The Process/Application Layer Protocols of DoD Model - CCNA...

The Process/Application Layer Protocols of DoD Model – CCNA Course


- Advertisment -
The Process/Application Layer Protocols of DoD Model - CCNA Course

In this article, we’ll describe the different applications and services typically used in IP networks. The following protocols and applications are covered in this section:

  • Telnet
  • FTP
  • TFTP
  • NFS
  • SMTP
  • LPD
  • X Windows
  • SNMP
  • DNS
  • DHCPIBootP

Let’s look at one by one.

The Process/Application Layer Protocols of DoD Model - CCNA Course


Telnet is the chameleon of protocol sites specialty is terminal emulation. It allows a user on a remote client machine, called the Telnet client, to access the resources of another machine, the Telnet service.

Telnet achieves this by pulling a fast one on the Telnet server and making the client machine appear as though it were a terminal directly attached to the local network. This projection is actually a software image a virtual terminal that can interact with the chosen remote host.

These emulated terminals are of the next mode type and can execute refined procedures such as displaying menus that give users the opportunity to choose options and access the applications on the duped server. Users begin a Telnet session by running the Telnet client software and then logging into the Telnet server.

File Transfer Protocol (FTP)

File Transfer Protocol (FTP) is the protocol that actually lets us transfer files, and it can accomplish this between any two machines using it. But FTP isn’t just a protocol; it’s also a program. Operating as protocol, FTP is used by applications. As a program, it’s employed by users to perform file tasks by hand.

FTP also allows for access to both directories and files and can accomplish certain types of directory operations, such as relocating into different ones. FTP teams up with Telnet to transparently log you into the FTP server and then provides for the transfer of files.

Accessing a host through FTP is only the first step, though. Users must then be subjected to an authentication login that’s probably secured with passwords and user names implemented by system administrators to restrict access. You can get around this somewhat by adopting the username anonymous though you’ll gain access to will be limited.

Even when employed by users manually as a program, FTP’s functions are limited to listing and manipulating directories, typing file contents, and copying files between hosts. It can’t execute remote files as programs.

Trivial File Transfer Protocol (TFTP)

Trivial File Transfer Protocol (TFTP) is the stripped down, stock version of FTP, but it’s the protocol of choice if you know exactly what you want and where to find it, plus it’s so easy to use and fast too.

It doesn’t give you the abundance of functions that FTP does, though. TFTP has no directory-browsing abilities; it can do nothing but send and receive files. This compact little protocol also skimps in the data department, sending much smaller blocks of data than FTP, and there’s no authentication as with FTP, so it’s insecure.

Few sites support it because of the inherent security risks.

Network File System (NFS)

Network File System (NFS) is a jewel of a protocol specializing in file sharing. It allows two different types of file systems to interoperate.

It works like this: suppose the NFS server software is running on an NT server and the NFS client software is running on a Unix host. NFS allows for a portion of the RAM on the NT server to transparently store Unix files, which can, in turn, be used by Unix users.

Even though the NT file system and Unix file system are unlikely they have different case sensitivity, filename lengths, security, and so on both Unix users and NT users can access that same file with their normal file systems, in their normal way.

Simple Mail Transfer Protocol (SMTP)

Simple Mail Transfer Protocol (SMTP), answering our ubiquitous call to email, uses a spooled, or queued, method of mail delivery. Once a message has been sent to a destination, the message is spooled to a device usually a disk.

The server software at the destination posts a vigil, regularly checking the queue for messages. When it detects them, it proceeds to deliver them to their destination. SMTP is used to send mail; POP3 is used to receive mail.

Line Printer Daemon (LPD)

The Line Printer Daemon (LPD) protocol is designated for printer sharing. The LPD, along with the line printer (LPR) program, allows print jobs to be spooled and sent to the network’s printers using TCP/IP.

X Window

Designed for client/server operations, X Window defines a protocol for writing client/server applications based on a graphical user interface (GUI). The idea is to allow a program, called a client, to run on one computer and have it display things through a window server on another computer.

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) collects and manipulates valuable network information. It gathers data by polling the devices on the network from a management station at fixed or random intervals, requiring them to disclose certain information.

When all is well, SNMP receives something called a baseline a report delimiting the operational traits of a healthy network. This protocol can also stand as a watchdog over the network, quickly notifying managers of any sudden turn of events. These network watchdogs are called agents, and when aberrations occur, agents send an alert called a trap to the management station.

Domain Name Service (DNS)

Domain Name Service (DNS) resolves hostnames specifically, Internet names, such as You don’t have to use DNS; you can just type in the IP address of any device you want to communicate with.

An IP address identifies hosts on a network and the Internet as well. However, DNS was designed to make our lives easier.

Think about this: What would happen if you wanted to move your web page to a different service provider? The IP address would change and no one would know what the new one was. DNS allows you to use a domain name to specify an IP address. You can change the IP address as often as you want and no one will know the difference.

DNS is used to resolve a fully qualified domain name (FQDN) for example, or An FQDN is a hierarchy that can logically locate a system based on its domain identifier.

If you want to resolve the name todd, you either must type in the FQDN of or have a device such as a PC or router add the suffix for you. For example, on a Cisco router, you can use the command ip domain-name to append each request with the domain. If you don’t do that, you’ll have to type in the FQDN to get DNS to resolve the name.

Dynamic Host Configuration Protocol (DHCP)/Bootstrap Protocol (BootP)

Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts. It allows easier administration and works well in small to even very large network environments. All types of hardware can be used as a DHCP server, including a Cisco router.

DHCP differs from BootP in that BootP assigns an IP address to a host but the host’s hardware address must be entered manually in a BootP table. You can think of DHPC as a dynamic BootP. But remember that BootP is also used to send an operating system that a host can boot from. DHCP don’t do that.

But there is a lot of information a DHCP server can provide to a host when the host is requesting an IP address from the DHCP server. Here’s a list of the information a DHCP server can provide:

  • IP address
  • Subnet Mask
  • Domain Name
  • Default gateway (routers)
  • DNS
  • WINS information

A DHCP server can give us even more information than this, but the items in the list are the most common.

A client that sends out a DHCP discover message in order to receive an IP address sends out a broadcast at both layer 2 and layer 3. The layer 2 broadcast is all F’s in hex, which looks like this FF:FF:FF:FF:FF:FF. The layer 3 broadcast is, which means all networks and all hosts. DHCP is connectionless, which means it uses User Datagram Protocol (UDP) at the Transport layer, also known as the Host-to-Host Layer.

Here’s an example of output from an Ethereal analyzer:

Ethernet II, Src: (00:0b:db:99:d3:5e), 
Dst:Broadcast (ff:ff:ff:ff:ff:ff)

Internet Protocol, Src: (, 
Dst: (

The Data Link and Network layers are both sending out “all hands” broadcasts saying “Help! Don’t know my IP address!

- Advertisement -

Latest news

How to setup Epson L3150 wifi settings

Epson L3150 Wifi setupHere in this tutorial, we will see the setup...

How to Test Epson Print Head manually

Want to know how to test epson print head on your own?...

How to Get WhatsApp For Windows 7 (32-bit & 64-bit)

You might be thinking of installing WhatsApp for Windows 7 and use...

Microsoft’s ‘Your Telephone’ app will allow to stream Android apps to Windows 10

 Microsoft companions with Samsung to stream Android apps seamlessly to Windows 10.
- Advertisement -

Must read

- Advertisement -

You might also likeRELATED
Recommended to you