1 COM Chapter 9 Applications 3 Part network protocol (in the sense that they exchange messages with their peers on other machines) and part traditional.

Slides:



Advertisements
Similar presentations
1 Higher level protocols Domain Naming System, DNS HTTP.
Advertisements

Spring 2006CS 3321 Name Service (DNS) Outline Terminology Domain Naming System.
The Application Layer Chapter 7. Where are we now?
Layer 7- Application Layer
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Electronic Mail (SMTP, POP, IMAP, MIME)
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 6 Basic TCP/IP Services.
Human-Computer Interface Course 5. ISPs and Internet connection.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet Applications  DNS   TELNET  FTP  Web browsing.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
Internet applications Bill Chu. © Bei-Tseng Chu Aug 2000 Need for Domain Name Service (DNS) Natively, a TCP host is identified by its IP address hosts.
2013Dr. Ali Rodan 1 Handout 1 Fundamentals of the Internet.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
TCP/IP Transport and Application (Topic 6)
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
1 TCP/IP Networking. 2 TCP/IP TCP/IP is the networking protocol suite most commonly used with UNIX, Windows, NT and most other OS’s. TCP/IP defines a.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 WWW. 2 World Wide Web Major application protocol used on the Internet Simple interface Two concepts –Point –Click.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
4343 X2 – Outline The Domain Name System The Web.
CS440 Computer Networks 1 Neil Tang 12/01/2008.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Chapter 10: Application Layer
Introduction to the Internet
Application layer Lecture 7.
Instructor Materials Chapter 5 Providing Network Services
Instructor Materials Chapter 10: Application Layer
Unit 28 Website Production
WWW and HTTP King Fahd University of Petroleum & Minerals
Networking CS 3470, Section 1 Sarah Diesburg
Level 2 Diploma Unit 10 Setting up an IT Network
Application Layer Honolulu Community College
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
The Internet.
The Application Layer RIS 251 Dr. ir. S.S. Msanjila.
Protocols and networks in the TCP/IP model initially.
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Networking for Home and Small Businesses – Chapter 6
CHAPTER 2 Application Layer.
Chapter 10: Application Layer
Web Development & Design Chapter 1, Sections 4, 5 & 6
Chapter 3: Windows7 Part 4.
Networking for Home and Small Businesses – Chapter 6
The Internet and HTTP and DNS Examples
1 Introduction to the Internet.
Application layer Lecture 7.
Multimedia and Networks
Web Design & Development
Networking CS 3470, Section 1 Sarah Diesburg
Application Layer Functionality and Protocols
The University of Adelaide, School of Computer Science
HyperText Transfer Protocol
ECE 4450:427/527 - Computer Networks Spring 2017
Applications Layer Functionality & Protocols
Networking for Home and Small Businesses – Chapter 6
Chapter 7 Network Applications
Computer Networks Protocols
Presentation transcript:

1 COM 360

2 Chapter 9 Applications

3 Part network protocol (in the sense that they exchange messages with their peers on other machines) and part traditional application program in the sense that they interact with the windowing system, the file system and the user). Emphasized the system approach – the best way to build effective network applications is to understand the building blocks that the network can provide and how those blocks can interact with each other. Applications might need their own protocols, too.

4 Traditional Applications Two most popular World Wide Web and . Domain Name System (DNS) – not explicitly invoked by users, but an application that all others depend upon. Network management – an application for system administrators.

5 Applications Most use the request/reply paradigm- users send requests to servers which respond. Distinguish between application programs and application protocols. For example, HTTP is a protocol used to retrieve programs from a web server, but there can be many programs to do this (IE, Netscape, Firefox, etc.) and they all use the same protocol.

6 Application Protocols SMTP- Simple Mail Transfer Protocol – used to exchange electronic mail. HTTP – Hypertext Transport Protocol – used to communicate between web browsers and web servers. DNS Domain Name System- used to query name servers and send responses. SNMP- Simple Network Management Protocol- used to query (and sometimes modify) the state of remote network nodes.

7 Application Protocols Although many protocols are request/reply, they are not all built on top of the RPC transport protocol. Some of them are implemented on top of TCP or UDP. Most protocols, except DNS, have a companion protocol that specifies the format of the data that can be exchanged. This is one reason that these protocols are relatively simple.

8 Application Protocols SMTP is a protocol for exchanging and RFC 822 and MIME ( Multipurpose Internet Mail Extensions) define the format of the messages. HTTP is a protocol for fetching web pages but the HTML ( HyperText Markup Language) defines the form of the pages. SNMP is a protocol for querying a network node but MIB ( Management Information Base ) defines the values that can be queried.

9 Electronic Mail (SMTP,MIME,IMAP) How does work? Distinguish between the user interface ( or mail reader) and the message transfer protocol (SMTP) Distinguish between the transfer protocol and a companion protocol (RFC 822 and MIME) RFC 822 defines messages to have two parts: a header and a body- both in ASCII MIME augments this to allow the message body to carry different kinds of data – specifies how to convert binary data, such as image files, to ASCII IMAP – Internet message Access Protocol – an application layer protocol that allows users to retrieve from a mail server.

10 Electronic Mail- Message Transfer SMTP is the protocol used to transfer messages form one host to another. Users interact with a mail reader, when they compose, file, search and read . There is a mail daemon (or process) running on each host, which plays the role of post office. (The mail daemon on most hosts is Unix sendmail.) Mail readers give the daemon messages they want to send, the daemon uses SMTP running over TCP to transmit the message to the daemon running on another machine, and the daemon puts incoming messages into the user’s mailbox (where user’s mail reader can find it).

11 Mail Gateways A sequence of mail gateways store and forward messages. Gateways are similar to IP gateways or routers, except they buffer on disks and try to transmit for several days.

12 Mail Reader User first retrieves messages from his/her mailbox, reads them and replies to them and possibly saves a copy. User interacts with the mail reader, which reads and writes the file that implements the mailbox. In other cases, the user accesses the mailbox from a remote machine using another protocol such as the Post Office Protocol (POP) or the Internet Message Access Protocol (IMAP). IMAP is similar to SMTP in may ways.

13 Mail Reader and IMAP IMAP is a client/server protocol running over TCP, where the client (on user’s desktop) issues commands and the mail server (running on the machine with the mailbox) responds. The exchange begins with the client authenticating and then identifying the mailbox to access.

14 IMAP State Transition Diagram

15 World Wide Web Think of the web as a set of cooperating clients and servers, all using the same language: HTTP. Most are exposed to the web through a graphical interface client program, or a web browser, like Netscape, FireFox, Internet Explorer, or Opera A web browser has a function that allows a user to open a URL, which provided information about the location of objects on the web. Most web files contain images and text.

16 Web Browser

17 World Wide Web Request Messages- the first line specifies the operation, the web page it is performed on, and the version of HTTP. Most common are GET and HEAD(fetch status information). See p.653 Response Messages- The first line begins with version number, a 3 digit code for success, and a text string giving the reason for the response. Uniform Resource Identifiers-one type is the URL that HTTP uses as addresses. TCP Connections- now allows client and server to exchange multiple request/response messages.

18 World Wide Web Caching- one of the most active areas of Internet research is how to effectively cache a web page. Caching has many benefits- from client’s perspective, a page retrieved from nearby can be displayed more quickly. From server’s perspective, having a cache intercept and satisfy a request reduces the load on the server. Caching can be implemented in many different place. Cache needs to make sure it is not responding with an out-of-date version of the page.

19 Name Services (DNS) Naming service used to map user-friendly addresses into router-friendly addresses. Namespace-defines the set of possible names. –Flat – not divisible into components –Hierarchical – ( having a tree like-structure) Resolution mechanism is a procedure that can be invoked with a name and will return a value. Name server implements a resolution mechanism and can be queried by sending it a message.

20 Name Services Names translated into addresses, where the numbers 1-5 show the sequence of steps in the process.

21 DNS Internet has a well-developed naming system- the domain name system (DNS). In mid-1980’s DNS was put into place. It uses a hierarchical namespace and the table of name bindings is distributed throughout the Internet.

22 Name Servers The complete domain name hierarchy exists only in the abstract. How is the domain hierarchy implemented? First partitioned into sub-trees called zones, corresponding to fundamental units. Information in each zone is implemented in two or more servers for redundancy. Each name server is a program that can be accessed over the Internet. Clients send queries to name servers, which respond with the requested information.

23 Hierarchy of Name Servers Princeton name server Cisco name server CS name server EE name server ■ ■ ■ Root name server ■ ■ ■

24 Domain Hierarchy DNS Implements a domain hierarchical namespace for Internet objects. DNS names are processed from left to right with the naming components separated with slashes. There are domains for each country and also the “big six”:.com,.edu,.gov,.mil,.org,.net These were recently expanded by the addition of new top-level domains such as.biz, coop, info, name, museum, etc.

25 Example of A Domain Hierarchy educom princeton ■ ■ ■ mit csee ux01ux04 physics cisco ■ ■ ■ yahoonasa ■ ■ ■ nsfarpa ■ ■ ■ navyacm ■ ■ ■ ieee govmilorgnetukfr

26 Domain Hierarchy Partitioned into Zones educom princeton ■ ■ ■ mit csee ux01ux04 physics ciscoyahoonasansfarpanavyacmieee govmilorgnetukfr ■ ■ ■

27 Naming Conventions Less technical conventions are used to decide the names, for example all US Universities are under the edu domain, while English universities are under the ac (academic) domain of the UK (United Kingdom). Organizations name their machines according to a set of rules. Host names such as venus, mars, saturn are among the most common. One site named its machines up, down, cracked and rebooting, which led to confusion when they issued messages such as “up is down” or “rebooting has crashed”.

28 Name Resolution How does a client use a server to resolve a domain name? For example: penguins.cs.princeton.edu First send a query to the root server, which may respond with a match. If not, it then sends to the IP host server, etc.

29 Name Resolution in Practice Numbers 1-10 show the sequence of steps in the process.

30 Network Management (SNMP) A network is a complex system with suites of protocols running on many nodes. Even within a single domain there are many routers and hundreds or thousands of hosts, with address translation tables, routing tables, TCP connection states, etc. These all must be managed- to do this we use the network to manage the network. SNMP is a specialized reply/request protocol that supports two kinds of request messages: GET and SET.

31 Network Management (SNMP) SNMP allows the administrator to interact with a client program that displays information about the network. SNMP runs on top of TCP An SNMP server locates the appropriate information and returns it to the client program, which displays it to the user. How does the client know what piece of information to return? It uses MIB

32 MIB MIB- Management Information Base- defines specific pieces of information – MIB variables- that you can retrieve from a network node. The current version MIB-II organizes variables into 10 groups: system, interfaces, address translation, IP, TCP, UDP, ICMP, EGP, SNMP, and a group for different media MIB variables are either tables of structures.

33 Web Services Most of the applications previously examined involve interactions between a human and a machine. There is increasing demand for computer-to- computer interaction and these also require protocols. Many of these applications come from business Two architectures, called Web Services, have been defined: SOAP and REST

34 Web Services SOAP- generates protocols that are customized to each application- sort of a mass customization. It includes a framework for protocols, software tools kits, and modular specifications that can be reused. REST regards individual web services as WWW resources- identified by URLs and accessed via HTTP. It is the web architecture.

35 Multimedia Applications Like the traditional applications, multimedia applications, such as audio conferencing and videoconferencing need their own protocols. Some of these original protocols came from “MBone tools”- applications such as vat and vic The Real-time Transport Protocol (RTP) provides many functions to multimedia applications. They also need a session control protocol – Session Initiation Protocol (SIP) such as for IP telephone calls and VoIP.

36 User Interface of a Vat Audioconference

37 Protocol Stack for Multimedia Applications using RTP

38 RTP Header Format

39 Padding of an RTP Packet

40 Session Directory Displays information extracted from SDP messages.

41 SIP Proxies Establishing communication through SIP proxies

42 Message Flow For Basic SIP Session

43 Devices in an H.323 Network

44 Overlay Network Overlay network layered on top of a physical network

45 Overlay Nodes Overlay nodes tunnel through physical nodes.

46 Multicast Trees

47 Trees in Mesh Multicast tree embedded in an overlay mesh.

48 Triangle inequality Triangle inequality does not necessarily hold in networks.

49 Topology of a Peer-to-Peer Network

50 Figure 9.23 objid nodeids  1

51 Figure 9.24

52 Figure 9.25

53 Figure 9.26

54 Figure 9.27