network protocols7
network protocols7
network protocols7
Network/Email Protocols
,mobile-wireless technology
Network devices
NIC – This is at top among other networking devices and mostly used networking device.
This is also known as network adapter card, Ethernet Card and LAN card. It allows our PC to
communicate with other PCs. A PC uses parallel data transmission to transmit data between
its internal parts where as the media that connects this PC with other device/PCs uses serial
data transmission. A NIC converts parallel data stream into serial data stream and vice
versa.
RJ-45 (Registered Jack – 45) is an eight wired connector that is used to connect computers
on a local area network (LAN), especially Ethernet.
V
Network Protocols
FTP – FTP, or File Transfer Protocol, is one of the standard internet protocols used to transfer data files
between a client(FTP client) and a server(FTP server) over a computer network. It was developed in the
early 1970s by Abhay Bhushan (alumni IIT Kanpur),while he was a student at MIT. FTP was initially
created to allow for the secure transfer of files between servers and host computers over the ARPANET
Network Control Program (a precursor to the modern internet).Nowadays it is being used for uploading
files on webserver after non anonymous ftp(means username and password available with
you).downloading is possible as anonymous ftp(no password is required).FTP is available in two mode –
text mode ftp(where user have to give commands in text form) and GUI ftp(graphical interaction is
possible).
Some of the more popular, and reliable, FTP Clients currently operating in the industry are
FileZilla,WinSCP,Cyberduck,gFTP
Network Protocols
Point-to-Point Protocol (PPP) is an open standard protocol that is mostly used
to provide connections over point-to-point serial links. The main purpose of PPP is to transport
Layer 3 packets over a Data Link layer point-to-point link. PPP can be configured on:
Asynchronous serial connection like Plain old telephone service (POTS) dial-up
Synchronous serial connection like Integrated Services for Digital Network (ISDN) or point-to-
point leased lines.
PPP consists of two sub-protocols:Link Control Protocol (LCP): set up and negotiate control
options on the Data Link Layer (OSI Layer 2). After finishing setting up the link, it uses NCP.
Network control Protocol (NCP): negotiate optional configuration parameters and facilitate for
the Network Layer (OSI Layer 3).
Before a PPP connection is established, the link must go through three phases of session
establishment:
1. Link establishment phase: In this phase, each PPP device sends LCP packets to configure and
test the data link
2. Authentication phase (optional): If authentication is enabled, either PAP or CHAP will be
used. PAP and CHAP are two authentication protocols used in PPP
3. Network layer protocol phase: PPP sends NCP packets to choose and configure Network
Layer protocol (OSI Layer 3) to be encapsulated and sent over the PPP data link
Network Protocols
HTTP - HTTP stands for hypertext transfer protocol and is used to transfer data across
the Web. It allow users of the World Wide Web to exchange information found on web
pages. When accessing any web page entering http:// in front of the address tells the
browser to communicate over HTTP.
How It Works-
It is a connectionless text based protocol. Clients (web browsers) send requests through
request object of http to web servers for web pages / images etc.Web server respond
accordingly through response object of http After this cycle(request – response), the
connection between client and server across the Internet is disconnected. A new connection
must be made for each request(means for each web page).
Remote login – A remote login facility permits a user who is using one computer to login to
remote computer or interact with a program on another computer. Command given at
remote location is processed by server and result displayed over remote location.
Telnet – Telnet is most popular protocol for accessing remote site/server. Using telnet client
software on our computer, we can make a connection to a telnet server (that is, the remote
host). Once our telnet client establishes a connection to the remote host, our client becomes
a virtual terminal, allowing us to communicate with the remote host from our computer. In
most cases, we need to log into the remote host, which requires that we have an account on
that system. Occasionally, we can log in as guest or public without having an
account.Generally it is used in unix based client server system to interact.
Email Protocols
Email –Electronic mail is a facility that allows users to transmit messages across the
internet in fast and secure manner.
Email created using email client program->on press of send button ,it is delivered to
sender’s mail server through SMTP(Simple mail transfer protocol)->which further
transmit the same through internet to recipient’s mail server->whenever recipient’s
email client program’s inbox is opened,that email is delivered to inbox through
POP3 (post office protocols 3rd version)->which user will read in email client
program.
Email Protocols
SMTP – Most of the internet systems use SMTP as a method to transfer mail from one user to another.
SMTP is a push protocol and is used to send the mail to email server. it is usually used with one of two
other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them
periodically from the server.An alternative to SMTP that is widely used in Europe is X.400. Many mail
servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to
be delivered as e-mail.