Application layer protocol

Preview:

Citation preview

Application Layer Protocol

Amitava Nag

Assistant Professor

amitavanag.09@gmail.com

April 6, 2012

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 1 / 37

Architecture of WWW

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 2 / 37

Architecture of WWW

The WWW is a distributed client-server service, in which a clientusing a browser can access a service using a server.

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 2 / 37

Architecture of WWW

The WWW is a distributed client-server service, in which a clientusing a browser can access a service using a server.

The service provided is distributed over many locations called sites.

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 2 / 37

Architecture of WWW

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 3 / 37

Browser

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 4 / 37

Internet apps: application, transport protocols

Application Application layer Underlying

protocol transport protocol

email SMTP [RFC2821] TCP

remote terminal Telnet[RFC854] TCP

access

web HTTP [RFC2616] TCP

file transfer FTP [RFC959] TCP

Remote File Server NFS UDP/TCP

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 5 / 37

Web Page Identifier

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37

Web Page Identifier

Known as Uniform Resource Locator (URL)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37

Web Page Identifier

Known as Uniform Resource Locator (URL)

Encodes

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37

Web Page Identifier

Known as Uniform Resource Locator (URL)

Encodes

- Access protocol to use

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37

Web Page Identifier

Known as Uniform Resource Locator (URL)

Encodes

- Access protocol to use- Domain name of server

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37

Web Page Identifier

Known as Uniform Resource Locator (URL)

Encodes

- Access protocol to use- Domain name of server- Protocol port number (optional)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37

Web Page Identifier

Known as Uniform Resource Locator (URL)

Encodes

- Access protocol to use- Domain name of server- Protocol port number (optional)- Path through servers file system (optional)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37

Web Page Identifier

Known as Uniform Resource Locator (URL)

Encodes

- Access protocol to use- Domain name of server- Protocol port number (optional)- Path through servers file system (optional)- Parameters (optional)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37

Web Page Identifier

Known as Uniform Resource Locator (URL)

Encodes

- Access protocol to use- Domain name of server- Protocol port number (optional)- Path through servers file system (optional)- Parameters (optional)- Query (optional)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37

Web Page Identifier

Known as Uniform Resource Locator (URL)

Encodes

- Access protocol to use- Domain name of server- Protocol port number (optional)- Path through servers file system (optional)- Parameters (optional)- Query (optional)

Formathttp: // hostname [: port] / path [; parameters] [? query]

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37

Web and HTTP

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37

Web and HTTP

Web page consists of objects

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37

Web and HTTP

Web page consists of objects

Object can be HTML file, JPEG image, Java applet, audio file,

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37

Web and HTTP

Web page consists of objects

Object can be HTML file, JPEG image, Java applet, audio file,

Web page consists of base HTML-file which includes severalreferenced objects

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37

Web and HTTP

Web page consists of objects

Object can be HTML file, JPEG image, Java applet, audio file,

Web page consists of base HTML-file which includes severalreferenced objects

Each object is addressable by a URL

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37

Web and HTTP

Web page consists of objects

Object can be HTML file, JPEG image, Java applet, audio file,

Web page consists of base HTML-file which includes severalreferenced objects

Each object is addressable by a URL

Example URL:www.someschool.edu/someDept/pic.gif

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37

HTTP Characteristics

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37

HTTP Characteristics

Application level

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37

HTTP Characteristics

Application level

Request / response paradigm

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37

HTTP Characteristics

Application level

Request / response paradigm

Stateless

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37

HTTP Characteristics

Application level

Request / response paradigm

Stateless

Permits bi-directional transfer

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37

HTTP Characteristics

Application level

Request / response paradigm

Stateless

Permits bi-directional transfer

Offers capability negotiation

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37

HTTP Characteristics

Application level

Request / response paradigm

Stateless

Permits bi-directional transfer

Offers capability negotiation

Support for caching

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37

HTTP Characteristics

Application level

Request / response paradigm

Stateless

Permits bi-directional transfer

Offers capability negotiation

Support for caching

Support for intermediaries

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37

HTTP overview

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 9 / 37

HTTP overview ( continued )

Uses TCP :

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37

HTTP overview ( continued )

Uses TCP :

HTTP client initiates TCP connection (creates socket) to (www.someschool.edu/ ) server on port 80 (default port number forHTTP).

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37

HTTP overview ( continued )

Uses TCP :

HTTP client initiates TCP connection (creates socket) to (www.someschool.edu/ ) server on port 80 (default port number forHTTP).

HTTP server accepts TCP connection from client

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37

HTTP overview ( continued )

Uses TCP :

HTTP client initiates TCP connection (creates socket) to (www.someschool.edu/ ) server on port 80 (default port number forHTTP).

HTTP server accepts TCP connection from client

HTTP messages (application-layer protocol messages) exchangedbetween browser ( HTTP client ) and Web server ( HTTP server )

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37

HTTP overview ( continued )

Uses TCP :

HTTP client initiates TCP connection (creates socket) to (www.someschool.edu/ ) server on port 80 (default port number forHTTP).

HTTP server accepts TCP connection from client

HTTP messages (application-layer protocol messages) exchangedbetween browser ( HTTP client ) and Web server ( HTTP server )

TCP connection closed

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37

HTTP connections

Nonpersistent HTTP Persistent HTTP

At most one object is sent over Multiple objects can be sent overa TCP connection. single TCP connection between

client and server.

HTTP/1.0 uses nonpersistent HTTP HTTP/1.1 uses persistentconnections in default mode

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 11 / 37

FTP: the file transfer protocol

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37

FTP: the file transfer protocol

transfer file to/from remote host

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37

FTP: the file transfer protocol

transfer file to/from remote host

client/server model

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37

FTP: the file transfer protocol

transfer file to/from remote host

client/server model

client: side that initiates transfer (either to/from remote)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37

FTP: the file transfer protocol

transfer file to/from remote host

client/server model

client: side that initiates transfer (either to/from remote)

server: remote host

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37

FTP: the file transfer protocol

transfer file to/from remote host

client/server model

client: side that initiates transfer (either to/from remote)

server: remote host

ftp: RFC 959

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37

FTP: the file transfer protocol

transfer file to/from remote host

client/server model

client: side that initiates transfer (either to/from remote)

server: remote host

ftp: RFC 959

ftp server: port 21

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37

FTP overview

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 13 / 37

FTP:connections

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 14 / 37

Opening the control connection

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 15 / 37

Creating the data connection

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 16 / 37

FTP: separate control, data connections

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37

FTP: separate control, data connections

FTP client contacts FTP server at port 21, specifying TCP astransport protocol

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37

FTP: separate control, data connections

FTP client contacts FTP server at port 21, specifying TCP astransport protocol

Client obtains authorization over control connection

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37

FTP: separate control, data connections

FTP client contacts FTP server at port 21, specifying TCP astransport protocol

Client obtains authorization over control connection

Client browses remote directory by sending commands over controlconnection.

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37

FTP: separate control, data connections

FTP client contacts FTP server at port 21, specifying TCP astransport protocol

Client obtains authorization over control connection

Client browses remote directory by sending commands over controlconnection.

When server receives a command for a file transfer, the server opens aTCP data connection to client

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37

FTP: separate control, data connections

FTP client contacts FTP server at port 21, specifying TCP astransport protocol

Client obtains authorization over control connection

Client browses remote directory by sending commands over controlconnection.

When server receives a command for a file transfer, the server opens aTCP data connection to client

After transferring one file, server closes connection.

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37

FTP: separate control, data connections

FTP client contacts FTP server at port 21, specifying TCP astransport protocol

Client obtains authorization over control connection

Client browses remote directory by sending commands over controlconnection.

When server receives a command for a file transfer, the server opens aTCP data connection to client

After transferring one file, server closes connection.

Server opens a second TCP data connection to transfer another file.

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37

FTP: separate control, data connections

FTP client contacts FTP server at port 21, specifying TCP astransport protocol

Client obtains authorization over control connection

Client browses remote directory by sending commands over controlconnection.

When server receives a command for a file transfer, the server opens aTCP data connection to client

After transferring one file, server closes connection.

Server opens a second TCP data connection to transfer another file.

Control connection: out of band

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37

FTP: separate control, data connections

FTP client contacts FTP server at port 21, specifying TCP astransport protocol

Client obtains authorization over control connection

Client browses remote directory by sending commands over controlconnection.

When server receives a command for a file transfer, the server opens aTCP data connection to client

After transferring one file, server closes connection.

Server opens a second TCP data connection to transfer another file.

Control connection: out of band

FTP server maintains state: current directory, earlier authentication

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37

Remote Login: Telnet

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 18 / 37

Remote Login: Telnet

TELNET is a general-purpose client-server application program

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 18 / 37

Remote Login: Telnet

TELNET is a general-purpose client-server application program

TELNET enables the establishment of a connection to a remotesystem in such a way that the local terminal appears to be a terminalat the remote system.

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 18 / 37

Figure:Local login

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 19 / 37

Figure:Remote login

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 20 / 37

Electronic Mail

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37

Electronic Mail

Three major components:

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37

Electronic Mail

Three major components:1 user agents

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37

Electronic Mail

Three major components:1 user agents2 mail servers

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37

Electronic Mail

Three major components:1 user agents2 mail servers3 simple mail transfer protocol: SMTP

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37

Electronic Mail

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 22 / 37

Electronic Mail: mail servers

Mail Servers

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37

Electronic Mail: mail servers

Mail Servers

mailbox contains incoming messages for user

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37

Electronic Mail: mail servers

Mail Servers

mailbox contains incoming messages for user

message queue of outgoing (to be sent) mail messages

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37

Electronic Mail: mail servers

Mail Servers

mailbox contains incoming messages for user

message queue of outgoing (to be sent) mail messages

SMTP protocol between mail servers to send email messages

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37

Electronic Mail: mail servers

Mail Servers

mailbox contains incoming messages for user

message queue of outgoing (to be sent) mail messages

SMTP protocol between mail servers to send email messages

client: sending mail server

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37

Electronic Mail: mail servers

Mail Servers

mailbox contains incoming messages for user

message queue of outgoing (to be sent) mail messages

SMTP protocol between mail servers to send email messages

client: sending mail serverserver: receiving mail server

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37

Electronic Mail: SMTP [RFC 2821]

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37

Electronic Mail: SMTP [RFC 2821]

uses TCP to reliably transfer email message from client to server, port25

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37

Electronic Mail: SMTP [RFC 2821]

uses TCP to reliably transfer email message from client to server, port25

direct transfer: sending server to receiving server

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37

Electronic Mail: SMTP [RFC 2821]

uses TCP to reliably transfer email message from client to server, port25

direct transfer: sending server to receiving server

three phases of transfer

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37

Electronic Mail: SMTP [RFC 2821]

uses TCP to reliably transfer email message from client to server, port25

direct transfer: sending server to receiving server

three phases of transfer

handshaking (greeting)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37

Electronic Mail: SMTP [RFC 2821]

uses TCP to reliably transfer email message from client to server, port25

direct transfer: sending server to receiving server

three phases of transfer

handshaking (greeting)transfer of messages

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37

Electronic Mail: SMTP [RFC 2821]

uses TCP to reliably transfer email message from client to server, port25

direct transfer: sending server to receiving server

three phases of transfer

handshaking (greeting)transfer of messagesclosure

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37

Electronic Mail: SMTP [RFC 2821]

uses TCP to reliably transfer email message from client to server, port25

direct transfer: sending server to receiving server

three phases of transfer

handshaking (greeting)transfer of messagesclosure

command/response interaction

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37

Electronic Mail: SMTP [RFC 2821]

uses TCP to reliably transfer email message from client to server, port25

direct transfer: sending server to receiving server

three phases of transfer

handshaking (greeting)transfer of messagesclosure

command/response interaction

commands: ASCII text

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37

Electronic Mail: SMTP [RFC 2821]

uses TCP to reliably transfer email message from client to server, port25

direct transfer: sending server to receiving server

three phases of transfer

handshaking (greeting)transfer of messagesclosure

command/response interaction

commands: ASCII textresponse: status code and phrase

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37

Electronic Mail: SMTP [RFC 2821]

uses TCP to reliably transfer email message from client to server, port25

direct transfer: sending server to receiving server

three phases of transfer

handshaking (greeting)transfer of messagesclosure

command/response interaction

commands: ASCII textresponse: status code and phrase

messages must be in 7-bit ASCII

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37

Scenario: Alice sends message to Bob

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37

Scenario: Alice sends message to Bob

1 Alice uses UA to compose message and to bob@someschool.edu

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37

Scenario: Alice sends message to Bob

1 Alice uses UA to compose message and to bob@someschool.edu

2 Alices UA sends message to her mail server; message placed inmessage queue

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37

Scenario: Alice sends message to Bob

1 Alice uses UA to compose message and to bob@someschool.edu

2 Alices UA sends message to her mail server; message placed inmessage queue

3 Client side of SMTP opens TCP connection with Bobs mail server

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37

Scenario: Alice sends message to Bob

1 Alice uses UA to compose message and to bob@someschool.edu

2 Alices UA sends message to her mail server; message placed inmessage queue

3 Client side of SMTP opens TCP connection with Bobs mail server

4 SMTP client sends Alices message over the TCP connection

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37

Scenario: Alice sends message to Bob

1 Alice uses UA to compose message and to bob@someschool.edu

2 Alices UA sends message to her mail server; message placed inmessage queue

3 Client side of SMTP opens TCP connection with Bobs mail server

4 SMTP client sends Alices message over the TCP connection

5 Bobs mail server places the message in Bobs mailbox

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37

Scenario: Alice sends message to Bob

1 Alice uses UA to compose message and to bob@someschool.edu

2 Alices UA sends message to her mail server; message placed inmessage queue

3 Client side of SMTP opens TCP connection with Bobs mail server

4 SMTP client sends Alices message over the TCP connection

5 Bobs mail server places the message in Bobs mailbox

6 Bob invokes his user agent to read message

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37

Figure: Alice sends message to Bob

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 26 / 37

Mail access protocols

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37

Mail access protocols

SMTP: delivery/storage to receivers server

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37

Mail access protocols

SMTP: delivery/storage to receivers server

Mail access protocol: retrieval from server

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37

Mail access protocols

SMTP: delivery/storage to receivers server

Mail access protocol: retrieval from serverPOP: Post Office Protocol [RFC 1939]

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37

Mail access protocols

SMTP: delivery/storage to receivers server

Mail access protocol: retrieval from serverPOP: Post Office Protocol [RFC 1939]

authorization (agent < −− >server) and download

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37

Mail access protocols

SMTP: delivery/storage to receivers server

Mail access protocol: retrieval from serverPOP: Post Office Protocol [RFC 1939]

authorization (agent < −− >server) and download

IMAP: Internet Mail Access Protocol [RFC 1730]

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37

Mail access protocols

SMTP: delivery/storage to receivers server

Mail access protocol: retrieval from serverPOP: Post Office Protocol [RFC 1939]

authorization (agent < −− >server) and download

IMAP: Internet Mail Access Protocol [RFC 1730]

more features (more complex)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37

Mail access protocols

SMTP: delivery/storage to receivers server

Mail access protocol: retrieval from serverPOP: Post Office Protocol [RFC 1939]

authorization (agent < −− >server) and download

IMAP: Internet Mail Access Protocol [RFC 1730]

more features (more complex)manipulation of stored msgs on server

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37

Mail access protocols

SMTP: delivery/storage to receivers server

Mail access protocol: retrieval from serverPOP: Post Office Protocol [RFC 1939]

authorization (agent < −− >server) and download

IMAP: Internet Mail Access Protocol [RFC 1730]

more features (more complex)manipulation of stored msgs on server

HTTP: Hotmail , Yahoo! Mail, etc.

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37

Figure:Mail access protocols

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 28 / 37

Network Management

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37

Network Management

Management =

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37

Network Management

Management = Initialization,

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37

Network Management

Management = Initialization, Monitoring,

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37

Network Management

Management = Initialization, Monitoring, Control

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37

Network Management

Management = Initialization, Monitoring, Control

Today: automated, reliable diagnosis, and automatic control are stillin a primitive stage

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37

Network Management

Management = Initialization, Monitoring, Control

Today: automated, reliable diagnosis, and automatic control are stillin a primitive stage

Architecture: Manager, Agents and Management Information Base(MIB)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37

Network Management

Management = Initialization, Monitoring, Control

Today: automated, reliable diagnosis, and automatic control are stillin a primitive stage

Architecture: Manager, Agents and Management Information Base(MIB)

Observe that management-plane has a new interface to the networkdistinct from data and control-plane

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37

Simple Network Management Protocol (SNMP)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37

Simple Network Management Protocol (SNMP)

SNMP is a framework for managing devices in an internet using theTCP/IP protocol suit

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37

Simple Network Management Protocol (SNMP)

SNMP is a framework for managing devices in an internet using theTCP/IP protocol suit

A manager, usually a lost that, controls and monitor a set ofagents,usually routers

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37

Simple Network Management Protocol (SNMP)

SNMP is a framework for managing devices in an internet using theTCP/IP protocol suit

A manager, usually a lost that, controls and monitor a set ofagents,usually routers

The manager is a host that runs the SNMP client program.

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37

Simple Network Management Protocol (SNMP)

SNMP is a framework for managing devices in an internet using theTCP/IP protocol suit

A manager, usually a lost that, controls and monitor a set ofagents,usually routers

The manager is a host that runs the SNMP client program.

The agent is a router or host that runs the SNMP server program

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37

Figure:Mail access protocols

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 31 / 37

MANAGEMENT COMPONENTS

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37

MANAGEMENT COMPONENTS

SNMP requires the use of two other protocols:

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37

MANAGEMENT COMPONENTS

SNMP requires the use of two other protocols:1 Structure of Management Information (SMI) and

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37

MANAGEMENT COMPONENTS

SNMP requires the use of two other protocols:1 Structure of Management Information (SMI) and2 Management Information Base (MIB)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37

MANAGEMENT COMPONENTS

SNMP requires the use of two other protocols:1 Structure of Management Information (SMI) and2 Management Information Base (MIB)

Network management on the Internet is done through thecooperation of SNMP, SMI, and MIB.

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37

Management Information Base(MIB)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 33 / 37

Management Information Base(MIB)

MIB is a second component used in network management

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 33 / 37

Management Information Base(MIB)

MIB is a second component used in network management

Each agent has its own MIB, a collection of all the objects that themanager can manage.

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 33 / 37

Figure:Management Information Base, version 2 (MIB2)

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 34 / 37

SNMP

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37

SNMP

SNMP is an application program that allows

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37

SNMP

SNMP is an application program that allows1 a manager to retrieve the value of an object defined in an agent;

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37

SNMP

SNMP is an application program that allows1 a manager to retrieve the value of an object defined in an agent;2 a manager to store a value in an object defined in an agent; and

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37

SNMP

SNMP is an application program that allows1 a manager to retrieve the value of an object defined in an agent;2 a manager to store a value in an object defined in an agent; and3 an agent to send an alarm message about an abnormal situation to the

manager

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37

Figure:SNMP

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 36 / 37

The End

Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 37 / 37

Recommended