0% found this document useful (0 votes)
6 views

Unit-5 - Application Layer Protocols

Uploaded by

nangarepradnya21
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Unit-5 - Application Layer Protocols

Uploaded by

nangarepradnya21
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Secure Shell (SSH)

• Although Secure Shell (SSH) is a secure application program that can be used today for
several purposes such as remote logging and file transfer.
• It was originally designed to replace TELNET.
• It is a cryptographic network protocol that is used for transferring encrypted data over
the network. The port number of SSH is 22.
We briefly list the services provided by this protocol:
1. Privacy or confidentiality of the message exchanged.
2. Data integrity, which means that it is guaranteed that the messages exchanged between
the client and server are not changed/altered by an intruder.
3. Server authentication, which means that the client is now sure that the server is the one
that it claims to be.
4. Compression of the messages, which improves the efficiency of the system and makes
attack more difficult.

DOMAIN NAME SYSTEM (DNS)


• To identify an entity, TCP/IP protocols use the IP address, which uniquely identifies
the connection of a host to the Internet.
• However, people prefer to use names instead of numeric addresses.
• Therefore, the Internet needs to have a directory system that can map a name to an
address.
• This is analogous to the telephone network. A telephone network is designed to use
telephone numbers, not names.
• Internet is so huge today, a central directory system cannot hold all the mapping.
• In addition, if the central computer fails, the whole communication network will
collapse.
• A better solution is to distribute the information among many computers in the
world.
• In this method, the host that needs mapping can contact the closest computer holding
the needed information.
• This method is used by the Domain Name System (DNS).
1. The user passes the host name to the file transfer client.
2. The file transfer client passes the host name to the DNS client.
3. Each computer, after being booted, knows the address of one DNS server. The DNS
client sends a message to a DNS server with a query that gives the file transfer server
name using the known IP address of the DNS server.
4. The DNS server responds with the IP address of the desired file transfer server.
5. The DNS server passes the IP address to the file transfer client.
6. The file transfer client now uses the received IP address to access the file transfer
server.

Dynamic Host Configuration Protocol (DHCP)


 A small organization can receive a block of addresses from an ISP.
 After a block of addresses are assigned to an organization, the network administration
can manually assign addresses to the individual hosts or routers.
 However, address assignment in a large organization can be done automatically using
the Dynamic Host Configuration Protocol (DHCP).
 A network manager can configure DHCP to assign permanent IP addresses to the host
and routers. DHCP can also be configured to provide temporary, on demand, IP
addresses to hosts.
 DHCP (Dynamic Host Configuration Protocol) is a client-server protocol that uses
DHCP servers and DHCP clients.
 A DHCP server is a machine that runs a service that can lease out IP addresses and
other TCP/IP information to any client that requests them.
 The DHCP server typically has a pool of IP addresses that it is allowed to distribute to
clients, and these clients lease an IP address from the pool for a specific period of time,
usually several days.
 Once the lease is ready to expire, the client contacts the server to arrange for renewal.
 DHCP clients are client machines that run special DHCP client software enabling them
to communicate with DHCP server.

DHCP clients obtain a DHCP lease for an IP address, a subnet mask, and various DHCP options
from DHCP servers in a four-step process:
1. DHCP DISCOVER: The client broadcasts a request for a DHCP server.
2. DHCPOFFER: DHCP servers on the network offer an address to the client.
3. DHCPREQUEST: The client broadcasts a request to lease an address from one of the
offering DHCP servers.
4. DHCPACK: The DHCP server that the client responds to acknowledges the client,
assigns it any configured DHCP options, and updates its DHCP database. The client
then initializes and binds its TCP/IP protocol stack and can begin network
communication.

You might also like