UNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections

Similar documents
APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

CS321: Computer Networks FTP, TELNET, SSH

CS321: Computer Networks TELNET, SSH

Chapter 26 Remote Logging, Electronic Mail, and File Transfer 26.1

CS321: Computer Networks ELECTRONIC MAIL

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET

Configure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Network Applications Principles of Network Applications

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

SCS3004 Networking Technologies Application Layer Protocols

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

21.1 FTP. Connections

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

FTP,HTTP. By Nidhi Jindal

TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the local terminal appears to be the

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

Unit 28 Website Production ASSIGNMENT 1

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro

Different Layers Lecture 21

Chapter 2. Application Layer

CS 716: Introduction to communication networks th class; 11 th Nov Instructor: Sridhar Iyer IIT Bombay

Introduction to Networking

Application Layer: OSI and TCP/IP Models

Application-layer Protocols and Internet Services

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

CS 716: Introduction to communication networks. Instructor: Sridhar Iyer Demo by: Swati Patil IIT Bombay

TCP/IP THE TCP/IP ARCHITECTURE

13. Internet Applications 최양희서울대학교컴퓨터공학부

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model

Chapter 19. Domain Name System (DNS)

CMPE 151: Network Administration. Servers

TCP / IP. Isidro Martinez Director, Latin Amèrica

Layered Model. DoD Model. ISO/OSI Model

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

Internet Applications. Dr Steve Gordon ICT, SIIT

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol

Configuring Security Features on an External AAA Server

Objectives. Upon completion you will be able to:

Introduction to TCP/IP

Defining IPsec Networks and Customers

How to Configure Authentication and Access Control (AAA)

NT1210 Introduction to Networking. Unit 10

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Key Points for the Review

Applications. Chong-kwon Kim. Running in end systems (hosts) over transport layer protocols Ex: , Web, FTP, instant messaging

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Section 1.1: Networking Overview

Guide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services

Internet Applications II

PROGRAMMING Kyriacou E. Frederick University Cyprus. Network communication examples

Chapter 4. Internet Applications

CSCD 330 Network Programming

Avaya Port Matrix: Avaya Diagnostic Server 3.0

General Terms Node - File Permissions - file permissions file

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION

Chapter 2 Application Layer

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

Session 16 Windows 7 Professional DNS & Active Directory

Chapter 2 Network Models 2.1

CMSC 332 Computer Networking Web and FTP

Application Layer. Applications and application-layer protocols. Goals:

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Data Communication & Computer Networks MCQ S

Chapter 16 Networking

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

a. the physical layer, b. and the data-link layer. a. three physical layers, b. three data-link layers, c. and only one network layer.

Chapter 27 WWW and HTTP Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Lecture 6 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

The Data Link Layer. 32 PART I Networking Basics

TELE 301 Lecture 8: Post

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

Domains & Application Layer. Domain Names. Looking up Domain Names. .biz. .com. .info. .net. .org. Human friendly names. Part 2

Part 1: Introduction. Goal: Review of how the Internet works Overview

Exam Questions SY0-401

Oracle Health Sciences Information Gateway. 1 Introduction. Security Guide Release 2.0.1

Network+ Guide to Networks 5 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Security Digital Certificate Manager

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

System: Basic Functionality

Transport Layer Security

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

The Application Layer: & SMTP

XML Transport and Event Notifications

Index. B Big Brother, 218 BMC Patrol, 219

Configuring SSL. SSL Overview CHAPTER

Networks and Communications MS216 - Course Outline -

Configuring the Management Interface and Security

The Application Layer: SMTP, FTP

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

Chapter 6: Security of higher layers. (network security)

Computer Networks.. By Nidhi Jindal

CCNA 1 Chapter 10 v5.0 Exam Answers 2013

Configuring Switch Security

Transcription:

UNIT V Introduction to Application Layer: Introduction, Client Server Programming, WWW and HTTP,FTP, e-mail, TELNET, Secure Shell, Domain Name System, SNMP. HTTP The Hyper Text Transfer Protocol (HTTP) is used to define how the client-server programs can be written to retrieve web pages from the Web. An HTTP client sends a request; an HTTP server returns a response. The server uses the port number 80; the client uses a temporary port number. Non persistent versus Persistent Connections If the web pages, objects to be retrieved, are located on different servers, we do not have any other choice than to create a new TCP connection for retrieving each object. If some of the objects are located on the same server, we have two choices: to retrieve each object using a new TCP connection Non persistent Connections In a non persistent connection, one TCP connection is made for each request/response. The following lists the steps in this strategy: 1. The client opens a TCP connection and sends a request. 2. The server sends the response and closes the connection. 3. The client reads the data until it encounters an end-of-file marker; it then closes the connection.

Persistent Connections HTTP version 1.1 specifies a persistent connection by default. In a persistent connection, the server leaves the connection open for more requests after sending a response. The server can close the connection at the request of a client or if a time-out has been reached. The sender usually sends the length of the data with each response. Message Formats The first section in the request message is called the request line; the first section in the response message is called the status line. The other three sections have the same names in the request and response messages.

Request Message There are three fields in this line separated by one space and terminated by two characters (carriage return and line feed) FTP File Transfer Protocol (FTP) is the standard protocol provided by TCP/IP for copying a file from one host to another. Two systems may have different directory structures. All of these problems have been solved by FTP in a very simple and elegant approach. Two Connections The control connection remains connected during the entire interactive FTP session. When a user starts an FTP session, the control connection opens. While the control connection is open, the data connection can be opened and closed multiple times if several files are transferred. FTP uses two well-known TCP ports: port 21 is used for the control connection, and port 20 is used for the data connection. ELECTRONIC MAIL Electronic mail (or e-mail) allows users to exchange messages. In an application such as HTTP or FTP, the server program is running all the time, waiting for a request from a client. When the request arrives, the server provides the service. There is a request and there is a response.

In the case of electronic mail, the situation is different. First, e-mail is considered a one-way transaction The users run only client programs when they want and the intermediate servers apply the client/server paradigm. In the common scenario, the sender and the receiver of the e-mail, are connected via a LAN or a WAN to two mail servers. The administrator has created one mailbox for each user where the received messages are stored A mailbox is part of a server hard drive, a special file with permission restrictions. Only the owner of the mailbox has access to it. The administrator has also created a queue (spool) to store messages waiting to be sent. A simple e-mail use three different agents: a user agent (UA), a message transfer agent (MTA), and a message access agent (MAA). TELNET One of the original remote logging protocols is TELNET, which is an abbreviation for Terminal Network. A hacker can eavesdrop and obtain the logging name and password. Because of this security issue, the use of TELNET has diminished in favor of another protocol, Secure Shell (SSH), Local versus Remote Logging

When a user logs into a local system, it is called local logging. As a user types at a terminal or at a workstation running a terminal emulator, the keystrokes are accepted by the terminal driver. When a user wants to access an application program or utility located on a remote machine, she performs remote logging. The characters are sent to the TELNET client, which transforms the characters into a universal character set called Network Virtual Terminal (NVT) characters Network Virtual Terminal (NVT) The mechanism to access a remote computer is complex. This is because every computer and its operating system accept a special combination of characters as tokens.we is dealing with heterogeneous systems. If we want to access any remote computer in the world TELNET solves this problem by defining a universal interface called the Network Virtual Terminal (NVT) character set. The server TELNET, on the other hand, translates data and commands from NVT form into the form acceptable by the remote computer. SECURE SHELL (SSH) Secure Shell (SSH) is a secure application program that can be used today for several purposes such as remote logging and file transfer; it was originally designed to replace TELNET. There are two versions of SSH: SSH-l and SSH-2 Components

SSH Transport-Layer Protocol (SSH-TRANS) SSH first uses a protocol that creates secured channel on top of the TCP. When the procedure implementing this protocol is called, the client and server first use the TCP protocol to establish an insecure connection. SSH Authentication Protocol (SSH-AUTH) After a secure channel is established between the client and the server and the server is authenticated for the client SSH can call another procedure that can authenticate the client for the server. The client authentication process in SSH is very similar to what is done in Secure Socket Layer (SSL) The request includes the user name, server name, the method of authentication, and the required data. The server responds with either a success message, which confirms that the client is authenticated, or a failed message SSH Connection Protocol (SSH-CONN) One of the services provided by the SSH-CONN protocol is multiplexing. SSH-CONN takes the secure channel established by the two previous protocols and lets the client create multiple logical channels over it. Each channel can be used for a different purpose, such as remote logging, file transfer, and so on DOMAIN NAME SYSTEM (DNS) The host that needs mapping can contact the closest computer holding the needed information. This method is used by the Domain Name System (DNS). A user wants to use a file transfer client to access the corresponding file transfer server running on a remote host. The user knows only the file transfer server name, such as afilesource.com. Name Space A name space that maps each address to a unique name can be organized in two ways: flat or hierarchical. In a flat name space, a name is assigned to an address. A name in this space is a sequence of characters without structure. In a hierarchical name space, each name is made of several parts.

Domain Name Space Domain Name Space To have a hierarchical name space, a domain name space was designed. In this design the names are defined in an inverted-tree structure with the root at the top. Label Each node in the tree has a label, which is a string with a maximum of 63 characters. The root label is a null string (empty string). Domain Name If a label is terminated by a null string, it is called a fully qualified domain name (FQDN). If a label is not terminated by a null string, it is called a partially qualified domain name PQDN). Domain A domain is a sub tree of the domain name space. The name of the domain is the name of the node at the top of the sub tree.

Distribution of Name Space The information contained in the domain name space must be stored. However, it is very inefficient and also not reliable to have just one computer store such a huge amount of information. It is inefficient because responding to requests from all over the world places a heavy load on the system it is not reliable because any failure makes the data inaccessible. Zone Since the complete domain name hierarchy cannot be stored on a single server, it is divided among many servers. What a server is responsible for or has authority over is called a zone. The server makes a database called a zone file and keeps all the information for every node under that domain.