportation layer UDP TCP Port vs. Socket QoS AE4B33OSS Lecture 12 / Page 2 Goals of transportation layer End to end communication Distinguish different
More informationCommunication Networks
Session 2. Application and Layered Architectures Dongsoo S. Kim Electrical and Computer Engineering. Indiana U. Purdue U. Indianapolis Communication s Various services and flexibility architectures Grouping
More informationCCNA 1 Chapter 10 v5.0 Exam Answers 2013
CCNA 1 Chapter 10 v5.0 Exam Answers 2013 1 Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.) physical
More informationComputer Networks Unit I Application layer (2012 pattern)
Computer Networks Unit I Application layer (2012 pattern) By Prof. B.A.Khivsara Assistant Prof. Department of Computer Engg. SNJB s KBJ COE, Chandwad Introduction 1-1 Chapter 1: Introduction What is Internet?
More informationInformation Network Systems The application layer. Stephan Sigg
Information Network Systems The application layer Stephan Sigg Tokyo, November 15, 2012 Introduction 04.10.2012 Introduction to the internet 11.10.2012 The link layer 18.10.2012 The network layer 25.10.2012
More informationReview for Internet Introduction
Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of
More informationCS348: Computer Networks (SMTP, POP3, IMAP4); FTP
CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange
More informationApplications & Application-Layer Protocols: (SMTP) and DNS
CS 312 Internet Concepts Applications & Application-Layer Protocols: E (SMTP) and DNS Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs312-f11
More informationUnderstanding and Troubleshooting DHCP in Catalyst Switch or Enterprise Networks
Understanding and Troubleshooting DHCP in Catalyst Switch or Enterprise Networks Contents Introduction Example Scenarios Background Information Understanding DHCP Current DHCP RFC References DHCP Message
More informationWWW: the http protocol
Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC
More informationLecture (11) OSI layer 4 protocols TCP/UDP protocols
Lecture (11) OSI layer 4 protocols TCP/UDP protocols Dr. Ahmed M. ElShafee ١ Agenda Introduction Typical Features of OSI Layer 4 Connectionless and Connection Oriented Protocols OSI Layer 4 Common feature:
More informationBoot(ing) protocols. From (R)ARP to BSDP. dr. C. P. J. Koymans. Informatics Institute Universiteit van Amsterdam. November 9, 2007
Boot(ing) protocols From (R)ARP to BSDP dr. C. P. J. Koymans Informatics Institute Universiteit van Amsterdam November 9, 2007 dr. C. P. J. Koymans (UvA) Boot(ing) protocols November 9, 2007 1 / 20 ARP
More informationData Communication & Computer Networks MCQ S
Data Communication & Computer Networks MCQ S 1. The translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationCHAPTER 22 DISTRIBUTED APPLICATIONS ANSWERS TO QUESTIONS ANSWERS TO PROBLEMS
CHAPTER 22 DISTRIBUTED APPLICATIONS ANSWERS TO QUESTIONS 22.1 RFC 821 defines SMTP which is the protocol for exchanging email messages. RFC 822 describes the format of those messages. 22.2 The Simple Mail
More informationReal-time Services BUPT/QMUL
Real-time Services BUPT/QMUL 2015-06-02 Agenda Real-time services over Internet Real-time transport protocols RTP (Real-time Transport Protocol) RTCP (RTP Control Protocol) Multimedia signaling protocols
More informationConnectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)
Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames
More informationInternet Technologies Solution Set Attempt any two of the following: 10 a. What are the responsibilities of Transport layer in OSI Model?
Internet Technologies Solution Set 36134 1. Attempt any two of the following: 10 a. What are the responsibilities of Transport layer in OSI Model? Transport Layer The transport layer is responsible for
More informationBootP and DHCP. Flexible and Scalable Host Configuration 2005/03/11. (C) Herbert Haas
BootP and DHCP Flexible and Scalable Host Configuration (C) Herbert Haas 2005/03/11 Shortcomings of RARP Reverse Address Resolution Protocol Only IP Address distribution No subnet mask Using hardware address
More informationWEB ADMINISTRATION AND MANAGEMENT. Internetworking: Concepts, Principles and Application
WEB ADMINISTRATION AND MANAGEMENT 3/17/2015 Internetworking: Concepts, Principles and Application jkm.cse@gmail.com 1 J. K. Mandal Professor & Ex-Dean FETM, Department of Computer Science & Engineering,
More informationin the Internet Andrea Bianco Telecommunication Network Group Application taxonomy
Multimedia traffic support in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 Application
More informationCCNA R&S: Introduction to Networks. Chapter 10: The Application Layer
CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application
More informationsmxnet ROM Requirements (KB)
Embedded Software Outfitters smxnet TM smxnet is a TCP/IP network stack, which has been optimized for use in real-time embedded systems. It offers RFC-compliant TCP and conforms to the Berkeley sockets
More informationExamination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS
Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered
More informationOSI Model with Protocols. Layer Name PDU Address Protocols Device
NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation
More information