The University of Adelaide, School of Computer Science

Slides:



Advertisements
Similar presentations
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Advertisements

Layer 7- Application Layer
1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 Advanced Internetworking Computer Networks, 5th Edition.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Copyright © 2012 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 COM Chapter 9 Applications 3 Part network protocol (in the sense that they exchange messages with their peers on other machines) and part traditional.
Chapter 10: Application Layer
Chapter 5 Network and Transport Layers
Chapter 5 Network and Transport Layers
Instructor Materials Chapter 10: Application Layer
Zueyong Zhu† and J. William Atwood‡
Internet and Intranet.
Network Architecture Layered system with alternative abstractions available at a given layer.
The Internet.
Working at a Small-to-Medium Business or ISP – Chapter 7
Lec 5 Layers Computer Networks Al-Mustansiryah University
The University of Adelaide, School of Computer Science
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 5 Network and Transport Layers
Internet and Intranet.
Application layer Lecture 7.
A Scalable content-addressable network
Working at a Small-to-Medium Business or ISP – Chapter 7
Copyright © 2016 Elsevier Inc. All rights reserved.
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
Internet and Intranet.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 11.
The University of Adelaide, School of Computer Science
Copyright © 2012, Elsevier Inc. All rights Reserved.
The University of Adelaide, School of Computer Science
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
The University of Adelaide, School of Computer Science
Chapter 10.
Connecting to the Network
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2015, 2012, 2009 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
The University of Adelaide, School of Computer Science
Copyright © 2013 Elsevier Inc. All rights reserved.
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
© 2012 Elsevier, Inc. All rights reserved.
COSC 4213: Computer Networks II
Modeling Text-Based Requirements and their Relationship to Design
Modeling Functionality with Use Cases
Customizing SysML for Specific Domains
Copyright © 2012, Elsevier Inc. All rights Reserved.
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
Internet and Intranet.
Chapter 12.
Chapter 6.
Copyright © 2012, Elsevier Inc. All rights Reserved.
© 2012 Elsevier, Inc. All rights reserved.
Chapter 01.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 15 Contraception
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 15.
Chapter 3.
Advanced Computer Networks
Presentation transcript:

The University of Adelaide, School of Computer Science 14 January 2019 Computer Networks, 5th Edition Chapter 9 Applications Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 — Instructions: Language of the Computer

FIGURE 9.1 Sequence of mail gateways store and forward email messages. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.2 IMAP state transition diagram. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.3 The Firefox web browser. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.4 HTTP 1.0 behavior. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.5 HTTP 1.1 behavior with persistent connections. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.6 SOAP message structure. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.7 A session directory tool displays information extracted from SDP messages. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 9.8 Establishing communication through SIP proxies. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.9 Message flow for a basic SIP session. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.10 Devices in an H.323 network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.11 Differentiated Services applied to a VOIP application. DiffServ queueing is applied only on the upstream link from customer router to ISP. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.12 Admission control using session control protocol. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.13 Co-ordination of SIP signalling and resource reservation. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.14 Names translated into addresses, where the numbers 1 to 5 show the sequence of steps in the process. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.15 Example of a domain hierarchy. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.16 Domain hierarchy partitioned into zones. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.17 Hierarchy of name servers. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.18 Name resolution in practice, where the numbers 1 to 10 show the sequence of steps in the process. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.19 Overlay network layered on top of a physical network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.20 Overlay nodes tunnel through physical nodes. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.21 Alternative multicast trees mapped onto a physical topology. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.22 Multicast tree embedded in an overlay mesh. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.23 The triangle inequality does not necessarily hold in networks. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.24 Example topology of a Gnutella peer-to-peer network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.25 Both nodes and objects map (hash) onto the ID space, where objects are maintained at the nearest node in this space. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.26 Objects are located by routing through the peer-to-peer overlay network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.27 Example routing table at the node with ID 65a 1 f cx. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.28 Adding a node to the network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.29 Peers in a BitTorrent swarm download from other peers that may not yet have the complete file. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved

Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.30 Components in a Content Distribution Network (CDN). Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved