1 Application Layer Protocols. 2 Those protocols run on top of/over TCP/IP: Those protocols run on top of/over TCP/IP: TelnetTelnet File Transfer Protocol.

Slides:



Advertisements
Similar presentations
Introduction to Networks
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Application Layer Introduction to Networks.
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
Jaringan Komputer Dasar
1 Java Networking – Part I CS , Spring 2008/9.
Layer 7- Application Layer
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Application Layer Network Basics.
Gursharan Singh Tatla Transport Layer 16-May
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Electronic Mail (SMTP, POP, IMAP, MIME)
Process-to-Process Delivery:
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
CCNA Exploration Network Fundamentals
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
BY SAGAR SINHA SAPTARSHI BAKSHI SARTHAK JAIN SHAILZA CHAUDHARY
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Simple Mail Transfer Protocol (SMTP)
TCP/IP Yang Wang Professor: M.ANVARI.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
Network Services Networking for Home & Small Business.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
1 Version 3.0 Module 11 TCP Application and Transport.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
TCP/IP Transport and Application (Topic 6)
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Data Communications and Networks Chapter 5 – Network Services DNS, DHCP, FTP and SMTP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Networking Basics CCNA 1 Chapter 11.
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
4343 X2 – Outline The Domain Name System The Web.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
TCP/IP Services and Applications Chapter 14 Release 16/7/2009.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to TCP/IP.
1 Network Communications A Brief Introduction. 2 Network Communications.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 10: Application Layer
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Process-to-Process Delivery:
Networking Theory (part 2)
Networking for Home and Small Businesses – Chapter 6
Chapter 7 Network Applications
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Data Communications and Networks
Networking Theory (part 2)
Presentation transcript:

1 Application Layer Protocols

2 Those protocols run on top of/over TCP/IP: Those protocols run on top of/over TCP/IP: TelnetTelnet File Transfer Protocol (FTP)File Transfer Protocol (FTP) Hyper Text Transfer Protocol (HTTP) *Hyper Text Transfer Protocol (HTTP) * Simple Mail Transfer Protocol (SMTP), POP3, IMAPSimple Mail Transfer Protocol (SMTP), POP3, IMAP Network News Transfer Protocol (NNTP)Network News Transfer Protocol (NNTP) Domain Name System (DNS) *Domain Name System (DNS) * Dynamic Host Configuration Protocol (DHCP)Dynamic Host Configuration Protocol (DHCP) * Covered in previous lectures

3 Telnet Provides terminal emulation Provides terminal emulation Comes with nearly all vendor implementations of TCP/IP Comes with nearly all vendor implementations of TCP/IP Open standard Open standard Supported by wide range of workstations Supported by wide range of workstations Not a secure protocol Not a secure protocol

4 Telnet Communications Options 7- or 8-bit compatibility 7- or 8-bit compatibility Use of different terminal nodes Use of different terminal nodes Character echoing at sending and receiving ends Character echoing at sending and receiving ends Synchronized communications Synchronized communications Transmission of character streams or single characters Transmission of character streams or single characters Flow control Flow control

5 FTP FTP – File transfer protocol. Commonly used over the Internet. FTP – File transfer protocol. Commonly used over the Internet. Numerous FTP servers over the world allow people anywhere on the Internet to log in and download whatever files they have placed on the FTP server, or upload other files. Numerous FTP servers over the world allow people anywhere on the Internet to log in and download whatever files they have placed on the FTP server, or upload other files. Uses two TCP ports (20 data channel and 21 control channel) – this is in active mode. In passive FTP mode, it uses 21 for the control channel, and an ephemeral port for the data channel. Uses two TCP ports (20 data channel and 21 control channel) – this is in active mode. In passive FTP mode, it uses 21 for the control channel, and an ephemeral port for the data channel. Commonly used on the Internet Commonly used on the Internet Not a secure protocol Not a secure protocol

6 Sample FTP Commands

7SMTP Designed for exchange of between networked systems Designed for exchange of between networked systems Within the Internet, is delivered by having the source machine establish a TCP connection to port 25 of the destination machine / server. Listening on this port would be an SMTP (Simple Mail Transfer Protocol) daemon / service that speaks SMTP. Within the Internet, is delivered by having the source machine establish a TCP connection to port 25 of the destination machine / server. Listening on this port would be an SMTP (Simple Mail Transfer Protocol) daemon / service that speaks SMTP. This daemon accepts incoming connections and copies messages from them into the appropriate mailboxes. If a message cannot be delivered, an error report of the undeliverable message is returned to the sender, which contains the first part of the message. This daemon accepts incoming connections and copies messages from them into the appropriate mailboxes. If a message cannot be delivered, an error report of the undeliverable message is returned to the sender, which contains the first part of the message.

8 SMTP is a simple ASCII protocol. SMTP is a simple ASCII protocol. After establishing the TCP connection to port 25, the sending machine, operating as the client, waits for the receiving machine, operating as the server, to talk first. After establishing the TCP connection to port 25, the sending machine, operating as the client, waits for the receiving machine, operating as the server, to talk first. The server starts by sending a line of text giving its identity and telling whether or not it is prepared to receive mail. The server starts by sending a line of text giving its identity and telling whether or not it is prepared to receive mail. If it is not, the client releases the connection and tries again later. If it is not, the client releases the connection and tries again later.SMTP

9SMTP If the server is willing to accept , the client announces whom the is coming from and whom it is going to. If the server is willing to accept , the client announces whom the is coming from and whom it is going to. If such recipient exists at the destination, the server gives the client the go-ahead to send the message. Then the client sends the message, and the server acknowledges it. If such recipient exists at the destination, the server gives the client the go-ahead to send the message. Then the client sends the message, and the server acknowledges it. No checksums needed because TCP provides a reliable byte stream. No checksums needed because TCP provides a reliable byte stream. If there is more it is now sent. When all has been exchanged in both directions, the connection is released. If there is more it is now sent. When all has been exchanged in both directions, the connection is released.

10 SMTP

11POP3 Until now, we assumed that all users work on machines that are capable of sending and receiving . Sometimes this is not the case. Until now, we assumed that all users work on machines that are capable of sending and receiving . Sometimes this is not the case. For example, at many companies, users work at desktop PCs that ar enot on the Internet and are not capable of sending or receiving from outside the company. Instead, the company has one or more servers that can send and receive . For example, at many companies, users work at desktop PCs that ar enot on the Internet and are not capable of sending or receiving from outside the company. Instead, the company has one or more servers that can send and receive . To send or receive messages, a PC must talk to an server using some kind of delivery protocol. To send or receive messages, a PC must talk to an server using some kind of delivery protocol.

12POP3 A simple protocol used for fetching from a remote mailbox is POP3 (Post Office Protocol). A simple protocol used for fetching from a remote mailbox is POP3 (Post Office Protocol). It has commands for the user to log in, log out, fetch messages, and delete messages. It has commands for the user to log in, log out, fetch messages, and delete messages. The protocol itself consists of ASCII text and has something of the flavor of SMTP. The point of POP3 is to fetch from the remote mailbox and store it on the user’s local machine to read later. The protocol itself consists of ASCII text and has something of the flavor of SMTP. The point of POP3 is to fetch from the remote mailbox and store it on the user’s local machine to read later.

13 A more sophisticated delivery protocol is IMAP (Interactive Mail Access Protocol). A more sophisticated delivery protocol is IMAP (Interactive Mail Access Protocol). It was designed to help the user who uses multiple computers, perhaps a workstation in the office, a PC at home, and a laptop on the road. It was designed to help the user who uses multiple computers, perhaps a workstation in the office, a PC at home, and a laptop on the road. The basic idea behind IMAP is for the server to maintain a central repository that can be accessed from any machine. The basic idea behind IMAP is for the server to maintain a central repository that can be accessed from any machine. Thus unlike POP3, IMAP does not copy to the user’s personal machine because the user may have several.\ Thus unlike POP3, IMAP does not copy to the user’s personal machine because the user may have several.\IMAP

14 Independent of whether is delivered directly to the user’s workstation or to a remote server, many systems provide hooks for additional processing of incoming . Independent of whether is delivered directly to the user’s workstation or to a remote server, many systems provide hooks for additional processing of incoming . An especially valuable tool for many users is the ability to set up filters. These are rules that are checked when comes in or when the user agent is started. An especially valuable tool for many users is the ability to set up filters. These are rules that are checked when comes in or when the user agent is started. Each rule specifies a condition and an action. For example, a rule could say that any message from Angelina Tzacheva should be displayed in a 24- point flashing red boldface font (or alternatively, be discarded automatically without comment). Each rule specifies a condition and an action. For example, a rule could say that any message from Angelina Tzacheva should be displayed in a 24- point flashing red boldface font (or alternatively, be discarded automatically without comment).

15 NNTP NNTP (Network News Transfer Protocol) is similar to SMTP in a sense that a client issues commands in ASCII and a server issues responses as decimal numbers coded in ASCII. NNTP (Network News Transfer Protocol) is similar to SMTP in a sense that a client issues commands in ASCII and a server issues responses as decimal numbers coded in ASCII. NNTP was designed for two purposes: NNTP was designed for two purposes: To allow news articles to propagate from one machine to another over reliable connection (e.g. TCP)To allow news articles to propagate from one machine to another over reliable connection (e.g. TCP) To allow users whose desktop computers cannot receive news to read news remotely.To allow users whose desktop computers cannot receive news to read news remotely.

16 NNTP To acquire recent articles, a client must first establish a TCP connection with port 119 on the newsfeed server. To acquire recent articles, a client must first establish a TCP connection with port 119 on the newsfeed server. Behind this port is the NNTP daemon/service, which is either there all the time waiting for clients or is created on the fly as needed. Behind this port is the NNTP daemon/service, which is either there all the time waiting for clients or is created on the fly as needed. After the connection has been established, the client and server communicate using a sequence of commands and responses. After the connection has been established, the client and server communicate using a sequence of commands and responses.

17 DHCP With the growth of the Internet, TCP/ IP has now become a must-have protocol for most computer networks. It provides a single network protocol that is supported by almost every type of computer system, a plethora of applications that use it, and it is well suited to both large and small networks. It’s also essential if one wishes to set up an intranet. With the growth of the Internet, TCP/ IP has now become a must-have protocol for most computer networks. It provides a single network protocol that is supported by almost every type of computer system, a plethora of applications that use it, and it is well suited to both large and small networks. It’s also essential if one wishes to set up an intranet. However, TCP/ IP needs addresses and configuration settings to be defined on each computer or peripheral on the network. This can entail an immense amount of system administration work. However, TCP/ IP needs addresses and configuration settings to be defined on each computer or peripheral on the network. This can entail an immense amount of system administration work.

18 DHCP DHCP stands for Dynamic Host Configuration Protocol, and is used to centrally allocate and manage TCP/ IP configurations of client nodes. If one has more than a handful of computers to manage, then DHCP can help to save a great deal of time in setting up and administering a TCP/ IP network. DHCP offers the following features: DHCP stands for Dynamic Host Configuration Protocol, and is used to centrally allocate and manage TCP/ IP configurations of client nodes. If one has more than a handful of computers to manage, then DHCP can help to save a great deal of time in setting up and administering a TCP/ IP network. DHCP offers the following features: It allows to define “pools” of TCP/ IP addresses, which are then allocated to client PCs by the DHCP server. These pools are called scopes in DHCP terminology.It allows to define “pools” of TCP/ IP addresses, which are then allocated to client PCs by the DHCP server. These pools are called scopes in DHCP terminology. Not only are the TCP/ IP addresses handed out, so are all the related configuration settings like the subnet mask, default gateway, DNS server, that are needed for TCP/ IP to work properly.Not only are the TCP/ IP addresses handed out, so are all the related configuration settings like the subnet mask, default gateway, DNS server, that are needed for TCP/ IP to work properly.

19 DHCP DHCP works across most TCP/ IP routers and allocates IPs according to the subnet the request came from. This means one won’t need to reconfigure a PC that is moved from one subnet to another.DHCP works across most TCP/ IP routers and allocates IPs according to the subnet the request came from. This means one won’t need to reconfigure a PC that is moved from one subnet to another. Addresses can be leased for periods of time - so an IP address that is not used for the duration of the lease is put back into the unallocated pool. This helps recover TCP/ IP addresses that are no longer used.Addresses can be leased for periods of time - so an IP address that is not used for the duration of the lease is put back into the unallocated pool. This helps recover TCP/ IP addresses that are no longer used. Internet Service Providers are often using DHCP to provide clients with IP address as well. Internet Service Providers are often using DHCP to provide clients with IP address as well.