• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Services » TCP/IP Services And Application Protocols
Next →
← Prev

TCP/IP Services And Application Protocols

By Dinesh Thakur

This section presents an overview of the most common protocols used for TCP/IP communication. The discussion focuses on the nature of these applications and the purpose they serve.

We’ll be covering the following topics in this tutorial:

  • The Client/Server Model
  • Telnet
  • File Transfer Protocol (FTP)
  • Trivial File Transfer Protocol (TFTP)
  • Simple Mail Transfer Protocol (SMTP)
  • Network File System (NFS)
  • Simple Network Management Protocol (SNMP)
  • Domain Name System (DNS)

The Client/Server Model

TC/IP applications operate at the application or process layer of the TCP/IP hierarchy as discussed in the preceding sections. TCP/IP protocol splits an application into server and client components. The server component is a service provider that controls commonly shared resources pertaining to a particular application on the network. The server normally runs on a remote, high-powered, computer to which only authorized users have access. The client component is the service user. That piece of software engages with the server in a sequence of request-response data grams fulfilling certain user-specified demands or requirements.The Client server Computing Model

The client/server computing model has the following attributes;

Flexible deployment This can be easily customized.
Low computer cost Reduced processing requirement at the client end. In most cases, the client has to deal with lesser details of the application compared to the Server. This, in turn,. Means cheaper hardware on the client machine (less CPU power, memory, disk space, and so on). On the other hand, the server must be powerful enough and well-outfitted to make it respond satisfactorily to the user demands on its services.
Increased network management costs Reduced loss of bandwidth from unnecessary data traffic, due to the exchange of data on an as-needed basis. In the case of an Ethernet LAN, this also contributes to reduced collisions and therefore, better networks availability.
Lower transmission facility costs.

Telnet

Telnet is a program that allows a user with remote login capabilities to use the computing resources and services available on the host. Telnet can also be used to connect other ports serving user defined as well as well-known services. The telnet program requires two arguments that is the name of a computer on which the server runs and the protocol port number of the server. Telnet service is unique in that it is not platform-specific like other TCP/IP services. A DOS user running Telnet, for example, can connect to a UNIX host or a mainframe computer. The 90wn side of using Telnet, however, is that unless the user is familiar with the operating system running on the remote platform, he or she cannot use the desired resources easily.

File Transfer Protocol (FTP)

File Transfer protocol is among the oldest protocols still used in the internet. ITP is widely available on almost all-computing platforms, including DOS, OS/2, UNIX, and up to the mainframe level. ITP is a file server access protocol that enables a user to transfer files between two hosts across the network or Internet. This is also established through TCP. Accessing ITP sites over the internet requires that the user must have the knowledge of the location and the name of the desired files.

Unlike Telnet, ITP does not require any familiarity with the remote operating system. The user is still required, however, to be familiar with the ITP command set built into the protocol itself so that he or she can productively manage the session.

Modem FTP servers known as ftpd support two modes, the classic normal mode and more security conscious passive mode or PASV mode.

Trivial File Transfer Protocol (TFTP)

TITP, like ITP, is also an internet service intended for the transfer of files between hosts. Unlike ITP, however, TITP does not rely on TCP for transport services. Instead, TITP uses UDP to shuttle the requested file to the TITP client.

Simple Mail Transfer Protocol (SMTP)

The Simple Mail Transfer Protocol is an electronic mail (e-mail) service provider. It is intended for the Transfer of e-mail messages across ·the network. SMTP uses TCP transport for the reliable delivery of mail messages. When there is an outgoing mail, the SMTP client will connect to the SMTP server and sends the mail to the remote server.

Network File System (NFS)

Network File System service enables hosts across the network to share file system resources transparently among themselves. Although it all started on UNIX platforms, NFS can be implemented on any platform, including DOS, NetWare, and Windows NT.

Simple Network Management Protocol (SNMP)

Using the Simple Network Management Protocol, LAN administrators can monitor and tune the performance of TCP/IP (as well as non-TCP/IP) networks. Using SNMP, all kinds of information about network performance can be gathered, including statistics, routing tables, and configuration-related parameters. The information and configuration gathering capabilities of SNMP make it an ideal tool for network troubleshooting and performance tuning.

Domain Name System (DNS)

Due to Internet explosion, it is not practical to keep an exhaustive hosts file for every host because of the sheer volume of listing as well as addition, deletion and updating of new, old and current hosts. Therefore, DNS is used to provide host-to-IP address mapping of remote hosts to the local hosts and vice versa. As we know that each device connected directly to the network must have an IP address that is uniquely assigned to it. The address takes the form of a dotted decimal notation such as 128.45.6.89

You’ll also like:

  1. What are the ADSL Protocols?
  2. What is Application Program and application software?
  3. Routing Protocols
  4. What is an Application Software? Types of Application Software. Definition
  5. What are Network Protocols? – Definition
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Internet

Internet Terminology

    • Internet - Home
    • Internet - Email
    • Internet - www
    • Internet - Telnet
    • Internet - Architecture
    • Internet - FTP
    • Internet - HTTP
    • Internet - MIME
    • Internet - SMTP
    • Internet - DNS
    • Internet - POP3
    • Internet - Intranet
    • Internet - SNMP
    • Internet - BOOTP
    • Internet - TFTP
    • Internet - URL
    • Internet - NAT
    • Internet - DHCP
    • Internet - Cellular Radio
    • Internet - VSAT
    • Internet - TCP/IP Services
    • Internet - IMAP4
    • Internet - GSM Architecture
    • Internet - VOIP
    • Internet - GSM Features
    • Internet - SSL
    • Internet - Web Server
    • Internet - File Server
    • Internet - NNTP
    • Internet - UUCP
    • Internet - ADSL
    • Internet - FTP
    • Internet - NFS
    • Internet - Videoconferencing
    • Internet - Audio Compression
    • Internet - xDSL
    • Internet - ADSL Protocols
    • Internet - HTTP Cookie
    • Internet - Wireless Principles
    • Internet - X.400
    • Internet - IP Standardization
    • Internet - 4G
    • Internet - CompuServe
    • Internet - Anonymous FTP
    • Internet - File Sharing
    • Internet - WRAN
    • Internet - FQDN
    • Internet - CNAME
    • Internet - Buffering
    • Internet - Cluster Computing
    • Internet - WiMAX
    • Internet - Client/Server
    • Internet - ATM
    • Internet - DSL
    • Internet - GPRS
    • Internet - Transfer rate
    • Network - Cable Modem

Network Server Technique

    • Server - Home
    • Server - Proxy
    • Server - BBS
    • Server - B Channel
    • Server - Process
    • Server - AAL
    • Server - ISDN Features
    • Server - Multicasting
    • Server - Client/Server Benefits
    • Server - Client process
    • Server - Ad-Hoc
    • Server - ISDN Interfaces
    • Server - Guided Transmission
    • Server - SONET
    • Server - ISDN Standards
    • Server - WAP
    • Server - Broadband ISDN

Networking Encryption System

    • Security - Firewall
    • Security - Cryptography
    • Security - Firewall Architectures
    • Security - Network Security Services
    • Security - VPN
    • Security - Security Threats
    • Security - Encryption
    • Security - SHA-1
    • Security - Requirements
    • Security - Digital Signatures
    • Security - Message Authentication
    • Security - MD5
    • Security - Tunneling (VPN)
    • Security - Remote Access Security

Some Other Tutorials

  • Tutorials - QOS
  • Tutorials - CTS
  • Tutorials - LTE
  • Tutorials - CDDI
  • Tutorials - AppleTalk
  • Tutorials - EtherTalk
  • Tutorials - Flooding
  • Tutorials - Tunneling
  • Ethernet - Frame
  • Ethernet - Expansion
  • Ethernet - 10 Mbit/s
  • Ethernet - Local Loop
  • Broadband vs Baseband
  • Wi-Fi vs. Mobile Broadband
  • Optical Source
  • Implementation Wireless Technology
  • Applications of Wifi
  • Wireless Router Installation
  • Networking Your Devices
  • Type of Wi-Fi equipment
  • Multi-point Architectures
  • Frame-level Architecture
  • Circuits, Channels and Multichanneling
  • Single Bit Error Vs Burst Error

Other Links

  • Internet Terminology - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW