100% found this document useful (1 vote)
548 views

Internet Server Management L1

The document provides an overview of key internet technologies and protocols including: 1. TCP/IP is a stream protocol used to transmit data between endpoints over the internet in a reliable manner. 2. HTTP transmits web content like HTML, images, and video. FTP transfers files between computers on a TCP/IP network. 3. Other common protocols discussed include UDP, ICMP, DNS, BGP, IGMP, ECN, telnet, SSH, and ports/addresses for well-known internet services. 4. The document also briefly outlines routing, remote access, and major internet organizations that assign protocol numbers.

Uploaded by

chamunorwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
548 views

Internet Server Management L1

The document provides an overview of key internet technologies and protocols including: 1. TCP/IP is a stream protocol used to transmit data between endpoints over the internet in a reliable manner. 2. HTTP transmits web content like HTML, images, and video. FTP transfers files between computers on a TCP/IP network. 3. Other common protocols discussed include UDP, ICMP, DNS, BGP, IGMP, ECN, telnet, SSH, and ports/addresses for well-known internet services. 4. The document also briefly outlines routing, remote access, and major internet organizations that assign protocol numbers.

Uploaded by

chamunorwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Internet Server Management L1

Learning Objectives
1. Have an understanding of technologies that are used on the internet
2. Grasp the concept and the architecture of internet server
3. Be in a position to be able to implement the internet servers and its services
4. One must be able to manage internet server and its services

INTERNET TECHNOLOGIES AND COMMUNICATIONS


 In networking, a communications protocol or network protocol is the specification of a set
of rules for a particular type of communication.

 Different protocols often describe different aspects of a single communication; taken


together, these form a protocol stack. The terms "protocol" and "protocol stack" also refer
to the software that implements a protocol.

 Most recent protocols are assigned by the IETF for internet communications, and the
IEEE, or the ISO organizations for other types.

INTERNET PROTOCOLS THAT ARE COMMON

1. FTP
 FTP is the protocol used to transmit files between computers connected to each
other by a TCP/IP network, such as the Internet.

2. TCP/IP (Your syllabus requires you to know this)


 TCP/IP is a stream protocol. This means that a connection is negotiated between a
client and a server.
 Any data transmitted between these two endpoints is guaranteed to arrive, thus it is a
so-called lossless protocol.
 Since the TCP protocol (as it is also referred to in short form) can only connect two
endpoints, it is also called a peer-to-peer protocol.

3. HTTP
 HTTP is the protocol used to transmit all data present on the World Wide Web. This
includes text, multimedia and graphics.
 It is the protocol used to transmit HTML, the language that makes all the fancy
decorations in your browser. It works upon TCP/IP.

4. UDP

 Both Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are OSI
Layer-4 transport protocols; they are used to pass the actual data.
 The main difference between TCP and UDP, from a developer's perspective, is how they
handle packet order.

 TCP is a connection-oriented protocol; it guarantees that all sent packets would reach the
destination in the correct order.

 UDP, on the other hand, is a connection-less protocol. Communication is datagram-oriented,


so the integrity is guaranteed only on the single datagram. Datagrams reach a destination and
can arrive out of order, or possibly they don't arrive at all.

 UDP generally is used for real-time communication, where a little percentage of the packet
loss rate is preferable to the overhead of a TCP connection.

5. ICMP

 ICMP is a control protocol, meaning it is designed not to carry application data, but rather
information about the status of the network itself.
 It is essentially a network layer (OSI Layer-3) error-reporting and error-control protocol for
the network.
 The best-known examples of ICMP in practice are the  ping  utility, which uses ICMP to
probe remote hosts for responsiveness and overall round-trip time of the probe messages, and

the  traceroute  utility.


6. Domain Name Systems (DNS)
 In essence, DNS is simply a database that links meaningful names (known as host
names), such as http://www.microsoft.com, to a specific IP address, such as
192.168.124.1
 Many common applications use DNS services, including:

I. World Wide Web (WWW)


II. Email
III. Other applications such as Instant Messaging

 The World Wide Web depends on DNS for user-friendly navigation. You could
get to a Web site by entering the IP address of a site in your Web browser, but
remembering lots of arbitrary numbers isn’t easy for most people. I
 t’s much easier to remember a DNS name for a Web site that reflects its content,
such as http://www.yahoo.com or http://www.microsoft.com. It’s fair to say that
without DNS, the Web wouldn’t have become quite the phenomenon that it is
now.

7. Boarder Gateway Protocol

 Border Gateway Protocol (BGP) is a scalable dynamic routing protocol used on


the Internet by groups of routers to share routing information.
 This protocol allows you to advertise more than one path to and from the Internet
to your network and resources, which gives you redundant paths and can increase
your uptime.
 Connections between two BGP peers can be external (eBGP) or internal (iBGP).
 Which type of connection it is depends on the autonomous system (AS) number
assigned to each of the peers.
 The AS number indicates whether the peers are part of networks managed by the
same or different organizations.
 If two BGP peers are part of the same autonomous system, they both use the same
AS number, and the BGP connection between them is an iBGP session.
 If two BGP peers have different AS numbers, the BGP connection between them
is an eBGP session.

8. IGMP- Internet Group Management Protocol

 (IGMP) is used by IP hosts to report their multicast group memberships to any


immediately - neighboring multicast routers.
 Routers that are members of the multicast groups are expected to behave as hosts
as well as routers, and may even respond to their own queries.
 Like ICMP, IGMP is an integral part of IP. All host that wishes to received IP
multicast should implement it.

9. ECN- Explicit Congestion Notification

 ECN allows end-to-end notification of network congestion without dropping


packets.
 ECN is an optional feature that may be used between two ECN-enabled endpoints
when the underlying network infrastructure also supports it.
 ECN is an extension to the Internet Protocol and to the Transmission Control
Protocol and is defined in RFC 3168
ROUTING AND REMOTE ACCESS

Routing

 Routing is the process of selecting a path for traffic in a network or between


or across multiple networks. Broadly, routing is performed in many types of
networks, including circuit-switched networks, such as the public switched
telephone network (PSTN), and computer networks, such as the Internet.
 Routing occurs on layer 3 of the OSI Model that is on routers and layer 3 switches
and thus mostly on the Wide Area Network.
 There are a number of routing protocols that exist on the network and Internet and
these protocols are categories as to whether there are internal or external.
 Internal routing protocols ( OSPF and RIP) in tells protocols that are implemented to
run the LAN network whereas if the network opt to go to WAN then other protocols
such as BGP are implemented.

Remote access
 A server that is dedicated to handling users that are not on a LAN but need remote
access to it. The remote access server allows users to gain access to files and print
services on the LAN from a remote location.
 For example, a user who dials into a network from home using an analog modem
or an ISDN connection will dial into a remote access server.
 Once the user is authenticated he can access shared drives and printers as if he
were physically connected to the office LAN.
TELNET, SECURE SHELL (SSH)
Telnet
 Telnet is a protocol that allows you to connect to remote computers (called hosts)
over a TCP/IP network (such as the internet).
 Using telnet client software on your computer, you can make a connection to a
telnet server (that is, the remote host). Once your telnet client establishes a
connection to the remote host, your client becomes a virtual terminal, allowing
you to communicate with the remote host from your computer.
 In most cases, you'll need to log into the remote host, which requires that you
have an account on that system.

Secure Shell (SSH)

 An SSH client allows you to connect to a remote computer running an SSH


server.
 The Secure Shell (SSH) protocol is often used for remote terminal connections,
allowing you to access a text-mode terminal on a remote computer as if you were
sitting of it.
 It can also be used for SSH tunneling, SCP file transfers, and other things.

PORTS AND ADDRESSES, WELL-KNOWN SERVICES


 The well-known ports cover the range of possible port numbers from 0
through 1023. The registered ports are numbered from 1024 through
49151. The remaining ports, referred to as dynamic ports or private ports,
are numbered from 49152 through 65535.
INTERNET ORGANIZATIONS

You might also like