Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Advertisements

Chapter 11 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson Revised August 2013.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
The Internet Useful Definitions and Concepts About the Internet.
COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.
1 Computer Networks Transport Layer Protocols. 2 Application-layer Protocols Application-layer protocols –one “piece” of an app –define messages exchanged.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Lecturer: Tamanna Haque Nipa
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Networked Applications Chapter 11 Updated January 2009 Raymond Panko’s Business Data Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
Process-to-Process Delivery:
Computer Concepts 2014 Chapter 7 The Web and .
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Chapter 11 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson Revised August 2013.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Presentation on Osi & TCP/IP MODEL
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Network Services Networking for Home & Small Business.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
Chapter 11 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson.
Sockets process sends/receives messages to/from its socket
1 Figure 3-2: TCP/IP Standards (Study Figure) Origins  Defense Advanced Research Projects Agency (DARPA) created the ARPANET  An internet connects multiple.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
1 Client Software and Mail Hosts Client PC has client software that communicates with user’s mail host Mail hosts deliver outgoing mail to.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Security Technology Clients and Mail Servers
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
TCP/IP (Transmission Control Protocol / Internet Protocol)
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
Chapter 11 Panko and Panko Business Data Networks and Security, 10 th Edition, Global Edition Copyright © 2015 Pearson Education, Ltd. Panko and Panko.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Chapter 11 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson.
Introduction to Networks
Instructor Materials Chapter 5 Providing Network Services
Networking for Home and Small Businesses – Chapter 6
CHAPTER 2 Application Layer.
HTTP: the hypertext transfer protocol
Introduction to Networks
Networking for Home and Small Businesses – Chapter 6
Topic 5: Communication and the Internet
Process-to-Process Delivery:
Protocols 2 Key Revision Points.
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
Chapter 7 Network Applications
Presentation transcript:

Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!

Copyright © 2016 Pearson 11-2

Copyright © 2016 Pearson Education, Inc

Copyright © 2016 Pearson Education, Inc. 11-4

Copyright © 2015 Pearson Education, Inc When the webpage loads, the user’s “name” is entered into the page’s HTML). However, what appears on the webpage is the script, which the browser executes

2. Simple Mail Transfer Protocol gives nearly instantaneous sending 2. Simple Mail Transfer Protocol gives nearly instantaneous sending 1. Each client PC has its own mail server. 1. Each client PC has its own mail server. Copyright © 2015 Pearson Education, Inc

3. Sender’s mail server sends to Receiver’s mail server via SMTP Again, this is nearly instantaneous 3. Sender’s mail server sends to Receiver’s mail server via SMTP Again, this is nearly instantaneous Copyright © 2015 Pearson Education, Inc. 11-7

4. Reading Received Mail Later Post Office Protocol (POP) or Internet Message Access Protocol (IMAP) 4. Reading Received Mail Later Post Office Protocol (POP) or Internet Message Access Protocol (IMAP) Copyright © 2015 Pearson Education, Inc. 11-8

Document format standards: RFC 822/2822 for plain text messages. HTML bodies for formatting. UNICODE can represent text in any language. Document format standards: RFC 822/2822 for plain text messages. HTML bodies for formatting. UNICODE can represent text in any language. There are separate transmission and document standards. Copyright © 2015 Pearson Education, Inc

 Many applications have two types of standards.  Delivery standards ◦ SMTP, POP, IMAP  Message format standards ◦ RFC 822/2822, HTML, UNICODE ◦ It does no good to deliver messages if the receiver cannot understand them. Copyright © 2015 Pearson Education, Inc

 Either or both clients can use web-based instead of SMTP and POP or IMAP.  All interactions for that client take place via HTTP instead.  Message documents are HTML webpages. SMTP HTML HTTP POP/ IMAP Copyright © 2015 Pearson Education, Inc

Filtering in two or more locations gives defense in depth. Copyright © 2015 Pearson Education, Inc

Copyright © 2015 Pearson Education, Inc Even if the sender uses SSL/TLS, only the link to its mail host is directly secured.

Copyright © 2015 Pearson Education, Inc SSL/TLS only provides link encryption. Mail servers decrypt and handle before reencrypting if they reencrypt at all

Copyright © 2015 Pearson Education, Inc End-to-end encryption is possible. It is done by the two hosts. However, it is rarely done because there is no dominant standard. It prevents firewall and antivirus filtering of the message. End-to-end encryption is possible. It is done by the two hosts. However, it is rarely done because there is no dominant standard. It prevents firewall and antivirus filtering of the message.

SignalingTransport  Setting up a connection.  Shutting down the connection.  Billing  Etc.  Transmitting voice between people. Panko and Panko, 11 th Pearson Fundamental

SIP is a signaling protocol. This figures shows connection establishment. SIP is a signaling protocol. This figures shows connection establishment. Copyright © 2015 Pearson Education, Inc

Transport takes place directly between the caller and called party. Copyright © 2015 Pearson Education, Inc

 UDP ◦ There is no time for resending lost packets. ◦ Unreliable UDP so light traffic volume overhead.  Real-Time Protocol (RTP) Header ◦ Makes up for two UDP limits. ◦ It adds sequence numbers. ◦ It adds a time stamp for when its codec octets should be played back relative to each other. Copyright © 2015 Pearson Education, Inc

 Codecs translate analog voice to digital transmission signals. Codec Transmission Rate G kbps (initial telephony standard) G , 56, 64 kbps G kbps G , 32 kbps G , 24, 32, 40 kbps G kbps G.729AB 8 kbps G , 6.4 kbps G.723.1A5.3, 6.3 kbps In general, greater compression means poorer sound quality. Copyright © 2015 Pearson Education, Inc

Again, we see an application with transmission and document standards. Copyright © 2015 Pearson Education, Inc

This webpage has text and two graphics. The HTML file has the text and tags for the graphics. This webpage has text and two graphics. The HTML file has the text and tags for the graphics. Copyright © 2015 Pearson Education, Inc

Based on tags in the HTML file, the graphics files are downloaded and rendered on the page. Copyright © 2015 Pearson Education, Inc

 Question: How many files will a browser have to download if the webpage has three graphics and plays music when it is downloaded?  Which must be downloaded first, and why? Copyright © 2015 Pearson Education, Inc

 HTTP 1.0 was created in 1999  HTTP 2.0 is just being standardized ◦ Transmission speeds are now very fast. ◦ HTTP downloads are now server limited. ◦ HTTP 2.0 server download improvements should decrease download times by 40% ◦ TLS is optional in the standard, but several browsers now require it, so all websites will have to use it. © 2013 Pearson 25

 Clients provide services to other clients.  Servers are not used or are used only for secondary tasks such as helping a client find another client.  Made possible by growing desktop processing power ◦ Terminal-Host: no desktop processing power ◦ Client/server: some desktop processing power ◦ P2P: extensive desktop processing power Copyright © 2015 Pearson Education, Inc

4. Client PC downloads pieces from the swarm. 5. Client PC reassembles the file. Copyright © 2015 Pearson Education, Inc

 Host node: a Skype application that runs on a user’s computer.  Skype login server: the only centralized component in the Skype network  Super node: a host node that takes on the work of signaling ◦ Powerful clients almost always become super nodes Copyright © 2015 Pearson Education, Inc Signaling

Once connected, signaling ends The two parties communicate entirely via P2P. This is transport. So most Skype transmission is P2P. Once connected, signaling ends The two parties communicate entirely via P2P. This is transport. So most Skype transmission is P2P. Copyright © 2015 Pearson Education, Inc Transport

© 2016 Pearson 30