Showing posts with label TCP/IP Protocols. Show all posts
Showing posts with label TCP/IP Protocols. Show all posts

Thursday, 24 August 2017

Open Shortest Path First (OSPF)

      Open shortest path first (OSPF) fixes many of issues with RIP and allows routes to be selected dynamically based on the current state of the network. It is complement of RIP. One issue with RIP is limit of its ability to choose the best route and adapt to changing network conditions. Another problem is cost value of 16 for infinity, which makes it possible to use RIP in situation where more than 15 hops might occur between devices.
      This protocol name conveys two important characteristics. The first word refers to the fact that the protocol was developed using open and public RFC process, no license is required to use it. The SPF portion of the name refers to the type of algorithm it uses, which is designed to allow routers to dynamically determine the shortest path between any two networks. 

Overview of OSPF Operation 
    1) The main concept used by OSPF is link state database (LSDB). Each router in the network maintains a data structure called linked database which contain information about the current status of the network. It also describe the link to other network structure in directed graphs, hop count or cost. 
    2) When changes occur in the internetwork, one router update the status of their network to the another routers via link advertisements which are messages to manage the link database.
    3) To determine final router, each router uses its link database to find out shortest path tree. This tree shows the shortest path from one router to another.
    4) As the new information about the router updates, this shortest path tree can be recalculated.
    5) So we can say that OSPF adjust the best route dynamically.
    6) There may be a case, when two paths exist with an equal cost. In this case, traffic or data can be shared between both routes.


OSPF Advantages
1)    Support authentication for security.
2)     Support classful, classless, subnet classful IP addressing.
3)    For large internetwork, OSPF arranged the routes in grouped or hierarchical topology.
4)    It reduced the link state traffic by choosing the shortest path.
5)    Better organization.

OSPF Drawbacks
1)    Complexity
2)    Need more work to properly maintain a internetwork.





Wednesday, 23 August 2017

File Transfer Protocol (FTP)


      The purpose of networking applications is to allow different types of information to be sent between networked devices. In the world of computers, information is arranged in the form of files. A file can contain any type of information. The significance of the contents of a file depends entirely on the user of software program that examines it. When those files are created specially for communication, they are called messages. Transferring files and messages between networked devices is the most basic type of network communication. 
show how is the whole world connected    A file is just a collection of information that is treated as a single unit by a computer system. Files are stored in a directory or folders in a file system. In modern computers, files are normally expressed as a sequence of bytes or characters, and each file is read, written, copied or otherwise manipulated as independent object. So, files are the building blocks of information in computers systems. The transfer of information in networking was originally defined in terms of movement of files. Applications of file transfer are electronic mail (Email), network news (Usenet), hypertext (World Wide Web). 

TCP/IP File Transfer Protocol
    File Transfer Protocol perform one main function: allowing files to be copied from one computer to another without much considerations of their contents. Issues arises due to the format differences in the file stored on differing systems. 
1) To ensure that files are sent and received without loss of data, FTP uses the reliable TCP at the transport layer.
2) After a TCP connection is established, an FTP control connection is created by passing the FTP commands over logical connection based on formatting rules defined by Telnet Protocol.
3) Each command sent by the client receives a reply from the server to indicate whether it is succeeded or failed.
4) A data connection is established for each individual data transfer to be performed. FTP supports normal and passive data connections, allowing either the server or client to initiate the data connection. Multiple data types and file types are supported to allow flexibility for various type of transfers.
   Additional support commands are provided to manage the FTP connection as well as to perform support functions such as listing the contents of a directory or deleting the remaining files. 


FTP Connection 
   When a session is set up, a permanent control connection is set up using TCP for passing commands and replies. When files or other data are to be sent, they are passed over separate TCP data connections that are created and then disabled as needed.
                                                              Figure: FTP operational model
The protocol interpreter (PI) manages the control connections, commands and replies. The data transfer process (DTP) manages sending and receiving data between client and server. Note that user interface only interacts with human FTP user. 

FTP Control Connection Establishment, User Authentication 
    Once TCP has been set up, a specific process is follow for user authentication in which we use login process. This process has two purposes: 
1) Allow access to only authorized users. 
2) Server control what types of access each user has 
3) Server can decides the resource for users. 

User name/password login scheme: 
1) First, the user is identified by sending a user name from the user to server using the USER command. Client sent the User's Password using PASS command. 
2) The server checks the User name and password against its user database to verify that the connecting user has valid authority to access the server. 
3) If the information is valid, the server sends back a greeting to the client to indicate that the session is opened. 
   If the user improperly authenticates, the server will request that the user attempt authorization again. After a number of invalid authorization tries, the server may time out and terminate the connection. 
4) After the authentication succeeds, the server then set up the connection to  allow access to certain files or certain type of files, or to read or write file on server.
           Figure: FTP Control Connection Establishment, User Authentication 
Note that it is not considered secured today because the user name and password are sent across the control connection in clear text.

NetworkingCisco Packet Tracer Networking: Implement File Transfer Protocol ( FTP)


Countries and Capitals

Short Tricks to Memorize Countries and Capitals ! ! 👉 Country name and Capital name are same ·        Mexico – Mexico City ·  ...