FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 3.1 Internet Applications Ch. 31,32,34 (DNS, E-mail, TELNET, FTP)

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

Introduction to Networks
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
Distributed Computing. Spring 2002Computer Networks Applications Networking Master-slave: A large, central computer controls small I/O devices Peer-to-peer.
Layer 7- Application Layer
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
TDC375 Autumn 03/04 John Kristoff - DePaul University 1 Network Protocols Domain Name System (DNS) largely based on slides from D. Comer.
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
CS335 Networking & Network Administration Wednesday, May 26, 2010.
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Today we will discuss.
Chapter 30 Electronic Mail Representation & Transfer
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Application Layer Network Basics.
File Transfer Protocol (FTP)
Chapter 26 Client Server Interaction Communication across a computer network requires a pair of application programs to cooperate. One application on one.
Electronic Mail (SMTP, POP, IMAP, MIME)
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
1 Chapter Internet Applications (DNS, )
1 Naming with the Domain Name System. 2 Internet Applications Domain Name System Electronic mail IP telephony Remote login File transfer All use client-server.
1 Chapter Internet Applications (DNS, )
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet Applications  DNS   TELNET  FTP  Web browsing.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
1 Applications Electronic Mail. 2 Electronic Mail Many user applications use client-server architecture. Electronic mail client accepts mail.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
What Is the Internet? A network of networks, joining many government, university and private computers together and providing an infrastructure for the.
Computer Networks. IP Addresses Before we communicate with a computer on the network we have to be able to identify it. Every computer on a network must.
9/15/2015© 2008 Raymond P. Jefferis IIILect Application Layer.
Simple Mail Transfer Protocol (SMTP)
Web Technology. History of the Internet Internet was developed by ARPANet in ARPANet (American Research Project Agency Network)
1 Computer Networks DA Chapter 1-3 Introduction.
15 Semester 1 JEOPARDY IndirectnetworksupportDNSDNSNetworkApps.NetworkApps.MoreNetworkApps.Misc.Misc
1 Applications Computer Networks. 2 Where are we?
1 Version 3.0 Module 11 TCP Application and Transport.
Chapter 29 Domain Name System (DNS) Allows users to reference computer names via symbolic names translates symbolic host names into associated IP addresses.
TCP/IP Transport and Application (Topic 6)
FALL 2003CSI 4118 – UNIVERSITY OF OTTAWA1 Part 3.1 Internet Applications Ch. 28,… (Client-Server Concept, Use of Protocol Ports, Socket API, DNS, ,
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
1 Chapter 34 Internet Applications (Telnet, FTP).
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
TCP/IP (Transmission Control Protocol / Internet Protocol)
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 3.1 Internet Applications Ch. 28,… (Client-Server Concept, Use of Protocol Ports, Socket API)
1 Client-Server Interaction. 2 Functionality Transport layer and layers below –Basic communication –Reliability Application layer –Abstractions Files.
The Client-Server Model And the Socket API. Client-Server (1) The datagram service does not require cooperation between the peer applications but such.
Chapter 20 - Electronic Mail Introduction Description Of Functionality –send a single message to many recipients. –send a message that includes text, voice,
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
COMP 431 Internet Services & Protocols
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
© MMII JW RyderCS 428 Computer Networks1 Electronic Mail  822, SMTP, MIME, POP  Most widely used application service  Sometimes only way a person ever.
CS 372 COMPUTER COMMUNICATION AND NETWORKS
Networking Applications
Instructor Materials Chapter 5 Providing Network Services
Domain Name System (DNS)
Net 323 D: Networks Protocols
File Transfer and access
Chapter 10: Application Layer
Client-Server Interaction
Application layer Lecture 7.
Net 323 D: Networks Protocols
William Stallings Data and Computer Communications
Chapter 7 Network Applications
Computer Networks DA2402.
Internet Applications (Telnet, FTP)
Presentation transcript:

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 3.1 Internet Applications Ch. 31,32,34 (DNS, , TELNET, FTP)

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA2 Functionality Transport layer and layers below Basic communication Reliability Application layer Abstractions Files Services Databases Names

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA3 Dichotomy of Duties Network Transfers bits Operates at application’s request Applications determine What to send When to send Where to send Meaning of bits

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA4 Important Point Although an internet system provides a basic communication service, the protocol software cannot initiate contact with, or accept contact from, a remote computer. Instead, two application programs must participate in any communication: one application initiates communication and the other accepts it.

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA5 How Two Application Programs Make Contact One application Begins execution first Waits passively at prearranged location Another application Begins execution later Actively contacts first program Called client-server interaction

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA6 Client-Server Paradigm Used by all network applications Passive program called a server Active program called a client

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA7 Characteristics of a Client Arbitrary application program Becomes client temporarily Can also perform other computations Invoked directly by user Runs locally on user’s computer Actively initiates contact with a server Contacts one server at a time

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA8 Characteristics of a Server Special-purpose, privileged program Dedicated to providing one service Can handle multiple remote clients simultaneously Invoked automatically when system boots Executes forever Needs powerful computer and operating system Waits passively for client contact Accepts requests from arbitrary clients

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA9 Application Program Interface Part of operating system Permits application to use protocols Defines Operations allowed Arguments for each operation

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA10 Socket Calls in Client and Server Client closes socket after use Server never closes original socket

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA11 Internet Applications Domain Name System Electronic mail Remote login File transfer World Wide Web All use client-server model

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA12 Names Internet communication requires IP addresses Humans prefer to use computer names Automated system available to translate names to addresses Known as Domain Name System (DNS)

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA13 DNS Functionality Given Name of a computer Returns Computer’s internet address Method Distributed lookup Client contacts server(s) as necessary

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA14 Domain Name Syntax Alphanumeric segments separated by dots Examples Most significant part on right

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA15 Obtaining a Domain Name Organization Chooses a desired name Must be unique Registers with central authority Placed under one top-level domain Names subject to international law for Trademarks Copyright

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA16 Top-Level Domains Meaning assigned to each

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA17 Within Organization Subdivision possible Arbitrary levels possible Not standardized Controlled locally by organization

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA18 Example Name Structure First level is.com Second level is company name Third level is division within company Fourth level either Company subdivision Individual computer

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA19 An Example Assume Company is Foobar Has two divisions Soap division Candy division Candy division has subdivisions Soap Division has no subdivisions

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA20 An Example (continued) Names in soap division have form Names in candy division have form computer.soap.foobar.com computer.subdivision.candy.foobar.com

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA21 Illustration of Foobar Naming Hierarchy

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA22 The Point About Names The number of segments in a domain name corresponds to the naming hierarchy. There is no universal standard; each organization can choose how to structure names in its hierarchy. Furthermore, names within an organization do not need to follow a uniform pattern; individual groups within the organization can choose a hierarchical structure that is appropriate for the group.

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA23 DNS Client-Server Interaction Client known as resolver Multiple DNS servers used Arranged in hierarchy Each server corresponds to contiguous part of naming hierarchy

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA24 Two Possible DNS Hierarchies Choice made by organization

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA25 Inter-Server Links All domain name servers are linked together to form a unified system. Each server knows how to reach a root server and how to reach servers that are authorities for names further down the hierarchy.

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA26 In Practice DNS uses backup server(s) ISPs and others Offer DNS service to subscribers Small organizations and individuals Only need domain names for computers running servers Contract with an ISP for domain service

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA27 DNS Lookup Application Becomes DNS client Sends request to local DNS server Local server If answer known, returns response If answer unknown Starts at top-level server Follows links Returns response Called name resolution

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA28 Caching in DNS Server always caches answers Host can cache answers Caching Improves efficiency Eliminates unnecessary search Works well because high locality of reference

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA29 DNS Types Each entry in server consists of Domain name DNS type for name Value to which name corresponds During lookup, client must supply Name Type Server Matches both name and type

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA30 The Point About Types The domain name system stores a type with each entry. When a resolver looks up a name, the resolver must specify the type that is desired; a DNS server returns only entries that match the specified type.

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA31 Example DNS Types Type A (Address) Value is IP address for named computer Type MX (Mail eXchanger) Value is IP address of computer with mail server for name Type CNAME (Computer NAME) Value is another domain name Used to establish alias (www)

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA32 Domain Name Abbreviation DNS lookup uses full names Users desire abbreviations Technique Configure resolver with list of suffixes Try suffixes one at a time

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA33 Example of DNS Abbreviations Suffixes are foobar.com candy.foobar.com User enters name walnut Resolver tries walnut walnut.foobar.com walnut.candy.foobar.com

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA34 Other Internet Applications Invoked directly by user Remote login File transfer Web browsing

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA35 Electronic Mail Originally Memo sent from one user to another Now Memo sent to one or more mailboxes Mailbox Destination point for messages Can be storage or program Given unique address

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA36 Address Text string Specifies mail destination General form computer Domain name of computer Actually type MX mailbox Destination on the computer

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA37 Use of Address Each electronic mailbox has a unique address, which is divided into two parts: the first identifies a user’s mailbox, and the second identifies a computer on which the mailbox resides. software on the sender’s computer uses the second part to select a destination; software on the recipient’s computer uses the first part to select a particular mailbox.

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA38 Mail Message Format Header Identifies sender, recipient(s), memo contents Lines of form keyword:information Blank line Body Contains text of message

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA39 Example Header Fields Most header lines optional

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA40 Extending Original SMTP - message restricted to ASCII text Users desire to send Image files Audio clips Compiled (binary) programs Solution Multi-purpose Internet Mail Extensions (MIME)

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA41 MIME Allows transmission of Binary data Multimedia files (video/audio clips) Multiple types in single message Mixed formats Backward compatible

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA42 MIME Encoding Sender Inserts additional header lines Encodes binary data in (printable) ASCII Sent like standard message Receiver Interprets header lines Extracts and decodes parts Separate standards for content and encoding

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA43 Example of MIME Header lines added MIME-Version: 1.0 Content-Type: Multipart/Mixed; Boundary=Mime_sep Specifies Using MIME version 1.0 Line Mime_sep appears before each message part

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA44 MIME Although Internet only transfers text, MIME can be used to transport binary data by encoding it in printed characters. A MIME mail message includes additional information that a receiving application uses to decode the message.

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA45 Mail Transfer Protocol is Simple Mail Transfer Protocol (SMTP) Runs over TCP Used between Mail transfer program on sender’s computer Mail server on recipient’s computer Specifies how Client interacts with server Recipients specified Message is transferred

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA46 Illustration of Mail Transfer Server Required to receive mail Places message in user’s mailbox

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA47 Terminology Mail exploder Program Accepts incoming message Delivers to multiple recipients Mailing list Database Used by exploder Mail gateway Connects two mail systems

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA48 Illustration of a Mailing List Separate permissions for Mailing to list Adding/deleting members Public – anyone can join Private – access restricted by owner

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA49 Illustration of a Mail Gateway Can connect two Heterogeneous systems Internet to non-Internet

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA50 Automated Mailing Lists Automated program to handle routine chores of maintaining mailing list: list manager Used in conjunction with exploder Example expected command: add mailbox to list

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA51 Computers Without Mail Servers Typically Small, personal computer Not continuously connected to Internet To receive , user must Establish mailbox on large computer Access mailbox as necessary Post Office Protocol (POP) used

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA52 Illustration of POP Current version named POP3

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA53 Remote Login Provide interactive access to computer from remote site Standard protocol is TELNET

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA54 TELNET Text-oriented interface User Invokes client Specifies remote computer Client Forms TCP connection to server Passes keystrokes over connection Displays output on screen

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA55 File Transfer Complete file copy Major protocol is File Transfer Protocol (FTP) Uses TCP Supports binary or text transfers Large set of commands Until 1995 was major source of packets in Internet

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA56 FTP Paradigm Command-line interface User Forms TCP connection to server (called control connection) Logs in Enters commands to list directories, transfer files Server Established new TCP connection for each transfer

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA57 Transfer Modes FTP has two basic transfer modes: one used for text files and the other for all non- text files. Although binary mode produces an exact copy of the bits, the resulting copy may be meaningless because does not convert values to the local representations.

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA58 Illustration of TCP Connections During an FTP File Transfer Two TCP connections used

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA59 TFTP Second file transfer service in TCP/IP: Trivial File Transfer Protocol (TFTP) Uses UDP instead of TCP Only supports file transfer Useful for bootstrapping a hardware device that has no disk for system software

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA60 Network File System File transfer not needed for all data transfers File access service allows remote clients to copy or change small parts of file File access mechanism used with TCP/IP is Network File System (NSF) Allows client to copy or change pieces of file Allows shared file access Integrated into computer’s file system

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA61 Summary Applications use client-server paradigm for interaction Client Arbitrary application Actively initiates communication Must know server’s IP address Protocol port number

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA62 Summary (continued) Server Specialized program Runs forever Usually offers one service Passively waits for clients Can handle multiple clients simultaneously

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA63 Summary (continued) Domain Name System Maps name to IP address Uses on-line servers Uses caching for efficiency Two transfer protocols SMTP POP3

FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA64 Summary (continued) Remote login Remote, interactive use Protocol is TELNET File transfer Copy of entire file Protocol is FTP