Information Network Systems The application layer. Stephan Sigg
|
|
- Nigel Norris
- 5 years ago
- Views:
Transcription
1 Information Network Systems The application layer Stephan Sigg Tokyo, November 15, 2012
2 Introduction Introduction to the internet The link layer The network layer The network layer The transport layer The application layer Network management Security and cryptography Wireless and Mobile Networks (1) Wireless and Mobile Networks (2) Multimedia networking (1) Multimedia networking (2) Security in computer networks Content centric networking Stephan Sigg Information Network Systems 2
3 The application layer HTTP FTP Introduction IP stack Application Transport Network Link Physical Stephan Sigg Information Network Systems 3 DNS P2P
4 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 4
5 The application layer We distinguish between two main architectures for the application layer Client-server architecture Peer-to-peer architecture Stephan Sigg Information Network Systems 5
6 The application layer Client-server architecture Server host services requests from client hosts Clients do not directly communicate with each other but via a server Server typically has a fixed well-known IP address and can thus always be contacted E.g. Web, FTP, Telnet, Stephan Sigg Information Network Systems 6
7 The application layer P2P architecture Minimal or no reliance on dedicated servers Direct Communication between pairs of connected hosts (peers) E.g. BitTorrent, Xunlei, Skype, Kankan, PPstream P2P networks are self-scalable since each peer adds not only adds workload but further capacity Stephan Sigg Information Network Systems 7
8 The application layer Sockets Two applications communicate via sockets Application Program Interface (API) between application and network The application has little control (and trouble) with the transport-layer as this is controlled by the socket Stephan Sigg Information Network Systems 8
9 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 9
10 Hyper Text Transfer Protocol HTTP is implemented in a client program and a server program These programs talk to each other by exchanging HTTP messages Many webpages consist of a base HTML file and several objects referenced by their Uniform resource locator (URL) Stephan Sigg Information Network Systems 10
11 Hyper Text Transfer Protocol URL Protocol Hostname in the WWW /somedepartment/ Path name to the object location /picture.gif Filename of the object Stephan Sigg Information Network Systems 11
12 Hyper Text Transfer Protocol Persistent and non persistent connections HTTP uses TCP as its transport protocol Default port: 80 We can distinguish HTTP connections as being either Persistent Non-persistent Stephan Sigg Information Network Systems 12
13 Hyper Text Transfer Protocol Non-Persistent connections A new TCP connection is established each time new data is requested Most contemporary browsers open 5 to 10 parallel TCP connections handling separate request-response transactions Overhead through TCP Connection establishing Stephan Sigg Information Network Systems 13
14 Hyper Text Transfer Protocol An example connection 1. HTTP client initiates connection with server on port 80. A socket is created at both client and server 2. HTTP client sends an HTTP request message to the server including /somedepartment/index.html 3. HTTP server retrieves the object /somedepartment/index.html from its storage and sends it in an HTTP response message 4. HTTP server tells TCP to close connection 5. HTTP client receives the response message and extracts URLs of further elements (e.g. images) 6. For each further element, the steps 1-4 are repeated Stephan Sigg Information Network Systems 14
15 Hyper Text Transfer Protocol Persistent connections Once established connection is maintained for each requested object Default mode of HTTP HTTP server closes a connection when it is not used for a certain time Reduced delay since the connection has to be established only once Stephan Sigg Information Network Systems 15
16 Hyper Text Transfer Protocol HTTP request message Message transmitted in ASCII text Methods: GET (Obtain object at specified address). GET /somedepartment/index.html HTTP/1.1 Host: someschool.edu Connection: close User-agent: Mozilla/5.0 Accept-language: jp. Stephan Sigg Information Network Systems 16
17 Hyper Text Transfer Protocol HTTP request message Message transmitted in ASCII text Methods: POST (Request of a website with specific input to form-fields) POST /wiki/spezial:search HTTP/1.1. Host: de.wikipedia.org Content-Type: application/x-www-form-urlencoded Content-Length: 24 search=katzen&go=artikel. Stephan Sigg Information Network Systems 17
18 Hyper Text Transfer Protocol HTTP request message Message transmitted in ASCII text Methods: HEAD (Reply with empty message (e.g. debugging)). HEAD /bit/archives.zip.torrent HTTP/1.1 Host: Stephan Sigg Information Network Systems 18
19 Hyper Text Transfer Protocol HTTP request message Message transmitted in ASCII text Methods: PUT (Store object at specific path). PUT /repositories/directory HTTP/1.1 Host: localhost Content-Type: application/xml;charset=utf-8 [XML ENCODED DATA]. Stephan Sigg Information Network Systems 19
20 Hyper Text Transfer Protocol HTTP request message Message transmitted in ASCII text Methods: DELETE (Delete object at specified path on the server). DELETE /repositories/directory HTTP/1.1 Host: localhost. Stephan Sigg Information Network Systems 20
21 Hyper Text Transfer Protocol HTTP response message HTTP/ OK Connection: close. DATE: Fri, 10 Aug :44:04 GMT Server: Apache (CentOS) Last-modified: Fri, 10 Aug :44:04 GMT Content-Length: 6823 Content-Type: text/html data...data...data.... Stephan Sigg Information Network Systems 21
22 Hyper Text Transfer Protocol HTTP response message Status messages 200 OK: Request succeeded and information is returned in response 301 Moved Permanently: Object has permanently moved, new URL specified in Location: header of response message 400 Bad Request: Request not understood by server 404 Not Found: Requested document not on this server 505 HTTP Version not Supported Requested HTTP protocol version not supported Stephan Sigg Information Network Systems 22
23 Hyper Text Transfer Protocol Cookies HTTP is a stateless protocol since it does not track the states of clients. To identify users, cookies are frequently utilised Can be used to create a user session layer on top of stateless HTTP Components: 1. Cookie header line in HTTP response message 2. Cookie header line in HTTP request message 3. Cookie file kept on the users end system managed by the browser 4. Back-end database at the web site Stephan Sigg Information Network Systems 23
24 Hyper Text Transfer Protocol Cookies 1. At first contact from a user, Web server creates unique identification number and new corresponding entry in back-end database 2. Web server responds including in the HTTP response a set-cookie: header containing the identification number 3. Receiving browser appends a line to its special cookie file including hostname of server and identification number of cookie. 4. With each follow-up contact with this web server, the browser will send the header line Cookie: with the identification number Stephan Sigg Information Network Systems 24
25 Hyper Text Transfer Protocol Stephan Sigg Information Network Systems 25
26 Hyper Text Transfer Protocol Proxy server (Web cache) A proxy server is a network entity that satisfies HTTP requests on behalf of an origin web server Has own disk storage to keep copies of recently requested objects Browser can be configured to send all HTTP requests first to proxy. Potentially reduces traffic and response time Stephan Sigg Information Network Systems 26
27 Hyper Text Transfer Protocol 1. Browser establishes TCP connection to proxy server and sends HTTP request 2. Proxy server checks whether copy of object is within the local cache. 3. If not, it opens TCP connection to origin server to obtain the object 4. At receiving the object, the proxy server stores it into the local cache and sends an HTTP response message to the client browser Stephan Sigg Information Network Systems 27
28 Hyper Text Transfer Protocol The conditional GET How should the proxy server learn of a stale object in its cache? HTTP defines a conditional GET to verify the validity of an object. Request message uses the GET method and includes If-Modified-Since: header GET /fruit/kiwi.gif HTTP/1.1 Host: If-modified-since: Wed, 7 Sep :23:24 Web server then either answers with the modified page or with an empty HTTP response containing the Not Modified header Stephan Sigg Information Network Systems 28
29 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 29
30 File Transfer Protocol (FTP) File Transfer over a TCP connection Stephan Sigg Information Network Systems 30
31 File Transfer Protocol (FTP) File Transfer over a TCP connection FTP uses two parallel TCP Connections to transfer a file Control connection Used for sending control information between the two hosts (user identification, password, commands to change remote directory, put or get files) Data connection Transmit file Stephan Sigg Information Network Systems 31
32 File Transfer Protocol (FTP) File Transfer over a TCP connection 1. When a user starts FTP session, control TCP connection is established first on server port number 21. User ID and password are sent over the TCP connection. 2. Server initiates TCP data connection to client side. FTP sends exactly one file over the data connection and then closes the connection while the control connection remains open Server maintains state about the user during the session to associate a control connection with each specific user Stephan Sigg Information Network Systems 32
33 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 33
34 Electronic Mail in the Internet Electronic mail One of the most utilised applications in the Internet Asynchronous communication Communication between mail servers using SMTP protocol (not between hosts directly) Stephan Sigg Information Network Systems 34
35 Electronic Mail in the Internet Simple Mail Transfer Protocol SMTP transfers messages from the senders mail server to the recipients mail server Body and header must be 7-bit ASCII TCP connection between SMTP servers Stephan Sigg Information Network Systems 35
36 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 36
37 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 37
38 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 38
39 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 39
40 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 40
41 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 41
42 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello Task crepes.fr, Write an pleased tovia meet telnet you C: MAIL FROM: Connect to your server via telnet to compose S: 250 Sender ok C: RCPT TO: send S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 41
43 Electronic Mail in the Internet User agents SMTP server usually accessed by user agent (e.g. POP3, IMAP, HTML) Post Office Protocol Version 3 (POP3) Simple mail access protocol TCP connection with the mail server on port 110 Three phases of a POP3 session Auhorisation (Username and password) Transaction (retrieving of messages and/or message deletion) Update (After the client has quit the connection, the mail server deletes the messages marked for deletion) Stephan Sigg Information Network Systems 42
44 Electronic Mail in the Internet User agents SMTP server usually accessed by user agent (e.g. POP3, IMAP, HTML) Internet Mail Access Protocol (IMAP) Provides additional commands to create remote folders and assign messages to them Server will associate each message with a folder Allows to transmit only parts of a message (e.g. Header only) Stephan Sigg Information Network Systems 43
45 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 44
46 Domain Name System (DNS) DNS Internet hosts can be identified either by their hostname or their IP address Hostname IP address DNS is a directory service that maps IP addresses to hostnames Stephan Sigg Information Network Systems 45
47 Domain Name System (DNS) DNS 1. Browser extracts from an URL the hostname and passes this to the client side of the DNS application (running on the host machine) 2. The DNS client sends a query containing the hostname to a DNS server 3. Eventually, the DNS client receives a reply with the IP address for the hostname 4. With this IP address, the browser can now initiate a TCP connection the the HTTP server process on port 80 Stephan Sigg Information Network Systems 46
48 Domain Name System (DNS) Further DNS services Host aliasing A hostname such as might have several aliases such as google.com is the canonical hostname DNS can provide the canonical hostname and its IP address when supplied with an alias hostname Stephan Sigg Information Network Systems 47
49 Domain Name System (DNS) Further DNS services Mail server aliasing The MX record permits a company s mail server and web server to have the same hostnames. Therefore, DNS can provide the canonical host name for an server provided with the alias address Stephan Sigg Information Network Systems 48
50 Domain Name System (DNS) Further DNS services Load distribution DNS also performs load distribution among replicated servers. Busy sites are replicated over multiple servers each running on different end systems and having different IP addresses With each reply for this alias address, the DNS server will rotate the distribution of the traffic among replicated servers Stephan Sigg Information Network Systems 49
51 Domain Name System (DNS) DNS: A distributed, hierarchical database DNS uses a large number of hierarchically organised servers No single DNS server has all of the mappings for all of the hosts in the Internet Stephan Sigg Information Network Systems 50
52 Domain Name System (DNS) DNS root servers Stephan Sigg Information Network Systems 51
53 Domain Name System (DNS) Root DNS servers 13 Root DNS servers in the Internet Each server Root server is actually a network of replicated servers Alltogether, 247 servers make the Root servers of the internet Stephan Sigg Information Network Systems 52
54 Domain Name System (DNS) Top-level domain (TLD) servers Responsible for top-level domains e.g. com, org, net, edu, gov country specific such as gov, jp, fr, de Stephan Sigg Information Network Systems 53
55 Domain Name System (DNS) Authoritative DNS servers Each organisation with publicly accessible hosts (e.g. web servers and mail servers) must provide publicly accessible DNS records that map names of those hosts to IP addresses These are hosted in the organisations authoritative DNS server Alternatively, the organisation can pay a service provider to store the entries in one of its DNS servers Stephan Sigg Information Network Systems 54
56 Domain Name System (DNS) Iterative and recursive interaction with DNS servers Stephan Sigg Information Network Systems 55
57 Domain Name System (DNS) Recursive interaction with DNS servers Stephan Sigg Information Network Systems 56
58 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 57
59 Peer-to-peer networks A P2P network has minium or no reliance on always-on servers Pairs of intermittently connected hosts (peers) communicate directly Examples: P2P File distribution P2P Distributed Hash Table Stephan Sigg Information Network Systems 58
60 Peer-to-peer networks P2P file distribution Distribution of a large file to a great number of hosts In server-based implementation, enormous burden on the server, consuming large amount of server bandwidth In P2P file distribution, distributed peers share the load for distributing the file. Stephan Sigg Information Network Systems 59
61 Peer-to-peer networks P2P file distribution BitTorrent Collection of all peers distributing a particular file is called torrent Peers in a torrent download equal-sized (e.g. 256 KBytes) chunks of the file from one another Stephan Sigg Information Network Systems 60
62 Peer-to-peer networks P2P file distribution BitTorrent Each torrent has an infrastructure node tracker at which new peers join Each peer periodically informs the tracker that it is still in the torrent When peer enters torrent, it is assigned IP addresses of a set of peers Peer then establishes TCP connections with assigned peers (neighbours) Stephan Sigg Information Network Systems 61
63 Peer-to-peer networks P2P file distribution BitTorrent Neighbours are periodically asked for their already downloaded chunks From missing chunks, rarest are downloaded first and those neighbours are provided with own data that forward data at the highest rate Four peers feeding at highest rates are sent chunks they require (recalculation each 10 seconds) Every 30 seconds, one additional neighbour is chosen at random to be provided with chunks Peers capable of uploading at compatible rates tend to find each other Stephan Sigg Information Network Systems 62
64 Peer-to-peer networks Distributed Hash Table (DHT) Store a database of (key,value)-pairs Each peer will hold only a small subset of all (key,value)-pairs Peers could be organised in a circular fashion Each peer stores (key-value)-pairs for which the key is bigger than the ID of its predecessor and smaller or equal to its own ID Stephan Sigg Information Network Systems 63
65 Peer-to-peer networks Distributed Hash Table (DHT) Values derived by iterative search Robust against dying peers when several successor addresses are stored Stephan Sigg Information Network Systems 64
66 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 65
67 The application layer HTTP FTP Conclusion Comoputer Networking A Top-Down Approach J.F. Kurose and K.W. Ross 6th edition, 2012 Pearson study Addison-Wesley ISBN: Stephan Sigg Information Network Systems 66 DNS P2P
68 Conclusion Do you have any questions? Stephan Sigg Stephan Sigg Information Network Systems 67
Application Layer Protocols
Application Layer Protocols Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan Email: ihsan.ullah.cs@gmail.com These slides are adapted from the slides accompanying
More informationCS4/MSc Computer Networking. Lecture 3: The Application Layer
CS4/MSc Computer Networking Lecture 3: The Application Layer Computer Networking, Copyright University of Edinburgh 2005 Network Applications Examine a popular network application: Web Client-server architecture
More informationChapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP
Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming
More informationNetworking: Application layer
ing: Application layer Comp Sci 3600 Security Outline 1 2 3 4 5 6 7 Classic text-based that became popular in the 1970s and 1980s: text email, remote access to computers, file transfers, and newsgroups.
More informationWWW: the http protocol
Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC
More informationElectronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol
SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail
More informationApplication Layer. Pure P2P architecture. Client-server architecture. Processes communicating. Hybrid of client-server and P2P. Creating a network app
Application Layer e- web instant messaging remote login P2P file sharing multi- network games streaming stored video (YouTube) voice over IP real-time video conferencing cloud computing Creating a network
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationFTP. Mail. File Transfer Protocol (FTP) FTP commands, responses. Electronic Mail. TDTS06: Computer Networks
TDTS0: Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se FTP Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides
More informationLecture 7 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 7 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts
More informationChapter 2: Application layer
Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with TCP 2.8 Socket
More informationNetwork Applications Principles of Network Applications
Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the
More informationChapter 2 part B: outline
Chapter 2 part B: outline 2.3 FTP 2.4 electronic, POP3, IMAP 2.5 DNS Application Layer 2-1 FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content
More informationDNS and HTTP. A High-Level Overview of how the Internet works
DNS and HTTP A High-Level Overview of how the Internet works Adam Portier Fall 2017 How do I Google? Smaller problems you need to solve 1. Where is Google? 2. How do I access the Google webpage? 3. How
More informationChapter 2 Application Layer
Chapter 2 Application Layer Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Application Layer 1 Chapter 2: Application layer 2.1 Principles
More informationReview of Previous Lecture
Review of Previous Lecture Network access and physical media Internet structure and ISPs Delay & loss in packet-switched networks Protocol layers, service models Some slides are in courtesy of J. Kurose
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More informationCSC 4900 Computer Networks:
CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols
More informationCMSC 332 Computer Networking Web and FTP
CMSC 332 Computer Networking Web and FTP Professor Szajda CMSC 332: Computer Networks Project The first project has been posted on the website. Check the web page for the link! Due 2/2! Enter strings into
More informationApplication Layer. Pure P2P architecture. Client-server architecture. Processes communicating. Hybrid of client-server and P2P. Creating a network app
Application Layer e- web instant messaging remote login PP file sharing multi- network games streaming stored video (YouTube) voice over IP real-time video conferencing cloud computing Creating a network
More informationApplication layer. Some network apps. Client-server architecture. Hybrid of client-server and P2P. Pure P2P architecture. Creating a network app
Application layer Some network apps e- web instant messaging remote login P2P file sharing multi- network games streaming stored video (YouTube) voice over IP real-time video conferencing cloud computing
More informationApplication Layer: , DNS
Application Layer: E-mail, DNS EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 22-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic
More informationApplication Layer: HTTP
Application Layer: HTTP EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 23-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic
More informationLecture 6 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts
More informationCC451 Computer Networks
CC451 Computer Networks Lecture 4 Application Layer (cont d) Application Layer 1 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3,
More informationApplications & Application-Layer Protocols: (SMTP) and DNS
CS 312 Internet Concepts Applications & Application-Layer Protocols: E (SMTP) and DNS Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs312-f11
More informationChapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Chapter 2: Application Layer Our goals: conceptual, implementation
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More informationApplication Layer Introduction; HTTP; FTP
Application Layer Introduction; HTTP; FTP Tom Kelliher, CS 325 Feb. 4, 2011 1 Administrivia Announcements Assignment Read 2.4 2.6. From Last Time Packet-switched network characteristics; protocol layers
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationLecture 05: Application Layer (Part 02) Domain Name System. Dr. Anis Koubaa
NET 331 Computer Networks Lecture 05: Application Layer (Part 02) Domain Name System Dr. Anis Koubaa Reformatted slides from textbook Computer Networking a top-down appraoch, Fifth Edition by Kurose and
More informationNetworking. Layered Model. DoD Model. Application Layer. ISO/OSI Model
Networking Networking is concerned with the physical topology of two or more communicating entities and the logical topology of data transmission. Layered Model Systems communicate over a shared communication
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.5 Chapter 2: outline 2.1 principles of network applications app architectures
More informationChapter 2. Application Layer
Chapter 2 Application Layer 2.1. 2-1 INTRODUCTION - The application layer provides services to the user - Communication is provided using a logical connection means that the two application layers assume
More informationSCS3004 Networking Technologies Application Layer Protocols
SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:
More informationInternet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!
Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams
More informationECE697AA Lecture 2. Today s lecture
ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo
More informationApplication Layer. Applications and application-layer protocols. Goals:
Application Layer Goals: Conceptual aspects of network application protocols Client paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS 1 Applications
More informationCOMPUTER NETWORK. Homework #1. Due Date: March 29, 2017 in class
Computer Network Homework#1 COMPUTER NETWORK Homework #1 Due Date: March 29, 2017 in class Question 1 What is the role of HTTP in a network application? What other components are needed to complete a Web
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Application Layer: Cookies, Web Caching, SMTP Sec 2.2.4-2.4 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2013 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project 1 Python HTTP Server Work day: Next Tuesday (Sept 24 th ) Due Thursday, September 26 th by 11:55pm
More informationLayered Model. DoD Model. ISO/OSI Model
Data Communications vs Networking (later) Communication is concerned with the transmission of data over a communication medium/channel between two entities. Here we are more concerned about EE issues such
More informationComputer Networking. Chapter #1. Dr. Abdulrhaman Alameer
Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among
More informationComputer Networks COMPUTER NETWORKS
SEMESTER V COMPUTER NETWORKS Subject Code IA Marks 20 Number of Lecture Hours/Week 4 Exam Marks 80 Total Number of Lecture Hours 50 Exam Hours 03 CREDITS 04 Course objectives: This course will enable students
More informationApplication Layer: P2P File Distribution
Application Layer: P2P File Distribution EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP
More informationCSEN 404 Introduction to Networks. Mervat AbuElkheir Mohamed Abdelrazik. ** Slides are attributed to J. F. Kurose
CSEN 404 Introduction to Networks Mervat AbuElkheir Mohamed Abdelrazik ** Slides are attributed to J. F. Kurose HTTP Method Types HTTP/1.0 GET POST HEAD asks server to leave requested object out of response
More informationLecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications
Internet and Intranet Protocols and Applications Lecture 7b: HTTP Feb. 24, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu WWW - HTTP/1.1 Web s application layer protocol
More informationApplication-layer Protocols
Application-layer Protocols Kai Shen application transport data link physical Network Applications and Application-Layer Protocols application transport data link physical application transport data link
More informationInformation Network I: The Application Layer. Doudou Fall Internet Engineering Laboratory Nara Institute of Science and Technique
Information Network I: The Application Layer Doudou Fall Internet Engineering Laboratory Nara Institute of Science and Technique Outline Domain Name System World Wide Web and HTTP Content Delivery Networks
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet
More informationChapter 1 Introduction
Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Slides adopted from original ones provided by the textbook authors. Introduction
More informationWeb, HTTP and Web Caching
Web, HTTP and Web Caching 1 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/ model client: browser that requests, receives, displays Web objects : Web sends objects
More informationApplication Protocols and HTTP
Application Protocols and HTTP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #0 due
More informationCCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols
CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #1 Assigned today Due in one week Application layer: DNS, HTTP, protocols Recommend you start early
More informationChapter 2 Application Layer
Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Some network apps e-mail web text messaging remote
More informationApplication Layer Chapter 2
Application Layer Chapter 2 Silvia Giordano SUPSI CH-6928 Manno silvia.giordano@supsi.ch http://www.supsi.ch SUPSI-DTI Silvia Giordano 10/06/2004 Application Layer 1 Chapter goals: learn about protocols
More informationThe Application Layer: Sockets, DNS
The Application Layer: Sockets, DNS CS 352, Lecture 3 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 App-layer protocol Types of messages exchanged, e.g., request, response Message format:
More information2. Introduction to Internet Applications
2. Introduction to Internet Applications 1. Representation and Transfer 2. Web Protocols 3. Some Other Application Layer Protocols 4. Uniform Resource Identifiers (URIs) 5. Uniform Resource Locators (URLs)
More informationChapter 2. Application Layer. 2: Application Layer 1
Chapter 2 Application Layer 2: Application Layer 1 Some network apps e-mail web instant messaging remote login P2P file sharing multi-user network games streaming stored video clips voice over IP real-time
More informationChapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP
Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming with UDP and TCP Application
More informationCS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.
CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail SMTP, POP3, IMAP DNS
More informationApplication Layer: The Web and HTTP Sec 2.2 Prof Lina Battestilli Fall 2017
CSC 401 Data and Computer Communications Networks Application Layer: The Web and HTTP Sec 2.2 Prof Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network applications 2.2
More informationCSC358 Week 2. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved
CSC358 Week 2 Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Logistics Tutorial this Friday Assignment 1 will be out shortly
More informationComputer Network 2015 Mid-Term Exam.
Computer Network 2015 Mid-Term Exam. Question : ``Basic of Computer Networks and the Internet' Please fill into the blanks (15%) a) The amount of time required to push all of a packet s bits into a link
More informationInformation Network Systems The network layer. Stephan Sigg
Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More informationLecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa
NET 331 Computer Networks Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa Reformatted slides from textbook Computer Networking a top-down appraoch, Fifth
More informationChapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0
Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application
More informationNetworks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35
Networks, WWW, HTTP Web Technologies I. Zsolt Tóth University of Miskolc 2018 Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP 2018 1 / 35 Table of Contents Networks Internet 1 Networks Internet
More informationCS348: Computer Networks (SMTP, POP3, IMAP4); FTP
CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange
More informationChapter 2 Application Layer. Lecture 5 DNS. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 2 Application Layer Lecture 5 DNS Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles
More informationApplications & Application-Layer Protocols: The Web & HTTP
CPSC 360 Network Programming Applications & Application-Layer Protocols: The Web & HTTP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360
More informationCMSC 332 Computer Networks P2P and Sockets
CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that
More informationApplications. Chong-kwon Kim. Running in end systems (hosts) over transport layer protocols Ex: , Web, FTP, instant messaging
Applications Chong-kwon Kim Applications Network applications Running in end systems (hosts) over transport layer protocols Ex: e-mail, Web, FTP, instant messaging Application layer protocols Define app.
More informationTraditional Internet Applications
Traditional Internet Applications Asst. Prof. Chaiporn Jaikaeo, Ph.D. chaiporn.j@ku.ac.th http://www.cpe.ku.ac.th/~cpj Computer Engineering Department Kasetsart University, Bangkok, Thailand Adapted from
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationPLEASE READ CAREFULLY BEFORE YOU START
Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination
More informationThe Application Layer: & SMTP
The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,
More informationCN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.
CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server
More informationApplication Layer: OSI and TCP/IP Models
Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service
More informationFoundations of Telematics
Foundations of Telematics Chapter 2 Application Layer Principles of network applications Important application protocols Using sockets Acknowledgement: These slides have been prepared by J.F. Kurose and
More informationReview for Internet Introduction
Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of
More informationHyperText Transfer Protocol
Outline Introduce Socket Programming Domain Name Service (DNS) Standard Application-level Protocols email (SMTP) HTTP HyperText Transfer Protocol Defintitions A web page consists of a base HTML-file which
More informationChapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach
Chapter 2 Application Layer Lecture 4: principles of network applications Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter
More informationChapter 2: Application layer
Chapter 2 Application Layer A note on the use of these ppt slides: Were making these slides freely available to all (faculty, students, readers). Theyre in PowerPoint form so you can add, modify, and delete
More informationEECS 3214: Computer Network Protocols and Applications
EECS 3214: Computer Network Protocols and Applications Suprakash Datta Course page: http://www.eecs.yorku.ca/course/3214 Office: LAS 3043 Email: datta [at] cse.yorku.ca These slides are adapted from Jim
More informationChapter 2: Application layer
Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming
More informationCOMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ
COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer
More informationComputer Engineering II Solution to Exercise Sheet Chapter 4
Distributed Computing FS 2018 Prof. R. Wattenhofer Computer Engineering II Solution to Exercise Sheet Chapter 4 1 Quiz Questions a) A user provides his login credentials. The server then returns a cookie
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10
EE 586 Communication and Switching Networks (Fall 2010) Lecture 10 September 17 2010 1-1 Announcement Send me your group and get group ID HW3 (short) out on Monday Personal leave for next two weeks No
More informationApplications & Application-Layer Protocols: FTP and (SMTP & POP)
COMP 431 Internet Services & Protocols Applications & Application-Layer Protocols: FTP and E ( & POP) Jasleen Kaur February 7, 2019 Application-Layer Protocols Outline Example client/ systems and their
More informationComputer Networking: Applications George Blankenship. Applications George Blankenship 1
CSCI 232 Computer Networking: Applications i George Blankenship Applications George Blankenship 1 TCP/IP Applications The user of TCP/IP transport (TCP/UDP) is an application, the top level lof the TCP/IP
More informationLecture 6: Application Layer Web proxies, , and SMTP
Lecture 6: Application Layer Web proxies, Email, and SMTP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationComputer Networks Unit I Application layer (2012 pattern)
Computer Networks Unit I Application layer (2012 pattern) By Prof. B.A.Khivsara Assistant Prof. Department of Computer Engg. SNJB s KBJ COE, Chandwad Introduction 1-1 Chapter 1: Introduction What is Internet?
More informationChapter 2: Application Layer
Chapter 2: Application Layer Course on Computer Communication and Networks, CTH/GU The slides are adaptation of the slides made available by the authors of the course s main textbook: Computer Networking:
More informationChapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP
Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 1 Application-Layer Protocol Topic Approval PAST DUE Presentations Sept 22 nd, Sept 29 th, Oct
More informationLecture 2 - Application Layer. Lecture 1 Review. Application Layer. Principles of network applications. Notes. Notes. Notes. Notes
Lecture 2 - Application Layer Networks and Security Jacob Aae Mikkelsen IMADA September 9, 2013 September 9, 2013 1 / 101 Lecture 1 Review Explain in short the following terms Protocol Network Edge Network
More information