Please Whitelist This Site?

I know everyone hates ads. But please understand that I am providing premium content for free that takes hundreds of hours of time to research and write. I don't want to go to a pay-only model like some sites, but when more and more people block ads, I end up working for free. And I have a family to support, just like you. :)

If you like The TCP/IP Guide, please consider the download version. It's priced very economically and you can read all of it in a convenient format without ads.

If you want to use this site for free, I'd be grateful if you could add the site to the whitelist for Adblock. To do so, just open the Adblock menu and select "Disable on tcpipguide.com". Or go to the Tools menu and select "Adblock Plus Preferences...". Then click "Add Filter..." at the bottom, and add this string: "@@||tcpipguide.com^$document". Then just click OK.

Thanks for your understanding!

Sincerely, Charles Kozierok
Author and Publisher, The TCP/IP Guide


NOTE: Using software to mass-download the site degrades the server and is prohibited.
If you want to read The TCP/IP Guide offline, please consider licensing it. Thank you.

The Book is Here... and Now On Sale!

Searchable, convenient, complete TCP/IP information.
The TCP/IP Guide

Custom Search







Table Of Contents  The TCP/IP Guide
 9  TCP/IP Application Layer Protocols, Services and Applications (OSI Layers 5, 6 and 7)

Previous Topic/Section
NFS File System Model and the Mount Protocol
Previous Page
Pages in Current Topic/Section
1
Next Page
Host Configuration and TCP/IP Host Configuration Protocols (BOOTP and DHCP)
Next Topic/Section

TCP/IP Network Configuration and Management Protocols (BOOTP, DHCP, SNMP and RMON)

Some folks study the OSI Reference Model just to pass a test and otherwise consider it “useless”. I think it's important because it shows how the different hardware and software components of an internetwork fit together. One aspect of this is that the model lets us see clearly how the functions of networks are implemented by building the higher-layer ones upon those at lower layers. We start at the bottom layers dealing primarily with hardware, and build upon them the software and protocols that make networks and internetworks in the middle layers. The highest layers of the OSI model, especially the application layer, run on top of the internetwork implemented by the layers below. It is therefore at this level that we normally talk about the protocols and applications that permit end users to perform different network communication tasks.

Of course, the users are why we create networks and internetworks in the first place. But while the application layer is indeed where we find user-oriented protocols, users are not the only ones who need to make use of network applications at this level. Network administrators have a number of functions that they must perform on a daily basis to keep networks running smoothly and efficiently, and many of these use support protocols at higher layers.

Decades ago, an administrator was probably responsible for only a small number of computers, all in the same building or even the same room. When something in the network needed to be fixed or changed, the techie would walk over to it and “administer” it. Today, a company's computers are probably not close at hand; they are likely spread out across a campus, a country or the entire world. It is no longer feasible to travel to each computer to perform various maintenance tasks. And with larger networks, trying to manually maintain thousands of computers, even if they were in the same building, would not be possible.

To make administration practical on modern networks, special application-level protocols were created that allow administrators to work with distance devices in a more automated manner over the internetwork itself. It may seem ironic to be using the internetwork to help administer the internetwork, but many tasks such as device configuration and management can be performed effectively using software protocols. Using these protocols yields significant advantages over manual processes, and is part of what keeps the internetworks we rely on running smoothly.

This section takes a look at two classes of administrative tasks that are served by application-layer protocols. The first subsection deals with host configuration, describing the concepts behind the process, and two protocols used for accomplishing automated configuration of internetwork hosts. The second describes protocols used to remotely manage, monitor and control remote hardware devices on an internetwork.

As part of this discussion, I describe in detail four TCP/IP protocols that implement host configuration and management functions. These are the TCP/IP Boot Protocol (BOOTP) and Dynamic Host Configuration Protocol (DHCP) for host configuration, and the Simple Network Management Protocol (SNMP) and Remote Network Monitoring Protocol (RMON) for network management.

Quick navigation to subsections and regular topics in this section



Previous Topic/Section
NFS File System Model and the Mount Protocol
Previous Page
Pages in Current Topic/Section
1
Next Page
Host Configuration and TCP/IP Host Configuration Protocols (BOOTP and DHCP)
Next Topic/Section

If you find The TCP/IP Guide useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider purchasing a download license of The TCP/IP Guide. Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

The TCP/IP Guide (http://www.TCPIPGuide.com)
Version 3.0 - Version Date: September 20, 2005

© Copyright 2001-2005 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.