SIP (Session Initiation Protocol)

SIP (Session Initiation Protocol)

SIP is an application layer protocol designed to be independent of the underlying transport layer; it can run on transmission control protocol (TCP), UDP, or SCTP. It is a text based protocol, incorporating many elements of the HTTP and the SMTP.

The session Initiation Protocol is a signaling communication protocol, widely used for controlling multimedia communication sessions such as voice and video calls over IP.
The protocol defines the messages that are sent between peers which govern establishment, terminations and other essential element of call. SIP can be used for creating, modifying, and terminating two party (unicast) or multiparty (multicast) sessions consisting one or several media streams. Other SIP applications include video conferencing, streaming multimedia distribution, instant messaging, presence information, file transfer and online games.
SIP work in conjunction with several other application layer protocols that identify and carry the session media identification and negotiation is achieved with session description protocol (SDP). For the transmission of media stream a(voice, video) SIP typically employs the Real-Time transport protocol (RTP), which many be secured with the secure Real-Time transport protocol (RTP). For secure transmissions of SIP message the protocol may be encrypted with transport layer security TLS.

NNTP (Network News Transport Protocol)


NNTP (Network News Transfer Protocol)

The News Transport Protocol (NNTP) is an application protocol used for transporting Usenet news articles (net news) between news server and for reading and posting articles by end client application.
Usenet was originally designed based on the UUCP network, with most article transfer taking place over direct point to point telephone link between news sever and which were powerful time sharing systems. Readers and posters logged into this computer reading the article directly from the local disc.
As local area network and internet participation it became describe to allow news readers to be run on personal computers connected to local networks. Because distributed files system were not yet widely available, a news protocol was developed based on the client server model. It resembled the simple Mail Transfer Protocol (SMTP), but was tailored for exchanging news group article.
A news reader, also known as a news client, is a software application that reads article on Usenet, either directly from the news server's disks or via the NNTP. The well-known TCP port 119 is reserved for NNTP. When client connect to a news server with transport layer security (TLS), TCP port 563 is used. This is sometimes referred to as NNTPS.
In October 2006, the IETF released RFC 3977 which updates the NNTP protocol and codifies many of the additions over the years since RFC977.

Domain Name System


DNS (Domain Name System)

The Domain Name System is a hierarchical distributed naming system for computers, services, or any resource connected to internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates easily memorized domain name to the numerical IP addresses needs for the purpose of locating computer services and devices worldwide. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the internet.
An often-used analogy to explain the Domain Name System is that it serves as the phone book for the internet by translating human-friendly computer hostnames into IP addresses. For example the domain name www.example.com translates to the addresses 192.163.0.10 (IPv4) and 2001:500:88:200::10 (IPv6). Unlike a phonebook the DNS can be quick updated, allowing a service's location on the network to change without effecting the end users, who continue to use the same hostname. Users take advantage of this when they use meaningful uniform resource locator (URL) and E-mail addresses without having to known how the computer actually locates the services.
The Domain Name System distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name serves for each domain. Authoritative name servers are assigned to be responsible for their particular domain and in turn can assign other authoritative name servers for their sub-domains. This mechanism has made the DNS distributed and fault tolerant and has held avoid the need for a single central register to be continually consulted and updated. Additionally the responsibility for maintaining and updating the master record for the domain is spread among many domain name registers, who compete for the end-user's (the domain-owner's) business. Domain can be moved from one registrar to other registrar at any time.
The Domain Name System also specifies the technical functionality of this data base service. It defines the DNS protocol, a detailed specification of the data structures and data communication exchanges used in DNS, as part of the internet protocol suit.

What is Protocol?


Protocols

A communication protocol is (Networking protocol) is a system of digital message formats and rules for exchanging messages in or between computing system and in telecommunications. A protocol may have a formal description. Protocol may include signaling, authentication and error detection and correction capability.
In a routing protocol, it specifies that how routers communicate with each other and with the other types of machines. Protocols are determines and enable the routes between the nodes on a computer network. Algorithms determine the specific choice of routing. A router has knowledge only the direct attached networks and a protocol shares information about the neighbors immediate and then throughout the network. A router can understand the network topology through the protocol. So we can say that a protocol is playing very important role in a network. Although, there are many types of protocols.

Types of protocols

There are many types of protocols for different purpose in networking.

Routing protocols

IS-IS, OSPF, IGRP and EIGRP, RIP, BGP,

Internet protocols

Application Layer

DHCP, DHCPv6, DNS, FTP, HTTP, IMAP, IRC, LDAP, MGCP, NNTP, BGP, NTP, POP, RPC, RTP, RTSP, RIP, SIP, SMTP, SNMP, SOCKS, SSH, Telnet, TLS/SSL, XMPP.

Transport Layer

 TCP, UDP, DCCP, SCTP, RSVP, TP-TCP, NC, MTP

Network Layer

IP(IPv4,IPv6), ICMP, ICMPv6, ECN, IGMP, IPSec, GGP.

Link Layer

ARP/in ARP, NDP, OSPF, TUNNELS (L2TP), PPP,

What is subnet mask?


Subnet mask

A network mask is used when a network is not sub netted. The subnet mask is used to find the first address in the block. However when a mask is sub netted, the situation is different. We must have a subnet mask. The subnet has more 1s.
Subnetting increases the length of the netid and decrease the length of hostid. When we divide a network to s number of subnetworks, each of number of hosts, we can calculate the subnetid for each subnetwork as in which n is the length of netid,.

Subnet Address

When a network is subnetted, the first address in the subnet is the identifier of the subnet and is used by the router to route the packets destined for that subnet works. Given any address in the subnet, the router can find the subnet mask using the same procedure we discussed to find the subnetwork mask. ANDing the given address with the subnet mask.

Super netting

Subnetting couldn’t completely solve address depletion problems in classful addreeing, because most organization did not want to share their granted blocks with others. since class C blocks were still available but the size of block did not meet the requirement of new organization that wanted to join the internet, one solution was super netting . in super netting, an organization can combine several class C block to create a larger range of addresses. In other, words several networks are combined to create a supernet work. By doing this, an organizarion can apply for several class C blocks instead of just one. For example, an organization that needs 1000 addresses can be granted four class C blocks.

What is subnetmask?


Subnetting

In subnetting, a network divides into several smaller networks with each subnetwork  having its own subnetworks. A portion of IP address is indicating the network (netid), and a portion indicates the network hostid. This means that there is a sense of hierarchy in IP addressing. To each a host on the internet, we must first reach the network using the first portion of the address. Then we must reach the host itself using the second portion. In the other word, IP address is designed with two level of hierarchy. However in many cases two levels of hierarchy are not enough. For example, imagine an organization with the network address 141.14.0.0 (a class B address). The organization has two hierarchical addressing, but cannot have more than one physical network. One solution of this problem is subnetting. Further division of a network into smaller networks is called subnetting.

Three level of hierarchy

Adding subnetworks an intermediate level of hierarchy in the IP addressing system. Now we have three levels; site, subnet and host. The site is the first level. The second level is subnet and the tird level is host of hierarchy, it defines the connection of the host to the subnetwork.
The routing of an IP datagram now involves steps: delivery to site, delivery to subnet work and delivery to the host

What is subnetmask?


Mask
If the network address is given, we can find the block and the range of addresses in the block.  What about the reserves? If an address is given, can we find the given address (the beginning address in the block). This is important because to route a packet to the correct network, a router needs to extract a network address from the destination address (a host address) in the packet header.
One way we can find the network address to first find the class of the address and the net ID. We then set the host ID to zero to find the network address. For example, if the address is 134.45.78.2 is given, we can immediately say that the address belong to class B. the net ID is 134.45 (2 bytes)  and the network address is 134.45.0.0.
The above method is feasible if we not subnetted the network; that is, if we have not divided the network into subnetworks. A general procedure that can be used involves a mask to find the network address from a given address.
A mask is a 32 bits binary number that gives first address in the block (the network address). When bit-wise ANDed with an address in the block.

AND Operation
Masking uses the bit-wise AND operation defined in computer science. The operation is applied bit by bit to the address and the mask.