SlideShare a Scribd company logo
FTP
The File Transfer Protocol (FTP) is another commonly used Application layer protocol.
FTP was developed to allow for file transfers between a client and a server. An FTP
client is an application that runs on a computer that is used to push and pull files from a
server running the FTP daemon (FTPd).
To successfully transfer files, FTP requires two connections between the client and the
server: one for commands and replies, the other for the actual file transfer.
The client establishes the first connection to the server on TCP port 21. This connection
is used for control traffic, consisting of client commands and server replies.
The client establishes the second connection to the server over TCP port 20. This
connection is for the actual file transfer and is created every time there is a file
transferred.
The file transfer can happen in either direction. The client can download (pull) a file from
the server or, the client can upload (push) a file to the server.
DHCP
The Dynamic Host Configuration Protocol (DHCP) service enables devices on a network
to obtain IP addresses and other information from a DHCP server. This service automates
the assignment of IP addresses, subnet masks, gateway and other IP networking
parameters.
Without DHCP, users have to manually input the IP address, subnet mask and other
network settings in order to join the network. The DHCP server maintains a pool of IP
addresses and leases an address to any DHCP-enabled client when the client is powered
on. Because the IP addresses are dynamic (leased) rather than static (permanently
assigned), addresses no longer in use are automatically returned to the pool for
reallocation. When a DHCP-configured device boots up or connects to the network, the
client broadcasts a DHCP DISCOVER packet to identify any available DHCP servers on
the network. A DHCP server replies with a DHCP OFFER, which is a lease offer
message with an assigned IP address, subnet mask, DNS server, and default gateway
information as well as the duration of the lease.
The client may receive multiple DHCP OFFER packets if there is more than one DHCP
server on the local network, so it must choose between them, and broadcast a DHCP
REQUEST packet that identifies the explicit server and lease offer that the client is
accepting. A client may choose to request an address that it had previously been allocated
by the server.
Assuming that the IP address requested by the client, or offered by the server, is still
valid, the server would return a DHCP ACK message that acknowledges to the client the
lease is finalized. If the offer is no longer valid - perhaps due to a time-out or another
client allocating the lease - then the selected server will respond with a DHCP NAK
message (Negative Acknowledgement). If a DHCP NAK message is returned, then the
selection process must begin again with a new DHCP DISCOVER message being
transmitted.
Once the client has the lease, it must be renewed prior to the lease expiration through
another DHCP REQUEST message.
The DHCP server ensures that all IP addresses are unique (an IP address cannot be
assigned to two different network devices simultaneously). Using DHCP enables network
administrators to easily reconfigure client IP addresses without having to manually make
changes to the clients. Most Internet providers use DHCP to allocate addresses to their
customers who do not require a static address.
File Sharing Services and SMB Protocol
The Server Message Block (SMB) is a client/server file sharing protocol. IBM developed
Server Message Block (SMB) in the late 1980s to describe the structure of shared
network resources, such as directories, files, printers, and serial ports. It is a request-
response protocol. Unlike the file sharing supported by FTP, clients establish a long term
connection to servers. Once the connection is established, the user of the client can access
the resources on the server as if the resource is local to the client host.
SMB file-sharing and print services have become the mainstay of Microsoft networking.
With the introduction of the Windows 2000 series of software, Microsoft changed the
underlying structure for using SMB. In previous versions of Microsoft products, the SMB
services used a non-TCP/IP protocol to implement name resolution. Beginning with
Windows 2000, all subsequent Microsoft products use DNS naming. This allows TCP/IP
protocols to directly support SMB resource sharing, as shown in the figure.
The LINUX and UNIX operating systems also provide a method of sharing resources
with Microsoft networks using a version of SMB called SAMBA. The Apple Macintosh
operating systems also support resource sharing using the SMB protocol.
Telnet Services and Protocol
Telnet is a client/server protocol and it specifies how a VTY session is established and
terminated. It also provides the syntax and order of the commands used to initiate the Telnet
session, as well as control commands that can be issued during a session. Each Telnet command
consists of at least two bytes. The first byte is a special character called the Interpret as Command
(IAC) character. As its name implies, the IAC defines the next byte as a command rather than
text.
Some sample Telnet protocol commands include:
Are You There (AYT) - Lets the user request that something appear on the terminal
screen to indicate that the VTY session is active.
Erase Line (EL) - Deletes all text from the current line.
Interrupt Process (IP) - Suspends, interrupts, aborts, or terminates the process to which
the Virtual Terminal is connected. For example, if a user started a program on the Telnet
server via the VTY, he or she could send an IP command to stop the program.
While the Telnet protocol supports user authentication, it does not support the transport of
encrypted data. All data exchanged during a Telnet sessions is transported as plain text across the
network. This means that the data can be intercepted and easily understood.
If security is a concern, the Secure Shell (SSH) protocol offers an alternate and secure method for
server access. SSH provides the structure for secure remote login and other secure network
services. It also provides stronger authentication than Telnet and supports the transport of session
data using encryption. As a best practice, network professionals should always use SSH in place
of Telnet, whenever possible.

More Related Content

What's hot (20)

PPT
Group20 Dynamic Networks
hariprasadnr
 
PPTX
TCP- Transmission Control Protocol
Akhil .B
 
PPT
retrieving the mail
tumetr1
 
PPT
Ftp smtp
Apu Stont
 
PDF
Lec 8(FTP Protocol)
maamir farooq
 
PPT
Transport Layer
Ram Dutt Shukla
 
PPT
TCP / IP Services and Standards
Ross University School of Medicine
 
PPT
Tcpip services and applications
Online
 
PPTX
Application layer
reshmadayma
 
PPT
transport layer
priyadharshini murugan
 
PPTX
Application Layer
Tutun Juhana
 
PPTX
Simple mail transfer protocol
Anagha Ghotkar
 
PPTX
Ftp: a slideshow on File transfer protocol
Lina Guha Roy
 
PPTX
File Transfer Protocol
guest029bcd
 
PPTX
Remote Login and File Transfer Protocols
Himanshu Pathak
 
PPTX
application layer protocols
bhavanatmithun
 
PPT
Introduction to Application layer
Dr. C.V. Suresh Babu
 
PPT
Application protocols
Online
 
PPT
Application layer
Ahmed_Hamed_Attia
 
PPTX
Domain name system (dns) , TELNET ,FTP, TFTP
saurav kumar
 
Group20 Dynamic Networks
hariprasadnr
 
TCP- Transmission Control Protocol
Akhil .B
 
retrieving the mail
tumetr1
 
Ftp smtp
Apu Stont
 
Lec 8(FTP Protocol)
maamir farooq
 
Transport Layer
Ram Dutt Shukla
 
TCP / IP Services and Standards
Ross University School of Medicine
 
Tcpip services and applications
Online
 
Application layer
reshmadayma
 
transport layer
priyadharshini murugan
 
Application Layer
Tutun Juhana
 
Simple mail transfer protocol
Anagha Ghotkar
 
Ftp: a slideshow on File transfer protocol
Lina Guha Roy
 
File Transfer Protocol
guest029bcd
 
Remote Login and File Transfer Protocols
Himanshu Pathak
 
application layer protocols
bhavanatmithun
 
Introduction to Application layer
Dr. C.V. Suresh Babu
 
Application protocols
Online
 
Application layer
Ahmed_Hamed_Attia
 
Domain name system (dns) , TELNET ,FTP, TFTP
saurav kumar
 

Similar to Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4 (20)

PPTX
System and network administration network services
Uc Man
 
PPTX
Unit 6 : Application Layer
Chandan Gupta Bhagat
 
PPTX
Internet Internet Protocols.pptx( technology)
ujjawalr9027
 
PPTX
File transfer protocol- Gowdham
Gowdham P
 
DOCX
Protocols in computer network
priya sehgal
 
PPTX
Basic to advance protocols
Varinder Singh Walia
 
PPTX
Ports and services
Ilan Mindel
 
PPTX
Ch4 Protocols.pptx
azmerawAnna1
 
PDF
2.4 Write a stream –based echo server and a client sending message t.pdf
excellentmobiles
 
PDF
Ajp notes-chapter-04
Ankit Dubey
 
PPTX
Ch4 Protocols.pptx
kebeAman
 
PDF
HNS L III UC2 Installing and Managing Network Protocols .pdf
AbenetAsmellash
 
DOCX
Networking Fundamentals
Vikas Gupta
 
PPTX
OSI Application layer. tcp/ip application layer
artisticcc11
 
PPTX
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
VivekTripathi684438
 
PDF
Notes e commerce
S S
 
PDF
Web and internet technology notes for BCA students
nawejakhatar10063
 
PPTX
application layer protocol for iot.pptx
aravind Guru
 
PPTX
NETWORK PROTOCOLS lecture one introdection to protocols
abdusalamyahya2
 
System and network administration network services
Uc Man
 
Unit 6 : Application Layer
Chandan Gupta Bhagat
 
Internet Internet Protocols.pptx( technology)
ujjawalr9027
 
File transfer protocol- Gowdham
Gowdham P
 
Protocols in computer network
priya sehgal
 
Basic to advance protocols
Varinder Singh Walia
 
Ports and services
Ilan Mindel
 
Ch4 Protocols.pptx
azmerawAnna1
 
2.4 Write a stream –based echo server and a client sending message t.pdf
excellentmobiles
 
Ajp notes-chapter-04
Ankit Dubey
 
Ch4 Protocols.pptx
kebeAman
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
AbenetAsmellash
 
Networking Fundamentals
Vikas Gupta
 
OSI Application layer. tcp/ip application layer
artisticcc11
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
VivekTripathi684438
 
Notes e commerce
S S
 
Web and internet technology notes for BCA students
nawejakhatar10063
 
application layer protocol for iot.pptx
aravind Guru
 
NETWORK PROTOCOLS lecture one introdection to protocols
abdusalamyahya2
 
Ad

More from Syed Ariful Islam Emon (11)

PDF
Quizlet Barrons 800 High Frequency GRE words.pdf
Syed Ariful Islam Emon
 
PDF
Ch2 the application layer protocols_http_3
Syed Ariful Islam Emon
 
PDF
Ch1 delays, loss, and throughput l5
Syed Ariful Islam Emon
 
PDF
Ch1 computer networks internet_basic_1
Syed Ariful Islam Emon
 
PDF
Ch1 computer networks internet_encapsulation_4
Syed Ariful Islam Emon
 
PDF
Ch1 computer networks internet_basic_1
Syed Ariful Islam Emon
 
PDF
M.sc. engg (ict) admission guide database management system 4
Syed Ariful Islam Emon
 
PDF
2015 11-07 -ad_hoc__network architectures and protocol stack
Syed Ariful Islam Emon
 
PPTX
Lecture 7
Syed Ariful Islam Emon
 
PDF
08 neural networks(1).unlocked
Syed Ariful Islam Emon
 
Quizlet Barrons 800 High Frequency GRE words.pdf
Syed Ariful Islam Emon
 
Ch2 the application layer protocols_http_3
Syed Ariful Islam Emon
 
Ch1 delays, loss, and throughput l5
Syed Ariful Islam Emon
 
Ch1 computer networks internet_basic_1
Syed Ariful Islam Emon
 
Ch1 computer networks internet_encapsulation_4
Syed Ariful Islam Emon
 
Ch1 computer networks internet_basic_1
Syed Ariful Islam Emon
 
M.sc. engg (ict) admission guide database management system 4
Syed Ariful Islam Emon
 
2015 11-07 -ad_hoc__network architectures and protocol stack
Syed Ariful Islam Emon
 
08 neural networks(1).unlocked
Syed Ariful Islam Emon
 
Ad

Recently uploaded (20)

PPTX
Gall bladder, Small intestine and Large intestine.pptx
rekhapositivity
 
PDF
1, 2, 3… E MAIS UM CICLO CHEGA AO FIM!.pdf
Colégio Santa Teresinha
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PPTX
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PPTX
How to Configure Prepayments in Odoo 18 Sales
Celine George
 
PPTX
How to Configure Storno Accounting in Odoo 18 Accounting
Celine George
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PDF
Federal dollars withheld by district, charter, grant recipient
Mebane Rash
 
PDF
BÀI TẬP BỔ TRỢ THEO LESSON TIẾNG ANH - I-LEARN SMART WORLD 7 - CẢ NĂM - CÓ ĐÁ...
Nguyen Thanh Tu Collection
 
PPTX
Nutri-QUIZ-Bee-Elementary.pptx...................
ferdinandsanbuenaven
 
PPTX
How to Manage Access Rights & User Types in Odoo 18
Celine George
 
PPTX
ROLE OF ANTIOXIDANT IN EYE HEALTH MANAGEMENT.pptx
Subham Panja
 
PPTX
HEAD INJURY IN CHILDREN: NURSING MANAGEMENGT.pptx
PRADEEP ABOTHU
 
PPTX
Explorando Recursos do Summer '25: Dicas Essenciais - 02
Mauricio Alexandre Silva
 
PPTX
Presentation: Climate Citizenship Digital Education
Karl Donert
 
PPTX
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
PDF
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
PPTX
Views on Education of Indian Thinkers J.Krishnamurthy..pptx
ShrutiMahanta1
 
Gall bladder, Small intestine and Large intestine.pptx
rekhapositivity
 
1, 2, 3… E MAIS UM CICLO CHEGA AO FIM!.pdf
Colégio Santa Teresinha
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
How to Configure Prepayments in Odoo 18 Sales
Celine George
 
How to Configure Storno Accounting in Odoo 18 Accounting
Celine George
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
Federal dollars withheld by district, charter, grant recipient
Mebane Rash
 
BÀI TẬP BỔ TRỢ THEO LESSON TIẾNG ANH - I-LEARN SMART WORLD 7 - CẢ NĂM - CÓ ĐÁ...
Nguyen Thanh Tu Collection
 
Nutri-QUIZ-Bee-Elementary.pptx...................
ferdinandsanbuenaven
 
How to Manage Access Rights & User Types in Odoo 18
Celine George
 
ROLE OF ANTIOXIDANT IN EYE HEALTH MANAGEMENT.pptx
Subham Panja
 
HEAD INJURY IN CHILDREN: NURSING MANAGEMENGT.pptx
PRADEEP ABOTHU
 
Explorando Recursos do Summer '25: Dicas Essenciais - 02
Mauricio Alexandre Silva
 
Presentation: Climate Citizenship Digital Education
Karl Donert
 
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
Views on Education of Indian Thinkers J.Krishnamurthy..pptx
ShrutiMahanta1
 

Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4

  • 1. FTP The File Transfer Protocol (FTP) is another commonly used Application layer protocol. FTP was developed to allow for file transfers between a client and a server. An FTP client is an application that runs on a computer that is used to push and pull files from a server running the FTP daemon (FTPd). To successfully transfer files, FTP requires two connections between the client and the server: one for commands and replies, the other for the actual file transfer. The client establishes the first connection to the server on TCP port 21. This connection is used for control traffic, consisting of client commands and server replies. The client establishes the second connection to the server over TCP port 20. This connection is for the actual file transfer and is created every time there is a file transferred. The file transfer can happen in either direction. The client can download (pull) a file from the server or, the client can upload (push) a file to the server. DHCP The Dynamic Host Configuration Protocol (DHCP) service enables devices on a network to obtain IP addresses and other information from a DHCP server. This service automates the assignment of IP addresses, subnet masks, gateway and other IP networking parameters. Without DHCP, users have to manually input the IP address, subnet mask and other network settings in order to join the network. The DHCP server maintains a pool of IP addresses and leases an address to any DHCP-enabled client when the client is powered on. Because the IP addresses are dynamic (leased) rather than static (permanently assigned), addresses no longer in use are automatically returned to the pool for reallocation. When a DHCP-configured device boots up or connects to the network, the client broadcasts a DHCP DISCOVER packet to identify any available DHCP servers on the network. A DHCP server replies with a DHCP OFFER, which is a lease offer message with an assigned IP address, subnet mask, DNS server, and default gateway information as well as the duration of the lease.
  • 2. The client may receive multiple DHCP OFFER packets if there is more than one DHCP server on the local network, so it must choose between them, and broadcast a DHCP REQUEST packet that identifies the explicit server and lease offer that the client is accepting. A client may choose to request an address that it had previously been allocated by the server. Assuming that the IP address requested by the client, or offered by the server, is still valid, the server would return a DHCP ACK message that acknowledges to the client the lease is finalized. If the offer is no longer valid - perhaps due to a time-out or another client allocating the lease - then the selected server will respond with a DHCP NAK message (Negative Acknowledgement). If a DHCP NAK message is returned, then the selection process must begin again with a new DHCP DISCOVER message being transmitted. Once the client has the lease, it must be renewed prior to the lease expiration through another DHCP REQUEST message. The DHCP server ensures that all IP addresses are unique (an IP address cannot be assigned to two different network devices simultaneously). Using DHCP enables network administrators to easily reconfigure client IP addresses without having to manually make changes to the clients. Most Internet providers use DHCP to allocate addresses to their customers who do not require a static address. File Sharing Services and SMB Protocol The Server Message Block (SMB) is a client/server file sharing protocol. IBM developed Server Message Block (SMB) in the late 1980s to describe the structure of shared network resources, such as directories, files, printers, and serial ports. It is a request- response protocol. Unlike the file sharing supported by FTP, clients establish a long term connection to servers. Once the connection is established, the user of the client can access the resources on the server as if the resource is local to the client host. SMB file-sharing and print services have become the mainstay of Microsoft networking. With the introduction of the Windows 2000 series of software, Microsoft changed the underlying structure for using SMB. In previous versions of Microsoft products, the SMB services used a non-TCP/IP protocol to implement name resolution. Beginning with Windows 2000, all subsequent Microsoft products use DNS naming. This allows TCP/IP protocols to directly support SMB resource sharing, as shown in the figure. The LINUX and UNIX operating systems also provide a method of sharing resources with Microsoft networks using a version of SMB called SAMBA. The Apple Macintosh operating systems also support resource sharing using the SMB protocol.
  • 3. Telnet Services and Protocol Telnet is a client/server protocol and it specifies how a VTY session is established and terminated. It also provides the syntax and order of the commands used to initiate the Telnet session, as well as control commands that can be issued during a session. Each Telnet command consists of at least two bytes. The first byte is a special character called the Interpret as Command (IAC) character. As its name implies, the IAC defines the next byte as a command rather than text. Some sample Telnet protocol commands include: Are You There (AYT) - Lets the user request that something appear on the terminal screen to indicate that the VTY session is active. Erase Line (EL) - Deletes all text from the current line. Interrupt Process (IP) - Suspends, interrupts, aborts, or terminates the process to which the Virtual Terminal is connected. For example, if a user started a program on the Telnet server via the VTY, he or she could send an IP command to stop the program. While the Telnet protocol supports user authentication, it does not support the transport of encrypted data. All data exchanged during a Telnet sessions is transported as plain text across the network. This means that the data can be intercepted and easily understood. If security is a concern, the Secure Shell (SSH) protocol offers an alternate and secure method for server access. SSH provides the structure for secure remote login and other secure network services. It also provides stronger authentication than Telnet and supports the transport of session data using encryption. As a best practice, network professionals should always use SSH in place of Telnet, whenever possible.