Saturday, September 21, 2013
What are the services provided to upper layers by transport layer?
Posted by
Sunflower
at
9/21/2013 04:01:00 PM
0
comments
Labels: Applications, Communication, Components, Connection oriented, Connection-less, Data, Framework, Interface, Layers, Networking, Operating System, OSI, Protocol, Services, TCP/IP, Transport layer, Upper layers
![]() | Subscribe by Email |
|
Wednesday, September 11, 2013
What are transport and application gateways?
Posted by
Sunflower
at
9/11/2013 10:16:00 PM
0
comments
Labels: Acknowledgement, Application, Application gateways, Code, Connection, Design, Destination, Gateways, Layers, Networks, Ports, Protocols, Request, Server, Source, System, TCP/IP, Transport, Transport gateways
![]() | Subscribe by Email |
|
Friday, July 12, 2013
Sliding Window Protocols? – Part 1
Posted by
Sunflower
at
7/12/2013 01:30:00 PM
0
comments
Labels: Bit, Data, Data Link layer, Features, Modes, OSI, Packets, Protocols, Receive, Reliability, Sender, Sliding Window protocols, TCP/IP, transmission, Transmit, Transmitter, Window
![]() | Subscribe by Email |
|
Friday, April 2, 2010
Overview of Simple Network Management Protocol - SNMP
- The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices.
- It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite.
- SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth.
- SNMP is a popular protocol for network management.
- SNMP can collect information such as a server’s CPU level, server chassis Temperature etc.
- SNMP is the protocol that allows an SNMP manager (the controller) to control an SNMP agent (the controlee) by exchanging SNMP messages.
- The SNMP protocol was designed to provide a "simple" method of centralizing the management of TCP/IP-based networks.
SNMP Basic Components
SNMP consists of three key components: managed devices, agents, and network-- management systems (NMSs).
- A managed device is a network node that contains an SNMP agent and that resides on a managed network.
- An agent is a network-management software module that resides in a managed device. An agent has local knowledge of management information and translates that information into a form compatible with SNMP.
- An NMS executes applications that monitor and control managed devices.
SNMP Commands
- The read command is used by an NMS to monitor managed devices. The NMS examines different variables that are maintained by managed devices.
- The write command is used by an NMS to control managed devices. The NMS changes the values of variables stored within managed devices.
- The trap command is used by managed devices to asynchronously report events to the NMS. When certain types of events occur, a managed device sends a trap to the NMS.
SNMP itself does not define which information (which variables) a managed system should offer. Rather, SNMP uses an extensible design, where the available information is defined by management information bases (MIBs). MIBs describe the structure of the management data of a device subsystem; they use a hierarchical namespace containing object identifiers (OID). Each OID identifies a variable that can be read or set via SNMP.
Posted by
Sunflower
at
4/02/2010 04:31:00 PM
0
comments
Labels: Commands, Components, Internet, Networks, Protocols, Simple Network Management Protocol, SNMP, TCP/IP
![]() | Subscribe by Email |
|
Monday, March 22, 2010
The TELNET (Terminal Network) Protocol
TELNET (TErminaL NETwork) is a network protocol used on the Internet or local area networks to provide a bidirectional interactive communications facility.
- Telnet offers users the capability of running programs remotely and facilitates remote administration.
- Telnet is available for practically all operating systems and eases integration in heterogeneous networking environments.
- The Telnet protocol is applied on a TCP connection to send data in ASCII format coded over 8 bits between which the Telnet check sequences come.
Communication is established using TCP/IP and is based on a Network Virtual Terminal (NVT). On the client, the Telnet program is responsible for translating incoming NVT codes to codes understood by the client's display device as well as for translating client-generated keyboard codes into outgoing NVT codes.
Commands
The Telnet protocol uses various commands to control the client-server connection. These commands are transmitted within the data stream. The commands are distinguished from the data by setting the most significant bit to 1.
Telnet Options
Options give the client and server a common view of the connection. They can be negotiated at any time during the connection by the use of commands. They are described in separate RFCs.
Use of TELNET
The use of Telnet for remote logins should be discontinued under all normal circumstances, for the following reasons :
- Telnet, by default, does not encrypt any data sent over the connection (including passwords).
- Telnet have no authentication that would ensure communication is carried out between the two desired hosts and not intercepted in the middle.
Telnet is popular in various application areas:
- Enterprise networks to access host applications, e.g., on IBM Mainframes.
- Administration of network elements, e.g., in commissioning, integration and maintenance of core network elements in mobile communication networks, and many industrial control systems.
- MUD games played over the Internet.
- Internet game clubs.
- Embedded systems.
- Mobile data collection applications.
Posted by
Sunflower
at
3/22/2010 11:16:00 AM
0
comments
Labels: Application, Commands, Internet, Network, Network Virtual Terminal, NVT, Operating Systems, Protocols, TCP/IP, TELNET, Terminal Network, Uses of TELNET
![]() | Subscribe by Email |
|
Friday, March 19, 2010
RARP : Reverse Address Resolution Protocol
- RARP (Reverse Address Resolution Protocol) is a protocol by which a physical machine in a local area network can request to learn its IP address from a gateway server's Address Resolution Protocol (ARP) table or cache.
- A reverse address resolution protocol (RARP) is used for disk less computers to determine their IP address using the network. The RARP message format is very similar to the ARP format.
- When a new machine is set up, its RARP client program requests from the RARP server on the router to be sent its IP address.
- The RARP server will return the IP address to the machine which can store it for future use assuming that the entry has been put in the router table.
- RARP is available for Ethernet, Fiber Distributed-Data Interface, and Token Ring LANs.
- The 'operation' field in the RARP packet is used to differentiate between a RARP request and a RARP reply packet.
- Since a RARP request packet is a broadcast packet, it is received by all the hosts in the network. But only a RARP server processes a RARP request packet, all the other hosts discard the packet.
- The RARP reply packet is not broadcast, it is sent directly to the host, which sent the RARP request.
When a RARP server receives a RARP request packet, it performs the following steps:
- The MAC address in the request packet is looked up in the configuration file and
mapped to the corresponding IP address.
- If the mapping is not found, the packet is discarded.
- If the mapping is found, a RARP reply packet is generated with the MAC and IP
address. This packet is sent to the host, which originated the RARP request.
When a host receives a RARP reply packet, it gets its IP address from the packet and completes the booting process.
Posted by
Sunflower
at
3/19/2010 06:50:00 PM
0
comments
Labels: ARP, Internet protocol, IP address, Networks, Packets, Protocols, RARP, Reply, Request, Reverse Address Resolution Protocol, Server, TCP/IP
![]() | Subscribe by Email |
|
Thursday, March 18, 2010
Serial Line Internet Protocol - SLIP protocol
The need for a data link layer protocol to let IP operate over serial links was identified very early on in the development of TCP/IP. To solve the problem they created a very simple protocol that would frame IP data grams for transmission across the serial line. This protocol is called the Serial Line Internet Protocol, or SLIP for short.
SLIP modifies a standard TCP/IP data gram by appending a special "SLIP END" character to it, which distinguishes data gram boundaries in the byte stream. SLIP requires a serial port configuration of 8 data bits, no parity, and either EIA hardware flow control, or CLOCAL mode (3-wire null-modem) UART operation settings.
- Serial Line Interface Protocol (SLIP) is a TCP/IP protocol used for
communication between two machines that are previously configured for communication with each other.
- The dial-up connection to the server is typically on a slower serial line rather than on the parallel or multiplex lines.
- SLIP does not provide error detection, being reliant on other high-layer protocols for this.
- A SLIP connection needs to have its IP address configuration set each time before it is established.
- The Serial Line Internet Protocol (SLIP) is a mostly obsolete encapsulation of the Internet Protocol designed to work over serial ports and modem connections.
- A version of SLIP with header compression is called CSLIP (Compressed SLIP).
- The Parallel Line Internet Protocol (PLIP) is very similar to SLIP, but works at higher speeds via a parallel port.
- SLIP is a STREAMS-based computer networking facility that provides for the transmission and reception of IP packets over serial lines.
- SLIP can be used to connect one host to another via a single, physical serial line connection between serial ports or over longer distances using a modem at each end of a telephone line.
Posted by
Sunflower
at
3/18/2010 06:18:00 PM
0
comments
Labels: Data Link layer, Internet Protocol, IP address, Networks, Operating Systems, Protocols, Serial, Serial Line Internet Protocol, SLIP, TCP/IP, Transfer of data
![]() | Subscribe by Email |
|