CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

Similar documents
CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro

Chapter 10: Application Layer

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

Unit 28 Website Production ASSIGNMENT 1

Application Layer: OSI and TCP/IP Models

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION

CCNA 1 Chapter 10 v5.0 Exam Answers 2013

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

Internet Architecture

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

1. Which OSI layers offers reliable, connection-oriented data communication services?

CCNA 1 Final Exam Answers UPDATE 2012 eg.2

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

ZENworks for Desktops Preboot Services

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

[Prof. Rupesh G Vaishnav] Page 1

2. Which two functions of the OSI model occur at layer two? (Choose two.) physical addressing encoding routing cabling media access control

Ethernet / TCP-IP - Training Suite Application level protocols

Internet Applications. Dr Steve Gordon ICT, SIIT

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

CS 716: Introduction to communication networks th class; 11 th Nov Instructor: Sridhar Iyer IIT Bombay

DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS

Network Applications Principles of Network Applications

13. Internet Applications 최양희서울대학교컴퓨터공학부

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Introduction to TCP/IP

CMPE 151: Network Administration. Servers

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol

Special expressions, phrases, abbreviations and terms of Computer Networks

Application Level Protocols

Information Network Systems The application layer. Stephan Sigg

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Introduction to Networking

WWW: the http protocol

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Lab 3.4.3: Services and Protocols

The OSI Model. Level 3 Unit 9 Computer Networks

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Cisco Cisco Certified Network Associate (CCNA)

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

Chapter 09 Network Protocols

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

Session 2. Background. Lecture Objectives

1: Review Of Semester Provide an overview of encapsulation.

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

The Applications and Gaming Tab - Port Range Forward

Application Layer Protocols

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Chapter 3 LAN Configuration

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

Comprehensive Setup Guide for TLS on ESA

Chapter 12 Network Protocols

Introduction to computer networking

CCNA Cisco Certified Network Associate CCNA (v3.0)

Objectives. Connecting with Computer Science 2

Novell. ZENworks. for Desktops 3.2 Preboot Services ADMINISTRATION

FTP,HTTP. By Nidhi Jindal

Different Layers Lecture 21

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

System Programming. Introduction to computer networks

EEC-682/782 Computer Networks I

2. Introduction to Internet Applications

Chapter 8. Network Troubleshooting. Part II

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking

Internet and Intranet Protocols and Applications

Electronic Mail (SMTP)

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Intranets 4/4/17. IP numbers and Hosts. Dynamic Host Configuration Protocol. Dynamic Host Configuration Protocol. CSC362, Information Security

Packet Tracer Simulation - TCP and UDP Communications

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model

Application-layer Protocols and Internet Services

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Chapter 7. Local Area Network Communications Protocols

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

Data Communication & Computer Networks MCQ S

Need For Protocol Architecture

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Chapter 2. Switch Concepts and Configuration. Part I

Layered Model. DoD Model. ISO/OSI Model

Need For Protocol Architecture

Guide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services

Internet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Overview. Introduction to Internet Technology Overview of Web Authoring. Internet Technology 1

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Electronic Mail Paradigm

Transcription:

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1

Objectives Functions of the three upper OSI model layers, network services to end user applications. TCP/IP Application Layer protocols and services specified by the upper layers of the OSI model. Function of TCP/IP applications - World Wide Web and email, and their related services (HTTP, DNS, SMB, DHCP, STMP/POP, Telnet). File-sharing processes that use peer-to-peer applications and the Gnutella protocol. 2

Applications The Interface Between Human and Data Networks Applications provide the means for generating and receiving data that can be transported on the network 3

Applications The Interface Between Human and Data Networks 4

Applications The Interface Between Human and Data Networks Application layer protocols: used to exchange data between programs running on the source and destination hosts. Role of applications, services and protocols: to convert communication to data that can be transferred across the data network. 5

Applications The Interface Between Human and Data Networks Applications, services and protocols play different roles in transporting data through networks 6

OSI and TCP/IP Models Presentation Layer Presentation layer primary functions: Coding and conversion of Application layer data to ensure that data from the source device can be interpreted by the appropriate application on the destination device. Compression of the data in a manner that can be decompressed by the destination device. Encryption of the data for transmission and the decryption of data upon receipt by the destination. 7

OSI and TCP/IP Models Presentation layer implementations are not typically associated with a particular protocol stack. Video standards: Motion Picture Experts Group (MPEG) - standard for video compression and coding; QuickTime - Apple Computer specification for video and audio. Graphic image formats: Graphics Interchange Format (GIF) - compression and coding standards; Joint Photographic Experts Group (JPEG) - compression and coding standards; Tagged Image File Format (TIFF) - standard coding format 2004, for Cisco Systems, graphic Inc. All rights reserved. images. 8

OSI and TCP/IP Models Session Layer creates and maintains dialogs between source and destination applications; handles the exchange of information to initiate dialogs, keep them active; restarts sessions that are disrupted or idle for a long period of time. Most applications, like web browsers or e-mail clients, incorporate functionality of the OSI layers 5, 6 and 7. 9

TCP/IP Application Layer Protocols TCP/IP Application layer protocols: provide for the exchange of user information; specify the format and control information necessary for many of the common Internet communication functions; are generally defined by Requests for Comments (RFCs); Internet Engineering Task Force maintains the RFCs as the standards for the TCP/IP suite. 10

TCP/IP Application Layer Protocols TCP/IP Application layer protocols Domain Name Service Protocol (DNS) used to resolve Internet names to IP addresses; Hypertext Transfer Protocol (HTTP) used to transfer files that make up the Web pages of the World Wide Web; Simple Mail Transfer Protocol (SMTP) used for the transfer of mail messages and attachments; Terminal Emulation Protocol (Telnet) used to provide remote access to servers and networking devices; File Transfer Protocol (FTP) - used for interactive file transfer between systems. 11

TCP/IP Application Layer Software Application layer software (processes): provide access to the network: applications and services; each application or network service uses protocols which define the standards and data formats to be used. 12

TCP/IP Application Layer Software Applications: are the software programs used to communicate over the network; Network-Aware Applications: end-user applications; implement the application layer protocols; are able to communicate directly with the lower layers of the protocol stack; examples: e-mail clients and web browsers. 13

TCP/IP Application Layer Software Application layer Services: are programs that interface with the network and prepare the data for transfer; file transfer or network print spooling - may need the assistance of Application layer services to use network resources; different types of data (text, graphics, or video) -require different network services to ensure that it is properly prepared for processing by the functions occurring at the lower layers of OSI model. 14

Application Layer Protocols 15

Application Layer Protocols Application layer protocols specify: what messages are exchanged between the source and destination hosts; syntax of the control commands; type and format of the data being transmitted; appropriate methods for error notification and recovery. 16

Client/Server Model Client/Server Model Client -device requesting the information; Server -device responding to the request; Client and server processes -in the Application layer; Application layer protocols describe the format of the requests and responses between clients and servers; require control information: - user authentication; - identification of a data file to be transferred. 17

Client/Server Model Client and server processes in data networks 18

Client/Server Model Server computer that contains information to be shared with many client systems; may require authentication of user account information. Server Daemon is described as "listening" for a request from a client; exchanges appropriate messages with the client; proceeds to send the requested data to the client in the proper format. 19

Application Layers services and protocols servers typically have multiple clients requesting information at the same time; individual client requests must be handled simultaneously and separately for the network to succeed; for each request, multiple processes may be executed. 20

Peer-to-Peer Model Peer-to-Peer Model: involves two distinct forms: peer-to-peer network design and peer-to-peer applications (P2P); Peer-to-Peer Network two or more computers are connected via a network and can share resources (such as printers and files) without having a dedicated server; every connected end device (known as a peer) can function as either aserver or a client; decentralize the resources on a network; information can be located anywhere on any connected device; it is difficult to enforce security and access policies. 21

Peer-to-Peer Networking One computer might assume the role of server for one transaction while simultaneously serving as a client for another. 22

Peer-to-Peer Applications (P2P) Peer-to-peer application (P2P) allows a device to act as both a client and a server within the same communication; every client is a server and every server a client; both can initiate a communication and are considered equal in the communication process; requires that each end device provide a user interface and run a background service; can be used on peer-topeer networks, client/server networks, and across the Internet. 23

DNS Services and Protocol Domain Name System (DNS): created for domain name to address resolution for these networks; uses a distributed set of servers to resolve the names associated with these numbered addresses. DNS protocol defines an automated service that matches resource names with the required numeric network address; includes the format for queries, responses, and data formats; uses a single format called a message; Message format: -all types of client queries and server responses; - error messages; -transfer of resource record information between servers. 24

DNS Services and Protocol Features of the DNS protocol and DNS support services 25

DNS Services and Protocol DNS is a client/server service; differs from the other client/server services. DNS client runs as a service itself (other services use a client that is an application, such as web browser, e-mail client); is called DNS resolver; supports name resolution for other network applications and other services that need it. DNS Server when configuring a network device, we provide one or more DNS Server addresses that the DNS client can use for name resolution; Internet service provider provides the addresses to use for the DNS servers. 26

DNS Services and Protocol Nslookup computer operating system utility; allows the user to manually query the name servers to resolve a given host name; can be used to troubleshoot name resolution issues; to verify the current status of the name servers. DNS server is dns-sj.cisco.com which has an address of 171.70.168.183. can type the name of a host or domain for which to get the address; Example: query for www.cisco.com. responding name server provides the address of 198.133.219.25. 27

DNS Services and Protocol DNS server provides the name resolution using the name daemon, which is often called named, (pronounced name-dee). stores different types of resource records used to resolve names; these records contain the name, address, and type of record. Record types: A -an end device address; NS -an authoritative name server; CNAME -the canonical name (or Fully Qualified Domain Name) for an alias; used when multiple services have the single network address but each service has its own entry in DNS; MX - mail exchange record; maps a domain name to a list of mail 2004, exchange Cisco Systems, Inc. All rights reserved. servers for that domain. 28

DNS Services and Protocol 29

DNS Services and Protocol Client makes a query: the server's "named" process first looks at its own records to see if it can resolve the name; if it is unable to resolve the name using its stored records, it contacts other servers in order to resolve the name; the request may be passed along to a number of servers, which can take extra time and consume bandwidth; once a match is found and returned to the original requesting server, the server temporarily stores the numbered address that matches the name in cache. 30

DNS Services and Protocol Domain Name System uses a hierarchical system to create a name database to provide name resolution; Top-level domains the root servers maintain records about how to reach the toplevel domain servers; in turn have records that point to the secondary level domain servers and so on; the different top-level domains represent: -type of organization or -country or -origin; Examples of top-level domains:.au -Australia.co -Colombia.com -a business or industry.jp -Japan.org -a non-profit organization 31

DNS Services and Protocol Second-level domain names, and below them are other lower level domains. Each domain name is a path down this inverted tree starting from the root. 32

WWW Service and HTTP Web address (or URL): URL (or Uniform Resource Locator) URI (Uniform Resource Identifier) is typed into a web browser, the web browser establishes a connection to the web service running on the server using the HTTP protocol. Web browsers: are the client applications to connect to the World Wide Web and access resources stored on a web server; web clients make connections to the server and request the desired resources; the server replies with the resources and, upon receipt, the browser interprets the data and presents it to the user; web browsers can interpret and present many data types, such as plain text or Hypertext Markup Language (HTML) 33

WWW Service and HTTP HTTP protocol and support of the delivery of web pages to the client 34

WWW Service and HTTP Hypertext Transfer Protocol (HTTP) one of the protocols in the TCP/IP suite; was originally developed to publish and retrieve HTML pages; now used for distributed, collaborative information systems; is used across the WWW for data transfer; is one of the most used application protocols; specifies a request/response protocol; defines three common message types (when a client, typically a web browser, sends a request message to a server): -message types the client uses to request the web page; -message types the server uses to respond; common message types are GET, POST, and PUT. 35

WWW Service and HTTP GET is a client request for data; a web browser sends the GET message to request pages from a web server; the server receives the GET request and responds with a status line, such as HTTP/1.1 200 OK, POST and PUT are used to send messages that upload data to the web server; POST includes the data in the message sent to the server; uploads information to the server in plain text that can be intercepted and read (HTTP is not a secure protocol) PUT uploads resources or content to the web server. Secure HTTP (HTTPS) protocol is used for accessing or posting web server information. can use authentication and encryption to secure data as it travels between the client and server. 36

WWW Service and HTTP 37

POP and SMTP protocols POP and SMTP protocols and support of e-mail services Post Office Protocol (POP) Simple Mail Transfer Protocol (SMTP) these protocols define client/server processes 38

POP and SMTP protocols Mail User Agent (MUA) or e-mail client is an application used to compose e-mail messages; allows messages to be sent and places received messages into the client's mailbox, both of which are distinct processes; can use POP in order to receive e-mail messages from an e-mail server; sending e-mail from either a client or a server uses message formats and command strings defined by the SMTP protocol. 39

POP and SMTP protocols Mail Transfer Agent (MTA) process: is used to forward e- mail; receives messages from the MUA or from another MTA on another e-mail server; determines how a message has to be forwarded to reach its destination (based on the message header). E-mail server operates two separate processes: Mail Transfer Agent (MTA) Mail Delivery Agent (MDA) 40

POP and SMTP protocols E-mail server operates two separate processes: Mail Transfer Agent (MTA) Mail Delivery Agent (MDA) Mail Delivery Agent (MDA) process: If the mail is addressed to a user whose mailbox is on the local server, the mail is passed to the MDA. 41

POP and SMTP protocols Mail Delivery Agent (MDA) accepts a piece of e-mail from a Mail Transfer Agent (MTA) and performs the actual delivery; receives all the inbound mail from the MTA and places it into the appropriate users' mailboxes; can also resolve final delivery issues: -virus scanning; -spam filtering; -return-receipt handling. most e-mail communications use the MUA, MTA, and MDA applications; there 2004, Cisco are Systems, other Inc. All rights reserved. alternatives for e-mail delivery. 42

POP and SMTP protocols POP and POP3 deliver e-mail from the e-mail server to the client (MUA); SMTP transport of e-mail between e-mail servers 43

POP and SMTP protocols POP and POP3 (Post Office Protocol, version 3) are inbound mail delivery protocols; are typical client/server protocols; deliver e-mail from the e-mail server to the client (MUA); the MDA listens for when a client connects to a server; once a connection is established, the server can deliver the e-mail to the client. Simple Mail Transfer Protocol (SMTP) governs the transfer of outbound e-mail from the sending client to the e-mail server (MDA); governs the transport of e-mail between e-mail servers (MTA); enables e-mail to be transported across data networks between different types of server and client software and makes e-mail exchange over the Internet possible. 44

POP and SMTP protocols SMTP protocol message format uses a rigid set of commands and replies; these commands support the procedures used in SMTP, such as session initiation, mail transaction, forwarding mail, verifying mailbox names, expanding mailing lists, and the opening and closing exchanges. Commands specified in the SMTP protocol: HELO -identifies the SMTP client process to the SMTP server process; EHLO -is a newer version of HELO, which includes services extensions; MAIL FROM -identifies the sender; RCPT TO -identifies the recipient; DATA -identifies the body of the message. 45

FTP Application Layer Protocol File Transfer Protocol (FTP) is commonly used Application layer protocol; was developed to allow for file transfers between a client and a server; FTP client is an application that runs on a computer that is used to push and pull files from a server running the FTP daemon (FTPd); requires two connections between the client and the server: -for commands and replies; -for the actual file transfer. 46

FTP Application Layer Protocol File Transfer Protocol (FTP) the client establishes the first connection: -to the server on TCP port 21; -is used for control traffic, consisting of client commands and server replies. the client establishes the second connection: -to the server over TCP port 20; -is used for the actual file transfer; -is created every time there is a file transferred. the file transfer can happen in the following direction: - the client can download (pull) a file from the server; - the client can upload (push) a file to the server. 47

FTP Application Layer Protocol 48

DHCP Application Layer Protocol Dynamic Host Configuration Protocol (DHCP) service enables devices on a network to obtain IP addresses and other information from a DHCP server; automates the assignment of IP addresses, subnet masks, gateway and other IP networking parameters. DHCP allows a host to obtain an IP address dynamically when it connects to the network; DHCP server is contacted and an address requested; DHCP server chooses an address from a configured range of addresses called a pool and assigns ("leases") it to the host for a set period. is preferred on larger networks, local networks, or where the user population changes frequently; is used for general purpose hosts such as end user devices; fixed addresses are used for network devices such as gateways, 2004, Cisco Systems, switches, Inc. All rights reserved. servers and printers. 49

DHCP Application Layer Protocol 50

DHCP Application Layer Protocol DHCP process DHCP-configured device boots up or connects to the network: client broadcasts a DHCP DISCOVER packet to identify any available DHCP servers on the network; DHCP server replies with a DHCP OFFER, which is a lease offer message with an assigned IP address, subnet mask, DNS server, and default gateway information as well as the duration of the lease; client may receive multiple DHCP OFFER packets if there is more than one DHCP server on the local network, so it must choose between them; client broadcasts a DHCP REQUEST packet that identifies the explicit server and lease offer that the client is accepting. A client may choose to request an address that it had previously been allocated by the server. assuming that the IP address requested by the client, or offered by the server, is still valid, the server would return a DHCP ACK message that acknowledges to the client the lease is finalized. 51

File Sharing Services and SMB Protocol Server Message Block (SMB) is a client/server file sharing protocol; IBM developed SMB in the late 1980s to describe the structure of shared network resources, such as directories, files, printers, and serial ports; is a request-response protocol; SMB file-sharing and print services have become the mainstay of Microsoft networking: -Microsoft changed the underlying structure for using SMB (with the introduction of the Windows 2000 series of software); -all subsequent Microsoft products use DNS naming; -this allows TCP/IP protocols to directly support SMB resource sharing. 52

File Sharing Services and SMB Protocol SMB protocol and its support in file sharing in Microsoft-based networks 53

File Sharing Services and SMB Protocol SMB protocol describes file system access and how clients can make requests for files; describes the SMB protocol inter-process communication; All SMB messages share a common format that uses: - fixed-sized header; - variable-sized parameter; - data component. SMB messages can: Start, authenticate, and terminate sessions; Control file and printer access; allow an application to send or receive messages to or from 2004, another Cisco Systems, Inc. All rights device. reserved. 54

File Sharing Services and SMB Protocol 55

Gnutella protocol and P2P services P2P applications based on the Gnutella protocol used to make files on hard disks available to others for downloading; Gnutella-compatible client software allows users to connect to Gnutella services over the Internet and to locate and access resources shared by other Gnutella peers; user is connected to a Gnutella service, the client applications will search for other Gnutella nodes to connect to; the nodes handle queries for resource locations and replies to those requests; the nodes govern control messages, which help the service discover other nodes; the actual file transfers usually rely on HTTP services. 56

Gnutella protocol and P2P services Gnutella protocol 57

Gnutella protocol and P2P services Gnutella protocol Gnutella protocol Different packet types: ping -for device discovery pong -as a reply to a ping query -for file location query hit -as reply to a query push -as a download request 58

TELNET Services and Protocol Telnet was developed to the early 1970s; provides a standard method of emulating text-based terminal devices over the data network; refers both the protocol itself and the client software that implements the protocol; Virtual Terminal (VTY) session (or connection) - a connection using Telnet; uses software to create a virtual device that provides the same features of a terminal session with access to the server command line interface (CLI); Telnet daemon is a service that the server runs to support Telnet client connections; on a Microsoft Windows PC, Telnet can be run from the command prompt; 59

TELNET Services and Protocol Telnet a virtual terminal connection is established from an end device using a Telnet client application; most operating systems include an Application layer Telnet client; common terminal applications that run as Telnet clients: -HyperTerminal; -Minicom; -TeraTerm. Telnet connection is established: -users can perform any authorized function on the server (just as if they were using a command line session on the server itself); -users can start and stop processes, configure the device, and even shut down the system. 60

TELNET Services and Protocol Telnet - Services and Protocol 61

Summary 62

2004, Cisco Systems, Inc. All rights reserved.