Featured image

Table of Contents Link to heading

OSI Application Layer Link to heading

Info
The OSI application layer provides a user interface for network services and applications.

This layer provides services to application processes (such as electronic mail, file transfer, and terminal emulation) that are outside the OSI model. The application layer identifies and establishes the availability of intended communication partners (and the resources required to connect with them), synchronises cooperating applications, and establishes agreement on procedures for error recovery and control of data integrity.

OSI Presentation Layer Link to heading

Info

The OSI presentation layer is responsible for:

  1. Coding and conversion of application layer data to ensure that data from the source device can be interpreted by the appropriate application on the destination device
  2. Compression of the data in a manner that can be decompressed by the destination device
  3. Encryption of the data for transmission and decryption of data upon receipt by the destination

PresentationLayer

OSI Session Layer Link to heading

Info

The OSI session layer:

  1. Create and maintain dialogs between source and destination
  2. Handle the exchange of information to initiate dialogs and keep them active, and to restart sessions that are disrupted or idle for a long period of time

SessionLayer

TCP/IP Application Layer Protocols Link to heading

  • Application layer protocols must be implemented in both the source and destination devices.
  • Application layer protocols implemented on the source and destination host must be compatible to allow communication.

Name System Link to heading

Domain Name System (DNS) Link to heading

Info
A system used on the Internet for translating names of domains and their publicly advertised network nodes into IP addresses. This translation is considered to be transport layer functionality because it provides services to the layer above (application layer) and receives services from the layer below (Internetwork layer).
  • While IP addresses are crucial for network communication, they are not easy to memorise.
  • Domain names are created to make server addresses more user-friendly.
  • Domain names such as http://www.cisco.com are user-friendly addresses associated with the IP address of a specific server.
  • However, computers still need the actual numeric address before they can communicate.
  • The DNS protocol allows for the dynamic translation of a domain name into the correct IP address.
Note
Read more at 🔗.

Windows Internet Naming Service (WINS) Link to heading

Info
A Microsoft-developed standard for Microsoft Windows NT that automatically associates NT workstations with Internet domain names.

Host Configuration Link to heading

Dynamic Host Control Protocol (DHCP) Link to heading

Info
The automation of assigning IP addresses, subnet masks, gateway, and other IP networking parameters mask, default gateway and DNS server to a host
  • Computers need network addresses to communicate over a network.
  • Additional crucial information includes gateway address, subnet mask, and DNS server.
  • Manually configuring end devices is not scalable. DHCP allows for automated distribution of network information.
  • DHCP-distributed addresses are leased for a set period of time.
  • Addresses are returned to the pool for reuse when no longer in use.
  • DHCP supports IPv4 and DHCPv6 supports IPv6.
Note
Read more at 🔗.

Bootstrap Protocol (BOOTP) Link to heading

Info
A precursor to the DHCP protocol, a network protocol used to obtain IP address information during bootup.

Email Link to heading

  • Email is a store-and-forward method of sending, storing, and retrieving electronic messages.
  • Email messages are stored in databases on mail servers.
  • Email clients communicate with mail servers to send and receive email.
  • Mail servers communicate with other mail servers to transport messages from one domain to another.
  • Email clients do not communicate directly when sending email.
Tip
Email relies on three separate protocols for operation: SMTP (sending),POP (retrieving), IMAP (retrieving).

Simple Mail Transfer Protocol (SMTP) Link to heading

Info
Governs the transmission of e-mail over computer networks. It does not provide support for transmission of data other than plain text.
  • SMTP message formats require a message header and body.
  • The body can contain any amount of text.
  • The header must have a properly formatted recipient email address and a sender address.
  • An SMTP client sends an email by connecting to a SMTP server on port 25.
  • The server receives the message and stores it message in a local mailbox or relays the message to another mail server.
  • Users use email clients to retrieve messages stored on the server.
  • IMAP and POP are two protocols commonly used by email clients to retrieve messages.

Post Office Protocol (POP3) Link to heading

Info
An Internet standard for storing e-mail on a mail server until you can access it and download it to your computer. It enables users to receive mail from their inboxes using various levels of security.
  • Messages are downloaded from the server to the client.
  • The server listens on port 110 TCP for client requests.
  • Email clients direct their POP requests to mail servers on port TCP 110.
  • The POP client and server exchange commands and responses until the connection is closed or aborted.
  • POP allows for email messages to be downloaded to the client’s device (computer or phone) and removed from the server.
  • There is no centralized location where email messages are kept. Recipient

Internet Message Access Protocol (IMAP)  Link to heading

Info
Another protocol for email retrieval
  • Allows for messages to be displayed to the user rather than downloaded.
  • The original messages reside on the server until manually deleted by the user.
  • Users view copies of the messages in their email client software.
  • Users can create a folder hierarchy on the server to organise and store mail.
  • That file structure is displayed on the email client.
  • When a user decides to delete a message the server synchronises that action and deletes the message from the server.

File Transfer Link to heading

File Transfer Protocol (FTP) Link to heading

Info
A reliable, connection-oriented service that uses TCP to transfer files between systems that support FTP. It supports bidirectional binary file and ASCII file transfers.
  • FTP was developed to allow the transfer of files over the network.
  • An FTP client is an application that runs on a client computer used to push and pull data from an FTP server.
  • FTP requires two connections between the client and the server: one connection for commands and replies and another connection for the actual file transfer.
  • The client initiates and establishes the first connection to the server for control traffic on TCP port 21.
  • The client then establishes the second connection to the server for the actual data transfer on TCP port 20.
  • The client can download (pull) data from the server or upload (push) data to the server.

Trivial File Transfer Protocol (TFTP) Link to heading

Info
A connectionless service that uses UDP. TFTP is used on the router to transfer configuration files and IOS images, and to transfer files between systems that support TFTP. It is useful in some LANs because it operates faster than FTP in a stable environment.

One use case of TFTP is in the creation of ACLs where you can use a PC text editor to create and modify ACLs and then send them to the router via TFTP.

Server Message Block (SMB) Link to heading

Info
A client/server file sharing protocol that enables file and resource sharing (e.g, directories, files, printers, and serial ports) between computers, especially Windows-based systems.
  • All SMB messages share a common format.
  • SMB file-sharing and print services have become the mainstay of Windows networking.
  • Microsoft products now support TCP/IP protocols to directly support SMB resource sharing.
  • After the connection is established, the user of the client can access the resources on the server as if the resource is local to the client host.
  • The Linux and UNIX operating systems also provide a method of sharing resources with Microsoft networks using a version of SMB called SAMBA. The Apple Macintosh operating systems also support resource sharing using the SMB protocol.

SMB messages can perform the following tasks:

  1. Start, authenticate, and terminate sessions
  2. Control file and printer access
  3. Allow an application to send or receive messages to or from another device

Web Link to heading

Hypertext Transfer Protocol (HTTP) Link to heading

Info
The Internet standard that supports the exchange of information on the WWW as well as on internal networks. It supports many different file types, including text, graphics, sound, and video. It defines the process by which web browsers originate requests for information to send to web servers

HTTP:

  • Is a request/response protocol.
    • The browser sends a GET request to the server’s IP address and asks for the index.html file.
    • The server sends the requested file to the client.
    • The index.html was specified in the URL and contains the HTML code for this web page.
    • The browser processes the HTML code and formats the page for the browser window based on the code in the file.
  • Has three common message types: GET, POST, PUT.
  • Is not secure. Messages can be intercepted.

HTTP Secure (HTTPS) Link to heading

Info
HTTP that uses authentication and encryption to secure data.

Remote Access Link to heading

Telnet Link to heading

Info
A client/server protocol that provides a standard method of emulating text-based terminal devices over the data network, and is used to provide remote access to servers and networking devices to use it as if it were a local terminal.

Both the protocol itself and the client software that implements the protocol are commonly referred to as Telnet.

Telnet client is a software program that implements the telnet protocol and allows the user to interact with a remote host. Telnet clients are available for various operating systems, such as Windows, Linux, and Mac OS X. Some examples of telnet clients are PuTTY, SecureCRT, and Terminal.

Telnet server is a software program that listens for incoming telnet connections and provides access to the host system. Telnet servers are usually configured to require authentication, such as a username and password, before granting access. Some examples of telnet servers are Telnetd, Inetd, and Xinetd.

A connection using Telnet is called a VTY (Virtual Terminal) session, or connection. Telnet specifies how a VTY session is established and terminated.

Each Telnet command consists of at least 2 bytes. The first byte is a special character called the Interpret as Command (IAC) character. As its name implies, the IAC character defines the next byte as a command rather than text.

Although the Telnet protocol supports user authentication, it does not support the transport of encrypted data. All data exchanged during a Telnet session is transported as plain text across the network. This means that the data can be intercepted and easily understood.

Secure Shell (SSH) Link to heading

Info
An alternate and secure method for server access.

SSH provides the structure for secure remote login and other secure network services. It also provides stronger authentication than Telnet and supports the transport of session data using encryption. As a best practice, network professionals should use SSH in place of Telnet, whenever possible.

Network Management Link to heading

Simple Network Management Protocol (SNMP) Link to heading

Info
A protocol that provides a means to monitor and control network devices and to manage configurations, statistics collection, performance, and security.