Internet Applications. Review BUPT/QMUL

Size: px
Start display at page:

Download "Internet Applications. Review BUPT/QMUL"

Transcription

1 Internet Applications Review BUPT/QMUL

2 Network Basics (1) What is the Internet? Internet vs. internet Internet vs. www How do machines communicate with one another on the Internet? What are the major components of Internet? Internet applications Internet protocols Internet addresses Physical infrastructure What is protocol? Protocol = A set of rules for communicating HTTP/FTP/SMTP, TCP/UDP, IP 2

3 Q2: How does the Internet work? communication on the Internet The source computer One application produces the data to send The software packetize the data Local Area Network Ruby A The cables connecting the computers to the network The network device receives the data and pushes them out The software chooses the path for data delivery The destination computer The software depacketize the data The counterpart to the sender application reads the data B 3

4 Q2: How does the Internet work? communication on the Internet Application (e.g., IE) Application (e.g., Web Server) Data Network Software (i.e. TCP/IP) Data Network Software (i.e. TCP/IP) Packet Packet Packet Packet Packet Packet Physical (Hosts, Routers, Wiring) 4

5 Network Basics (2) What are the two important design concepts of Internet? Layered networking model Client-server paradigm Terms for network devices and examples node, host node, link, network component Terms for network performance parameters: bandwidth, delay, jitter, error rate Network types according to the switching function in the network Circuit switching network Message switching network Packet switching network Hybrid switching network 5

6 Network Basics (3) Different channel access technologies multi-access and point-to-point Network types according to the range of the network LAN, MAN, WAN, PAN Network types according to the user of the network public network and private network Layered architecture ISO/OSI model, TCP/IP model Revisory Model Devices at different layers Hub, Bridge/Switch, Router, Gateway 6

7 Network Programming Basics (1) Basic concepts Process: what is a process? Is process equals to program? PID, PPID Special processes: init(pid=1) fork(), exec() System call: what is a file descriptor? Special file descriptors: 0,1,2 Related system calls and their functions: open(), read(), write(), lseek() Signal: what is a signal? Which conditions will generate signals?: 5 conditions What can a process do with a signal? : 3 choices Signal() system call and its functions 7

8 Network Programming Basics (2) IP Addresses IP address structure Big-endian and little-endian, HBO and NBO byte order conversion functions: htonl(), ntohl(), htons(), ntohs() DNS Host entry structure System calls for retrieving host entries gethostbyname( ), gethostbyaddr( ) Connection What is a connection? How to identify an endpoint of a connection? How to identify a connection? Client-IP, client-port, server-ip, server-port Well-known port numbers for typical applications DHCP, DNS, TELNET, TFTP, FTP, SMTP, POP3, HTTP, SNMP 8

9 Network Programming Basics (3) Functions of netstat, ifconfig and ping Sockets interface What is a socket? What is the sockets descriptor? Internet-specific socket address and Generic socket address struct sockaddr vs. struct sockaddr_in how do we use them in the system calls such as connect(), bind(), and accept()? Different sockets interface types SOCK_STREAM, SOCK_DGAM, SOCK_RAW System calls used in sockets programming Socket operation: socket(), bind(), send(),recv(), close() Byte order operation: htonl(), Address formats conversion: inet_aton(), inet_ntoa(), Name and address operation: gethostbyname(), Basic flows of TCP/UDP based sockets API 9

10 Overview of TCP-based sockets API TCP Client socket() TCP Server socket() bind() listen() connect() send() recv() close() Connection request data data EOF accept() recv() send() read() Await connection request from next client close() 10

11 Overview of UDP-based sockets API UDP Client socket() UDP Server socket() bind() sendto() data recvfrom() recvfrom() data sendto() close() 11

12 DHCP DHCP overview Basic function: automatic configuration of remote hosts relationship between BOOTP and DHCP DHCP client(port 68), DHCP server(port 67) DHCP Relay: forward DHCP messages between subnets. DHCP lease: amount of time that the DHCP server grants to the DHCP client Phases of IP assignment with DHCP DHCP message format STD and Message Sequence Chart of DHCP Address acquisition Procedure of Early lease termination in DHCP Procedure of Lease renewal in DHCP Basic address acquisition procedure through DHCP relay 12

13 Phases of IP Assignment with DHCP the client makes a request for an IP address the DHCP servers offer an IP address the client selects an offer and requests an IP lease the selected DHCP server assigns an IP to the client 13

14 DHCP Message Format OP (1) HTYPE (1) HLEN (1) HOPS (1) TRANSACTION ID (4) SECONDS (2) FLAGS (2) CLIENT IP ADDRESS (4) YOUR IP ADDRESS (4) SERVER IP ADDRESS (4) ROUTER IP ADDRESS (4) CLIENT HARDWARE ADDRESS (16) SERVER HOST NAME (64) BOOT FILE NAME (128) OPTIONS (variable)

15 Address Acquisition: MSC Server (not selected) Client Server (selected) Begin initialization DHCPDISCOVER Determines configuration DHCPOFFER DHCPDISCOVER DHCPOFFER Determines configuration DHCPREQUEST Collects replies & selects configuration DHCPREQUEST DHCPACK 15

16 Address Acquisition: STD of the client Select Offer/ DHCPREQUEST Host Boots /DHCPDISCOVER SELECT DHCPOFFER INIT State Transition of DHCP Client REQUEST DHCPACK BOUND 16

17 Early Lease Termination: Procedure Client Server (selected) Graceful shutdown DHCPRELEASE Discards lease 17

18 Lease Renewal: Procedure (1) T1 expires Client Server (selected) Client Server (selected) T1 expires T1 expires DHCPREQUEST DHCPREQUEST DHCPACK DHCPNAK Reset T1 and T2 T1: the time at which the client enters the RENEW state and attempts to contact the server that originally issued the client's network address 0.5 * duration_of_lease T2: the time at which the client enters the REBIND state and attempts to contact any server * duration_of_lease

19 Lease Renewal: Procedure (2) Both T1 and T2 expire, address rebound Server (others) Client T1 expires Server (selected) DHCPREQUEST T2 expires DHCPREQUEST DHCPREQUEST DHCPACK Reset T1 and T2 19

20 DNS(1) Basic functions of DNS: converting between hostname and IP address Current status: hierarchical structure, distributed database, general-purpose Hierarchical structure of domain namespace Important terms Domain / domain name / FQDN Domain namespace, zone Resource Record Name server / primary server / secondary server / caching server Resolver Query / response Standard query / inverse query / pointer query recursive resolution / iterative resolution 20

21 Hierarchical structure Unnamed root Top level domains arpa com edu gov int mil net org ae cn zw 2nd level domains in-addr mit edu 59 cs bupt 64 xx xx.cs.mit.edu cs.bupt.edu.cn cs Generic domains in-addr.arpa Country domains 21

22 DNS(2) How does DNS work together with the user programs (e.g. TELNET, FTP, HTTP, SMTP)? Procedure of the recursive resolution and iterative resolution What are the mechanisms in DNS that are possible to improve the querying efficiency? The ideas of inverse query and pointer query. The comparison between them. DNS Message Format Types of Resource Record (only the one highlighted using red color in the lecture notes) A, NS, MX, CNAME, PTR 22

23 Communication model between user program, resolver and name server Local Host Foreign User Program User queries User responses Resolver Queries Responses DNS name server Cache additions references cache Resolvers are normally implemented in system calls. E.g. gethostbyname(), gethostbyaddr() 23

24 Recursive resolution 1 6 Local Name Server

25 Iterative resolution 25

26 DNS Message Format(from RFC 1035) Query and Response messages, both with same message format Parameter(Flags) ID QR OPCODE AA TC RD RA Z Rcode 31 Question count Authority count HeaderAnswer count Additional count Question Section (variable number of questions) Answer Section (variable number of RRs) Authority Section (variable number of RRs) Additional Section (variable number of RRs) 26

27 Telnet(1) What is TELNET and telnet? TELNET: a protocol used to establish a dumb terminal session to another computer on the Internet telnet: a program that supports the TELNET protocol over TCP What are the advantages of the idea of option negotiation in TELNET? NVT What is NVT? What are its functions? Network Virtual Terminal, providing a standard interface to remote systems NVT operations Understand data path from the user s keyboard to the remote system 27

28 NVT Operation User s keyboard & display Accommodating heterogeneity Converting client system format into NVT format TELNET Client TCP connection across Internet TELNET Server Converting NVT format into server system format Server s system Converting NVT format into client system format Client System format Server System format NVT format Converting server system format into NVT format TELNET client and server convert between native format and NVT format 28

29 Transmission Of Data Data path from the user s keyboard to the remote system Client reads from terminal TELNET client Client sends to server (NVT) TELNET server User s keyboard & display Operating system Server receives from client (NVT) Operating system Server sends to pseudo terminal TCP/IP internet 29

30 Telnet commands TELNET control functions: IAC, DO, DONT, WILL, WONT TELNET options example Echo modes Binary transmission Line mode vs. character mode Character set Terminal type Understand the TELNET session through examples 30

31 Telenet Control Functions DO, DONT, WILL, WONT Used for options negotiation Examples Sender Receiver Meaning WILL DO WILL DON T DO WILL DO WONT Sender wants to active a option, and receiver agrees Sender wants to active a option, and receiver refuses Sender wants receiver to active a option, and receiver agrees Sender wants receiver to active a option, and receiver refuses 31

32 Example: Negotiation of Echo Option Client Server Do enable the echo option ECHO DO IAC IAC WILL ECHO I will enable the echo option 32

33 Other Remote Access Technologies Remote login in text-based system telnet SSH Rlogin 33

34 TFTP/FTP(1) TFTP features Read and write files from / to remote computers Minimal overhead TFTP packet format (you can ignore the errcode definition) Read request, Write request, Data, Acknowledgment, Error Transfer mode of TFTP: Netascii, Octect Typical communication procedure of TFTP Retransmission defined in original TFTP protocol The sorcerer s apprentice syndrome problem and how to fix it 34

35 TFTP Protocols Packet Format Ethernet Frame Header IP Header UDP Header TFTP Header Read request (RRQ) 01 filename 0 mode 0 2 byte opcode in network byte order null terminated ASCII string containing name of file null terminated ASCII string containing transfer mode Variable length fields 35

36 TFTP Example Beginning with RRQ/WRQ Every good block is Acknowledged Both sides use timers Simple automatic repeat request mechanism provides flow control A block of less than 512 bytes signals the end of the file timeout resend ascii ACK 1 Lost ACK 2 ACK file1 DATA DATA DATA DATA RRQ Block1 512 bytes Block2 512 bytes Block2 512 bytes Block3 512 bytes 3 Lost ACK 3 Damaged ACK 4 client DATA DATA 4 server Block4 464 bytes 4 Block4 464 bytes 36 timeout resend timeout resend

37 TFTP Operations Retransmission Symmetric Both machines involved in a transfer are considered senders and receivers. One sends data and receives acknowledgments The other sends acknowledgments and receives data Each side implement the timeout and retransmission If a data packet gets lost in the network, the data sender times out and retransmits the last data packet If an acknowledgment is lost, the acknowledgment sender retransmits the last acknowledgment The sender has to keep just one packet on hand for retransmission, since the lock step acknowledgment guarantees that all older packets have been received Duplicate data packets must be recognized (ignored) and acknowledgment retransmitted This original protocol suffers from the sorcerer s apprentice syndrome (SAS) 37

38 TFTP Operations Sorcerer s Apprentice Syndrome Send DATA[n] timeout Retransmit DATA[n] Sender Receive ACK[n] Send DATA[n+1] Receive ACK[n] (dup) Send DATA[n+1] (dup) and so on Receiver Receive DATA[n] Send ACK[n] Receive DATA[n] (dup) Send ACK[n] (dup) Receive DATA[n+1] Send ACK[n+1] Receive DATA[n+1] (dup) Send ACK[n+1] (dup) Arising when an acknowledgment for a data packet is delayed, but not lost Leading to excessive retransmissions Once started, the cycle continues indefinitely with each data packet being transmitted exactly twice 38

39 TFTP/FTP(2) FTP features Used to transfer files between hosts Used to manipulate files, FTP model FTP basic control commands and replies USER, PASS, CWD, CDUP, QUIT, PORT, PASV LIST, RETR, LIST, FTP Control Connection & Data Connection FTP Active and Passive Mode Anonymous FTP log in with anonymous as the account name Give your address as password Only for downloading 39

40 FTP Model User Interface User Server PI Control Connection Client PI File System Server DTP Data Connection Client DTP File System FTP server FTP client 40

41 Active and Passive mode Typical data connection handling sequence (in active mode) Client sets up to listen on a unique port Client uses local socket information to send PORT command to server Server responds with 200 reply to acknowledge the port number Client sends RETR, STOR, or other transfer command Server sends preliminary reply Server does active open ( connect ) File data sent over connection Server sends 226 or other reply Server/client closes data connection Another mode: passive mode Client sends command PASV server listens to a specific port and client should access that port 41

42 FTP Control Connection & Data Connection (1) Server 20 data 21 control Client 2189 control 5001 data Active Mode: Server port for data connection =20 Control connection is initiated by client and established PORT (5001) 200 Control command (RETR) Request to establish the data connection Acknowledgment to the request Reply (150) data Reply (226) Receive user command Acquire port

43 FTP Control Connection & Data Connection (3) Server 6077 data 21 control Client 2189 control 5001 data Passive Mode: Server port for data connection >1024 Control connection is initiated by client and established PASV 227 (6077) Control command (RETR) Request to establish the data connection Acknowledgment to the request Reply (150) data Reply (226) Receive user command Acquire port

44 (1) Overview Components of system Basic functions of system Composition, Transfer, Reporting, Displaying, Disposition Terms: UA, Mail Server, MTA address: Message Format Header, blank line, body SMTP Basic model Basic commands and replies HELO, MAIL FROM, RCPT TO, DATA, QUIT SMTP Transfer Mechanism 44

45 Components Of System (1) User Agent SMTP Mail SMTP Mail POP3 Server Server IMAP User Agent SMTP SMTP POP3,IMAP Sender Internet Spooling Mail Server of Sender Side User mailbox Mail Server of Receiver Side Receiver 45

46 SMTP Basic Model File System File System User MTA SMTP commands/replies and mail MTA SMTP client SMTP server 46

47 SMTP Commands and Status codes example Connection establish sends a mail to jones@beta.gov, green@beta.gov SMTP client TCP connection establish 220 beta.gov Simple Mail Transfer Service ready HELO alpha.edu 250 beta.gov SMTP server Mail transfer Connection release MAIL FROM: <smith@alpha.edu> 250 OK RCPT TO: <jones@beta.gov> 250 OK RCPT TO: <green@beta.gov> DATA 550 No such user here 354 End with <CR><LF>.<CR><LF> Message 221 Bye <CR><LF>.<CR><LF> 250 OK QUIT 47

48 (2) POP Basic model Basic commands and replies IMAP USER, PASS, LIST, RETR, DELE, QUIT, Features of IMAP Comparison of POP and IMAP Message formats RFC 5322: main headers MIME: New headers and main content types What are the limitations of SMTP? How is MIME used to offset the limitations of SMTP? Web-based mail 48

49 POP Basic Model Used to transfer mail from a mail server to a UA Internet File System SMTP Server: is always on and listening via TCP port 25 holds outgoing mail for user SMTP/POP Mail Server POP Mail Access Server: runs the POP3 service by listening on TCP port 110 POP SMTP User Agent Clients: connect to server to manipulate mail using message access protocols (POP or IMAP) 49

50 IMAP: Internet Message Access Protocol Features Folders and messages can be stored either on the server or on the local computer Since folders can remain on server, it is possible to access your same mail store even using a dumb terminal character based client like Pine. Much better for mobile users than POP (since mail remains on the server) Can selectively copy messages from the server to the local client based on many criteria 50

51 POP vs. IMAP(2) 51

52 WWW(1) Terminologies: WWW, the Web, W3, URL, HTML, HTTP WWW components URL Client/browser Web server The web access model Structure Used for different services HTML Static vs. dynamic CGI 52

53 Structure Of URLs A URL consists of three parts: The protocol for example http or ftp The DNS name of the host The directory and file name Protocol Hostname Directory and file name Protocol: http by default Port: 80 by default Index.html, index.htm, default.htm, default.asp etc. are assumed if no file-name given 53

54 HTTP Features Application layer protocol for client/server communication Request/response based Stateless, Transaction Main Methods Get, Put, Post, Performance enhancement of HTTP 1.1 Persistent connections Pipelining Enhanced caching options Support for compression 54

55 HTTP HTTP Transaction Establish connection Client request TCP connection set up uses a port number as application reference usually port 80 HTTP message sent with a request line request-line = method URL HTTP version Server response Connection terminated server sends HTTP message and optionally requested data resp-message = HTTP version status code reason-phrase [optional stuff] usually the server sometimes the client stops it anything else, whoever notices terminates 55

56 Example of Non-persistent connections Client TCP Connection established Server Retrieving index.htm TCP Connection released TCP Connection established Retrieving image.gif TCP Connection released 56

57 Example of Persistent Connections Client TCP Connection established Server Retrieving index.htm Retrieving image.gif TCP Connection released 57

58 Example of Pipelining Non-pipelining Pipelining 58

59 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP response message 2) cookie header line in HTTP request message 3) cookie file kept on user s host, managed by user s browser 4) back-end database at Web site Example: Susan always access Internet always from PC She visits specific e- commerce site for first time when initial HTTP requests arrives at site, site creates: unique ID entry in backend database for ID 59

60 Web Caches (Proxy Server) Motivation: satisfy client request without involving origin server User sets browser: Web accesses via a proxy server client Proxy server origin server Browser sends all HTTP requests to proxy server If requested file in cache: proxy server returns file else proxy requests file from origin server, then forwards to client client origin server 60

61 Conditional get cache Server does not send required files if cache has upto-date cached version cache: specify date of cached copy in HTTP request If-modified-since: <date> server: response contains no object if cached copy is upto-date: HTTP/ Not Modified HTTP request msg If-modified-since: <date> HTTP response HTTP/ Not Modified HTTP request msg If-modified-since: <date> HTTP response HTTP/ OK <data> server file not modified file modified 61

62 SNMP(1) Terminologies: SNMP, MIB, SMI, RMON Definition, goals and functional areas of network management Functional areas: FCAPS Different network management architectures and their pros and cons Centralized Hierarchical Distributed SNMP history, features SNMPv1,v2,v3, RMON1,RMON2 SNMP realizes the F-C-P functions of network management SNMP model and components 62

63 SNMP Model management station managing entity network management protocol agent data agent data managed node agent data managed node agent data managed node The SNMP model of a managed network consists of four components: Managed Nodes (Agent) Management Stations (NMS) Management Information (MIB) A Management Protocol (SNMP) managed node 63

64 SNMP(2) SNMP framework SMI and ASN.1 SMI defines the rules for describing management information using ASN.1 for an unambiguous description without inconsistencies MIB hierarchy naming SNMP protocol: traps/polling, SNMP commands 64

65 MIB ISO Object Identifier Tree Check out: This subtree is the Internet SMI

66 SNMP Traps / Polling Two ways to deliver MIB information, commands NMS NMS request response trap msg agent data agent data Managed device Polling mode Managed device trap mode 66

67 SNMP Commands Command Description Version GetRequest NMS-to-Agent: get data (instance) SNMPv1 GetNextRequest NMS-to-Agent: get data (next in list) SNMPv1 GetBulkRequest NMS-to-Agent: get data (block) SNMPv2 InformRequest NMS-to-NMS: MIB information exchange SNMPv2 SetRequest NMS-to-Agent: set MIB value SNMPv1 GetResponse Agent-to-NMS: value, response to request SNMPv1 Trap Agent-to-NMS: report exceptional event to NMS SNMPv1 67

68 GetRequest GetNextRequest SetRequest GetResponse Trap GetRequest GetNextRequest SetRequest GetResponse Trap SNMPv1 Commands Management Application SNMP Object Manipulation Managed resources SNMP Managed Objects Network Management Station SNMP manager UDP SNMP Messages (PDUs) SNMP Agent UDP Managed Nodes IP Link layer IP Link layer SNMP Device 68

69 Example of SNMP Commands (GetNextRequest) Manager Process GetNextRequest (SysDescr.0) GetResponse (sysobjectid.0) GetNextRequest (sysobjectid.0) GetResponse (syscontact..0) GetNextRequest (syscontact..0) Agent Process GetResponse (SysName.0) GetNextRequest (sysoruptime.9) GetResponse (sysoruptime.10) GetNextRequest (sysoruptime.10) GetResponse (nosuchname) 69

70 RMON RMON= Remote MONitoring Extensions to SNMP provide comprehensive network monitoring capabilities RMON uses remote network monitoring devices known as probes. The RMON specification defines a set of statistics and functions that can be exchanged between RMON-compliant console managers and probes RMON is standardized to only operate on Ethernet segments (LAN). RMON specifically defines the information that any network monitoring system will be able to provide as part of the MIB. RMON1 provides monitoring capability at data link layer in OSI model. RMON2 provides monitoring capability above data link layer in OSI model. 70

71 Real-time Services(1) Real-time services Isochronous services and QoS requirements isochronous pertains to processes that require timing coordination to be successful, such as voice and digital video transmission Jitter compensation via playback buffer RTP/RTCP Functions of RTP/RTCP, relationship between RTP and RTCP Definitions: end system, translator, mixer, monitor RTP features, SSRC vs, CSRC RTCP features, packet types, relationship of RTCP port number with RTP port number 71

72 RTP and RTCP For data RTP Important fields in header sequence number timestamp synchronization ID RTCP For QoS monitoring and control Provides feedback on the quality of the data distribution 72

73 Mixer and Translator End System (SSRC 18) 18, DVI4 18, DVI4 CSRC Mixer (SSRC=12) 12, GSM, (18,39) End System (SSRC 39) 39, L16 Translator 39, GSM SSRC:Synchronization SouRCe Identifier CSRC:Contributing SouRCe Identifier 73

74 Real-time Services(2) Multimedia signaling protocols H.323 SIP Function: Describes terminals and other entities that provide multimedia communications services over Packet Based Networks (PBN) which may not provide a guaranteed Quality of Service. H.323 protocol stack components Function: An application layer signaling protocol that defines initiation, modification and termination of interactive, multimedia communication sessions between users Architecture and components SIP messages, SIP header, SIP URL SIP Messages: INVITE, ACK, BYE, SIP Header: MIME SIP URL: user@host 74

75 H.323 Components Gatekeeper Multipoint Control Unit Terminal Packet Based Networks Gateway Circuit Switched Networks 75

76 SIP Architecture SIP Components Location Server Redirect Server Registrar Server PSTN User Agent Proxy Server Proxy Server Gateway 76

Key Points for the Review

Key Points for the Review Key Points for the Review Network Basics What is internet and Internet? Does WWW equal to Internet? How do machines communicate with one another on the Internet? What are the major components of Internet?

More information

TFTP and FTP Basics BUPT/QMUL

TFTP and FTP Basics BUPT/QMUL TFTP and FTP Basics BUPT/QMUL 2017-04-24 Agenda File transfer and access TFTP (Trivial File Transfer Protocol) FTP (File Transfer Protocol) NFS (Network File System) 2 File Transfer And Access 3 File Transfer

More information

13. Internet Applications 최양희서울대학교컴퓨터공학부

13. Internet Applications 최양희서울대학교컴퓨터공학부 13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network

More information

DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL

DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL 2017-04-01 Topics In This Course Background Introduction of Internet TCP/IP and OSI/RM Socket programmingtypical Internet Applications DHCP (Dynamic

More information

More Internet Support Protocols

More Internet Support Protocols More Internet Support Protocols Domain Name System (DNS) Ch 2.5 Problem statement: Average brain can easily remember 7 digits On average, IP addresses have 10.28 digits We need an easier way to remember

More information

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers 2007, Jae-sul Lee. All rights reserved. 1 Agenda 11.1 TCP/IP Transport Layer 11.2 The Application Layer What does the TCP/IP transport layer

More information

Applications FTP. FTP offers many facilities :

Applications FTP. FTP offers many facilities : Applications FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol

More information

Higher layer protocols

Higher layer protocols ETSF05/ETSF10 Internet Protocols Higher layer protocols DHCP DNS Real time applications RTP The hen or the egg? DHCP IP addr. IP DNS TCP UDP ETSF05/ETSF10 - Internet Protocols 2 What to configure IP address

More information

SNMP Basics BUPT/QMUL

SNMP Basics BUPT/QMUL SNMP Basics BUPT/QMUL 2017-05-22 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction

More information

Manual Configuration Stateful Address Configuration (i.e. from servers) Stateless Autoconfiguration : IPv6

Manual Configuration Stateful Address Configuration (i.e. from servers) Stateless Autoconfiguration : IPv6 Manual Configuration Stateful Address Configuration (i.e. from servers) BOOTP DHCPv4, DHCPv6 Stateless Auto : IPv6 최양희서울대학교컴퓨터공학부 2005 Yanghee Choi 2 RARP Hardware address ---> IP address requires direct

More information

Introduction to Network. Topics

Introduction to Network. Topics Introduction to Network Security Chapter 7 Transport Layer Protocols 1 TCP Layer Topics Responsible for reliable end-to-end transfer of application data. TCP vulnerabilities UDP UDP vulnerabilities DNS

More information

DNS Basics BUPT/QMUL

DNS Basics BUPT/QMUL DNS Basics BUPT/QMUL 2018-04-16 Related Information Basic function of DNS Host entry structure in Unix Two system calls for DNS database retrieving gethostbyname () gethostbyaddr () 2 Agenda Brief introduction

More information

Protocol Classification

Protocol Classification DNS and DHCP TCP/IP Suite Suite of protocols (not just TCP and IP) Main protocols TCP and UDP at the Transport Layer, and IP at the Network Layer Other protocols ICMP, ARP, Telnet, Ftp, HTTP, SMTP, SNMP

More information

Application Level Protocols

Application Level Protocols Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application

More information

Higher layer protocols

Higher layer protocols ETSF05/ETSF10 Internet Protocols Higher layer protocols DHCP DNS Real time applications RTP SIP DHCP Configuring hostsso they can communicate 2015-11-30 ETSF05/ETSF10 - Internet Protocols 2 What to configure

More information

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application

More information

12. Name & Address 최양희서울대학교컴퓨터공학부

12. Name & Address 최양희서울대학교컴퓨터공학부 12. Name & Address 최양희서울대학교컴퓨터공학부 How do you get IP address? Manual Configuration Stateful Address Configuration (i.e. from servers) BOOTP DHCPv4, DHCPv6 Stateless Autoconfiguration : IPv6 2009 Yanghee

More information

CSC 4900 Computer Networks:

CSC 4900 Computer Networks: CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols

More information

SNMP Basics BUPT/QMUL

SNMP Basics BUPT/QMUL SNMP Basics BUPT/QMUL 2014-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction

More information

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015 Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]

More information

Address Resolution: BOOTP & DHCP

Address Resolution: BOOTP & DHCP Content Address Resolution: BOOTP & DHCP Linda Wu Alternatives to RARP BOOTP Protocol DHCP Protocol (CMPT 471 2003-3) Reference: chapter 23 Notes-11 CMPT 471 2003-3 2 Alternatives to RARP During the startup

More information

Application-layer Protocols and Internet Services

Application-layer Protocols and Internet Services Application-layer Protocols and Internet Services Computer Networks Lecture 8 http://goo.gl/pze5o8 Terminal Emulation 2 Purpose of Telnet Service Supports remote terminal connected via network connection

More information

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Model. Why a Layered Model? All People Seem To Need Data Processing Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation

More information

Multimedia in the Internet

Multimedia in the Internet Protocols for multimedia in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ > 4 4 3 < 2 Applications and protocol stack DNS Telnet

More information

CMPE 151: Network Administration. Servers

CMPE 151: Network Administration. Servers CMPE 151: Network Administration Servers Announcements Unix shell+emacs tutorial. Basic Servers Telnet/Finger FTP Web SSH NNTP Let s look at the underlying protocols. Client-Server Model Request Response

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Transport Layer (TCP/UDP)

Transport Layer (TCP/UDP) Transport Layer (TCP/UDP) Where we are in the Course Moving on up to the Transport Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Recall Transport layer provides

More information

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model Networking Networking is concerned with the physical topology of two or more communicating entities and the logical topology of data transmission. Layered Model Systems communicate over a shared communication

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

Computer Networking: Applications George Blankenship. Applications George Blankenship 1

Computer Networking: Applications George Blankenship. Applications George Blankenship 1 CSCI 232 Computer Networking: Applications i George Blankenship Applications George Blankenship 1 TCP/IP Applications The user of TCP/IP transport (TCP/UDP) is an application, the top level lof the TCP/IP

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

SCS3004 Networking Technologies Application Layer Protocols

SCS3004 Networking Technologies Application Layer Protocols SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.

More information

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission

More information

Objectives. Upon completion you will be able to:

Objectives. Upon completion you will be able to: Domain Name System: DNS Objectives Upon completion you will be able to: Understand how the DNS is organized Know the domains in the DNS Know how a name or address is resolved Be familiar with the query

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

A Client-Server Exchange

A Client-Server Exchange Socket programming A Client-Server Exchange A server process and one or more client processes Server manages some resource. Server provides service by manipulating resource for clients. 1. Client sends

More information

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail

More information

Layered Model. DoD Model. ISO/OSI Model

Layered Model. DoD Model. ISO/OSI Model Data Communications vs Networking (later) Communication is concerned with the transmission of data over a communication medium/channel between two entities. Here we are more concerned about EE issues such

More information

IP/MAC Address Translation

IP/MAC Address Translation IP/MAC Address Translation -Go over quiz answers -ARP -DHCP -NAT Today Transition from Network to Datalink How do we get datagrams to the right physical host? Tricky part comes when a router is forwarding

More information

Real-time Services BUPT/QMUL

Real-time Services BUPT/QMUL Real-time Services BUPT/QMUL 2017-05-27 Agenda Real-time services over Internet Real-time transport protocols RTP (Real-time Transport Protocol) RTCP (RTP Control Protocol) Multimedia signaling protocols

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

OSI Transport Layer. objectives

OSI Transport Layer. objectives LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating

More information

Internet Applications. Dr Steve Gordon ICT, SIIT

Internet Applications. Dr Steve Gordon ICT, SIIT Internet Applications Dr Steve Gordon ICT, SIIT Contents Network Application Models Transport Layer Interface Selected Applications and Services Naming Resources Web Access Email Network Management Other

More information

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

IBM. Networking Dynamic Host Configuration Protocol. IBM i 7.1

IBM. Networking Dynamic Host Configuration Protocol. IBM i 7.1 IBM IBM i Networking Dynamic Host Configuration Protocol 7.1 IBM IBM i Networking Dynamic Host Configuration Protocol 7.1 Note Before using this information and the product it supports, read the information

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer III Dmitri Loguinov Texas A&M University February 8, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

The Application Layer: SMTP, FTP

The Application Layer: SMTP, FTP The Application Layer: SMTP, FTP CS 352, Lecture 5 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 Recap: Application-layer protocols DNS: lookup a (machine-readable) address using a (humanreadable)

More information

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro CCNA Exploration 4.0 Network Fundamentals Chapter 03 Application Layer Functionality and Protocols Universitas Dian Nuswantoro 1 Objective In this chapter, you will learn to: Describe how the functions

More information

FTP. Mail. File Transfer Protocol (FTP) FTP commands, responses. Electronic Mail. TDTS06: Computer Networks

FTP. Mail. File Transfer Protocol (FTP) FTP commands, responses. Electronic Mail. TDTS06: Computer Networks TDTS0: Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se FTP Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Application Layer: Cookies, Web Caching, SMTP Sec 2.2.4-2.4 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network

More information

CSMC 412. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 2. September 15 CMSC417 Set 2 1

CSMC 412. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 2. September 15 CMSC417 Set 2 1 CSMC 412 Computer Networks Prof. Ashok K Agrawala 2015 Ashok Agrawala Set 2 September 15 CMSC417 Set 2 1 Contents Client-server paradigm End systems Clients and servers Sockets Socket abstraction Socket

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

UNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections

UNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections UNIT V Introduction to Application Layer: Introduction, Client Server Programming, WWW and HTTP,FTP, e-mail, TELNET, Secure Shell, Domain Name System, SNMP. HTTP The Hyper Text Transfer Protocol (HTTP)

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information

Computer Networks Prof. Ashok K. Agrawala

Computer Networks Prof. Ashok K. Agrawala CMSC417 Computer Networks Prof. Ashok K. Agrawala 2018Ashok Agrawala September 6, 2018 Fall 2018 Sept 6, 2018 1 Overview Client-server paradigm End systems Clients and servers Sockets Socket abstraction

More information

FTP. FTP offers many facilities :

FTP. FTP offers many facilities : FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol complex. FTP

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the

More information

Different Layers Lecture 21

Different Layers Lecture 21 Different Layers Lecture 21 10/17/2003 Jian Ren 1 The Transport Layer 10/17/2003 Jian Ren 2 Transport Services and Protocols Provide logical communication between app processes running on different hosts

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with TCP 2.8 Socket

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand

More information

NWEN 243. Networked Applications. Layer 4 TCP and UDP

NWEN 243. Networked Applications. Layer 4 TCP and UDP NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Network: infrastructure (hard/software) that enables endpoints (hosts) to communicate

Network: infrastructure (hard/software) that enables endpoints (hosts) to communicate 221 7 (Inter)Networking Network: infrastructure (hard/software) that enables endpoints (hosts) to communicate Internetwork: system of two or more networks (segments), connected via gateways, which enables

More information

Lecture 13: Transportation layer

Lecture 13: Transportation layer Lecture 13: Transportation layer Contents Goals of transportation layer UDP TCP Port vs. Socket QoS AE4B33OSS Lecture 12 / Page 2 Goals of transportation layer End-to-end communication Distinguish different

More information

Lecture 13: Application layer

Lecture 13: Application layer Lecture 13: Application layer Contents Goals of transportation layer UDP TCP Port vs. Socket QoS AE4B33OSS Lecture 12 / Page 2 Goals of transportation layer End to end communication Distinguish different

More information

Communication Networks

Communication Networks Session 2. Application and Layered Architectures Dongsoo S. Kim Electrical and Computer Engineering. Indiana U. Purdue U. Indianapolis Communication s Various services and flexibility architectures Grouping

More information

CCNA 1 Chapter 10 v5.0 Exam Answers 2013

CCNA 1 Chapter 10 v5.0 Exam Answers 2013 CCNA 1 Chapter 10 v5.0 Exam Answers 2013 1 Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.) physical

More information

Computer Networks Unit I Application layer (2012 pattern)

Computer Networks Unit I Application layer (2012 pattern) Computer Networks Unit I Application layer (2012 pattern) By Prof. B.A.Khivsara Assistant Prof. Department of Computer Engg. SNJB s KBJ COE, Chandwad Introduction 1-1 Chapter 1: Introduction What is Internet?

More information

Information Network Systems The application layer. Stephan Sigg

Information Network Systems The application layer. Stephan Sigg Information Network Systems The application layer Stephan Sigg Tokyo, November 15, 2012 Introduction 04.10.2012 Introduction to the internet 11.10.2012 The link layer 18.10.2012 The network layer 25.10.2012

More information

Review for Internet Introduction

Review for Internet Introduction Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of

More information

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

CS348: Computer Networks  (SMTP, POP3, IMAP4); FTP CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange

More information

Applications & Application-Layer Protocols: (SMTP) and DNS

Applications & Application-Layer Protocols:  (SMTP) and DNS CS 312 Internet Concepts Applications & Application-Layer Protocols: E (SMTP) and DNS Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs312-f11

More information

Understanding and Troubleshooting DHCP in Catalyst Switch or Enterprise Networks

Understanding and Troubleshooting DHCP in Catalyst Switch or Enterprise Networks Understanding and Troubleshooting DHCP in Catalyst Switch or Enterprise Networks Contents Introduction Example Scenarios Background Information Understanding DHCP Current DHCP RFC References DHCP Message

More information

WWW: the http protocol

WWW: the http protocol Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC

More information

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

Lecture (11) OSI layer 4 protocols TCP/UDP protocols Lecture (11) OSI layer 4 protocols TCP/UDP protocols Dr. Ahmed M. ElShafee ١ Agenda Introduction Typical Features of OSI Layer 4 Connectionless and Connection Oriented Protocols OSI Layer 4 Common feature:

More information

Boot(ing) protocols. From (R)ARP to BSDP. dr. C. P. J. Koymans. Informatics Institute Universiteit van Amsterdam. November 9, 2007

Boot(ing) protocols. From (R)ARP to BSDP. dr. C. P. J. Koymans. Informatics Institute Universiteit van Amsterdam. November 9, 2007 Boot(ing) protocols From (R)ARP to BSDP dr. C. P. J. Koymans Informatics Institute Universiteit van Amsterdam November 9, 2007 dr. C. P. J. Koymans (UvA) Boot(ing) protocols November 9, 2007 1 / 20 ARP

More information

Data Communication & Computer Networks MCQ S

Data Communication & Computer Networks MCQ S Data Communication & Computer Networks MCQ S 1. The translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

CHAPTER 22 DISTRIBUTED APPLICATIONS ANSWERS TO QUESTIONS ANSWERS TO PROBLEMS

CHAPTER 22 DISTRIBUTED APPLICATIONS ANSWERS TO QUESTIONS ANSWERS TO PROBLEMS CHAPTER 22 DISTRIBUTED APPLICATIONS ANSWERS TO QUESTIONS 22.1 RFC 821 defines SMTP which is the protocol for exchanging email messages. RFC 822 describes the format of those messages. 22.2 The Simple Mail

More information

Real-time Services BUPT/QMUL

Real-time Services BUPT/QMUL Real-time Services BUPT/QMUL 2015-06-02 Agenda Real-time services over Internet Real-time transport protocols RTP (Real-time Transport Protocol) RTCP (RTP Control Protocol) Multimedia signaling protocols

More information

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP) Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames

More information

Internet Technologies Solution Set Attempt any two of the following: 10 a. What are the responsibilities of Transport layer in OSI Model?

Internet Technologies Solution Set Attempt any two of the following: 10 a. What are the responsibilities of Transport layer in OSI Model? Internet Technologies Solution Set 36134 1. Attempt any two of the following: 10 a. What are the responsibilities of Transport layer in OSI Model? Transport Layer The transport layer is responsible for

More information

BootP and DHCP. Flexible and Scalable Host Configuration 2005/03/11. (C) Herbert Haas

BootP and DHCP. Flexible and Scalable Host Configuration 2005/03/11. (C) Herbert Haas BootP and DHCP Flexible and Scalable Host Configuration (C) Herbert Haas 2005/03/11 Shortcomings of RARP Reverse Address Resolution Protocol Only IP Address distribution No subnet mask Using hardware address

More information

WEB ADMINISTRATION AND MANAGEMENT. Internetworking: Concepts, Principles and Application

WEB ADMINISTRATION AND MANAGEMENT. Internetworking: Concepts, Principles and Application WEB ADMINISTRATION AND MANAGEMENT 3/17/2015 Internetworking: Concepts, Principles and Application jkm.cse@gmail.com 1 J. K. Mandal Professor & Ex-Dean FETM, Department of Computer Science & Engineering,

More information

in the Internet Andrea Bianco Telecommunication Network Group Application taxonomy

in the Internet Andrea Bianco Telecommunication Network Group  Application taxonomy Multimedia traffic support in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 Application

More information

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application

More information

smxnet ROM Requirements (KB)

smxnet ROM Requirements (KB) Embedded Software Outfitters smxnet TM smxnet is a TCP/IP network stack, which has been optimized for use in real-time embedded systems. It offers RFC-compliant TCP and conforms to the Berkeley sockets

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

OSI Model with Protocols. Layer Name PDU Address Protocols Device

OSI Model with Protocols. Layer Name PDU Address Protocols Device NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation

More information