Vous êtes sur la page 1sur 20

Collaborate

Knowledge Byte
In this section, you will learn about the following: Application layer of TCP/IP Architecture

NIIT

Collaborate

Lesson 2C / Slide 1 of 20

Collaborate

Application Layer

The following figure depicts the position of Application layer in TCP/IP Architecture:

Application Layer Transport Layer Internet Layer Network Access Layer

TCP/IP Architecture Application Layer

NIIT

Collaborate

Lesson 2C / Slide 2 of 20

Collaborate

Application Layer (Contd.)



It is the top layer of the TCP/IP architecture. It corresponds to the Presentation and Application layer of the OSI reference model. It provides applications, the ability to access the services of the other layers. It defines the protocols that applications use to exchange data.

NIIT

Collaborate

Lesson 2C / Slide 3 of 20

Collaborate

Protocols used in Application Layer

The following figure depicts the protocols used in Application Layer :


SMTP FTP Telnet Gopher SNMP Ping OSPF Application Layer Transport Layer Internet Layer Network Access Layer HTTP DNS RIP TFTP Finger NFS

TCP/IP Architecture Application Layer protocols

NIIT

Collaborate

Lesson 2C / Slide 4 of 20

Collaborate

Protocols used in Application Layer (Contd.)

Some of the protocols are:


NIIT

Hypertext Transfer Protocol (HTTP) File Transfer Protocol (FTP) Trivial File Transfer Protocol (TFTP) Simple Mail Transfer Protocol (SMTP) Simple Network Management Protocol (SNMP) Telnet Finger Gopher Packet Internet Groper (Ping) Domain Name Service (DNS) Routing Information Protocol (RIP) Network File system (NFS) Open Shortest Path First (OSPF)
Collaborate Lesson 2C / Slide 5 of 20

Collaborate

From the Experts Desk


This section will introduce the following: Tip on creating a default route FAQs on TCP, UDP, monitoring network and FTP

NIIT

Collaborate

Lesson 2C / Slide 6 of 20

Collaborate

Tip
Creating a default route

You can create a default route by defining a static route and using all 0's to specify the remote network and the subnet mask.

NIIT

Collaborate

Lesson 2C / Slide 7 of 20

Collaborate

FAQs
Q. How can each application running over TCP or UDP distinguish itself from other applications? Ans. Application running over TCP or UDP distinguishes itself from other applications by reserving and using a 16-bit port number. Destination and source port numbers are placed in the UDP and TCP header of the data packet before it is transmitted to IP. The destination port number allows the packet to be delivered to the intended recipient at the destination network. Q. What is Nagle algorithm? How it works in TCP protocol? Ans. The Nagle algorithm combines a sequence of small messages together into larger TCP packets to reduce network congestion and utilize network resources more efficiently. It is named after engineer John Nagle. The Nagle algorithm was added to most TCP implementations on UNIX in the 1980s and remains a standard feature on all popular computer platforms. It is enabled by default in Windows and Linux platforms. The Nagle algorithm was designed to improve the network overhead caused by floods of many small TCP packets on a network.
NIIT Collaborate Lesson 2C / Slide 8 of 20

Collaborate

FAQs (Contd..)
The Nagle algorithm executes on the sending node during the time when application messages are converted into segments by TCP protocol. 1. The sending TCP sends the first segment it receives from the Application process. The data segment can be 1 byte in size. 2. After sending the first segment, the sending TCP accumulates other data segments in the output data buffer. The TCP sends the second segment until a. It receives an acknowledgement from the receiver TCP b. Enough data is accumulated in the output buffer. The amount of data to be accumulated before sending is defined in the maximum segment size. 3. The second step is repeated for the rest of the data transmission.

NIIT

Collaborate

Lesson 2C / Slide 9 of 20

Collaborate

FAQs (Contd.)
Q. Jack is using a Windows 98 computer to connect to a Windows 2000 server through a LAN. He can ping the server. He can also ping his computer from the server. But he is unable to connect to the server from his computer. He can access the shared hard drive of his from the server, but he cannot access the shared hard drive of the server from his computer. He had checked the following: Wiring, NIC, IP addresses and all seem to be in order. Domain Name is also correct NetBIOS over TCP/IP is enabled Windows 98 username and password are identical to the entries on the Server What will he do to connect to the server from the Windows 98 computer? Ans. He has to reset and reboot the hub and the router to fix this problem.

NIIT

Collaborate

Lesson 2C / Slide 10 of 20

Collaborate

FAQs (Contd.)
Q. What changes IPv6 has brought over IPv4 in context of UDP and TCP checksums? Ans. In IPv4 UDP checksums are optional, but TCP checksums are mandatory. However, in the next-generation IP - IPv6 both TCP and UDP checksums are mandatory. Both UDP and TCP checksums are the same size - 16 bits. Q. List the tools to monitor network. Ans. The following are the list of available tools: Tcpdump: Tcpdump prints out the headers of packets on a network interface that match the boolean expression. This tool can be used in multiple platforms if used with libpcap. ipgrab: ipgrab is a verbose packet tools for UNIX hosts. ipgrab displays link level, transport level, and network level information on packets captured verbosely. Ethereal: Ethereal is a GUI network protocol analyzer. It is a freeware and can be used for Unix and Windows. It allows you to analyze data from a network or from a capture file on disk. It runs on both Linux and Windows platform.
NIIT Collaborate Lesson 2C / Slide 11 of 20

Collaborate

FAQs (Contd.)

tcptrace: tcptrace is used for analysing TCP dump files. It can take as input the files produced by several popular packet-capture programs, such as tcpdump, snoop, etherpeek, HP Net Metrix, and WinDump. It can produce several different types of output containing information on each connection seen, such as elapsed time, bytes and segments sent and recieved, retransmissions, round trip times, window advertisements, throughput, and more. It can also produce a number of graphs for further analysis. tcpflow: tcpflow is a program that captures data transmitted as part of TCP connections, and stores the data in a way that is convenient for protocol analysis or debugging.

Q. What is Anonymous FTP? Ans. A ftp site where an account is not required to login is known as Anonymous FTP. In most of the site the username is anonymous and the password is email address of the user.

NIIT

Collaborate

Lesson 2C / Slide 12 of 20

Collaborate

FAQs (Contd.)
Q. How will you validate the name of the site that you are unable to access? Ans. You can validate the name of the site that you are unable to access by the following ways: You can telnet to the site. Telnet works on all systems. You can use nslookup site name. In Unix you can also try host site name. You can use either ping or traceroute or hopcheck to check the path to the site. You can also send emails to the following addresses: dns@grasp.insa-lyon.fr service@nic.ddn.mil resolve@cs.widener.edu

NIIT

Collaborate

Lesson 2C / Slide 13 of 20

Collaborate

Challenge
1. Crossword

NIIT

Collaborate

Lesson 2C / Slide 14 of 20

Collaborate

Challenge (Contd.)
Across 1. A field used for error detection 4. Rules for communication 9. A TCP/IP application service that converts user-friendly names to IP 10. A client-server program that allows remote login addresses

Down
2. The most popular LAN technology uses CSMA/CD access method 3. A connectionless TCP/IP transport layer protocol 5. A protocol that converts IP address to physical address 6. An application service for retrieving web documents 7. A transport layer protocol that handles error and control messages 8. In IPv6 it is referred by the ::1 address 11. An application program, which determines the reachability of a destination by using an ICMP echo request and reply

NIIT

Collaborate

Lesson 2C / Slide 15 of 20

Collaborate

Challenge (Contd.)
2. A host with IP address 132.24.42.20 and a physical address 0xB24556022110 has a packet to send to another host with IP address 132.24.42.25 and physical address 0xA34EF56988AC. Then two hosts are on the same Ethernet network. Show the ARP request and reply packets encapsulated in Ethernet frames in a diagram. 3. Jack has joined Tech Inc. recently as a junior network administrator. The head office of Tech Inc. is in New Jersey. Tech Inc. also has branch offices located in other US cities, such as Detroit, New York. He is setting up a workstation in Detroit branch office for access to the server in New Jersey. The office has a fax server configured, and it is working correctly. Jack wants to establish a connection between the remote workstation and fax server. He also wants that the server at the office must authenticate the workstation. TCP/IP and IPX are installed and configured on both the servers. He wants to enable the communication between the workstation and the office by using the single protocol. The workstation will also able to access all network devices at the office. Jack has performed the following actions:
NIIT Collaborate Lesson 2C / Slide 16 of 20

Collaborate

Challenge (Contd.)

Installed a telephone line, modem cable and the modem at the workstation NetBEUI installed and configured on the workstation Configured the software settings on the modem

He tried to connect to the office server but failed. What is the reason behind it?

NIIT

Collaborate

Lesson 2C / Slide 17 of 20

Collaborate

Solutions to Challenge
1. Across 1. Checksum 4. Protocol 9. DNS 10. Telnet Down 2. Ethernet 3. UDP 5. RARP 6. HTTP 7. ICMP 8. Loopback 11. Ping

NIIT

Collaborate

Lesson 2C / Slide 18 of 20

Collaborate

Solutions to Challenge (Contd.)


2.
Node A
IP Address 132.24.42.20 Physical Address

ARP Request ARP Reply

Node B
IP Address 132.24.42.25 Physical Address

0xB245560 22110

0xA34EF569 88AC

ARP Operation

CRC

Data

Type 0806

Source Physical Address 0xB245560221 10

Destination IP Address
132.24.42.25

Preamble and SFD


ARP request from Node A

Preamble and SFD

Source Physical Address 0xA34EF56988 AC

Destination Physical Address 0xB245560221 10

Type 0806

Data

CRC
ARP reply from Node B

NIIT

Collaborate

Lesson 2C / Slide 19 of 20

Collaborate

Solutions to Challenge (Contd.)


3. Different protocols are installed on the workstation and server. In workstation, NetBEUI is installed, and in the servers TCP/IP and IPX are installed. Because the workstation and the server are running on separate protocols, they cant communicate with each other.

NIIT

Collaborate

Lesson 2C / Slide 20 of 20

Vous aimerez peut-être aussi