Anda di halaman 1dari 2

Network Protocols Chapter 6

Top 10 network protocols 1-DNS Domain Name Service protocol translates computer names into addresses and addresses into names. It can be used in three ways: 1- You can look up the primary IP address of a machine name, 2- You can look up the domain name for an IP address, 3- You can find the name and IP address of your local system 2-Whois protocol tells who owns the domain, and how its technical contact can be reached. 3-Daytime Network Time Protocol gets current date and time from a server. 4-HTTP Hypertext Transfer Protocol controls how Web servers and Web browsers communicate with each other. 5-SMTP Simple Mail Transport Protocol controls the transfer of email messages on the Internet. 6-POP Post Office Protocol allows you to search and retrieve email that is waiting in a mail server mailbox. 7-FTP File Transfer Protocol is used widely on the Internet for transferring files to and from a remote host. FTP is commonly used for uploading pages to a Web site and for providing online file archives. 8-NNTP Network News Transfer Protocol (NNTP) is the basis for tens of thousands of newsgroups that provide a public forum for millions of Internet users. 9-UDP User Datagram Protocol is a transport layer protocol that provides a connectionless method of communicating between machines. It allows you to send datagrams, packets, between machines. 10-TCP Transmission Control Protocol. Every computer on a TCP/IP network must have an IP address. An IPv4 address is a 32-bit binary number. For the benefit of humans, it is usually written down as four decimal numbers separated by full stops (dots), for example 192.168.1.33. Class A are for large networks with over 16 million host addresses (1-127), Class B for medium-sized networks (128-191) Class C designed for small networks with no more than 254 hosts(192-223) We cannot use: (Reserved IP addresses) o the network address, which identifies the network itself, as a host address. o the broadcast address that we cannot use as a host address.

The ways of giving a host an IP address divide into static and dynamic assignment. o In Static assignment, the administrator of the network has to enter the hosts IP address manually. It is good If the network is small and does not change very often. o In a Dynamic assignment when the server receives a request from an unknown hardware address, it can assign an IP address from a pool of available addresses automatically. There have been several partial solutions to the shortage of addresses. These include private IP addresses and network address translation (NAT). Network Address Translation NAT takes traffic from the internal networks and presents it to the Internet as if it were coming from only one computer, which has only one IP address. o Another advantage of NAT is that it hides the internal structure of the network from any potential attacker. IPv6 is easier to configure and more secure than IPv4. It is also designed to support large-scale applications, peer-to-peer applications and mobile applications o 128 bit address o Address auto-configuration is built into IPv6. o It allows a large number of IP hosts to discover the network easily and to get new, globally unique addresses. o Devices such as mobile phones, small handheld computers and various domestic appliances can be deployed on a plug-and-play basis. o Security in IPv6 is better than in IPv4 in that the IP security protocol (IPSec) is mandatory in IPv6 but only optional in IPv4. o It makes encryption and authentication easier to implement. The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet Protocol Suite. It is chiefly used by the operating systems of networked computers to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. o ICMP is also used to transmit informational messages. TCP has to transport data between the source and the destination accurately and reliably. It also has to regulate the flow of data. o It provides data segmentation, in which the data is chopped up into segments. o It establishes and maintains connections between two machines, as well as getting rid of these connections once they are no longer needed. o TCP provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. o TCP is the protocol that major Internet applications rely on, such as the World Wide Web, e-mail, and file transfer.

Anda mungkin juga menyukai