Académique Documents
Professionnel Documents
Culture Documents
Knowledge Byte
In this section, you will learn about the following: Application layer of TCP/IP Architecture
NIIT
Collaborate
Lesson 2C / Slide 1 of 20
Collaborate
Application Layer
The following figure depicts the position of Application layer in TCP/IP Architecture:
NIIT
Collaborate
Lesson 2C / Slide 2 of 20
Collaborate
NIIT
Collaborate
Lesson 2C / Slide 3 of 20
Collaborate
NIIT
Collaborate
Lesson 2C / Slide 4 of 20
Collaborate
NIIT
Hypertext Transfer Protocol (HTTP) File Transfer Protocol (FTP) Trivial File Transfer Protocol (TFTP) Simple Mail Transfer Protocol (SMTP) Simple Network Management Protocol (SNMP) Telnet Finger Gopher Packet Internet Groper (Ping) Domain Name Service (DNS) Routing Information Protocol (RIP) Network File system (NFS) Open Shortest Path First (OSPF)
Collaborate Lesson 2C / Slide 5 of 20
Collaborate
NIIT
Collaborate
Lesson 2C / Slide 6 of 20
Collaborate
Tip
Creating a default route
You can create a default route by defining a static route and using all 0's to specify the remote network and the subnet mask.
NIIT
Collaborate
Lesson 2C / Slide 7 of 20
Collaborate
FAQs
Q. How can each application running over TCP or UDP distinguish itself from other applications? Ans. Application running over TCP or UDP distinguishes itself from other applications by reserving and using a 16-bit port number. Destination and source port numbers are placed in the UDP and TCP header of the data packet before it is transmitted to IP. The destination port number allows the packet to be delivered to the intended recipient at the destination network. Q. What is Nagle algorithm? How it works in TCP protocol? Ans. The Nagle algorithm combines a sequence of small messages together into larger TCP packets to reduce network congestion and utilize network resources more efficiently. It is named after engineer John Nagle. The Nagle algorithm was added to most TCP implementations on UNIX in the 1980s and remains a standard feature on all popular computer platforms. It is enabled by default in Windows and Linux platforms. The Nagle algorithm was designed to improve the network overhead caused by floods of many small TCP packets on a network.
NIIT Collaborate Lesson 2C / Slide 8 of 20
Collaborate
FAQs (Contd..)
The Nagle algorithm executes on the sending node during the time when application messages are converted into segments by TCP protocol. 1. The sending TCP sends the first segment it receives from the Application process. The data segment can be 1 byte in size. 2. After sending the first segment, the sending TCP accumulates other data segments in the output data buffer. The TCP sends the second segment until a. It receives an acknowledgement from the receiver TCP b. Enough data is accumulated in the output buffer. The amount of data to be accumulated before sending is defined in the maximum segment size. 3. The second step is repeated for the rest of the data transmission.
NIIT
Collaborate
Lesson 2C / Slide 9 of 20
Collaborate
FAQs (Contd.)
Q. Jack is using a Windows 98 computer to connect to a Windows 2000 server through a LAN. He can ping the server. He can also ping his computer from the server. But he is unable to connect to the server from his computer. He can access the shared hard drive of his from the server, but he cannot access the shared hard drive of the server from his computer. He had checked the following: Wiring, NIC, IP addresses and all seem to be in order. Domain Name is also correct NetBIOS over TCP/IP is enabled Windows 98 username and password are identical to the entries on the Server What will he do to connect to the server from the Windows 98 computer? Ans. He has to reset and reboot the hub and the router to fix this problem.
NIIT
Collaborate
Lesson 2C / Slide 10 of 20
Collaborate
FAQs (Contd.)
Q. What changes IPv6 has brought over IPv4 in context of UDP and TCP checksums? Ans. In IPv4 UDP checksums are optional, but TCP checksums are mandatory. However, in the next-generation IP - IPv6 both TCP and UDP checksums are mandatory. Both UDP and TCP checksums are the same size - 16 bits. Q. List the tools to monitor network. Ans. The following are the list of available tools: Tcpdump: Tcpdump prints out the headers of packets on a network interface that match the boolean expression. This tool can be used in multiple platforms if used with libpcap. ipgrab: ipgrab is a verbose packet tools for UNIX hosts. ipgrab displays link level, transport level, and network level information on packets captured verbosely. Ethereal: Ethereal is a GUI network protocol analyzer. It is a freeware and can be used for Unix and Windows. It allows you to analyze data from a network or from a capture file on disk. It runs on both Linux and Windows platform.
NIIT Collaborate Lesson 2C / Slide 11 of 20
Collaborate
FAQs (Contd.)
tcptrace: tcptrace is used for analysing TCP dump files. It can take as input the files produced by several popular packet-capture programs, such as tcpdump, snoop, etherpeek, HP Net Metrix, and WinDump. It can produce several different types of output containing information on each connection seen, such as elapsed time, bytes and segments sent and recieved, retransmissions, round trip times, window advertisements, throughput, and more. It can also produce a number of graphs for further analysis. tcpflow: tcpflow is a program that captures data transmitted as part of TCP connections, and stores the data in a way that is convenient for protocol analysis or debugging.
Q. What is Anonymous FTP? Ans. A ftp site where an account is not required to login is known as Anonymous FTP. In most of the site the username is anonymous and the password is email address of the user.
NIIT
Collaborate
Lesson 2C / Slide 12 of 20
Collaborate
FAQs (Contd.)
Q. How will you validate the name of the site that you are unable to access? Ans. You can validate the name of the site that you are unable to access by the following ways: You can telnet to the site. Telnet works on all systems. You can use nslookup site name. In Unix you can also try host site name. You can use either ping or traceroute or hopcheck to check the path to the site. You can also send emails to the following addresses: dns@grasp.insa-lyon.fr service@nic.ddn.mil resolve@cs.widener.edu
NIIT
Collaborate
Lesson 2C / Slide 13 of 20
Collaborate
Challenge
1. Crossword
NIIT
Collaborate
Lesson 2C / Slide 14 of 20
Collaborate
Challenge (Contd.)
Across 1. A field used for error detection 4. Rules for communication 9. A TCP/IP application service that converts user-friendly names to IP 10. A client-server program that allows remote login addresses
Down
2. The most popular LAN technology uses CSMA/CD access method 3. A connectionless TCP/IP transport layer protocol 5. A protocol that converts IP address to physical address 6. An application service for retrieving web documents 7. A transport layer protocol that handles error and control messages 8. In IPv6 it is referred by the ::1 address 11. An application program, which determines the reachability of a destination by using an ICMP echo request and reply
NIIT
Collaborate
Lesson 2C / Slide 15 of 20
Collaborate
Challenge (Contd.)
2. A host with IP address 132.24.42.20 and a physical address 0xB24556022110 has a packet to send to another host with IP address 132.24.42.25 and physical address 0xA34EF56988AC. Then two hosts are on the same Ethernet network. Show the ARP request and reply packets encapsulated in Ethernet frames in a diagram. 3. Jack has joined Tech Inc. recently as a junior network administrator. The head office of Tech Inc. is in New Jersey. Tech Inc. also has branch offices located in other US cities, such as Detroit, New York. He is setting up a workstation in Detroit branch office for access to the server in New Jersey. The office has a fax server configured, and it is working correctly. Jack wants to establish a connection between the remote workstation and fax server. He also wants that the server at the office must authenticate the workstation. TCP/IP and IPX are installed and configured on both the servers. He wants to enable the communication between the workstation and the office by using the single protocol. The workstation will also able to access all network devices at the office. Jack has performed the following actions:
NIIT Collaborate Lesson 2C / Slide 16 of 20
Collaborate
Challenge (Contd.)
Installed a telephone line, modem cable and the modem at the workstation NetBEUI installed and configured on the workstation Configured the software settings on the modem
He tried to connect to the office server but failed. What is the reason behind it?
NIIT
Collaborate
Lesson 2C / Slide 17 of 20
Collaborate
Solutions to Challenge
1. Across 1. Checksum 4. Protocol 9. DNS 10. Telnet Down 2. Ethernet 3. UDP 5. RARP 6. HTTP 7. ICMP 8. Loopback 11. Ping
NIIT
Collaborate
Lesson 2C / Slide 18 of 20
Collaborate
Node B
IP Address 132.24.42.25 Physical Address
0xB245560 22110
0xA34EF569 88AC
ARP Operation
CRC
Data
Type 0806
Destination IP Address
132.24.42.25
Type 0806
Data
CRC
ARP reply from Node B
NIIT
Collaborate
Lesson 2C / Slide 19 of 20
Collaborate
NIIT
Collaborate
Lesson 2C / Slide 20 of 20