Information Network Systems The application layer. Stephan Sigg

Size: px
Start display at page:

Download "Information Network Systems The application layer. Stephan Sigg"

Transcription

1 Information Network Systems The application layer Stephan Sigg Tokyo, November 15, 2012

2 Introduction Introduction to the internet The link layer The network layer The network layer The transport layer The application layer Network management Security and cryptography Wireless and Mobile Networks (1) Wireless and Mobile Networks (2) Multimedia networking (1) Multimedia networking (2) Security in computer networks Content centric networking Stephan Sigg Information Network Systems 2

3 The application layer HTTP FTP Introduction IP stack Application Transport Network Link Physical Stephan Sigg Information Network Systems 3 DNS P2P

4 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 4

5 The application layer We distinguish between two main architectures for the application layer Client-server architecture Peer-to-peer architecture Stephan Sigg Information Network Systems 5

6 The application layer Client-server architecture Server host services requests from client hosts Clients do not directly communicate with each other but via a server Server typically has a fixed well-known IP address and can thus always be contacted E.g. Web, FTP, Telnet, Stephan Sigg Information Network Systems 6

7 The application layer P2P architecture Minimal or no reliance on dedicated servers Direct Communication between pairs of connected hosts (peers) E.g. BitTorrent, Xunlei, Skype, Kankan, PPstream P2P networks are self-scalable since each peer adds not only adds workload but further capacity Stephan Sigg Information Network Systems 7

8 The application layer Sockets Two applications communicate via sockets Application Program Interface (API) between application and network The application has little control (and trouble) with the transport-layer as this is controlled by the socket Stephan Sigg Information Network Systems 8

9 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 9

10 Hyper Text Transfer Protocol HTTP is implemented in a client program and a server program These programs talk to each other by exchanging HTTP messages Many webpages consist of a base HTML file and several objects referenced by their Uniform resource locator (URL) Stephan Sigg Information Network Systems 10

11 Hyper Text Transfer Protocol URL Protocol Hostname in the WWW /somedepartment/ Path name to the object location /picture.gif Filename of the object Stephan Sigg Information Network Systems 11

12 Hyper Text Transfer Protocol Persistent and non persistent connections HTTP uses TCP as its transport protocol Default port: 80 We can distinguish HTTP connections as being either Persistent Non-persistent Stephan Sigg Information Network Systems 12

13 Hyper Text Transfer Protocol Non-Persistent connections A new TCP connection is established each time new data is requested Most contemporary browsers open 5 to 10 parallel TCP connections handling separate request-response transactions Overhead through TCP Connection establishing Stephan Sigg Information Network Systems 13

14 Hyper Text Transfer Protocol An example connection 1. HTTP client initiates connection with server on port 80. A socket is created at both client and server 2. HTTP client sends an HTTP request message to the server including /somedepartment/index.html 3. HTTP server retrieves the object /somedepartment/index.html from its storage and sends it in an HTTP response message 4. HTTP server tells TCP to close connection 5. HTTP client receives the response message and extracts URLs of further elements (e.g. images) 6. For each further element, the steps 1-4 are repeated Stephan Sigg Information Network Systems 14

15 Hyper Text Transfer Protocol Persistent connections Once established connection is maintained for each requested object Default mode of HTTP HTTP server closes a connection when it is not used for a certain time Reduced delay since the connection has to be established only once Stephan Sigg Information Network Systems 15

16 Hyper Text Transfer Protocol HTTP request message Message transmitted in ASCII text Methods: GET (Obtain object at specified address). GET /somedepartment/index.html HTTP/1.1 Host: someschool.edu Connection: close User-agent: Mozilla/5.0 Accept-language: jp. Stephan Sigg Information Network Systems 16

17 Hyper Text Transfer Protocol HTTP request message Message transmitted in ASCII text Methods: POST (Request of a website with specific input to form-fields) POST /wiki/spezial:search HTTP/1.1. Host: de.wikipedia.org Content-Type: application/x-www-form-urlencoded Content-Length: 24 search=katzen&go=artikel. Stephan Sigg Information Network Systems 17

18 Hyper Text Transfer Protocol HTTP request message Message transmitted in ASCII text Methods: HEAD (Reply with empty message (e.g. debugging)). HEAD /bit/archives.zip.torrent HTTP/1.1 Host: Stephan Sigg Information Network Systems 18

19 Hyper Text Transfer Protocol HTTP request message Message transmitted in ASCII text Methods: PUT (Store object at specific path). PUT /repositories/directory HTTP/1.1 Host: localhost Content-Type: application/xml;charset=utf-8 [XML ENCODED DATA]. Stephan Sigg Information Network Systems 19

20 Hyper Text Transfer Protocol HTTP request message Message transmitted in ASCII text Methods: DELETE (Delete object at specified path on the server). DELETE /repositories/directory HTTP/1.1 Host: localhost. Stephan Sigg Information Network Systems 20

21 Hyper Text Transfer Protocol HTTP response message HTTP/ OK Connection: close. DATE: Fri, 10 Aug :44:04 GMT Server: Apache (CentOS) Last-modified: Fri, 10 Aug :44:04 GMT Content-Length: 6823 Content-Type: text/html data...data...data.... Stephan Sigg Information Network Systems 21

22 Hyper Text Transfer Protocol HTTP response message Status messages 200 OK: Request succeeded and information is returned in response 301 Moved Permanently: Object has permanently moved, new URL specified in Location: header of response message 400 Bad Request: Request not understood by server 404 Not Found: Requested document not on this server 505 HTTP Version not Supported Requested HTTP protocol version not supported Stephan Sigg Information Network Systems 22

23 Hyper Text Transfer Protocol Cookies HTTP is a stateless protocol since it does not track the states of clients. To identify users, cookies are frequently utilised Can be used to create a user session layer on top of stateless HTTP Components: 1. Cookie header line in HTTP response message 2. Cookie header line in HTTP request message 3. Cookie file kept on the users end system managed by the browser 4. Back-end database at the web site Stephan Sigg Information Network Systems 23

24 Hyper Text Transfer Protocol Cookies 1. At first contact from a user, Web server creates unique identification number and new corresponding entry in back-end database 2. Web server responds including in the HTTP response a set-cookie: header containing the identification number 3. Receiving browser appends a line to its special cookie file including hostname of server and identification number of cookie. 4. With each follow-up contact with this web server, the browser will send the header line Cookie: with the identification number Stephan Sigg Information Network Systems 24

25 Hyper Text Transfer Protocol Stephan Sigg Information Network Systems 25

26 Hyper Text Transfer Protocol Proxy server (Web cache) A proxy server is a network entity that satisfies HTTP requests on behalf of an origin web server Has own disk storage to keep copies of recently requested objects Browser can be configured to send all HTTP requests first to proxy. Potentially reduces traffic and response time Stephan Sigg Information Network Systems 26

27 Hyper Text Transfer Protocol 1. Browser establishes TCP connection to proxy server and sends HTTP request 2. Proxy server checks whether copy of object is within the local cache. 3. If not, it opens TCP connection to origin server to obtain the object 4. At receiving the object, the proxy server stores it into the local cache and sends an HTTP response message to the client browser Stephan Sigg Information Network Systems 27

28 Hyper Text Transfer Protocol The conditional GET How should the proxy server learn of a stale object in its cache? HTTP defines a conditional GET to verify the validity of an object. Request message uses the GET method and includes If-Modified-Since: header GET /fruit/kiwi.gif HTTP/1.1 Host: If-modified-since: Wed, 7 Sep :23:24 Web server then either answers with the modified page or with an empty HTTP response containing the Not Modified header Stephan Sigg Information Network Systems 28

29 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 29

30 File Transfer Protocol (FTP) File Transfer over a TCP connection Stephan Sigg Information Network Systems 30

31 File Transfer Protocol (FTP) File Transfer over a TCP connection FTP uses two parallel TCP Connections to transfer a file Control connection Used for sending control information between the two hosts (user identification, password, commands to change remote directory, put or get files) Data connection Transmit file Stephan Sigg Information Network Systems 31

32 File Transfer Protocol (FTP) File Transfer over a TCP connection 1. When a user starts FTP session, control TCP connection is established first on server port number 21. User ID and password are sent over the TCP connection. 2. Server initiates TCP data connection to client side. FTP sends exactly one file over the data connection and then closes the connection while the control connection remains open Server maintains state about the user during the session to associate a control connection with each specific user Stephan Sigg Information Network Systems 32

33 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 33

34 Electronic Mail in the Internet Electronic mail One of the most utilised applications in the Internet Asynchronous communication Communication between mail servers using SMTP protocol (not between hosts directly) Stephan Sigg Information Network Systems 34

35 Electronic Mail in the Internet Simple Mail Transfer Protocol SMTP transfers messages from the senders mail server to the recipients mail server Body and header must be 7-bit ASCII TCP connection between SMTP servers Stephan Sigg Information Network Systems 35

36 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 36

37 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 37

38 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 38

39 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 39

40 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 40

41 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 41

42 Electronic Mail in the Internet Talk to an SMTP server C: telnet servername 25 S: 220 *********************** C: HELO crepes.fr S: 250 Hello Task crepes.fr, Write an pleased tovia meet telnet you C: MAIL FROM: Connect to your server via telnet to compose S: 250 Sender ok C: RCPT TO: send S: 250 Recipient ok C: DATA S: 354 Enter mail, end with. on a line by itself C: Hello Stephan C: Just writing a short C:. S: 250 Message queued for delivery C: QUIT S: Bye... Stephan Sigg Information Network Systems 41

43 Electronic Mail in the Internet User agents SMTP server usually accessed by user agent (e.g. POP3, IMAP, HTML) Post Office Protocol Version 3 (POP3) Simple mail access protocol TCP connection with the mail server on port 110 Three phases of a POP3 session Auhorisation (Username and password) Transaction (retrieving of messages and/or message deletion) Update (After the client has quit the connection, the mail server deletes the messages marked for deletion) Stephan Sigg Information Network Systems 42

44 Electronic Mail in the Internet User agents SMTP server usually accessed by user agent (e.g. POP3, IMAP, HTML) Internet Mail Access Protocol (IMAP) Provides additional commands to create remote folders and assign messages to them Server will associate each message with a folder Allows to transmit only parts of a message (e.g. Header only) Stephan Sigg Information Network Systems 43

45 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 44

46 Domain Name System (DNS) DNS Internet hosts can be identified either by their hostname or their IP address Hostname IP address DNS is a directory service that maps IP addresses to hostnames Stephan Sigg Information Network Systems 45

47 Domain Name System (DNS) DNS 1. Browser extracts from an URL the hostname and passes this to the client side of the DNS application (running on the host machine) 2. The DNS client sends a query containing the hostname to a DNS server 3. Eventually, the DNS client receives a reply with the IP address for the hostname 4. With this IP address, the browser can now initiate a TCP connection the the HTTP server process on port 80 Stephan Sigg Information Network Systems 46

48 Domain Name System (DNS) Further DNS services Host aliasing A hostname such as might have several aliases such as google.com is the canonical hostname DNS can provide the canonical hostname and its IP address when supplied with an alias hostname Stephan Sigg Information Network Systems 47

49 Domain Name System (DNS) Further DNS services Mail server aliasing The MX record permits a company s mail server and web server to have the same hostnames. Therefore, DNS can provide the canonical host name for an server provided with the alias address Stephan Sigg Information Network Systems 48

50 Domain Name System (DNS) Further DNS services Load distribution DNS also performs load distribution among replicated servers. Busy sites are replicated over multiple servers each running on different end systems and having different IP addresses With each reply for this alias address, the DNS server will rotate the distribution of the traffic among replicated servers Stephan Sigg Information Network Systems 49

51 Domain Name System (DNS) DNS: A distributed, hierarchical database DNS uses a large number of hierarchically organised servers No single DNS server has all of the mappings for all of the hosts in the Internet Stephan Sigg Information Network Systems 50

52 Domain Name System (DNS) DNS root servers Stephan Sigg Information Network Systems 51

53 Domain Name System (DNS) Root DNS servers 13 Root DNS servers in the Internet Each server Root server is actually a network of replicated servers Alltogether, 247 servers make the Root servers of the internet Stephan Sigg Information Network Systems 52

54 Domain Name System (DNS) Top-level domain (TLD) servers Responsible for top-level domains e.g. com, org, net, edu, gov country specific such as gov, jp, fr, de Stephan Sigg Information Network Systems 53

55 Domain Name System (DNS) Authoritative DNS servers Each organisation with publicly accessible hosts (e.g. web servers and mail servers) must provide publicly accessible DNS records that map names of those hosts to IP addresses These are hosted in the organisations authoritative DNS server Alternatively, the organisation can pay a service provider to store the entries in one of its DNS servers Stephan Sigg Information Network Systems 54

56 Domain Name System (DNS) Iterative and recursive interaction with DNS servers Stephan Sigg Information Network Systems 55

57 Domain Name System (DNS) Recursive interaction with DNS servers Stephan Sigg Information Network Systems 56

58 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 57

59 Peer-to-peer networks A P2P network has minium or no reliance on always-on servers Pairs of intermittently connected hosts (peers) communicate directly Examples: P2P File distribution P2P Distributed Hash Table Stephan Sigg Information Network Systems 58

60 Peer-to-peer networks P2P file distribution Distribution of a large file to a great number of hosts In server-based implementation, enormous burden on the server, consuming large amount of server bandwidth In P2P file distribution, distributed peers share the load for distributing the file. Stephan Sigg Information Network Systems 59

61 Peer-to-peer networks P2P file distribution BitTorrent Collection of all peers distributing a particular file is called torrent Peers in a torrent download equal-sized (e.g. 256 KBytes) chunks of the file from one another Stephan Sigg Information Network Systems 60

62 Peer-to-peer networks P2P file distribution BitTorrent Each torrent has an infrastructure node tracker at which new peers join Each peer periodically informs the tracker that it is still in the torrent When peer enters torrent, it is assigned IP addresses of a set of peers Peer then establishes TCP connections with assigned peers (neighbours) Stephan Sigg Information Network Systems 61

63 Peer-to-peer networks P2P file distribution BitTorrent Neighbours are periodically asked for their already downloaded chunks From missing chunks, rarest are downloaded first and those neighbours are provided with own data that forward data at the highest rate Four peers feeding at highest rates are sent chunks they require (recalculation each 10 seconds) Every 30 seconds, one additional neighbour is chosen at random to be provided with chunks Peers capable of uploading at compatible rates tend to find each other Stephan Sigg Information Network Systems 62

64 Peer-to-peer networks Distributed Hash Table (DHT) Store a database of (key,value)-pairs Each peer will hold only a small subset of all (key,value)-pairs Peers could be organised in a circular fashion Each peer stores (key-value)-pairs for which the key is bigger than the ID of its predecessor and smaller or equal to its own ID Stephan Sigg Information Network Systems 63

65 Peer-to-peer networks Distributed Hash Table (DHT) Values derived by iterative search Robust against dying peers when several successor addresses are stored Stephan Sigg Information Network Systems 64

66 Outline The application layer Hyper Text Transfer Protocol File Transfer Protocol Electronic mail Domain Name Service (DNS) Peer-to-peer networks Stephan Sigg Information Network Systems 65

67 The application layer HTTP FTP Conclusion Comoputer Networking A Top-Down Approach J.F. Kurose and K.W. Ross 6th edition, 2012 Pearson study Addison-Wesley ISBN: Stephan Sigg Information Network Systems 66 DNS P2P

68 Conclusion Do you have any questions? Stephan Sigg Stephan Sigg Information Network Systems 67

Application Layer Protocols

Application Layer Protocols Application Layer Protocols Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan Email: ihsan.ullah.cs@gmail.com These slides are adapted from the slides accompanying

More information

CS4/MSc Computer Networking. Lecture 3: The Application Layer

CS4/MSc Computer Networking. Lecture 3: The Application Layer CS4/MSc Computer Networking Lecture 3: The Application Layer Computer Networking, Copyright University of Edinburgh 2005 Network Applications Examine a popular network application: Web Client-server architecture

More information

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming

More information

Networking: Application layer

Networking: Application layer ing: Application layer Comp Sci 3600 Security Outline 1 2 3 4 5 6 7 Classic text-based that became popular in the 1970s and 1980s: text email, remote access to computers, file transfers, and newsgroups.

More information

WWW: the http protocol

WWW: the http protocol Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC

More information

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail

More information

Application Layer. Pure P2P architecture. Client-server architecture. Processes communicating. Hybrid of client-server and P2P. Creating a network app

Application Layer. Pure P2P architecture. Client-server architecture. Processes communicating. Hybrid of client-server and P2P. Creating a network app Application Layer e- web instant messaging remote login P2P file sharing multi- network games streaming stored video (YouTube) voice over IP real-time video conferencing cloud computing Creating a network

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

FTP. Mail. File Transfer Protocol (FTP) FTP commands, responses. Electronic Mail. TDTS06: Computer Networks

FTP. Mail. File Transfer Protocol (FTP) FTP commands, responses. Electronic Mail. TDTS06: Computer Networks TDTS0: Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se FTP Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides

More information

Lecture 7 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 7 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 7 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with TCP 2.8 Socket

More information

Network Applications Principles of Network Applications

Network Applications Principles of Network Applications Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the

More information

Chapter 2 part B: outline

Chapter 2 part B: outline Chapter 2 part B: outline 2.3 FTP 2.4 electronic, POP3, IMAP 2.5 DNS Application Layer 2-1 FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content

More information

DNS and HTTP. A High-Level Overview of how the Internet works

DNS and HTTP. A High-Level Overview of how the Internet works DNS and HTTP A High-Level Overview of how the Internet works Adam Portier Fall 2017 How do I Google? Smaller problems you need to solve 1. Where is Google? 2. How do I access the Google webpage? 3. How

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Application Layer 1 Chapter 2: Application layer 2.1 Principles

More information

Review of Previous Lecture

Review of Previous Lecture Review of Previous Lecture Network access and physical media Internet structure and ISPs Delay & loss in packet-switched networks Protocol layers, service models Some slides are in courtesy of J. Kurose

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

CSC 4900 Computer Networks:

CSC 4900 Computer Networks: CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols

More information

CMSC 332 Computer Networking Web and FTP

CMSC 332 Computer Networking Web and FTP CMSC 332 Computer Networking Web and FTP Professor Szajda CMSC 332: Computer Networks Project The first project has been posted on the website. Check the web page for the link! Due 2/2! Enter strings into

More information

Application Layer. Pure P2P architecture. Client-server architecture. Processes communicating. Hybrid of client-server and P2P. Creating a network app

Application Layer. Pure P2P architecture. Client-server architecture. Processes communicating. Hybrid of client-server and P2P. Creating a network app Application Layer e- web instant messaging remote login PP file sharing multi- network games streaming stored video (YouTube) voice over IP real-time video conferencing cloud computing Creating a network

More information

Application layer. Some network apps. Client-server architecture. Hybrid of client-server and P2P. Pure P2P architecture. Creating a network app

Application layer. Some network apps. Client-server architecture. Hybrid of client-server and P2P. Pure P2P architecture. Creating a network app Application layer Some network apps e- web instant messaging remote login P2P file sharing multi- network games streaming stored video (YouTube) voice over IP real-time video conferencing cloud computing

More information

Application Layer: , DNS

Application Layer:  , DNS Application Layer: E-mail, DNS EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 22-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic

More information

Application Layer: HTTP

Application Layer: HTTP Application Layer: HTTP EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 23-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic

More information

Lecture 6 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts

More information

CC451 Computer Networks

CC451 Computer Networks CC451 Computer Networks Lecture 4 Application Layer (cont d) Application Layer 1 Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3,

More information

Applications & Application-Layer Protocols: (SMTP) and DNS

Applications & Application-Layer Protocols:  (SMTP) and DNS CS 312 Internet Concepts Applications & Application-Layer Protocols: E (SMTP) and DNS Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs312-f11

More information

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Chapter 2: Application Layer Our goals: conceptual, implementation

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Application Layer Introduction; HTTP; FTP

Application Layer Introduction; HTTP; FTP Application Layer Introduction; HTTP; FTP Tom Kelliher, CS 325 Feb. 4, 2011 1 Administrivia Announcements Assignment Read 2.4 2.6. From Last Time Packet-switched network characteristics; protocol layers

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Lecture 05: Application Layer (Part 02) Domain Name System. Dr. Anis Koubaa

Lecture 05: Application Layer (Part 02) Domain Name System. Dr. Anis Koubaa NET 331 Computer Networks Lecture 05: Application Layer (Part 02) Domain Name System Dr. Anis Koubaa Reformatted slides from textbook Computer Networking a top-down appraoch, Fifth Edition by Kurose and

More information

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model Networking Networking is concerned with the physical topology of two or more communicating entities and the logical topology of data transmission. Layered Model Systems communicate over a shared communication

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.5 Chapter 2: outline 2.1 principles of network applications app architectures

More information

Chapter 2. Application Layer

Chapter 2. Application Layer Chapter 2 Application Layer 2.1. 2-1 INTRODUCTION - The application layer provides services to the user - Communication is provided using a logical connection means that the two application layers assume

More information

SCS3004 Networking Technologies Application Layer Protocols

SCS3004 Networking Technologies Application Layer Protocols SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information

ECE697AA Lecture 2. Today s lecture

ECE697AA Lecture 2. Today s lecture ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo

More information

Application Layer. Applications and application-layer protocols. Goals:

Application Layer. Applications and application-layer protocols. Goals: Application Layer Goals: Conceptual aspects of network application protocols Client paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS 1 Applications

More information

COMPUTER NETWORK. Homework #1. Due Date: March 29, 2017 in class

COMPUTER NETWORK. Homework #1. Due Date: March 29, 2017 in class Computer Network Homework#1 COMPUTER NETWORK Homework #1 Due Date: March 29, 2017 in class Question 1 What is the role of HTTP in a network application? What other components are needed to complete a Web

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Application Layer: Cookies, Web Caching, SMTP Sec 2.2.4-2.4 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2013 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project 1 Python HTTP Server Work day: Next Tuesday (Sept 24 th ) Due Thursday, September 26 th by 11:55pm

More information

Layered Model. DoD Model. ISO/OSI Model

Layered Model. DoD Model. ISO/OSI Model Data Communications vs Networking (later) Communication is concerned with the transmission of data over a communication medium/channel between two entities. Here we are more concerned about EE issues such

More information

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among

More information

Computer Networks COMPUTER NETWORKS

Computer Networks COMPUTER NETWORKS SEMESTER V COMPUTER NETWORKS Subject Code IA Marks 20 Number of Lecture Hours/Week 4 Exam Marks 80 Total Number of Lecture Hours 50 Exam Hours 03 CREDITS 04 Course objectives: This course will enable students

More information

Application Layer: P2P File Distribution

Application Layer: P2P File Distribution Application Layer: P2P File Distribution EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP

More information

CSEN 404 Introduction to Networks. Mervat AbuElkheir Mohamed Abdelrazik. ** Slides are attributed to J. F. Kurose

CSEN 404 Introduction to Networks. Mervat AbuElkheir Mohamed Abdelrazik. ** Slides are attributed to J. F. Kurose CSEN 404 Introduction to Networks Mervat AbuElkheir Mohamed Abdelrazik ** Slides are attributed to J. F. Kurose HTTP Method Types HTTP/1.0 GET POST HEAD asks server to leave requested object out of response

More information

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 7b: HTTP Feb. 24, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu WWW - HTTP/1.1 Web s application layer protocol

More information

Application-layer Protocols

Application-layer Protocols Application-layer Protocols Kai Shen application transport data link physical Network Applications and Application-Layer Protocols application transport data link physical application transport data link

More information

Information Network I: The Application Layer. Doudou Fall Internet Engineering Laboratory Nara Institute of Science and Technique

Information Network I: The Application Layer. Doudou Fall Internet Engineering Laboratory Nara Institute of Science and Technique Information Network I: The Application Layer Doudou Fall Internet Engineering Laboratory Nara Institute of Science and Technique Outline Domain Name System World Wide Web and HTTP Content Delivery Networks

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Slides adopted from original ones provided by the textbook authors. Introduction

More information

Web, HTTP and Web Caching

Web, HTTP and Web Caching Web, HTTP and Web Caching 1 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/ model client: browser that requests, receives, displays Web objects : Web sends objects

More information

Application Protocols and HTTP

Application Protocols and HTTP Application Protocols and HTTP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #0 due

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #1 Assigned today Due in one week Application layer: DNS, HTTP, protocols Recommend you start early

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Some network apps e-mail web text messaging remote

More information

Application Layer Chapter 2

Application Layer Chapter 2 Application Layer Chapter 2 Silvia Giordano SUPSI CH-6928 Manno silvia.giordano@supsi.ch http://www.supsi.ch SUPSI-DTI Silvia Giordano 10/06/2004 Application Layer 1 Chapter goals: learn about protocols

More information

The Application Layer: Sockets, DNS

The Application Layer: Sockets, DNS The Application Layer: Sockets, DNS CS 352, Lecture 3 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 App-layer protocol Types of messages exchanged, e.g., request, response Message format:

More information

2. Introduction to Internet Applications

2. Introduction to Internet Applications 2. Introduction to Internet Applications 1. Representation and Transfer 2. Web Protocols 3. Some Other Application Layer Protocols 4. Uniform Resource Identifiers (URIs) 5. Uniform Resource Locators (URLs)

More information

Chapter 2. Application Layer. 2: Application Layer 1

Chapter 2. Application Layer. 2: Application Layer 1 Chapter 2 Application Layer 2: Application Layer 1 Some network apps e-mail web instant messaging remote login P2P file sharing multi-user network games streaming stored video clips voice over IP real-time

More information

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming with UDP and TCP Application

More information

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng. CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail SMTP, POP3, IMAP DNS

More information

Application Layer: The Web and HTTP Sec 2.2 Prof Lina Battestilli Fall 2017

Application Layer: The Web and HTTP Sec 2.2 Prof Lina Battestilli Fall 2017 CSC 401 Data and Computer Communications Networks Application Layer: The Web and HTTP Sec 2.2 Prof Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network applications 2.2

More information

CSC358 Week 2. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

CSC358 Week 2. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved CSC358 Week 2 Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Logistics Tutorial this Friday Assignment 1 will be out shortly

More information

Computer Network 2015 Mid-Term Exam.

Computer Network 2015 Mid-Term Exam. Computer Network 2015 Mid-Term Exam. Question : ``Basic of Computer Networks and the Internet' Please fill into the blanks (15%) a) The amount of time required to push all of a packet s bits into a link

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa

Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa NET 331 Computer Networks Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa Reformatted slides from textbook Computer Networking a top-down appraoch, Fifth

More information

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application

More information

Networks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35

Networks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35 Networks, WWW, HTTP Web Technologies I. Zsolt Tóth University of Miskolc 2018 Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP 2018 1 / 35 Table of Contents Networks Internet 1 Networks Internet

More information

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

CS348: Computer Networks  (SMTP, POP3, IMAP4); FTP CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange

More information

Chapter 2 Application Layer. Lecture 5 DNS. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 2 Application Layer. Lecture 5 DNS. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 2 Application Layer Lecture 5 DNS Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles

More information

Applications & Application-Layer Protocols: The Web & HTTP

Applications & Application-Layer Protocols: The Web & HTTP CPSC 360 Network Programming Applications & Application-Layer Protocols: The Web & HTTP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

CMSC 332 Computer Networks P2P and Sockets

CMSC 332 Computer Networks P2P and Sockets CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that

More information

Applications. Chong-kwon Kim. Running in end systems (hosts) over transport layer protocols Ex: , Web, FTP, instant messaging

Applications. Chong-kwon Kim. Running in end systems (hosts) over transport layer protocols Ex:  , Web, FTP, instant messaging Applications Chong-kwon Kim Applications Network applications Running in end systems (hosts) over transport layer protocols Ex: e-mail, Web, FTP, instant messaging Application layer protocols Define app.

More information

Traditional Internet Applications

Traditional Internet Applications Traditional Internet Applications Asst. Prof. Chaiporn Jaikaeo, Ph.D. chaiporn.j@ku.ac.th http://www.cpe.ku.ac.th/~cpj Computer Engineering Department Kasetsart University, Bangkok, Thailand Adapted from

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

The Application Layer: & SMTP

The Application Layer:  & SMTP The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,

More information

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance. CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

Foundations of Telematics

Foundations of Telematics Foundations of Telematics Chapter 2 Application Layer Principles of network applications Important application protocols Using sockets Acknowledgement: These slides have been prepared by J.F. Kurose and

More information

Review for Internet Introduction

Review for Internet Introduction Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of

More information

HyperText Transfer Protocol

HyperText Transfer Protocol Outline Introduce Socket Programming Domain Name Service (DNS) Standard Application-level Protocols email (SMTP) HTTP HyperText Transfer Protocol Defintitions A web page consists of a base HTML-file which

More information

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach Chapter 2 Application Layer Lecture 4: principles of network applications Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2 Application Layer A note on the use of these ppt slides: Were making these slides freely available to all (faculty, students, readers). Theyre in PowerPoint form so you can add, modify, and delete

More information

EECS 3214: Computer Network Protocols and Applications

EECS 3214: Computer Network Protocols and Applications EECS 3214: Computer Network Protocols and Applications Suprakash Datta Course page: http://www.eecs.yorku.ca/course/3214 Office: LAS 3043 Email: datta [at] cse.yorku.ca These slides are adapted from Jim

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming

More information

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer

More information

Computer Engineering II Solution to Exercise Sheet Chapter 4

Computer Engineering II Solution to Exercise Sheet Chapter 4 Distributed Computing FS 2018 Prof. R. Wattenhofer Computer Engineering II Solution to Exercise Sheet Chapter 4 1 Quiz Questions a) A user provides his login credentials. The server then returns a cookie

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10 EE 586 Communication and Switching Networks (Fall 2010) Lecture 10 September 17 2010 1-1 Announcement Send me your group and get group ID HW3 (short) out on Monday Personal leave for next two weeks No

More information

Applications & Application-Layer Protocols: FTP and (SMTP & POP)

Applications & Application-Layer Protocols: FTP and  (SMTP & POP) COMP 431 Internet Services & Protocols Applications & Application-Layer Protocols: FTP and E ( & POP) Jasleen Kaur February 7, 2019 Application-Layer Protocols Outline Example client/ systems and their

More information

Computer Networking: Applications George Blankenship. Applications George Blankenship 1

Computer Networking: Applications George Blankenship. Applications George Blankenship 1 CSCI 232 Computer Networking: Applications i George Blankenship Applications George Blankenship 1 TCP/IP Applications The user of TCP/IP transport (TCP/UDP) is an application, the top level lof the TCP/IP

More information

Lecture 6: Application Layer Web proxies, , and SMTP

Lecture 6: Application Layer Web proxies,  , and SMTP Lecture 6: Application Layer Web proxies, Email, and SMTP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Computer Networks Unit I Application layer (2012 pattern)

Computer Networks Unit I Application layer (2012 pattern) Computer Networks Unit I Application layer (2012 pattern) By Prof. B.A.Khivsara Assistant Prof. Department of Computer Engg. SNJB s KBJ COE, Chandwad Introduction 1-1 Chapter 1: Introduction What is Internet?

More information

Chapter 2: Application Layer

Chapter 2: Application Layer Chapter 2: Application Layer Course on Computer Communication and Networks, CTH/GU The slides are adaptation of the slides made available by the authors of the course s main textbook: Computer Networking:

More information

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 1 Application-Layer Protocol Topic Approval PAST DUE Presentations Sept 22 nd, Sept 29 th, Oct

More information

Lecture 2 - Application Layer. Lecture 1 Review. Application Layer. Principles of network applications. Notes. Notes. Notes. Notes

Lecture 2 - Application Layer. Lecture 1 Review. Application Layer. Principles of network applications. Notes. Notes. Notes. Notes Lecture 2 - Application Layer Networks and Security Jacob Aae Mikkelsen IMADA September 9, 2013 September 9, 2013 1 / 101 Lecture 1 Review Explain in short the following terms Protocol Network Edge Network

More information