Computer Networks Unit I Application layer (2012 pattern)

Size: px
Start display at page:

Download "Computer Networks Unit I Application layer (2012 pattern)"

Transcription

1 Computer Networks Unit I Application layer (2012 pattern) By Prof. B.A.Khivsara Assistant Prof. Department of Computer Engg. SNJB s KBJ COE, Chandwad Introduction 1-1

2 Chapter 1: Introduction What is Internet? network edge; hosts, access net, physical media OSI Layer Introduction to application layer services HTTP FTP SMTP DNS DHCP TELNET Introduction 1-2

3 Chapter 1: ROAD MAP What is Internet? network edge; hosts, access net, physical media OSI Layer Introduction to application layer services HTTP FTP SMTP DNS DHCP TELNET Introduction 1-3

4 What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld router access points wired links millions of connected computing devices: hosts = end systems running network apps communication links fiber, copper, radio, satellite transmission rate = bandwidth routers: forward packets (chunks of data) Mobile network Global ISP Home network Regional ISP Institutional network Introduction 1-4

5 What s the Internet: nuts and bolts view protocols control sending, receiving of msgs e.g., TCP, IP, HTTP, Skype, Ethernet Internet: network of networks loosely hierarchical public Internet versus private intranet Internet standards RFC: Request for comments IETF: Internet Engineering Task Force Mobile network Global ISP Home network Regional ISP Institutional network Introduction 1-5

6 What s the Internet: a service view communication infrastructure enables distributed applications: Web, VoIP, , games, e-commerce, file sharing communication services provided to apps: reliable data delivery from source to destination best effort (unreliable) data delivery Introduction 1-6

7 Chapter 1: ROAD MAP What is Internet? network edge; hosts, access net, physical media OSI Layer Introduction to application layer services HTTP FTP SMTP DNS DHCP TELNET Introduction 1-7

8 The network edge: end systems (hosts): run application programs e.g. Web, at edge of network client/server model peer-peer client host requests, receives service from always-on server client/server e.g. Web browser/server; client/server peer-peer model: minimal (or no) use of dedicated servers e.g. Skype, BitTorrent Introduction 1-8

9 Connection oriented and conn.less services Connection oriented Connectionless 1> Connection Establishment use it and Release it. 1>No connection establishment 2> Reliable 2>Not Reliable 3>Information can be resent to receiver if data is missed or with error 4>Packets come in sequence 5>Each packet uses same route 6>If connection fails cannot sent data 3>It is not Possible 4>No sequencing 5>Different route 6>Can sent data using diff route

10 Chapter 1: ROAD MAP What is Internet? network edge; hosts, access net, physical media OSI Layer Introduction to application layer services HTTP FTP SMTP DNS DHCP TELNET Introduction 1-10

11 OSI Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary standards for networking and for operating system involved in networking functions.

12 OSI model block diagram

13 7 Layers 7. Application Layer 6. Presentation Layer 5. Session Layer 4. Transport Layer 3. Network Layer 2. Data Link Layer 1. Physical Layer All People Seem To Need Data Processing

14 LAYER 7 The APPLICATION Layer The application layer is responsible for providing services to the user. Resource sharing Provides a set of interfaces for sending and receiving applications to gain access to and use network services, such as: networked file transfer, message handling and database query processing , File transfer

15 LAYER 6 The PRESENTATION Layer Manages data-format information for networked communications (the network s translator) For outgoing messages, it converts data into a generic format for network transmission; for incoming messages, it converts data from the generic network format to a format that the receiving application can understand This layer is also responsible for certain protocol conversions, data encryption/decryption, or data compression/decompression

16 LAYER 5 The SESSION Layer Enables two networked resources to hold ongoing communications (called a session) across a network Applications on either end of the session are able to exchange data for the duration of the session Responsible for initiating, maintaining and terminating sessions Responsible for security and access control to session information (via session participant identification) Responsible for synchronization services, and for checkpoint services

17 LAYER 4 The TRANSPORT Layer Manages the flow of data between parties by segmenting long data streams into smaller data chunks (based on allowed packet size for a given transmission medium) Reassembles chunks into their original sequence at the receiving end Reliable transmission (Provides acks of successful transmissions and requests resends for packets which arrive with errors) Provides Congestion control and flow control Multiplexing and demultiplexing End-to-end data delivery

18 LAYER 3 The NETWORK Layer Handles addressing messages for delivery, as well as translating logical network addresses and names into their physical counterparts Responsible for deciding how to route transmissions between computers Find best route to route the packet This layer also handles packet switching and network congestion control

19 LAYER 2 The DATA LINK Layer Handles special data frames (packets) between the Network layer and the Physical layer At the receiving end, this layer packages raw data from the physical layer into data frames for delivery to the Network layer At the sending end this layer handles conversion of data into raw formats that can be handled by the Physical Layer Error control Flow control Framing

20 LAYER 1 The PHYSICAL Layer Converts bits into electronic signals for outgoing messages Converts electronic signals into bits for incoming messages This layer manages the interface between the computer and the network medium (coax, twisted pair, etc.) This layer tells the driver software for the MAU (media attachment unit, ex. network interface cards (NICs, modems, etc.)) what needs to be sent across the medium The bottom layer of the OSI model

21

22 Chapter 1: ROAD MAP What is Internet? network edge; hosts, access net, physical media OSI Layer Introduction to application layer services HTTP FTP SMTP DNS DHCP TELNET Introduction 1-22

23 Some network apps web instant messaging remote login P2P file sharing multi-user network games streaming stored video clips voice over IP real-time video conferencing grid computing 2: Application Layer 23

24 Application architectures Client-server Peer-to-peer (P2P) Hybrid of client-server and P2P 2: Application Layer 24

25 Client-server architecture client/server server: always-on host permanent IP address server farms for scaling clients: communicate with server may be intermittently connected may have dynamic IP addresses do not communicate directly with each other 2: Application Layer 25

26 Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change IP addresses peer-peer Highly scalable but difficult to manage 2: Application Layer 26

27 Processes communicating Process: program running within a host. within same host, two processes communicate using inter-process communication (defined by OS). processes in different hosts communicate by exchanging messages Client process: process that initiates communication Server process: process that waits to be contacted Note: applications with P2P architectures have client processes & server processes 2: Application Layer 27

28 Sockets process sends/receives messages to/from its socket socket analogous to door sending process shoves message out door sending process relies on transport infrastructure on other side of door which brings message to socket at receiving process host or server process socket TCP with buffers, variables controlled by app developer controlled by OS Internet host or server process socket TCP with buffers, variables API: (1) choice of transport protocol; (2) ability to fix a few parameters (lots more on this later) 2: Application Layer 28

29 Addressing processes to receive messages, process must have identifier host device has unique 32-bit IP address Q: does IP address of host on which process runs suffice for identifying the process? A: No, many processes can be running on same host identifier includes both IP address and port numbers associated with process on host. Example port numbers: HTTP server: 80 Mail server: 25 to send HTTP message to gaia.cs.umass.edu web server: IP address: Port number: 80 more shortly 2: Application Layer 29

30 App-layer protocol defines Types of messages exchanged, e.g., request, response Message syntax: what fields in messages & how fields are delineated Message semantics meaning of information in fields Rules for when and how processes send & respond to messages Public-domain protocols: defined in RFCs allows for interoperability e.g., HTTP, SMTP Proprietary(Private) protocols: e.g., Skype 2: Application Layer 30

31 Chapter 1: ROAD MAP What is Internet? network edge; hosts, access net, physical media OSI Layer Introduction to application layer services HTTP FTP SMTP DNS DHCP TELNET Introduction 1-31

32 Web and HTTP First some jargon Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each object is addressable by a URL Example URL: host name path name 2: Application Layer 32

33 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/server model client: browser that requests, receives, displays Web objects server: Web server sends objects in response to requests HTTP uses port no 80 PC running Explorer Mac running Navigator Server running Apache Web server 2: Application Layer 33

34 HTTP overview (continued) Uses TCP: client initiates TCP connection (creates socket) to server, port 80 server accepts TCP connection from client HTTP messages (applicationlayer protocol messages) exchanged between browser (HTTP client) and Web server (HTTP server) TCP connection closed HTTP is stateless server maintains no information about past client requests 2: Application Layer 34

35 HTTP connections Nonpersistent HTTP At most one object is sent over a TCP connection. Persistent HTTP Multiple objects can be sent over single TCP connection between client and server. 2: Application Layer 35

36 Nonpersistent HTTP Suppose user enters URL(contains text, references to 10 jpeg images) 1a. HTTP client initiates TCP connection to HTTP server 1b. HTTP server waiting for TCP connection at port 80. accepts connection, notifying client 2. HTTP client sends HTTP request message into TCP connection socket. Message indicates that client wants object. 3. HTTP server receives request message, forms response message containing requested object, and sends message into its socket time 2: Application Layer 36

37 Nonpersistent HTTP (cont.) time 5. HTTP client receives response message containing html file, displays html. Parsing html file, finds 10 referenced jpeg objects 6. Steps 1-4 repeated for each of 10 jpeg objects 4. HTTP server closes TCP connection. 2: Application Layer 37

38 Non-Persistent HTTP: Response time Definition of RTT(Round Trip Time): time for a small packet to travel from client to server and back. Response time: one RTT to initiate TCP connection one RTT for HTTP request file transmission time total = 2RTT+transmit time initiate TCP connection RTT request file RTT file received time time time to transmit file 2: Application Layer 38

39 Persistent HTTP Nonpersistent HTTP Shortcomings requires 2 RTTs per object OS overhead for each TCP connection New connection must be established and maintained for each requested object Persistent HTTP server leaves connection open after sending response subsequent HTTP messages between same client/server sent over open connection client sends requests as soon as it encounters a referenced object as little as one RTT for all the referenced objects 2: Application Layer 39

40 HTTP Message Formats Two types of message 1. HTTP Request message 2. HTTP Response Message Introduction 1-40

41 HTTP request message: general format 2: Application Layer 41

42 HTTP request message Example HTTP request message: ASCII (human-readable format) request line (GET, POST, HEAD commands) Carriage return, line feed indicates end of message header lines GET /somedir/page.html HTTP/1.1 Host: User-agent: Mozilla/4.0 Connection: close Accept-language:fr (extra carriage return, line feed) 2: Application Layer 42

43 Uploading form input Post method: Web page often includes form input Input is uploaded to server in entity body URL method: Uses GET method Input is uploaded in URL field of request line: Example rch?monkeys&banana 2: Application Layer 43

44 HTTP Methods The POST DELETE TRACE GET HEAD PUT is method similar does method what to is is requests PUT. used just the you reverse asks for It expect: the too, debugging. for server bears of the deletes GET. message to an It send Instead URL, a instructs page the header, but from of page instead reading the a without. server remote The of a page, replacing to the web send is actual it server; suitably writes back the page. existing authentication a encoded page. This request. method data, This in This it MIME. can method appends and is useful be permissions used The makes it when to to vast any get requests it play possible majority existing a page s a major are to data. of time not build the role processed Posting of requests a here. last collection modification, a There message on correctly the is of no web to and guarantee are to pages newsgroup the collect GETs. client on that information a remote wants a DELETE adding to web know for a server. file operation indexing it to sent The a the is GET purposes, body bulletin successful proper filename of request. board the or since request just are HTTP/1.1 even to example test contains if an the URL of remote the the for page. usage. web validity It server may be is encoded willing to using delete MIME, a page, in the which file case, the lines permissions following may the be PUT set in might such include a way that Content-Type the server process and authentication doesn t have headers rights to do prove it. Where CONNECT that the filename is not caller indeed is the used has resource at the moment permission name to to perform be fetched the and operation 1.1 is the protocol version being used OPTIONS provides a way for the client to query the server about its properties or those of a specified file

45 HTTP response message: general format Introduction 1-45

46 HTTP response message example status line (protocol status code status phrase) data, e.g., requested HTML file header lines HTTP/ OK Connection close Date: Thu, 06 Aug :00:15 GMT Server: Apache/1.3.0 (Unix) Last-Modified: Mon, 22 Jun Content-Length: 6821 Content-Type: text/html data data data data data... 2: Application Layer 46

47 HTTP response status codes In first line in server->client response message. A few sample codes: 200 OK request succeeded, requested object later in this message 301 Moved Permanently requested object moved, new location specified later in this message (Location:) 400 Bad Request request message not understood by server 404 Not Found requested document not found on this server 505 HTTP Version Not Supported 2: Application Layer 47

48 HTTP Version differences HTTP/1.0 Have only 16 status codes Provides only basic authentication Uses Non persistent connection RTT is more so bandwidth waste is vast Stateless Supports only GET POST and HEAD method HTTP/1.1 Have introduced new 24 status code Provides strong authentication Uses Persistent connection RTT is less so bandwidth utilization is good Uses cookies as state management mechanism Supports GET, POST, HEAD,PUT and DELETE 2: Application Layer 48

49 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP response message 2) cookie header line in HTTP request message 3) cookie file kept on user s host, managed by user s browser 4) back-end database at Web site Example: Susan always access Internet always from PC visits specific e- commerce site for first time when initial HTTP requests arrives at site, site creates: unique ID entry in backend database for ID 2: Application Layer 49

50 Cookies: keeping state (cont.) client server ebay 8734 cookie file ebay 8734 amazon 1678 one week later: ebay 8734 amazon 1678 usual http request msg usual http response Set-cookie: 1678 usual http request msg cookie: 1678 usual http response msg usual http request msg cookie: 1678 usual http response msg Amazon server creates ID 1678 for user create entry cookiespecific action cookiespectific action access access backend database 2: Application Layer 50

51 Cookies (continued) What cookies can bring: authorization shopping carts recommendations user session state (Web ) aside Cookies and privacy: cookies permit sites to learn a lot about you you may supply name and to sites How to keep state : protocol endpoints: maintain state at sender/receiver over multiple transactions cookies: http messages carry state 2: Application Layer 51

52 Web caches (proxy server) Goal: satisfy client request without involving origin server user sets browser: Web accesses via cache browser sends all HTTP requests to cache client Proxy server origin server object in cache: cache returns object else cache requests object from origin server, then returns object to client client origin server 2: Application Layer 52

53 More about Web caching Why Web caching? reduce response time for client request reduce traffic on an institution s access link. Internet dense with caches: enables poor content providers to effectively deliver content (but so does P2P file sharing) 2: Application Layer 53

54 Chapter 1: ROAD MAP What is Internet? network edge; hosts, access net, physical media OSI Layer Introduction to application layer services HTTP FTP ( File Transfer Protocol) SMTP DNS DHCP TELNET Introduction 1-54

55 FTP (File Transfer Protocol) Objective 1. Allow file sharing between remote machine 2. Transfer data reliably and efficiently FTP Protocol falls within client server model Both client & server have 2 process allowing information (Data & command) to be managed, they are 1. DTP(Data transfer Process) 2. PI(Protocol Interpreter) Introduction 1-55

56 FTP model/connection Introduction 1-56

57 FTP: the file transfer protocol user at host FTP user interface FTP client local file system file transfer FTP server remote file system During FTP Connection 2 transmission channels are open 1. Control Channel (For command) 2. Data Channel (For data) Control uses port no 21 Data connection uses Port no 20 2: Application Layer 57

58 FTP: separate control, data connections FTP client contacts FTP server at port 21, TCP is transport protocol client authorized over control connection client browses remote directory by sending commands over control connection. when server receives file transfer command, server opens 2 nd TCP connection (for file) to client after transferring one file, server closes data connection. FTP client TCP control connection port 21 TCP data connection port 20 FTP server server opens another TCP data connection to transfer another file. control connection: out of band FTP server maintains state : current directory, earlier authentication 2: Application Layer 58

59 FTP commands, responses Sample commands: sent as ASCII text over control channel USER username PASS password LIST return list of file in current directory RETR filename retrieves (gets) file STOR filename stores (puts) file onto remote host Sample return codes status code and phrase (as in HTTP) 331 Username OK, password required 125 data connection already open; transfer starting 425 Can t open data connection 452 Error writing file 2: Application Layer 59

60 Comparison between HTTP and FTP HTTP uses TCP Only one TCP connection between client and server Send its control information in-band HTTP is stateless FTP uses TCP Two parallel TCP connection, one for data and one for control Send its control information out-oforder FTP maintains State Introduction 1-60

61 Chapter 1: ROAD MAP What is Internet? network edge; hosts, access net, physical media OSI Layer Introduction to application layer services HTTP FTP ( File Transfer Protocol) SMTP (Simple Mail Transfer Protocol) DNS DHCP TELNET Introduction 1-61

62 Functions Architecture and services Message formats Message transfer agents SMTP POP3 and IMAP

63 functions system functions Composition Transfer Reporting Displaying Disposition

64 Electronic Mail System Architecture Three major components: user agents mail servers simple mail transfer protocol: SMTP User Agent mail reader composing, editing, reading mail messages e.g., Eudora, Outlook, elm, Mozilla Thunderbird outgoing, incoming messages stored on server mail server SMTP mail server user agent user agent SMTP SMTP user agent mail server outgoing message queue user mailbox user agent user agent user agent 2: Application Layer 64

65 Electronic Mail: mail servers Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail messages SMTP protocol between mail servers to send messages client: sending mail server mail server SMTP mail server user agent SMTP SMTP mail server user agent user agent user agent server : receiving mail server user agent user agent 2: Application Layer 65

66 message format RFC 822 header fields related to message transport. Some fields used in the RFC 822 message header.

67 SMTP Simple Mail Transfer Protocol Source machine establishes a TCP connection on port 25 on destination machine, where SMTP daemon listens. This daemon accepts the incoming connections and copies messages from them into the appropriate mailboxes If a message can t be delivered, an error report containing the first part of the undeliverable message is returned to the sender It is a simple ASCII protocol

68 Electronic Mail: SMTP [RFC 2821] uses TCP to reliably transfer message from client to server, port 25 direct transfer: sending server to receiving server three phases of transfer handshaking (greeting) transfer of messages closure command/response interaction commands: ASCII text response: status code and phrase messages must be in 7-bit ASCII 2: Application Layer 68

69 Scenario: Alice sends message to abc 1) Alice uses UA to compose message and to 2) Alice s UA sends message to her mail server; message placed in message queue 3) Client side of SMTP opens TCP connection with abc s mail server 4) SMTP client sends Alice s message over the TCP connection 5) abc s mail server places the message in abc s mailbox 6) abc invokes his user agent to read message 1 user agent mail server mail server 5 6 user agent 2: Application Layer 69

70 Try SMTP interaction for yourself: telnet servername 25 see 220 reply from server enter HELO, MAIL FROM, RCPT TO, DATA, QUIT commands above lets you send without using client (reader) 2: Application Layer 70

71 SMTP: final words SMTP uses persistent connections SMTP requires message (header & body) to be in 7- bit ASCII SMTP server uses CRLF.CRLF to determine end of message Comparison with HTTP: HTTP: pull SMTP: push both have ASCII command/response interaction, status codes HTTP: each object encapsulated in its own response msg SMTP: multiple objects sent in multipart msg 2: Application Layer 71

72 Mail message format SMTP: protocol for exchanging msgs RFC 822: standard for text message format: header lines, e.g., To: From: Subject: different from SMTP commands! body the message, ASCII characters only header body blank line 2: Application Layer 72

73 Message format: multimedia extensions MIME: multimedia mail extension, RFC 2045, 2056 additional lines in msg header declare MIME content type MIME version method used to encode data multimedia data type, subtype, parameter declaration encoded data From: To: Subject: Picture of yummy crepe. MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Type: image/jpeg base64 encoded data base64 encoded data 2: Application Layer 73

74 Mail access protocols user agent SMTP SMTP access protocol user agent sender s mail server receiver s mail server SMTP: delivery/storage to receiver s server Mail access protocol: retrieval from server POP: Post Office Protocol [RFC 1939] authorization (agent <-->server) and download IMAP: Internet Mail Access Protocol [RFC 1730] more features (more complex) manipulation of stored msgs on server HTTP: gmail, Hotmail, Yahoo! Mail, etc. 2: Application Layer 74

75 POP3 Starts when the user starts the mail reader Mail reader calls up the ISP (if there is no connection) and establishes a TCP connection with the message transfer agent on port 110; Authorization Having user logged in by sending its username and password Transactions User collecting the s and marking them for deletion Update Causes the s to be deleted

76 IMAP POP3 works fine for users with one account with one ISP, accessed from one PC If mail was accessed from different locations, user may loose s, security issues may appear, etc An alternative final delivery protocol, IMAP (Internet Message Access Protocol), defined in RFC2060 Instead assuming that all messages will be downloaded and work offline after that (like POP3), IMAP assumes that all will remain on the server indefinite in multiple mailboxes Provides extensive mechanisms to read messages or parts of messages, mechanisms to create, destroy and manipulate multiple mailboxes.

77 POP3 vs. IMAP

78 Chapter 1: ROAD MAP What is Internet? network edge; hosts, access net, physical media OSI Layer Introduction to application layer services HTTP (Hyper text transfer Protocol) FTP ( File Transfer Protocol) SMTP (Simple Mail Transfer Protocol) DNS (Domain Name System) DHCP TELNET Introduction 1-78

79 DNS (Domain Name System)Basic IP addresses are difficult to remember would be difficult to remember If JohnDoe s mail server moves to another machine, then his address would not be valid anymore Something like JohnDoe@gmail.com would be appropriate Need some mechanisms to translate gmail.com to the IP address. To solve this problem DNS was invented DNS is a hierarchical, domain-based naming scheme and a distributed database system for implementing this naming scheme Usage: Map URL name into an IP address

80 DNS: Domain Name System Basic: Maps URL to IP address and vice versa Runs over UDP and TCP Uses port No 53 Application layer protocol 2: Application Layer 80

81 DNS : DNS services hostname to IP address translation host aliasing Canonical, alias names mail server aliasing load distribution replicated Web servers: set of IP addresses for one canonical name 2: Application Layer 81

82 DNS components Name space Name Servers Resolver Introduction 1-82

83 The Name Space The name space is the structure of the DNS database An inverted tree with the root node at the top Each node has a label The root node has a null label, written as The root node "" top-level node top-level node top-level node second-level node second-level node second-level node second-level node second-level node third-level node third-level node third-level node

84 DNS Name Space (Top level Domain) Internet is divided into over 200 top level domains Top level domains could be generic and country domains Each domain is divided into sub-domains, which are further partitioned, etc..

85 DNS Name Space (Domain Names) A domain name is the sequence of labels from a node to the root, separated by dots (. s), read left to right A node s domain name identifies its position in the name space "" com edu gov int mil net org nominum metainfo berkeley nwu nato army uu west east www dakota tornado

86 DNS Name servers One DNS server could service all requests But in practice it will be overloaded To solve this, DNS name space is divided in non overlapping zones Each zone contains some part of the tree and name servers holding zone info

87 DNS Name Resolver Resolver Query Response Name Server Resolver maps a name to an IP address and vice versa DNS uses large no of servers organized in hierarchical and distributed around the world. There are 3 classes of DNS servers Root DNS Server Top-Level Domain(TLD) Server Authoritative DNS Server 2: Application Layer 87

88 DNS Resolver (Types of Servers) Root DNS Server 13 root DNS server Labeled A to M Top-Level Domain(TLD) Servers Responsible for top level domains Ex. Com,org,edu,gov and all country domains Authoritative DNS Servers Contains DNS record for every publically accessible organization on Internet DNS record maps names to IP address 1-88

89 DNS Resolver ways Resolving can be done in two ways Iterative resolution Recursive resolution Introduction 1-89

90 DNS name Iterative resolution example root DNS server Host at cis.poly.edu wants IP address for gaia.cs.umass.edu TLD DNS server (for edu) iterated query: contacted server replies with name of server to contact I don t know this name, but ask this server local DNS server dns.poly.edu 1 8 requesting host cis.poly.edu 7 6 authoritative DNS server dns.cs.umass.edu gaia.cs.umass.edu 2: Application Layer 90

91 DNS name Recursive resolution example root DNS server recursive query: puts burden of name resolution on contacted name server heavy load? TLD DNS server local DNS server dns.poly.edu requesting host cis.poly.edu authoritative DNS server dns.cs.umass.edu gaia.cs.umass.edu 2: Application Layer 91

92 Resource Records When a resolver gives a domain name to DNS, what it gets back are the resource records associated with that name; Thus the primary function of DNS is to map domain names onto resource records A DNS zone database is made up of a collection of resource records. Each resource record specifies information about a particular object. For example, address mapping (A) records map a host name to an IP address, and reverse-lookup pointer (PTR) records map an IP address to a host name. The server uses these records to answer queries for hosts in its zone

93 Resource Records A resource record has five parts: Domain name Time to Live Class Type Value The Domain_name tells the domain to which this record applies Time_to_live field gives an indication of how stable the record is Class field is always IN for Internet information

94 Chapter 1: ROAD MAP What is Internet? network edge; hosts, access net, physical media OSI Layer Introduction to application layer services HTTP FTP ( File Transfer Protocol) SMTP (Simple Mail Transfer Protocol) DNS DHCP (Dynamic Host Configuration Protocol) TELNET Introduction 1-94

95 Need of Dynamic Assignment of IP addresses Need of Dynamic assignment of IP addresses IP addresses are assigned on-demand Avoid manual IP configuration Support mobility of laptops Support temporary allocation of IP addresses Three Protocols: RARP (until 1985, no longer used) BOOTP ( ) DHCP (since 1993) Only DHCP is widely used today. 95

96 DHCP Designed in 1993 Uses UDP An extension of BOOTP (Many similarities to BOOTP) IP addresses are assigned dynamically on demand Supports temporary allocation ( leases ) of IP addresses DHCP client can acquire all IP configuration parameters DHCP can interoperate with BOOTP clients. 96

97 DHCP Interaction (simplified) Argon :a0:24:71:e4:44 DHCP Response: IP address: Default gateway: Netmask: DHCP Server 97

98 BOOTP/DHCP Message Format OpCode Hardware Type Number of Seconds Transaction ID Client IP address Your IP address Server IP address Gateway IP address Client hardware address (16 bytes) Server host name (64 bytes) Boot file name (128 bytes) Options Hardware Address Hop Count Length Unused (in BOOTP) Flags (in DHCP) 98 (There are >100 different options)

99 BOOTP/DHCP OpCode: 1 (Request), 2(Reply) Note: DHCP message type is sent in an option Hardware Type: 1 (for Ethernet) Hardware address length: 6 (for Ethernet) Hop count: set to 0 by client Transaction ID: Integer (used to match reply to response) Seconds: number of seconds since the client started to boot Client IP address, Your IP address, server IP address, Gateway IP address, client hardware address, server host name, boot file name: client fills in the information that it has, leaves rest blank 99

100 DHCP Message Type Value Message Type 1 DHCPDISCOVER 2 DHCPOFFER 3 DHCPREQUEST 4 DHCPDECLINE 5 DHCPACK 6 DHCPNAK 7 DHCPRELEASE 8 DHCPINFORM 100

101 DHCP Operation DHCP Client 00:a0:24:71:e4:44 DHCP Server DCHP DISCOVER DHCPDISCOVER Sent to DHCP Server DHCP Client 00:a0:24:71:e4:44 DHCPOFFER DHCP Server DCHP OFFER DHCPOFFER DHCP Server 102

102 DHCP Operation DHCP Client 00:a0:24:71:e4:44 DHCP Server DHCP RELEASE DHCPRELEASE At this time, the DHCP client has released the IP address DHCP Server 104

103 Chapter 1: ROAD MAP What is Internet? network edge; hosts, access net, physical media OSI Layer Introduction to application layer services HTTP FTP ( File Transfer Protocol) SMTP (Simple Mail Transfer Protocol) DNS DHCP (Dynamic Host Configuration Protocol) TELNET Introduction 1-105

104 TELNET vs. telnet TELNET is a protocol that provides a general, bi-directional, eight-bit byte oriented communications facility. telnet is a program that supports the TELNET protocol over TCP. Many application protocols are built upon the TELNET protocol. Netprog: TELNET 106

105 TELNET Protocol TELNET is a general-purpose client-server application program. TELNET is an abbreviation for TErminaL NETwork Uses Port No 23 and TCP Protocol Used for Virtual terminal service TELNET enables the establishment of a connection to a remote system in such a way that the local terminal appears to be a terminal at the remote system

106 Local login TCP/IP Protocol Suite 108

107 Remote login TCP/IP Protocol Suite 109

108 Concept of NVT TCP/IP Protocol Suite 110

109 Network Virtual Terminal Via a universal interface called the Network Virtual Terminal (NVT) character set, the TELNET client translates characters (data or commands) that come from the local terminal into NVT form and delivers them to the network. The TELNET server translates data and commands from NVT form into the form acceptable by the remote computer. Introduction 1-111

110 Network Virtual Terminal intermediate representation of a generic terminal. provides a standard language for communication of terminal control functions. NVT uses two sets of characters, one for data(0) and other for control(1) Netprog: TELNET 112

111 TELNET Command Structure Introduction 1-113

112 TELNET Basic Commands AYT EC AO QUIT Are you There Erase Character Abort Output Quit Session Introduction 1-114

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Chapter 2: Application Layer Our goals: conceptual, implementation

More information

CSC 4900 Computer Networks:

CSC 4900 Computer Networks: CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Application Layer 1 Chapter 2: Application layer 2.1 Principles

More information

Review of Previous Lecture

Review of Previous Lecture Review of Previous Lecture Network access and physical media Internet structure and ISPs Delay & loss in packet-switched networks Protocol layers, service models Some slides are in courtesy of J. Kurose

More information

CMSC 332 Computer Networking Web and FTP

CMSC 332 Computer Networking Web and FTP CMSC 332 Computer Networking Web and FTP Professor Szajda CMSC 332: Computer Networks Project The first project has been posted on the website. Check the web page for the link! Due 2/2! Enter strings into

More information

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

WWW: the http protocol

WWW: the http protocol Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10 EE 586 Communication and Switching Networks (Fall 2010) Lecture 10 September 17 2010 1-1 Announcement Send me your group and get group ID HW3 (short) out on Monday Personal leave for next two weeks No

More information

Web, HTTP and Web Caching

Web, HTTP and Web Caching Web, HTTP and Web Caching 1 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/ model client: browser that requests, receives, displays Web objects : Web sends objects

More information

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model Networking Networking is concerned with the physical topology of two or more communicating entities and the logical topology of data transmission. Layered Model Systems communicate over a shared communication

More information

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content

More information

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication Mobile network Chapter 2 The Yanmin Zhu Department of Computer Science and Engineering Global ISP Home network Regional ISP Institutional network CSE Department 1 CSE Department 2 Application layer - Overview

More information

Layered Model. DoD Model. ISO/OSI Model

Layered Model. DoD Model. ISO/OSI Model Data Communications vs Networking (later) Communication is concerned with the transmission of data over a communication medium/channel between two entities. Here we are more concerned about EE issues such

More information

Lecture 7 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 7 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 7 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #1 Assigned today Due in one week Application layer: DNS, HTTP, protocols Recommend you start early

More information

HyperText Transfer Protocol

HyperText Transfer Protocol Outline Introduce Socket Programming Domain Name Service (DNS) Standard Application-level Protocols email (SMTP) HTTP HyperText Transfer Protocol Defintitions A web page consists of a base HTML-file which

More information

EECS 3214: Computer Network Protocols and Applications

EECS 3214: Computer Network Protocols and Applications EECS 3214: Computer Network Protocols and Applications Suprakash Datta Course page: http://www.eecs.yorku.ca/course/3214 Office: LAS 3043 Email: datta [at] cse.yorku.ca These slides are adapted from Jim

More information

Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa

Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa NET 331 Computer Networks Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa Reformatted slides from textbook Computer Networking a top-down appraoch, Fifth

More information

Foundations of Telematics

Foundations of Telematics Foundations of Telematics Chapter 2 Application Layer Principles of network applications Important application protocols Using sockets Acknowledgement: These slides have been prepared by J.F. Kurose and

More information

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming with UDP and TCP Application

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Application Layer: Cookies, Web Caching, SMTP Sec 2.2.4-2.4 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network

More information

Network Applications Principles of Network Applications

Network Applications Principles of Network Applications Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with TCP 2.8 Socket

More information

Review for Internet Introduction

Review for Internet Introduction Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of

More information

FTP. Mail. File Transfer Protocol (FTP) FTP commands, responses. Electronic Mail. TDTS06: Computer Networks

FTP. Mail. File Transfer Protocol (FTP) FTP commands, responses. Electronic Mail. TDTS06: Computer Networks TDTS0: Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se FTP Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides

More information

Lecture 6 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Some network apps e-mail web text messaging remote

More information

CSC358 Week 2. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

CSC358 Week 2. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved CSC358 Week 2 Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Logistics Tutorial this Friday Assignment 1 will be out shortly

More information

Application Layer Chapter 2

Application Layer Chapter 2 Application Layer Chapter 2 Silvia Giordano SUPSI CH-6928 Manno silvia.giordano@supsi.ch http://www.supsi.ch SUPSI-DTI Silvia Giordano 10/06/2004 Application Layer 1 Chapter goals: learn about protocols

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

The Application Layer: SMTP, FTP

The Application Layer: SMTP, FTP The Application Layer: SMTP, FTP CS 352, Lecture 5 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 Recap: Application-layer protocols DNS: lookup a (machine-readable) address using a (humanreadable)

More information

Chapter 2 part B: outline

Chapter 2 part B: outline Chapter 2 part B: outline 2.3 FTP 2.4 electronic, POP3, IMAP 2.5 DNS Application Layer 2-1 FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file

More information

CSEN 404 Introduction to Networks. Mervat AbuElkheir Mohamed Abdelrazik. ** Slides are attributed to J. F. Kurose

CSEN 404 Introduction to Networks. Mervat AbuElkheir Mohamed Abdelrazik. ** Slides are attributed to J. F. Kurose CSEN 404 Introduction to Networks Mervat AbuElkheir Mohamed Abdelrazik ** Slides are attributed to J. F. Kurose HTTP Method Types HTTP/1.0 GET POST HEAD asks server to leave requested object out of response

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

CS4/MSc Computer Networking. Lecture 3: The Application Layer

CS4/MSc Computer Networking. Lecture 3: The Application Layer CS4/MSc Computer Networking Lecture 3: The Application Layer Computer Networking, Copyright University of Edinburgh 2005 Network Applications Examine a popular network application: Web Client-server architecture

More information

Application Layer: HTTP

Application Layer: HTTP Application Layer: HTTP EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 23-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic

More information

Application layer. Some network apps. Client-server architecture. Hybrid of client-server and P2P. Pure P2P architecture. Creating a network app

Application layer. Some network apps. Client-server architecture. Hybrid of client-server and P2P. Pure P2P architecture. Creating a network app Application layer Some network apps e- web instant messaging remote login P2P file sharing multi- network games streaming stored video (YouTube) voice over IP real-time video conferencing cloud computing

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

CC451 Computer Networks

CC451 Computer Networks CC451 Computer Networks Lecture 4 Application Layer (cont d) Application Layer 1 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3,

More information

Application Layer. Pure P2P architecture. Client-server architecture. Processes communicating. Hybrid of client-server and P2P. Creating a network app

Application Layer. Pure P2P architecture. Client-server architecture. Processes communicating. Hybrid of client-server and P2P. Creating a network app Application Layer e- web instant messaging remote login PP file sharing multi- network games streaming stored video (YouTube) voice over IP real-time video conferencing cloud computing Creating a network

More information

Lecture 6: Application Layer Web proxies, , and SMTP

Lecture 6: Application Layer Web proxies,  , and SMTP Lecture 6: Application Layer Web proxies, Email, and SMTP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Information Network Systems The application layer. Stephan Sigg

Information Network Systems The application layer. Stephan Sigg Information Network Systems The application layer Stephan Sigg Tokyo, November 15, 2012 Introduction 04.10.2012 Introduction to the internet 11.10.2012 The link layer 18.10.2012 The network layer 25.10.2012

More information

Different Layers Lecture 21

Different Layers Lecture 21 Different Layers Lecture 21 10/17/2003 Jian Ren 1 The Transport Layer 10/17/2003 Jian Ren 2 Transport Services and Protocols Provide logical communication between app processes running on different hosts

More information

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach Chapter 2 Application Layer Lecture 4: principles of network applications Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information

Applications & Application-Layer Protocols: FTP and (SMTP & POP)

Applications & Application-Layer Protocols: FTP and  (SMTP & POP) COMP 431 Internet Services & Protocols Applications & Application-Layer Protocols: FTP and E ( & POP) Jasleen Kaur February 7, 2019 Application-Layer Protocols Outline Example client/ systems and their

More information

Application Layer. Applications and application-layer protocols. Goals:

Application Layer. Applications and application-layer protocols. Goals: Application Layer Goals: Conceptual aspects of network application protocols Client paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS 1 Applications

More information

Application Layer. Pure P2P architecture. Client-server architecture. Processes communicating. Hybrid of client-server and P2P. Creating a network app

Application Layer. Pure P2P architecture. Client-server architecture. Processes communicating. Hybrid of client-server and P2P. Creating a network app Application Layer e- web instant messaging remote login P2P file sharing multi- network games streaming stored video (YouTube) voice over IP real-time video conferencing cloud computing Creating a network

More information

Computer Networks and Applications

Computer Networks and Applications COMP 3331/COMP 9331 Week 2 Introduction(Protocol Layering) & Application Layer (Principles, Web, E- mail) Reading Guide: Chapter 1, Sections 1.5 Chapter 2, Sections 2.1-2.4 Week2: Introduction & Application

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2 Application Layer A note on the use of these ppt slides: Were making these slides freely available to all (faculty, students, readers). Theyre in PowerPoint form so you can add, modify, and delete

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University

More information

Application Layer Protocols

Application Layer Protocols SC250 Computer Networking I Application Layer Protocols Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Conceptual, implementation

More information

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among

More information

Chapter 2 Application Layer

Chapter 2 Application Layer CSF531 Advanced Computer Networks 高等電腦網路 Chapter 2 Application Layer 吳俊興 國立高雄大學資訊工程學系 Chapter 2: Outline 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3,

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet

More information

Goal and A sample Network App

Goal and A sample Network App Application Layer Goal and A sample Network App Write programs that run on different end systems and communicate over a network. e.g., Web: Web server software communicates with browser software Little

More information

The Application Layer: & SMTP

The Application Layer:  & SMTP The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.5 Chapter 2: outline 2.1 principles of network applications app architectures

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4 1 Lab schedule confirmation Mondays, 12:00-2:00pm Tuesdays, 11:00am-1:00pm Wednesdays, 4:00-6:00pm

More information

Application Layer Protocols

Application Layer Protocols Application Layer Protocols Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan Email: ihsan.ullah.cs@gmail.com These slides are adapted from the slides accompanying

More information

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application

More information

EECS 3214: Computer Network Protocols and Applications

EECS 3214: Computer Network Protocols and Applications EECS 3214: Computer Network Protocols and Applications Suprakash Datta datta@cse.yorku.ca Office: LAS 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/3214 These slides are

More information

SCS3004 Networking Technologies Application Layer Protocols

SCS3004 Networking Technologies Application Layer Protocols SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:

More information

Application Layer: , DNS

Application Layer:  , DNS Application Layer: E-mail, DNS EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 22-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic

More information

Introduction to the Application Layer. Computer Networks Term B14

Introduction to the Application Layer. Computer Networks Term B14 Introduction to the Application Layer Computer Networks Term B14 Intro to Application Layer Outline Current Application Layer Protocols Creating an Application Application Architectures Client-Server P2P

More information

CS 43: Computer Networks. HTTP September 10, 2018

CS 43: Computer Networks. HTTP September 10, 2018 CS 43: Computer Networks HTTP September 10, 2018 Reading Quiz Lecture 4 - Slide 2 Five-layer protocol stack HTTP Request message Headers protocol delineators Last class Lecture 4 - Slide 3 HTTP GET vs.

More information

CSEN 503 Introduction to Communication Networks

CSEN 503 Introduction to Communication Networks CSEN 503 Introduction to Communication Networks 1-1 Mervat AbuElkheir Hana Medhat Ayman Dayf ** Slides are attributed to J. F. Kurose Roadmap: Application layer Cookies and User-Server State Web caches

More information

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 7b: HTTP Feb. 24, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu WWW - HTTP/1.1 Web s application layer protocol

More information

Application Level Protocols

Application Level Protocols Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application

More information

Networking: Application layer

Networking: Application layer ing: Application layer Comp Sci 3600 Security Outline 1 2 3 4 5 6 7 Classic text-based that became popular in the 1970s and 1980s: text email, remote access to computers, file transfers, and newsgroups.

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Network Application. Topic. Principle of Network Application. Principle of Network Application

Network Application. Topic. Principle of Network Application. Principle of Network Application Topic Network Application o Principle of Network Application o Web & HTTP o FTP o E-mail o DNS o Peer-to-peer 2 Principle of Network Application o Network Applications e-mail web instant messaging remote

More information

CMSC 322 Computer Networks Applications and End-To- End

CMSC 322 Computer Networks Applications and End-To- End CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework

More information

Chapter 2: Application Layer

Chapter 2: Application Layer Chapter 2: Application Layer Course on Computer Communication and Networks, CTH/GU The slides are adaptation of the slides made available by the authors of the course s main textbook: Computer Networking:

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology Review Questions for exam Preparation (22-07-2017) 1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology 2. What is the Internet? "network

More information

CSC 4900 Computer Networks: End-to-End Design

CSC 4900 Computer Networks: End-to-End Design CSC 4900 Computer Networks: End-to-End Design Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review In the last two lectures, we discussed the fundamentals of networking

More information

The Application Layer: Sockets, DNS

The Application Layer: Sockets, DNS The Application Layer: Sockets, DNS CS 352, Lecture 3 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 App-layer protocol Types of messages exchanged, e.g., request, response Message format:

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

Protocol Classification

Protocol Classification DNS and DHCP TCP/IP Suite Suite of protocols (not just TCP and IP) Main protocols TCP and UDP at the Transport Layer, and IP at the Network Layer Other protocols ICMP, ARP, Telnet, Ftp, HTTP, SMTP, SNMP

More information

Chapter P2P file sharing network applications 2.22 Web and HTTP 2.3 FTP DNS

Chapter P2P file sharing network applications 2.22 Web and HTTP 2.3 FTP DNS Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

CS 43: Computer Networks. 12: and SMTP September 28, 2018

CS 43: Computer Networks. 12:  and SMTP September 28, 2018 CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s

More information

Application Layer: The Web and HTTP Sec 2.2 Prof Lina Battestilli Fall 2017

Application Layer: The Web and HTTP Sec 2.2 Prof Lina Battestilli Fall 2017 CSC 401 Data and Computer Communications Networks Application Layer: The Web and HTTP Sec 2.2 Prof Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network applications 2.2

More information

Application Layer. Goals: Service models. Conceptual aspects of network application protocols Client server paradigm

Application Layer. Goals: Service models. Conceptual aspects of network application protocols Client server paradigm Application Layer Goals: Conceptual aspects of network application protocols Client server paradigm Service models Review protocols by examining popular application-level protocols HTTP DNS 1 Applications

More information

CMPE 151: Network Administration. Servers

CMPE 151: Network Administration. Servers CMPE 151: Network Administration Servers Announcements Unix shell+emacs tutorial. Basic Servers Telnet/Finger FTP Web SSH NNTP Let s look at the underlying protocols. Client-Server Model Request Response

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

Part 1: Introduction. Goal: Review of how the Internet works Overview

Part 1: Introduction. Goal: Review of how the Internet works Overview Part 1: Introduction Goal: Review of how the Internet works Overview Get context Get overview, feel of the Internet Application layer protocols and addressing Network layer / Routing Link layer / Example

More information

Applications. Chong-kwon Kim. Running in end systems (hosts) over transport layer protocols Ex: , Web, FTP, instant messaging

Applications. Chong-kwon Kim. Running in end systems (hosts) over transport layer protocols Ex:  , Web, FTP, instant messaging Applications Chong-kwon Kim Applications Network applications Running in end systems (hosts) over transport layer protocols Ex: e-mail, Web, FTP, instant messaging Application layer protocols Define app.

More information

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

CS348: Computer Networks  (SMTP, POP3, IMAP4); FTP CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange

More information

Chapter 2. Application Layer. 2: Application Layer 1

Chapter 2. Application Layer. 2: Application Layer 1 Chapter 2 Application Layer 2: Application Layer 1 Some network apps e-mail web instant messaging remote login P2P file sharing multi-user network games streaming stored video clips voice over IP real-time

More information

Application Protocols and HTTP

Application Protocols and HTTP Application Protocols and HTTP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #0 due

More information

13. Internet Applications 최양희서울대학교컴퓨터공학부

13. Internet Applications 최양희서울대학교컴퓨터공학부 13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network

More information

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 23: Application Layer Protocols Chapter 9.1 Xiaowei Yang xwy@cs.duke.edu The Internet Architecture Application layer Transport layer / Layer 4 Network

More information

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2013 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project 1 Python HTTP Server Work day: Next Tuesday (Sept 24 th ) Due Thursday, September 26 th by 11:55pm

More information