SlideShare a Scribd company logo
1 of 58
1
DATA COMMUNICATON 2
Common Network ServicesCommon Network Services
BY;
Muhammad Aurangzeb
12BS(cs)27
Departament of Computer sciences-Quest
Network ServicesNetwork Services
• GOALS;
• understand most common data services in
networks:
o Domain Name Servers (DNS)
o Remote access services
o File transfer services
o e-mail services
o Streaming services
3
IntroductionIntroduction
• Network Services -> key in companies and
organizations
• Work based in shared network resources & distributed
services
• Great diversity of services
4
Types of Network ServicesTypes of Network Services
Configuration and management
o Management of hosts.
o e.g. DHCP.
Remote Access
o Remote hosts are allowed to access to a network.
o e.g. SSH
File management
o File transfer, storage and management
o e.g. FTP.
Print services
o Printer share.
Information
o Information sharing and querying
o e.g. WWW, video sharing, IPTV
Communication
o User communication by means of text, audio and/or video
messages
o e.g. e-mail, chat, videoconference, IP telephony, games online.
5
Architecture of Network ServicesArchitecture of Network Services
• ApproachesApproaches
o Client-serverClient-server
o Peer-to-peer (P2P)Peer-to-peer (P2P)
o Hybrid of client-server and P2PHybrid of client-server and P2P
Network services 6
Client/Server architectureClient/Server architecture
7
server:
always-on host
permanent IP address
server farms for scaling
clients:
communicate with server
may be intermittently
connected
may have dynamic IP
addresses
do not communicate
directly with each other
client/server
8
P2P ARCHITECTUREP2P ARCHITECTURE
• no always-on server
• arbitrary end systems
directly communicate
• peers are intermittently
connected and change IP
addresses
• Highly scalable but
difficult to manage
peer-peer
9
Hybrid of client-server and P2PHybrid of client-server and P2P
Skype
voice-over-IP P2P application
centralized server: finding address of remote
party:
client-client connection: direct (not through
server)
Instant messaging
chatting between two users is P2P
centralized service: client presence
detection/location
• user registers its IP address with central server
when it comes online
• user contacts central server to find IP
addresses of buddies
DNS: Domain NameDNS: Domain Name
SystemSystem
10
11
Problem:
 Web browsing
Resource
holder’s host
User’s host
Internet
DNS: Domain Name SystemDNS: Domain Name System
12
Approach:
 From the user’s point of view
o Identifies resource holder by means of an address
(www.dte.us.es)
Cont:Cont:
13
Approach:
 May www.dte.us.es be used as an identifier of the queried
resource?
User’s host
Internet
www.dte.us.es
Cont:Cont:
Resource
holder’s host
14
Approach:
 From the network’s point of view
o IP addresses are used (routing & addressing)
Internet
IP
Cont:Cont:
User’s host
Resource
holder’s host
15
Approach:
 A mechanism to translate names into IP addresses is
necessary
Internet
www.dte.us.es
IP
DNS
Cont:Cont:
User’s host
Resource
holder’s host
16
Hosts, routers:
 IP address (32 bits) – used to address datagrama
 “name”, e.g.: www.google.es – used by human beings
130.213.40.3
Myserver.dte.us.es
Cont:Cont:
Resource
holder’s host
17
Name space:
my-pc.cont.fake.es.
Host
name
domain
Cont:Cont:
DNS: Domain Name SystemDNS: Domain Name System
18
IP Address
4 bytes in decimal format (69.146.202.8)
Hierarchical structure -> precise information about host location
Name
No host location information except maybe the country
DNS: Domain Name SystemDNS: Domain Name System
19
Domain Name System:
distributed database implemented
in hierarchy of many name
servers
application-layer protocol host,
routers, name servers to
communicate to resolve names
(address/name translation)
DNS uses UDP services
DNS services
hostname to IP address
translation
host aliasing
Canonical, alias names
mail server aliasing
load distribution
replicated Web servers:
set of IP addresses for
one canonical name
20
Basic foundations
1. App needs to know a remote IP
address associated to a name
2. App requests IP address to DNS
client
3. DNS client sends a request to
the network
4. DNS client rcvs a reply
including IP addr
5. DNS client gives IP address to
app
DNS: Domain Name SystemDNS: Domain Name System
Why not centralize DNS?
single point of failure
traffic volume
distant centralized
database
maintenance
doesn’t scale!
21
Root DNS Servers
com DNS servers org DNS servers edu DNS servers
poly.edu
DNS servers
umass.edu
DNS servers
yahoo.com
DNS servers
amazon.com
DNS servers
pbs.org
DNS servers
Distributed, Hierarchical DatabaseDistributed, Hierarchical Database
Client wants IP for www.amazon.com; 1st
approx:
client queries a root server to find com DNS server
client queries com DNS server to get amazon.com DNS
server
client queries amazon.com DNS server to get IP address
for www.amazon.com
22
DNS: Root name serversDNS: Root name servers
contacted by local name server that can not resolve name
root name server:
contacts authoritative name server if name mapping not known
gets mapping
returns mapping to local name server
13 root name servers
worldwide
b USC-ISI Marina del Rey, CA
l ICANN Los Angeles, CA
e NASA Mt View, CA
f Internet Software C. Palo Alto,
CA (and 36 other locations)
i Autonomica, Stockholm (plus
28 other locations)
k RIPE London (also 16 other locations)
m WIDE Tokyo (also Seoul,
Paris, SF)
a Verisign, Dulles, VA
c Cogent, Herndon, VA (also LA)
d U Maryland College Park, MD
g US DoD Vienna, VA
h ARL Aberdeen, MD
j Verisign, ( 21 locations)
23
Local Name ServerLocal Name Server
does not strictly belong to hierarchy
each ISP (residential ISP, company,
university) has one.
also called “default name server”
when host makes DNS query, query is sent to
its local DNS server
acts as proxy, forwards query into hierarchy
24
requesting host
cis.poly.edu
gaia.cs.umass.edu
root DNS server
local DNS server
dns.poly.edu
authoritative DNS server
dns.cs.umass.edu
TLD DNS server
DNS nameDNS name
resolution exampleresolution example
Host at cis.poly.edu wants
IP address for
gaia.cs.umass.edu
iterated query:
contacted server replies
with name of server to
contact
“I don’t know this name,
but ask this server”
recursive query:
puts burden of name
resolution on contacted
name server
25
DNS name resolution exampleDNS name resolution example
recursive queryiterative query
requesting host
cis.poly.edu
gaia.cs.umass.edu
root DNS server
1
2
3 4
5
6
authoritative DNS server
dns.cs.umass.edu
7
8
TLD DNS server
requesting host
cis.poly.edu
gaia.cs.umass.edu
root DNS
server
local DNS server
dns.poly.edu
1
2
45
6
authoritative DNS server
dns.cs.umass.edu
7
8
TLD DNS
server
3
26
DNS protocol, messagesDNS protocol, messages
Name, type fields
for a query
RRs in response
to query
records for
authoritative servers
additional “helpful”
info that may be used
27
DNS protocol, messagesDNS protocol, messages
Header, 6 fields, 2 bytes each
Access remote servicesAccess remote services
28
2929
Access remote servicesAccess remote services
Virtual connection to a remote terminal
“Substitutes” a direct cable
Access remote services
Telnet
SSH
3030
TelnetTelnet
Basically -> TCP connection (port 23)
Some other features negotiated in handshake
No security –> even passwords are visible
Solution: encryptation -> SSH
Telnet is now quite obsolete
3131
SSHSSH
SSH (Secure Shell): RFC 4251
Aims similar to telnet -> provides security!
TCP connection (port 22)
Other additional functions
o Secure FTP
o support any insecure protocol -> tunneling
o secure connections for X Windows servers ->
graphic apps
3232
SSH. FeaturesSSH. Features
Reduces security menaces:
o Man in the middle -> sniffer
o Spoofing
Cyphered data -> 128-bit encryptation
Security scheme -> public/private key (RSA)
Client-server arquitecture.
Two versions
o SSHv1 (1995) -> vulnerabilities
o SSHv2 (1997)
 Improvements over SSHv1
 Current standard
File Transfer ServicesFile Transfer Services
33
3434
File Transfer ServicesFile Transfer Services
File transfer between remote hosts
Aims:
Remote hosts may share files
Client & server file systems are independent
Efficient data transfer
Two main protocols
FTP (File Transfer Protocol): uses TCP -> reliable
• RFC 959
TFTP (Trivial File Transfer Protocol): uses UDP -> more
simple
• RFC 1350
Network services 35Network services 35
TFTPTFTP
Trivial File Transfer Protocol
File transfer
Very simple protocol
Non reliable -> UDP (port 69)
No folders; no encryptation
For transfering small files
3636
TFTPTFTP
TFTP messages
Opcode: type of message
• 01: RRQ (Read Request)
• 02: WRQ (Write Request)
• 03: DATA
• 04: ACK
• 05: Error message
Variable length data: depend on the opcode
3737
FTP: the file transfer protocolFTP: the file transfer protocol
transfer file to/from remote host
client/server model
client: side that initiates transfer (either to/from
remote)
server: remote host
ftp: RFC 959
Uses TCP: ports 20, 21 -> reliable transfer
file transfer
FTP
server
FTP
user
interface
FTP
client
local file
system
remote file
system
user
at host
3838
Two TCP connections
Data: transferred data (port 20)
Control: allows the user moving through the directory
structure and downloading & uploading files (port 21)
FTPFTP
3939
FTP Client/Server modelFTP Client/Server model
FTP Client initiates connection (server’s port 21)
Connection parameters are negotiated in handshake
Data port
Connection mode: active/pasive
Transfer mode: ASCII/binary
4040
FTP ServersFTP Servers
Configuration parameters
Control port (default: port 21)
Max # of connections to server & max # of connections per IP
Connection timeout
Welcome & goodbye msgs
Passive mode port numbers
Users & groups
Authenticated users: have login & passwd -> registered in
server
Anonymous users
Groups: share the same properties in FTP server
4141
FTP ServersFTP Servers
Permissions
Read, write, execution (rwx)
Permissions for the owner, for groups & for the rest of users
Bandwidth limit
Server may limit transfer rate for the users
Logs
Register data or any other info about user connections &
errors
4242
FTP ClientsFTP Clients
ftp <ip_addr>
Commands
cd
get
put
mkdir
exit
…
Do not mistake FTP
commands typed by client
for FTP control commands
FTP commands, responsesFTP commands, responses
Sample commands:
• sent as ASCII text over
control channel
• USER username
• PASS password
• LIST return list of file in
current directory
• RETR filename retrieves
(gets) file
• STOR filename stores
(puts) file onto remote
host
Sample return codes
• status code and phrase
(as in HTTP)
• 331 Username OK,
password required
• 125 data connection
already open;
transfer starting
• 425 Can’t open data
connection
• 452 Error writing
file
4343
E-mail servicesE-mail services
Network services 44
E-mail servicesE-mail services
Main features:
• One of the most important services on the
Internet
• Allows users to exchange mails in an easy, fast
and cheap way
• Multiple receivers
• Client-server scheme
• Types of client apps
o Graphic interfaces (Microsoft Outlook, Mozilla
Thunderbird, Apple Mail)
o Text (pine, elm, mail)
o Web (Gmail, Hotmail, SquirrelMail)
45
E-mail servicesE-mail services
Related concepts:
• Mail account
o Associated to user name & passwd
user@domain.com
• Mailbox
• Mail alias
• Mail list
46
E-mail servicesE-mail services
Standards:
• SMTP (Simple Mail Transfer Protocol)
• IMF (Internet Mail Format)
• MIME (Multipurpose Internet Mail Extensions)
• POP (Post Office Protocol)
• IMAP (Internet Message Access Protocol)
47
E-mail servicesE-mail services
Components:
• Mail User Agent (MUA)
• Mail Transfer Agent (MTA)
• Mail Delivery Agent (MDA)
Mail User Agents (MUA)
• Mail client
• Compose, edit, read mail
messages
• Use two mail servers:
o Outgoing mail server (SMTP)
o Incoming mail server (POP
or IMAP)
48
User mailbox
Outgoing
mail queue
MTA
MUA
MUA
MUAMTA
MUA
MUA
MTA
MUA
SMTP
SMTP
SMTP
POP
IMAP
E-mail servicesE-mail services
Mail Agent Transfer (MTA)
• Mail server
• Stores sender’s mails for
delivery (outgoing queue)
• Stores incoming mails for
their users
Mail Delivery Agent (MDA)
• In charge of copying
incoming messages to user
mailbox
49
MTA
MUA
MUA
MUAMTA
MUA
MUA
MTA
MUA
SMTP
SMTP
SMTP
POP
IMAP
User mailbox
Outgoing
mail queue
50
Scenario: Alice sends message to
Bob
1) Alice uses UA to compose
message and “to”
bob@someschool.edu
2) Alice’s UA sends message to
her mail server; message
placed in message queue
3) Client side of SMTP opens
TCP connection with Bob’s
mail server
4) SMTP client sends Alice’s
message over the TCP
connection
5) Bob’s mail server places the
message in Bob’s mailbox
6) Bob invokes his user agent to
read message
user
agent
mail
server
mail
server user
agent
1
2 3 4 5
6
51
Message formatMessage format
• IMF (RFC 5322)IMF (RFC 5322)
• HeadersHeaders
o To:To:
o From:From:
o Subject:Subject:
o Date:Date:
• BodyBody
o Simple text messages (noSimple text messages (no
extended ASCII ) up toextended ASCII ) up to
998 characters(no CRLF)998 characters(no CRLF)
Headers
Body
Blank
line
Network services 52
Message formatMessage format
MIME extensions:
• Add funcionalityAdd funcionality
o Attached filesAttached files
o Extended ASCIIExtended ASCII
• New headersNew headers
o Mime-Version:Mime-Version:
o Content-Type:Content-Type:
 Default -> text/plainDefault -> text/plain
Attachments ->Attachments ->
MultipartMultipart
o Content-Description:Content-Description:
o Content-Transfer-Content-Transfer-
Encoding:Encoding:
Types de encoding
7 bits
8 bits & binary
quoted-printable &
base64.
Example quoted-printable
F3 = ó & F1 = ñ
Transmisión de ñ
Transmisi=F3n de =F1
Network services 53
Web accessWeb access
Features:
• A browser is used instead of a mail client
• MUA is integrated in a web page
• Host uses HTTP to communicate with web server
• Web server habitually uses IMPA for the access to the
incoming msgs in the mail server
Network services 54
ProblemsProblems
Main problems:
• Unencrypted msgs are transmitted
o Use mechanisms of security (PGP, PEM, s/MIME)
• Bad uses
o SPAM
StreamingStreaming
55
5656
Streaming Stored MultimediaStreaming Stored Multimedia
Stored streaming:
media stored at source
transmitted to client
streaming: client playout begins
before all data has arrived
o timing constraint for still-to-be transmitted data: in
time for playout
5757
StreamingStreaming LiveLive MultimediaMultimedia
Examples:
Internet radio talk show
live sporting event
Streaming (as with streaming stored multimedia)
playback buffer
playback can lag tens of seconds after transmission
still have timing constraint
Interactivity
fast forward impossible
rewind, pause possible!
Network services 58

More Related Content

What's hot (20)

Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Network management
Network managementNetwork management
Network management
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Network security
Network securityNetwork security
Network security
 
IP Address
IP AddressIP Address
IP Address
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Windows server
Windows serverWindows server
Windows server
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Wide Area Networking
Wide Area NetworkingWide Area Networking
Wide Area Networking
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 

Viewers also liked

System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Network Administrator
Network AdministratorNetwork Administrator
Network Administratorguest371b1b4
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 

Viewers also liked (11)

System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Network Administrator
Network AdministratorNetwork Administrator
Network Administrator
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Networking
NetworkingNetworking
Networking
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Common Network Services

Similar to Common Network Services (20)

Dns detail understanding
Dns detail understandingDns detail understanding
Dns detail understanding
 
Week3 lec 2
Week3 lec 2Week3 lec 2
Week3 lec 2
 
Dns
DnsDns
Dns
 
D.N.S
D.N.SD.N.S
D.N.S
 
Dns
DnsDns
Dns
 
06 coms 525 tcpip - dhcp and dns
06   coms 525 tcpip - dhcp and dns06   coms 525 tcpip - dhcp and dns
06 coms 525 tcpip - dhcp and dns
 
DNS.pptx
DNS.pptxDNS.pptx
DNS.pptx
 
Network and System Administration chapter 2
Network and System Administration chapter 2Network and System Administration chapter 2
Network and System Administration chapter 2
 
How DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An IntroductionHow DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An Introduction
 
08Mapping.ppt
08Mapping.ppt08Mapping.ppt
08Mapping.ppt
 
Domain name system advanced power point presentation
Domain name system advanced power point presentationDomain name system advanced power point presentation
Domain name system advanced power point presentation
 
Lecture 5- url-dns
Lecture  5- url-dnsLecture  5- url-dns
Lecture 5- url-dns
 
009478419.pdf
009478419.pdf009478419.pdf
009478419.pdf
 
Dns and irc
Dns and ircDns and irc
Dns and irc
 
Dns
DnsDns
Dns
 
Dns1111111111
Dns1111111111Dns1111111111
Dns1111111111
 
Dn sonly
Dn sonlyDn sonly
Dn sonly
 
5.Dns Rpc Nfs
5.Dns Rpc Nfs5.Dns Rpc Nfs
5.Dns Rpc Nfs
 
5.Dns Rpc Nfs 2
5.Dns Rpc Nfs 25.Dns Rpc Nfs 2
5.Dns Rpc Nfs 2
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 

Recently uploaded

Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxAleenaTreesaSaji
 

Recently uploaded (20)

Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptx
 

Common Network Services

  • 1. 1
  • 2. DATA COMMUNICATON 2 Common Network ServicesCommon Network Services BY; Muhammad Aurangzeb 12BS(cs)27 Departament of Computer sciences-Quest
  • 3. Network ServicesNetwork Services • GOALS; • understand most common data services in networks: o Domain Name Servers (DNS) o Remote access services o File transfer services o e-mail services o Streaming services 3
  • 4. IntroductionIntroduction • Network Services -> key in companies and organizations • Work based in shared network resources & distributed services • Great diversity of services 4
  • 5. Types of Network ServicesTypes of Network Services Configuration and management o Management of hosts. o e.g. DHCP. Remote Access o Remote hosts are allowed to access to a network. o e.g. SSH File management o File transfer, storage and management o e.g. FTP. Print services o Printer share. Information o Information sharing and querying o e.g. WWW, video sharing, IPTV Communication o User communication by means of text, audio and/or video messages o e.g. e-mail, chat, videoconference, IP telephony, games online. 5
  • 6. Architecture of Network ServicesArchitecture of Network Services • ApproachesApproaches o Client-serverClient-server o Peer-to-peer (P2P)Peer-to-peer (P2P) o Hybrid of client-server and P2PHybrid of client-server and P2P Network services 6
  • 7. Client/Server architectureClient/Server architecture 7 server: always-on host permanent IP address server farms for scaling clients: communicate with server may be intermittently connected may have dynamic IP addresses do not communicate directly with each other client/server
  • 8. 8 P2P ARCHITECTUREP2P ARCHITECTURE • no always-on server • arbitrary end systems directly communicate • peers are intermittently connected and change IP addresses • Highly scalable but difficult to manage peer-peer
  • 9. 9 Hybrid of client-server and P2PHybrid of client-server and P2P Skype voice-over-IP P2P application centralized server: finding address of remote party: client-client connection: direct (not through server) Instant messaging chatting between two users is P2P centralized service: client presence detection/location • user registers its IP address with central server when it comes online • user contacts central server to find IP addresses of buddies
  • 10. DNS: Domain NameDNS: Domain Name SystemSystem 10
  • 11. 11 Problem:  Web browsing Resource holder’s host User’s host Internet DNS: Domain Name SystemDNS: Domain Name System
  • 12. 12 Approach:  From the user’s point of view o Identifies resource holder by means of an address (www.dte.us.es) Cont:Cont:
  • 13. 13 Approach:  May www.dte.us.es be used as an identifier of the queried resource? User’s host Internet www.dte.us.es Cont:Cont: Resource holder’s host
  • 14. 14 Approach:  From the network’s point of view o IP addresses are used (routing & addressing) Internet IP Cont:Cont: User’s host Resource holder’s host
  • 15. 15 Approach:  A mechanism to translate names into IP addresses is necessary Internet www.dte.us.es IP DNS Cont:Cont: User’s host Resource holder’s host
  • 16. 16 Hosts, routers:  IP address (32 bits) – used to address datagrama  “name”, e.g.: www.google.es – used by human beings 130.213.40.3 Myserver.dte.us.es Cont:Cont: Resource holder’s host
  • 18. DNS: Domain Name SystemDNS: Domain Name System 18 IP Address 4 bytes in decimal format (69.146.202.8) Hierarchical structure -> precise information about host location Name No host location information except maybe the country
  • 19. DNS: Domain Name SystemDNS: Domain Name System 19 Domain Name System: distributed database implemented in hierarchy of many name servers application-layer protocol host, routers, name servers to communicate to resolve names (address/name translation) DNS uses UDP services DNS services hostname to IP address translation host aliasing Canonical, alias names mail server aliasing load distribution replicated Web servers: set of IP addresses for one canonical name
  • 20. 20 Basic foundations 1. App needs to know a remote IP address associated to a name 2. App requests IP address to DNS client 3. DNS client sends a request to the network 4. DNS client rcvs a reply including IP addr 5. DNS client gives IP address to app DNS: Domain Name SystemDNS: Domain Name System Why not centralize DNS? single point of failure traffic volume distant centralized database maintenance doesn’t scale!
  • 21. 21 Root DNS Servers com DNS servers org DNS servers edu DNS servers poly.edu DNS servers umass.edu DNS servers yahoo.com DNS servers amazon.com DNS servers pbs.org DNS servers Distributed, Hierarchical DatabaseDistributed, Hierarchical Database Client wants IP for www.amazon.com; 1st approx: client queries a root server to find com DNS server client queries com DNS server to get amazon.com DNS server client queries amazon.com DNS server to get IP address for www.amazon.com
  • 22. 22 DNS: Root name serversDNS: Root name servers contacted by local name server that can not resolve name root name server: contacts authoritative name server if name mapping not known gets mapping returns mapping to local name server 13 root name servers worldwide b USC-ISI Marina del Rey, CA l ICANN Los Angeles, CA e NASA Mt View, CA f Internet Software C. Palo Alto, CA (and 36 other locations) i Autonomica, Stockholm (plus 28 other locations) k RIPE London (also 16 other locations) m WIDE Tokyo (also Seoul, Paris, SF) a Verisign, Dulles, VA c Cogent, Herndon, VA (also LA) d U Maryland College Park, MD g US DoD Vienna, VA h ARL Aberdeen, MD j Verisign, ( 21 locations)
  • 23. 23 Local Name ServerLocal Name Server does not strictly belong to hierarchy each ISP (residential ISP, company, university) has one. also called “default name server” when host makes DNS query, query is sent to its local DNS server acts as proxy, forwards query into hierarchy
  • 24. 24 requesting host cis.poly.edu gaia.cs.umass.edu root DNS server local DNS server dns.poly.edu authoritative DNS server dns.cs.umass.edu TLD DNS server DNS nameDNS name resolution exampleresolution example Host at cis.poly.edu wants IP address for gaia.cs.umass.edu iterated query: contacted server replies with name of server to contact “I don’t know this name, but ask this server” recursive query: puts burden of name resolution on contacted name server
  • 25. 25 DNS name resolution exampleDNS name resolution example recursive queryiterative query requesting host cis.poly.edu gaia.cs.umass.edu root DNS server 1 2 3 4 5 6 authoritative DNS server dns.cs.umass.edu 7 8 TLD DNS server requesting host cis.poly.edu gaia.cs.umass.edu root DNS server local DNS server dns.poly.edu 1 2 45 6 authoritative DNS server dns.cs.umass.edu 7 8 TLD DNS server 3
  • 26. 26 DNS protocol, messagesDNS protocol, messages Name, type fields for a query RRs in response to query records for authoritative servers additional “helpful” info that may be used
  • 27. 27 DNS protocol, messagesDNS protocol, messages Header, 6 fields, 2 bytes each
  • 28. Access remote servicesAccess remote services 28
  • 29. 2929 Access remote servicesAccess remote services Virtual connection to a remote terminal “Substitutes” a direct cable Access remote services Telnet SSH
  • 30. 3030 TelnetTelnet Basically -> TCP connection (port 23) Some other features negotiated in handshake No security –> even passwords are visible Solution: encryptation -> SSH Telnet is now quite obsolete
  • 31. 3131 SSHSSH SSH (Secure Shell): RFC 4251 Aims similar to telnet -> provides security! TCP connection (port 22) Other additional functions o Secure FTP o support any insecure protocol -> tunneling o secure connections for X Windows servers -> graphic apps
  • 32. 3232 SSH. FeaturesSSH. Features Reduces security menaces: o Man in the middle -> sniffer o Spoofing Cyphered data -> 128-bit encryptation Security scheme -> public/private key (RSA) Client-server arquitecture. Two versions o SSHv1 (1995) -> vulnerabilities o SSHv2 (1997)  Improvements over SSHv1  Current standard
  • 33. File Transfer ServicesFile Transfer Services 33
  • 34. 3434 File Transfer ServicesFile Transfer Services File transfer between remote hosts Aims: Remote hosts may share files Client & server file systems are independent Efficient data transfer Two main protocols FTP (File Transfer Protocol): uses TCP -> reliable • RFC 959 TFTP (Trivial File Transfer Protocol): uses UDP -> more simple • RFC 1350
  • 35. Network services 35Network services 35 TFTPTFTP Trivial File Transfer Protocol File transfer Very simple protocol Non reliable -> UDP (port 69) No folders; no encryptation For transfering small files
  • 36. 3636 TFTPTFTP TFTP messages Opcode: type of message • 01: RRQ (Read Request) • 02: WRQ (Write Request) • 03: DATA • 04: ACK • 05: Error message Variable length data: depend on the opcode
  • 37. 3737 FTP: the file transfer protocolFTP: the file transfer protocol transfer file to/from remote host client/server model client: side that initiates transfer (either to/from remote) server: remote host ftp: RFC 959 Uses TCP: ports 20, 21 -> reliable transfer file transfer FTP server FTP user interface FTP client local file system remote file system user at host
  • 38. 3838 Two TCP connections Data: transferred data (port 20) Control: allows the user moving through the directory structure and downloading & uploading files (port 21) FTPFTP
  • 39. 3939 FTP Client/Server modelFTP Client/Server model FTP Client initiates connection (server’s port 21) Connection parameters are negotiated in handshake Data port Connection mode: active/pasive Transfer mode: ASCII/binary
  • 40. 4040 FTP ServersFTP Servers Configuration parameters Control port (default: port 21) Max # of connections to server & max # of connections per IP Connection timeout Welcome & goodbye msgs Passive mode port numbers Users & groups Authenticated users: have login & passwd -> registered in server Anonymous users Groups: share the same properties in FTP server
  • 41. 4141 FTP ServersFTP Servers Permissions Read, write, execution (rwx) Permissions for the owner, for groups & for the rest of users Bandwidth limit Server may limit transfer rate for the users Logs Register data or any other info about user connections & errors
  • 42. 4242 FTP ClientsFTP Clients ftp <ip_addr> Commands cd get put mkdir exit … Do not mistake FTP commands typed by client for FTP control commands
  • 43. FTP commands, responsesFTP commands, responses Sample commands: • sent as ASCII text over control channel • USER username • PASS password • LIST return list of file in current directory • RETR filename retrieves (gets) file • STOR filename stores (puts) file onto remote host Sample return codes • status code and phrase (as in HTTP) • 331 Username OK, password required • 125 data connection already open; transfer starting • 425 Can’t open data connection • 452 Error writing file 4343
  • 45. E-mail servicesE-mail services Main features: • One of the most important services on the Internet • Allows users to exchange mails in an easy, fast and cheap way • Multiple receivers • Client-server scheme • Types of client apps o Graphic interfaces (Microsoft Outlook, Mozilla Thunderbird, Apple Mail) o Text (pine, elm, mail) o Web (Gmail, Hotmail, SquirrelMail) 45
  • 46. E-mail servicesE-mail services Related concepts: • Mail account o Associated to user name & passwd user@domain.com • Mailbox • Mail alias • Mail list 46
  • 47. E-mail servicesE-mail services Standards: • SMTP (Simple Mail Transfer Protocol) • IMF (Internet Mail Format) • MIME (Multipurpose Internet Mail Extensions) • POP (Post Office Protocol) • IMAP (Internet Message Access Protocol) 47
  • 48. E-mail servicesE-mail services Components: • Mail User Agent (MUA) • Mail Transfer Agent (MTA) • Mail Delivery Agent (MDA) Mail User Agents (MUA) • Mail client • Compose, edit, read mail messages • Use two mail servers: o Outgoing mail server (SMTP) o Incoming mail server (POP or IMAP) 48 User mailbox Outgoing mail queue MTA MUA MUA MUAMTA MUA MUA MTA MUA SMTP SMTP SMTP POP IMAP
  • 49. E-mail servicesE-mail services Mail Agent Transfer (MTA) • Mail server • Stores sender’s mails for delivery (outgoing queue) • Stores incoming mails for their users Mail Delivery Agent (MDA) • In charge of copying incoming messages to user mailbox 49 MTA MUA MUA MUAMTA MUA MUA MTA MUA SMTP SMTP SMTP POP IMAP User mailbox Outgoing mail queue
  • 50. 50 Scenario: Alice sends message to Bob 1) Alice uses UA to compose message and “to” bob@someschool.edu 2) Alice’s UA sends message to her mail server; message placed in message queue 3) Client side of SMTP opens TCP connection with Bob’s mail server 4) SMTP client sends Alice’s message over the TCP connection 5) Bob’s mail server places the message in Bob’s mailbox 6) Bob invokes his user agent to read message user agent mail server mail server user agent 1 2 3 4 5 6
  • 51. 51 Message formatMessage format • IMF (RFC 5322)IMF (RFC 5322) • HeadersHeaders o To:To: o From:From: o Subject:Subject: o Date:Date: • BodyBody o Simple text messages (noSimple text messages (no extended ASCII ) up toextended ASCII ) up to 998 characters(no CRLF)998 characters(no CRLF) Headers Body Blank line
  • 52. Network services 52 Message formatMessage format MIME extensions: • Add funcionalityAdd funcionality o Attached filesAttached files o Extended ASCIIExtended ASCII • New headersNew headers o Mime-Version:Mime-Version: o Content-Type:Content-Type:  Default -> text/plainDefault -> text/plain Attachments ->Attachments -> MultipartMultipart o Content-Description:Content-Description: o Content-Transfer-Content-Transfer- Encoding:Encoding: Types de encoding 7 bits 8 bits & binary quoted-printable & base64. Example quoted-printable F3 = ó & F1 = ñ Transmisión de ñ Transmisi=F3n de =F1
  • 53. Network services 53 Web accessWeb access Features: • A browser is used instead of a mail client • MUA is integrated in a web page • Host uses HTTP to communicate with web server • Web server habitually uses IMPA for the access to the incoming msgs in the mail server
  • 54. Network services 54 ProblemsProblems Main problems: • Unencrypted msgs are transmitted o Use mechanisms of security (PGP, PEM, s/MIME) • Bad uses o SPAM
  • 56. 5656 Streaming Stored MultimediaStreaming Stored Multimedia Stored streaming: media stored at source transmitted to client streaming: client playout begins before all data has arrived o timing constraint for still-to-be transmitted data: in time for playout
  • 57. 5757 StreamingStreaming LiveLive MultimediaMultimedia Examples: Internet radio talk show live sporting event Streaming (as with streaming stored multimedia) playback buffer playback can lag tens of seconds after transmission still have timing constraint Interactivity fast forward impossible rewind, pause possible!